node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
5,586
4
Igor_Muttik:igor muttik igor muttik born 1962 russia computer security expert researcher inventor dr. igor muttik senior principal research architect mcafee part intel corporation since 2011 started researching computer malware 1980s anti-virus industry infancy muttik holds phd degree physics mathematics moscow state university member caro computer antivirus research organization since 1994 lives uk worked virus researcher dr. solomon ’ software since 1998 muttik running mcafee ’ anti-malware research emea switched architectural role 2002 2008 one co-founders amtso anti-malware testing standards organization board amtso 3 years muttik also co-founder industry connections security group icsg part ieee chair taggant system working group vice-chair icsg cmx clean file metadata exchange working groups taggant system cmx part amss anti-malware support service regular speaker major international security conferences like black hat briefings rsa conference def con virus bulletin eicar muttik visiting professor information security group royal holloway university london heading mcafee work security research mobile devices funded epsrc mobsec acid appguarden projects current work focused architecture security solutions smart devices hardware-assisted security technologies may 2009 muttik blog risks associated use software packers caused criticism rob rosenberger despite incident muttik working closely today several software companies developing software packers like themida taggant system
[ 704, 2275, 2213, 11081, 43, 1451, 3342, 5902, 5971, 2425, 7899 ]
Test
5,587
7
Okta_(identity_management):okta identity management okta inc. publicly traded identity access management company based san francisco provides cloud software helps companies manage secure user authentication modern applications developers build identity controls applications website web services devices founded 2009 initial public offering 2017 valued 6 billion okta sells six services including single sign-on solution allow users log variety systems using one centralized process example company claims ability log gmail workday salesforce slack one login also offers api authentication services okta services built top amazon web services cloud january 2019 okta ceo announced company 100 million registered users okta founded 2009 current okta ceo founder todd mckinnon previously served senior vice president engineering salesforce prior salesforce held various roles peoplesoft founders include okta coo frederic kerrest also previously salesforce 2015 company raised 75 million venture capital andreessen horowitz greylock partners sequoia capital valuation 1.2 billion previously raised 150 million across earlier funding rounds 2017 initial public offering raised additional 187 million. /ref traded first day time ipo sequoia capital biggest shareholder 21.2 percent stake company headquartered san francisco also offices san jose bellevue toronto washington d.c. london amsterdam sydney paris stockholm okta primarily targets enterprise businesses current customers include jetblue nordstrom mgm resorts international u.s. department justice runs annual “ oktane ” user conference recently featured former president barack obama keynote speaker
[ 101, 10090, 1935, 7248, 11646 ]
Test
5,588
9
Comparison_of_programming_languages_(array):comparison programming languages array comparison programming languages array compares features array data structures matrix processing 48 various computer programming languages following list contains syntax examples determine dimensions index first element last element size elements note particularly languages index zero others index one least since dijkstra famous essay zero-based indexing seen superior new languages tend use following list contains syntax examples access single element array following list contains syntax examples range element array accessed following table compiled languages ada fortran scripting languages idl matlab s-lang native support vectorized operations arrays example perform element element sum two arrays produce third necessary write addition support vectorized arithmetic relational operations languages also vectorize common mathematical functions sine example array result array whose elements sine corresponding elements array vectorized index operations also supported example one would use fortran create arrays even odd entries array another common use vectorized indices filtering operation consider clipping operation sine wave amplitudes larger 0.5 set 0.5 using s-lang done
[ 10752, 515, 2948, 7684, 3462, 8582, 1931, 2062, 6414, 6160, 5521, 8082, 9871, 10510, 3736, 1435, 155, 7580, 7326, 9245, 544, 8225, 8611, 3876, 5796, 11555, 4777, 428, 5165, 5677, 5806, 9008, 3765, 8502, 7479, 10043, 10684, 6718, 963, 8644...
Validation
5,589
4
Einstein_(US-CERT_program):einstein us-cert program einstein also known einstein program originally intrusion detection system monitors network gateways government departments agencies united states unauthorized traffic software developed united states computer emergency readiness team us-cert operational arm national cyber security division ncsd united states department homeland security dhs program originally developed provide situational awareness civilian agencies first version examined network traffic subsequent versions examined content current version einstein significantly advanced einstein product u.s. congressional presidential actions early 2000s including e-government act 2002 sought improve u.s. government services internet einstein mandate originated homeland security act federal information security management act 2002 homeland security presidential directive hspd 7 issued december 17 2003 federal computer incident response capability fedcirc one four watch centers protecting federal information technology e-government act 2002 designated primary incident response center fedcirc core us-cert formed 2003 partnership newly created dhs cert coordination center carnegie mellon university funded u.s. department defense us-cert delivered einstein meet statutory administrative requirements dhs help protect federal computer networks delivery essential government services einstein implemented determine government cyber attack einstein collecting flow data civilian agencies compared flow data baseline november 20 2007 accordance office management budget omb memo einstein version 2 required federal agencies except department defense united states intelligence community agencies executive branch einstein deployed 2004 2008 voluntary 2005 three federal agencies participated funding available six additional deployments december 2006 eight agencies participated einstein 2007 dhs adopting program department-wide 2008 einstein deployed fifteen nearly six hundred agencies departments web resources u.s. government created einstein automated process collecting correlating analyzing sharing computer security information across federal civilian government einstein protect network infrastructure private sector described 2004 purpose facilitate identifying responding cyber threats attacks improve network security increase resiliency critical electronically delivered government services enhance survivability internet einstein designed resolve six common security weaknesses collected federal agency reports identified omb report 2001 u.s. congress addition program addresses detection computer worms anomalies inbound outbound traffic configuration management well real-time trends analysis us-cert offers u.s. departments agencies health federal.gov domain einstein designed collect session data including us-cert may ask additional information order find cause anomalies einstein finds results us-cert analysis given agency disposition einstein 1 determined civilian agencies know ip space obviously security concern determined agency ip looked like immediately clear agency ip gateways could reasonably instrumented protected gave birth omb tic trusted internet connections initiative three constraints einstein dhs trying address large number access points u.s. agencies low number agencies participating program backward-looking architecture omb trusted internet connections initiative expected reduce government 4,300 access points 50 fewer june 2008 agencies reduced access points 60 requested target omb reset goal latter part 2009 number determined new version einstein planned collect network traffic flow data real time also analyze content communications looking malicious code example e-mail attachments expansion known one least nine measures protect federal networks new version called einstein 2 system automatically detect malicious network activity creating alerts triggered einstein 2 use minimal amount necessary predefined attack signatures come internal commercial public sources einstein 2 sensor monitors participating agency internet access point strictly ... limited trusted internet connections using commercial government-developed software einstein could enhanced create early warning system predict intrusions us-cert may share einstein 2 information federal executive agencies according written standard operating procedures summary form us-cert intelligence law enforcement mission notify provide contact information law enforcement intelligence agencies event occurs falls responsibility version 3.0 einstein discussed prevent attacks shoot ing attack hits target nsa moving forward begin program known “ einstein 3 ” monitor “ government computer traffic private sector sites. ” considered first private sector site program plan devised bush administration controversial given history nsa warrantless wiretapping scandal many dhs officials fear program move forward “ uncertainty whether private data shielded unauthorized scrutiny. ” believe program invade privacy individuals much privacy impact assessment pia einstein 2 published 2008 dhs gave general notice people use u.s. federal networks dhs assumes internet users expect privacy addresses email ip addresses websites visit service providers use information routing dhs also assumes people least basic understanding computers communicate know limits privacy rights choose access federal networks privacy act 1974 apply einstein 2 data system records generally contain personal information indexed queried names individual persons pia first version also available 2004 dhs seeking approval einstein 2 retention schedule flow records alerts specific network traffic related alert may maintained three years example case false alert data deemed unrelated potentially collected error deleted according dhs privacy assessment us-cert 24x7 incident handling response center 2007 us-cert data provided authorized users need know data business security purposes including security analysts system administrators certain dhs contractors incident data contact information never shared outside us-cert contact information analyzed secure data us-cert center began dhs certification accreditation process may 2006 expected complete first quarter fiscal year 2007 march 2007 center retention schedule approved national archives records administration disposition schedule —its records must considered permanent nothing may deleted april 2013 dhs still retention schedule working nppd records manager develop disposition schedules update issued may 2016
[ 7741, 7322, 7464, 7337, 939, 10924, 4081, 6993, 5780, 2041, 5402, 5245, 2558 ]
None
5,590
4
Lucky_Thirteen_attack:lucky thirteen attack lucky thirteen attack cryptographic timing attack implementations transport layer security tls protocol use cbc mode operation first reported february 2013 developers nadhem j. alfardan kenny paterson information security group royal holloway university london novel variant serge vaudenay padding oracle attack previously thought fixed uses timing side-channel attack message authentication code mac check stage tls algorithm break algorithm way fixed previous attempts mitigate vaudenay attack sense attacks pose significant danger ordinary users tls current form however truism attacks get better time anticipate improvements attacks entirely new attacks may yet discovered — nadhem j. alfardan kenny paterson researchers examined free software implementations tls found examined products potentially vulnerable attack tested attacks successfully openssl gnutls researchers applied responsible disclosure worked software vendors software updates mitigate attacks available time publication martin r. albrecht paterson since demonstrated variant lucky thirteen attack amazon s2n tls implementation even though s2n includes countermeasures intended prevent timing attacks
[ 513, 1157, 517, 1288, 9744, 1688, 2083, 3619, 8358, 11693, 11569, 9394, 7736, 9281, 9412, 3657, 5834, 10831, 8273, 11345, 474, 3805, 7264, 8674, 7139, 10341, 5107, 1526, 2169, 3707, 510 ]
Test
5,591
4
Open_proxy:open proxy open proxy proxy server accessible internet user generally proxy server allows users within network group i.e closed proxy store forward internet services dns web pages reduce control bandwidth used group open proxy however user internet able use forwarding service anonymous open proxy useful seeking online anonymity privacy help users hide ip address web servers since server requests appear originate proxy server makes harder reveal identity thereby helps preserve perceived security browsing web using internet services real anonymity extensive internet security might achieved measure alone website operators use client-side scripts determine browser real ip address open proxy may keeping logs connections public vpns work open proxies possible computer run open proxy server without computer owner knowing result misconfiguration proxy software running computer infection malware viruses trojans worms designed purpose caused malware infected computer known zombie computer open proxies often implicated abuse number methods developed detect refuse service irc networks strict usage policies automatically test client systems known types open proxies likewise mail server may configured automatically test mail senders open proxies using software codice_1 groups irc electronic mail operators run dnsbls publishing lists ip addresses known open proxies ahbl cbl njabl till 2013 sorbs since 2002
[ 8224, 7873, 10756, 3941, 7739, 2887, 9256, 5199, 7515, 2387, 4725, 119, 761, 827, 2041, 5887 ]
None
5,592
8
Libscore:libscore libscore web-based tool scans one-million popular websites collect statistics javascript library usage collects data jquery plugins javascript variables produced non-jquery plugins javascript libraries loaded via requirejs libscore provides tools intended help developers technical analysts compare relative popularity web frameworks third-party web tools libscore developed via co-sponsorship stripe payments processor digitalocean hosting infrastructure provider libscore founder julian shapiro created project 2014 web development grant awarded stripe major payments processing company developing libscore brokered partnership digitalocean participate project second final sponsor stripe provides legal resources covers cost libscore development digitalocean lends technical resources perform monthly crawling may 2015 libscore nominated net award competing 1,000 submissions june 2015 libscore 2.0 released introduced ability compare popularity libraries time also provided comparative graphing comparing library growth trends one another auto-suggest make library searching easier libscore scans top million sites web determine third-party javascript libraries installed site developers use data determine libraries trending popularity libraries use popular sites libraries market penetrations compare data helps developers perform competitive analysis make informed decisions choosing libraries work site libscore scans runs heuristics determine window variables produced third-party javascript libraries addition catalogues presence external javascript scripts thereafter via libscore homepage users search aggregated data order libscore also provides monthly statistics top libraries scripts sites addition regularly publishing charts showcasing library adoption percentages also libscore api provides developers programmatic access libscore monthly data
[ 10507, 803, 3462 ]
None
5,593
9
Mod_lisp:mod lisp mod_lisp extension module apache http server enables apache interface application servers written lisp making possible dynamically generate web pages provide web applications lisp programs unlike mod_* projects mod_perl mod_python mod_lisp embed lisp interpreter apache concept closer fastcgi handling requests serializing textual representation sending socket persistent lisp program sending lisp system response client client may web browser likely reverse proxy server server interacts user browser source freebsd style license lisp examples pre-compiled binaries freebsd linux win32 available mod_lisp web site
[ 1802, 10506, 9229, 11154, 1556, 10020, 10026, 7212, 10284, 4658, 2485, 823, 1468, 4797, 8644, 11466, 3920, 5849, 6366, 865, 6502, 7784, 9320, 9834, 8689, 9841, 124, 9726 ]
Test
5,594
2
Windows_USER:windows user windows user component microsoft windows operating system provides core functionality building simple user interfaces component existed versions windows includes functionality window management message passing input processing standard controls windows user provides large part core user experience microsoft windows historically responsible gradually windows become larger better factored windows user cooperated components provide functionality windows user implements abstractions used build windows applications include hwnd basic unit visual display input windows developer platform visual elements either hwnds live part larger hwnd many functions windows user manipulate properties hwnds size position title hwnd also communication channel wndproc window procedure delivery messages windows managed tree desktop window root hierarchy child windows usually always visually contained within parents applications operating system communicate hwnds using messages window message combination target hwnd message code details mouse position combining calls windows user right way windows application processes messages core windows message loop including calls getmessage translatemessage dispatchmessage core windows application developer functionality related windows user provided c header file winuser.h 16-bit versions windows windows user implemented file called user.exe file extension misnomer windows user fact always dynamic link library 32-bit versions windows 32-bit version windows user called user32.dll located system32 directory compatibility 16-bit applications provided modified version user.exe also present 64-bit versions windows 64-bit implementation windows user called user32.dll located system32 directory modified 32-bit version also called user32.dll present syswow64 directory
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2603, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 9813, 10839, 603, 9819, 1632, 3170, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 8841, 6...
Test
5,595
1
Single_source_of_truth:single source truth information systems design theory single source truth ssot practice structuring information models associated data schema every data element mastered edited one place possible linkages data element possibly areas relational schema even distant federated databases reference locations data refer back primary source truth location updates data element primary location propagate entire system without possibility duplicate value somewhere forgotten deployment ssot architecture becoming increasingly important enterprise settings incorrectly linked duplicate de-normalized data elements direct consequence intentional unintentional denormalization explicit data model pose risk retrieval outdated therefore incorrect information common example would electronic health record imperative accurately validate patient identity single referential repository serves ssot duplicate representations data within enterprise would implemented use pointers rather duplicate database tables rows cells ensures data updates elements authoritative location comprehensively distributed federated database constituencies larger overall enterprise architecture ssot systems provide data authentic relevant referable ideal implementation ssot described rarely possible enterprises many organisations multiple information systems needs access data relating entities e.g. customer often systems purchased off-the-shelf vendors modified non-trivial ways various systems therefore needs store version common data entities therefore system must retain copy record hence immediately violating ssot approach defined example erp enterprise resource planning system sap oracle e-business suite may store customer record crm customer relationship management system also needs copy customer record part warehouse dispatch system might also need copy customer data e.g. shipping address cases vendors support modifications always possible replace records pointers ssot organisations one information system wishing implement single source truth without modifying one master system store pointers systems entities three supporting technologies commonly used enterprise service bus esb allows number systems organisation receive updates data changed another system implement single source truth single source system correct data entity must identified changes entity creates updates deletes published via esb systems need retain copy data subscribe update update records accordingly given entity master source must identified sometimes called golden record given system could publish source truth information particular entity e.g. customer also subscribe updates another system information entity e.g. product alternative approach point-to-point data updates become exponentially expensive maintain number systems increases approach increasingly favour architecture mdm system act source truth given entity might necessarily alternative source truth another system typically mdm acts hub multiple systems many could allow source truth updates different aspects information given entity example crm system may source truth aspects customer updated call centre operator however customer may example also update address via customer service web site different back-end database crm system mdm application receives updates multiple sources acts broker determine updates regarded authoritative golden record syndicates updated data subscribing systems mdm application normally requires esb syndicate data multiple subscribing systems customer data integration cdi common application master data management sometimes abbreviated cdi-mdm 4554 primary purpose data warehouse support reporting analysis data combined multiple sources fact data combined according business logic embedded data transformation integration processes means data warehouse often used de facto ssot generally however data available data warehouse used update systems rather dw becomes single source truth reporting multiple stakeholders context data warehouse correctly referred single version truth since versions truth exist operational data sources data originates dw simply reporting mechanism data loaded operational systems software design schema business logic components often repeated multiple different contexts version refers source code address problem concepts ssot also applied software development principals using processes like recursive transcompiling iteratively turn single source truth many different kinds source code match structurally derived ssot
[ 11674, 2851, 3004 ]
Validation
5,596
6
El_Torito_(CD-ROM_standard):el torito cd-rom standard el torito bootable cd specification extension iso 9660 cd-rom specification designed allow computer boot cd-rom announced november 1994 first issued january 1995 joint proposal ibm bios manufacturer phoenix technologies according el torito specification 32-bit cpu pc bios search boot code iso 9660 cd-rom standard allows booting two different modes either hard disk emulation boot information accessed directly cd media floppy emulation mode boot information stored image file floppy disk loaded cd behaves virtual floppy disk useful computers built 1999 designed boot floppy drive modern computers emulation mode generally reliable method bios assign bios drive number cd drive drive number int 13h assigned 80 hard disk emulation 00 floppy disk emulation arbitrary number bios provide emulation emulation allows older operating systems booted cd making appear booted hard floppy disk el torito also used produce cds boot linux operating systems including grub bootloader cd following multiboot specification el torito spec alludes mac platform id apple computers n't use according legend el torito cd/dvd extension iso 9660 gained name design originated el torito restaurant irvine california 33.684722 -117.852547 supported claim jack allweiss founder future domain inc. states future domain helped establish standard initial two authors curtis stevens phoenix technologies stan merkin ibm
[ 8075, 6436, 5413, 7720, 6062, 7342, 7983, 8110, 823, 5816, 6333, 2811, 4929, 5062, 10839, 8676, 11108, 6118, 1515, 5231, 3314, 3323, 1150 ]
Validation
5,597
3
Web_interoperability:web interoperability web interoperability producing web pages viewable standard compatible web browsers various operating systems windows macintosh linux devices personal computers pcs pdas mobile phones tablets based latest web standards term originated web interoperability pledge promise adhere current html recommendations promulgated world wide web consortium w3c wip w3c initiative started run zdnet anchordesk quite independently issue known cross browsing browser war internet explorer netscape windows internet explorer dominant browser modern web browsers mozilla firefox opera safari supported web standards backward compatibility internet explorer many web pages supported non-standard html tags dom handling script yet well platform-dependent techniques activex harmful web accessibility device independence various activities example web standards project mozilla technology evangelism web standards group also educational activities web essential conference
[ 3462, 8584, 10026, 6797, 7983, 3923, 8854, 823, 124, 1501 ]
Validation
5,598
3
Address_space:address space computing address space defines range discrete addresses may correspond network host peripheral device disk sector memory cell logical physical entity software programs save retrieve stored data unit data must address individually located else program unable find manipulate data number address spaces available depend underlying address structure usually limited computer architecture used address spaces created combining enough uniquely identified qualifiers make address unambiguous within address space person physical address address space would combination locations neighborhood town city country elements address space may element address different addresses said space reference different entities example could multiple buildings address 32 main street different towns demonstrating different towns different although similarly arranged street address spaces address space usually provides allows partitioning several regions according mathematical structure case total order memory addresses simply chunks nested domain hierarchies appear case directed ordered tree domain name system directory structure similar hierarchical design postal addresses internet example internet assigned numbers authority iana allocates ranges ip addresses various registries order enable manage parts global internet address space uses addresses include limited following another common feature address spaces mappings translations often forming numerous layers usually means higher-level address must translated lower-level ones way example file system logical disk operates linear sector numbers translated absolute lba sector addresses simple cases via addition partition first sector address disk drive connected via parallel ata must converted logical cylinder-head-sector address due interface historical shortcomings converted back lba disk controller finally physical cylinder head sector numbers domain name system maps names network-specific addresses usually ip addresses turn may mapped link layer network addresses via address resolution protocol also network address translation may occur edge different ip spaces local area network internet iconic example virtual-to-physical address translation virtual memory different pages virtual address space map either page file main memory physical address space possible several numerically different virtual addresses refer one physical address hence physical byte ram also possible single virtual address maps zero one one physical address
[ 6664, 6153, 3603, 7187, 7195, 3615, 9762, 7217, 52, 5176, 1593, 8762, 10813, 6719, 2625, 5188, 7244, 594, 7269, 5736, 8301, 9838, 6772, 3702, 8831, 3725, 7323, 682, 2226, 1219, 9932, 2253, 5840, 6868, 1237, 6358, 1247, 11489, 9964, 3315, ...
Test
5,599
4
Commvault:commvault commvault publicly traded data protection information management software company headquartered tinton falls new jersey formed 1988 development group bell labs later became business unit network systems incorporated 1996 commvault software used data backup recovery cloud infrastructure management retention compliance commvault business split software licensing services march 1998 bob hammer al bunte joined commvault chairman president ceo vice president coo respectively feb. 5 2019 sanjay mirchandani replaced retiring hammer mirchandani joined commvault puppet oregon-based automation company resided ceo commvault software enterprise-level data platform contains modules back restore archive replicate search data built ground-up single platform unified code base data protected installing agent software physical virtual hosts use operating system application native apis protect data consistent state production data processed agent software client computers backed data manager mediaagent disk tape cloud storage data management activity environment tracked centralized server commserve managed administrators central user interface end users access protected data using web browsers mobile devices 2018 commvault began sell hyperscale backup appliance appliance commvault software pre-integrated hardware customers install directly data centers commvault provides consulting services customers commvault advises customers setting new data management systems architecture design implementation monitoring remote managed service commvault manages software production customers
[ 1560, 11201, 1358 ]
Test
5,600
2
Cairo_(operating_system):cairo operating system cairo code name project microsoft 1991 1996 charter build technologies next generation operating system would fulfill bill gates vision information fingertips cairo never shipped although portions technologies since appeared products cairo announced 1991 microsoft professional developers conference jim allchin demonstrated publicly including demo system attendees use 1993 cairo/win95 pdc microsoft changed stance cairo several times sometimes calling product times referring collection technologies cairo used distributed computing concepts make information available quickly seamlessly across worldwide network computers windows 95 user interface based initial design work done cairo user interface dce/rpc shipped windows nt 3.1 content indexing part internet information server windows desktop search remaining component object file system planned implemented form winfs part windows vista development cancelled june 2006 technologies merged microsoft products microsoft sql server 2008 also known codename katmai subsequently confirmed interview bill gates microsoft planned migrate applications like windows media player windows photo gallery microsoft office outlook etc use winfs data storage back-end
[ 636, 641, 8576, 6787, 3463, 651, 7307, 6797, 8080, 3857, 8976, 10896, 2196, 3477, 7317, 11030, 11283, 4505, 5406, 10273, 8098, 4515, 11301, 3496, 6441, 6697, 1581, 7983, 3250, 3890, 9910, 6462, 7615, 321, 7106, 582, 9033, 1098, 2380, 6476...
Test
5,601
5
LocalTalk-to-Ethernet_bridge:localtalk-to-ethernet bridge localtalk-to-ethernet bridge network bridge joins physical layer appletalk networking used previous generations apple computer products ethernet network important class products late 1980s early 1990s ethernet support became universal mac lineup localtalk-to-ethernet bridges performed appletalk bridging others also able bridge protocols using ad-hoc standards one example macip system allowed localtalk-based macs send receive tcp/ip internet packets using bridges go-between hardware devices software mactcp era 1995 software open transport era 1995
[ 5864, 4345, 7706 ]
Train
5,602
1
Independent_Safeguarding_Authority:independent safeguarding authority independent safeguarding authority isa non-departmental public body england northern ireland wales existed 1 december 2012 merged criminal records bureau crb form disclosure barring service dbs isa created labour government 2007-2010 tabloid media campaign decision set isa followed inquiry headed sir michael bichard set wake soham murders isa oversee new vetting barring scheme england wales northern ireland required working vulnerable groups undergo enhanced vetting procedure allowed commence relevant duties 15 june 2010 new coalition government home secretary theresa may announced plans new applicants jobs working children vulnerable along changing posts would register independent safeguarding authority halted vetting barring scheme would severely scaled back save uk taxpayer around £100 million year home secretary went say protection children vulnerable adults would focus upon common sense rather measures labour introduced said got actually trust people philosophy behind setting isa based upon assumption assumed guilty sense proven innocent told able work children review vetting barring scheme published 11 february 2011 made recommendations merger criminal records bureau independent safeguarding authority one non-departmental public body responsible barring individuals completing criminal record checks protection freedoms act new scheme require registration cases details retained database exception barred whether basis crime basis 'soft intelligence e.g dismissal employer led continued criticism variety organizations bichard report published 22 june 2004 made 31 recommendations recommendation 19 called new registration scheme stated new arrangements introduced requiring wish work children vulnerable adults registered register – perhaps supported card licence – would confirm known reason individual work client groups new register would administered central body would take decision subject published criteria approve refuse registration basis information made available police agencies responsibility judging relevance police intelligence deciding person ’ suitability would lie central body note recommendation use double-negative known reason individual work client groups say isa inception designed clear individuals suitable work vulnerable groups remove pose known risk proposals implement recommendations put public consultation 5 april 2005 results exercise announced rt hon ruth kelly secretary state department education skills 19 january 2006 translated primary legislation safeguarding vulnerable groups act 2006 received royal assent 8 november 2006 within act isa referred independent barring board known isa since august 2007 formally renamed following royal assent policing crime bill 2009 safeguarding vulnerable groups act covers england wales comparable legislation passed cover northern ireland scotland department children schools families known held consultations along creating isa safeguarding vulnerable groups act 2006 defines two categories work whether paid fall within scope act regulated controlled activity regulated activity primary area work covered act broadly deals direct contact vulnerable groups specifically regulated activity covers activity involves contact children vulnerable adults specified nature e.g teaching training care supervision advice treatment transport activity allowing contact children vulnerable adults specified place e.g school children ’ home etc. activity regulated activity must take place frequent intensive basis regulated activity also covers fostering childcare adoption child defined anyone 18 except employment settings age limit 16 addition number defined office holders position prescribed post-holder deemed engaging regulated activity irrespective actual contact vulnerable groups list includes people local authority director children ’ services trustees children ’ charities school governors distinction made paid voluntary work duties responsibilities regulated activity organisation providing activity although serious criminal offence engage regulated activity barred individuals engage regulated activity required register isa prominent example involved domestic employment individuals required register isa employed parents work children vulnerable adult arranges individuals provide care homes examples domestic employment would include groups private tutors employed directly parents individuals involved direct payments scheme policy confirmed government response isa scheme consultation document may 2008 controlled activity much limited area work tightly defined safeguarding vulnerable groups act controlled activity applies mandatory check isa registration status individuals controlled activity although possible employ barred person providing sufficient safeguards put place isa functioned decision-making element new vetting barring scheme application process monitoring functions run criminal records bureau largely retains functions 2012 entirely merged crb operational vetting barring scheme originally designed would required engaged regulated controlled activity register registration status checked would possible 'opt-out scheme would criminal offences non-compliance employer employee apply case barred individual seeks attains work successful original application process would provided unique reference number employers would verify potential employee membership allowing commence duties via free online check estimates time stated number would required register would approximately 11.3 million people quarter adult population criticised press 2009 proposal create intrusive database ever created democracy described later initial proposals withdrawn press hostility led government creation singleton review 2009 subsequent review led eileen munro 2010 cost registration originally set £64 per person except volunteers would free charge fees also withdrawn requirement register abandoned 2010 point isa barred list reshaped simply list barred accessible employers certain others akin predecessor 'list 99 definition volunteer remains used crb volunteer person engaged activity involves spending time unpaid except travelling approved out-of-pocket expenses something aims benefit someone individuals groups addition close relatives aspects original design retained since singleton review isa owns maintains two lists one covering children sector one cover adults barred working vulnerable groups replaced previous barred lists list 99 protection children act 1999 poca scheme relating protection vulnerable adults pova disqualification orders inclusion barred lists result either automatic bar following police caution conviction following discretionary bar typically following dismissal resignation dismissal possible following act gross misconduct work although potential reasons secondary legislation decisions taken isa isa base decisions upon information range sources including limited held police locally police national computer local authorities social services regulatory organisations general medical council general teaching council england supervisory authorities ofsted also receive cases directly employers employer referrals constitute largest number cases considered discretionary barring receive cases directly individuals cases clear decisions escalated within isa final decisions made board chaired former chief executive barnardo roger singleton isa able consider information led cautions convictions include unproven allegations former employers professional bodies members public stories press however referral information allegations lead automatic inclusion isa barred lists barring decision made individual given information decision based opportunity explain case however hearing process caused controversy see case workers allowed undertake appropriate research internet chatrooms social networking websites although published guidance isa decision making process safeguarding vulnerable groups act 2006 state isa satisfied relevant conduct occurred able consider factor safeguarding vulnerable groups act 2006 defines relevant conduct philosophic burden proof whether event occurred balance probability used civil trials rather beyond reasonable doubt required criminal trials case assessment within risk factors obsession sex violence presence severe emotional loneliness and/or inability manage/sustain emotionally intimate relationships age-appropriate adults links anti-social peers presence impulsive chaotic unstable lifestyle using substances sex cope stress considered relation relevant conduct appeal inclusion means administrative court judicial review recent case demonstrates court minded de-register individual bar lawful disproportionate sb v independent safeguarding authority 2011 ukut 404 aac 04 october 2011 decision reflects similar decisions family criminal law regarding risk assessment conviction sexual offences isa barred lists performed separate albeit related role crb disclosure isa decision-making process considered information relating potential risk individual poses vulnerable groups using sources go beyond held police whereas crb disclosure may contain details offences may lead bar example drink driving may pertinent given role driving school bus isa-registration replace crb disclosures 2012 isa crb merged disclosure barring service dbs march 2009 elements vetting barring scheme begun rolled stages linked series pieces secondary legislation safeguarding vulnerable groups act 2006 isa came existence 2 january 2008 31 march 2008 isa began advising ministers barring decisions taken ministers current schemes 20 january 2009 barring decisions england wales began taken isa taking responsibility secretary state extended northern ireland 13 march 2009 20 february 2009 detailed guidance isa decision-making process published 12 october 2009 increased safeguards came effect around five million jobs voluntary positions – including national health service jobs – covered barring arrangements additional safeguards original intention 26 july 2010 new entrants roles working vulnerable groups switching jobs new provider within sectors would able register vbs assessed isa employers would able check registration status online subscribe notified employee registration status changes ability requirement register withdrawn 2011 following singleton munro reviews lists still maintained remains offence employ person regulated activity barred isa person seek work several prominent children authors – believed would required join scheme order conduct talks schools – criticised isa philip pullman called scheme outrageous demeaning insulting said would longer appear schools go school author illustrator talk class time else whole school earth – earth – world anybody going rape assault child circumstances preposterous author screenwriter frank cottrell boyce said author 're never alone class possible reason unless revenue-raising scam former children laureate anne fine said refuse – spoken schools without incident 32 years refuse undergo demeaning process part unhealthy situation 've got people close children seen potential paedophiles lindsay mackie representing literary charity english pen said signal children public space defined potentially dangerous space – values worlds visitors work whether writing engineering family secondary definition adult vetted safe – limiting fearful creating paranoia others questioned usefulness scheme pointing could prevented soham murders first place perpetrator ian huntley knew victims girlfriend job critical media coverage scheme launched 2009 led confusion registration requirements singleton review set due concerns expressed degree contact children trigger requirement register isa sir roger singleton chief adviser safety children chair isa produced ‘ drawing line ’ report check government drawn line right place relation requirement register december 2009 government accepted recommendations found ‘ drawing line ’ report included clarification number areas dcsf published vetting barring myth buster clarify requirements scheme however fact-sheet challenged rather simplistic one-sided several unions professional associations represent effected isa 2009 onwards organizations produced large amount documentation form statements conference resolutions advice either clarifying challenging isa publications referenced including written royal college nursing nurses union national union teachers nut national association schoolmasters union women teachers nasuwt unison union non-teaching staff schools even small sample responses different unions associations significant differences within opinions expressed positions adopted rcn specific branches nasuwt seemingly taking strongest oppositional stance perhaps indicates quite complex child protection debate uk currently 2010 government partly response pressure organizations mentioned launched second review isa led professor eileen munro department social policy london school economics political science lse following munro review 2011 requirement register withdrawn entirely also announced isa would merged crb 2012 isa role maintain lists accessed employers certain bodies barred working either children vulnerable adults changes extent brought end virulent press criticisms isa however also led deeper questioning thinking behind original creation isa specific accusations government overseen many changes reviews showing lack support organization isa initially created knee jerk reaction soham murders philip pullman remains one vociferous critics accusing government using soham murders 'scare story scare british public accepting intrusive database visible opposition isa came large nurses union royal college nursing rcn included successful legal cases brought rcn 2010 several journalists campaigning organizations continued voice criticism including 'civitas 'the manifesto club run journalist josie appleton criticisms concerns commonly raised regarding structure independent safeguarding authority included person barred without hearing minimum standard evidence legal support available 'minded bar right appeal limited single sanction barring 10 years anyone aged 25 refusal independent safeguarding authority use word 'sanction describe barring process formed basis rcn cases organizations continued question basis upon independent safeguarding authority created asking whether bureaucratic solution child protection issues realistic sensible isa accused vociferous critics broadsheets guardian 'unethical 'orwellian rcn campaigning groups ask whether creates problems creating 'climate fear amongst professionals simultaneously creating 'an illusion security amongst public general end pointed recent cases paedophile offences schools committed vanessa george plymouth – 2010 could prevented form database cases others like offender previous criminal disciplinary record debate seems likely continue especially neither pro anti viewpoint regarding expansion systems claimed political party conventional political standpoint right left
[ 8743 ]
Test
5,603
2
4690_Operating_System:4690 operating system 4690 operating system sometimes shortened 4690 os 4690 specially designed point sale operating system originally sold ibm however 2012 ibm sold retail business including product toshiba supports 4690 widely used ibm toshiba retail customers drive retail systems running applications well ibm application client server environment ace supermarket application sa general sales application gsa chain drug sales application cdsa follow-on product ibm 4680 os use ibm customers since 1986 original ibm 4680 os based digital research concurrent dos 286 system soon later renamed flexos 286 july 1993 ibm adopted flexos version 2.32 basis ibm 4690 os version 1 flexos 2.32 supported 286 386 modes limit applications running concurrently 1995 ibm licensed ims real/32 7.50 derivation digital research multiuser dos thereby successor concurrent dos 386 bundle 4695 pos terminals according year store ihl consulting group/ris news ibm 4690 os still market share 12 pos register/client market june 2005 ibm starting phase favour ibm retail environment suse ires ibm continued maintain 4690 os april 2015 recent version released ibm may 2012 ibm 4690 os version 6 release 3 supported 2017 special contracts big-name companies meanwhile toshiba released toshiba 4690 os version 6 release 4 v6r4 january 2014 well version 6 release 5 v6r5 january 2016 retailers using 4690 operating system operations many retail-specific reliability features addition running ibm hardware third-party vendors taken advantage 4690 features competitive hardware 4690 supports number point sale pos terminal devices store controller servers combination controller/terminals 4690 documentation contains list supported pos devices including devices use 20 years family ibm usb pos devices 4690 supports includes keyboards displays cash drawers 4690 also supports i/o devices designed conform ibm usb pos device interface specifications ibm makes interface specifications available third-party vendors enable connect devices pos terminals using rs485 rs232 usb connections ibm provides controller matrix document list compatible ibm servers use 4690 os store controllers controller/terminals servers represent current formerly available devices continue supported 4690 perhaps notable feature 4690 os ability provide redundancy infrastructure ibm designed 4690 os work either single server one 4690 servers servers commonly called store controllers connected lan 4690 store controllers provide redundant backup using mirrored data files using system master controller alternate master file server alternate file server designations controllers preserve data integrity allow file backup event store controller fails needs replaced copy 4690 os maintained store controller 4690 pos terminals registers load copy 4690 store controller memory initial program load ipl 4690 controllers provide terminal support form terminal loading price lookup transaction logging non-volatile memory utilized ensure data lost transit terminals store controller terminals assigned primary store controller controller typically backed another controller primary controller fails terminals automatically access backup controller providing uninterrupted sales pos terminal primary backup controllers unavailable terminal go standalone state applications capable supporting terminal offline tof state wherein terminals run offline using terminal-based item file logging stored within memory order maintain software store level 4690 os provides software maintenance facility manage updates facility provides checking ensure updates transferred store ability apply maintenance store level commands central control updated software applied test preserves prior software case maintenance needs backed reason 4690 supports communications store controller several forms including tcp/ip x.25 sna asynchronous communications following list commands supported 4690 operating system 4690 os updated annually address needs user community anticipation upcoming requirements 4690 version 5 incorporated new security enhancements ssh ipsec enhanced operator security allowing alphanumeric operator ids password complexity requirements password expiration etc. helped users address new security requirements credit card companies another recent addition 4690 capability forward store hardware- software-level events remote management system facilitate central control monitoring file integrity monitoring lockdown 4690s becoming increasingly important due recent breaches caused point-of-sale-malware based threats 4690 supports applications written ibm 4680 basic variant cbasic metaware high-c java 2 java language-based capability server client along extension tcp/ip capability client enables java applications server client run concurrently existing cbasic c applications users make functional enhancements existing applications developing new java application communicates existing application many documents could obtained ibm retail publications download center 2016 toshiba global commerce solutions current owner 4690 os removed public access 4690 related manuals publications servers
[ 10883, 4996, 6148, 6276, 7053, 10561, 6675, 9619, 9366, 7319, 2201, 8729, 11673, 9628, 6557, 3359, 10273, 6442, 5677, 10030, 7983, 2045, 9139, 6325, 11383, 7356, 573, 6207, 321, 4546, 1219, 964, 1221, 6342, 8262, 8517, 6985, 9162, 5067, 6...
None
5,604
9
Brian_Silverman:brian silverman brian silverman canadian computer scientist creator many programming environments children researcher cellular automata silverman student massachusetts institute technology 1970s one creators tinkertoy computer played tic-tac-toe student mit silverman worked seymour papert papert founded logo computer systems inc. 1980 commercialize logo programming language silverman became director research later worked consulting scientist mit media lab ported logo programmable bricks precursor lego mindstorms one developers scratch programming language co-founder along paula bonta mitchel resnick president playful invention company headquartered montreal quebec canada develops programmable cricket spin-off media lab silverman part team reverse-engineered mos technology 6502 intel 4004 microprocessors developed transistor-level emulators ported spacewar one earliest digital computer games java writing another emulator pdp-1 game originally written also invented several well-known cellular automaton rules including brian brain seeds wireworld
[ 6594, 5677, 10173, 7281, 9975, 7069 ]
Validation
5,605
5
Shiira:shiira shiira シイラ japanese common dolphin-fish discontinued open source web browser mac os x operating system according lead developer makoto kinoshita goal shiira create browser better useful safari shiira used webkit rendering scripting project reached version 2.3 discontinued december 2011 developer website removed since browser developed safari mind main characteristics two browsers similar example shiira employs private browsing options history cookies recorded activated however search engines search field toolbar includes many search engines shiira also uses cocoa programming provide users customizable drawer extending left right window drawer includes bookmarks history downloads rss reader version 2.0 sidebar replaced series palettes opened closed main window toolbar shiira natively supports in-browser pdf viewing features shiira include appearance options users may switch aqua metal styles addition changing buttons appearances however current 2.0 release changes themes yet available tabs also customizable another option tab exposé acts much like exposé feature mac os x tab visible totality enabling users select tab wish navigate 1.x releases shiira also page-turning effect transitions two webpages however dropped 2.x releases new interface shiira 2.0 set display tabs thumbnails along bottom sides window latest release version 2.3 requires mac os x 10.4 later shiira 2.3 tested latest versions os reported buggy mac os x 10.5 10.6 final release mac os x 10.3 1.2.2
[ 513, 6657, 9736, 2579, 6171, 2076, 9757, 7713, 10791, 9770, 559, 9780, 4661, 3639, 10808, 3643, 9275, 64, 5707, 10834, 5205, 6231, 8281, 2139, 6747, 6237, 1642, 9834, 8303, 9841, 115, 9843, 4728, 637, 1664, 2182, 11418, 10910, 8351, 7340,...
None
5,606
3
ThinkPad_X_series:thinkpad x series thinkpad x series line notebook computers convertible tablets originally produced ibm marketed lenovo ibm announced thinkpad x series initially x20 september 2000 intention providing “ workers move better experience extra-thin extra-light mobile computing. ” thinkpad x series replaced 240 570 series ibm transition numbered letter series early 2000s first x series laptops slimmer deck cards lighter half-gallon milk despite presence 12.1-inch thin-film transistor tft lcd display design values—thin light—continued integral thinkpad x-series laptops design marketing even purchase ibm personal computing division lenovo first x series thinkpad released lenovo x41 2005 thinkpad x-series laptops lenovo described trusted reviews combining ultraportable weight form factor durable design x-series laptop styles include traditional ultraportables well convertible tablet designs according lenovo thinkpad x-series laptops include low power processors offer long battery life several durability features roll cage magnesium frame around display magnesium alloy covers spill-resistant keyboard currently lacks replaceable battery upgradable ram slots x20 first ibm/lenovo long standing x-series ultraportable line celeron-based configurations thinner case specifications x20 except optional 600 700mhz processor onboard ram could ordered new internal design slim-version dropped svga screen option dropped tualatin cpus faster radeon 7000 8mb gpu communications daughter card/cdc slot optional firewire and/or wifi models 133mhz fsb maximum ram increased 640mb x22 faster processors 800 866mhz bigger hard drives 30gb bluetooth ibm security sub system selected models x23 even faster processors 1.06 1.13ghz full-powered successor x2x line completely redesigned case however shared much technology 830mg chipset intel extreme graphics gpu maximum 1gb ram thanks two ram slots firewire standard models 60gb hard drives available additional secondary extended life battery could purchased x30 updated intel centrino platform pentium cpus faster ram ddr pc2100 better gpu ati radeon 7000 vram 16mb usb2.0 2nd usb port left side gigabit lan introduced models ibm security sub system models first model new thin light sub-line specifications three years release x30 upon acquiring thinkpad division lenovo released thinkpad x41 ultraportable laptop thinkpad x41 tablet x41 tablet convertible capacity function tablet pc ultraportable laptop x32 introduced 2005 numbering system irregular actually introduced x40 using older x3x chassis design also powerful x40 x41 units due use faster full-voltage dothan processors standard 2.5 5400/7200rpm hard drives short-lived model discontinued within months introduction model ibm included gigabit lan security sub system models x32 x41 two last ibm-designed thinkpads lenovo took x41 tablet designed lenovo x-series laptops released 2006 lenovo x60 x60s x60 tablet x60 x60s slimline differed primarily processors x60s low voltage processor x60 gave x60s lower active temperature longer battery life exchange reduced performance x60s also smaller heatsink slightly thinner case different battery form factor although could use standard x60 batteries plastic adapter review thinkpad x60/x60s notebook review called laptop hands best performing ultraportable market raising issues design lack optical drive two laptops available variety configurations later x60 models used 64-bit core 2 duo cpus x60s available lightweight lcd panel typical specifications laptops provided thinkpad x60 tablet praised reviewers laptop magazine said thinkpad x60 tablet raises bar business-class convertibles significant issue raised low capacity 4-cell battery provided battery life two hours x series laptops released lenovo 2007 x61 x61s x61 tablet x61 received mixed user reviews cnet users reporting display problems delivery delays others praised laptop performance portability reviewers however praised ultraportable notebook review called extremely fast ultraportable however criticized display colors viewing angles also pointed palm rest prone heating wireless networking card underneath x61s lauded excellent build quality performance long battery life battery improvement x41 model one last feature 43 aspect ratio display x60s models shipped intel core 2 duo l7300 clocked 1.40ghz l7700 clocked 1.80ghz 2018 still possible purchase new batteries spare parts laptops online retailers thinkpad x61 tablet also received positive reviews reviews saying build quality engineering second none shines tablet features executed something close genius however high price tag relatively inadequate performance criticized reviewer tabletpc review acknowledged sturdiness x61 tablet high battery life quality pen features met disfavor lack widescreen display brightness colors lack optical drive—although reviewer admitted absence helps reduce weight laptops released x series 2008 followed new naming conventions established lenovo x series laptops released lenovo 2008 x200 x200 tablet x300 thinkpad x200 released 15 july 2008 leveraged new technology x300 including options solid-state drive ssd optional integrated camera widescreen display optional 3g mobile broadband card new 9-cell battery extended running time 9.8 hours weight low intel core 2 duo cpu 2.66ghz one last models x-series able run libreboot free software bios replacement lenovo released x200s 23 september 2008 differed standard x200 lighter longer battery life running quietly due owl fan design cooling taken x300 x200s available half dozen different cpus three screen options top range wxga+ led-backlit tn panel x200s features cooler components made possible fan design modeled owl-wings however laptops touchpad trackpoint hdmi dvi displayport built-in optical drive x200 series included tablet pc models designated usage suffix primarily x230t lenovo released x200 tablet 9 september 2008 like tablet-designated models added convertible screen assembly containing touch digitizer pen buttons screen front operating device without access keyboard buttons converted mode codenamed kodachi x300 released distinguished ultraportable laptops use led backlighting removable battery solid-state drive integrated dvd burner thinkpad x300 used small form factor intel gs965 chipset instead standard gm965 chipset along intel core 2 duo l7100 low-voltage cpu 12w thermal design power tdp successor thinkpad x301 uses intel centrino 2 mobile platform gs45 chipset ultra-low-voltage ulv cpu also integrates gps wwan webcam top lid thickest part laptop thinnest part x300 original internal codename razor then-popular motorola razr flip phone lenovo noticed three technologies converging would make possible build thin light fast thinkpad first solid-state storage would replace mechanical hard drives second light-emitting diode led backlighting flat-panel displays would improve battery life image quality third ultrathin optical drives 7mm thick compared 9.5mm 12.7mm used previous thinkpads razor concept eventually merged bento-fly project renamed kodachi price time review notebook review extremely high indicated range corporate users laptop magazine awarded x300 laptop score 4.5 stars among highest thinkpad x-series laptop laptop less inch thick making thinnest thinkpad available time x300 laptop offered quick boot ssd also offered built-in optical drive uncommon thin light notebooks however laptop include sd card reader expansion dock capability expresscard pc card slot x-series laptops released 2010 lenovo x100e x201 x201s x201 tablet thinkpad x100e released 2010 engadget calling laptop perfect solution netbook larger 13- 14-inch ulv ultraportable available two colors heatwave red traditional thinkpad matte black design compared edge series deviated traditional thinkpad design x100e however despite choice colors retained angular edges boxy build scream traditional thinkpad design specifications x100e laptop given modified re-branded low-cost version lenovo x100e named mini 10 issued year 9 students nsw australia start 2010 featured intel atom n450 1.66 ghz processor 160gb hdd 2gb ram 10 1024×600 screen fitted 11.6 frame 0.3mp webcam windows 7 enterprise main 12-inch line-up received internal hardware update new palmrest touchpad x201i model version regular x201 core i3 cpu x201 tablet released 2010 criticized engadget lack durability protruding battery thick body praised performance notebook review similar views x201 tablet terms performance battery life indicating display superior x201 x201s thinkpad x-series laptops released 2011 lenovo x120e x220 x220i x220 tablet x1 thinkpad x120e released march 2011 laptop best affordable business ultraportable ces 2011 laptop specifications given thinkpad x220 released april 2011 new thinner latchless case 16:9 screen laptop magazine received x220 positively praised battery life performance low weight display keyboard significantly improved temperature control however web camera receive favor—while images crisp clear colors reported muted engadget said all-too-familiar thinkpad deceive boring business looks arguably one best laptops 've ever tested notebook review opinion stating thinkpad x220 quite simply best 12-inch business notebook 've reviewed far laptop specifications given x220i uses motherboard chipset standard x220 less powerful intel core i3 processor compared i5 i7 options available x220 another cost-reducing measure x220i offered ips display option x220 tablet also released april 2011 offered specifications x220 laptop terms processor graphics ram battery life x220 tablet nine hours 6-cell battery 18 hours external battery pack 6-cell battery starting weight tablet 3.88 lbs addition lightweight x series weighing 1.36 kg 1.72 kg depending configuration thinnest thinkpad laptop date 16.5 front 21.5 mm rear screen led-backlit hd infinity panel wxga resolution base configuration uses intel sandy bridge 2.5 ghz core i5-2520m 3.20 ghz 4 gb ram 8 gb sata ssd hard drive intel integrated hd graphics usb 3.0 backlit keyboard 802.11 b/g/n wifi average eight hours battery life battery internal removable optical drive thinkpad x1 laptop released lenovo may 2011 notebook review offered positive opinion thinkpad x1 saying powerful notebook combines durability features business-class thinkpad style consumer laptop 13.3 x1 thinkpad announced available uk june 7 2011 specifications thinkpad x1 laptop given thinkpad x-series laptops released 2012 lenovo x1 carbon x131e x230 x230t tablet w l series models thinkpad t430 t430s t530 w530 l430 l530 also released special edition laptop provided australian year 9 students part digital education revolution der program 2012 hardware specifications thinkpad x230 announced replaced earlier x220 x230 uses chassis introduced new chiclet-style 6-row keyboard replacing classic 7-row keyboard style ivy bridge processor first time x-series—usb 3.0 new keyboard design became controversial topic thinkpad community along locked bios discouraged third-party components including batteries wlan cards ivy bridge processors brought performance improvements compared x220 integrated intel hd graphics 4000 capable delivering good gaming experience 4x classic rts games maximum amount installable memory 16gb two memory slots allowing dual-channel ram like x220 possible use msata ssd within second mini pci express slot instead wwan card specifications x230i i3-equipped version regular x230 x230s asian-market model akin x240 instead x230 gained many design ques later found x240 line equipped intel 3rd gen ulv cpus thinkpad x230 tablet announced replaced earlier x220 tablet thinkpad x230t compatible previous series 3 docking stations 4337 4338 compatible ultrabase series 3 slice base x230t touchscreen stylus support whereas x230 touchscreen early august 2012 lenovo released first generation thinkpad x1 carbon announced ref name= release x1 carbon x230 x230t t430 t430s t530 w530 l430 l530 series 3/usb 3.0 dock /ref x1 carbon weighs battery life roughly eight hours start-up time less 20 seconds x1 carbon first released china popularity thinkpads market first x1 carbon featured m.2 ssd instead 2.5 hard drive bay base model 4gb memory intel core i5-3317u processor 128gb ssd expensive model intel core i7 processor 256gb ssd x1 carbon requires dongle connect ethernet cable models include 3g cellular modem first-generation x1 carbon tn-panel lcd display resolution 169 aspect ratio x1 carbon weighs measures x1 carbon case made light carbon fiber matte black finish carbon also marketed thinnest 14 ultrabook review published cnet dan ackerman wrote first glance thinkpad x1 carbon looks lot like thinkpads hand stands light portable excellent keyboard shows ultrabooks rugged build quality reassuring slightly boosted battery maybe lower starting price could serious contender all-around favorite thin laptop peter bright wrote disparaging review ars technica found new x1 carbon adaptive keyboard near perfect unusable keyboard non-standard compared desktop older thinkpad t410s lenovo helix keyboards touch typist despaired removal function keys layout cited repositioning caps lock key replacing home/end positioning backspace delete keys november 2012 lenovo announced touch-screen variant called thinkpad x1 carbon touch designed use windows 8 display makes use multi-touch technology detect simultaneous inputs ten fingers performance x1 carbon touch ssd engadget states machine boots start screen 11 seconds pretty typical windows 8 machine specs like also found solid-state drive delivers equally strong read write speeds 551mb/s 518mb/s respectively noticed last time tested ultrabook intel ssd thinkpad x series laptops released 2013 lenovo x240 x140e thinkpad helix convertible tablet thinkpad x240 replaced earlier x230 x230s compared x230 x240 changed higher-power intel core cpus labelled mobile class lower-power cpus labelled ultrabook class depending cpu model change resulted 10 –20 reduction cpu performance compared older higher power ivy bridge generation cpus first x-series laptop forgo classic trackpoint buttons favor touchpad also pushed x240 reduced maximum physical memory 8gb one memory slot making dual-channel unavailable compared 16gb dual-channel two memory slots x230 lost dedicated insert key volume control keys x240 uses rectangular slim tip power plug x240s slimmed lighter asian-market-only version x240 docking port missing power bridge hot-swappable battery replaced two internal batteries rated 23.5wh extension removes option install larger 6-cell batteries place default 3-cell thinkpad helix released option corporate buyers looking power high-end ultrabook mobility tablet thinkpad helix featured tablet powered ivy bridge components docking keyboard wacom digitizer stylus x131e laptop designed education market comes three versions chrome os windows dos durable case fitted rubber bumpers thickened plastic case components improve durability display panel resolution anti-glare coating customized various colors school logos asset tagging x131e comes several processor versions intel celeron/core i3 amd e1/e2 models basically x130e including sim card slots cellular network access including wireless wan wwan cards x131e last thinkpad classic round power plug thinkpad x series laptops released 2015 lenovo third-generation x1 carbon x250 ces congress thinkpad x250 broadwell processor x250 saw return separate trackpoint buttons one ram slot touch screen available model x250 uses rectangular power plug thinkpad x series laptops released 2016 lenovo ces congress replaced earlier thinkpad x250 thinkpad x260 adopts skylake processors adds additional usb 3.0 port usb-c missing replaces vga port hdmi port addition existing mini displayport port lenovo claims x260 achieve battery life 21.5 hours full charge first generation x1 yoga released 2016 featuring touchscreen 360-degree hinge unlike many laptops x1 series features stylus dedicated slot like many others x1 series x1 yoga features built-in fingerprint sensor multiple usb ports hdmi port support intel i7 processors thinkpad x1 tablet modular device uses lenovo calls ultra connect system tie together removable modules extra battery pack pico projector 3d camera detachable keyboard etc x1 tablet powered intel core m7 processor paired 16gb memory solid state drives 1tb capacity x1 tablet 12-inch multi-touch screen resolution 32 aspect ratio thinkpad x270 announced december 2016 tn ips displays available hd fhd well fhd touch screen option lenovo claims x270 achieve 20 hours battery life full charge includes one usb-c port supporting usb 3.1 gen 1 speed 5gbit/s pd charging via usb-c hdmi two usb type-a 3.0 ports one always allowing users charge items plugged laptop asleep first x line feature charging docking usb-c thunderbolt unlike previous models series soldered ram non-removable battery built-in rj45 ethernet port although one available via extension cable users contended eliminates several central appeals x2* series effectively represents replication lenovo existing lines rather true continuation series update x280 case screen x390 amd processor
[ 3586, 5386, 9611, 271, 4886, 4259, 5681, 5939, 2383, 5073, 9057, 5606, 1000, 3304, 5481, 1005, 2165, 4217, 3323 ]
None
5,607
8
SimilarWeb:similarweb similarweb website provides web analytics services businesses company offers customers information clients competitors website traffic volumes referral sources including keyword analysis website stickiness e.g. time site page views bounce rate among features like alexa internet extrapolates data panel web users allow monitor internet activity combined direct observations subset internet properties websites traffic statistics 2019 claimed world largest panel hundreds millions users company founded 2007 offer tel-aviv israel 2009 similarweb first israeli seedcamp attracting attention international media investors company raised series round 1.1 million investment led yossi vardi docor international management similarsites browser extension help users find sites similar visiting launched later year september 24 2013 company closed 6 million series b round led david alliance moshe lichtman participation existing investor docor international management february 24 2014 south africa media giant naspers invested 18 million similarweb leading series c round within month similarweb used part capital acquisition israeli early-stage company tapdog million dollars shares cash less year tapdog founded november 2014 raised 15 million series investment july 2015 similarweb acquired personalized content discovery platform developer swayy december 10 2015 similarweb announced acquired quettra silicon valley-based mobile intelligence startup boost mobile operations quettra provided personalization tools developers return detailed mobile telemetry data july 2017 company announced 47 million round financing led viola growth saban ventures participation ce ventures existing investors
[ 235, 8735, 6576, 1943, 4605, 735 ]
Test
5,608
4
DMZ_(computing):dmz computing computer security dmz demilitarized zone sometimes referred perimeter network screened subnet physical logical subnetwork contains exposes organization external-facing services untrusted network usually larger network internet purpose dmz add additional layer security organization local area network lan external network node access exposed dmz rest organization network firewalled dmz functions small isolated network positioned internet private network design effective allows organization extra time detect address breaches would penetrate internal networks name term demilitarized zone area states military operations permitted dmz seen belonging either party bordering concept applies computing use metaphor dmz example acting gateway public internet neither secure internal network insecure public internet case hosts vulnerable attack provide services users outside local area network e-mail web domain name system dns servers increased potential hosts suffering attack placed specific subnetwork order protect rest network become compromised hosts dmz permitted limited connectivity specific hosts internal network content dmz secure internal network similarly communication hosts dmz external network also restricted make dmz secure internet suitable housing special purpose services allows hosts dmz communicate internal external network intervening firewall controls traffic dmz servers internal network clients another firewall would perform level control protect dmz external network dmz configuration provides additional security external attacks typically bearing internal attacks sniffing communication via packet analyzer spoofing e-mail spoofing also sometimes good practice configure separate classified militarized zone cmz highly monitored militarized zone comprising mostly web servers similar servers interface external world i.e internet dmz contain sensitive information accessing servers within lan like database servers architecture dmz usually application firewall ftp cmz hosts web servers database servers could cmz lan separate vlan altogether service provided users external network placed dmz common services web servers communicate internal database require access database server may publicly accessible may contain sensitive information web servers communicate database servers either directly application firewall security reasons e-mail messages particularly user database confidential typically stored servers accessed internet least insecure manner accessed email servers exposed internet mail server inside dmz passes incoming mail secured/internal mail servers also handles outgoing mail security compliance legal standards hipaa monitoring reasons business environment enterprises install proxy server within dmz following benefits reverse proxy server like proxy server intermediary used way around instead providing service internal users wanting access external network provides indirect access external network usually internet internal resources example back office application access email system could provided external users read emails outside company remote user would direct access email server reverse proxy server physically access internal email server extra layer security particularly recommended internal resources need accessed outside worth noting design still allows remote potentially malicious users talk internal resources help proxy since proxy functions relay non-trusted network internal resource may also forward malicious traffic e.g application level exploits towards internal network therefore proxy attack detection filtering capabilities crucial preventing external attackers exploiting vulnerabilities present internal resources exposed via proxy usually reverse proxy mechanism provided using application layer firewall focuses specific shape contents traffic rather controlling access specific tcp udp ports packet filter firewall would reverse proxy usually good substitute well thought dmz design rely continuous signature updates updated attack vectors many different ways design network dmz two basic methods single firewall also known three legged model dual firewalls architectures expanded create complex architectures depending network requirements single firewall least 3 network interfaces used create network architecture containing dmz external network formed isp firewall first network interface internal network formed second network interface dmz formed third network interface firewall becomes single point failure network must able handle traffic going dmz well internal network zones usually marked colors -for example purple lan green dmz red internet often another color used wireless zones secure approach according colton fralick use two firewalls create dmz first firewall also called front-end perimeter firewall must configured allow traffic destined dmz second firewall also called back-end internal firewall allows traffic dmz internal network setup considered secure since two devices would need compromised even protection two firewalls provided two different vendors makes less likely devices suffer security vulnerabilities example security hole found exist one vendor system less likely occur one one drawbacks architecture costly purchase manage practice using different firewalls different vendors sometimes described component defense depth security strategy home routers refer dmz host which—in many cases—is actually misnomer home router dmz host single address e.g. ip address internal network traffic sent otherwise forwarded lan hosts definition true dmz demilitarized zone since router alone separate host internal network dmz host able connect hosts internal network whereas hosts within real dmz prevented connecting internal network firewall separates unless firewall permits connection firewall may allow host internal network first requests connection host within dmz dmz host provides none security advantages subnet provides often used easy method forwarding ports another firewall nat device tactic establishing dmz host also used systems interact properly normal firewalling rules nat forwarding rule formulated ahead time varying tcp udp port numbers example opposed fixed number fixed range also used network protocols router programming handle 6in4 gre tunnels prototypical examples
[ 6541, 3473, 10518, 4504, 10232, 8998, 9766, 7089, 1208, 9276, 11198, 10433, 4163, 836, 7364, 2118, 2375, 2887, 4806, 2558, 6232, 3930, 9440, 225, 11502, 10226, 245, 4725, 119, 6262, 5246 ]
None
5,609
2
CEN/XFS:cen/xfs cen/xfs xfs extensions financial services provides client-server architecture financial applications microsoft windows platform especially peripheral devices eftpos terminals atms unique financial industry international standard promoted european committee standardization known acronym cen hence cen/xfs standard based wosa extensions financial services wosa/xfs developed microsoft move standardized software base financial institutions increasingly interested ability pick choose application programs drive equipment xfs provides common api accessing manipulating various financial services devices regardless manufacturer chronology wosa/xfs changed name simply xfs standard adopted international cen/isss standards body however commonly called cen/xfs industry participants perceived benefit xfs similar java write run anywhere mantra often different hardware vendors different interpretations xfs standard result differences interpretation means applications typically use middleware even differences various platforms implementation xfs notable xfs middleware platforms include xfs test tools allow testing xfs applications middleware simulated hardware tools include sophisticated automatic regression testing capabilities providers xfs test tools include j/xfs alternative api cen/xfs windows specific also xpeak operating system independent based xml messages j/xfs written java objective provide platform agnostic client-server architecture financial applications especially peripheral devices used financial industry eftpos terminals atms move standardized software base financial institutions increasingly interested ability pick choose application programs drive equipment j/xfs provides common object oriented api pure java application wide range financial devices providing layer separation application device logic implemented using native j/xfs api wrapping existing implementation javapos cen/xfs j/xfs developed companies de la rue ibm ncr wincor nixdorf sun microsystems hosted monitored maintained european committee standardisation cen
[ 9888, 9665, 5677, 6797, 8122, 3323 ]
Test
5,610
3
Yie_Ar_Kung-Fu_II:yie ar kung-fu ii lee young young martial arts master son brave warrior rid china chop suey gang however one member survived declared emperor yie-gah like father lee young rid china yie-gah allies lee young goes three sections level face boss along way meets ninjas power-ups lee acquire oolong tea replenish health lo mein temporary invincibility lee carry three oolong teas time game also features two-player mode player 1 controls lee player 2 choice play either yen pei lan fang po chin making lan fang first ever playable female character fighting game predating chun li street fighter ii five years
[ 8034, 9006 ]
Test
5,611
9
Scott_Fahlman:scott fahlman scott elliott fahlman born march 21 1948 computer scientist professor emeritus carnegie mellon university notable early work automated planning blocks world semantic networks neural networks particular cascade correlation algorithm dylan programming language common lisp particular cmu common lisp one founders lucid inc. period standardized recognized leader common lisp recently fahlman engaged constructing knowledge base scone based part thesis work netl semantic network fahlman born medina ohio son lorna may dean john emil fahlman received bachelor degree master degree 1973 mit ph.d. mit 1977 master thesis advisor patrick winston doctoral thesis advisor gerald sussman noted doctoral diploma says degree awarded original research demonstrated thesis field artificial intelligence suggested may first use term fellow american association artificial intelligence fahlman acted thesis advisor donald cohen david b. mcdonald david s. touretzky skef wholey justin boyan michael witbrock alicia tribble sagae may 1996 july 2001 fahlman directed justsystem pittsburgh research center fahlman credited originating first smiley emoticon thought would help people message board carnegie mellon distinguish serious posts jokes proposed use purpose symbols caught original message symbols originated posted september 19 1982 message recovered jeff baird september 10 2002 quoted though credited originating smiley emoticons first emoticon user similar marker appeared article reader digest may 1967 interview printed new york times 1969 vladimir nabokov noted often think exist special typographical sign smile — sort concave mark supine round bracket
[ 4992, 10752, 11269, 3334, 5751, 6919, 7048, 7562, 269, 2062, 9231, 3728, 1301, 9749, 9877, 8728, 4633, 6556, 3869, 10012, 2335, 6047, 8226, 4516, 5031, 9128, 5803, 2225, 10547, 11255, 311, 2105, 6969, 7867, 6717, 4799, 5569, 6594, 8771, 2...
Test
5,612
3
Cross-platform_software:cross-platform software computing cross-platform software also multi-platform software platform-independent software computer software implemented multiple computing platforms cross-platform software may divided two types one requires individual building compilation platform supports one directly run platform without special preparation e.g. software written interpreted language pre-compiled portable bytecode interpreters run-time packages common standard components platforms example cross-platform application may run microsoft windows linux macos cross-platform programs may run many existing platforms two platforms cross-platform frameworks qt flutter nativescript xamarin phonegap ionic react native exist aid cross-platform development platform refer type processor cpu hardware given operating system application runs type operating system computer combination type hardware type operating system running example common platform microsoft windows running x86 architecture well-known desktop computer platforms include linux/unix macos cross-platform however many devices smartphones also effectively computer platforms less commonly thought way application software written depend features particular platform—either hardware operating system virtual machine runs java platform virtual machine platform runs many operating systems hardware types common platform software written hardware platform refer instruction set architecture example x86 architecture variants ia-32 x86-64 machines often run one version microsoft windows though run operating systems well including linux openbsd netbsd macos freebsd 32-bit arm architectures newer 64-bit version common smartphones tablet computers run android ios mobile operating systems software platforms either operating system programming environment though commonly combination notable exception java uses operating system independent virtual machine compiled code known world java bytecode examples software platforms previously noted java platform exception general rule operating system software platform java language typically compiles virtual machine virtual cpu runs code written language enables executable binary run systems implement java virtual machine jvm java programs executed natively using java processor n't common mostly used embedded systems java code running jvm access os-related services like disk i/o network access appropriate privileges granted jvm makes system calls behalf java application setup allows users decide appropriate protection level depending acl example disk network access usually enabled desktop applications browser-based applets jni also used enable access operating system specific functions currently java standard edition programs run microsoft windows macos several unix-like operating systems several non-unix-like operating systems like embedded systems mobile applications browser plugins used windows mac based devices android built-in support java also subsets java java card java platform micro edition designed resource-constrained devices piece software considered cross-platform must able function one computer architecture operating system developing program time-consuming task different operating systems different application programming interfaces api example linux uses different api application software windows software written particular operating system automatically work architectures operating system supports one example august 2006 openoffice.org natively run amd64 intel 64 lines processors implementing x86-64 standards computers since changed openoffice.org suite software “ mostly ” ported 64-bit systems also means program written popular programming language c c++ mean run operating systems support programming language—or even operating system different architecture web applications typically described cross-platform ideally accessible various web browsers within different operating systems applications generally employ client–server system architecture vary widely complexity functionality wide variability significantly complicates goal cross-platform capability routinely odds goal advanced functionality basic web applications perform processing stateless server pass result client web browser user interaction application consists simple exchanges data requests server responses types applications norm early phases world wide web application development applications follow simple transaction model identical serving static web pages today still relatively common especially cross-platform compatibility simplicity deemed critical advanced functionalities prominent examples advanced web applications include web interface gmail a9.com google maps website live search service bing microsoft advanced applications routinely depend additional features found recent versions popular web browsers dependencies include ajax javascript dynamic html svg components rich internet applications older versions popular web browsers tend lack support certain features competing interests cross-platform compatibility advanced functionality numerous alternative web application design strategies emerged strategies include graceful degradation attempts provide similar functionality users platforms diminishing functionality least common denominator limited client browsers example user attempting use limited-feature browser access gmail may notice gmail switches basic mode reduced functionality differs cross-platform techniques attempt provide equivalent functionality adequate functionality across platforms multiple codebase applications maintain distinct codebases different hardware os platforms equivalent functionality obviously requires duplication effort maintaining code worthwhile amount platform-specific code high strategy relies one codebase may compiled multiple platform-specific formats one technique conditional compilation technique code common platforms repeated blocks code relevant certain platforms made conditional interpreted compiled needed another technique separation functionality disables functionality supported client browsers operating systems still delivering complete application user see also separation concerns technique used web development interpreted code scripting languages query platform running execute different blocks conditionally third-party libraries attempt simplify cross-platform capability hiding complexities client differentiation behind single unified api responsive web design rwd web design approach aimed crafting visual layout sites provide optimal viewing experience—easy reading navigation minimum resizing panning scrolling—across wide range devices mobile phones desktop computer monitors little platform-specific code used technique one complicated aspect cross-platform web application design need software testing addition complications mentioned previously additional restriction web browsers prohibit installation different versions browser operating system although several development approaches companies use target multiple platforms result software requires substantial manual effort testing maintenance across supported platforms techniques full virtualization sometimes used workaround problem using tools page object model cross platform tests scripted way one test case usable multiple versions app long different versions similar user interfaces versions tested one time one test case web applications becoming increasingly popular many computer users still use traditional application software rely client/web-server architecture distinction traditional web applications always clear features installation methods architectures web traditional applications overlap blur distinction nevertheless simplifying distinction common useful generalization traditionally modern computing application software distributed end-users binary file especially executable files executables support operating system computer architecture built for—which means making single cross-platform executable would something massive task generally replaced offering selection executables platforms supported software distributed binary executable software written c c++ programmer must build software different operating system computer architecture i.e must use toolset translates—transcompiles—a single codebase multiple binary executables example firefox open-source web browser available windows macos powerpc x86 apple inc. calls universal binary linux *bsd multiple computer architectures four platforms case windows macos linux *bsd separate executable distributions although come source code use different toolsets perform different builds may sufficient achieve variety working executables different platforms case software engineer must port i.e amend code suitable new computer architecture operating system example program firefox already runs windows x86 family modified re-built run linux x86 potentially architectures well multiple versions code may stored separate codebases merged one codebase conditional compilation see note porting must accompanied cross-platform building reverse case alternative porting cross-platform virtualization allows applications compiled one cpu operating system run system different cpu and/or operating system without modification source code binaries example apple rosetta built intel-based macintosh computers runs applications compiled previous generation macs used powerpc cpus another example ibm powervm lx86 allows linux/x86 applications run unmodified linux/power operating system script considered cross-platform interpreter available multiple platforms script uses facilities provided language script written python unix-like system likely run little modification windows python also runs windows also one implementation python run scripts e.g. ironpython .net framework goes many open-source programming languages available scripting languages unlike binary executable files script used computers software interpret script script generally stored plain text text file may issues however type new line character sits lines generally however little work done make script written one system run another quite popular cross-platform scripting interpreted languages cross-platform multi-platform term also apply video games released range video game consoles specialized computers dedicated task playing games examples cross-platform video games include miner 2049er fifa video game series nhl series minecraft released across variety gaming platforms wii playstation 3 xbox 360 personal computers pcs mobile devices characteristics particular system may lengthen time taken implement video game across multiple platforms video game may initially released platforms later released remaining platforms typically situation occurs new gaming system released video game developers need acquaint hardware software associated new console games may become cross-platform licensing agreements developers video game console manufacturers limit development game one particular console example disney could create game intention release latest nintendo sony game consoles disney license game sony first disney may exchange required release game solely sony ’ console short time indefinitely—effectively prohibiting cross-platform release duration several developers implemented means play games online using different platforms psyonix epic games microsoft valve corporation possess technology allows xbox 360 playstation 3 gamers play pc gamers leaving decision platform use consumers first game allow level interactivity pc console games quake 3 games feature cross-platform online play include rocket league street fighter v killer instinct paragon fable fortune minecraft better together update windows 10 vr editions pocket edition xbox one cross-platform programming practice actively writing software work one platform different ways approaching problem writing cross-platform application program one approach simply create multiple versions program different source trees —in words microsoft windows version program might one set source code files macintosh version might another foss *nix system might another straightforward approach problem potential considerably expensive development cost development time especially corporate entities idea behind create two different programs ability behave similarly also possible means developing cross-platform application result problems bug tracking fixing two different source trees would different programmers thus different defects version another approach used depend pre-existing software hides differences platforms—called abstraction platform—such program unaware platform running could said programs platform agnostic programs run java virtual machine jvm built fashion applications mix various methods cross-platform programming create final application example firefox web browser uses abstraction build lower-level components separate source subtrees implementing platform-specific features like gui implementation one scripting language help facilitate ease portability firefox implements xul css javascript extending browser addition classic netscape-style browser plugins much browser written xul css javascript well number tools available help facilitate process cross-platform programming certain issues associated cross-platform development include
[ 8195, 6148, 2058, 10250, 2060, 2062, 2063, 16, 6161, 8213, 10262, 8217, 8225, 8226, 44, 4140, 4147, 2105, 2106, 2108, 8254, 10304, 8258, 4166, 8262, 4171, 4174, 6231, 4186, 100, 2149, 102, 8295, 8297, 10347, 8303, 8304, 10352, 2163, 2164,...
Test
5,613
2
Paranoid_Android_(software):paranoid android software paranoid android open-source operating system smartphones tablet computers based android mobile platform september 2015 pc advisor called famous rom along cyanogenmod economic times called second-largest custom android rom world 200 000 users paranoid android founded paul henschel february 2015 oneplus hired handful key members paranoid android team work new oxygenos caused delays release paranoid android 5.1 builds october 2015 team member matt flaming told android authority project would go hold june 2016 paranoid android team announced back new team members coincided release new version paranoid android based android 6.0.1 marshmallow may security patch includes new customization features june 8 2016 paranoid android supported nexus 6p nexus 5x nexus 6 nexus 5 nexus 4 nexus 7 2013 nexus 9 oneplus one oneplus 2 oneplus x may 31 2017 team announced released nougat flavour paranoid android version based android 7.1.2 nougat notable feature return pie controls supported devices include oneplus 3 3t nexus 5x nexus 6p pixel pixel xl may 12th 2018 paranoid android google+ account posted update status project developers run funds causing website gerrit shut ceasing work oreo builds team stated close release n't able continue without funds looked community donations august 27th 2018 google+ page updated new post titled transparent team apologized lack communication shared info current activities team decided finish device trees release sources discontinuing oreo mr1 basic builds released oneplus 3 3t 5 5t well sony xperia x x compact xz premium xz1 xz2 next goal android pie post saying builds almost stable though time post two commits pie branch released team gerrit also released concept art upcoming feature named blink navigation based gestures pie navigation well rundown new versioning system according economic times two notable features paranoid android halo pie halo included version 5.0 greater floating bubble lets users see notifications without leaving current screen pie replacement onscreen navigation buttons stays screen lets users swipe edge see buttons paranoid android also features substratum theme support alongside color engine accidental touch rejection pocket lock prevents buttons pressed user pocket ability take screenshot swiping three fingers following list devices supported paranoid android interview alex naidis aospa future paranoid android developer advice
[ 4995, 5892, 7428, 1670, 9610, 5262, 8719, 10129, 5522, 1427, 7700, 5397, 10645, 280, 10009, 10393, 7835, 9244, 10525, 798, 11294, 288, 673, 2978, 2852, 8486, 1191, 1959, 937, 1578, 5546, 7595, 5677, 8870, 7983, 10537, 3380, 5431, 1083, 28...
None
5,614
7
RM-ODP:rm-odp reference model open distributed processing rm-odp reference model computer science provides co-ordinating framework standardization open distributed processing odp supports distribution interworking platform technology independence portability together enterprise architecture framework specification odp systems rm-odp also named itu-t rec x.901-x.904 iso/iec 10746 joint effort international organization standardization iso international electrotechnical commission iec telecommunication standardization sector itu-t rm-odp reference model based precise concepts derived current distributed processing developments far possible use formal description techniques specification architecture many rm-odp concepts possibly different names around long time rigorously described explained exact philosophy example works mario bunge systems thinking example works friedrich hayek concepts—such abstraction composition emergence—have recently provided solid mathematical foundation category theory rm-odp four fundamental elements rm-odp family recommendations international standards defines system interrelated essential concepts necessary specify open distributed processing systems provides well-developed enterprise architecture framework structuring specifications large-scale systems including software systems much preparatory work led adoption rm-odp iso standard carried advanced networked systems architecture ansa project ran 1984 1998 leadership andrew herbert md microsoft research cambridge involved number major computing telecommunication companies parts 2 3 rm-odp eventually adopted iso standards 1996 parts 1 4 adopted 1998 rm-odp consists four basic itu-t recommendations iso/iec international standards complex system specifications extensive single individual fully comprehend aspects specifications furthermore different interests given system different reasons examining system specifications business executive ask different questions system make-up would system implementer concept rm-odp viewpoints framework therefore provide separate viewpoints specification given complex system viewpoints satisfy audience interest particular set aspects system associated viewpoint viewpoint language optimizes vocabulary presentation audience viewpoint viewpoint modeling become effective approach dealing inherent complexity large distributed systems current software architectural practices described ieee 1471 divide design activity several areas concerns one focusing specific aspect system examples include 4+1 view model zachman framework togaf dodaf course rm-odp viewpoint subdivision specification complete system established bring together particular pieces information relevant particular area concern analysis design system although separately specified viewpoints completely independent key items identified related items viewpoints moreover viewpoint substantially uses foundational concepts defined part 2 rm-odp however viewpoints sufficiently independent simplify reasoning complete specification mutual consistency among viewpoints ensured architecture defined rm-odp use common object model provides glue binds together specifically rm-odp framework provides five generic complementary viewpoints system environment currently growing interest use uml system modelling however widely agreed approach structuring specifications adds cost adopting use uml system specification hampers communication system developers makes difficult relate merge system specifications need integrate systems although odp reference model provides abstract languages relevant concepts prescribe particular notations used individual viewpoints viewpoint languages defined reference model abstract languages sense define concepts used represented lack precise notations expressing different models involved multi-viewpoint specification system common feature enterprise architectural approaches including zachman framework 4+1 model rm-odp approaches consciously defined notation- representation-neutral manner increase use flexibility however makes difficult among things development industrial tools modeling viewpoint specifications formal analysis specifications produced possible derivation implementations system specifications order address issues iso/iec itu-t started joint project 2004 itu-t rec x.906|iso/iec 19793 information technology open distributed processing use uml odp system specifications document usually referred uml4odp defines use unified modeling language 2 uml 2 iso/iec 19505 expressing specifications open distributed systems terms viewpoint specifications defined rm-odp defines set uml profiles one viewpoint language one express correspondences viewpoints approach structuring according rm-odp principles purpose uml4odp allow odp modelers use uml notation expressing odp specifications standard graphical way allow uml modelers use rm-odp concepts mechanisms structure large uml system specifications according mature standard proposal allow uml tools used process viewpoint specifications thus facilitating software design process enterprise architecture specification large software systems addition itu-t rec x.906 iso/iec 19793 enables seamless integration rm-odp enterprise architecture framework model-driven architecture mda initiative omg service-oriented architecture soa addition several projects used currently use rm-odp effectively structuring systems specifications 239-item reference list covering rm-odp standards well related research applications case studies included
[ 10752, 2948, 4107, 8854, 11036, 5149, 2206, 9245, 5413, 10413, 11056, 8627, 3126, 1079, 5816, 6977, 8904, 1610, 9290, 8524, 8401, 2519, 2904, 4058, 4064, 8421, 8426, 3693, 1010, 3447, 10238 ]
Test
5,615
9
Normalized_loop:normalized loop computer science normalized loop sometimes called well-behaved loop loop loop variable starts 0 constant gets incremented one every iteration exit condition met normalized loops important compiler theory loop dependence analysis simplify data dependence analysis well behaved loop normally form increment unitary constant easy see b bigger max loop never access memory outside allocated range non-normalized loop may begin different indexes increment not-unitary amounts exit conditions complicated define loops hard optimize vectorize even traverse especially functions executed part loop conditions simple example n't start beginning increments one complicated example additional exit condition loops also non-predictable behavior compilation time exit condition depends contents data modified even dynamic calculations means function calls reverse loops also simple easily normalized non-normalized n't dynamic behaviour normally easy transform normalized one instance first example example 1 easily converted third example partially normalized allow parallelization still lack ability know loop span many iterations making harder vectorize using multi-media hardware starting 7 much problem long increment regular preferably one multiple statements inside loop use index private temporary variables may created cope different iteration paces reverse loop example 5 also easy normalize note access still backwards case makes sense leave backwards data dependence dependences exist caution must taken revert access well could disrupt order assignments example 4 makes impossible predict anything loop unless functions trivial constant way know loop start stop much 'll increment iteration loops hard parallelize also perform horribly iteration loop evaluate two functions max increment even functions inlined condition becomes complex worth optimizing programmer take extra care create loops unless strictly necessary ever another danger loops appear evaluation depends data modified instance normal error using iterators remove items list modifying relying sizes exit condition true
[]
Test
5,616
3
PowerBook_190:powerbook 190 powerbook 190 companion powerbook 190cs laptop computers manufactured apple computer part powerbook brand introduced market august 1995 two models differ screen 190 9.5 greyscale display 190cs featured 10.4 color display apple target sales audience model college student need no-frills portable computer terms hardware along powerbook 150 190 much common apple professional laptop period powerbook 5300 series exchange cheaper price point approximately us 2200 compared us 6000 cutting-edge powerbook 5300ce 190 equipped passive matrix lcd rather crisper active matrix screen significantly 5300s ran powerpc 603e processors 100 117 mhz 190 motorola 68lc040 clocked 33 mhz fact 190s last macintoshes use 68k cpu however apple offered ppc upgrade 190 heavily marketed selling point new 68040 macs time addition rather cramped 500 mb ide hard drive standard factory models shipped system 7.5.2 one 100 series powerbooks use original 140 case design thus one include 68040 processor trackpad rather standard trackball along 150 ones provide 14mb ram expansion larger less-expensive ide drives 190 de facto replacement powerbook 500 series completely discontinued introduction 5300 68040-based powerbook apple offered sales figures 190 unavailable event benefit reports exploding battery syndrome similar 5300 factory-default lithium-ion battery could short-circuit burst flames apple quickly offered recall batteries powerbook 190 series used nickel metal hydride battery exhibit problem production 190 halted june 1996 190cs sold october year replaced powerbook 1400cs discontinuation 190 apple abandoned market strategy two strata laptops instead offering low- high-end configurations model number concept would return apple product lineup 1999 introduction consumer-oriented ibook
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 576, 1090, 4180, 10838, 10840, 9312, 8806, 6258, 10357, 4220, 10365, 10878, 6783, 4741, 7305, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 7869, 8893, 8896, ...
None
5,617
3
Ricoh_5A22:ricoh 5a22 ricoh 5a22 microprocessor produced ricoh super nintendo entertainment system snes video game console 5a22 based 8/16-bit cmd/gte 65c816 version wdc 65c816 used apple ii personal computer 8-bit data bus 16-bit accumulator 24-bit address bus based mos technology 6502 family processors addition 65c816 cpu core 5a22 contains support hardware including cpu whole employs variable-speed system bus bus access times determined memory location accessed bus runs 3.58 mhz non-access cycles accessing bus b internal registers either 2.68 3.58 mhz accessing bus runs 1.79 mhz accessing controller port serial-access registers works approximately 1.5 mips theoretical peak performance 1.79 million 16-bit operations per second
[ 7170, 11395, 1029, 9477, 4751, 10767, 659, 664, 10784, 4385, 6949, 7589, 4136, 11054, 3010, 6981, 2635, 5457, 10833, 3157, 6485, 4569, 10969, 6878, 5862, 10351, 1776, 7281, 7282, 4211, 7284, 5237, 1660 ]
Test
5,618
2
Remastersys:remastersys remastersys free open-source program debian ubuntu-based linux mint derivative software systems april 28 2013 originator direct development ceased. br project development ceased originator fragadelic group developers members copper linux user group arizona began respin development project fork transition new supporters original code received originator team members discussed fork fork released working version late july 2015 early october 2015 debian principal developer reverted maintaining remastersys kept linux respin open project future features development ubuntu developer/maintainer sergio mejia debian developer/maintainer marcia wilbur keep respin available github launchpad respectively initially created able easily back create distributable copy ubuntu derivative installation inspiration tool came mklivecd script mandriva uses remasterme script pclinuxos since scripts easy port ubuntu written scratch remastersys intended serve easy way create customized live cd/dvd version ubuntu resulting iso also installed usb pendrive creating live usb distro using either command-line approach graphical tool unetbootin future enhancements discussion include possible rescue software incorporated remastersys command line version gui version
[ 10084, 6634, 7914, 9902, 7983, 985, 6012, 4637, 1150 ]
Test
5,619
2
Macintosh_operating_systems:macintosh operating systems family macintosh operating systems developed apple inc. includes graphical user interface-based operating systems designed use macintosh series personal computers since 1984 well related system software created compatible third-party systems 1984 apple debuted operating system known classic mac os release original macintosh system software system rebranded mac os 1996 preinstalled every macintosh 2002 offered macintosh clones short time 1990s noted ease use also criticized lack modern technologies compared competitors current mac operating system macos originally named mac os x 2012 os x 2016 developed 1997 2001 apple purchase next mac os x brought entirely new architecture based nextstep unix system eliminated many technical challenges classic mac os faced current macos preinstalled every mac updated annually basis apple current system software devices – ios watchos tvos audioos prior introduction mac os x apple experimented several concepts releasing different products designed bring macintosh interface applications unix-like systems vice versa a/ux mae mklinux apple effort expand upon develop replacement classic mac os 1990s led cancelled projects code named star trek taligent copland although different architectures macintosh operating systems share common set gui principles including menu bar across top screen finder shell featuring desktop metaphor represents files applications using icons relates concepts like directories file deletion real-world objects like folders trash overlapping windows multitasking classic mac os original macintosh operating system introduced 1984 alongside first macintosh remained primary use macs 2001 apple released original macintosh january 24 1984 early system software partially based lisa os xerox parc alto computer former apple ceo steve jobs previewed originally named system software simply system apple rebranded mac os 1996 due part macintosh clone program ended year later classic mac os characterized monolithic design initial versions system software run one application time system 5 introduced cooperative multitasking system 7 supports 32-bit memory addressing virtual memory allowing larger programs later updates system 7 enable transition powerpc architecture system considered user-friendly architectural limitations critiqued limited memory management lack protected memory access controls susceptibility conflicts among extensions nine major versions classic mac os released name classic signifies system whole reference compatibility layer helped ease transition mac os x. macos originally named mac os x 2012 os x 2016 current mac operating system officially succeeded classic mac os 2001 although system originally marketed simply version 10 mac os history largely independent classic mac os unix-based operating system built nextstep technology developed next late 1980s early 1997 apple purchased company ceo steve jobs returned apple precursors original release mac os x include openstep apple rhapsody project mac os x public beta macos makes use bsd codebase xnu kernel core set components based upon apple open source darwin operating system macos basis apple operating systems including iphone os/ios watchos tvos audioos first desktop version system released march 24 2001 supporting aqua user interface since several versions adding newer features technologies released since 2011 new releases offered annual basis early server computing version system released 1999 technology preview followed several official server-based releases server functionality instead offered add-on desktop system since 2011 apple real-time operating system environment a/rose small embedded operating system ran macintosh coprocessor platform expansion card macintosh idea offer single overdesigned hardware platform third-party vendors could build practically product reducing otherwise heavy workload developing nubus-based expansion card first version system ready use february 1988 1988 apple released first unix-based os a/ux unix operating system mac os look feel competitive time due part crowded unix market macintosh hardware lacking high-end design features present workstation-class computers a/ux success sales u.s. government posix compliance requirement mac os could meet macintosh application environment mae software package introduced apple 1994 allowed users certain unix-based computer workstations run apple macintosh application software mae used x window system emulate macintosh finder-style graphical user interface last version mae 3.0 compatible system 7.5.3 mae available sun microsystems sparcstation hewlett-packard systems discontinued may 14 1998 announced 1996 worldwide developers conference wwdc mklinux open source operating system started osf research institute apple february 1996 port linux powerpc platform thus macintosh computers mid 1998 community-led mklinux developers association took development operating system mklinux short microkernel linux refers project adaptation linux kernel run server hosted atop mach microkernel mklinux based version 3.0 mach star trek boldly go mac gone relatively unknown secret prototype beginning 1992 whose goal create version classic mac os would run intel-compatible x86 personal computers partnership apple support intel project instigated novell looking integrate dr-dos mac os gui mutual response monopoly microsoft windows 3.0 ms-dos team consisting four apple four novell able get macintosh finder basic applications quicktime running smoothly x86 architecture project canceled year later early 1993 code later reused porting mac os powerpc taligent portmanteau talent intelligent name object-oriented operating system company dedicated producing started project within apple provide replacement classic mac os later spun joint venture ibm part aim alliance purpose building competing platform microsoft cairo nextstep development process never worked taligent often cited example project death march apple pulled project 1995 code delivered copland project apple create updated version classic mac os introduced protected memory preemptive multitasking number new underlying operating system features yet still compatible existing mac software originally planned follow-up release known gershwin would add multithreading advanced features new features added rapidly could completed completion date slipped future sign release 1996 apple decided cancel project outright find suitable third-party system replace copland development ended august 1996 december 1996 apple announced buying next nextstep operating system arrival macintosh 1984 apple history operating systems began apple ii series computers 1977 ran apple dos prodos later gs/os apple iii 1980 ran apple sos apple lisa 1983 ran lisa os later macworks xl macintosh emulator apple also developed newton os newton personal digital assistant 1993 1997 recent years apple also launched several new operating systems based core macos including ios 2007 iphone ipad ipod touch mobile devices watchos 2015 apple watch tvos 2015 apple tv set-top box audioos homepod smart speakers
[ 6155, 4111, 4114, 25, 6180, 6186, 6221, 4184, 2141, 10333, 97, 2149, 8298, 8303, 8304, 2168, 6264, 2179, 10382, 6296, 2201, 4251, 2207, 10406, 171, 178, 2232, 6329, 8388, 2248, 213, 8410, 4318, 231, 6377, 2282, 10478, 2288, 242, 8441, 1...
Test
5,620
2
Open_Automotive_Alliance:open automotive alliance open automotive alliance oaa alliance automotive manufacturers technology companies aimed using android automobiles announced ces january 6 2014 members open automotive alliance
[ 3082, 8719, 5139, 7700, 9244, 10780, 11294, 10785, 3618, 6180, 1578, 5677, 8242, 9266, 1083, 10817, 6212, 69, 6213, 8262, 6216, 8268, 4685, 3664, 8280, 8285, 2658, 5222, 10856, 4734, 11391, 7812, 1670, 8326, 4238, 5262, 10382, 2195, 2711, ...
None
5,621
4
SaferNet:safernet safernet brazilian non-governmental organization combats internet crime partnership federal public ministry facilitates anonymous reporting provides information training internet safety security safernet facilitates anonymous reporting crimes extra consideration preventing investigating child pornography identity theft various hate crimes also works government improve legislation internet-related crimes safernet also educates trains mobilizes public issues relating rights safety 2006 safernet federal public ministry brought suit google brazilian business unit alleging google policing orkut pages enough prevent pornography hate crimes complying judge ruling google provided requested user information brazilian authorities
[ 4163, 7044, 4453, 8202, 1899, 4945, 7327 ]
Test
5,622
9
Bookmarklet:bookmarklet bookmarklet bookmark stored web browser contains javascript commands add new features browser bookmarklets unobtrusive javascripts stored url bookmark web browser hyperlink web page bookmarklets usually javascript programs regardless whether bookmarklet utilities stored bookmarks hyperlinks add one-click functions browser web page clicked bookmarklet performs one wide variety operations running search query extracting data table example clicking bookmarklet selecting text webpage could run internet search selected text display search engine results page another name bookmarklet favelet favlet derived favorite steve kangas bookmarklets.com coined word bookmarklet started create short scripts based suggestion netscape javascript guide tantek çelik called scripts favelets used word early 6 september 2001 personal email brendan eich developed javascript netscape gave account origin bookmarklets increased implementation content security policy csp websites caused problems bookmarklet execution usage 2013-2015 suggesting hails end death bookmarklets william donnelly created work-around solution problem specific instance loading referencing using javascript library code early 2015 using greasemonkey userscript firefox pale moon browser add-on extension simple bookmarklet-userscript communication protocol allows library-based bookmarklets executed websites including using csp https // uri scheme note however if/when browsers support disabling/disallowing inline script execution using csp if/when websites begin implement feature break fix web browsers use uris codice_1 attribute tag bookmarks uri scheme codice_2 codice_3 codice_4 specifies protocol format rest string browsers also implement prefix codice_5 parser like uri internally browser sees specified protocol javascript treats rest string javascript application executed uses resulting string new page executing script access current page may inspect change script returns undefined type rather example string browser load new page result script simply runs current page content permits changes in-place font size color changes without page reload anonymous function return value define function etc. used force script return undefined type javascript function however script includes function definition/redefinition function use_this_globally ... environment populated reason arbitrary script suffixed void ... javascript arbitrary script void 0 bookmarklets saved used normal bookmarks simple one-click tools add functionality browser example installation bookmarklet performed creating new bookmark pasting code url destination field alternatively bookmarklet presented link browsers dragged dropped onto bookmark bar bookmarklet run loading bookmark normally microsoft edge possible add bookmarklet favourites instead right-click link choose 'add reading list bookmarklet run clicking reading list microsoft edge reading list favourites opened using icon pile lines example bookmarklet performs wikipedia search highlighted text web browser window normal use following javascript code would installed bookmark browser bookmarks toolbar selecting text clicking bookmarklet performs search javascript function function se se document i=0 frames.length i++ se frames .document || s== prompt 'enter 20search 20terms 20for 20wikipedia open 'https //en.wikipedia.org '/w/index.php title=special search search= encodeuricomponent .focus bookmarklets modify location e.g save web page wayback machine javascript location.href='https //web.archive.org/save/'+document.location.href open new web browser window tab e.g show source web resource web browser supports view-source uri scheme javascript void window.open 'view-source '+location show info related current url e.g. javascript alert '\tdocument.url\n'+document.url+'\n\tdocument.lastmodified\n'+document.lastmodified+'\n\tlocation\n'+location among things
[ 1664, 2945, 6528, 3971, 6657, 7044, 3462, 6791, 7943, 8584, 6028, 8588, 2579, 7572, 7708, 7965, 10910, 8351, 5026, 803, 1834, 9770, 7340, 559, 9728, 9908, 4661, 3639, 11449, 1723, 4797, 64, 10057, 11466, 5707, 7885, 4048, 5968, 10834, 431...
Validation
5,623
9
Hope_(programming_language):hope programming language hope small functional programming language developed 1970s university edinburgh predates miranda haskell contemporaneous ml also developed university hope derived npl simple functional language developed rod burstall john darlington work program transformation npl hope notable first languages call-by-pattern evaluation algebraic data types hope named sir thomas hope c. 1681–1771 scottish agricultural reformer hope park square edinburgh location department artificial intelligence time development hope also named factorial program hope changing order clauses change meaning program hope pattern matching always favors specific patterns less specific ones explicit type declarations hope required option use type-inference algorithm hope hope provides two built-in data structures tuples lists first implementation hope strict since one lazy versions strict versions lazy constructors british telecom embarked project imperial college implement strict version first release coded thanos vassilakis 1986 releases coded mark tasng british telecom roger bailey hope tutorial august 1985 issue byte references interpreter ibm pc dos 2.0
[ 11258, 6148, 3876, 8262, 6536, 1333, 7386 ]
None
5,624
4
Identity_driven_networking:identity driven networking identity driven networking idn process applying network controls network device access based identity individual group individuals responsible operating device individuals identified network tuned respond presence context osi model provides method deliver network traffic system application requested listening data applications operate either system based user-daemon process may user application web browser internet security built around idea ability request respond requests subjected degree authentication validation authorization policy enforcement identity driven networking endeavors resolve user system based policy single management paradigm since internet comprises vast range devices applications also many boundaries therefore ideas resolve connectivity users within boundaries endeavor overlay system identity framework must first decide identity determine use existing controls decide intended new information digital identity represents connectedness real projection identity may incorporate references devices well resources policies systems policies provide entitlements identity claim particular point time space example person may entitled privileges work workplace may denied home hours user gets network usually form machine authentication probably verifies configures system basic level access short mapping user mac address prior process 802.1x simple users authenticate point usual user attempt authenticate system processes daemons started may well require network configuration already performed follows principle network identity device established permitting network connectivity example using digital certificates place hardware addresses trivial spoof device identifiers furthermore consistent identity model account typical network devices routers switches ca n't depend user identity since distinctive user associated device absent capability practice however strong identity asserted network level first task seeking apply identity driven network controls comprises form authentication device level stack since first piece infrastructure placed upon network often network operating system nos often identity authority controls resources nos contains usually printers file shares also procedures authenticate users onto incorporating form single sign-on means flow effect controls seamless many network capabilities made rely upon authentication technologies provisioning access control policy instance packet filtering -firewall content-control software quota management systems quality service qos systems good examples controls made dependent upon authentication
[ 3521, 3941, 5573, 7368, 1961, 10058, 210, 7411, 6651, 5433, 3643, 3007 ]
Test
5,625
4
Anderson's_rule_(computer_science):anderson rule computer science field computer security anderson rule refers principle formulated ross j. anderson nature large databases never free abuse breaches security large system designed ease access becomes insecure made watertight becomes impossible use
[ 2901, 2558 ]
Test
5,626
2
Free_list:free list free list data structure used scheme dynamic memory allocation operates connecting unallocated regions memory together linked list using first word unallocated region pointer next suitable allocating memory pool objects size free lists make allocation deallocation operations simple free region one would link free list allocate region one would simply remove single region end free list use regions variable-sized one may search region large enough size expensive free lists disadvantage inherited linked lists poor locality reference poor data cache utilization automatically consolidate adjacent regions fulfill allocation requests large regions unlike buddy allocation system nevertheless 're still useful variety simple applications full-blown memory allocator unnecessary requires much overhead
[ 4668, 7983 ]
None
5,627
7
ProSyst:prosyst prosyst software gmbh founded cologne 1997 company specializing java software middleware prosyst first commercial application java ee application server 2000 company sold server technology since focused completely osgi solutions 1999 prosyst among first companies join osgi alliance since made important contributions development release osgi specifications release 1–4 prosyst member osgi alliance board directors alongside ibm nokia ntt siemens oracle corporation samsung motorola telcordia additionally members prosyst staff serve several positions osgi alliance recent years prosyst set focus exclusively development osgi related software frameworks bundles remote management systems osgi tools developers including full sdk available download prosyst ’ osgi applications used smarthome devices mobile phone manufacturers network equipment providers cpes white goods manufacturers car manufacturers ehealth market prosyst employs 120 java osgi experts offers osgi related training support slas technical consulting development services member prosyst contributes osgi eclipse java community process nokia forum pro cvta connected vehicle trade association prosyst acquired bosch february 2015 merged bosch group software systems unit bosch software innovations gmbh
[ 4960, 8122, 3323, 5677 ]
None
5,628
3
War_in_Middle_Earth:war middle earth war middle earth real-time strategy game released zx spectrum msx commodore 64 amstrad cpc ms-dos commodore amiga apple iigs atari st 1988 australian company melbourne house game combined large scale army unit level small scale character level action happened simultaneously game world places could seen map ground level individual characters could also seen larger battles either survived died — gandalf alone could easily defeat hundred orcs battle quite small less 100 units approximately watched ground level otherwise displayed numerically ground level characters could acquire objects talk computer-controlled friendly characters radagast tom bombadil game reviewed 1989 dragon 147 hartley patricia kirk lesser role computers column reviewers gave game 3 5 stars computer gaming world gave game mixed review noting although faithfully recreates events books genuine strategy lacking game plays similarly subsequent playthroughs compute review positive criticizing anticlimactic ending otherwise impressive game faithful middle earth story line spanish magazine microhobby valued game following scores originality 80 graphics 70 motion sound 50 difficulty 100 addiction 80
[ 6976, 9166, 9006 ]
Test
5,629
3
Sega_TeraDrive:sega teradrive ibm pc compatible system integrated mega drive developed sega manufactured ibm 1991 teradrive allowed mega drive games played time pc section used possible mega drive pc hardware interact system released japan sega hoped integrating popular mega drive console ibm pc would attract potential customers wishing purchase pc system proved unpopular failed one main processors used system intel 80286 released 1982 however time teradrive released 1991 processor almost 10 years date powerful 25 mhz intel 80486 released 1989 making teradrive central processor 2 generations behind time system also contains motorola 68000 zilog z80 processors used mega drive ran 7.67 mhz 3.58 mhz respectively machine front panel ports included two mega drive pad ports similar design 9-pin male serial ports 2 ps/2 ports right side unit accommodate mouse keyboard system also contained several ports rear order left right 9-pin male serial port 25-pin parallel port connection printer stereo rca jacks composite ntsc video output connection tv analogue rgb monitor connection 2nd 9-pin male serial connector labelled ext similar found rear original mega drive base unit motherboard also spare isa slot available expansion hole rear unit accommodate interface consisted start-up menu several options including file manager dos clock mega drive mode machine included ibm drivers bundled floppy disk enabled properly written software operate machine ram run native mega drive hardware good example shown puzzle construction program one software titles included teradrive included pc-side editor suite changing features falling-block puzzle game playable mega drive side operating system shipped system ibm dos j4.0/v similar pc dos often speculation teradrive specifically designed purpose-made software development kit allow software makers develop software titles mega drive however given release date teradrive years initial mega drive release well availability sega game development hardware unlikely teradrive designed purpose system peripherals included available separately included 2 × mega drive pads 1 × ps/2 mouse 1 × sega branded ps/2 ibm keyboard 1 × 3-button joystick mouse mega drive pads practically identical found mega drive console version monitor manufactured 3rd party company sega branding available separately price ¥79,800 estimated usd 600/gbp £300 time capable displaying 15 khz rgb video signals mega drive hardware 31 khz vga output pc hardware vga connector three models available ranging ¥148,000 usd 1100/gbp £580 ¥248,000 usd 1840/gbp £950 system proved unpopular japanese market ultimately failed production numbers unknown system moderately rare japan although prices rising rapidly due collector demand price buy teradrive june 2003 triple price 2 years prior new pc also discussion stages developed sega leadership ex-ibm executive narutomi likely never got past discussion stages due failure teradrive similar unrelated system manufactured amstrad sold name mega pc pal areas europe australia although boasted higher specification sega teradrive unable act software development kit due inability interact pc mega drive together essentially pc mega drive bundled inside
[ 6148, 7269, 1801, 780, 7151, 1776, 6129, 7983, 5368, 3323, 11452, 1501 ]
None
5,630
9
Linkage_(software):linkage software programming languages particularly compiled ones like c c++ linkage describes names refer entity throughout whole program one single translation unit codice_1 keyword used c restrict visibility function variable translation unit also valid c++ c++ 98/03 deprecated usage favor anonymous namespaces longer deprecated c++ 11 also c++ implicitly treats codice_2 namespace-scope variable internal linkage unless explicitly declared codice_3 unlike c. name linkage related distinct scope scope name part translation unit visible instance name global scope file-scope c global namespace-scope c++ visible part file scope end end translation unit whether name given external internal linkage name external linkage entity name denotes may referred another translation unit using distinct declaration name scopes within translation unit using distinct declarations name given internal linkage declaration would denote distinct entity although using name entity could referred distinct declarations within translation unit name linkage referred declarations different scopes even within translation unit examples names parameters functions local variables details differ c objects functions types linkage c++ simplified overview linkage languages must done care different languages adorn external symbols differently common idiom uses codice_4 link c++ c code definition 'linkage quoted iso/iec 9899 tc3 c99 standard c uses term identifier article uses name latter c++ uses formalize linkage identifier declared different scopes scope made refer object function process called linkage following common example linkage function codice_5 declared two files function body defined demo2.c via linkage codice_5 called codice_7 inside demo1.c refers codice_5 demo2.c example external linkage function
[ 9921, 6664, 8874, 5165, 10510, 6640, 1724, 2045 ]
Test
5,631
4
Yahoo!_Assistant:yahoo assistant yahoo assistant formerly named 3721 internet assistant browser helper object internet explorer developed beijing 3721 technology co. ltd renamed yahoo assistant beijing 3721 technology acquired yahoo 3721 internet assistant together 3721 chinese keywords known spyware microsoft antispyware malware browser hijacker others panda antivirus however yahoo china filed lawsuit beijing sanjiwuxian internet technology co. ltd developer 360safe antispyware identifying yahoo assistant malware 360safe 3721 internet assistant originally released normal client-server application however turned use activex technology install client system later also shipped many sharewares default install options 3721 internet assistant also blamed use flaw microsoft internet explorer install automatically user browsing array 3721 sponsored personal commercial websites microsoft internet explorer yahoo assistant also included 3721 chinese keywords yahoo mail express sometimes whole package internet assistant chinese keywords mail express named yahoo assistant sharewares company says automatic installation ended september 2005 asks user permission installing however ca inc. reported yahoo assistant installation extra components installed without obtaining user consent software also bundled chinese client cga gaming platform 3721 claims 3721 internet assistant includes many useful features ie setting repair security shield removal internet history information blocking ads however installs various windows hooks slow system tries install hooks repeatedly users also reported internet assistant buttons reappeared immediately manual removal using internet explorer customization features blue screen death appeared using internet assistant test using http //www.kephyr.com/popupkillertest shows 3721 internet assistant block roughly half popup methods built-in popup blocker windows xp sp2 turned 3721 internet assistant enable/disable internet explorer extensions except advertisement links extensions installed yahoo products 3721 internet assistant runs multiple rundll32.exe processes one killed windows task manager immediately restarted others thereby resisting efforts user terminate application driver named cnsminkp.sys installed 3721 internet assistant along several hidden windows services uninstallation several files left system visible windows explorer found using tools total commander dos box yahoo assistant also removes 360safe antispyware program competitor without notifying user august 15 2007 beijing court ruled behavior unfair competition 3721 internet assistant together 3721 chinese keywords according interfax regarded chinese internet users hooligan zombie applications uninstall program pair provided 3721 simply redirects users 3721 website simplified chinese thus recognizable except chinese speakers default option web page keep 3721 internet assistant uninstallation following web uninstallation wizard reboot many 3721 files still remain client system pair ranked 1 beijing association online media list chinese malware 2005
[ 488, 10026, 5935, 10392, 7515, 8735 ]
Test
5,632
1
Triplestore:triplestore triplestore rdf store purpose-built database storage retrieval triples semantic queries triple data entity composed subject-predicate-object like bob 35 bob knows fred much like relational database one stores information triplestore retrieves via query language unlike relational database triplestore optimized storage retrieval triples addition queries triples usually imported/exported using resource description framework rdf formats triplestores built database engines scratch others built top existing commercial relational database engines sql-based nosql document-oriented database engines like early development online analytical processing olap databases intermediate approach allowed large powerful database engines constructed little programming effort initial phases triplestore development seems likely native triplestores advantage performance longer period time difficulty implementing triplestores sql although triples may thus stored implementing efficient querying graph-based rdf model mapping sparql onto sql queries difficult adding name triple makes quad store named graph graph database generalized structure triplestore using graph structures nodes edges properties represent store data graph databases might provide index-free adjacency meaning every element contains direct pointer adjacent elements index lookups necessary general graph databases store graph distinct specialized graph databases triplestores network databases
[ 2688, 8451, 8201, 6161, 9631, 1697, 9893, 9397, 4155, 7868, 9147, 9150, 11324, 2369, 11457, 6085, 6470, 9286, 2512, 2901, 7767, 11098, 987, 7650, 3171, 8291, 6629, 9828, 10471, 1146, 6395, 3196, 3454 ]
Validation
5,633
9
Formula_language:formula language formula language scripting language used lotus notes often referred formula language pronounced at-formula many language elements start -character example selection formula created ray ozzie early development lotus notes borrowed compiler decompiler lotus 1-2-3 spreadsheet unlike spreadsheet language formula language designed primarily string list processing numerical processing originally functional programming language unique text list-handling features inspired ray ozzie prior use icon lisp formula language engine rewritten damien katz notes domino 6 new features added language looping dynamic execution performance improved formula language two parts functions used several places throughout lotus notes important uses commands like menu commands perform actions lotus notes client examples actions commands primarily used formulas triggered user action button formulas possible combine functions example making execution command conditional field value
[ 3481, 9780, 6502 ]
Test
5,634
9
Ousterhout's_dichotomy:ousterhout dichotomy ousterhout dichotomy computer scientist john ousterhout categorization high-level programming languages tend fall two groups distinct properties uses system programming languages scripting languages – compare programming large programming small distinction underlies design language tcl system programming languages applications languages usually following properties system programming languages tend used components applications large amounts internal functionality operating systems database servers web browsers applications typically employ complex algorithms data structures require high performance prototypical examples system programming languages include c modula-2 contrast scripting languages glue languages tend following properties scripting languages tend used applications functionality comes programs often implemented system programming languages scripts used glue together programs add additional layers functionality top existing programs ousterhout claims scripts tend short often written less sophisticated programmers execution efficiency less important simplicity ease interaction programs common applications scripting include web page generation report generation graphical user interfaces system administration prototypical examples scripting languages include applescript c shell dos batch files tcl dichotomy fully set though ousterhout drawn distinction since least design tcl 1988 stated publicly various times early episode tcl war late september october 1994 richard stallman posted article critical tcl entitled use tcl ousterhout replied articulation dichotomy many believe dichotomy highly arbitrary refer ousterhout fallacy ousterhout false dichotomy strong-versus-weak typing data structure complexity independent versus stand-alone might said unrelated features usual critique ousterhout dichotomy distinction compiling versus interpreting since neither semantics syntax depend significantly whether code compiled machine-language interpreted tokenized byte-compiled start run mix many languages fall interpreted compiled e.g lisp forth ucsd pascal perl java makes compiling versus interpreting dubious parameter taxonomy programming languages
[ 3904, 3267, 4998, 6502, 8582, 5677, 2481, 9330, 9714, 692, 9780, 3350, 11411, 7421, 2045, 6558 ]
Test
5,635
9
Lexical_analysis:lexical analysis computer science lexical analysis lexing tokenization process converting sequence characters computer program web page sequence tokens strings assigned thus identified meaning program performs lexical analysis may termed lexer tokenizer scanner though scanner also term first stage lexer lexer generally combined parser together analyze syntax programming languages web pages forth lexer forms first phase compiler frontend modern processing analysis generally occurs one pass older languages algol initial stage instead line reconstruction performed unstropping removed whitespace comments scannerless parsers separate lexer steps done part lexer lexers parsers often used compilers used computer language tools prettyprinters linters lexing divided two stages scanning segments input string syntactic units called lexemes categorizes token classes evaluating converts lexemes processed values lexers generally quite simple complexity deferred parser semantic analysis phases often generated lexer generator notably lex derivatives however lexers sometimes include complexity phrase structure processing make input easier simplify parser may written partly fully hand either support features performance lexeme sequence characters source program matches pattern token identified lexical analyzer instance token authors term token using token interchangeably represent string tokenized token data structure resulting putting string tokenization process word lexeme computer science defined differently lexeme linguistics lexeme computer science roughly corresponds word linguistics confused word computer architecture although cases may similar morpheme lexical token simply token string assigned thus identified meaning structured pair consisting token name optional token value token name category lexical unit common token names consider expression c programming language lexical analysis expression yields following sequence tokens token name might termed part speech linguistics specification programming language often includes set rules lexical grammar defines lexical syntax lexical syntax usually regular language grammar rules consisting regular expressions define set possible character sequences lexemes token lexer recognizes strings kind string found lexical program takes action simply producing token two important common lexical categories white space comments also defined grammar processed lexer may discarded producing tokens considered non-significant separating two tokens codice_2 instead codice_3 two important exceptions first off-side rule languages delimit blocks indenting initial whitespace significant determines block structure generally handled lexer level see phrase structure secondly uses lexers comments whitespace must preserved – examples prettyprinter also needs output comments debugging tools may provide messages programmer showing original source code 1960s notably algol whitespace comments eliminated part line reconstruction phase initial phase compiler frontend separate phase eliminated handled lexer tokenization process demarcating possibly classifying sections string input characters resulting tokens passed form processing process considered sub-task parsing input example text string string n't implicitly segmented spaces natural language speaker would raw input 43 characters must explicitly split 9 tokens given space delimiter i.e. matching string codice_5 regular expression codice_6 tokens could represented xml sentence /sentence s-expression token class represents one possible lexeme lexer often saves enough information reproduce original lexeme used semantic analysis parser typically retrieves information lexer stores abstract syntax tree necessary order avoid information loss case numbers identifiers tokens identified based specific rules lexer methods used identify tokens include regular expressions specific sequences characters termed flag specific separating characters called delimiters explicit definition dictionary special characters including punctuation characters commonly used lexers identify tokens natural use written programming languages tokens often categorized character content context within data stream categories defined rules lexer categories often involve grammar elements language used data stream programming languages often categorize tokens identifiers operators grouping symbols data type written languages commonly categorize tokens nouns verbs adjectives punctuation categories used post-processing tokens either parser functions program lexical analyzer generally nothing combinations tokens task left parser example typical lexical analyzer recognizes parentheses tokens nothing ensure matched lexer feeds tokens parser representation used typically enumerated list number representations example identifier represented 0 assignment operator 1 addition operator 2 etc tokens defined often regular expressions understood lexical analyzer generator lex lexical analyzer generated automatically tool like lex hand-crafted reads stream characters identifies lexemes stream categorizes tokens termed tokenizing lexer finds invalid token report error following tokenizing parsing interpreted data may loaded data structures general use interpretation compiling first stage scanner usually based finite-state machine fsm encoded within information possible sequences characters contained within tokens handles individual instances character sequences termed lexemes example integer lexeme may contain sequence numerical digit characters many cases first non-whitespace character used deduce kind token follows subsequent input characters processed one time reaching character set characters acceptable token termed maximal munch longest match rule languages lexeme creation rules complex may involve backtracking previously read characters example c one l character enough distinguish identifier begins l wide-character string literal lexeme however string characters known certain kind e.g. string literal sequence letters order construct token lexical analyzer needs second stage evaluator goes characters lexeme produce value lexeme type combined value properly constitutes token given parser tokens parentheses really values evaluator function return nothing type needed similarly sometimes evaluators suppress lexeme entirely concealing parser useful whitespace comments evaluators identifiers usually simple literally representing identifier may include unstropping evaluators integer literals may pass string deferring evaluation semantic analysis phase may perform evaluation involved different bases floating point numbers simple quoted string literal evaluator needs remove quotes evaluator escaped string literal incorporates lexer unescapes escape sequences example source code computer program string might converted following lexical token stream whitespace suppressed special characters value due licensing restrictions existing parsers may necessary write lexer hand practical list tokens small general lexers generated automated tools tools generally accept regular expressions describe tokens allowed input stream regular expression associated production rule lexical grammar programming language evaluates lexemes matching regular expression tools may generate source code compiled executed construct state transition table finite-state machine plugged template code compiling executing regular expressions compactly represent patterns characters lexemes might follow example english-based language identifier token might english alphabetic character underscore followed number instances ascii alphanumeric characters and/or underscores could represented compactly string means character a-z a-z followed 0 a-z a-z 0-9 regular expressions finite-state machines generate powerful enough handle recursive patterns n opening parentheses followed statement followed n closing parentheses unable keep count verify n sides unless finite set permissible values exists n takes full parser recognize patterns full generality parser push parentheses stack try pop see stack empty end see example structure interpretation computer programs book typically tokenization occurs word level however sometimes difficult define meant word often tokenizer relies simple heuristics example languages use inter-word spaces use latin alphabet programming languages approach fairly straightforward however even many edge cases contractions hyphenated words emoticons larger constructs uris purposes may count single tokens classic example new york-based naive tokenizer may break space even though better break arguably hyphen tokenization particularly difficult languages written scriptio continua exhibit word boundaries ancient greek chinese thai agglutinative languages korean also make tokenization tasks complicated ways address difficult problems include developing complex heuristics querying table common special-cases fitting tokens language model identifies collocations later processing step lexers often generated lexer generator analogous parser generators tools often come together established lex paired yacc parser generator free equivalents flex/bison generators form domain-specific language taking lexical specification – generally regular expressions markup – emitting lexer tools yield fast development important early development get working lexer language specification may change often often provide advanced features pre- post-conditions hard program hand however automatically generated lexer may lack flexibility thus may require manual modification all-manually written lexer lexer performance concern optimizing worthwhile stable languages lexer run often c html lex/flex-generated lexers reasonably fast improvements two three times possible using tuned generators hand-written lexers sometimes used modern lexer generators produce faster lexers hand-coded ones lex/flex family generators uses table-driven approach much less efficient directly coded approach latter approach generator produces engine directly jumps follow-up states via goto statements tools like re2c proven produce engines two three times faster flex produced engines general difficult hand-write analyzers perform better engines generated latter tools following lexical analysers handle unicode lexical analysis mainly segments input stream characters tokens simply grouping characters pieces categorizing however lexing may significantly complex simply lexers may omit tokens insert added tokens omitting tokens notably whitespace comments common needed compiler less commonly added tokens may inserted done mainly group tokens statements statements blocks simplify parser line continuation feature languages newline normally statement terminator often ending line backslash immediately followed newline results line continued – following line joined prior line generally done lexer backslash newline discarded rather newline tokenized examples include bash shell scripts python many languages use semicolon statement terminator often mandatory languages semicolon optional many contexts mainly done lexer level lexer outputs semicolon token stream despite one present input character stream termed semicolon insertion automatic semicolon insertion cases semicolons part formal phrase grammar language may found input text inserted lexer optional semicolons terminators separators also sometimes handled parser level notably case trailing commas semicolons semicolon insertion feature bcpl distant descendant go though absent b c. semicolon insertion present javascript though rules somewhat complex much-criticized avoid bugs recommend always using semicolons others use initial semicolons termed defensive semicolons start potentially ambiguous statements semicolon insertion languages semicolon-terminated statements line continuation languages newline-terminated statements seen complementary semicolon insertion adds token even though newlines generally generate tokens line continuation prevents token generated even though newlines generally generate tokens off-side rule blocks determined indenting implemented lexer python increasing indenting results lexer emitting indent token decreasing indenting results lexer emitting dedent token tokens correspond opening brace codice_7 closing brace codice_8 languages use braces blocks means phrase grammar depend whether braces indenting used requires lexer hold state namely current indent level thus detect changes indenting changes thus lexical grammar context-free indent–dedent depend contextual information prior indent level generally lexical grammars context-free almost thus require looking back ahead backtracking allows simple clean efficient implementation also allows simple one-way communication lexer parser without needing information flowing back lexer exceptions however simple examples include semicolon insertion go requires looking back one token concatenation consecutive string literals python requires holding one token buffer emitting see next token another string literal off-side rule python requires maintaining count indent level indeed stack indent level examples require lexical context complicate lexer somewhat invisible parser later phases complex example lexer hack c token class sequence characters determined semantic analysis phase since typedef names variable names lexically identical constitute different token classes thus hack lexer calls semantic analyzer say symbol table checks sequence requires typedef name case information must flow back parser semantic analyzer back lexer complicates design
[ 512, 8323, 3462, 8582, 5896, 2316, 10510, 9871, 5904, 5651, 2582, 2327, 5399, 9881, 1435, 3229, 797, 3998, 1952, 6047, 10145, 3876, 5925, 2599, 3624, 8874, 9002, 10668, 10160, 8627, 3127, 7612, 6335, 4674, 963, 1349, 8262, 9926, 6472, 340...
Validation
5,636
4
Vulnerability_(computing):vulnerability computing computer security vulnerability weakness exploited threat actor attacker perform unauthorized actions within computer system exploit vulnerability attacker must least one applicable tool technique connect system weakness frame vulnerability also known attack surface vulnerability management cyclical practice identifying classifying remediating mitigating vulnerabilities practice generally refers software vulnerabilities computing systems security risk often incorrectly classified vulnerability use vulnerability meaning risk lead confusion risk potential significant impact resulting exploit vulnerability vulnerabilities without risk example affected asset value vulnerability one known instances working fully implemented attacks classified exploitable vulnerability—a vulnerability exploit exists window vulnerability time security hole introduced manifested deployed software access removed security fix available/deployed attacker disabled—see zero-day attack security bug security defect narrower concept vulnerabilities related software hardware site personnel vulnerabilities examples vulnerabilities software security bugs constructs programming languages difficult use properly large source vulnerabilities iso 27005 defines vulnerability asset anything value organization business operations continuity including information resources support organization mission ietf rfc 4949 vulnerability committee national security systems united states america defined vulnerability cnss instruction 4009 dated 26 april 2010 national information assurance glossary many nist publications define vulnerability context different publications fismapedia term provide list sp 800-30 give broader one enisa defines vulnerability open group defines vulnerability factor analysis information risk fair defines vulnerability according fair vulnerability related control strength i.e strength control compared standard measure force threat capabilities i.e probable level force threat agent capable applying asset isaca defines vulnerability risk framework data computer security dictionary standards concepts terms authors dennis longley michael shain stockton press defines vulnerability matt bishop dave bailey give following definition computer vulnerability national information assurance training education center defines vulnerability resource either physical logical may one vulnerabilities exploited threat agent threat action result potentially compromise confidentiality integrity availability resources necessarily vulnerable one belonging organization and/or parties involved customers suppliers so-called cia triad basis information security attack active attempts alter system resources affect operation compromising integrity availability passive attack attempts learn make use information system affect system resources compromising confidentiality owasp see figure depicts phenomenon slightly different terms threat agent attack vector exploits weakness vulnerability system related security controls causing technical impact resource asset connected business impact overall picture represents risk factors risk scenario set policies concerned information security management information security management system isms developed manage according risk management principles countermeasures order ensure security strategy set following rules regulations applicable country countermeasures also called security controls applied transmission information called security services vulnerabilities classified according asset class related research shown vulnerable point information systems human user operator designer human humans considered different roles asset threat information resources social engineering increasing security concern impact security breach high fact managers upper management easily know systems applications vulnerabilities perform action manage risk seen misconduct legislations privacy law forces managers act reduce impact likelihood security risk information technology security audit way let independent people certify environment managed properly lessen responsibilities least demonstrated good faith penetration test form verification weakness countermeasures adopted organization white hat hacker tries attack organization information technology assets find easy difficult compromise security proper way professionally manage risk adopt information security management system iso/iec 27002 risk follow according security strategy set forth upper management one key concept information security principle defence depth i.e set multilayer defence system intrusion detection system example class systems used detect attacks physical security set measures protect physically information asset somebody get physical access information asset quite easy make resources unavailable legitimate users sets criteria satisfied computer operating system applications order meet good security level developed itsec common criteria two examples responsible disclosure many refer 'coordinated disclosure first biased word vulnerabilities topic great debate reported tech herald august 2010 google microsoft tippingpoint rapid7 recently issued guidelines statements addressing deal disclosure going forward responsible disclosure first alerts affected vendors confidentially alerting cert two weeks later grants vendors another 45-day grace period publishing security advisory full disclosure done details vulnerability publicized perhaps intent put pressure software procedure authors find fix urgently well respected authors published books vulnerabilities exploit good example security researchers catering needs cyberwarfare cybercrime industry stated approach provide adequate income efforts instead offer exploits privately enable zero day attacks never ending effort find new vulnerabilities fix called computer insecurity january 2014 google revealed microsoft vulnerability microsoft released patch fix microsoft representative called coordinated practices among software companies revealing disclosures mitre corporation maintains list disclosed vulnerabilities system called common vulnerabilities exposures vulnerability classified scored using common vulnerability scoring system cvss owasp collects list potential vulnerabilities aim educating system designers programmers therefore reducing likelihood vulnerabilities written unintentionally software time disclosure vulnerability defined differently security community industry commonly referred kind public disclosure security information certain party usually vulnerability information discussed mailing list published security web site results security advisory afterward time disclosure first date security vulnerability described channel disclosed information vulnerability fulfill following requirement many software tools exist aid discovery sometimes removal vulnerabilities computer system though tools provide auditor good overview possible vulnerabilities present replace human judgment relying solely scanners yield false positives limited-scope view problems present system vulnerabilities found every major operating system including windows macos various forms unix linux openvms others way reduce chance vulnerability used system constant vigilance including careful system maintenance e.g applying software patches best practices deployment e.g use firewalls access controls auditing development throughout deployment lifecycle vulnerabilities related evident pure technical approach even protect physical assets one administrative procedure let maintenance personnel enter facilities people adequate knowledge procedures motivated follow proper care see social engineering security four examples vulnerability exploits common types software flaws lead vulnerabilities include set coding guidelines developed large number static code analysers used verify code follows guidelines
[ 1024, 10756, 8200, 2569, 522, 1553, 9746, 8212, 4117, 3094, 535, 10264, 1567, 9761, 3619, 2084, 4133, 4644, 7717, 8231, 11609, 3629, 5682, 2611, 6707, 8754, 5176, 3643, 7228, 7739, 9791, 1088, 4165, 1608, 3657, 8779, 9293, 4689, 8273, 108...
Test
5,637
2
Rooting_(Android):rooting android rooting process allowing users smartphones tablets devices running android mobile operating system attain privileged control known root access various android subsystems android uses linux kernel rooting android device gives similar access administrative superuser permissions linux unix-like operating system freebsd macos rooting often performed goal overcoming limitations carriers hardware manufacturers put devices thus rooting gives ability permission alter replace system applications settings run specialized applications apps require administrator-level permissions perform operations otherwise inaccessible normal android user android rooting also facilitate complete removal replacement device operating system usually recent release current operating system root access sometimes compared jailbreaking devices running apple ios operating system however different concepts jailbreaking bypass several types apple prohibitions end user including modifying operating system enforced locked bootloader installing non-officially approved available google play applications via sideloading granting user elevated administration-level privileges rooting many vendors htc sony asus google explicitly provide ability unlock devices even replace operating system entirely similarly ability sideload applications typically permissible android devices without root permissions thus primarily third aspect ios jailbreaking giving users administrative privileges directly correlates android rooting rooting lets user-installed applications run privileged commands typically unavailable devices stock configuration rooting required advanced potentially dangerous operations including modifying deleting system files removing pre-installed applications low-level access hardware rebooting controlling status lights recalibrating touch inputs typical rooting installation also installs superuser application supervises applications granted root superuser rights requesting approval user granting said permissions secondary operation unlocking device bootloader verification required remove replace installed operating system contrast ios jailbreaking rooting needed run applications distributed outside google play store sometimes called sideloading android os supports feature natively two ways unknown sources option settings menu android debug bridge however us carriers including prevented installation applications play store firmware although several devices subject rule including samsung infuse 4g lifted restriction devices middle 2011. amazon kindle fire defaults amazon appstore instead google play though like android devices kindle fire allows sideloading applications unknown sources easy installer application amazon appstore makes easy vendors android devices may look sources future access alternate apps may require rooting rooting always necessary rooting android phone lets owner add edit delete system files turn lets perform various tweaks use apps require root access advantages rooting include possibility complete control look feel device superuser access device system files aspects operating system customized real limitation level coding expertise immediately expectable advantages rooted devices include following rooting methods involve use command prompt development interface called android debug bridge adb methods may use specialized applications simple clicking one button devices sometimes even different variants device different hardware configurations thus guide rom root method used device variant different hardware setup risk bricking device recent years new method rooting android devices called systemless root systemless root uses various techniques gain root access without modifying system partition device one example magisk also ability hide root access applications refuse work safetynet protected applications like android pay pokémon go distinction soft rooting third-party application uses security vulnerability root exploit hard-rooting flashing codice_1 binary executable sometimes made phone soft rooted vulnerable malware process rooting varies widely device usually includes exploiting one security bugs firmware i.e. version android os installed device exploit discovered custom recovery image skip digital signature check firmware updates flashed modified firmware update typically includes utilities needed run apps root installed example codice_1 binary open-source one paired superuser supersu application copied location current process path e.g. codice_3 granted executable permissions codice_4 command third-party supervisor application like superuser supersu regulate log elevated permission requests applications many guides tutorials automatic processes exist popular android devices facilitating fast easy rooting process process rooting device may simple complex even may depend upon serendipity example shortly release htc dream htc g1 discovered anything typed using keyboard interpreted command privileged root shell although google quickly released patch fix signed image old firmware leaked gave users ability downgrade use original exploit gain root access manufacturers including lg htc motorola provide official support unlocking bootloader allows rooting without exploiting vulnerability however support may limited certain phones example lg released bootloader unlock tool certain models phones google-branded android google nexus line devices boot-loader unlocked simply connecting device computer boot-loader mode running fastboot protocol command codice_5 accepting warning boot-loader unlocked new system image written directly flash without need exploit past many manufacturers tried make non-rootable phones elaborate protections like droid x usually still rootable way may root exploit available new recently updated phones one usually available within months 2010 tablet smartphone manufacturers well mobile carriers mainly unsupportive third-party firmware development manufacturers expressed concern improper functioning devices running unofficial software related support costs moreover firmware omnirom cyanogenmod sometimes offer features carriers would otherwise charge premium tethering due technical obstacles locked bootloaders restricted access root permissions commonly introduced many devices example late december 2011 barnes noble amazon.com inc. began pushing automatic over-the-air firmware updates 1.4.1 nook tablets 6.2.1 kindle fires removed one method gain root access devices nook tablet 1.4.1 update also removed users ability sideload apps sources official barnes noble app store without modding however community-developed software began grow popular late 2009 early 2010 following statement copyright office librarian congress us allowing use jailbroken mobile devices manufacturers carriers softened position regarding cyanogenmod unofficial firmware distributions manufacturers including htc samsung motorola sony mobile communications actively provide support encourage development 2011 need circumvent hardware restrictions install unofficial firmware lessened increasing number devices shipped unlocked unlockable bootloaders similar nexus series phones device manufacturer htc announced would support aftermarket software developers making bootloaders new devices unlockable however carriers verizon wireless recently continuously blocked oems htc motorola releasing retail devices unlocked bootloaders opting instead developer edition devices sold unsubsidized off-contract similar practice nexus devices premium contract discounts 2014 samsung released security service called knox tool prevents modifying system boot files attempts set e-fuse 0x1 permanently voiding warranty international treaties influenced development laws affecting rooting 1996 world intellectual property organization wipo copyright treaty requires nations party treaties enact laws drm circumvention american implementation digital millennium copyright act dmca includes process establishing exemptions non-copyright-infringing purposes rooting 2001 european copyright directive implemented treaty europe requiring member states european union implement legal protections technological protection measures copyright directive includes exceptions allow breaking measures non-copyright-infringing purposes run alternative software member states vary implementation directive 2010 electronic frontiers australia said unclear whether rooting legal australia anti-circumvention laws may apply laws strengthened copyright amendment act 2006 november 2012 canada amended copyright act new provisions prohibiting tampering digital locks exceptions including software interoperability rooting device run alternative software form circumventing digital locks purpose software interoperability several efforts 2008 2011 amend copyright act bill c-60 bill c-61 bill c-32 prohibit tampering digital locks along initial proposals c-11 restrictive bills set aside 2011 michael geist canadian copyright scholar cited iphone jailbreaking non-copyright-related activity overly-broad copyright act amendments could prohibit free software foundation europe argues legal root flash device according european directive 1999/44/ec replacing original operating system another void statutory warranty covers hardware device two years unless seller prove modification caused defect law copyright related rights regulations 2003 makes circumventing drm protection measures legal purpose interoperability copyright infringement rooting may form circumvention covered law tested court competition laws may also relevant see also european union section india copyright law permits circumventing drm non-copyright-infringing purposes indian parliament introduced bill including drm provision 2010 passed 2012 copyright amendment bill 2012 india signatory wipo copyright treaty requires laws drm circumvention listed us special 301 report priority watch list applied pressure develop stricter copyright laws line wipo treaty new zealand copyright law allows circumvention technological protection measure tpm long use legal non-copyright-infringing purposes law added copyright act 1994 part copyright new technologies amendment act 2008 rooting might legal singapore done provide interoperability circumvent copyright tested court unlocking consumer choice wireless competition act guarantees consumers unlock let others unlock phones digital millennium copyright act dmca rooting illegal united states except exemption u.s copyright office granted exemption law least 2015 2010 response request electronic frontier foundation u.s copyright office explicitly recognized exemption dmca permit rooting ruling library congress affirmed july 26 2010 rooting exempt dmca rules respect circumventing digital locks dmca exemptions must reviewed renewed every three years else expire october 28 2012 us copyright office updated exemption policies rooting smartphones continues legal circumvention accomplished sole purpose enabling interoperability lawfully obtained software applications computer programs telephone handset however u.s copyright office refused extend exemption tablets arguing term tablets broad ill-defined exemption class devices could unintended side effects copyright office also renewed 2010 exemption unofficially unlocking phones use unapproved carriers restricted exemption phones purchased january 26 2013 tim wu professor columbia law school argued 2007 jailbreaking legal ethical plain fun wu cited explicit exemption issued library congress 2006 personal unlocking notes locks used wireless carriers limit ability subscribers switch carriers business decision nothing whatsoever interests protected copyright thus implicate dmca wu claim exemption applies help others unlock device traffic software 2010 2012 u.s copyright office approved exemptions dmca allow users root devices legally still possible employ technical countermeasures prevent rooting prevent rooted phones functioning also unclear whether legal traffic tools used make rooting easy
[ 516, 9732, 6, 8719, 7700, 9244, 11294, 1578, 3626, 7722, 5677, 1083, 1602, 6212, 69, 8262, 4685, 3664, 8280, 3162, 8285, 2658, 6763, 11391, 1670, 9356, 5262, 10393, 7835, 6301, 673, 8870, 1191, 700, 196, 8907, 2259, 8413, 9949, 1255, 89...
Test
5,638
2
XMK_(operating_system):xmk operating system extreme minimal kernel xmk real-time operating system rtos designed minimal ram/rom use achieves goal though almost entirely written c programming language consequence easily ported 8- 16- 32-bit microcontroller xmk comes two independent packages xmk scheduler contains core kernel everything necessary run multithreaded embedded application application programming layer apl provides higher level functions atop xmk scheduler api xmk distribution contains standard libraries libc part development tools target systems
[ 8262, 7983, 9366, 2045, 6207 ]
Validation
5,639
0
FrameNet:framenet computational linguistics framenet project housed international computer science institute berkeley california produces electronic resource based theory meaning called frame semantics framenet reveals example sentence john sold car mary essentially describes basic situation semantic frame mary bought car john different perspective semantic frame thought conceptual structure describing event relation object participants framenet lexical database contains 1,200 semantic frames 13,000 lexical units pairing word meaning polysemous words represented several lexical units 202,000 example sentences framenet largely creation charles j. fillmore developed theory frame semantics project based initially project leader project began 1997 collin baker became project manager 2000 framenet project influential linguistics natural language processing led task automatic semantic role labeling frame schematic representation situation involving various participants props conceptual roles examples frame names codice_1 codice_2 frame framenet contains textual description represents frame definition associated frame elements lexical units example sentences frame-to-frame relations frame elements fe provide additional information semantic structure sentence frame number core non-core fes thought semantic roles core fes essential meaning frame non-core fes generally descriptive time place manner etc. examples include framenet includes shallow data syntactic roles frame elements play example sentences example sentence like born ad 460 framenet would mark noun phrase referring codice_4 fe ad 460 noun phrase corresponding codice_5 frame element details frame elements realized sentence important reveals important information subcategorization frames well possible diathesis alternations e.g john broke window vs. window broke verb lexical units lu lemmas part speech evoke specific frame words lu identified sentence specific lu associated specific frame frame many lus associated one frame many frames share multiple lus typically case lus multiple word senses alongside frame lexical unit associated specific frame elements means annotated example sentences example lexical units evoke codice_16 frame specific perspectivized versions precise include verbs complain grouse lament others frames associated example sentences frame elements marked within sentences thus sentence associated frame codice_1 marked frame element codice_4 ad 460 marked codice_5 start framenet project committed looking evidence actual language use found text collections like british national corpus based example sentences automatic semantic role labeling tools able determine frames mark frame elements new sentences framenet also exposes statistics valences frames number position frame elements within example sentences sentence falls valence pattern occurs two times example sentences framenet namely framenet additionally captures relationships different frames using relations include following framenet proven useful number computational applications computers need additional knowledge order recognize john sold car mary mary bought car john describe essentially situation despite using two quite different verbs different prepositions different word order framenet used applications like question answering paraphrasing recognizing textual entailment information extraction either directly means semantic role labeling tools first automatic system semantic role labeling srl sometimes also referred shallow semantic parsing developed daniel gildea daniel jurafsky based framenet 2002 semantic role labeling since become one standard tasks natural language processing latest version 1.7 framenet fully supported natural language toolkit since frames essentially semantic descriptions similar across languages several projects arisen years relied original framenet basis additional non-english framenets spanish japanese german polish among others
[ 416, 3617, 1890, 5667, 8323, 9577, 396, 2414, 10610, 11538, 2100, 9149, 6174 ]
None
5,640
1
MemSQL:memsql memsql distributed in-memory sql database management system relational database management system rdbms compiles structured query language sql machine code via termed code generation april 23 2013 memsql launched first generally available version database public fast database memsql combines lock-free data structures just-in-time compilation jit process highly volatile workloads specifically memsql implements lock-free hash tables lock-free skip lists memory fast random access data sql queries sent memsql server converted byte code compiled llvm machine code queries stripped parameters query template stored shared object subsequently matched incoming queries system executing pre-compiled query plans removes interpretation along hot code paths providing highly efficient code paths minimize number central processing unit cpu instructions required process sql statements memsql wire-compatible mysql means applications connect memsql mysql clients drivers well standard open database connectivity odbc java database connectivity jdbc connectors addition mysql syntax functionality memsql also store columns json format supports geospatial datatypes operations memsql store database tables either rowstores columnstores format used determined user ddl time i.e table created data rowstore tables stored completely in-memory snapshots transaction logs persisted disk data columnstore tables stored on-disk using rowstore-like structure handle incoming inserts columnstore rowstore columnstore tables differ storage medium used rowstores name implies store information row format traditional data format used rdbms systems rowstores optimized singleton small insert update delete queries closely associated oltp transactional use cases columnstores optimized complex select queries typically associated olap analytics use cases example large clinical data set data analysis best stored columnar format since queries run typically ad-hoc queries aggregates computed large numbers similar data items memsql database distributed database implemented aggregators leaf nodes memsql binaries used aggregator leaf nodes nearly difference user identifying node aggregator leaf aggregator responsible receiving sql queries breaking across leaf nodes aggregating results back client leaf node stores memsql data processes queries aggregator communication aggregators leaf nodes done network sql syntax memsql uses hash partitioning distribute data uniformly across number leaf nodes memsql durability slightly different in-memory rowstore on-disk columnstore durability in-memory rowstore implemented write-ahead log snapshots similar checkpoints default settings soon transaction acknowledged memory database asynchronously write transaction disk fast disk allows on-disk columnstore actually fronted in-memory rowstore-like structure skiplist structure durability guarantees memsql rowstore apart columnstore durable since data stored disk memsql cluster configured high availability mode every data partition automatically created master slave versions two separate leaf nodes high availability mode aggregators send transactions master partitions send logs slave partitions event unexpected master failure slave partitions take master partitions fully online operation memsql ships installation management monitoring tool called memsql ops installing memsql ops used set distributed memsql database across machines provide metrics running system memsql ops web user interface command line interface starting memsql 4.1 launched september 2015 memsql gives users ability install apache spark part memsql cluster use spark etl tool import data memsql apache spark installed set interactively using memsql ops ops users define extract transform load phases data pipeline import data memsql management monitoring running data pipelines done within ops ui
[ 3, 3219, 10389, 1952, 8609, 4781, 10286, 7983, 10413, 823, 5691, 6470, 2901, 4696, 8810, 7022, 1776, 7412, 7421 ]
None
5,641
5
Persistent_uniform_resource_locator:persistent uniform resource locator persistent uniform resource locator purl uniform resource locator url i.e. location-based uniform resource identifier uri used redirect location requested web resource purls redirect http clients using http status codes purl concept generic used designate redirection service named purl resolver purls used curate url resolution process thus solving problem transitory uris location-based uri schemes like http technically string resolution purl like sef url resolution remainder article oclc purl system proposed implemented oclc online computer library center purl concept developed oclc 1995 purl system implemented using forked pre-1.0 release apache http server software modernized extended 2007 zepheira contract oclc official website moved http //purlz.org z came zepheira name used differentiate purl open-source software site purl resolver operated oclc purl version numbers may considered confusing oclc released versions 1 2 apache-based source tree initially 1999 oclc research public license 1.0 license later oclc research public license 2.0 license http //opensource.org/licenses/oclc2 zepheira released purlz 1.0 2007 apache license version 2.0 purlz 2.0 released beta testing 2010 release never finalized callimachus project implemented purls 1.0 release 2012 oldest purl http resolver operated oclc 1995 september 2016 reached purl.oclc.org well purl.org purl.net purl.com notable purl resolvers include us government printing office http //purl.fdlp.gov operated federal depository library program operation since 1997 purl concept used w3id.org may replace old purl-services purl-technologies 27 september 2016 oclc announced cooperation internet archive resulting transfer resolver service administration interface internet archive service supported newly created software separate previous implementations transfer reenabled ability manage purl definitions disabled oclc hosted service several months service hosted internet archive servers supports access via purl.org purl.net purl.info purl.com oclc redirecting dns requests purl.oclc.org purl.org purl concept allows generalized url curation http uris world wide web purls allow third party control url resolution resource metadata provision url simply address resource world wide web persistent url address world wide web causes redirection another web resource web resource changes location hence url purl pointing updated user purl always uses web address even though resource question may moved purls may used publishers manage information space web users manage purl service independent publisher information purl services thus allow management hyperlink integrity hyperlink integrity design trade-off world wide web may partially restored allowing resource users third parties influence url resolves simple purl works responding http get request returning response type 302 equivalent http status code 302 meaning found response contains http location header value url client subsequently retrieve via new http get request purls implement one form persistent identifier virtual resources persistent identifier schemes include digital object identifiers dois life sciences identifiers lsids persistent identification schemes provide unique identifiers possibly changing virtual resources schemes provide curation opportunities curation virtual resources defined active involvement information professionals management including preservation digital data future use purls criticized need resolve url thus tying purl network location network locations several vulnerabilities domain name system registrations host dependencies failure resolve purl could lead ambiguous state would clear whether purl failed resolve network failure prevented exist purls valid urls components must map url specification scheme part tells computer program web browser protocol use resolving address scheme used purls generally http host part tells purl server connect next part purl domain analogous resource path url domain hierarchical information space separates purls allows purls different maintainers one designated maintainers may administer purl domain finally purl name name purl domain name together constitute purl id permalink purl used permanent/persistent url redirect location requested web resource roughly speaking differences domain name time scale common types purls named coincide http response code return http response codes equivalent purl types purl servers implement purl types http response codes e.g 401 unauthorized clear meanings context http conversation apply process http redirection three additional types purls chain partial clone given mnemonic names related functions purls so-called simple purls provide redirection desired resource http status code hence purl type simple purl 302 intent 302 purl inform web client end user purl always used address requested resource final uri resolved allow continued resolution resource purl changes operators prefer use purls type 301 indicating final uri addressed future requests purl type chain allows purl redirect another purl manner identical 301 302 redirection difference purl server handle redirection internally greater efficiency efficiency useful many redirections possible since web browsers stop following redirections set limit encountered attempt avoid loops purl type 200 active purl purl actively participates creation aggregation metadata returned active purl includes arbitrary computation produce output active purls implemented purlz 2.0 callimachus project may used gather runtime status reports perform distributed queries type data collection persistent identifier desired active purls act similar stored procedure relational databases purl type 303 used direct web client resource provides additional information regarding resource requested without returning resource subtlety useful http uri requested used identifier physical conceptual object represented information resource purls type 303 used often redirect metadata serialization format resource description framework rdf relevance semantic web linked data content use 303 http status code conformant http-range-14 finding technical architecture group world wide web consortium purl type 307 informs user resource temporarily resides different url norm purls types 404 410 note requested resource could found suggests information support http 307 temporary redirect 404 found 410 gone response codes provided completeness purls types 404 410 provided assist administrators marking purls require repair purls types allow efficient indications resource identification failure target resources moved suitable replacement identified purls type clone used solely purl administration convenient method copying existing purl record new purl purl service includes concept known partial redirection request match purl exactly requested url checked determine contiguous front portion purl string matches registered purl redirection occurs remainder requested url appended target url example consider purl url nowiki http//purl.org/some/path/ /nowiki target url nowiki http //example.com/another/path/ /nowiki attempt perform http get operation url nowiki http//purl.org/some/path/and/some/more/data /nowiki would result partial redirection nowiki http //example.com/another/path/and/some/more/data /nowiki concept partial redirection allows hierarchies web-based resources addressed via purls without resource requiring purl one purl sufficient serve top-level node hierarchy single target server new purl service uses type partial denote purl performs partial redirection partial redirections level url path violate common interpretations http 1.1 specification however handling url fragments across redirections standardized consensus yet emerged fragment identifiers indicate pointer specific information within resource designated following separator uris partial redirection presence fragment identifier problematic two conflicting interpretations possible fragment attached purl type partial purl service assume fragment meaning target url discard presumption resource changed location may also changed content thus invalidating fragments defined earlier bos suggested fragments retained passed target urls http redirections resulting 300 multiple choice 301 moved permanently 302 found 303 see responses unless designated target url already includes fragment identifier fragment identifier already present target url fragment original url abandoned unfortunately bos ’ suggestion failed navigate ietf standards track expired without work dubost et al resurrected bos ’ suggestions w3c note standard guidance absence standard makers web clients browsers generally failed follow bos ’ guidance starting purlz 1.0 series purl service implements partial redirections inclusive fragment identifiers writing fragments onto target urls attempt comply avoid problematic inconsistent behavior browser vendors
[ 2016, 865, 2945, 7370, 5403, 6002, 5012, 53, 10102, 119, 10452, 1723, 124 ]
Test
5,642
3
RAD750:rad750 rad750 radiation-hardened single board computer manufactured bae systems electronics intelligence support successor rad6000 rad750 use high radiation environments experienced board satellites spacecraft rad750 released 2001 first units launched space 2005 cpu 10.4 million transistors order magnitude rad6000 1.1 million manufactured using either 250 150 nm photolithography die area 130 mm core clock 110 200 mhz process 266 mips cpu include extended l2 cache improve performance cpu withstand 200,000 1,000,000 rads 2,000 10,000 gray temperature ranges –55 °c 125 °c requires 5 watts power standard rad750 single-board system cpu motherboard withstand 100,000 rads 1,000 gray temperature ranges –55 °c 70 °c requires 10 watts power rad750 system price comparable rad6000 us 200,000 per board per 2002 reference however customer program requirements quantities greatly affect final unit costs rad750 based powerpc 750 packaging logic functions completely compatible powerpc 7xx family term rad750 registered trademark bae systems information electronic systems integration inc 2010 reported 150 rad750s used variety spacecraft notable examples order launch date include
[ 9857, 6914, 4868, 10501, 3846, 4743, 6663, 1548, 1933, 398, 3472, 4881, 7065, 1563, 1309, 3493, 6949, 6311, 8102, 1321, 9391, 10543, 4017, 5297, 8120, 6715, 9020, 1725, 1983, 1985, 8899, 10180, 336, 8530, 3540, 342, 9302, 11613, 6878, 163...
Test
5,643
2
Microsoft_Mahjong:microsoft mahjong microsoft mahjong formerly mahjong titans taipei computer game version mahjong solitaire published microsoft version titled mahjong titans developed oberon games included windows vista windows 7 except starter home basic editions takes advantage new graphical user interface gui windows vista includes features tile set background choices windows vista builds 5219 5231 5259 game known shanghai solitaire game make windows 8 however standalone version developed arkadium published microsoft studios downloaded windows store free charge older version game known taipei bundled microsoft entertainment pack 1 best microsoft entertainment pack version included 32767 possible configurations player choice six tile layouts cat turtle crab dragon fortress spider stylized portrayal respective object animal background image chosen five different options four tile sets including traditional mahjong tiles variations fuller coloring larger print alternative pastel tile set entirely different picture theme games entirely random always least one pair within five tiles topmost five tiles turtle layout often two pairs algorithm tile organization positions tiles mostly paired level otherwise matching tile available accessible position one level check ensure matching tile positioned beneath partner since every tile 3 partners enough prove game impossible solve newer version microsoft mahjong numerous layouts improved graphics sound internet features set daily challenges reward user badges completed xbox live integration
[ 11270, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 9812, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 8841, 6797, 2193, 9874, 1...
Test
5,644
2
Keith_Bergelt:keith bergelt keith daniel bergelt born september 11 1958 american corporate executive former u.s. diplomat ceo open invention network responsible coordinating establishment maintenance patent ‘ ‘ no-fly ” zone around linux responsible safeguarding open competitive landscape key technology markets back-office transaction processing mission critical applications mobile communications/smartphones desktop computing bergelt born new york city raised village bayville new york north shore long island attended st. boniface martyr school sea cliff new york graduate locust valley high school high school classmate eileen chamberlain donahoe u.s ambassador un human rights council geneva switzerland bergelt holds degrees duke university ’ trinity college ab dedman school law southern methodist university jd edhec business school theseus mba addition studied management insead institut national des telecommunications int france economics technology policy university san francisco mclaren graduate school business upon graduation law school entered public service held diplomatic postings un new york city american embassy tokyo japan 12-year public service career also lived san francisco california washington d.c colleague tennis partner u.s. treasury secretary tim geithner time together american embassy tokyo early 1990s berlin wall fell wake collapse soviet union bergelt left government service embarked private sector career c-level strategy consulting focused innovation sri consulting menlo park ca sri consulting co-founded first strategy consulting practice area intellectual asset management major strategy consulting firm practice enabled companies develop strategies effectively build manage leverage value codified patents trademarks copyrights non-codified knowledge know-how etc intellectual capital licensing joint ventures donation abandonment creation spin-outs spin-ups spin-ins uniquely suited monetize corporate intangible assets bergelt brought motorola corporation schaumburg il establish serve general manager strategic intellectual asset management business unit focused distilling value motorola ’ intellectual property addition served director technology strategy tenure motorola following experience motorola coincident departure bob galvin motorola board directors recruited kelso company new york-based private equity firm manage ip strategy business development licensing ip-based portfolio company – cambridge display technology cdt – cambridge england establishing strategy licensing program cdt kelso bergelt engaged texas pacific group tpg full-time advisor technology investment group recruited principal financial group establish run first-of-its-kind ip fund financial services advisory firm focused transforming ip viable source collateral fourth lending vertical complement asset-based lending backed property/plant/equipment accounts receivable inventory tenure ceo paradox capital bergelt worked professionals banking ip law raise 350mm capital enabled paradox pioneer emergence ip viable asset class asset-based lending obviate necessity second lien lending ip-rich companies bergelt recruited ibm red hat sony nec philips novell serve ceo open invention network pro-competitive defensive patent management organization established enable freedom operate linux support democratization innovation occasioned open source projects linux 'bergelt chief executive officer open invention network since 2008 responsible defending integrity linux ecosystem previously bergelt criticized microsoft several times behavior towards open source community microsoft changed behavior embraced open source community signed open invention network cross license bergelt pleased company also interviewed linux.com 2008 linuxworld expo
[ 1026, 7938, 7812, 8326, 4360, 4493, 4367, 8848, 657, 10642, 1939, 2195, 1813, 2581, 3478, 6808, 11155, 7450, 10780, 1694, 6302, 7584, 802, 3618, 5410, 6691, 6947, 8354, 8355, 4011, 5931, 8364, 9646, 1717, 823, 9660, 2109, 11069, 10687, 10...
Test
5,645
3
Steamroller_(microarchitecture):steamroller microarchitecture amd steamroller family 15h microarchitecture developed amd amd apus succeeded piledriver beginning 2014 third-generation bulldozer-based microarchitecture steamroller apus continue use two-core modules predecessors aiming achieving greater levels parallelism steamroller still features two-core modules found bulldozer piledriver designs called clustered multi-thread cmt meaning one module equal dual-core processor focus steamroller greater parallelism improvements center independent instruction decoders core within module 25 maximum width dispatches per thread better instruction schedulers improved perceptron branch predictor larger smarter caches 30 fewer instruction cache misses branch misprediction rate reduced 20 dynamically resizable l2 cache micro-operations queue internal register resources improved memory controller amd estimated improvements increase instructions per cycle ipc 30 compared first-generation bulldozer core maintaining piledriver high clock rates decreased power consumption final result 9 single-threaded ipc improvement 18 multi-threaded ipc improvement piledriver steamroller microarchitecture cpus well graphics core next microarchitecture gpus paired together apu lines support features specified heterogeneous system architecture 2011 amd announced third-generation bulldozer-based line processors 2013 next generation bulldozer working title using 28 nm manufacturing process 21 september 2011 leaked amd slides indicated third generation bulldozer core codenamed steamroller january 2014 first kaveri apus became available starting may 2015 till march 2016 new apus launched kaveri-refresh codenamed godavari november 2013 amd confirmed would update fx series 2014 neither socket am3+ version receive steamroller version new socket amd server roadmaps 2014 showed however plans steamroller opteron products cancelled likely due poor energy efficiency achieved generation bulldozer architecture energy efficiency greatly increased following generation excavator exceeded jaguar performance per watt approximately doubled performance/watt steamroller example 20.74 pt/w vs 10.85 pt/w comparing similar mobile apus using rough arbitrary metrics
[ 3586, 8322, 5380, 9092, 9475, 6151, 8327, 10375, 638, 398, 6033, 9369, 7963, 9500, 4767, 2719, 9122, 5541, 11047, 2088, 2094, 11183, 6705, 9400, 833, 6978, 7234, 9541, 11080, 2764, 9551, 5329, 7122, 9427, 980, 9428, 473, 5859, 7783, 5356,...
None
5,646
4
McCumber_cube:mccumber cube 1991 john mccumber created model framework establishing evaluating information security information assurance programs known mccumber cube security model depicted three-dimensional rubik cube-like grid concept model developing information assurance systems organizations must consider interconnectedness different factors impact devise robust information assurance program one must consider security goals program see also goals relate specifically various states information reside system full range available security safeguards must considered design mccumber model helps one remember consider important design aspects without becoming focused one particular i.e. relying exclusively technical controls expense requisite policies end-user training per john mccumber website idea push back advance security art support structured methodology functions independent technology evolution basis methodology inter-relationship among confidentiality integrity availability storage transmission processing applying policy procedures human side technology
[ 7979 ]
Validation
5,647
2
Apple_Push_Notification_service:apple push notification service apple push notification service commonly referred apple notification service apns platform notification service created apple inc. enables third party application developers send notification data applications installed apple devices notification information sent include badges sounds newsstand updates custom text alerts first launched ios 3 june 17 2009 apns support local applications later added mac os x api beginning release mac os x 10.7 lion support website notifications later added release mac os x 10.9 mavericks apple announced service june 9 2008 original stated release september however stated scott forstall ios 3.0 preview event march 17 2009 rollout delayed decision restructure apns scalability purposes due allegedly overwhelming response announcement apns events forstall stated push notifications better conserve battery background processes used pull technology receiving notifications apns first launched together ios 3.0 june 17 2009 release ios 5.0 included notification center adding support receiving reading local notifications single place apns also added api mac os x 10.7 lion developers could begin updating third-party applications start utilizing service support later improved os x 10.8 mountain lion introduction notification center ios 5.0 improvement allowed users manage read received notifications single location release os x 10.9 mavericks included safari 7.0 added support accepting receiving apns notifications websites user granted permission 2014 maximum size allowed notification payload sent binary interface increased 256 bytes 2 kilobytes december 2015 new http/2 provider api released apple effectively replacing now-legacy binary interface maximum notification payload size allowed using http/2 api 4 kilobytes october 22 2014 apple announced would cease support ssl 3.0 october 29 2014 due poodle attack gained public attention shortly date developers required use tls protocol send notification using apns
[ 10755, 9732, 4615, 7697, 1042, 7701, 11289, 6186, 4139, 6700, 4657, 1074, 8754, 9784, 8253, 3657, 9802, 8783, 5713, 4180, 3670, 1623, 3672, 4184, 10838, 2141, 4702, 3681, 9826, 2149, 8806, 3691, 8303, 2673, 6771, 2676, 7292, 2686, 6783, 9...
Validation
5,648
0
Automated_Lip_Reading:automated lip reading automated lip reading alr software technology developed speech recognition expert frank hubner video image person talking analysed software shapes made lips examined turned sounds sounds compared dictionary create matches words spoken technology used successfully analyse silent home movie footage adolf hitler taken eva braun bavarian retreat berghof video words included documentary titled hitler private world revealed studios 2006 source new technology catches hitler guard
[ 1890, 10557, 4381, 3946 ]
Test
5,649
3
Kaby_Lake:kaby lake kaby lake intel codename processor microarchitecture intel announced august 30 2016 like preceding skylake kaby lake produced using 14 nanometer manufacturing process technology breaking intel previous tick–tock manufacturing design model kaby lake represents optimized step newer process-architecture-optimization model kaby lake began shipping manufacturers oems second quarter 2016 mobile chips started shipping kaby lake desktop chips officially launched january 2017 august 2017 intel announced kaby lake refresh kaby lake r marketed 8th generation mobile cpus breaking long cycle architectures matched corresponding generations cpus skylake anticipated succeeded 10 nanometer cannon lake announced july 2015 cannon lake delayed second half 2017 meantime intel released fourth 14 nm generation october 5 2017 named coffee lake kaby lake first intel platform lack official driver support versions windows older windows 10 furthermore windows update disabled windows 8.1 earlier although enthusiast-created modification released disabled check allowed continue work platform previous intel processors 8088 banias dothan conroe sandy bridge ivy bridge skylake kaby lake development led intel israeli team based haifa intel israel development centers manager ran senderovitz said started project thinking basic improvements previous generation began looking things differently lot innovation determination achieved major improvements added performance seventh generation chips improved 12 applications 19 internet use compared sixth generation chips third-party benchmarks confirm percentages far gaming concerned built improved 14 nm process 14ff+ kaby lake features faster cpu clock speeds clock speed changes higher turbo frequencies beyond process clock speed changes little cpu architecture changed skylake resulting identical ipc instructions per clock kaby lake features new graphics architecture improve performance 3d graphics 4k video playback adds native hdcp 2.2 support along fixed function decode h.264 hevc main main10/10-bit vp9 10-bit 8-bit video hardware encode supported h.264 hevc main10/10-bit vp9 8-bit video vp9 10-bit encode supported hardware opengl 4.6 opencl 2.1 supported kaby lake first core architecture support hyper-threading pentium-branded desktop cpu sku kaby lake also features first overclocking-enabled i3-branded cpu kaby lake features cpu core performance per mhz skylake features specific kaby lake include microsoft officially supports kaby lake computers running windows 10 per support policies windows update blocks updates installed kaby lake systems running versions older windows 10 support position intel provides chipset drivers windows 10 enthusiast-created modification released disabled windows update check allowed windows 8.1 earlier continue updated platform kaby lake critical flaw short loops may cause unpredictable system behavior issue fixed motherboard manufacturer releases bios update fix thermal design power tdp designed maximum heat generated chip running specific workload base clock single microarchitecture heat produced increases voltage frequency thermal design limit also limit maximum frequency processor however cpu testing binning allows products lower voltage/power particular frequency higher frequency within power limit desktop processors mobile processors features common desktop kaby lake cpus maximum pcie lanes 16 release date q1 2017 late 2016 reported intel working processor family codenamed “ kaby lake r ” r stands refresh august 21 2017 eighth generation mobile cpus announced first products released four kaby lake r processors 15w tdp marketing distinct previous generational changes core product line new generation coincided new microarchitecture intel stated 8th generation would based multiple microarchitectures including kaby lake coffee lake cannon lake maximum number pcie lanes 8 release date q1 2018 august 28 2018 intel announced refreshed lineup ultra low power mobile kaby lake cpus moniker amber lake
[ 3459, 5380, 3973, 8325, 9092, 9095, 5386, 9611, 4108, 9741, 398, 8719, 5649, 7313, 5523, 6804, 8851, 4886, 407, 3352, 9111, 9500, 5883, 10361, 2339, 10019, 1832, 2088, 10669, 2350, 9391, 10675, 4276, 1461, 10548, 2237, 5309, 8125, 8126, 8...
Test
5,650
7
Yandex_Disk:yandex disk yandex.disk cloud service created yandex lets users store files “ cloud ” servers share others online service based syncing data different devices yandex.disk launched english june 2012 storage — users upload save files restrictions length time files stored files uploaded encrypted connection checked antivirus syncing — files synced user internet-enabled devices either web interface yandex.disk mobile/desktop application sharing — users share file download links others preview — built-in flash player lets people preview songs integration yandex services — lets people manage files yandex services yandex.mail yandex.narod sent received mail attachments automatically placed one folder easily searched webdav support — means files managed application supporting webdav protocol yandex.disk api used software program supporting webdav web version located inside yandex.mail “ files ” tab applications available following operating systems mobile version included part yandex.mail mobile app lets users view files yandex.disk upload files mobile device download files use offline email file download links yandex.disk api also supports webdav protocol allows third-party applications upload files yandex cloud storage service yandex.disk api makes easier sync info smartphones tablet pcs laptops desktop computers api lets developers yandex.disk api documentation released april 28 2012 service provided completely free charge everyone starts free allowance 10gb easily increased 512 mb increments referring others additional maximum 10 gb 20 gb total also additional storage paid monthly yearly basis choose enable device auto-uploads using yandex.disk app android ios granted additional 32 gb free storage increases maximum storage 10 gb 42 gb april 5 2012 – beta version service launched may 3 2012 – first api open source client launched may 24 2012 – flash player introduced web interface “ save disk ” button added shared file page allows users share files published others account june 26 2012 – english turkish versions available
[ 4194, 4869, 2694, 4710, 6565, 7238, 4970, 10054, 10185, 823, 6797, 4623, 4911, 7983, 10161, 1239, 2267 ]
Test
5,651
9
Off-side_rule:off-side rule computer programming language said adhere off-side rule blocks language expressed indentation term coined peter j. landin offside rule football contrasted free-form languages notably curly-bracket programming languages indentation meaningful indent style matter convention code formatting peter j. landin article called next 700 programming languages defined off-side rule thus non-whitespace token left first token previous line taken start new declaration following example indentation blocks python colons part python language syntax readability necessary implement off-side rule python rule taken define boundaries statements rather declarations python also suspends off-side rule within brackets statement within brackets continues brackets match mismatch off-side rule implemented lexical analysis phase python increasing indentation results lexer outputting indent token decreasing indentation results lexer outputting dedent token tokens correspond opening brace codice_1 closing brace codice_2 languages use braces blocks means phrase grammar depend whether braces indentation used requires lexer hold state namely current indentation level thus detect changes indentation changes thus lexical grammar context-free – indent/dedent depend contextual information previous indentation level primary alternative delimiting blocks popularized c ignore whitespace mark blocks explicitly curly brackets i.e. codice_1 codice_2 delimiter allows freedom – developer might choose indent small pieces code like break continue statements – sloppily indented code might lead reader astray lisp s-expression based languages differentiate statements expressions parentheses enough control scoping statements within language curly bracket languages whitespace mostly ignored reader i.e. read function whitespace used separate tokens explicit structure lisp code allows perform automatic indentation acts visual cue human lisp readers another alternative block begin end explicit keywords example algol 60 descendant pascal blocks start keyword codice_5 end keyword codice_6 languages pascal means newlines important unlike curly brace languages indentation basic fortran blocks begin block name codice_7 end block name prepended codice_8 e.g. codice_9 fortran every block also unique block name adds additional level explicitness lengthy code algol 68 bourne shell sh bash similar ending block usually given name block written backward e.g. codice_10 starts switch statement spans matching codice_11 similarly conditionals codice_12 ... codice_13 ... codice_14 ... codice_15 ... codice_16 loops codice_17 ... codice_18 ... codice_19 algol68 codice_17 ... codice_18 ... codice_22 bash interesting variation made modula-2 pascal-like language away difference one multiline blocks allows block opener codice_1 codice_24 skipped function level block requiring block terminating token codice_2 codice_8 also fixes dangling else custom codice_6 token placed indentation level rest block giving blockstructure readable one advantage fortran approach improves readability long nested otherwise complex code group outdents closing brackets alone provide contextual cues blocks closed necessitating backtracking closer scrutiny debugging addition languages allow suffix end-like keywords improve cues codice_28 versus codice_29 however modern code editing applications often provide visual indicators features folding assist drawbacks
[ 9345, 2691, 5635, 9224, 2316, 5395, 9626, 1947, 3613, 6558, 4770, 10786, 3876, 4398, 2352, 3120, 5680, 9780, 1333, 1591, 4410, 443, 191, 963, 8262, 8775, 9926, 2505, 1610, 1611, 4042, 8524, 5845, 7421, 477, 7395, 228, 7805, 4838, 6502, ...
Test
5,652
5
Ephemeral_port:ephemeral port ephemeral port short-lived transport protocol port internet protocol ip communications ephemeral ports allocated automatically predefined range ip stack software ephemeral port typically used transmission control protocol tcp user datagram protocol udp stream control transmission protocol sctp port assignment client end client–server communication well-known port server servers ephemeral ports may also used port assignment server end communication done continue communications client initially connected one server well-known service listening ports file transfer protocol ftp remote procedure call rpc applications two protocols behave manner note term server includes workstations running network services receive connections initiated clients e.g remote desktop protocol allocations temporary valid duration communication session completion timeout communication session ports become available reuse since ports used per request basis also called dynamic ports internet assigned numbers authority iana suggests range 49152 65535 2+2 2−1 dynamic private ports many linux kernels use port range 32768 61000 freebsd used iana port range since release 4.6 previous versions including berkeley software distribution bsd use ports 1024 5000 ephemeral ports microsoft windows operating systems xp use range 1025–5000 ephemeral ports default windows vista windows 7 server 2008 use iana range default windows server 2003 uses range 1025–5000 default microsoft security update ms08-037 2008 installed uses iana range default windows server 2008 exchange server 2007 installed default port range 1025–60000 addition default range versions windows since windows 2000 option specifying custom range anywhere within 1025–65535 certain server software used uses non ephemeral custom port ranges initiating connections needs ensured configuration custom port range ephemeral port range overlap
[ 5472, 8386, 7364, 4074, 4490, 10924, 6797, 6993, 11413, 1942, 10747, 6650, 5531, 3006, 9151 ]
Train
5,653
5
SMART_Multicast:smart multicast smart multicast experimental method secure reliable ip multicast allows user forward ip datagrams unlimited group receivers see article multicast general discussion subject article specifically smart ip multicast ip multicast successfully deployed private controlled networking environments example ip fiber cable tv operators educational institutions significant on-campus student housing financial sector applications stock tickers hoot-n-holler systems however ip multicast slow adopted interdomain routing environment current interdomain infrastructure lacks necessary tools efficiently handle packet loss security needed create functional business model smart ip multicast experimental protocol enables interdomain transmission secure reliable ip multicast thus overcoming challenges deploying wide area interdomain ip multicast transmissions smart ip multicast reduces complexity deploying wide area ip multicast way mftp multicast file transfer protocol accomplishes goal file transfer namely allowing security reliability full interoperability ip multicast file distribution successful use ip multicast within campus commercial networks file distribution used variant experimental protocol mftp multicast file transfer protocol mftp secure reliable runs top ip multicast protocol like mftp smart multicast wrapper runs top ip multicast taking advantage ip multicast efficiency smart multicasts secure reliable provide bi-directional feedback info see rfc3170 ip multicast applications challenges solutions smart supports mbone like implementation multicast sites use dynamically allocated multicast tunnels smart takes advantage simple self implementing multicast protocol level escalation four forms ip addressing unique properties
[ 10402, 1411, 7908, 2509, 1197, 11413, 10461 ]
Validation
5,654
7
P-GRADE_Portal:p-grade portal p-grade grid portal software web portals manage life-cycle executing parallel application grid computing developed laboratory parallel distributed systems lpds hungarian academy sciences hungary building onto gridsphere portal framework p-grade portal hides details grid systems high-level interfaces integrated middleware offers portlet based access following services p-grade portal allows multi-user development execution workflows also provides support workflow level grid interoperation portal supports various middleware technologies including globus toolkit egee lcg glite advanced resource connector p-grade portal developed gnu general public license online tutorials videos documents available p-grade portal site release p-grade grid portal version 2.10 2.9 version introduced features portable batch system pbs platform lsf cluster support edges 3g bridge resource support local ps port support extended nordugrid arc support p-grade portal served grid communities research industry providing access grids including application specific portals created adding application specific portlets p-grade portal omitting generic purpose portlets hiding underlying workflow within application specific portlet applications include grid application support centre gasuc established 2008 within laboratory parallel distributed systems supported part european grid infrastructure gasuc provides assistance porting legacy applications onto grid infrastructures
[ 3331, 5956, 1862, 198, 11658, 5612, 7983, 8370, 11353, 6042 ]
Test
5,655
3
Minimal_instruction_set_computer:minimal instruction set computer minimal instruction set computer misc processor architecture small number basic operations corresponding opcodes instruction sets commonly stack-based rather register-based reduce size operand specifiers stack machine architecture inherently simpler since instructions operate top-most stack entries result stack architecture overall smaller instruction set smaller faster instruction decode unit overall faster operation individual instructions separate stack definition misc architecture misc architecture defined respect number instructions supported also instruction pipelines misc rule tend simple instruction pipelines branch prediction out-of-order execution register renaming speculative execution broadly exclude cpu classified misc architecture system first digital computers implemented instruction sets modern definition minimal instruction set computers among various computers illiac ordvac compatible instruction sets early stored-program computers disadvantage misc instructions tend sequential dependencies reducing overall instruction-level parallelism misc architectures much common forth programming language java virtual machine weak providing full instruction-level parallelism probably commercially successful misc original inmos transputer architecture floating-point unit however many eight-bit microcontrollers embedded computer applications fit category stereo spacecraft includes two p24 misc cpus two cpu24 misc cpus
[ 7173, 9739, 2066, 7699, 10779, 10781, 6181, 8231, 3630, 6705, 7218, 2623, 2113, 7234, 3142, 2638, 1122, 3175, 8815, 630, 8822, 6268, 3197, 7313, 6815, 8352, 5793, 6818, 6821, 7852, 9391, 2224, 2226, 7858, 9911, 8890, 4286, 2241, 2243, 993...
Test
5,656
2
Installwatch:installwatch installwatch program designed make easier catalog maintain software installed source code originally developed stand-alone project installwatch exists primarily component checkinstall installwatch originally written pancrazio 'ezio de mauro 1998 development later taken felipe sánchez installwatch allows user monitor files directories created installation software package real-time allows user know exactly installed system purposes documentation later removal software used installwatch limited usefulness create log installation process felipe sánchez created checkinstall takes information generated installwatch uses create installable package used linux distribution makes use debian slackware red hat package management systems use checkinstall largely superseded installwatch alone installwatch merged checkinstall distribution older stand-alone versions installwatch still remain primarily historical educational purposes present version installwatch packaged checkinstall incompatible current version gnu coreutils core utilities installwatch ca n't monitor changes made coreutils rendering logs incomplete depending software package may completely invalidate information provided installwatch thus program depends checkinstall issue documented slackware 12 changelog prompted checkinstall removal distribution august 3 2007 problem explained detailed felipe sánchez checkinstall mailing list updated version checkinstall promised coming soon address issue meantime workaround suggested
[ 5923, 10149, 5096, 9455, 5397 ]
Validation
5,657
4
Packet_crafting:packet crafting packet crafting technique allows network administrators probe firewall rule-sets find entry points targeted system network done manually generating packets test network devices behaviour instead using existing network traffic testing may target firewall ids tcp/ip stack router component network packets usually created using packet generator packet analyzer allows specific options flags set created packets act packet crafting broken four stages packet assembly packet editing packet play packet decoding tools exist stages tools focussed one stage others ostinato try encompass stages packet assembly creation packets sent popular programs used packet assembly hping nemesis ostinato cat karat packet builder libcrafter libtins pcapplusplus scapy wirefloss yersinia packets may protocol designed test specific rules situations example tcp packet may created set erroneous flags ensure target machine sends reset command firewall blocks response packet editing modification created captured packets involves modifying packets manners difficult impossible packet assembly stage modifying payload packet programs scapy ostinato netdude allow user modify recorded packets fields checksums payloads quite easily modified packets saved packet streams may stored pcap files replayed later packet play packet replay act sending pre-generated captured series packets packets may come packet assembly editing captured network attacks allows testing given usage attack scenario targeted network tcpreplay common program task since capable taking stored packet stream pcap format sending packets original rate user-defined rate scapy also supports send functions replay saved packets/pcap ostinato added support pcap files version 0.4 packet analyzers also capable packet replay packet decoding capture analysis network traffic generated packet play order determine targeted network response scenario created packet play response must captured packet analyzer decoded according appropriate specifications depending packets sent desired response may packets returned connection successfully established among others famous tools task wireshark scapy
[ 9440, 418, 8998, 1064, 2569, 842, 6345, 7901, 11486, 8694, 5245, 11006 ]
Test
5,658
3
Transaction_processing:transaction processing transaction processing information processing computer science divided individual indivisible operations called transactions transaction must succeed fail complete unit never partially complete example purchase book online bookstore exchange money form credit book credit good series related operations ensures get book bookstore gets money however single operation series fails exchange entire exchange fails get book bookstore get money technology responsible making exchange balanced predictable called transaction processing transactions ensure data-oriented resources permanently updated unless operations within transactional unit complete successfully combining set related operations unit either completely succeeds completely fails one simplify error recovery make one application reliable transaction processing systems consist computer hardware software hosting transaction-oriented application performs routine transactions necessary conduct business examples include systems manage sales order entry airline reservations payroll employee records manufacturing shipping since though necessarily transaction processing today interactive term often treated synonymous online transaction processing transaction processing designed maintain system integrity typically database modern filesystems known consistent state ensuring interdependent operations system either completed successfully canceled successfully example consider typical banking transaction involves moving 700 customer savings account customer checking account transaction involves least two separate operations computer terms debiting savings account 700 crediting checking account 700 one operation succeeds books bank balance end day must therefore way ensure either operations succeed fail never inconsistency bank database whole transaction processing links multiple individual operations single indivisible transaction ensures either operations transaction completed without error none operations completed errors occur others attempted transaction-processing system rolls back operations transaction including successful ones thereby erasing traces transaction restoring system consistent known state processing transaction began operations transaction completed successfully transaction committed system changes database made permanent transaction rolled back done transaction processing guards hardware software errors might leave transaction partially completed computer system crashes middle transaction transaction processing system guarantees operations uncommitted transactions cancelled generally transactions issued concurrently overlap i.e need touch portion database create conflicts example customer mentioned example 150 savings account attempts transfer 100 different person time moving 100 checking account one succeed however forcing transactions processed sequentially inefficient therefore concurrent implementations transaction processing programmed guarantee end result reflects conflict-free outcome could reached executing transactions sequentially order property called serializability example means matter transaction issued first either transfer different person move checking account succeeds one fails basic principles transaction-processing systems however terminology may vary one transaction-processing system another terms used necessarily universal transaction-processing systems ensure database integrity recording intermediate states database modified using records restore database known state transaction committed example copies information database prior modification transaction set aside system transaction make modifications sometimes called image part transaction fails committed copies used restore database state transaction began also possible keep separate journal modifications database management system sometimes called images required rollback failed transactions useful updating database management system event database failure transaction-processing systems provide database management system fails entirely must restored recent back-up back-up reflect transactions committed since back-up made however database management system restored journal images applied database rollforward bring database management system date transactions progress time failure rolled back result database consistent known state includes results transactions committed moment failure cases two transactions may course processing attempt access portion database time way prevents proceeding example transaction may access portion x database transaction b may access portion database point transaction tries access portion database transaction b tries access portion x deadlock occurs neither transaction move forward transaction-processing systems designed detect deadlocks occur typically transactions cancelled rolled back started different order automatically deadlock n't occur sometimes one deadlocked transactions cancelled rolled back automatically restarted short delay deadlocks also occur among three transactions transactions involved difficult detect point transaction processing systems find practical limit deadlocks detect systems commit rollback mechanisms available undesirable compensating transaction often used undo failed transactions restore system previous state jim gray defined properties reliable transaction system late 1970s acronym acid — atomicity consistency isolation durability transaction changes state atomic either happen none happen changes include database changes messages actions transducers consistency transaction correct transformation state actions taken group violate integrity constraints associated state even though transactions execute concurrently appears transaction others executed either transaction completes successfully commits changes database survive failures retain changes transaction processing benefits standard transaction-processing software ibm information management system first developed 1960s often closely coupled particular database management systems client–server computing implemented similar principles 1980s mixed success however recent years distributed client–server model become considerably difficult maintain number transactions grew response various online services especially web single distributed database practical solution addition online systems consist whole suite programs operating together opposed strict client–server model single server could handle transaction processing today number transaction processing systems available work inter-program level scale large systems including mainframes one effort x/open distributed transaction processing dtp see also java transaction api jta however proprietary transaction-processing environments ibm cics still popular although cics evolved include open industry standards well term extreme transaction processing xtp used describe transaction processing systems uncommonly challenging requirements particularly throughput requirements transactions per second systems may implemented via distributed cluster style architectures used least 2011
[ 9224, 8201, 3594, 2068, 1049, 3609, 9248, 9762, 8229, 10793, 10286, 11324, 1606, 3142, 2632, 9286, 9290, 8788, 10326, 7767, 2138, 8282, 4194, 9828, 10340, 8808, 2669, 11377, 6772, 9335, 8825, 1146, 3196, 9343, 11393, 10389, 4255, 4263, 1041...
Test
5,659
2
Nokia_E70:nokia e70 nokia e70 candybar/fold keyboard type smartphone eseries range announced october 2005 released may 2006 two models phone e70-1 world market tri-band 900 1800 1900 mhz gsm umts e70-2 americas tri-band 850 1800 1900 mhz gsm edge packet data capability models use s60 platform 3rd edition top symbian os version 9.1 e70 business version/successor nokia 6800 series 6800 6810 6820 6822 nokia e70 aimed high-end professional market 16 million color screen 352×416 pixel totalling 146,432 pixels resolution e70 capable gsm wifi bluetooth connectivity sip voip functionality currently work firewall router configurations nokia made statement working implementing stun originally planned 2006 available e70-1 april 2012 turn ice also planned 2007 available june 2008 well advanced bluetooth capabilities phone capable connecting six devices simultaneously lacks a2dp support
[ 1537, 4609, 8577, 3205, 11655, 9359, 1424, 529, 2449, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 8472, 669, 11545, 10271, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 7214, 690, 10802, 7220, 821, 9909, 5175, 7866, 1083, 1728, 7617, 4291,...
Test
5,660
8
AWS_Elastic_Beanstalk:aws elastic beanstalk aws elastic beanstalk orchestration service offered amazon web services deploying applications orchestrates various aws services including ec2 s3 simple notification service sns cloudwatch autoscaling elastic load balancers elastic beanstalk provides additional layer abstraction bare server os users instead see pre-built combination os platform 64bit amazon linux 2014.03 v1.1.0 running ruby 2.0 puma 64bit debian jessie v2.0.7 running python 3.4 preconfigured docker deployment requires number components defined 'application logical container project 'version deployable build application executable 'configuration template contains configuration information beanstalk environment product finally 'environment combines 'version 'configuration deploys executables uploaded archive files s3 beforehand 'version pointer supported applications software stacks include application performance monitoring automatic upscaling downscaling better performance fault-tolerant applications robust security features user authentication increased availability application supported deployment methods include
[ 8962, 8451, 6027, 7054, 9245, 11038, 11556, 6438, 2217, 5677, 7983, 10681, 11201, 8644, 5960, 10185, 590, 7248, 1363, 4439, 7512, 8921, 2910, 735, 865, 1001, 8554, 3573, 8181 ]
Test
5,661
6
Wear_leveling:wear leveling wear leveling also written wear levelling technique prolonging service life kinds erasable computer storage media flash memory used solid-state drives ssds usb flash drives phase-change memory several wear leveling mechanisms provide varying levels longevity enhancement memory systems term preemptive wear leveling pwl used western digital describe preservation technique used hard disk drives hdds designed storing audio video data however hdds generally wear-leveled devices context article eeprom flash memory media individually erasable segments put limited number erase cycles becoming unreliable usually around 3,000/5,000 cycles many flash devices one block specially extended life 100,000+ cycles used flash memory controller track wear movement data across segments erasable optical media cd-rw dvd-rw rated 1,000 cycles 100,000 cycles dvd-ram media wear leveling attempts work around limitations arranging data erasures re-writes distributed evenly across medium way single erase block prematurely fails due high concentration write cycles flash memory single block chip designed longer life others memory controller store operational data less chance corruption conventional file systems fat ufs hfs ext2 ntfs originally designed magnetic disks rewrite many data structures directories repeatedly area systems used flash memory media becomes problem problem aggravated fact file systems track last-access times lead file metadata constantly rewritten in-place three basic types wear leveling mechanisms used flash memory storage devices flash memory storage system wear leveling last long data written flash without wear leveling underlying flash controller must permanently assign logical addresses operating system os physical addresses flash memory means every write previously written block must first read erased modified re-written location approach time-consuming frequently written locations wear quickly locations used blocks reach end life device becomes inoperable first type wear leveling called dynamic wear leveling uses map link logical block addresses lbas os physical flash memory time os writes replacement data map updated original physical block marked invalid data new block linked map entry time block data re-written flash memory written new location however flash memory blocks never get replacement data would sustain additional wear thus name comes dynamic data recycled device may last longer one wear leveling blocks still remaining active even though device longer operable type wear leveling called static wear leveling also uses map link lba physical memory addresses static wear leveling works dynamic wear leveling except static blocks change periodically moved low usage cells able used data rotational effect enables ssd continue operate blocks near end life also sometimes referred global wear leveling entire image leveled following table compares static dynamic wear leveling several techniques extending media life specialist secure digital cards techniques implemented hardware built-in microcontroller devices wear leveling transparent conventional file systems used as-is wear leveling also implemented software special-purpose file systems jffs2 yaffs flash media udf optical media three log-structured file systems treat media circular logs write sequential passes file systems implement copy-on-write strategies zfs also implement form wear leveling
[ 5120, 1801, 7818, 2193, 11667, 2197, 9762, 5286, 935, 1193, 9004, 3629, 6062, 6575, 7983, 6961, 8114, 3124, 8643, 8772, 5967, 346, 2395, 6494, 2015, 6263, 9343 ]
None
5,662
7
OpenNebula_Systems:opennebula systems opennebula systems formerly c12g labs international software company develops provides commercial support open source cloud management platform opennebula.the company first established 2010 c12g labs based madrid c12g founded original developers opennebula october 15 2014 c12g announced would change name opennebula systems associating closely product may 2015 opennebula systems created subsidiary us opennebula systems usa llc located cambridge massachusetts
[ 4236, 10893, 911, 1935, 4623, 8592, 2965, 2328, 4377, 8986, 6307, 9766, 5159, 6444, 8495, 3121, 7352, 2496, 4289, 1224, 8520, 4429, 7248, 1362, 467, 9682, 6367, 4194, 11646, 5732, 10090, 3819, 7660, 2170, 5499, 253, 8446 ]
Validation
5,663
9
Free_Pascal:free pascal free pascal compiler fpc compiler closely related programming-language dialects pascal object pascal free software released gnu general public license exception clauses allow static linking runtime libraries packages purpose combination software license supports object pascal dialect well dialects several pascal family compilers certain extent including turbo pascal delphi historical macintosh compilers dialect selected per-unit module basis one dialect used per program follows write compile anywhere philosophy available many cpu architectures operating systems see targets supports inline assembly language includes internal assembler capable parsing several dialects intel style separate projects exist facilitate developing cross-platform graphical user interface gui applications prominent one lazarus integrated development environment ide initially free pascal adopted de facto standard dialect pascal programmers borland pascal later adopted delphi version 2.0 delphi compatibility continuously implemented improved project compilation mode concept developers made clear would incorporate working patches standardized dialects american national standards institute ansi international organization standardization iso create standards-compliant mode small effort made support apple pascal syntax ease interfacing classic mac os macos since apple dialect implements standard pascal features turbo pascal delphi omit free pascal bit iso-compatible 2.2 x release series significantly change dialect objectives beyond roughly delphi 7 level syntax instead aiming closer compatibility notable exception addition support generics free pascal version 2.2.0 several years supported capacity delphi several delphi 2006-specific features added development branch starting work features new delphi 2009 notably addition codice_1 type completed development branch also features objective-pascal extension objective-c cocoa interfacing version 2.7.1 free pascal implemented basic iso pascal mode though many things codice_2 codice_3 procedure file-buffer variable concept file handling still absent version 3.0.0 iso pascal mode fairly complete one remaining bug since fixed trunk branch able compile standardpascal.org p5 iso pascal compiler changes free pascal created borland clarified borland pascal development dos would stop version 7 replaced windows-only product later became delphi student florian paul klämpfl began developing compiler written turbo pascal dialect produced 32-bit code go32v1 dos extender used developed dj gnu programming platform djgpp project time originally compiler 16-bit dos executable compiled turbo pascal two years compiler able compile became 32-bit executable initial 32-bit compiler published internet first contributors joined project later linux port created michael van canneyt five years borland kylix compiler became available dos port adapted use os/2 using eberhard mattes extender emx made os/2 second supported compiling target well florian klämpfl original author daniël mantione also contributed significantly make happen providing original port run-time library os/2 emx compiler improved gradually dos version migrated go32v2 extender culminated release 0.99.5 much widely used prior versions last release aiming turbo pascal compliance later releases added delphi compatibility mode release also ported systems using motorola 68000 family m68k processors release 0.99.8 win32 target added start made incorporating delphi features stabilizing non-beta release began version 1.0 released july 2000 1.0 x series widely used business education 1.0 x releases port 68k cpu redone compiler produced stable code several 68k unix-like amigaos operating systems stabilization would become 1.0 x also porting motorola 68k systems clear design code generator far limited many aspects principal problems adding processors meant rewriting code generator register allocation based principle always keeping three free registers building blocks inflexible difficult maintain reasons 1.1 x series branched 1.0 x main branch december 1999 first changes mostly clean-ups rewrite-redesigns parts compiler code generator register allocator also rewritten remaining missing delphi compatibility added work 1.1.x continued slowly steadily late 2003 working powerpc port became available followed arm port summer 2004 sparc port fall 2004 x86-64-amd64 port early 2004 made compiler available 64-bit platform november 2003 first beta release 1.1 x branch packaged numbered 1.9.0 quickly followed versions 1.9.2 1.9.4 latter introduced os x support work continued version 1.9.6 january 2005 1.9.8 late february 2005 2.0.0 may 2005 2.0.2 december 2005 2.0.4 august 2006 2006 major reworks planned 2.2 rewrite unit system still begun decided instead start stabilizing already implemented features motives roadmap change needs lazarus integrated development environment project particularly internal linker support win64 windows ce os x x86 related features like dwarf betas 2.1.2 2.1.4 version 2.2.0 released september 2007 followed version 2.2.2 august 2008 version 2.2.4 march 2009 2.2 x series vastly improved support activex component object model com interface object linking embedding ole though bugs still found delegation interface using codice_4 keyword partly implemented complete library support activex also improved another major feature internal linker win32 win64 windows ce greatly improveď linking time memory use make compile-link-run cycle lazarus much faster efficiency smart-linking dead code elimination also improved minor new features included improved dwarf 2/3 debug format support optimizations tail recursion omission unneeded stack frames register-based common subexpression elimination cse optimization first implementation generic programming generics support also became available experimentally 2.4.x release series less clear set goals earlier releases unit system rewrite postponed branch became 2.4 created keep risky commits 2.2 stabilize mostly risky commits involved improvements new platforms mac powerpc 64 mac x86-64 iphone many fixes arm x86-64 architectures general well dwarf compiler improvements included whole program optimization wpo devirtualization arm embedded-application binary interface eabi support later 2.2 cycle delphi-like resource support based special sections binary instead pascal constants added feature direly needed lazarus became main highlight branch minor additions memory manager improved heap manager performance threaded environments small improvements delphi compatibility codice_5 improvements interface delegation january 1 2010 free pascal 2.4.0 released followed november 13 2010 bug fix release 2.4.2 support codice_6 loops codice_7 codice_8 classes changes january 2012 free pascal 2.6 released first version 2.6 release series also supported objective pascal os x ios targets implemented many small improvements bug fixes february 2013 fpc 2.6.2 released contained netbsd openbsd releases first time since 1.0.10 based fresh ports march 2014 last point release 2.6 series 2.6.4 launched featuring mostly database fcl-db updates. br version 3.0.0 released november 25 2015 first major release since january 1 2012 contains many new language features fpc new features 3.0 version 3.0.2 released february 15 2017 includes bug fixes minor compiler updates. br version 3.0.4 released november 28 2017. br includes many language improvements previous versions like internal linker executable linkable format elf arm aarch64 ios linux revived i8086 platform extended libraries much free pascal also supports byte code generation java virtual machine version 3.0.0 targets oracle java google android jvm although object pascal syntax fully supported free pascal 3.0.0 also supports armhf platforms like raspberry pi including armv6-eabihf running raspbian mips work 64-bit arm resulted support ios 3.0.0 well native arm android target added ending formerly hacked arm linux target generate native arm libraries android makes porting lazarus applications android using custom drawn interface easier since fpc 2.6.2 openbsd netbsd supported ia32 x86_64 architectures new target embedded added usage without os arm cortex mips mainly instantfpc possible run pascal programs translated time unix scripts cgi back-end like modern compilers free pascal used integrated development environment ide besides independent ides also plugins various existing ides apart compiler ide free pascal provides following libraries
[ 512, 6154, 1556, 546, 5154, 3114, 5684, 9272, 576, 7234, 585, 1101, 2658, 10851, 9320, 8303, 1145, 5754, 6797, 11411, 3734, 682, 2224, 4791, 11447, 7355, 1724, 8385, 6338, 8909, 10971, 10470, 5356, 9964, 10478, 5872, 2290, 4341, 9981, 691...
Test
5,664
5
Chirp_spread_spectrum:chirp spread spectrum digital communications chirp spread spectrum css spread spectrum technique uses wideband linear frequency modulated chirp pulses encode information chirp sinusoidal signal frequency increase decrease time often polynomial expression relationship time frequency picture example upchirp frequency increases linearly time sometimes frequency upchirps increase exponentially time spread spectrum methods chirp spread spectrum uses entire allocated bandwidth broadcast signal making robust channel noise chirps utilize broad band spectrum chirp spread spectrum also resistant multi-path fading even operating low power however unlike direct-sequence spread spectrum dsss frequency-hopping spread spectrum fhss add pseudo-random elements signal help distinguish noise channel instead relying linear nature chirp pulse additionally chirp spread spectrum resistant doppler effect typical mobile radio applications chirp spread spectrum originally designed compete ultra-wideband precision ranging low-rate wireless networks 2.45 ghz band however since release ieee 802.15.4a also known ieee 802.15.4a-2007 longer actively considered ieee standardization area precision ranging chirp spread spectrum ideal applications requiring low power usage needing relatively low data rates 1 mbit/s less particular ieee 802.15.4a specifies css technique use low-rate wireless personal area networks lr-wpan however whereas ieee 802.15.4-2006 standard specifies wpans encompass area 10 less ieee 802.15.4a-2007 specifies css physical layer used longer ranges devices moving high speeds part network nanotron css implementation actually seen work range 570 meters devices nanotron implementation work data rates 2 mbit/s higher specified 802.15.4a finally ieee 802.15.4a phy standard actually mixes css encoding techniques differential phase shift keying modulation dpsk achieve better data rates chirp spread spectrum may also used future military applications difficult detect intercept operating low power similar frequency swept waveforms used frequency modulated continuous wave radars measure range distance unmodulated continuous wave doppler radar measure range-rate relative velocity along line sight fm-cw radars widely used radio altimeters aircraft
[ 11267, 3847, 9863, 2057, 10381, 1550, 2968, 2458, 5020, 11686, 7723, 11181, 1969, 2994, 5304, 7490, 3140, 7108, 11591, 5321, 7498, 3040, 1121, 3168, 8160, 2920, 7400, 2802 ]
Test
5,665
4
Havex:havex havex malware also known backdoor.oldrea rat employed russian attributed apt group “ energetic bear ” “ dragonfly havex discovered 2013 one five known ics tailored malware developed past decade malwares include stuxnet blackenergy industroyer/crashoveride triton/trisis energetic bear began utilizing havex widespread espionage campaign targeting energy aviation pharmaceutical defense petrochemical sectors campaign targeted victims primarily united states europe havex malware discovered researchers cybersecurity researchers f-secure symantec reported ics-cert utilizing information firms 2014 ics-cert alert reported analyzing new malware campaign targeting ics equipment via several attack vectors using opc conduct reconnaissance industrial equipment target network havex malware two primary components rat c c server written php havex also includes opc open platform communications scanning module used search industrial devices network opc scanning module designed scan tcp devices operating ports 44818 105 502 researchers sans noted ports common ics/scada companies siemens rockwell automation abusing opc protocol havex mapped industrial networks inside victim systems researchers note opc scanning module operated older dcom-based distributed component object model opc standard recent opc unified architecture ua havex joins category ics tailored malware written conduct information gathering specific systems havex also exploited supply chain watering-hole attacks ics vendor websites addition spear phishing campaigns gain access victim systems.the watering-hole supply chain attacks twofold methodology first method victims redirected legitimate vendor websites corrupted pages containing havex malware second method attackers compromised vulnerable vendor websites corrupted legitimate software inject havex rat users would unknowingly download malware downloading otherwise legitimate software vendor websites.this method allowed malware bypass traditional security measure software downloaded users authorization install programs onto network known compromised vendors mesa imaging ewon/talk2m mb connect line attack vectors aimed business networks lack robust airgaps many ics environments could allow malware like havex jump easily business networks industrial networks infect ics/scada equipment havex like backdoor malwares also allows injection malicious code onto victim devices specifically havex often used inject karagany payload onto compromised devices karagany could steal credentials take screenshots transfer files dragonfly c c servers dragonfly group utilized havex malware espionage campaign energy aviation pharmaceutical defense petrochemical victims primarily united states europe cybersecurity researchers dragos estimated campaign targeted 2,000 sites regions sectors researchers symantec observed havex malware began seeking energy infrastructure targets initially targeting us canadian defense aviation sectors discovery process researchers examined 146 c c servers associated havex campaign 88 variants malware havex infected systems via watering hole attacks redirecting users malicious websites corrupted websites campaign used lightsout hello exploit kits infect systems havex karagany trojans lightsout exploit kit abused java browser vulnerabilities deliver havex karagany payloads hello exploit kit updated version lightsout exploit kit came use 2013 updated hello exploit kit uses footprinting determine target os versions fonts browser add-ons user information information gathered exploit kit redirects victim malicious url based efficient exploits gain access target
[ 2945, 9537, 3843, 9569, 10024, 971, 11662, 4081, 11607, 5337 ]
Test
5,666
7
Microsoft_Azure_Web_Sites:microsoft azure web sites microsoft azure web sites cloud computing based platform hosting websites created operated microsoft microsoft azure web sites platform service paas allows publishing web apps running multiple frameworks written different programming languages .net node.js php python java including microsoft proprietary ones 3rd party ones microsoft azure web sites became available first preview version june 2012 official version general availability announced june 2013 microsoft azure web sites originally named windows azure web sites renamed part re-branding move across azure march 2014 subsequently renamed app services march 2015 microsoft azure web sites web-hosting platform supports multiple technologies programming languages .net node.js php python users microsoft azure subscriptions create websites deploy content code web sites microsoft azure web sites supports website creation wizard allows user create blank site create site based one several available pre-configured images website gallery part creating website site url assigned subdomain azurewebsites.net various for-pay tiers website assigned one custom domains implemented setting cname record dns server hosts user domain zone point user web site hosted azure for-pay tiers user added option uploading ssl certificate configuring site bound https site created user add modify content using multiple deployment methods including web deploy msdeploy tfs via visual studio ftp ftps webmatrix codeplex github dropbox bitbucket mercurial local git features azure web sites microsoft azure web sites implemented websites dynamically created on-demand servers running windows server 2012 iis 8.0 client posts request web site microsoft azure web sites dynamically provisions site one azure virtual machines pointing content stored azure storage containers azure virtual machines deployed groups called stamps may contain hundreds machines microsoft deploys stamps azure data centers across world adds stamps demand grows azure web sites services offered 4 tiers entry-level tier free tier free tier supports 10 websites 1 gb content storage limited 165 mb daily data egress first for-pay tier shared tier shared tier sites support custom domains scaled 6 instances current highest for-pay tier standard tier standard tier websites run vms dedicated exclusively single customer websites standard tier supports ssl sni ip-based scaling 10 instances file storage 50 gb content basic standard tier websites deployed 3 sizes virtual machines small vms 1 virtual cpu 1.75gb ram medium vms 2 virtual cpus 3.5 gb ram large vms 4 virtual cpus 7gb available ram microsoft initially offered basic web hosting service part office live small business launched late 2007 office live small business offered customers free commercial web hosting built-in system creating websites based build-in templates site creation wizard microsoft started allocating resources developing numerous cloud solutions group formed microsoft azure develop microsoft azure web sites microsoft azure web sites announced june 2012 preview release parallel microsoft developed microsoft azure pack offers technology installed private-cloud sets servers customer site direct customer control mid-2013 microsoft azure web sites microsoft azure pack officially released public microsoft operates microsoft azure number data centers throughout world microsoft azure web sites available subset deploying websites microsoft azure web sites customers choose deploy sites data center following geographical regions east us north central us west us east asia brazil south north europe west europe japan east japan west east asia
[ 2945, 4356, 11524, 4236, 6797, 782, 911, 1935, 4623, 8592, 9744, 10893, 2965, 10900, 2328, 4377, 8986, 11549, 7970, 6307, 9766, 5159, 1832, 6827, 6444, 5677, 11693, 7983, 8495, 3121, 3890, 8757, 7352, 2496, 4289, 7364, 8644, 1224, 8520, 9...
Test
5,667
0
PropBank:propbank propbank corpus annotated verbal propositions arguments—a proposition bank although propbank refers specific corpus produced martha palmer et al term propbank also coming used common noun referring corpus annotated propositions arguments propbank project played role recent research natural language processing used semantic role labelling propbank differs framenet resource frequently compared several ways propbank verb-oriented resource framenet centered abstract notion frames generalizes descriptions across similar verbs e.g describe characterize well nouns words e.g description propbank annotate events states affairs described using nouns propbank commits annotating verbs corpus whereas framenet project chooses sets example sentences large corpus cases annotated longer continuous stretches text propbank-style annotations often remain close syntactic level framenet-style annotations sometimes semantically motivated start propbank developed idea serving training data machine learning-based semantic role labeling systems mind requires arguments verb syntactic constituents different senses word distinguished differences bear arguments due differences semantic role labeling respect propbank often somewhat easier task producing framenet-style annotations
[ 3617, 1890, 7780, 5639, 3721, 9577, 4971, 5903, 7599, 10160, 10610, 1460, 6174, 5214 ]
Validation
5,668
0
LIVAC_Synchronous_Corpus:livac synchronous corpus livac uncommon language corpus dynamically maintained since 1995 different existing corpora livac adopted rigorous regular well windows approach processing filtering massive media texts representative communities pan-chinese region including hong kong macau taipei singapore shanghai beijing guangzhou shenzhen contents thus deliberately repetitive cases represented textual samples drawn editorials local international news cross-formosan straits news well news finance sports entertainment 2017 2.5 billion characters news media texts filtered far 600 million characters processed analyzed yielded expanding pan-chinese dictionary 2 million words pan-chinese printed media rigorous analysis based computational methodology livac time accumulated large amount accurate meaningful statistical data chinese language speech communities pan-chinese region result shows considerable important variations windows approach representative feature livac enabled pan-chinese media texts quantitatively analyzed according various attributes locations time subject domains thus various types comparative studies applications information technology well development often related innovative applications possible moreover livac allowed longitudinal developments taken account facilitating key word context kwic comprehensive study target words underlying concepts well linguistic structures past 20 years based variables region duration content results extensive accumulative data analysis contained livac enabled cultivation textual databases proper names place names organization names new words bi-weekly annual rosters media figures related applications included establishment verb adjective databases formulation sentiment indices related opinion mining measure compare popularity global media figures chinese media livac annual pan-chinese celebrity rosters later renamed pan-chinese media personalities rosters construction monthly new word lexicons livac annual pan-chinese new word rosters basis analysis emergence diffusion transformation new words publication dictionaries neologisms made possible
[ 5612, 7983, 7599 ]
Test
5,669
1
Quick_Objects:quick objects quick objects powerful object-relational mapping tool microsoft .net framework built framework business logic validation architecture quick objects different orm tools see list object-relational mapping software focus quick objects provide advantages code reuse code generation object relational mapping single tool set quick objects api simple packed powerful features capabilities linq fully supported used supported databases classes generated quick objects ready web services windows communication foundation remoting comprehensive data access modification capabilities complemented flexible object model allows developer specify control every aspect crud operations see list features september 15 2008 version 4.2 released enhanced support windows forms visual databinding september 1 2008 version 4.1 released support microsoft .net compact framework august 1 2008 version 4.0 released several new features vistadb microsoft access mysql added list supported databases quick objects designer added support adding multiple custom templates code generation v4.0 also added support linq enabled capability specify queries linq run supported databases april 7 2008 version 3.5 released new free edition product called community edition addition community edition quick objects designer also added visual validation designer business logic framework also introduced support databases multiple schemas introduced support aggregate sub queries march 3 2008 version 3.3 released support visual studio 2008 october 30 2007 major release quick objects v3 released addition validation framework among features v3 also introduced support disconnected mode delayed synchronization new component called quick objects data source asp.net introduced v3 well april 25 2007 quick objects version 2.2 released public
[ 7523, 10020, 10340, 3080, 2603, 6797, 7022, 7983, 9467, 10413, 3573, 11030, 5403 ]
Test
5,670
2
Slapt-get:slapt-get slapt-get apt-like package management system slackware slapt-get tries emulate features debian codice_1 closely possible released terms gnu general public license slapt-get free software slapt-get builds functionality top native slackware package tools installpkg upgradepkg removepkg enabling package query remote fetching system updates integrated changelog information many optional advanced features dependency resolution package conflicts suggestions checksum public key verification transfer resumption slapt-get uses libcurl curl library transport libcurl provides support ftp ftps http https file // resource types along transfer resume incomplete downloads slapt-get also uses gnu privacy guard library validate signatures slapt-get provides simple configuration file format includes exclusion mechanism use system upgrade option well declarations desired package sources package source optionally tagged specific priority order override package version comparison honor upstream software downgrades might case slackware reverts previous version package slapt-get provide dependency resolution packages included within slackware distribution however provide framework dependency resolution slackware compatible packages similar fashion hand-tuned method apt utilizes several package sources slackware based distributions take advantage functionality hard soft conditional dependencies along package conflicts complementary package suggestions expressed using slapt-get framework adding dependency information requires modification packages rather package listing file packages.txt used specify relationships file provided patrick volkerding similar packages.gz file use debian several scripts available generate packages.txt file group packages file format used patrick volkerding extended adding extra lines per package slapt-get parses file source downloads typically third party packages store dependency information within package later extraction packages.txt inclusion information within slackware package format inhibit ability slackware pkgtools install packages information silently ignored discarded package installed slapt-get works official slackware mirrors third party package repositories http //www.slacky.eu/ slapt-get looks support files packages.txt checksums.md5 repository package information files provide package names versions sizes compressed uncompressed checksums well package description files extended discussed previous section add dependency listings conflict information package suggestions files also proxy remote sources specifying mirror declaration package gslapt gtk+ frontend libslapt slapt-get library provides advanced package management slackware derivatives inspired functionality present synaptic gslapt aims bring ease use enjoyed debian derivatives slackware world gslapt written primarily supersede vlapt x dialog slapt-get frontend used vectorlinux besides slackware slapt-get gslapt included several distributions including
[ 2050, 11525, 2310, 10760, 7689, 2955, 7435, 7181, 7947, 9487, 2448, 657, 788, 1813, 8213, 10900, 6680, 8476, 10149, 4775, 7847, 6828, 6446, 7983, 10033, 1842, 948, 823, 2872, 6583, 3131, 5819, 10172, 190, 3649, 10817, 9671, 5067, 3918, 46...
None
5,671
3
Micro_T-Kernel:micro t-kernel μt-kernel real-time operating system rtos designed 16- 8-bit microcontrollers μt-kernel standardized t-engine forum later ieee basis ieee 2050-2018 article comparing 9 rtoss among micro t-kernel evaluated given favorable remarks appeared ieee publication
[ 8708, 7045, 7049, 5270, 9366, 6187, 4396, 7983, 3762, 434, 11321, 5439, 3780, 10332, 4581, 5863, 11125, 6904, 8828, 3838 ]
None
5,672
4
Derek_Atkins:derek atkins derek atkins computer scientist specializing computer security studied electrical engineering computer science massachusetts institute technology june 2014 became chief technology officer securerf atkins author co-author several computer security books including internet security professional reference reputational risk question trust april 1994 co-authored paper magic words squeamish ossifrage detailing factorization rsa-129
[]
None
5,673
2
Microsoft_Baseline_Security_Analyzer:microsoft baseline security analyzer microsoft baseline security analyzer mbsa discontinued software tool longer available microsoft determines security state assessing missing security updates less-secure security settings within microsoft windows windows components internet explorer iis web server products microsoft sql server microsoft office macro settings security updates determined current version mbsa using windows update agent present windows computers since windows 2000 service pack 3 less-secure settings often called vulnerability assessment va checks assessed based hard-coded set registry file checks example va might permissions one directories /www/root folder iis could set low level allowing unwanted modification files outsiders versions 1.2.1 run nt4 windows 2000 windows xp windows server 2003 provide support iis versions 5 6 sql server 7 2000 internet explorer 5.01 6.0 microsoft office 2000 2003 security update assessment provided integrated version shavlik hfnetchk 3.8 scan tool mbsa 1.2.1 localized english german french japanese versions supported security assessment locale version 2.0 retained hard-coded va checks replaced shavlik security assessment engine microsoft update technologies adds dynamic support microsoft products supported microsoft update mbsa 2.0.1 released support revised windows update wu offline scan file wsusscn2.cab mbsa 2.1 added vista windows server 2008 support new vista-styled gui interface support latest windows update agent 3.0 new remote directory /rd feature extended va checks x64 platforms august 2012 security bulletin webcast q technet announced current version mbsa 2.2 support windows 8 microsoft currently plans release updated version tool november 2013 mbsa 2.3 released release adds support windows 8 windows 8.1 windows server 2012 windows server 2012 r2 windows 2000 longer supported release microsoft support updates mbsa ended current version 2.3 offer official support windows 10 windows server 2016 microsoft mbsa webpage removed mbsa scans 3 classes updates security updates service packs update rollups critical optional updates left aside
[ 8576, 5380, 2309, 1417, 2443, 6797, 11030, 537, 3482, 5799, 7983, 7473, 5057, 10828, 10322, 4439, 5082, 3935, 9695, 225, 4074, 5356, 11248, 8315, 2558, 383 ]
Test
5,674
4
Secure_signature_creation_device:secure signature creation device secure signature creation device specific type computer hardware software used creating electronic signature put service secure signature creation device sscd device must meet rigorous requirements laid annex ii regulation eu 910/2014 eidas referred qualified electronic signature creation device qscd using secure signature creation devices helps facilitating online business processes save time money transactions made within public private sectors minimum requirements must met elevate electronic signature creation device level secure signature creation device provided annex ii eidas appropriate procedural technical means device must reasonably assure confidentiality data used create electronic signature must ensure data used create electronic signature unique used lastly shall allow qualified trust service provider certificate authority create manage signatory ’ electronic signature data ensure security signature creation data used sscd create electronic signature must provide reasonable protection current technology prevent forgery duplication signature creation data must remain sole control signatory prevent unauthorized use sscd prohibited altering signature ’ accompanying data trust service provider certificate authority places sscd service must securely prepare device according annex ii eidas fully compliance following three conditions secure signature creation device must also meet international standard computer security certification referred common criteria information technology security evaluation iso/iec 15408 standard gives computer system users ability specify security requirements via protection profiles pps security functional requirements sfrs security assurance requirements sars trust service provider certificate authority required implement specified requirements attest product ’ security attributes third-party testing laboratory evaluates device ensure level security claimed provider secure signature creation device used part central authentication service cas may act cas server multi-tier authentication scenarios cas software protocol allows users authenticated signing web application common scheme cas protocol includes client ’ web browser application requesting authentication cas server authentication needed application send request cas server server compare user ’ credentials database information matches cas respond user authenticated eidas provided tiered approach determining legal implications electronic signatures signature created secure signature creation device considered strongest probative value document message signed device non-reputable meaning signatory deny responsible creation signature regulation eu 910/2014 eidas evolved directive 1999/93/ec electronic signatures directive intent directive make eu member states responsible creating legislation would allow creation european union ’ electronic signing system eidas regulation required member states follow specifications electronic signatures effective date 1 july 2016
[ 3264, 7075, 517, 8904, 9576, 5200, 8018, 1496 ]
Test
5,675
4
FraudWatch_International:fraudwatch international fraudwatch international internet security organization founded 2003 mainly specializes online fraud protection anti-phishing activities headquarters privately owned company melbourne australia offices london dubai san francisco ceo trent youl activities company include anti-phishing protection malware online brand protection offering security service companies fraudwatch international active sponsoring participating congresses cybercrime also sponsors anti-phishing working group techniques used fraudwatch international include anti-phishing company released fwi fraud shield 2007 application windows platforms warns users browse phishing websites
[ 4945, 1899, 10915 ]
Train
5,676
9
Andrey_Ershov:andrey ershov academician andrey petrovych ershov 19 april 1931 moscow – 8 december 1988 moscow soviet computer scientist notable pioneer systems programming programming language research donald knuth considers independently co-discovered idea hashing linear probing also created one first algorithms compiling arithmetic expressions responsible languages alpha rapira aist-0 first soviet time-sharing system electronic publishing system rubin mramor multiprocessing workstation also initiator developing computer bank russian language soviet project creating large representative russian corpus project 1980s comparable bank english british national corpus russian national corpus created russian academy sciences 2000s successor ershov project 1959 worked siberian division ussr academy sciences helped found novosibirsk computer center siberian school computer science received academy sciences first programmer recognized 1974 made distinguished fellow british computer society 1981 received silver core award ifip computer science community mostly known speech aesthetics human factor programming presented dinner afips spring joint computer conference 1972 due importance republished article communications acm
[ 8262, 1611, 2798, 7599, 1783 ]
Train
5,677
9
Java_(programming_language):java programming language java general-purpose programming language class-based object-oriented although pure object-oriented language contains primitive types designed implementation dependencies possible intended let application developers write run anywhere wora meaning compiled java code run platforms support java without need recompilation java applications typically compiled bytecode run java virtual machine jvm regardless underlying computer architecture syntax java similar c c++ fewer low-level facilities either java one popular programming languages use according github particularly client-server web applications reported 9 million developers java originally developed james gosling sun microsystems since acquired oracle released 1995 core component sun microsystems java platform original reference implementation java compilers virtual machines class libraries originally released sun proprietary licenses may 2007 compliance specifications java community process sun relicensed java technologies gnu general public license meanwhile others developed alternative implementations sun technologies gnu compiler java bytecode compiler gnu classpath standard libraries icedtea-web browser plugin applets latest versions java 12 released march 2019 java 11 currently supported long-term support lts version released september 25 2018 oracle released legacy java 8 lts last free public update january 2019 commercial use otherwise still support java 8 public updates personal use least december 2020 oracle others highly recommend uninstall older versions java serious risks due unresolved security issues since java 9 10 longer supported oracle advises users immediately transition java 11 java 12 also non-lts option james gosling mike sheridan patrick naughton initiated java language project june 1991 java originally designed interactive television advanced digital cable television industry time language initially called oak oak tree stood outside gosling office later project went name green finally renamed java java coffee gosling designed java c/c++-style syntax system application programmers would find familiar sun microsystems released first public implementation java 1.0 1996 promised write run anywhere wora providing no-cost run-times popular platforms fairly secure featuring configurable security allowed network- file-access restrictions major web browsers soon incorporated ability run java applets within web pages java quickly became popular java 1.0 compiler re-written java arthur van hoff comply strictly java 1.0 language specification advent java 2 released initially j2se 1.2 december 1998 1999 new versions multiple configurations built different types platforms j2ee included technologies apis enterprise applications typically run server environments j2me featured apis optimized mobile applications desktop version renamed j2se 2006 marketing purposes sun renamed new j2 versions java ee java java se respectively 1997 sun microsystems approached iso/iec jtc 1 standards body later ecma international formalize java soon withdrew process java remains de facto standard controlled java community process one time sun made java implementations available without charge despite proprietary software status sun generated revenue java selling licenses specialized products java enterprise system november 13 2006 sun released much java virtual machine jvm free open-source software foss terms gnu general public license gpl may 8 2007 sun finished process making jvm core code available free software/open-source distribution terms aside small portion code sun hold copyright sun vice-president rich green said sun ideal role regard java evangelist following oracle corporation acquisition sun micro-systems 2009–10 oracle described steward java technology relentless commitment fostering community participation transparency prevent oracle filing lawsuit google shortly using java inside android sdk see google section java software runs everything laptops data centers game consoles scientific supercomputers april 2 2010 james gosling resigned oracle january 2016 oracle announced java run-time environments based jdk 9 discontinue browser plugin five primary goals creation java language java 8 supported java 8 11 long term support lts versions major release versions java along release dates sun defined supports four editions java targeting different application environments segmented many apis belong one platforms platforms classes java apis organized separate groups called packages package contains set related interfaces classes exceptions refer separate platforms description packages available sun also provided edition called personal java superseded later standards-based java configuration-profile pairings one design goal java portability means programs written java platform must run similarly combination hardware operating system adequate run time support achieved compiling java language code intermediate representation called java bytecode instead directly architecture-specific machine code java bytecode instructions analogous machine code intended executed virtual machine vm written specifically host hardware end users commonly use java runtime environment jre installed machine standalone java applications web browser java applets standard libraries provide generic way access host-specific features graphics threading networking use universal bytecode makes porting simple however overhead interpreting bytecode machine instructions made interpreted programs almost always run slowly native executables just-in-time jit compilers compile byte-codes machine code runtime introduced early stage java platform-independent adapted particular platform run java virtual machine translates java bytecode platform machine language programs written java reputation slower requiring memory written c++ however java programs execution speed improved significantly introduction just-in-time compilation 1997/1998 java 1.1 addition language features supporting better code analysis inner classes stringbuilder class optional assertions etc optimizations java virtual machine hotspot becoming default sun jvm 2000 java 1.5 performance improved addition java.util.concurrent package including lock free implementations concurrentmaps multi-core collections improved java 1.6 platforms offer direct hardware support java micro controllers run java bytecode hardware instead software java virtual machine arm-based processors could hardware support executing java bytecode jazelle option though support mostly dropped current implementations arm java uses automatic garbage collector manage memory object lifecycle programmer determines objects created java runtime responsible recovering memory objects longer use references object remain unreachable memory becomes eligible freed automatically garbage collector something similar memory leak may still occur programmer code holds reference object longer needed typically objects longer needed stored containers still use methods non-existent object called null pointer exception thrown one ideas behind java automatic memory management model programmers spared burden perform manual memory management languages memory creation objects implicitly allocated stack explicitly allocated deallocated heap latter case responsibility managing memory resides programmer program deallocate object memory leak occurs program attempts access deallocate memory already deallocated result undefined difficult predict program likely become unstable crash partially remedied use smart pointers add overhead complexity note garbage collection prevent logical memory leaks i.e memory still referenced never used garbage collection may happen time ideally occur program idle guaranteed triggered insufficient free memory heap allocate new object cause program stall momentarily explicit memory management possible java java support c/c++ style pointer arithmetic object addresses arithmetically manipulated e.g adding subtracting offset allows garbage collector relocate referenced objects ensures type safety security c++ object-oriented languages variables java primitive data types either stored directly fields objects stack methods rather heap commonly true non-primitive data types see escape analysis conscious decision java designers performance reasons java contains multiple types garbage collectors default hotspot uses parallel scavenge garbage collector however also several garbage collectors used manage heap 90 applications java concurrent mark-sweep cms garbage collector sufficient oracle aims replace cms garbage-first collector g1 solved memory management problem relieve programmer burden handling properly kind resources like network database connections file handles etc. especially presence exceptions paradoxically presence garbage collector faded necessity explicit destructor method classes thus rendering management resources difficult syntax java largely influenced c++ unlike c++ combines syntax structured generic object-oriented programming java built almost exclusively object-oriented language code written inside classes every data item object exception primitive data types i.e integers floating-point numbers boolean values characters objects performance reasons java reuses popular aspects c++ method unlike c++ java support operator overloading multiple inheritance classes though multiple inheritance supported interfaces java uses comments similar c++ three different styles comments single line style marked two slashes codice_1 multiple line style opened codice_2 closed codice_3 javadoc commenting style opened codice_4 closed codice_3 javadoc style commenting allows user run javadoc executable create documentation program read integrated development environments ides eclipse allow developers access documentation within ide traditional hello world program written java source files must named public class contain appending suffix codice_6 example codice_7 must first compiled bytecode using java compiler producing file named codice_8 executed launched java source file may contain one public class contain multiple classes public access modifier number public inner classes source file contains multiple classes make one class introduced codice_9 keyword public preceded codice_10 keyword name source file public class name class declared public may stored .java file compiler generate class file class defined source file name class file name class .class appended class file generation anonymous classes treated name concatenation name enclosing class integer keyword codice_10 denotes method called code classes class may used classes outside class hierarchy class hierarchy related name directory .java file located called access level modifier access level modifiers include keywords codice_12 codice_13 keyword codice_14 front method indicates static method associated class specific instance class static methods invoked without reference object static methods access class members also static methods designated static instance methods require specific instance class operate keyword codice_15 indicates main method return value caller java program exit error code must call system.exit explicitly method name codice_16 keyword java language simply name method java launcher calls pass control program java classes run managed environments applets enterprise javabeans use need codice_17 method java program may contain multiple classes codice_16 methods means vm needs explicitly told class launch main method must accept array objects convention referenced codice_19 although legal identifier name used since java 5 main method also use variable arguments form codice_20 allowing main method invoked arbitrary number codice_21 arguments effect alternate declaration semantically identical codice_19 parameter still array codice_21 objects allows alternative syntax creating passing array java launcher launches java loading given class specified command line attribute jar starting codice_24 method stand-alone programs must declare method explicitly codice_25 parameter array objects containing arguments passed class parameters codice_16 often passed means command line printing part java standard library class defines public static field called codice_27 object instance class provides many methods printing data standard including also appends new line passed string string codice_28 automatically converted string object compiler java applets programs embedded applications typically web page displayed web browser java applet api deprecated since java 9 2017 java servlet technology provides web developers simple consistent mechanism extending functionality web server accessing existing business systems servlets server-side java ee components generate responses typically html pages requests typically http requests clients java servlet api extent superseded two standard java technologies web services javaserver pages jsp server-side java ee components generate responses typically html pages http requests clients jsps embed java code html page using special delimiters codice_29 codice_30 jsp compiled java servlet java application right first time accessed generated servlet creates response swing graphical user interface library java se platform possible specify different look feel pluggable look feel system swing clones windows gtk+ motif supplied sun apple also provides aqua look feel macos prior implementations looks feels may considered lacking swing java se 6 addresses problem using native gui widget drawing routines underlying platforms javafx software platform creating delivering desktop applications well rich internet applications rias run across wide variety devices javafx intended replace swing standard gui library java se included foreseeable future javafx support desktop computers web browsers microsoft windows linux macos javafx support native os look feels 2004 generics added java language part j2se 5.0 prior introduction generics variable declaration specific type container classes example problem easy way create container accepts specific types objects either container operates subtypes class interface usually codice_31 different container class created contained class generics allow compile-time type checking without create many container classes containing almost identical code addition enabling efficient code certain runtime exceptions prevented occurring issuing compile-time errors java prevented runtime type errors codice_32 occurring would type safe 2016 type system java proven unsound criticisms directed java include implementation generics speed handling unsigned numbers implementation floating-point arithmetic history security vulnerabilities primary java vm implementation hotspot java class library standard library developed support application development java controlled sun microsystems cooperation others java community process program companies individuals participating process influence design development apis process subject controversy 2010 class library contains features javadoc comprehensive documentation system created sun microsystems used many java developers provides developers organized system documenting code javadoc comments extra asterisk beginning i.e delimiters codice_4 codice_3 whereas normal multi-line comments java set delimiters codice_2 codice_3 oracle corporation current owner official implementation java se platform following acquisition sun microsystems january 27 2010 implementation based original implementation java sun oracle implementation available microsoft windows still works xp later versions currently officially supported macos linux solaris java lacks formal standardization recognized ecma international iso/iec ansi third-party standards organization oracle implementation de facto standard oracle implementation packaged two different distributions java runtime environment jre contains parts java se platform required run java programs intended end users java development kit jdk intended software developers includes development tools java compiler javadoc jar debugger oracle also released graalvm high performance java dynamic compiler interpreter openjdk another notable java se implementation licensed gnu gpl implementation started sun began releasing java source code gpl java se 7 openjdk official java reference implementation goal java make implementations java compatible historically sun trademark license usage java brand insists implementations compatible resulted legal dispute microsoft sun claimed microsoft implementation support rmi jni added platform-specific features sun sued 1997 2001 settlement us 20 million well court order enforcing terms license sun result microsoft longer ships java windows platform-independent java essential java ee even rigorous validation required certify implementation environment enables portable server-side applications java programming language requires presence software platform order compiled programs executed oracle supplies java platform use java android sdk alternative software platform used primarily developing android applications gui system java language key pillar android open source mobile operating system although android built linux kernel written largely c android sdk uses java language basis android applications bytecode language supported android sdk incompatible java bytecode runs virtual machine optimized low-memory devices smartphones tablet computers depending android version bytecode either interpreted dalvik virtual machine compiled native code android runtime android provide full java se standard library although android sdk include independent implementation large subset supports java 6 java 7 features offering implementation compatible standard library apache harmony use java-related technology android led legal dispute oracle google may 7 2012 san francisco jury found apis could copyrighted google infringed oracle copyrights use java android devices district judge william haskell alsup ruled may 31 2012 apis copyrighted reversed united states court appeals federal circuit may 2014 may 26 2016 district court decided favor google ruling copyright infringement java api android constitutes fair use march 2018 ruling overturned appeals court sent case determining damages federal court san francisco google filed petition writ certiorari supreme court united states january 2019 challenge two rulings made appeals court towards oracle favor
[ 6144, 6145, 4101, 6153, 6154, 2059, 8201, 10250, 2062, 16, 4112, 6160, 19, 6161, 8213, 8217, 10266, 8219, 2076, 6172, 8221, 10271, 6176, 8226, 50, 2105, 58, 2106, 4155, 8251, 8252, 6212, 69, 4166, 8262, 72, 4171, 6219, 6228, 8280, 8281,...
None
5,678
9
FOCUS:focus focus fourth-generation programming language 4gl computer programming language development environment used build database queries produced information builders inc. originally developed data handling analysis ibm mainframe subsequently versions minicomputers vax platforms implemented focus later extended personal computers 1997 world wide web webfocus product information builders focus product began alternate product mathematica ramis first fourth-generation_programming_language 4gl national css ncss time-sharing vendor licensed rights make ramis available vp/css system point mathematica changed licensing price interested parties ramis direct ancestor focus gerald d. cohen peter mittelman principal developers ramis working mathematica products group 1970 ramis licensed mathematica number in-house clients including nabisco corporation also offered national css timesharing company october 1975 cohen left mathematica formed information builders recreated product built mathematica form focus similar ramis bugs misspelled error messages syntax focus simplest elements almost direct clone syntax ramis bearing resemblance similar differences various early dialects sql time ncss decided work product later called nomad three products flourished 1970s early 1980s focus also offered time-sharing basis via tymeshare mathematica time ran mid-80s ncss also failed victim personal computing revolution obviated commercial timesharing ramis sold series companies ultimately landing computer associates nomad suffered similar fate focus cohen direction continued flourish expanding product line loosely competitive sas focus never quite reached degree mainstream adoption perhaps basic analytical statistical functions lacked wide array specialized analytic tools made sas standard fields pharmaceutical clinical trials instead focus concentrated extreme flexibility data import export well ad hoc end-user reporting software packages focus linked integrated include business intelligence software competitors include although focus resembles data access analysis tools sql sas also includes report chart display presentation features automates process identifying files operating system opening input file reading next record opening output file writing next record closing files basic operation allows user/programmer concentrate details working data within record effect working almost entirely within implicit program loop runs record somewhat like rpg report program generator procedures operate dataset whole instance printing statistical analysis merely require user/programmer identify dataset compared general-purpose programming languages structure allows user/programmer less familiar technical details data stored relatively familiar information contained data blurs line user programmer appealing individuals whose work roles business research rather information technology turn double edged result allowing rapid answers business research questions even ones requiring several iterations get initial results final answer also contribute construction large body poorly written and/or difficult maintain source code feature unique time focus features ability user construct data description file called master file description referring actual data file even several different data description files addressing data file different ways rather usual practice file structure hard-coded program way files structure source accessed produced many different ways eliminating much data manipulation example concatenation parsing times required earlier programming languages instance actual data file accessed read write record 80 byte text string 40 2 character numerical fields 10 8-byte floating point numbers etc. user simply re-writing appropriate master file description needed second command would produce report headings custname custid projname projcost keywords facilitate modification deletion existing data prompting error messages interactive session customized 1997 web-based version focus introduced called webfocus built data access reporting foundation focus expanding visually oriented thin-client paradigm accessible web browser webfocus language procedural non-procedural command structure former immediate execution whereas latter placed stack memory later execution
[ 11075, 8262, 4042, 10413, 7983, 7217, 10803, 11604, 2901, 119, 8312, 313, 284, 8509, 3358, 2652 ]
None
5,679
9
EC_(programming_language):ec programming language ec ecere c object-oriented programming language defined super-set c language ec initially developed part ecere cross-platform software development kit sdk project goals language provide object-oriented constructs reflection properties dynamic modules top c language maintaining c compatibility optimal native performance ec currently relies gcc clang perform final steps compilation using c intermediate language however plans integrate directly llvm skip intermediate c files ec available part codice_1 package debian/ubuntu derived linux distributions windows installer also bundling mingw-w64 available main website free open-source sdk including ec compiler also built number platforms including os x freebsd android also possible deploy ec applications web compiling javascript emscripten webassembly binaryen hello world program ec class helloapp application hello world program programmed gui import ecere class helloform window helloform hello
[ 1952, 9345, 3613, 3462, 8262, 5961, 8554, 11625, 5612, 6797, 7983, 10703, 119, 823, 2138, 2045 ]
None
5,680
9
Synchronous_programming_language:synchronous programming language synchronous programming language computer programming language optimized programming reactive systems computer systems sorted three main classes 1 transformational systems take inputs process deliver outputs terminate execution typical example compiler 2 interactive systems interact continuously environment speed typical example web 3 reactive systems interact continuously environment speed imposed environment typical example automatic flight control system modern airplanes reactive systems must therefore react stimuli environment within strict time bounds reason often also called real-time systems found often embedded systems synchronous programming also synchronous reactive programming srp computer programming paradigm supported synchronous programming languages principle srp make abstraction programming languages synchronous abstraction digital circuits synchronous circuits indeed designed high-level abstraction timing characteristics electronic transistors neglected gate circuit ... therefore assumed compute result instantaneously wire assumed transmit signal instantaneously synchronous circuit clocked tick clock computes instantaneously output values new values memory cells latches input values current values memory cells words circuit behaves electrons flowing infinitely fast first synchronous programming languages invented france 1980s esterel lustre signal since many synchronous languages emerged synchronous abstraction makes reasoning time synchronous program lot easier thanks notion logical ticks synchronous program reacts environment sequence ticks computations within tick assumed instantaneous i.e. processor executing infinitely fast statement a||b therefore abstracted package ab b simultaneous take concrete example esterel statement every 60 second emit minute specifies signal minute exactly synchronous 60-th occurrence signal second fundamental level synchronous abstraction eliminates non-determinism resulting interleaving concurrent behaviors allows deterministic semantics therefore making synchronous programs amenable formal analysis verification certified code generation usable formal specification formalisms contrast asynchronous model computation sequential processor statement a||b either implemented b b known interleaving-based non determinism drawback asynchronous model intrinsically forbids deterministic semantics e.g. race conditions makes formal reasoning analysis verification complex nonetheless asynchronous formalisms useful model design verify distributed systems intrinsically asynchronous also contrast systems processes basically interact synchronously example would systems built based communicating sequential processes csp model also allows nondeterministic choice
[ 9345, 2691, 7172, 9224, 7308, 5395, 5651, 9366, 5527, 9626, 3613, 4770, 3876, 7341, 4782, 9780, 1591, 4410, 191, 10819, 8262, 9926, 4042, 5845, 7421, 477, 7395, 4838, 9330, 9331, 2556, 2045 ]
Validation
5,681
7
Netbook:netbook netbook generic name given category small lightweight legacy-free inexpensive laptop computers introduced 2007 netbooks compete market segment mobiles chromebooks variation portable network computer inception late 2007 smaller notebooks optimized low weight low cost—netbooks omitted certain features e.g. optical drive featured smaller screens keyboards offered reduced computing power compared full-sized laptop course evolution netbooks ranged size 5 screen diagonal 12 typical weight often significantly less expensive laptops mid-2009 netbooks began offered wireless data carriers users free charge extended service contract purchase short period since appearance netbooks grew size features converged smaller lighter laptops subnotebooks august 2009 comparing dell netbook dell notebook cnet called netbooks nothing smaller cheaper notebooks noting specs similar average shopper would likely confused one better conclusion really distinction devices attempt prevent cannibalizing lucrative laptops lineup manufacturers imposed several constraints netbooks however would soon push netbooks niche distinctive advantages traditional laptops tablet computers see 2011 increasing popularity tablet computers particularly ipad —a different form factor improved computing capabilities lower production cost—had led decline netbook sales high end performance spectrum ultrabooks ultra-light portables traditional keyboard display revolutionized 11.6-inch macbook air made fewer performance sacrifices albeit considerably higher production cost capitalizing success macbook air response intel promoted ultrabook new high-mobility standard hailed analysts succeeding netbooks failed result two developments netbooks 2011 kept price strong point losing design ease-of-use portability department tablets tablets removable keyboards ultrabook laptops features performance field many major netbook producing companies stopped producing end 2012 many netbook products replaced market chromebooks variation network computer concept form netbook hp re-entered non-chromebook netbook market stream 11 2014 origins netbook traced highly popular toshiba range libretto sub-notebooks 6 libretto 20 dates back early 1996 weighed 840g apple also line powerbook duos ultra-portable macintosh laptops mid 90s recently psion now-discontinued netbook line olpc xo-1 initially called us 100 laptop palm foleo small portable network-enabled computers generic use term netbook however began 2007 asus unveiled asus eee pc originally designed emerging markets device weighed featured display keyboard approximately 85 size normal keyboard solid-state drive custom version linux simplified user interface geared towards netbook use following eee pc everex launched linux-based cloudbook windows xp windows vista models also introduced msi released wind—others soon followed suit olpc project followed market goals laid emate 300 eight years earlier known innovation producing durable cost- power-efficient netbook developing countries regarded one major factors led top computer hardware manufacturers begin creating low-cost netbooks consumer market first asus eee pc sold 300,000 units four months companies dell acer took note began producing inexpensive netbooks olpc xo-1 targets different audience manufacturers netbooks appears olpc facing competition developing countries large choice vendors choose low-cost netbook prefer late 2008 netbooks begun take market share away notebooks contrast earlier largely failed attempts establish mini computers new class mainstream personal computing devices built around comparatively expensive platforms requiring proprietary software applications imposing severe usability limitations recent success netbooks also attributed fact pc technology matured enough allow truly cost optimized implementations enough performance suit needs majority pc users illustrated fact typical system performance netbook level mainstream pc 2001 around one quarter cost performance level suffices user needs caused increased interest resource-efficient applications google chrome forced microsoft extend availability windows xp secure market share estimated almost thirty times netbooks sold 2008 11.4 million 70 europe 2007 400,000 trend reinforced rise web-based applications well mobile networking according wired magazine netbooks evolving super-portable laptops professionals ongoing recession also helping growing sales netbooks australia new south wales department education training partnership lenovo provided year 9 high school students government high schools lenovo s10e netbooks 2009 lenovo mini 10 netbooks 2010 lenovo edge 11 netbooks 2011 modified lenovo x130e netbook 2012 preloaded software including microsoft office adobe systems creative suite 4 provided prime minister kevin rudd digital education revolution der netbooks ran windows 7 enterprise netbooks secured computrace lojack laptops police use track device lost stolen nsw det retains ownership netbooks student graduates year 12 student keep government trinidad tobago—prime minister kamla persad bisseser—is also providing hp laptops form 1 students 11-year-olds police trackable software greece provided 13-year-old students middle school gymnasium freshmen teachers netbooks 2009 digital classroom initiative students given one unique coupon redeemed netbook choice €450 price ceiling participating shops throughout country netbooks came bundled localised versions either windows xp higher open source e.g linux operating systems wired wireless networking functionality antivirus protection preactivated parental controls educational software package microsoft intel tried cement netbooks low end market protect mainstream notebook pc sales get lower margins low-cost models companies limited specifications netbooks despite original equipment manufacturers announced higher-end netbooks models march 2009 ending 2008 report typical netbook featured weight screen wireless internet connectivity linux windows xp intel atom processor cost less 400 us mid-2009 newspaper article said typical netbook 300 us screen peaked 20 portable computer market netbooks started slightly lose market share within category early 2010 coinciding appearance success ipad technology commentator ross rubin argued two half years later engadget netbooks never got respect steve jobs rebuked netbook ipad introduction ipad owes bit debt little laptops netbook demonstrated potential inexpensive portable second computing device screen size 10 inches intended primarily media consumption light productivity although manufacturers directly blamed competition ipad analysts pointed larger fully fledged laptops entered price range netbooks time 11.6-inch macbook air introduced late 2010 compared favorably many netbooks terms processing power also ergonomics 2.3 pounds lighter 10-inch netbooks owing part integration flash storage chips main logic board described superlative netbook least netbook several technology commentators even though apple never referred sometimes describing it—in words steve jobs—as third kind notebook entry level model msrp 999 costing significantly average netbook much three four times 2011 tablet sales overtook netbooks first time 2012 netbook sales fell 25 percent year-on-year sustained decline since 2010 pronounced united states western europe latin america still showing modest growth december 2011 dell announced exiting netbook market may 2012 toshiba announced least united states august 2012 article john c. dvorak pc magazine claimed term netbook nearly gone lexicon already superseded market place largely powerful macbook air inspired ultrabook—described netbook steroids —and lesser extent tablets september 2012 asus acer msi announced stop manufacturing 10-inch netbooks simultaneously asus announced would stop developing eee pc products instead focusing mixed tablet-netbook transformer line introduction chromebooks major manufacturers produced new laptops segment market netbooks serviced chromebooks variation network computer concept form netbook require internet connections full functionality chromebooks became top selling laptops 2014 threat google chrome os based chromebooks prompted microsoft revive revamp netbooks windows 8.1 bing hp re-entered non-chromebook netbook market stream 11 2014 1996 psion started applying trademarks line netbook products later released 1999. international trademarks issued including models failed gain popularity discontinued except providing accessories maintenance support existing users similar marks recently rejected uspto citing likelihood confusion section 2 despite expert analysis mark probably generic psion teklogix issued cease desist letters 23 december 2008 heavily criticised prompting formation save netbooks grassroots campaign worked reverse google adwords ban cancel trademark encourage continued generic use term preparing petition cancellation revealed dell submitted one day basis abandonment genericness fraud later revealed psion counter-suit intel filed 27 february 2009 also revealed around time intel also sued psion teklogix us canada psion uk federal court similar grounds addition seeking cancellation trademark intel sought order enjoining psion asserting trademark rights term netbook declarative judgment regarding use term attorneys fees costs disbursements relief court deems proper june 2 2009 psion announced suit settled court psion statement said company withdrawing trademark registrations term netbook psion agreed waive rights third parties respect past current future use term netbooks typically less powerful hardware larger laptop computers include optical disc drive larger laptops often netbooks even conventional hard drive netbooks use solid-state storage devices instead require less power faster lighter generally shock-resistant much less storage capacity 32 64 128 gb compared 100 gb 2 tb mechanical hard drives typical many notebooks/laptop computers netbooks market today support wi-fi wireless networking many used mobile telephone networks data capability example 3g mobile data plans supplied contract way mobile telephones also include ethernet and/or modem ports broadband dial-up internet access respectively remains seen whether intel new silvermont architecture released 2013 revive sales new chips offer far greater power using wattage netbooks asus benq dell toshiba acer use intel atom notebook processor typically n270 1.6 ghz also available n280 1.66 ghz replaced n450 series graphics memory controller integrated chip early 2010 running 1.66 ghz x86-compatible via technologies c7 processor also powering netbooks many different manufacturers like hp samsung via also designed nano new x86-64-compatible architecture targeting lower priced mobile applications like netbooks currently one netbook uses nano samsung nc20 low cost netbooks use system-on-a-chip vortex86 processor meant embedded systems windows compatible low performance 2011 amd launched fusion netbook processors included asus eee pc 1015t many others although officially sanctioned amd role 1.2 ghz athlon 64 model l110 processor dissipating 13 w used least one company—gateway—to power 11.6-inch portable 1366x768 screen resolution described netbook press launched mid-2009 399 united states lt31 met reviewers approval performance generally recognized faster contemporary atom-based products price range considerably shorter battery life still falling short intel core 2 ulv product line powering expensive small-factor offerings 11.6 inch macbook air debuted late 2010 1.4 ghz core 2 duo processor 10 w part 1366x768 display resolution entry level model priced 999 1.6 ghz available upgrade put much closer fully modern laptop small-but-crippled netbooks one reviewer described mercedes benz netbooks september 2011 pc magazine buyer guide netbooks observed oversized netbooks 11.6 inch screens appeared market including hp pavilion dm1z msrp 449 lenovo thinkpad x100e msrp 550 using amd fusion e-350 processor 18 w part although includes gpu described faster given atom processor definition netbooks accommodate processors little processing power comparison common dual-core core 2 duo t5600 1.83 ghz 2 mb l2 cache used low-end laptops passmark score 1000 points following table shows benchmarks common netbook cpus arm holdings designs licenses microprocessor technology relatively low power requirements low cost would constitute ideal basis netbooks particular recent arm cortex-a9 mpcore series processor cores touted arm alternative platform x86 netbooks june 2009 nvidia announced dozen mobile internet devices running arm-based tegra soc netbooks arm-based products advertised smartbooks particularly qualcomm smartbooks promised deliver features including always all-day battery life 3g connectivity gps typically found smartphones laptop-style body screen size 5 10 inches qwerty keyboard systems run traditional x86 versions microsoft windows rather custom linux operating systems google android chrome os end products ever shipped market branding like hp-compaq airlife toshiba ac100 sold dynabook az japan efika mx devices like ac100 hampered sold phone-oriented operating system like android end 2010 qualcomm ceo paul jacobs admitted tablet computers ipad already occupied niche smartbook name dropped netbooks use mips architecture-compatible processors include skytone alpha-400 based ingenic system chip emtec gdium netbook uses 64-bit loongson processor capable 400 million instructions per second systems relatively inexpensive processing power current mips implementations usually compares unfavorably x86-implementations found current netbooks microsoft announced april 8 2008 despite impending end retail availability operating system june would continue license low-cost copies windows xp home edition oems october 2010 one year release windows 7 defined ultra low-cost personal computers —a definition carrying restrictions screen size processing power move served primarily counter use low-cost linux distributions netbooks create new market segment windows devices whilst ensuring devices cannibalize sales higher-end pcs running windows vista 2009 90 96 claimed microsoft february 2009 netbooks united states estimated ship windows xp windows 7 microsoft introduced new stripped-down edition intended netbooks known starter exclusively oems comparison home premium starter reduced multimedia functionality allow users change desktop wallpaper theme disables aero glass theme support multiple monitors windows 8 ploy counter chrome os-based netbooks low-end android tablets microsoft began offer no-cost windows licenses oems devices screens smaller 9 inches size additionally microsoft began offer low-cost licenses variant operating system set use microsoft bing search engine default windows ce also used netbook due reduced feature set google android software platform designed mobile telephone handsets demonstrated asus eee pc version linux operating system contains policies mobile internet devices including original asus eee pc 701 asus allocated engineers develop android-based netbook may 2009 contractor dell announced porting adobe flash lite android dell netbooks acer announced android netbooks available q3/2009 july 2009 new project android-x86 created provide open source solution android x86 platform especially netbooks google since 2011 marketed netbook-specific platform known chrome os google made efforts provide access android ecosystem within chrome os including 2016 introduction google play store compatibility layer android applications platform 2011 google introduced chrome os linux-based operating system designed particularly netbook-like devices marketed chromebooks platform designed leverage online services cloud computing namesake chrome web browser shell—so much operating system initially used full screen web browser window interface contained limited offline functionality later versions chrome os introduced traditional desktop interface platform allowing native packaged software written html javascript css developed platform netbooks sparked development several linux variants completely new distributions optimized small screen use limited processing power atom arm processors typically power netbooks examples include ubuntu netbook edition easypeasy joli os meego freebsd netbsd openbsd darwin joli os meego purport social oriented social networking operating systems rather traditional office work production operating systems since 2010 major netbook manufacturers longer install support linux united states reason change stance unclear although coincides availability 'netbook version windows xp later windows 7 starter strong marketing push adoption os netbook market however companies targeting niche markets system76 zareason continue pre-install linux devices sell cloud operating system attempts capitalize minimalist aspect netbooks user interface limited browser application mac os x demonstrated running various netbooks result osx86 project although violation operating system end-user license agreement apple complained sites hosting information install os x onto non-apple hardware including wired youtube reacted removed content response one article nicknamed netbook running os x hackintosh macbook air considered expensive netbook june 2009 npd study found 60 netbook buyers never take netbooks house special children editions netbooks released disney branding low cost less risk lack dvd player less break smaller keyboards closer children hand sizes viewed significant advantages target market principal objection netbooks context lack good video performance streaming online video current netbooks lack speed even simple games adults browsing text content less dependent video content small children read netbooks growing trend education several reasons need prepare children 21st-century lifestyles combined hundreds new educational tools found online growing emphasis student centered learning three biggest contributing factors rising use netbook technology schools dell one first mass-produce ruggedised netbook education sector rubber outlay touchscreen network activity light show teacher netbook online netbooks offer several distinct advantages educational settings first compact size weight make easy fit student work areas similarly small size make netbooks easier transport heavier larger sized traditional laptops addition prices ranging 200– 600 mean affordability netbooks relief school budget makers despite small size price netbooks fully capable accomplishing school-related tasks including word processing presentations access internet multimedia playback photo management
[ 3586, 1032, 4623, 10768, 4124, 10780, 10787, 9766, 5159, 3121, 1083, 7745, 7234, 10820, 2635, 7243, 7248, 3162, 1121, 4194, 5732, 3685, 9337, 2170, 9851, 4228, 4236, 6797, 7822, 10893, 6804, 7325, 6307, 7352, 9913, 4289, 1224, 1736, 3281, ...
None
5,682
4
Arbitrary_code_execution:arbitrary code execution computer security arbitrary code execution ace used describe attacker ability execute arbitrary commands code target machine target process arbitrary code execution vulnerability security flaw software hardware allowing arbitrary code execution program designed exploit vulnerability called arbitrary code execution exploit ability trigger arbitrary code execution network especially via wide-area network internet often referred remote code execution rce number classes vulnerability lead attacker ability execute arbitrary commands code arbitrary code execution commonly achieved control instruction pointer jump branch running process instruction pointer points next instruction process executed control value instruction pointer therefore gives control instruction executed next order execute arbitrary code many exploits inject code process example sending input gets stored input buffer ram use vulnerability change instruction pointer point injected code injected code automatically get executed type attack exploits fact computers use von neumann architecture make general distinction code data malicious code camouflaged harmless input data many newer cpus mechanisms make harder no-execute bit arbitrary code execution exploit give attacker privileges target process vulnerable example exploiting flaw web browser attacker could act user performing actions modifying personal computer files accessing banking information would able perform system-level actions unless user question also access work around attacker execute arbitrary code target often attempt privilege escalation exploit order gain additional control may involve kernel account administrator system root without enhanced control exploits potential severe damage turn computer zombie privilege escalation helps hiding attack legitimate administrator system combining exploits way called exploit chain arbitrary remote code execution privilege escalation vulnerability widely deployed software considered severe class computer vulnerability retrogaming hobbyists managed find vulnerabilities classic video games allow execute arbitrary code usually using precise sequence button inputs order cause buffer overflow allowing write protected memory awesome games done quick 2014 group speedrunning enthusiasts managed code run primitive versions games pong flappy bird copy super mario world utilizing buffer overflow write arbitrary code memory june 12 2018 security researcher jean-yves avenard mozilla discovered ace vulnerability windows 10 may 1 2018 security researcher discovered ace vulnerability 7-zip file archiver php subject numerous ace vulnerabilities
[ 5636, 1803, 6797, 4240, 3473, 894, 11537, 6550, 537, 2717, 161, 3234, 2467, 2470, 6950, 10412, 10796, 10492, 950, 1474, 8644, 2758, 4423, 2383, 3922, 2262, 3286, 5465, 9953, 10338, 2152, 8946, 9590, 10747, 7804, 2558 ]
Test
5,683
9
Joe_Stoy:joe stoy joseph e. joe stoy british computer scientist originally studied physics oxford university early career 1970s worked denotational semantics christopher strachey programming research group oxford university computing laboratory oxford university department computer science fellow balliol college oxford also spent time mit united states 2003 co-founded bluespec inc. book denotational semantics scott-strachey approach programming language semantics mit press 1977 classic text stoy married gabrielle stoy mathematician fellow lady margaret hall oxford
[ 5456 ]
None
5,684
9
Short-circuit_evaluation:short-circuit evaluation short-circuit evaluation minimal evaluation mccarthy evaluation john mccarthy semantics boolean operators programming languages second argument executed evaluated first argument suffice determine value expression first argument codice_1 function evaluates codice_2 overall value must codice_2 first argument codice_4 function evaluates codice_5 overall value must codice_5 programming languages lisp perl haskell lazy evaluation usual boolean operators short-circuit others ada java delphi short-circuit standard boolean operators available boolean operations like exclusive xor possible short-circuit operands always required determine result short-circuit expression codice_7 equivalent conditional expression codice_8 expression codice_9 equivalent codice_10 short-circuit operators effect control structures rather simple arithmetic operators strict imperative language terms notably c c++ side effects important short-circuit operators introduce sequence point – completely evaluate first argument including side effects optionally processing second argument algol 68 used proceduring achieve user-defined short-circuit operators procedures loosely typed languages two truth-values codice_11 codice_12 short-circuit operators may return last evaluated subexpression expression codice_7 equivalent codice_14 expression codice_9 equivalent codice_16 without evaluating codice_17 twice called last value table languages use lazy evaluation default like haskell functions effectively short-circuit special short-circuit operators needed use short-circuit operators criticized problematic abap distinct boolean type usual example using c-based language consider following example example short-circuit evaluation guarantees codice_26 never called codice_27 evaluates false feature permits two useful programming constructs illustrated following c snippet minimal evaluation prevents null pointer dereference excess memory fetches despite benefits minimal evaluation may cause problems programmers realize forget happening example code codice_26 supposed perform required operation regardless whether codice_29 executed allocating system resources codice_30 evaluates false codice_26 execute could cause problems programming languages java two operators one employs minimal evaluation one avoid problem problems unperformed side effect statements easily solved proper programming style i.e. using side effects boolean statements using values side effects evaluations tends generally make code opaque error-prone since minimal evaluation part operator semantic definition optional optimization many coding patterns come rely succinct idiomatic conditional construct examples include perl idioms bash unix shell script idioms short-circuiting lead errors branch prediction modern central processing units cpus dramatically reduce performance notable example highly optimized ray axis aligned box intersection code ray tracing compilers detect cases emit faster code programming language semantics may constrain optimizations
[ 3462, 8582, 6536, 8082, 8722, 3736, 4507, 1435, 9245, 6558, 5663, 7326, 11555, 3876, 7076, 10616, 11688, 4777, 428, 5165, 5677, 10043, 2620, 6718, 4799, 8644, 8262, 5703, 3529, 5833, 1611, 8524, 847, 7889, 3414, 8289, 10083, 6502, 10470, ...
Test
5,685
5
YPOPs!:ypops ypops previously known yahoopops open-source software provides pop3 smtp access yahoo mail available microsoft windows linux solaris mac platforms software released 2006 latest update 2009
[ 5612, 6797, 7983, 9909, 823 ]
Validation