node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
5,886
4
Bredolab_botnet:bredolab botnet bredolab botnet also known alias oficla russian botnet mostly involved viral e-mail spam botnet eventually dismantled november 2010 seizure command control servers estimated consist millions zombie computers though earliest reports surrounding bredolab botnet originate may 2009 first malware samples bredolab trojan horse found botnet rise prominence august 2009 major surge size botnet bredonet main form propagation sending malicious e-mails included malware attachments would infect computer opened effectively turning computer another zombie controlled botnet peak botnet capable sending 3.6 billion infected emails every day main form propagation use drive-by downloads method exploits security vulnerabilities software method allowed botnet bypass software protection order facilitate downloads without user aware main income botnet generated leasing parts botnet third parties could subsequently use infected systems purposes security researchers estimate owner botnet made 139,000 month botnet related activities due rental business strategy payload bredolab diverse ranged scareware malware e-mail spam 25 october 2010 team dutch law enforcement agents seized control 143 servers contained three command control servers one database server several management servers bredolab botnet datacenter leaseweb effectively removing botnet herder ability control botnet centrally attempt regain control botnet botnet herder utilized 220,000 computers still control unleash ddos attack leaseweb servers though attempts ultimately vain taking control botnet law enforcement team utilized botnet send message owners infected computers stating computer part botnet subsequently armenian law enforcement officers arrested armenian citizen georgy avanesov basis suspected mastermind behind botnet suspect denied involvement botnet sentenced four years prison may 2012 seizure command control servers severely disrupted botnet ability operate botnet still partially intact command control servers persisting russia kazakhstan security firm fireeye believes secondary group botnet herders taken remaining part botnet purposes possibly previous client reverse engineered parts original botnet creator code even group noted botnet size capacity severely reduced law enforcement intervention
[ 3072, 5636, 10756, 3724, 3347, 4883, 2325, 278, 9630, 10657, 4648, 939, 46, 10297, 3643, 5563, 7739, 7996, 11583, 9664, 9154, 8133, 10952, 81, 8789, 10457, 7515, 988, 3807, 8032, 3555, 3941, 10477, 4462, 3320, 2041, 10875, 3581, 9087 ]
Validation
5,887
5
Ultrasurf:ultrasurf ultrasurf freeware internet censorship circumvention product created ultrareach internet corporation software bypasses internet censorship firewalls using http proxy server employs encryption protocols privacy software developed chinese dissidents means allowing internet users bypass great firewall china currently boasts many 11 million users worldwide tool described one important free-speech tools internet wired best performing circumvention tool harvard university 2007 study 2011 study freedom house ranked fourth critics open-source community george turner says expressed concern software closed-source nature alleged security obscurity design ultrareach says security considerations mean prefer third party expert review open source review 2001 ultrareach founded chinese dissidents silicon valley shortly ultrasurf created allow internet users china evade government censorship monitoring 2011 ultrasurf reported eleven million users worldwide arab spring ultrareach recorded 700 percent spike traffic tunisia similar traffic spikes occur frequently times unrest regions tibet burma saffron revolution wired magazine 2010 called ultrasurf one important free-speech tools internet enabling citizens access share information oppressed countries times humanitarian human rights crises ultrasurf funded part contracts u.s. government broadcasting board governors administers voice america radio free asia 2012 ultrareach difficulty serving growing user base due insufficient funding ultrasurf free download requires installation ultrasurf install files user computer leaves registry edits exits words leaves trace use fully remove software computer user needs delete exe file named u.exe available windows platform runs internet explorer default optional plug-in firefox chrome ultrareach website notes anti-virus software companies misclassify ultrasurf malware trojan ultrasurf encrypts communications circumvents internet censorship security companies agreed whitelist ultrasurf according applebaum ultrasurf client uses anti-debugging techniques also employs executable compression client acts local proxy communicates ultrareach network appears obfuscated form tls/ssl software works creating encrypted http tunnel user computer central pool proxy servers enabling users bypass firewalls censorship ultrareach hosts servers software makes use sophisticated proprietary anti-blocking technology overcome filtering censorship online according wired magazine ultrasurf changes ip addresses proxy servers 10,000 times hour server-side 2011 analysis found ultrareach network employed squid ziproxy software well isc bind servers bootstrapping wider network open recursive dns servers latter ultrareach control ultrasurf designed primarily anti-censorship tool also offers privacy protections form industry standard encryption added layer obfuscation built ultrareach uses internal content filter blocks sites deemed pornographic otherwise offensive according wired magazine partly network lacks bandwidth accommodate much data-heavy traffic also falun gong frowns erotica additionally falun gong criticism website facts.org.cn alleged operated chinese government also unreachable ultrasurf 2007 study harvard university berkman center internet society found ultrasurf best performing tested circumvention tools in-country tests recommended widespread use particular report found ultrasurf effectively bypassed various forms censorship blocking include ip block dns block keyword filtering also fastest tool in-country tests noted easy use install simple user interface report noted however ultrareach designed primarily circumvention product rather anonymity tool suggested users concerned anonymity disable browser support active content using ultrasurf 2011 report u.s.-based human rights group freedom house ranked ultrasurf fourth overall among censorship circumvention privacy tools measured combination performance usability support security particular tool recommended users interested downloading viewing information required relatively high degree privacy favored fast connection speed technologists expressed reservations ultrareach model however particular developers criticized proponents open-source software allowing peer review tool design except discretion creators moreover ultrareach operates servers developers access user logs architecture means users required trust ultrareach reveal user data ultrareach maintains keeps logs short period time uses purpose analyzing traffic signs interference monitor overall performance efficacy company says disclose user logs third parties according jacob appelbaum tor project essentially amounts example privacy policy april 2012 report appelbaum criticized ultrasurf use internal content filtering including blocking pornographic websites willingness comply subpoenas u.s. law enforcement officials appelbaum report also noted ultrasurf pages employed google analytics potential leak user data systems date latest security patches make use forward security mechanisms furthermore applebaum claims ultrasurf client uses open free software including putty zlib use putty zlib disclosed use lack disclosure violation licenses response posted day ultrareach wrote already resolved issues asserted appelbaum report misrepresented misunderstood aspects software ultrareach also argued differences software approaches internet censorship represented tor ultrasurf base philosophical simply different approaches censorship circumvention top-secret nsa presentation revealed part 2013 global surveillance disclosures dismisses response ultrasurf talk show due restrictions imposed organizations mcafee virusscan flagging ultrasurf versions potentially unwanted program avoiding execution machines ultrasurf virus ultrasurf virus used inappropriately students minors circumvent firewalls measures put place prevent exposure inappropriate and/or indecent content pornography fact runs undetected operating system makes virtually impossible disable block
[ 4224, 5254, 138, 6797, 5524, 1692, 9117, 2721, 8998, 3625, 9771, 3629, 7983, 5811, 8630, 8640, 3777, 2884, 3781, 10442, 5591, 2661, 10341, 615, 9193, 4725, 5749 ]
Test
5,888
9
Metacharacter:metacharacter metacharacter character special meaning computer program shell interpreter regular expression regex engine posix extended regular expressions 14 metacharacters must escaped preceded backslash order drop special meaning treated literally inside expression opening closing square brackets backslash caret dollar sign period/full stop/dot vertical bar/pipe symbol question mark asterisk plus sign opening closing curly brackets/braces opening closing parentheses example match arithmetic expression 1+1 *3=6 regex correct regex 1\+1\ \*3=6 otherwise parentheses plus sign asterisk special meanings characters may special meaning environments term escape metacharacter means make metacharacter ineffective strip special meaning causing literal meaning example pcre dot stands single character regular expression a.c match abc a3c even c however escaped lose meaning metacharacter interpreted literally causing regular expression a\.c match string a.c usual way escape character regex elsewhere prefixing backslash environments may employ different methods like ms-dos/windows command prompt caret used instead
[ 1474, 963, 6498, 8262, 9735, 1803, 10413, 9166, 8975, 3856, 11442, 3443, 7325, 1277, 479 ]
Train
5,889
5
Software_Upgrade_Protocol:software upgrade protocol software upgrade protocol sup system set programs developed carnegie mellon university 1980s andrew file system provides collections files maintained identical versions across number machines originally developed mach operating system implementations provided debian ubuntu linux distributions
[ 7561, 3826 ]
Test
5,890
5
Named_data_networking:named data networking named data networking ndn related content-centric networking ccn content-based networking data-oriented networking information-centric networking icn proposed future internet architecture inspired years empirical research network usage growing awareness unsolved problems contemporary internet architectures like ip ndn roots earlier project content-centric networking ccn van jacobson first publicly presented 2006 ndn project investigating jacobson proposed evolution today host-centric network architecture ip data-centric network architecture ndn belief conceptually simple shift far-reaching implications people design develop deploy use networks applications premise internet primarily used information distribution network good match ip future internet thin waist based named data rather numerically addressed hosts underlying principle communication network allow user focus data needs named content rather reference specific physical location data retrieved named hosts motivation derived fact vast majority current internet usage high 90 level traffic consists data disseminated source number users named-data networking comes potential wide range benefits content caching reduce congestion improve delivery speed simpler configuration network devices building security network data level today internet hourglass architecture centers universal network layer ip implements minimal functionality necessary global inter-connectivity contemporary internet architecture revolves around host-based conversation model created 1970s allow geographically distributed users use big immobile computers thin waist enabled internet explosive growth allowing lower upper layer technologies innovate independently however ip designed create communication network packets named communication endpoints sustained growth e-commerce digital media social networking smartphone applications led dominant use internet distribution network distribution networks general communication networks solving distribution problems via point-to-point communication protocol complex error-prone named data networking ndn project proposed evolution ip architecture generalizes role thin waist packets name objects communication endpoints specifically ndn changes semantics network service delivering packet given destination address fetching data identified given name name ndn packet name anything – endpoint data chunk movie book command turn lights etc hope conceptually simple change allows ndn networks apply almost internet well-tested engineering properties broader range problems beyond end-to-end communications examples ndn applying lessons learned 30 years networking engineering self-regulation network traffic via flow balance interest data request data packets security primitives via signatures named data integrated protocol start philosophy behind ndn pioneered ted nelson 1979 later brent baccala 2002 1999 triad project stanford proposed avoiding dns lookups using name object route towards close replica 2006 data-oriented network architecture dona project uc berkeley icsi proposed content-centric network architecture improved triad incorporating security authenticity persistence first-class primitives architecture van jacobson gave google talk new way look networking 2006 evolution network argued ndn next step 2009 parc announced content-centric architecture within ccnx project led jacobson time research fellow parc september 21 2009 parc published specifications interoperability released initial open source implementation gpl content-centric networking research project project ccnx site ndn one instance general network research direction called information-centric networking icn different architecture designs emerged internet research task force irtf established icn research working group 2012 ndn includes sixteen nsf-funded principal investigators twelve campuses growing interest academic industrial research communities 30 institutions form global testbed exists large body research actively growing code base contributed ndn ndn forwarder currently supported ubuntu 16.04 18.04 fedora 20+ centos 6+ gentoo linux raspberry pi openwrt freebsd 10+ several platforms common client libraries actively supported c++ java javascript python .net framework c squirrel programming languages ndn simulator emulator also available actively developed several client applications developed areas real-time conferencing ndn friendly file systems chat file sharing iot communication ndn driven receivers i.e. data consumers exchange two types packets interest data types packets carry name identifies piece data transmitted one data packet packet types complete specification see ndn packet format specification carry interest data packet forwarding functions ndn router maintains three data structures forwarding policy interest packet arrives ndn router first checks content store matching data exists router returns data packet interface interest came otherwise router looks name pit matching entry exists simply records incoming interface interest pit entry absence matching pit entry router forward interest toward data producer based information fib well router adaptive forwarding strategy router receives interests name multiple downstream nodes forwards first one upstream toward data producer data packet arrives ndn router finds matching pit entry forwards data down-stream interfaces listed pit entry removes pit entry caches data content store data packets always take reverse path interests absence packet losses one interest packet results one data packet link providing flow balance fetch large content objects comprise multiple packets interests provide similar role controlling traffic flow tcp acks today internet fine-grained feedback loop controlled consumer data neither interest data packets carry host interface addresses routers forward interest packets toward data producers based names carried packets forward data packets consumers based pit state information set interests hop interest/data packet exchange symmetry induces hop-by-hop control loop confused symmetric routing routing eliminates need notion source destination nodes data delivery unlike ip end-to-end packet delivery model ndn names opaque network allows application choose naming scheme fits needs naming thus evolve independently network ndn design assumes hierarchically structured names e.g. video produced ucla may name /ucla/videos/demo.mpg ‘ ’ delineates name components text representations similar urls hierarchical structure many potential benefits retrieve dynamically generated data consumers must able deterministically construct name desired piece data without previously seen name data either current research exploring applications choose names facilitate application development network delivery aim work develop refine existing principles guidelines naming converting rules naming conventions implemented system libraries simplify future application development data may retrieved globally must globally unique names names used local communications may require local routing local broadcast find matching data individual data names meaningful various scopes contexts ranging “ light switch room ” “ country names world ” namespace management part ndn architecture address space management part ip architecture however naming important part ndn application designs enabling application developers sometimes users design namespaces data exchange several benefits ndn routes forwards packets based names eliminates three problems caused addresses ip architecture ndn use conventional routing algorithms link state distance vector instead announcing ip prefixes ndn router announces name prefixes cover data router willing serve conventional routing protocols ospf bgp adapted route name prefixes treating names sequence opaque components component-wise longest prefix match name interest packet fib table enables wide array inputs aggregated real time distributed across multiple interface environments simultaneously without compromising content encryption pit state router supports forwarding across ndn data plane recording pending interest incoming interface removing interest matching data received timeout occurs per hop per packet state differs ip stateless data plane based information fib performance measurements adaptive forwarding strategy module router makes informed decisions router decides interest satisfied e.g. upstream link forwarding entry fib extreme congestion occurs router send nack downstream neighbor transmitted interest negative acknowledgment nack may trigger receiving router forward interest interfaces explore alternate paths pit state enables routers identify discard looping packets allowing freely use multiple paths toward data producer packets loop ndn means need time-to-live measures implemented ip related protocols address issues contrast tcp/ip leaves responsibility security lack thereof endpoints ndn secures data requiring data producers cryptographically sign every data packet publisher signature ensures integrity enables determination data provenance allowing consumer trust data decoupled obtained ndn also supports fine-grained trust allowing consumers reason whether public key owner acceptable publisher specific piece data specific context second primary research thrust designing developing usable mechanisms manage user trust research 2 different types trust models ndn data-centric security natural applications content access control infrastructure security applications encrypt data distribute keys named packets using named infrastructure distribute keys effectively limiting data security perimeter context single application verify data packet signature application fetch appropriate key identified packet key locator field like content trust management i.e. determine authenticity given key particular packet given application primary research challenge consistent experimental approach ndn trust management research driven application development use solving specific problems first identifying common patterns example security needs nlsr required development simple hierarchical trust model keys lower closer root levels used sign keys higher levels keys published names reflect trust relationship trust model namespace matches hierarchy trust delegation i.e. /root/site/operator/ router/process publishing keys particular name hierarchy authorizes sign specific data packets limits scope paradigm easily extended applications real world trust tends follow hierarchical pattern building management systems bms since ndn leaves trust model control application flexible expressive trust relations may also expressed one example chronochat motivated experimentation web-of-trust model security model current chatroom participant introduce newcomer others signing newcomer key future applications implement cross-certifying model sdsi 13 3 provides redundancy verification allowing data key names independent easily accommodates variety real-world trust relationships furthermore ndn treats network routing control messages like ndn data requiring signatures provides solid foundation securing routing protocols attack e.g. spoofing tampering ndn use multipath forwarding together adaptive forwarding strategy module mitigates prefix hijacking routers detect anomalies caused hijacks retrieve data alternate paths since ndn packets reference content rather devices trickier maliciously target particular device although mitigation mechanisms needed ndn-specific attacks e.g. interest flooding dos. furthermore pending interest table keeps state regarding past requests make informed forward decisions handle interest numerous security advantages
[ 5472, 2085, 3751, 11122, 503 ]
Test
5,891
4
VIPRE:vipre vipre security also known vipre brand j2 global develops cybersecurity products focused endpoint email security along advanced threat intelligence solutions vipre based clearwater florida operations washington d.c. vancouver b.c. spain uk philippines company originally founded 1994 sunbelt software acquired 2010 gfi software becoming vipre distributed products threattrack security 2017 concentrates vipre suite company uses name vipre portfolio encompasses endpoint security heritage original sunbelt software anti-virus products email security heritage fusemail electric mail products previously acquired j2 2017 vipre earned recognition av-comparatives one six top-rated products av-test virus bulletin february 2018 acquired j2 global recently featured pc world magazine article
[ 2049, 7809, 131, 7560, 1417, 4374, 6550, 1052, 156, 2721, 2213, 550, 1318, 6823, 2601, 8614, 2859, 3243, 6699, 8615, 6834, 4403, 10166, 704, 9537, 7362, 10308, 4421, 4677, 6473, 202, 1355, 1994, 5069, 10574, 10708, 2005, 11225, 1242, 2907...
Test
5,892
2
Android_version_history:android version history version history android mobile operating system began public release android beta november 5 2007 first commercial version android 1.0 released september 23 2008 android continually developed google open handset alliance seen number updates base operating system since initial release versions android 1.0 1.1 released specific code names although android 1.1 unofficially known petit four android code names confectionery-themed alphabetical order since 2009 android 1.5 cupcake recent version android android 9 pie released august 2018 development android started 2003 android inc. purchased google 2005 beta released november 5 2007 software development kit sdk released november 12 2007 november 5 date popularly celebrated android birthday public beta versions sdk released following order following tables show release dates key features android operating system updates date listed chronologically official application programming interface api levels main hardware platform android arm architecture armv7 armv8-a architectures formerly also armv5 x86 mips architectures also officially supported later versions android mips support since deprecated support removed ndk r17 unofficial android-x86 project used provide support x86 mips architectures ahead official support 2012 android devices intel processors began appear including phones tablets gaining support 64-bit platforms android first made run 64-bit x86 arm64 since android 5.0 lollipop 64-bit variants platforms supported addition 32-bit variants requirements minimum amount ram devices running android 7.1 depend screen size density type cpu ranging 816mb–1.8gb 64-bit 512mb–1.3gb 32-bit meaning practice 1gb common type display minimum android watch 416mb recommendation android 4.4 least 512 mb ram low ram devices 340 mb required minimum amount include memory dedicated various hardware components baseband processor android 4.4 requires 32-bit armv7 mips x86 architecture processor latter two unofficial ports together opengl es 2.0 compatible graphics processing unit gpu android supports opengl es 1.1 2.0 3.0 3.2 since android 7.0 vulkan version 1.1 available devices applications may explicitly require certain version opengl es suitable gpu hardware required run applications android used require autofocus camera relaxed fixed-focus camera
[ 4096, 5637, 8719, 3600, 9745, 7700, 9244, 11294, 10271, 1578, 10284, 5677, 3633, 1083, 7234, 6212, 69, 2630, 8262, 4683, 4685, 11343, 3664, 8280, 10332, 8285, 2658, 5749, 8821, 6263, 11391, 1670, 7816, 5262, 6800, 11408, 10393, 8858, 7835, ...
Test
5,893
4
Red_Condor:red condor red condor inc. privately held company offers anti-spam appliances hosted service block e-mail spam spyware viruses company also offers message archiving service provides back-up inbound outbound email messages 2007 red condor introduced vx technology integrates local appliance hosted service technology redirects email appliance hosted service event network failure november 2008 company named dr. thomas steding former ceo pgp corporation president ceo january 2009 red condor received technology year award infoworld magazine april 2010 red condor purchased st. bernard software
[ 2118, 939, 10392, 7739, 2558 ]
Test
5,894
0
PATR-II:patr-ii patr-ii linguistic formalism used computational linguistics developed stuart m. shieber uses context-free grammar rules feature constraints rules
[ 1890, 2316 ]
Test
5,895
2
DasBoot:dasboot dasboot software utility produced subrosasoft.com inc allows user create bootable mac os x usb device mac os x 10.5 earlier freeware product live usb device used diagnostic repair recovery mac os x systems macworld uk editor choice 5 star award creating dasboot device requires steps addition dasboot application user needs bootable cd dvd firewire usb flash drive intel-powered apple computers support booting via usb usb firewire hard drives may also used dasboot works versions mac os x prior 10.6 bootable mac os x cd/dvds included programs drive genius diskwarrior filesalvage copycatx software utilities bootable dvd used mac os x installer disc used lacks libraries required create bootable device default following applications installed dasboot devices also present user applications folder following applications automatically included users add additional applications dasboot device dragging dropping desired application applications area dasboot application users also select deselect included applications simply clicking icon within applications section user selected device 'd like make bootable selected bootable disk copy required libraries information chosen programs include dasboot device clicking single button starts process building required information copying device boot system dasboot device user starts mac 'option sometimes called 'alt key held display startup screen allows select bootable device would like start system select dasboot device system start normal dasboot interface appear system boots allow user select installed application would like run release version 2.0 added support mac os x 10.6 snow leopard along support newer intel macs performance enhancements bug fixes
[ 6371, 9418, 3371, 7983, 6012, 4637, 1150 ]
Test
5,896
9
Preprocessor:preprocessor computer science preprocessor program processes input data produce output used input another program output said preprocessed form input data often used subsequent programs like compilers amount kind processing done depends nature preprocessor preprocessors capable performing relatively simple textual substitutions macro expansions others power full-fledged programming languages common example computer programming processing performed source code next step compilation computer languages e.g. c pl/i phase translation known preprocessing also include macro processing file inclusion language extensions lexical preprocessors lowest-level preprocessors require lexical analysis operate source text prior parsing performing simple substitution tokenized character sequences tokenized character sequences according user-defined rules typically perform macro substitution textual inclusion files conditional compilation inclusion common example c preprocessor takes lines beginning directives knows nothing underlying language use criticized many features built directly languages example macros replaced aggressive inlining templates includes compile-time imports requires preservation type information object code making feature impossible retrofit language conditional compilation effectively accomplished codice_1 dead code elimination languages however key point remember preprocessor directives start new line lexical preprocessors include general-purpose m4 commonly used cross-platform build systems autoconf gema open source macro processor operates patterns context syntactic preprocessors introduced lisp family languages role transform syntax trees according number user-defined rules programming languages rules written language program compile-time reflection case lisp ocaml languages rely fully external language define transformations xslt preprocessor xml statically typed counterpart cduce syntactic preprocessors typically used customize syntax language extend language adding new primitives embed domain-specific programming language dsl inside general purpose language good example syntax customization existence two different syntaxes objective caml programming language programs may written indifferently using normal syntax revised syntax may pretty-printed either syntax demand similarly number programs written ocaml customize syntax language addition new operators best examples language extension macros found lisp family languages languages simple dynamically typed functional cores standard distributions scheme common lisp permit imperative object-oriented programming well static typing almost features implemented syntactic preprocessing although bears noting macro expansion phase compilation handled compiler lisp still considered form preprocessing since takes place phases compilation one unusual features lisp family languages possibility using macros create internal dsl typically large lisp-based project module may written variety minilanguages one perhaps using sql-based dialect lisp another written dialect specialized guis pretty-printing etc common lisp standard library contains example level syntactic abstraction form loop macro implements algol-like minilanguage describe complex iteration still enabling use standard lisp operators metaocaml preprocessor/language provides similar features external dsls preprocessor takes description semantics language i.e interpreter combining compile-time interpretation code generation turns definition compiler ocaml programming language—and language either bytecode native code preprocessors specific particular data processing task e.g. compiling c language preprocessor may promoted general purpose meaning aimed specific usage programming language intended used wide variety text processing tasks m4 probably well known example general purpose preprocessor although c preprocessor sometimes used non-c specific role examples
[ 4481, 4865, 5635, 3462, 5510, 10761, 9997, 2062, 10510, 11023, 7964, 1952, 3624, 4777, 8874, 9385, 6061, 4398, 9389, 10413, 3765, 8502, 7479, 10684, 6718, 8000, 2374, 8262, 5584, 479, 10083, 10469, 8188, 8697, 9587, 1780, 11125, 502, 3960, ...
None
5,897
9
Sethi–Ullman_algorithm:sethi–ullman algorithm computer science sethi–ullman algorithm algorithm named ravi sethi jeffrey d. ullman inventors translating abstract syntax trees machine code uses registers possible generating code arithmetic expressions compiler decide best way translate expression terms number instructions used well number registers needed evaluate certain subtree especially case free registers scarce order evaluation important length generated code different orderings may lead larger smaller numbers intermediate values spilled memory restored sethi–ullman algorithm also known sethi–ullman numbering fulfills property producing code needs fewest instructions possible well fewest storage references assumption commutativity associativity apply operators used distributive laws i.e formula_1 hold please note algorithm succeeds well neither commutativity associativity hold expressions used therefore arithmetic transformations applied algorithm also take advantage common subexpressions apply directly expressions represented general directed acyclic graphs rather trees simple sethi–ullman algorithm works follows load/store architecture arithmetic expression formula_2 abstract syntax tree looks like continue algorithm need examine arithmetic expression formula_3 i.e look right subtree assignment '= start traversing tree preorder assigning number registers needed evaluate subtree note last summand expression formula_3 constant tree seen need 2 registers compute left subtree '* 1 register compute right subtree nodes c g need registers following reasons tree leaf number registers evaluate either 1 0 depending whether left right subtree since operation add r1 handle right component directly without storing register therefore shall start emit code left subtree first might run situation 2 registers left compute whole expression computed right subtree first needs 1 register would need register hold result right subtree computing left subtree would still need 2 registers therefore needing 3 registers concurrently computing left subtree first needs 2 registers result stored 1 since right subtree needs 1 register compute evaluation expression 2 registers left advanced version sethi–ullman algorithm arithmetic expressions first transformed exploiting algebraic properties operators used
[ 1952, 409, 7421, 9911 ]
Validation
5,898
3
SGI_IRIS:sgi iris sgi iris series line terminals workstations silicon graphics built 1980s early systems use motorola 68000 family processors originally later models feature early-generation mips processors
[ 7234, 6243, 5380, 10051, 11447, 6858, 5356, 9932, 7311, 5523, 5076, 3764, 1398, 5272, 221, 7001, 8435, 1149 ]
Validation
5,899
6
PEFS:pefs pefs private encrypted file system kernel level stacked cryptographic file system freebsd open source software available bsd license pefs official website pefs.io sources available github
[ 8640, 9281, 2050, 7139, 10631, 4746, 8331, 5749, 6519, 8283 ]
Test
5,900
8
Wamp.NET:wamp.net wamp.net combination typical wamp/wnmp stacks supports apache nginx current packages include apache nginx php mariadb mysql postgresql mongodb memcache redis downloaded cached installed/uninstalled via instance manager run standalone windows services multiple simultaneous instances supported meaning one could run mariadb mysql simultaneously apache nginx either different ports port across different interfaces sites/vhosts stored database tied specific web server instance allows moved different web server types versions click button creating new site/vhost automatically creates vhost file http https either apache nginx well update windows hosts file ssl certificates automatically generated background using internal ca root certificate automatically added trusted root store give warnings errors browsing site site/vhost use version php without need switching typically case stack implementations
[ 865, 8644, 3237, 8683, 6797, 7022, 7347, 8539 ]
None
5,901
3
LGA_1567:lga 1567 lga 1567 socket ls cpu socket used high-end server segment 1567 protruding pins make contact pads processor supports intel nehalem codenamed beckton xeon 7500 xeon 6500 series processors first released march 2010 6500 series scalable 2 sockets 7500 series scalable 4/8 sockets supporting motherboard later xeon e7 series using westmere-ex architecture reused socket
[ 3588, 3973, 5523, 2455, 3992, 8855, 11417, 3995, 4252, 6175, 7714, 10019, 4523, 2604, 2350, 6192, 9649, 4537, 7105, 6339, 4805, 7110, 8394, 3403, 4427, 4179, 3798, 4185, 7002, 9945, 11484, 9570, 10468, 613, 8552, 1260, 4717, 7151, 10225, ...
Test
5,902
4
Anti-Malware_Testing_Standards_Organization:anti-malware testing standards organization anti-malware testing standards organization amtso international non-profit organization set 2008 address perceived need improvement quality relevance objectivity anti-malware testing methodologies according amtso web site organization charter lists following objectives 2012 amtso administered elected unpaid board directors strategic input advisory board six committees handle specific operations membership fees pr subsequently major infrastructural change took place introducing executive team ceo cto cfo vps marketing strategy addition already existing board grew discussions security vendors security product testing organizations membership amtso also open academics reviewers publications include individual members however high cost full membership generally discourages individual members small organizations joining early 2011 organization offered much cheaper subscription rate n't however offer full voting rights amtso currently offers two-tier membership model entity members get full benefits membership individual members get benefits apart right vote members wider security community even testers raised issue organization membership includes preponderance security vendors organization created potentially useful resources testers including page flags relevant papers resources outside amtso repository guidelines documents benefit aspiring testers wide range topics another popular freely available resource security features check attempts download faux malicious file desktop android device simple test ensure basic anti-malware standards implemented test device also organizes workshops three times year discussion generation guidelines documents major by-product sessions
[ 37, 2213, 10278, 43, 5586, 665, 7515 ]
None
5,903
0
VerbNet:verbnet verbnet project maps propbank verb types corresponding levin classes lexical resource incorporates semantic syntactic information contents verbnet part semlink project development university colorado
[ 1890, 5667, 3721, 9577, 4971, 396, 10160, 1460, 5214 ]
None
5,904
2
Binary_Application_Markup_Language:binary application markup language binary application markup language file format microsoft generated compiling xaml files xaml file compiled binary application markup language file .baml extension may inserted resource .net framework assembly run-time framework engine extracts .baml file assembly resources parses creates corresponding wpf visual tree workflow format content loadable faster runtime xaml enriched tokens lexical analysis completed
[ 2432, 1347, 1348, 5635, 113, 3573, 5399 ]
Test
5,905
7
T-Systems:t-systems t-systems german global services consulting company headquartered frankfurt founded 2000 subsidiary deutsche telekom 2012 t-systems largest german one largest european services companies serving customers westlb old mutual daimler volkswagen royal dutch shell sanlam murray roberts bp tui ag de agostini philips man se airbus e.on british american tobacco company operates 20 countries 2015 employed 45,990 people 2003 approximately 50,000 people worldwide among around 27,000 germany 23,000 outside beginning december 2007 reinhard clemens ceo president eds hp enterprise services germany since 2003 since january 2018 adel al-saleh ceo t-systems june 2018 t-systems announced cut 10,000 jobs 3 years including 6,000 germany hope returning company profitability t-systems founded 2000 deutsche telekom acquired 50.1 stake debis systemhaus one largest services companies germany time deutsche telekom existing service businesses merged incorporated control one single company newly founded t-systems 2001 t-system headquarters moved bonn frankfurt 2002 remaining 49.9 share debis systemhaus acquired fully incorporated t-systems however company underwent leadership crisis first years creation due different agendas former debis management leadership former telekom subsidiaries since t-systems made number acquisitions notably purchase subsidiary volkswagen group december 2005 2007 2018 t-systems ceo t-systems also supported creation silicon saxony major cluster germany 2008 t-systems global services provider cognizant entered global alliance t-systems india operations taken cognizant following alliance late march 2008 t-systems also working german government market leader germany 2009 t-systems came another wing india t-systems ict india pvt ltd. support global partners t-systems ict india head office pune set another 'point production bangalore april 2016 expanding provide ict services also global customers t-systems international since september 2016 laszlo posset managing director t-systems ict india vivek krishnatray managed company indian operations t-systems different international subsidiaries
[ 9104, 9137, 9394, 8355 ]
None
5,906
5
Nagle's_algorithm:nagle algorithm nagle algorithm means improving efficiency tcp/ip networks reducing number packets need sent network defined john nagle working ford aerospace published 1984 request comments rfc title congestion control ip/tcp internetworks see rfc 896 rfc describes called small-packet problem application repeatedly emits data small chunks frequently 1 byte size since tcp packets 40-byte header 20 bytes tcp 20 bytes ipv4 results 41-byte packet 1 byte useful information huge overhead situation often occurs telnet sessions keypresses generate single byte data transmitted immediately worse slow links many packets transit time potentially leading congestion collapse nagle algorithm works combining number small outgoing messages sending specifically long sent packet sender received acknowledgment sender keep buffering output full packet worth output thus allowing output sent rfc defines algorithm inhibit sending new tcp segments new outgoing data arrives user previously transmitted data connection remains unacknowledged mss maximum segment size largest segment sent connection window size currently acceptable window unacknowledged data written pseudocode algorithm interacts badly tcp delayed acknowledgments delayed ack feature introduced tcp roughly time early 1980s different group algorithms enabled applications two successive writes tcp connection followed read fulfilled data second write reached destination experience constant delay 500 milliseconds ack delay reason tcp implementations usually provide applications interface disable nagle algorithm typically called codice_1 option solution recommended nagle avoid algorithm sending premature packets buffering application writes flushing buffer user-level solution avoid write-write-read sequences sockets write-read-write-read fine write-write-write fine write-write-read killer buffer little writes tcp send using standard unix i/o package flushing write read usually works nagle considers delayed acks bad idea since application layer usually respond within time window protocol level recommends disabling delayed ack example codice_2 linux instead algorithm quick acks incur much overhead many small packets algorithm applies data size data single write spans 2 n packets last packet withheld waiting ack previous packet request-response application protocols request data larger packet artificially impose hundred milliseconds latency requester responder even requester properly buffered request data nagle algorithm disabled requester case response data larger packet responder also disable nagle algorithm requester promptly receive whole response general since nagle algorithm defense careless applications benefit carefully written application takes proper care buffering algorithm either effect negative effect application applications expect real-time responses low latency react poorly nagle algorithm applications networked multiplayer video games movement mouse remotely controlled operating system expect actions sent immediately algorithm purposefully delays transmission increasing bandwidth efficiency expense latency reason applications low-bandwidth time-sensitive transmissions typically use codice_1 bypass nagle delay another option use udp instead modern operating systems implement nagle algorithms aix linux enabled default disabled per-socket basis using codice_1 option
[ 11112, 10924, 3005, 11413, 5146, 5469, 3006 ]
Test
5,907
9
XSL_Formatting_Objects:xsl formatting objects xsl-fo xsl formatting objects markup language xml document formatting often used generate pdf files xsl-fo part xsl extensible stylesheet language set w3c technologies designed transformation formatting xml data parts xsl xslt xpath version 1.1 xsl-fo published 2006 xsl-fo considered feature complete w3c last update working draft january 2012 working group closed november 2013 unlike combination html css xsl-fo unified presentational language semantic markup term used html unlike css modifies default presentation external xml html document stores document data within general idea behind xsl-fo use user writes document fo xml language xhtml docbook tei possible examples user obtains xslt transform either writing one finding one document type question xslt transform converts xml xsl-fo xsl-fo document generated passed application called fo processor fo processors convert xsl-fo document something readable printable common output xsl-fo pdf file postscript fo processors output formats like rtf files even window user gui displaying sequence pages contents xslt language originally conceived purpose widespread use general xml transformations transformation step taken much granted xsl-fo uncommon people call xslt turns xml xsl-fo actual xsl-fo document even tutorials xsl-fo tend written xslt commands around fo processing instructions xslt transformation step exceptionally powerful allows automatic generation table contents linked references index various possibilities xsl-fo document like pdf postscript document definitively describe layout text various pages instead describes pages look like various contents go fo processor determines position text within boundaries described fo document xsl-fo specification even allows different fo processors varying responses regard resultant generated pages example fo processors hyphenate words minimize space breaking line others choose different processors may even use different hyphenation algorithms ranging simple complex hyphenation algorithms take account whether previous next line also hyphenated change borderline cases quite substantially layout various pages cases xsl-fo specification explicitly allows fo processors degree choice regard layout differentiation fo processors creating inconsistent results processors often concern general purpose behind xsl-fo generate paged printed media xsl-fo documents usually used intermediaries mostly generate either pdf files printed document final form distributed opposed html generated distributed final form directly user distributing final pdf rather formatting language input whether html/css xsl-fo means one hand recipients n't affected unpredictability resulting differences among formatting language interpreters hand means document easily adapt different recipient needs different page size preferred font size tailoring on-screen versus on-paper versus audio presentation xsl-fo language designed paged media concept pages integral part xsl-fo structure fo works best could called content-driven design standard method layout books articles legal documents forth involves single flowing span fairly contiguous text various repeating information built margins page opposed layout-driven design used newspapers magazines content documents fit required space trimmed away fit xsl-fo easily handle tight restrictions magazine layout indeed many cases lacks ability express forms said layout despite basic nature language design capable great deal expressiveness tables lists side floats variety features available features comparable css layout features though features expected built xslt xsl-fo documents xml documents conform dtd schema instead conform syntax defined xsl-fo specification xsl-fo documents contain two required sections first section details list named page layouts second section list document data markup uses various page layouts determine content fills various pages page layouts define properties page define directions flow text match conventions language question define size page well margins page importantly define sequences pages allow effects odd even pages look different example one define page layout sequence gives extra space inner margins printing purposes allows space given margin book bound document data portion broken sequence flows flow attached page layout flows contain list blocks turn contain list text data inline markup elements combination two content may also added margins document page numbers chapter headings like blocks inline elements function much way css though rules padding margins differ fo css direction relative page orientation progression blocks inlines fully specified thus allowing fo documents function languages read different english language fo specification unlike css 2.1 uses direction-neutral terms like start end rather left right describing directions xsl-fo basic content markup derived css cascading rules many attributes xsl-fo propagate child elements unless explicitly overridden xsl-fo capable great deal textual layout functionality addition information specified xsl-fo language allows specification following page defined multiple columns case blocks flow one column next default individual blocks set span columns creating textual break page columns break flow columns break text allowed flow section section nature xsl-fo page specification multiple pages may actually different numbers widths columns text flow 3 column page 5 column page 1 column page quite easily fo features work within restrictions multi-column page span multiple columns specifying two attributes i.e.. span padding-after xsl-fo list essentially two sets blocks stacked side side entry consists block left start inline direction block sequence right end inline direction block left conceptually would number bullet list however could easily string text one might see glossary entry block right works expected blocks block containers multiple blocks single list entry numbering xsl-fo lists numbered expected done xslt whatever process generated xsl-fo document number lists explicitly numbered xsl-fo user specify widow orphan blocks flow allow attributes cascade child blocks additionally blocks specified kept together single page example image block description image set never separated fo processor best adhere commands even requires creating great deal empty space page user create footnotes appear bottom page footnote written fo document regular flow text point referenced reference represented inline definition though required body one blocks placed fo processor bottom page fo processor guarantees wherever reference footnote cited reference begin page even means creating extra empty space page fo table functions much like html/css table user specifies rows data individual cell user also specify styling information column background color additionally user specify first row table header row separate styling information fo processor told exactly much space give column told auto-fit text table fo extensive controls orienting blocks text one middle page designate block text oriented different orientation oriented blocks used languages different orientation rest document simply one needs orient text layout purposes blocks contain virtually kind content tables lists even blocks reoriented text version 1.1 xsl-fo adds number new features version 1.0 xsl-fo 1.0 fairly restrictive text allowed go areas page version 1.1 loosens restrictions significantly allowing flowing text mapped multiple explicit regions page allows newspaper-like typesetting many output formats xsl-fo processors specifically pdf bookmarking features allow format specify string text separate window selected user selected document window scrolls immediately specific region document xsl-fo v1.1 provides ability create named bookmarks xsl-fo thus allowing processor pass output format supports xsl-fo 1.1 features support generation index might found back book done referencing properly marked-up elements fo document last page generated without providing explicit in-document reference specific anchor fo document definition last page restricted within specific set pages cover entire document allows user specify something like page 2 15 page 15 page number last page definition table markers allow user create dynamic content within table headers footers running totals bottom page table table continued indicators xsl-fo 1.1 adds keywords inside outside side floats makes possible achieve page layouts marginalia positioned outside inside edges pages inside refers side page towards book binding outside refers side page away book binding xsl-fo 1.1 refines functionality sizing graphics fit ability shrink fit grow fit well ability define specific scaling steps addition resulting scaling factor referenced display example say figure caption image shown 50 actual size trying decide whether xsl-fo work given document following typographic layout requirements usually indicate xsl-fo work although may satisfied proprietary extensions xml html standards css standard since css2 paged media module starts supply basic features printed media css paged media module level 3 w3c completing formulation integrated standard document formatting generate pdfs since 2013 css3-paged w3c proposal xsl-fo replacement software products like prince antenna house formatter demonstrated comparable quality xsl-fo using css pdf production design notes version 2.0 xsl formatting objects first published 2009 last updated 2012
[ 11650, 8070, 7943, 10910, 7455, 4768, 10791, 8627, 8628, 3921, 8923, 479, 6629, 5869, 10611, 4213, 502, 6775, 2296, 10486, 124, 7422 ]
Validation
5,908
3
Joint_Interoperability_of_Tactical_Command_and_Control_Systems:joint interoperability tactical command control systems joint interoperability tactical command control systems jintaccs united states military program development maintenance tactical information exchange configuration items cis operational procedures originated ensure command control c2 c3 weapons systems us military services nato forces would interoperable made standard message text formats mtf man-readable machine-processable information core set common warfighting symbols data link standards called tactical data links tdls
[]
Test
5,909
9
Keykit:keykit keykit graphical environment programming language midi synthesis algorithmic composition originally developed tim thompson released tim thompson software engineer originator various software titles including keykit stevie predecessor widely distributed popular text editor vim keykit originally named keynote developed thompson spare time worked though related actual job keynote originally released toolchest 1995 released keykit license making freely available non-commercial use keykit noteworthy versatility expressiveness complex algorithmic arrangements produced much detail sophistication required software works multiple platforms operating systems dependent peripherals sound cards specific vendor unique advantages similar music workstation products similar functionality algorithmic composition computer generated music features
[ 8262, 6797, 7983, 823, 2908 ]
None
5,910
8
IBM_WebSphere_Application_Server_Community_Edition:ibm websphere application server community edition websphere application server community edition wasce free-of-charge certified java ee 6 application server building managing java applications ibm supported distribution apache geronimo uses tomcat servlet container axis 2 web services difference apache geronimo wasce comes db2 informix database drivers better xml parser libraries xml4j xlxp contains latest patches unreleased upstream versions 30 wasce developers committers apache geronimo project ibm announced september 20 2013 wasce withdrawn marketing support withdrawn september 30 2016
[ 6850, 10340, 3560, 5612, 5677, 7022, 3323, 7983, 8539, 1363, 2901, 11030, 6651, 5433, 1851, 3966 ]
None
5,911
9
Aliasing_(computing):aliasing computing computing aliasing describes situation data location memory accessed different symbolic names program thus modifying data one name implicitly modifies values associated aliased names may expected programmer result aliasing makes particularly difficult understand analyze optimize programs aliasing analysers intend make compute useful information understanding aliasing programs example implementations c programming language perform array bounds checking one exploit implementation programming language compiler computer architecture assembly language conventions achieve aliasing effects writing outside array type buffer overflow invokes undefined behaviour according c language specification however many implementations c show aliasing effects described array created stack variable laid memory directly beside array one could index outside array directly change variable changing relevant array element example int array size 2 example sake calling arr next another int variable call arr 2 i.e 3rd element would aliased adjacent memory int main possible implementations c array block contiguous memory array elements merely referenced offsets address beginning block multiplied size single element since c bounds checking indexing addressing outside array possible note aforementioned aliasing behaviour undefined behaviour implementations may leave space arrays variables stack instance align variables memory locations multiple architecture native word size c standard generally specify data laid memory iso/iec 9899:1999 section 6.2.6.1 erroneous compiler omit aliasing effects accesses fall outside bounds array another variety aliasing occur language refer one location memory one name example pointers see c example xor swap algorithm function assumes two pointers passed distinct fact equal aliases function fails common problem functions accept pointer arguments tolerance lack thereof aliasing must carefully documented particularly functions perform complex manipulations memory areas passed controlled aliasing behaviour may desirable cases aliasing behaviour specified unlike enabled memory layout c common practice fortran perl programming language specifies constructs aliasing behaviour foreach loops allows certain data structures modified directly less code example array 1 2 3 foreach element array print 2 3 4 result one wanted bypass aliasing effects one could copy contents index variable another change copy optimizers often make conservative assumptions variables presence pointers example knowing value variable codice_1 5 normally allows certain optimizations constant propagation however compiler use information assignment another variable example c codice_2 could codice_3 alias codice_1 could case assignment like codice_5 effect assignment codice_3 value x would changed well propagating information codice_1 5 statements following codice_2 would potentially wrong codice_3 indeed alias codice_1 however information pointers constant propagation process could make query like codice_1 alias codice_3 answer codice_13 propagated safely another optimization impacted aliasing code reordering compiler decides codice_1 aliased codice_3 code uses changes value codice_1 moved assignment codice_2 would improve scheduling enable loop optimizations carried enable optimizations predictable manner iso standard c programming language including newer c99 edition see section 6.5 paragraph 7 specifies illegal exceptions access memory location using pointers different types compiler may therefore assume pointers alias rule known strict aliasing rule sometimes allows impressive increases performance known break otherwise valid code several software projects intentionally violate portion c99 standard example python 2.x implement reference counting required changes basic object structs python 3 enable optimization linux kernel strict aliasing causes problems optimization inlined code cases compiled gcc option codice_18 invoked prevent unwanted optimizations could yield unexpected code term aliasing also used describe situation due either hardware design choice hardware failure one available address bits used memory selection process may design decision address bits available necessary support installed memory device failure one address bits may shorted together may forced ground logic 0 supply voltage logic 1 example assume memory design 8 locations requiring 3 address lines bits since 2 8 address bits named a2 a0 decoded select unique memory locations follows standard binary counter fashion table 8 unique combinations address bits selects different memory location however one address bit say a2 shorted ground table would modified follows case a2 always zero first four memory locations duplicated appear second four memory locations 4 7 become inaccessible change occurred different address bit decoding results would different general effect would loss single address bit cuts available memory space half resulting duplication aliasing remaining space
[ 1474, 9794, 8773, 8262, 8582, 10407, 655, 5040, 2045, 1844, 4884, 8502, 1175, 3960, 10261, 10043, 2620, 477 ]
Test
5,912
2
Health_(Apple):health apple health health informatics mobile app announced apple inc. worldwide developers conference wwdc 2014 app included ios 8 later healthkit accompanying developer application programming interface api included ios sdk software development kit mac used software developers design applications extensibility interact health application ios release ios 8 september 2014 apple removed healthkit-compatible apps app store fix bug causing cellular touch id issues re-released healthkit release ios 8.0.2 september 26 2014 initially health criticized lack compatible third-party applications launch glucose tracking proper health data explanations sluggish app performance eventually apple fixed issues software update february 2017 several manufacturers apple sold hardware healthkit enabled july 2016 ios 10 users united states able sign organ eye tissue donor apple health app
[ 10755, 9732, 5647, 7697, 11289, 6186, 4139, 6700, 1074, 8754, 9784, 8253, 8783, 4180, 10838, 1623, 3672, 3681, 9826, 8806, 3691, 2673, 7292, 2686, 6783, 10878, 5784, 1177, 3228, 2207, 11430, 2735, 3248, 4283, 3772, 7869, 3286, 9430, 3293, ...
None
5,913
2
Remote_Application_Programming_Interface:remote application programming interface remote application programming interface rapi remote procedure call rpc mechanism pocket pc server pc application client words rapi allows pc applications call functions executed pocket pc rapi registry file system database configuration pocket pc device available pc application
[ 5761, 10243, 5765, 10886, 2183, 9609, 5259, 9612, 653, 6927, 10769, 1043, 9491, 5401, 9114, 5119, 10654, 1055, 4384, 8607, 9762, 2083, 4771, 8227, 2854, 7846, 10024, 1577, 10026, 11559, 11683, 10414, 4143, 9263, 11570, 11316, 1077, 8246, 65...
Validation
5,914
7
Kynapse:kynapse kynapse artificial intelligence middleware product developed kynogon bought autodesk 2008 called autodesk kynapse 2011 re-engineered rebranded autodesk navigation kynapse used development 80 game titles including mafia ii crackdown alone dark 5 fable ii sonic hedgehog 2006 unreal engine kynapse also used companies eads bae systems électricité de france develop military industrial simulation
[ 8454, 6311, 8937, 2826, 3210, 11306, 6797, 6900, 2293, 4182, 823, 9691, 11700, 8122, 5083, 1916 ]
Test
5,915
8
SOAPjr:soapjr soapjr protocol specification exchanging structured information implementation web services computer networks hybrid soap json-rpc abbreviated jr case soapjr designed create clean fast ajax-style apis analogous introduction band signalling telephony world traditional soap longer simple object access protocol initially designed bloated overly verbose making bandwidth-hungry slow also based xml making expensive parse manipulate especially mobile embedded clients however core envelope/head/body design pattern useful ajax style apis soapjr uses similar envelope/head/body model using lightweight easier manipulate json contrast soap json-rpc overly simplistic basically tunnels http get-style key/value pairs within query string using json however within json-rpc head/body separation leaving metadata pollute main data space soapjr combines best two concepts designed create modern ajax apis easily used mobile devices embedded systems desktop browsers see soapjr specs detailed description soapjr open source project software released gpl content creative commons following soapjr entities defined json-schemas latest versions also downloaded single file soapjr.org also aims contribute creation common set dmds data model definitions may align json-schema proposal service mapping description proposal applications within specific domains easily share data primary extension soapjr may provide use consistent standardised error codes resources may inform development common data models utilised within microformats rdf basic request view jcard details single user based username message would passed request within json parameter e.g simple soapjr response head.result represents success body contains single jcard record list list search context would contain array 0 jcard records
[ 9441, 803, 10020, 1802, 6127, 10486, 479 ]
Validation
5,916
1
Hindu_genealogy_registers_at_Haridwar:hindu genealogy registers haridwar genealogy registers families maintained brahmin pandits priests ‘ pandas ’ double professional genealogists haridwar subject study many years several cases voluminous records vahis bahi also used settling legal cases regarding inheritance property disputes records held sacrosanct pilgrims pandas many places records trace family history twenty prior generations stretching across many centuries haridwar traditionally site death rites also shraaddha amongst hindus soon also became customary family pandits priest record visit family along gotra family tree marriages members present etc. grouped according family home town centuries registers became important genealogical source many families part splintered families tracing family tree family history well especially partition india 1947 later amongst indian diaspora custom similar panjis panji prabandh extensive genealogical records maintained among maithil brahmins bihar custom well known today indians settled abroad ancient custom detailed family genealogies hindu families past several generations kept professional hindu brahmin pandits popularly known pandas hindu holy city haridwar hand written registers passed generations pandit ancestors classified according original districts villages ones ancestors special designated pandit families charge designated district registers even cases ancestral districts villages left behind pakistan partition india hindus migrate india several cases present day descendants sikhs muslims christians uncommon one find details even one past seven generations genealogy registers kept pandas haridwar centuries hindu ancestors visited holy town haridwar purpose may mostly pilgrimage purposes or/and cremation dead immersion ashes bones kin cremation waters holy river ganges required hindu religious custom ancient custom go pandit charge ones family register update family genealogical family tree details marriages births deaths ones extended joint family present day india people visiting haridwar dumbfounded pundits blue solicit come update ancestral genealogical family tree news travels like wildfire among pandits ones family designated pandit quickly notified ones visit nowadays hindu joint family system broken people preferring nuclear families record keeping pandits prefer visitors haridwar come prepared getting touch ones extended family bringing relevant details regarding ones ancestral district village names grand parents great grand parents marriages births deaths occurred extended family even much details possible families married visiting family member required personally sign family genealogical register furnished ones family panda updating future family visitors generations see authenticate updated entries friends family members accompanying visit may also requested sign witnesses starting around 1977 hindu genealogy records microfilmed later housed genealogical society utah gsu usa since 1981 places records records hindu families kurukshetra pehowa chintpurni jawalapur haridwar jawalamukhi genealogical society utah currently restricts online access hindu genealogy records members church jesus christ latter-day saints lds church others notable places shraadhs performed pitrs noted sites became customary family pandits priest record visit family along gotra family tree marriages members present etc. grouped according family home town centuries registers became important genealogical source many families part splintered families tracing family tree family history thanesar kurukshetra traditionally site death rites also shraaddha amongst hindus genealogy records also kept pitrudhak teerth pehowa banks sarasvati river kurukshetra district haryana site hindu pilgrimage pandava performed death rites mahabharata war genealogy records pilgrims also kept jawalamukhi shakti peetha town nagar parishad kangra district indian state himachal pradesh site hindu pilgrimage genealogy records also kept chintpurni village una district himachal pradesh one shakti peethas major hindu pilgrimage site genealogy records also kept ghats varanasi ganges river major site hindu pilgrimage death rites performed especially manikarnika ghat genealogy records also kept ghats ganges prayagraj long place pilgrimage hindus spawned set priests maintain genealogy records often dating back centuries trimbakeshwar shiva temple ancient hindu temple town trimbak trimbakeshwar tehsil nashik district maharashtra india 28 km city nashik 40 km nashik road dedicated god shiva one twelve jyotirlingas genealogy records also kept purohits pandas tarakeswar shiva temple maintain genealogy records pilgrims
[]
Validation
5,917
9
Map_(higher-order_function):map higher-order function many programming languages map name higher-order function applies given function element functor e.g list returning list results order often called apply-to-all considered functional form concept map limited lists works sequential containers tree-like containers even abstract containers futures promises suppose list integers codice_1 would like calculate square integer first define function codice_2 single number shown haskell square x x x afterwards may call » map square 1 2 3 4 5 yields codice_3 demonstrating codice_4 gone entire list applied function codice_2 element see view step mapping process list integers codice_6 want map new list codice_7 according function formula_1 codice_4 provided part haskell base prelude i.e standard library implemented map b b map map f x xs f x map f xs haskell polymorphic function codice_9 generalized polytypic function codice_10 applies type belonging codice_11 type class type constructor lists codice_12 defined instance codice_11 type class using codice_4 function previous example instance functor examples codice_11 instances include trees -- simple binary tree data tree leaf fork tree tree instance functor tree mapping tree yields » fmap square fork fork leaf 1 leaf 2 fork leaf 3 leaf 4 fork fork leaf 1 leaf 4 fork leaf 9 leaf 16 every instance codice_11 type class codice_17 contractually obliged obey functor laws fmap id ≡ id -- identity law fmap f g ≡ fmap f fmap g -- composition law codice_18 denotes function composition haskell among uses allows defining element-wise operations various kinds collections moreover two functors natural transformation function polymorphic type formula_2 respects function defined parametric polymorphism type definition specification always satisfied mathematical basis maps allow number optimizations composition law ensures lead result formula_5 however second form efficient compute first form codice_4 requires rebuilding entire list scratch therefore compilers attempt transform first form second type optimization known map fusion functional analog loop fusion map functions often defined terms fold codice_22 means one map-fold fusion codice_23 equivalent codice_24 implementation map singly linked lists tail-recursive may build lot frames stack called large list many languages alternately provide reverse map function equivalent reversing mapped list tail-recursive implementation utilizes fold-left function reversemap f foldl \ys x f x ys since reversing singly linked list also tail-recursive reverse reverse-map composed perform normal map tail-recursive way map function originated functional programming languages language lisp introduced map function called codice_25 1959 slightly different versions already appearing 1958 original definition codice_25 mapping function successive rest lists function codice_25 still available newer lisps like common lisp though functions like codice_28 generic codice_4 would preferred squaring elements list using codice_25 would written s-expression notation like using function codice_28 example would written like today mapping functions supported may defined many procedural object-oriented multi-paradigm languages well c++ standard template library called codice_32 c 3.0 linq library provided extension method called codice_33 map also frequently used operation high level languages coldfusion markup language cfml perl python ruby operation called codice_4 four languages codice_35 alias codice_4 also provided ruby smalltalk common lisp provides family map-like functions one corresponding behavior described called codice_28 codice_38 indicating access using car operation also languages syntactic constructs providing functionality map function map sometimes generalized accept dyadic 2-argument functions apply user-supplied function corresponding elements two lists languages use special names map2 zipwith languages using explicit variadic functions may versions map variable arity support variable-arity functions map 2 lists encounters issue handling lists different lengths various languages differ raise exception stop length shortest list ignore extra items lists continue length longest list lists already ended pass placeholder value function indicating value languages support first-class functions codice_4 may partially applied lift function works one value element-wise equivalent works entire container example codice_40 haskell function squares element list
[ 3076, 3462, 8582, 1931, 2062, 3733, 8854, 5783, 4507, 155, 9245, 3876, 5031, 3370, 5165, 5677, 8116, 11574, 6074, 9914, 6718, 8644, 8262, 5833, 8397, 11343, 7889, 2519, 10083, 9828, 7805, 6502, 8421, 2666, 8554, 2670, 623, 7662, 6775, 370...
None
5,918
4
FIDO_Alliance:fido alliance fido fast identity online alliance open industry association launched february 2013 whose mission develop promote authentication standards help reduce world ’ over-reliance passwords fido addresses lack interoperability among strong authentication devices reduces problems users face creating remembering multiple usernames passwords fido supports full range authentication technologies including biometrics fingerprint iris scanners voice facial recognition well existing solutions communications standards trusted platform modules tpm usb security tokens embedded secure elements ese smart cards near field communication nfc usb security token device may used authenticate using simple password e.g four-digit pin pressing button specifications emphasize device-centric model authentication wire happens using public-key cryptography user device registers user server registering public key authenticate user device signs challenge server using private key holds keys device unlocked local user gesture biometric pressing button fido provides two types user experiences depending protocol used protocols define common interface client whatever local authentication method user exercises nok nok labs paypal lenovo among fido founders end september 2016 fido members totaled 260 including board made aetna alibaba group amazon american express arm bank america bc card broadcom crucialtec daon egis technology feitian gemalto google hypr infineon intel ing lenovo mastercard microsoft nok nok labs ntt docomo nxp semiconductors oberthur technologies paypal qualcomm rsa samsung electronics synaptics usaa visa vmware onespan yubico full list members available official website following open specifications may obtained fido web site u2f 1.0 proposed standard october 9 2014 starting point short-lived specification known fido 2.0 proposed standard september 4 2015 latter formally submitted world wide web consortium w3c november 12 2015 subsequently first working draft w3c web authentication webauthn standard published may 31 2016 webauthn standard revised numerous times since becoming w3c recommendation march 4 2019 meanwhile u2f 1.2 proposed standard july 11 2017 became starting point client authenticator protocol 2.0 proposed standard published september 27 2017 fido ctap 2.0 complements w3c webauthn scope fido2 project
[ 7936, 9863, 6153, 9745, 1054, 6316, 1069, 7212, 10801, 5433, 7354, 10566, 3271, 11336, 6222, 3026, 8921, 10207, 8674, 4965, 2154, 124 ]
Test
5,919
1
Quicklaw:quicklaw lexisnexis quicklaw canadian electronic legal research database provides court decisions levels news reports provincial federal statutes journals legal commentary also offers case citator case digests 2002 quicklaw purchased lexisnexis subsidiary lexisnexis canada lexisnexis quicklaw used lawyers law firms canada access case law legislation exclusive current awareness services expert commentary addition research lexisnexis quicklaw service also includes citation tools help lawyers law firms validate authority cases find summaries judicial considerations along treatment pinpoint references lexisnexis quicklaw composed several products providing legal practitioners access need perform research designed practices focus particular legal segments lexisnexis quicklaw essentials provides content needed research areas westlaw/ecarswell offers similar fee-based services canlii.org non-profit organization managed federation law societies canada canlii goal make canadian law accessible free internet website provides access court judgments tribunal decisions statutes regulations canadian jurisdictions canlii part collaboration legal information institute around world include austlii bailii lii etc
[ 6123 ]
Train
5,920
9
F*_(programming_language):f* programming language f* pronounced f star functional programming language inspired ml aimed program verification type system includes dependent types monadic effects refinement types allows expressing precise specifications programs including functional correctness security properties f* type-checker aims prove programs meet specifications using combination smt solving manual proofs programs written f* translated ocaml f c execution previous versions f* could also translated javascript latest version f* written entirely common subset f* f bootstraps ocaml f open source apache 2.0 license active development github
[ 9345, 5796, 3462, 8262, 4791, 10571, 5612, 7482, 7983, 11221, 2358, 823, 7386, 2140, 2045 ]
Validation
5,921
9
Bridging_(programming):bridging programming computer science bridging describes systems map runtime behaviour different programming languages share common resources often used allow foreign languages operate host platform native object libraries translating data state across two sides bridge bridging contrasts embedding systems allow limited interaction black box mechanism state sharing limited non-existent apple inc. made heavy use bridging several occasions notably early versions mac os x bridged older classic systems using carbon system well java microsoft common language runtime introduced .net framework designed multi-language start avoided need extensive bridging solutions platforms recently added new bridging systems javascript apple objc-to-js microsoft html bridge programming languages include concept subroutine function mechanism allows commonly used code encapsulated re-used throughout program instance program makes heavy use mathematics might need perform square root calculation various numbers throughout program code might isolated codice_1 function passed number perform square root calculation returns result many cases code question already exists either implemented hardware part underlying operating system program runs within cases codice_2 function simplified calling built-in code functions often fall easily identifiable groups similar capabilities mathematics functions instance handling text files functions often gathered together collections known libraries supplied system commonly past programming language language method calling functions libraries written one language may work another semantics calling functions c different pascal generally c programs call pascal libraries vice versa commonly used solution problem pick one set call semantics default system platform programming languages conform standard computer languages platforms generally added functionality expressed call/return model function garbage collection instance runs throughout lifetime application run sort functionality effectively outside program present expressed directly program functions like generally implemented ever-growing runtime systems libraries compiled programs necessarily visible within code introduction shared library systems changed model conventional program construction considerably past library code copied directly programs linker effectively became part program dynamic linking library code normally exists one place vendor-provided file system applications share aryl systems presented many problems often performance terms shared libraries largely isolated particular languages platforms opposed operating system whole many problems addressed 1990s early 2000s major platforms switched shared libraries primary interface entire system although systems addressed problem providing common code libraries new applications systems generally added runtimes well meant language library entire system often tightly linked together instance openstep entire operating system effect objective-c program programs running wished use extensive object suite provided openstep would able call libraries using obj-c semantics also interact obj-c runtime provide basic control application contrast microsoft .net framework designed start able support multiple languages initially c c++ new version visual basic ms isolated object libraries runtime common language infrastructure cli instead programs compiling directly source code underlying runtime format case languages cli model languages first compiled common intermediate language cil calls common language runtime clr theory programming language use cli system use .net objects although platforms like osx .net offer ability programming languages adapted platform runtime system also case programming languages often target runtime mind objective-c essentially requires obj-c runtime c clr one wants use c code within obj-c vice versa one find version written use runtime often n't exist common version problem concerns use languages platform independent like java runtimes libraries although possible build java compiler calls underlying system like j system would also able interact java code unless re-compiled access code java libraries may difficult impossible rise web browser sort virtual operating system made problem acute modern programming paradigm html5 includes javascript js language document object model major library browser runtime environment although would possible build version js runs clr would largely defeat purpose language designed largely operating browsers unless compiler interact browser directly little purpose using cases many like need arises system allows two runtimes interoperate known bridging runtimes apple made considerable use bridging technologies since earliest efforts led mac os x next first purchased apple plan build new version openstep then-known rhapsody emulator known blue box would run classic mac os programs led considerable push-back developer community rhapsody cancelled place os x would implement many older mac os calls top core functionality openstep providing path existing applications gracefully migrated forward apple took useful code openstep platform re-implemented core functionality pure-c library known core foundation cf short openstep libraries calling cf underlying code became cocoa api new mac-like c libraries became carbon api c obj-c sides system needed share data data obj-c side normally stored objects opposed base types conversions cf could expensive apple willing pay performance penalty implemented scheme known toll-free bridging help reduce eliminate problem time java becoming major player programming world apple also provided java bridging solution developed webobjects platform classical bridging solution direct conversions java openstep/cf types completed code required carbon program using cfstrings using code cocoa application using nsstring two could bridged toll-free java bridge cfstrings instead cast java string objects required work made porting essentially invisible developers made widespread use similar technologies provide support languages including peering system used allow obj-c code call .net code mono need porting solutions waned carbon java bridge deprecated eventually removed later releases system java support migrated using java native interface jni standard java world allowed java interact c-based code osx jni allowed obj-c code used difficulty around 2012 apple extensive work webkit led introduction new bridging technology allows javascript program code call obj-c/cocoa runtime vice versa allows browser automation using obj-c alternately automation cocoa applications using javascript originally part safari web browser 2013 code promoted part new osx 10.9 although examples bridging used past microsoft cli system intended support languages top .net system rather running native runtimes bridging led number new languages implemented cli system often including either hash mark iron name see list cli languages comprehensive set examples concept seen example ms embrace extend extinguish behaviour produced java-like languages c j instance work java code used libraries nevertheless classic windows ecosystem included considerable code would needed used within .net world role ms introduced well supported bridging system system included numerous utilities language features ease use windows visual basic code within .net system vice versa microsoft also introduced javascript bridging technology silverlight html bridge bridge exposes js types .net code .net types js code manages memory access safety similar bridging technologies often javascript one side common various platforms one example js bridge android os written example term also sometimes used describe object-relational mapping systems bridge divide sql database world modern object programming languages
[ 2304, 3462, 6664, 7307, 5677, 10413, 7983, 10176, 8262, 8524, 3790, 847, 3413, 10465, 10470, 487, 2804, 3573, 9467, 2045 ]
Test
5,922
3
Time_Stamp_Counter:time stamp counter time stamp counter tsc 64-bit register present x86 processors since pentium counts number cycles since reset instruction codice_1 returns tsc edx eax x86-64 mode codice_1 also clears higher 32 bits rax rdx opcode codice_3 pentium competitors cyrix 6x86 always tsc may consider codice_1 illegal instruction cyrix included time stamp counter mii time stamp counter excellent high-resolution low-overhead way program get cpu timing information advent multi-core/hyper-threaded cpus systems multiple cpus hibernating operating systems tsc relied upon provide accurate results — unless great care taken correct possible flaws rate tick whether cores processors identical values time-keeping registers promise timestamp counters multiple cpus single motherboard synchronized therefore program get reliable results limiting run one specific cpu even cpu speed may change power-saving measures taken os bios system may hibernated later resumed resetting tsc latter cases stay relevant program must re-calibrate counter periodically relying tsc also reduces portability processors may similar feature recent intel processors include constant rate tsc identified kern.timecounter.invariant_tsc sysctl freebsd codice_5 flag linux codice_6 processors tsc ticks processor nominal frequency regardless actual cpu clock frequency due turbo power saving states hence tsc ticks counting passage time number cpu clock cycles elapsed windows platforms microsoft strongly discourages using tsc high-resolution timing exactly reasons providing instead windows apis codice_7 codice_8 posix systems program get similar function reading value codice_9 clock using codice_10 function starting pentium pro intel processors practiced out-of-order execution instructions necessarily performed order appear program cause processor execute codice_1 later simple program expects producing misleading cycle count programmer solve problem inserting serializing instruction cpuid force every preceding instruction complete allowing program continue using codice_12 instruction serializing variant codice_1 instruction intel processor families increment time-stamp counter differently specific processor configuration determines behavior constant tsc behavior ensures duration clock tick uniform makes possible use tsc wall clock timer even processor core changes frequency architectural behavior later intel processors amd processors k8 core always incremented time-stamp counter every clock cycle thus power management features able change number increments per second values could get sync different cores processors system windows amd provides utility periodically synchronize counters multiple core cpus since family 10h barcelona/phenom amd chips feature constant tsc driven either hypertransport speed highest p state cpuid bit codice_14 advertises operating system may provide methods use n't use codice_1 instruction time keeping administrator control example versions linux kernel seccomp sandboxing mode disables codice_1 also disabled using codice_17 argument codice_18 system call time stamp counter used time instructions accurately exploited meltdown spectre security vulnerabilities however available counters timers used case arm processors vulnerable type attack processors also registers count cpu clock cycles different names instance avr32 called performance clock counter pccnt register sparc v9 provides codice_19 register armv7 armv8 architectures provide generic counter counts constant frequency powerpc provides 64-bit codice_20 register
[ 8322, 6924, 4237, 6926, 7313, 3109, 7983, 9911, 823, 3027, 2517, 1515, 5356, 9964, 7538, 499, 372, 1399, 5754, 8700 ]
Test
5,923
2
CheckInstall:checkinstall checkinstall computer program unix-like operating systems eases installation uninstallation software compiled source making use package management systems software compilation automatically generate slackware- rpm- debian-compatible package later cleanly uninstalled appropriate package manager checkinstall monitors installation phase normal software build process notes files added system builds package contains files using additional information gathered user finally files installed original run removed package installed using system package tools package properly registered local installed packages database primary benefits provided checkinstall versus simply running codice_1 ability remove package system using system packaging tools ability install resulting package multiple machines checkinstall sometimes cited mechanism creating packages open source projects lieu creating numerous platform-specific build packages checkinstall usually used running configure script codice_2 follows entering information author package description get folder generated package saved
[ 10149, 5096, 5067, 4398, 5492, 5397, 4309, 5656, 8954 ]
None
5,924
4
Symantec_Endpoint_Protection:symantec endpoint protection symantec endpoint protection developed symantec security software suite consists anti-malware intrusion prevention firewall features server desktop computers largest market-share product endpoint security first release symantec endpoint protection published september 2007 called version 11.0 endpoint protection result merger several security software products including symantec antivirus corporate edition 10.0 client security network access control sygate enterprise edition endpoint protection also included new features example block data transfers unauthorized device types usb flash drives bluetooth devices time symantec antivirus corporate edition widely criticized become bloated unwieldy endpoint protection 11.0 intended address criticisms disk footprint symantec corporate edition 10.0 almost 100 mb whereas endpoint protection projected 21 mb 2009 symantec introduced managed service whereby symantec staff deploy manage symantec endpoint protection installations remotely small business edition faster installation process released 2010 february 2011 symantec announced version 12.0 endpoint protection version 12 incorporated cloud-based database malicious files called symantec insight insight intended combat malware generates mutations files avoid detection signature-based anti-malware software late 2012 symantec released version 12.1.2 supports vmware vshield cloud version endpoint protection released september 2016 followed version 14 november version 14 incorporates machine learning technology find patterns digital data may indicative presence cyber-security threat also incorporates memory exploit mitigation performance improvements symantec endpoint protection security software suite includes intrusion prevention firewall anti-malware features according sc magazine endpoint protection also features typical data loss prevention software typically installed server running windows linux macos 2018 version 14 currently-supported release endpoint protection scans computers security threats used prevent unapproved programs running apply firewall policies block allow network traffic attempts identify block malicious traffic corporate network coming web browser uses aggregate information users identify malicious software 2016 symantec claims use data 175 million devices installed endpoint security 175 countries endpoint protection administrative console allows department modify security policies department programs files exclude antivirus scans manage mobile devices directly treats peripherals connected computer protects computer malicious software mobile device early 2012 source code symantec endpoint protection stolen published online hacker group called lords dharmaraja claimed credit alleging source code stolen indian military intelligence indian government requires vendors submit source code computer program sold government ensure used espionage july 2012 update endpoint protection caused compatibility issues triggering blue screen death windows xp machines running certain third-party file system drivers 2014 offensive security discovered exploit symantec endpoint protection penetration test financial services organization exploit application device control driver allowed logged-in user get system access patched august according gartner symantec endpoint protection 14 one comprehensive endpoint security products available regularly scores well independent tests however common criticism customers fatigued near constant changes product company direction sc magazine said enpoint protection 14 comprehensive tool type superb installation documentation review said endpoint protection no-brainer setup administration wart support fees bit steep forrester said version 12.1 complete endpoint security software product market different security functions software well-integrated report speculated lack integration would addressed version 14 network world ranked symantec endpoint protection sixth endpoint security products based data nss labs testing
[ 2049, 2563, 6153, 1052, 9762, 550, 10790, 2601, 6699, 8753, 569, 7228, 9279, 10308, 2118, 2654, 8816, 10872, 9341, 127, 7809, 131, 1172, 10903, 6297, 156, 2721, 2213, 6823, 3243, 1708, 8368, 6834, 704, 10433, 7362, 202, 4814, 8398, 9423, ...
Test
5,925
9
Atari_BASIC:atari basic atari basic interpreter basic programming language shipped atari 8-bit family 6502-based home computers unlike basics home computer era atari basic derivative microsoft basic differs significant ways includes keywords atari-specific features lacks support string arrays example language originally 8 kb rom cartridge first machines 8-bit series 400 800 1200xl starting 600xl 800xl basic built-in machines disabled holding codice_1 key booting xegs disables basic powered without keyboard attached complete annotated source code design specifications atari basic published atari basic source book 1983 machines would become atari 8-bit family originally developed second-generation video game consoles intended replace atari 2600 ray kassar new president atari decided challenge apple computer building home computer instead meant designs among changes needed support basic programming language standard language home computers 1978 atari purchased source code mos 6502 version microsoft 8k basic original 8k basic referred memory footprint compiled intel 8080 instruction set lower code density 6502 expanded code 9 kb slightly larger natural 8 kb size atari rom cartridges atari felt also needed expand language add better support specific hardware features computers similar apple done applesoft basic increased size 9 kb around 11 kb paring code 11 8 kb fit rom turned significant problem adding problem fact 6502 code supplied microsoft undocumented six months later almost ready shippable version interpreter however atari facing january 1979 deadline consumer electronics show ces machines would demonstrated decided ask help get version basic ready time show september 1978 shepardson microsystems bid completing basic shepardson written number programs apple ii family used 6502 processor middle finishing new basic cromemco s-100 bus machines cromemco 32k structured basic shepardson examined existing work decided difficult continue cutting size instead recommended developing completely new version originally 10k size make fit 8k rom common routines would moved operating system roms atari accepted proposal specifications finalized october 1978 paul laughton kathleen o'brien began work new language contract specified delivery date 6 april 1979 also included file manager system later known dos 1.0 atari plans take early 8k version microsoft basic 1979 ces switch new atari basic production development proceeded quickly helped bonus clause contract 8k cartridge available release machines atari took version ces instead ms version atari microsoft basic later became available separate product version shepardson gave atari ces demo supposed final version time delivered demo final delivery weeks later shepardson found several bugs code developed fixes however unknown shepardson atari already sent ces version manufacturing version later known revision among several problems version contains major bug subroutine copies memory deleting lines code exactly 256 bytes long causes lockup sometimes known two-line lockup trigger next line code command entered notorious one problems could fixed pressing key revision b attempted fix major bugs revision released 1983 built-in rom 600xl 800xl models fixing memory copying bug programmer noticed pattern code section inserting lines applied fix fix instead introduced original bug code inserting new lines much common deleting old ones change dramatically increased number crashes another major problem revision b bug added 16 bytes memory program every time codice_2d codice_3ed eventually causing machine run memory even smallest programs mapping atari described awesome bugs advised revision b owners n't fool around get new rom available cartridge atari book provided type-in program patch revision b revision c without cartridge revision c finally eliminated memory leaks revision b version built-in later versions 800xls xe computers xegs revision c also available cartridge production run version determined typing codice_4 ready prompt result codice_5 revision codice_6 revision b codice_7 revision c. atari basic uses line editor like home computer basics unlike basics atari basic scans just-entered program line reports errors immediately error found editor re-displays line highlighting text near error inverse video errors displayed numeric codes descriptions printed manual program lines entered starting line number insert new line amend existing one lines without line number executed immediately programmer types codice_8 program executes lowest line number atari basic allows commands executed modes instance codice_9 command used inside program list statement used display either entire basic program section program lines specifying starting ending line separated comma used output program listing printer program lines logical lines three screen lines physical lines 40 characters 120 characters total cursor moved freely lines unlike basics cursor moved left right editor os handles tracking whether physical line flowed next logical line moving cursor could move within logical lines automatically pressing sends tokenizer logical line cursor sits example pictured codice_10 author needs fix error move cursor codice_11 type editor overwrite mode hit common editing technique say renumbering lines atari basic built-in renumbering command one quickly learn overwrite numbers set lines hit repeatedly put back program atari basic uses token structure handle lexical processing better performance reduced memory size contrast ms-derived basics perform tokenization line-by-line basis program runs atari basic occurs user hits immediate syntax checking described program editing section side effect converting line tokenized form stored shepardson referred early-tokenizing concept pre-compiling interpreter tokenizer converts lines using small buffer memory program stored parse tree token output buffer addressed pointer lomem – 80 81 256 bytes tokenized statement larger buffer generates error 14 – line long output tokenizer moved permanent storage various locations memory set pointers addresses indicates locations variables stored variable name table pointed vntp – 82 83 values stored variable value table pointed vvtp – 86 87 indirecting variable names way reference variable needs two bytes address entry appropriate table strings area pointed starp – 8c 8d runtime stack pointed runstk – 8e 8f used store line numbers looping statements codice_12 subroutines codice_13 finally end basic memory usage indicated address stored memtop – 90 91 pointer atari basic uses unique way recognize abbreviated reserved words keyword abbreviated using period point writing codice_14 expanded codice_9 codice_16 expand abbreviation tokenizer searches list reserved words find first matches portion supplied commonly used commands occur first list reserved words codice_17 beginning typed codice_18 program later codice_9ed always write full words three exceptions codice_20 synonym codice_21 codice_22 synonym codice_23 codice_24 synonym empty string mean thing separate tokens remain program listing keywords communicating peripherals see input/output section codice_25 codice_26 codice_27 actually part tokenized keyword separate symbol example codice_20 codice_29 thing presented differently atari basic includes 12 functions mathematical trigonometric calculations tan function included may derived via exp function deg rad used set whether trigonometric functions use radians degrees radians default rnd function generates number 0 1 parameter function used number derived via pokey random number register address d20a atari basic differs considerably microsoft-style basics way handles strings microsoft basic mostly copied string-handling system dec basic-plus strings first-class types variable bounds allows string variables well arrays strings represented internally computer word pointing storage heap contrast atari basic copied string-handling system hewlett-packard basic basic data type single character strings arrays characters side-effect design true string arrays string variable must dimensioned used example program 20 character string reserved characters excess string length truncated maximum possible length string atari basic 32,768 characters ms basic included function accessing bits strings instance codice_30 would return leftmost 10 characters codice_31 atari basic string represented array access using array indexing functions equivalent statement atari basic would codice_32 note arrays 1-indexed 0-indexed modern variations slicing syntax two-dimensional arrays basics way define work arrays strings atari basic initialize array variables string array may contain whatever random data present memory allocated following trick allows fast string initialization also useful clearing large areas memory unwanted garbage numeric arrays cleared slow ... next loop string concatenation atari basic works following example target string must large enough hold combined string error result input statement used prompt array variables latter must filled indirectly via statement like 20 input b 1 =a array variables atari basic also may contain two subscripts strings included data statements enclosed quote marks atari basic result also possible data items contain comma read statement also used array variables arrays base index 0 statement dim 10 actually creates 11-element array elements 0-10 atari os includes subsystem peripheral device input/output i/o known cio central input/output programs written independently device might use conform common interface rare home computers time new device drivers could written fairly easily would automatically available atari basic program using atari os existing drivers could supplanted augmented new ones replacement example could displace one rom provide 80-column display piggyback generate checksum whenever line returned used verify type-in program listing atari basic supports cio access reserved words routines os graphics fill draw available specific basic keywords line drawing supported command providing area fill fill feature used general cio entry point called using basic command basic statement prepares device i/o access means ensure channel 1 free call driver prepare device set cassette tape spools onto tension advance heads keeping cassette tape player paused means read codes write read-and-write third number auxiliary information set 0 needed name device filename filename ignored cassette driver physical devices numbers mainly disks printers serial devices might plotter daisy-wheel printer may one disk drive present 1 assumed lprint statement used output strings printer atari basic include equivalent microsoft basic get inkey commands detect keypress simulated either pokeing keyboard driver directly opening file e.g open 1,4,0 k get 1 although latter wait keypress unlike get inkey typing codice_33 basic exit atari dos command menu unsaved programs lost command display disk directory within basic must done exiting dos dos occupies roughly 5k memory thus cassette-based atari machine 48k greater around 37,000 bytes free basic program memory 32,000 bytes dos present basic use extra ram xl xe machines atari basic built-in support sound via statement graphics joysticks paddles n't supplied command fill arbitrary shape pixels limited operating system function exists called command also commands drawing lines graphics primitives combination plot drawto statements used draw lines dedicated command clearing screen atari basic usually done prints clear screen control code analogous commodore basic atari basic include tab function simulated either pokeing cursor column position 55 tab position c9 default value 10 changed values take effect print statement executed also spc function atari basic advanced aspects hardware player/missile graphics sprites redefined character sets setting color palette/luminance tables scrolling custom graphics modes supported basic require machine language routines peek/poke statements graphics modes accessed basic atari 400/800 os roms support way access machine language setting antic registers display list manually os roms xl/xe added support modes bitmap modes basic normally set text window occupying last three rows bottom screen user may display prompts enter data program 16 added mode number invoked via graphics statement entire screen bitmap mode e.g graphics 8+16 bitmap mode full screen invoked atari basic automatically switch back text mode program execution terminated unlike many basics leave user bitmap mode unreadable screen switched via typing blind command resetting computer bitmap coordinates calculated range 1 maximum row/column minus one thus mode 6 160x192 maximum coordinates pixel 159 191 user goes allowed coordinates mode basic exit error unlike ms-derived basics atari basic allows numeric variables expressions used supply line numbers codice_22 codice_35 commands used clarify code instance subroutine clears screen could written codice_36 much easier understand typical codice_37 particular subroutine executed frequently placing line number variable also improve execution speed faster basic look constant variable instead processing time statement executed basics era allow codice_9 command send source code printer device atari basic also includes codice_39 command reads source code device merges back program user typed allows programs saved sections reading using codice_39 merge replace existing code carefully using blocks line numbers overlap programmers build libraries subroutines merge new programs needed atari basic call machine code subroutines machine code generally stored strings anywhere memory code needs position independent 256-byte page 6 area starting address 1536 600 used basic operating system code loaded page 6 reading codice_41 statements machine code invoked codice_42 function first parameter address machine code routine following values parameters example machine language code stored string named codice_43 called parameters parameters pushed onto hardware stack 16-bit integers order specified codice_42 function low byte high byte order last value pushed stack byte indicating number arguments machine language code must remove values returning via codice_45 instruction value returned basic program placing addresses 212 213 d4 d5 16-bit integer running original hardware atari basic slower home computer basics often large amount two widely used benchmarks era byte magazine sieve eratosthenes creative computing benchmark test written david h. ahl atari much slower apple ii even sinclair zx81 finishing near end list terms performance despite atari cpu running 1.79 mhz twice speed 6502-based computers language slowness stemmed two problems first numeric values basic stored floating-point binary coded decimal bcd format includes numbers integers like line numbers array indexes every time number encountered interpreter convert bcd format internal binary representation using routines operating system floating point math routines atari slow notably bcd binary conversion function affected programs byte benchmark constant conversion array indexes greatly slows program ahl benchmark single exponent operation loops poorly optimized multiplication function responsible much machine poor showing second problem due atari basic implemented loops branches perform branch codice_22 codice_35 interpreter searches entire program matching line number needs atari already slowed need convert numbers binary however serious problem case codice_48 ... codice_49 loop interpreters would push pointer location codice_48 stack reached codice_49 could easily return codice_48 atari basic location memory placed stack line number meant every time codice_49 encountered system search entire program find line loops atari basic program cause large loss performance relative basics several basics atari addressed issues resulting large performance gains basic xl reduced time byte benchmark 194 58 seconds three times fast accomplished caching location codice_54 loops basics cache also used codice_22 codice_35 improvements turbo-basic xl included similar caching well re-written high-performance floating-point library ahl benchmark atari basic required 405 seconds exactly code turbo basic took 41.6 seconds
[ 5635, 3718, 7691, 1805, 9997, 6289, 786, 11412, 22, 3736, 3481, 9881, 797, 3233, 11683, 8101, 4136, 10666, 8494, 303, 7343, 7983, 11315, 315, 7355, 7486, 7870, 4160, 4674, 10750, 712, 847, 1879, 92, 11229, 2915, 9188, 5733, 11243, 2541, ...
Test
5,926
9
Modem_script:modem script modem script settings file software programs use communicate modem also known ccl files connection control language files like modem init string modem scripts files provide modem configuration settings modem scripts go beyond init strings providing internal scripting language script authors use tune modem response main use terminal emulators dialers
[ 1121, 5281, 8262 ]
Test
5,927
4
Greenpois0n:greenpois0n greenpois0n name shared series ios jailbreaking tools developed chronic dev team sometimes called greenpois0n team use exploits remove software restrictions iphones ipads ipod touches apple tvs greenpois0n initial release october 2010 jailbroke ios 4.1 second version february 2011 jailbroke ios 4.2.1 well ios 4.2.6 cdma iphones second generation tool greenpois0n absinthe developed iphone dev team members jailbroke ios 5.0.1 january 2012 providing first jailbreak iphone 4s second version jailbroke ios 5.1.1 may 2012 providing first jailbreak third generation ipad jailbreaking enables root access ios operating system allowing installation applications customizations unavailable official app store ios jailbreaking voids device warranty apple releases ios updates make jailbreaking difficult october 12 2010 chronic dev team released greenpois0n desktop-based tool jailbreaking ios 4.1 iphone 4 iphone 3gs ipod touch third fourth generation ipad 1 development apple released second generation apple tv greenpois0n developers reported could jailbreak apple tv well developers announced plans release october 10 news spread another jailbreak developer george hotz preparing release jailbreaking tool called limera1n would perform similar function different exploit greenpois0n developers delayed order integrate limera1n exploit supported devices using limera1n also meant original greenpois0n exploit shatter could saved use later jailbreaks shatter limera1n boot rom exploits means patched ios updates boot rom code embedded ios devices manufacturing february 2011 chronic dev team released new version greenpois0n jailbreak ios 4.2.1 jailbreak ios 4.2.6 cdma verizon iphone 4 desktop-based tools os x microsoft windows linux provides untethered jailbreak means jailbroken device rebooted without computer assistance supports ipad iphone ipod touch apple tv chronic dev team announced support newly released cdma iphone 4 devices stores developers chronic dev team iphone dev team released greenpois0n absinthe sometimes simply known absinthe january 2012 desktop-based tool os x microsoft windows linux jailbreak iphone 4s first time ipad 2 second time ios 5.0.1 devices also ios 5.0 iphone 4s absinthe provides untethered jailbreak means jailbroken device rebooted without computer assistance incorporated untether exploit called corona pod2g released december older ios devices next web said jailbreak took long time released venturebeat said absinthe n't easy use earlier jailbreaking tool jailbreakme according iphone dev team approximately one million devices newly jailbroken three days absinthe release developers called joint effort jailbreak dream team apple credited document listing security patches subsequent version ios may 2012 developers chronic dev team iphone dev team released absinthe 2.0 os x windows linux jailbreak ios 5.1.1 untethered iphone ipad ipod touch models support ios 5.1.1 including jailbreaking third generation ipad first time announced hack box security conference amsterdam end presentation earlier absinthe jailbreak initially support recently released model ipad 2 according chronic dev team approximately one million devices jailbroken weekend friday release pc world noted devices jailbroken tools absinthe 2.0 security concern companies bring device policies
[ 9732, 5191, 456, 6537, 9063, 6539, 6797, 9518, 7983, 3473, 7697, 10838, 823, 2811, 700, 4957 ]
Test
5,928
2
Windows_NT_6_startup_process:windows nt 6 startup process startup process windows nt 6 windows vista windows server 2008 successors differs startup process part previous versions windows article unless otherwise specified said windows vista also applies later nt operating systems windows vista boot sector uefi loads windows boot manager file named bootmgr either system boot partition accesses boot configuration data store uses information load operating system bcd invokes boot loader turn proceeds initiate windows kernel initialization point proceeds similarly previous windows nt versions windows vista introduces complete overhaul windows operating system loader architecture earliest known reference revised architecture included within powerpoint slides distributed microsoft windows hardware engineering conference 2004 operating system codenamed longhorn documentation mentions windows operating system loader would undergoing significant restructuring order support efi major overhaul legacy code new boot architecture completely replaces ntldr architecture used previous versions windows nt steps follows nt kernel loaded including kernel initialization user-space initialization kept earlier nt systems refactoring winlogon resulted gina completely replaced credential providers graphical components windows vista later boot configuration data bcd firmware-independent database boot-time configuration data used microsoft new windows boot manager replaces boot.ini used ntldr boot configuration data stored data file format windows registry hives eventually mounted registry key hkey_local_machine\bcd00000 restricted permissions uefi boot file located codice_1 efi system partition traditional bios boot file codice_2 active partition boot configuration data may altered using command-line tool bcdedit.exe using registry editor regedit.exe using windows management instrumentation third-party tools easybcd bootice visual bcd editor boot configuration data contain menu entries presented windows boot manager boot.ini contained menu entries presented ntldr menu entries include boot configuration data allows third-party integration anyone implement tools like diagnostics recovery options windows boot manager invokes winload.exe—the operating system boot loader—to load operating system kernel executive ntoskrnl.exe core device drivers respect winload.exe functionally equivalent operating system loader function ntldr prior versions windows nt uefi systems file called codice_3 file always located codice_4 computer recently hibernated codice_5 instead invoke codice_6 difference alternate boot mode splash screen displaying resuming windows uefi systems file called codice_7 always located codice_4 advent new boot manager windows vista many components changed one advanced boot options menu provides options advanced boot modes i.e safe mode due implementation hybrid boot windows 8 access advanced boot options menu disabled default however access still possible bcd modification possible boot modes abo menu accessible rapidly pressing holding codice_11 key windows boots
[ 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 3109, 7207, 1577, 10281, 2101, 10812, 3648, 7754, 10828, 4173, 4174, 9808, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 7290, 4731, 10879, 8841, 2193, 9874, 10900, 4248, 9377, 3235, 4771, 68...
None
5,929
1
MultiValue:multivalue multivalue type nosql multidimensional database typically considered synonymous pick database originally developed pick operating system multivalue databases include commercial products rocket software zumasys revelation ladybridge intersystems northgate information solutions ongroup companies databases differ relational database features support encourage use attributes take list values rather attributes single-valued often categorized mumps within category post-relational databases although data model actually pre-dates relational model unlike sql-dbms tools multivalue databases accessed without sql nelson designed multivalue data model early mid-1960s dick pick developer trw worked first implementation model us army 1965 pick considered software public domain written military first dispute regarding multivalue databases addressed courts ken simms wrote databasic sometimes known s-basic mid-70 based dartmouth basic enhanced features data management simms played lot star trek developing language order language function satisfaction three implementations multivalue pick version r77 microdata reality 3.x prime information 1.0 similar spite attempts standardize particularly international spectrum spectrum manufacturers association designed logo use standards across multivalue implementations subsequently flavors diverged although cross-over streams multivalue database development could classified one stemming pick r83 one microdata reality one prime information differences implementations provisions supporting several flavors languages attempt document similarities differences found post-relational database reference prdb marketing groups others industry years classified multivalue databases pre-relational post-relational relational embedded detractors often classifying legacy could classified nosql data model aligns well json xml permits access without use sql one reasonable hypothesis data model lasting 50 years new database implementations model even 21st century provides inexpensive database solutions historically industry benchmarks tied sql transactions difficult hypothesis test although considerable anecdotes failed attempts get functionality multivalue application relational database framework spite history 40 years implementations starting trw many multivalue industry remained current various multivalue implementations employ object-oriented versions data/basic support ajax frameworks one needs use sql databases fit nosql umbrella fact multivalue developers first acquire nosql domain names likely prior database products classifying offerings nosql well multivalue seasoned data model several vendors competing multivalue space continuously enhanced years multivalue database system data stored using two separate files file store raw data dictionary store format displaying raw data example assume file table called person file attribute called emailaddress emailaddress field store variable number email address values single record list joe example.com jdb example.net joe_bacde example.org stored accessed via single query accessing associated record achieving one-to-many relationship within traditional relational database system would include creating additional table store variable number email addresses associated single person record however modern relational database systems support multi-value data model example postgresql column array base type like java programming language typical data/basic compiler compiles p-code runs p-machine jbase notable exception many different implementations compilers multivalue databases like php programming language data/basic language typecasting programmer known english access aql uniquery retrieve cmql many names years corresponding different multivalue implementations multivalue query language differs sql several respects query issued single dictionary within schema could understood virtual file portal database view data statement would list e-mail addresses person whose last name starts van single entry would output person multiple lines showing multiple e-mail addresses without repeating data person
[ 7076, 8644, 9286, 9828, 10471, 5677, 974, 10413, 8340, 2901, 9397, 6809, 8539, 3644, 479 ]
Test
5,930
2
USB_image:usb image usb image — bootable image operating system os software boot loader located usb flash drive another usb device memory storage instead conventional cd dvd discs operating system loads usb device either load much like live cd runs os software storage installs os usb image runs usb device whole time usb image easier carry stored safely conventional cd dvd drawbacks older devices may support usb booting usb storage devices lifespan might shortened ubuntu included utility installing operating system image file usb flash drive since version 9.10 windows support also added step step set usb device bootable drive
[ 1515, 6012, 1150, 7983 ]
None
5,931
2
Timothee_Besset:timothee besset timothée besset french software programmer also known ttimo best known supporting linux well macintosh ports id software products involved game ports various id properties past ten years starting quake iii arena since development doom 3 also charge multiplayer network code various aspects game coding id role heavily involved development online game quakelive occasionally called zerowing never gone name derived community oriented system zerowing.idsoftware.com linux port pages prominent system actually named christian antkow based zero wing meme besset grew france started programming early 1990s school majored computer science well pursuing courses chemistry mechanics fluid mechanics school also first introduced linux originally system administration networking eventually adopting main system first serious game development project working qeradiant free game editor tool id software games work editor got know robert duffy point working contractor id got hired full-time duffy managed secure timothee contract work new cross-platform gtkradiant editor project 2000 eventually led timothee hired become id official linux port maintainer took back support rights linux release quake iii arena floundering loki software first actual porting project came release return castle wolfenstein 2001 linux client released march 16 2002 followed year later release linux builds sharing release date windows release next porting work came release doom 3 releasing first linux builds october 4 2004 around time also assumed responsibility becoming charge network coding id october 20 2005 released linux binaries quake 4 followed releasing source code gtkradiant gnu general public license february 17 2006 next porting project porting linux binaries released october 19 2007 also worked quake live project game entering invitation-based closed beta 2008 open beta february 24 2009 linux macintosh support coming august 18 2009 response fears linux gaming community id would abandon linux future titles september 13 2009 well publicized statement reaffirmed id support linux stating blog fundamentally nothing changed policy regarding linux games ... 'll damned n't find time get linux builds done january 2012 besset resigned id software ending hope future linux builds though doom 3 bfg edition came linux via source port year later john carmack revealed zenimax media n't policy 'unofficial binaries prevented id software pursuing sort third-party builds past linux ports experimental releases suggested use wine instead july 2 2012 announced joined frozen sand currently developing urban terror hd september 2016 ported rocket league steamos/linux help ryan c. gordon
[ 1026, 5644, 6797, 4367, 8848, 657, 10642, 1939, 2581, 3478, 6808, 7450, 6302, 7584, 802, 5410, 6691, 6947, 8354, 8364, 1717, 823, 2109, 11069, 10687, 10822, 8263, 9034, 843, 589, 6352, 4177, 11602, 8787, 4437, 6489, 3802, 4831, 1632, 9696...
None
5,932
4
SF_City_ID_Card:sf city id card sf city id card municipal identification card program operated san francisco california residents city-county regardless immigration status cards also specify person gender assist transgender individuals often difficulty identification documents stated purpose photo id card streamline access city programs connect residents local businesses program modeled similar program operating new connecticut since 2007 according sf city id card website users card use cards accepted licenses drive purchase alcohol tobacco recognized federal state law possession cards considered mandatory city government applicants must submit proof identity city residency parents may obtain card minor separate cards children 13 anyone 14 years age older fee ranging 5 15 charged card expiration card occurs every 2 years cardholder turns 14 years age loses residency city limits supervisor tom ammiano said card public safety measure make residents living social margins likely seek help police well giving access banking services city bound law keep names private information confidential “ maximum extent permitted applicable laws ” according city attorney office early months 2007 immigration customs enforcement ice conducted dozens raids us conducted arrest deportation hundreds immigrants one states affected california latin american alliance immigrant rights aliadi bay area based grassroots organization founded miguel robles conformed local leaders like ramon cardona attorney daniel luna miguel perez julio garcia among others organized press conference san francisco city hall request order materialize sanctuary status city county san francisco city officials must issue resident identification card improve interaction community members regardless migratory status police officers well allow san francisco residents access city services open bank accounts aliadi started conversations supervisors chris daly gerardo sandoval tom ammiano supervisor chris daly showed interest political reasons could n't sponsor gerardo sandoval interested chief staff lupita peimbert suggested aliadi ask supervisor tom ammiano showed interest finally supported concept aliadi gathered 40 grassroots organizations non profits saw city id card tool improve life clients members concept adopted san francisco aliadi organized february 16 2008 women building first 3 conferences called cities integrating communities 1st event attended 100 organizers spark launch campaigns support city identification cards richmond santa clara county oakland los angeles detroit chicago minneapolis among others aliadi invited present experiences ordinance authorizing county clerk issue id card passed board supervisors november 20 2007 immigration group washington-based immigration reform law institute filed legal challenge law claiming program conflicts federal law judge dismissed challenge october 14 2008 first cards issued january 15 2009 san francisco thus became one small growing number municipalities issuing municipal identification cards undocumented immigrants access form document
[ 6386 ]
Test
5,933
2
Logical_address:logical address computing logical address address item memory cell storage element network host appears reside perspective executing application program logical address may different physical address due operation address translator mapping function mapping functions may case computer memory architecture memory management unit mmu cpu memory bus physical address computer memory banks may mapped different logical addresses various purposes system supporting virtual memory may actually physical memory mapped logical address access attempted access triggers special functions operating system reprogram mmu map address physical memory perhaps writing old contents memory disk reading back disk memory contain new logical address case logical address may referred virtual address
[ 10792, 1801, 4553, 5677, 10734, 5840, 11539, 9080, 6485, 3702, 7134, 6296, 1502 ]
None
5,934
4
HTTP_response_splitting:http response splitting http response splitting form web application vulnerability resulting failure application environment properly sanitize input values used perform cross-site scripting attacks cross-user defacement web cache poisoning similar exploits attack consists making server print carriage return cr ascii 0x0d line feed lf ascii 0x0a sequence followed content supplied attacker header section response typically including input fields sent application per http standard rfc 2616 headers separated one crlf response headers separated body two therefore failure remove crs lfs allows attacker set arbitrary headers take control body break response two separate responses—hence name generic solution url-encode strings inclusion http headers location set-cookie typical examples sanitization include casting integers aggressive regular expression replacement although response splitting specific php php interpreter contains protection attack since version 4.4.2 5.1.2
[ 5636, 8644, 4198, 2470, 7965, 3473, 7324, 119, 5724, 4797, 4095 ]
Test
5,935
4
Browser_hijacking:browser hijacking browser hijacking form unwanted software modifies web browser settings without user permission inject unwanted advertising user browser browser hijacker may replace existing home page error page search engine generally used force hits particular website increasing advertising revenue browser hijackers also contain spyware example install software keylogger gather information banking e-mail authentication details browser hijackers also damage registry windows systems often permanently browser hijacking easily reversed instances may difficult reverse various software packages exist prevent modification many browser hijacking programs included software bundles user choose included offers installer another program often included uninstall instructions documentation presented way designed confusing average user order trick installing unwanted extra software several methods browser hijackers use gain entry operating system email attachments files downloaded suspicious websites torrents common tactics browser hijackers use rogue security software also hijack start page generally displaying message warning computer infected spyware lead antispyware vendor page start page return normal settings user buys software programs winfixer known hijack user start page redirect another website domain name system queried user types name website e.g wikipedia.org dns returns ip address website exists user mistypes name website dns return non-existent domain nxdomain response 2006 earthlink started redirecting mistyped domain names search page done interpreting error code nxdomain server level announcement led much negative feedback earthlink offered services without feature unwanted programs often include sign installed uninstall opt-out instructions hijacking programs constantly change settings browsers meaning user choices browser overwritten antivirus software identifies browser hijacking software malicious software remove spyware scanning programs browser restore function set user browser settings back normal alert browser page changed malicious browser hijacking programs steal browser cookies person computer order manipulate online accounts logged one company maliciously used google cookies install android apps onto user phone without knowledge consent microsoft windows 10 web browsers longer set user default without intervention changing default web browser must performed manually user settings default apps page ostensibly prevent browser hijacking number hijackers change browser homepage display adverts and/or set default search engine include astromenda www.astromenda.com ask toolbar ask.com esurf esurf.biz binkiland binkiland.com delta claro dregol jamenize mindspark groovorio sweet page search protect conduit along search.conduit.com variants tuvaro spigot en.4yendex.com yahoo etc ask toolbar widely bundled installer oracle java se criticized malware users remember manually deselect toolbar installation java installation especially severe denmark government sponsored digital signature system nemid reality single sign system public servers banks government offices 2015 relied java client side thus computers running microsoft windows denmark vulnerable unwanted ask toolbar installed babylon toolbar browser hijacker change browser homepage set default search engine isearch.babylon.com also form adware displays advertisements sponsored links spurious paid search results program collect search terms search queries babylon translation software prompts add babylon toolbar installation toolbar also comes bundled add-on software downloads 2011 cnet site download.com started bundling babylon toolbar open-source packages nmap gordon lyon developer nmap upset way toolbar tricked onto users using software vice-president download.com sean murphy released apology bundling software mistake part apologize user developer communities unrest caused similar variants babylon toolbar search homepage exist including bueno search delta search claro search search gol variants state owned babylon terms service toolbars created montiera conduit pup hijacker steals personal confidential information user transfers third party toolbar identified potentially unwanted programs pups malwarebytes typically bundled free downloads toolbars modify browser default search engine homepage new tab page several browser settings similar variants conduit search trovi.com trovigo.com better-search.net seekforsearch.com searchitdown.com need4search.com clearsearches.com search-armor.com searchthatup.com premiumsearchweb.com along variants created customized way toolbar creation service conduit ltd used offer program called conduit search protect better known search protect conduit cause severe system errors upon uninstallation claims protect browser settings actually blocks attempts manipulate browser settings page words makes sure malicious settings remain unchanged search protect option change search homepage recommended search home page trovi however users reported changing back trovi period time uninstall program search protect cause windows unbootable uninstall file removes files also boot files root c drive leaves backgroundcontainer.dll file start-up registry conduit associated malware spyware adware victims hijacker reported unwanted pop-ups embedded in-text advertisements sites without ads perion network ltd. acquired conduit clientconnect business early january 2014 later partnered lenovo create lenovo browser guard uses components search protect victims unwanted redirections conduit.com also reported attacked phishing attempts received unwanted email spam junk mail messages telephone calls telemarketers victims claim callers claimed apple microsoft isp told personal information used phone calls calls concerned browsing habits recent browsing history personal information used phishing attempts may associated spyware one first browser hijackers redirected user existing home page rogue coolwebsearch search engine results sponsored links antivirus antispyware programs unable properly remove particular hijacker man named merijn bellekom developed special tool called cwshredder specifically remove kind hijacker coolwebsearch popular browser hijacker owned 'fun web products coupon server adware program bundled multiple freeware applications downloaded internet users program may appear pcs without user knowledge coupon server may appear useful intrusive display ads without users permissions coupon server also considered malicious domain browser hijacker hijack internet browser forcibly lead user homepage disguised legitimate search engine fool visitors using website also direct browser suspicious domain alter browser settings ad-triggering software called gosave reported cause user experience issues intrusive characteristics victim appropriately informed installation ads inserted webpages adds plugin extension whichever web browsers default currently compatible internet explorer firefox chrome name add-on necessarily gosave – varies gs booster gs sustainer something else browser hijacker istartsurf.com may replace preferred search tools infection travels bundled third party applications installation may silent due affected users aware hijacker infected internet explorer google chrome mozilla firefox browsers mixi.dj offers media player also free toolbar conduit-based search engine toolbar add-on prompted add installation toolbar new hijacker alters browser homepage also adds computer registry creates strings memory changes internet explorer icon magnifying glass mystart.incredibar search mystart search incredibar mystart toolbar mystart search incredibar incredibar games-en dangerous internet browser hijacker virus spyware often comes embedded many download applications installers hypercam known install firefox internet explorer safari google chrome symptoms range symptoms simple processor drainage complete system crashes severe victim re-install entire operating system mystart uses browser helper objects case search tools infects users installing mystart search toolbar browser firefox vulnerable redirects internet users mystart ’ websites mystart.incredibar.com particular internet users report redirected every search webpage visit removing incredibar extremely daunting task since countless different variations infected systems expect find undesirable windows registry changes browser configuration changes files random strings installed user local settings folders depending user operating system version even computer location vary one pc next one version incredibar appears removable add-on plug-in extension within web browsers however simply removing incredibar via inbuilt browser add-on removal process enough since program already combined registry file installs re-installs upon system browser reboot virus spyware removal applications webroot spysweeper eset nod32 adwcleaner junkware removal tool known remove mystart.incredibar using applications revert user default search engine onewebsearch referred onewebsearch virus onewebsearch.com redirection virus malware categorized browser hijacker onewebsearch utilizes browser hijackers black-hat techniques infect computer system attach add-ons extensions toolbars popular internet browsers without permission turn causes internet browsers like chrome firefox internet explorer redirect onewebsearch.com search- home- start.onewebsearch.com related web pages third party domain names rockettab browser hijacker runs program browser plugin embeds search results rockettab search providers rockettab sets proxy runs http https traffic known create problems security applications uninstalling application removes proxy targeted ads search results rockettab provides sear4m.xyz categorized browser hijacker alters computer performance adware uses sear4m.xyz cause user click sear4m.xyz ads sear4m.xyz installed changes default dns settings browsers like mozilla firefox google chrome internet explorer often redirect various fake websites often laiden viruses searchassist browser hijacker piggybacks downloads untrusted websites change new tab homepage searchassist.net opens searchassist browser start-up stubborn uninstalled repeatedly change browser tabs homepage settings works firefox safari chrome internet explorer though compatible windows linux detected adwcleaner spyhunter malwarebytes also known slow computer performance cause blue screen death bsod screen causes computer restart viruses came searchassist searchassist unlike vosteran spyware links review sites cnet may recommend searchassist many users rate poorly searchassist claims legitimate search engine great personal results tempting victims hijack making one hardest hijacks recognize image search assist much like genuine google doodle search-daily.com hijacker may downloaded zlob trojan redirects user searches pornography sites also known slow computer performance searchult.com browser hijacker replaces users home page new tab page default search engine program advertised browser add-on supposed help customize tabs protect browsers affected programs searchult.com associated malware distribution website displays banner ad search box often adverts flash games searchgol.com also found search-gol search engine may show infected computer instead user default search engine cause getting onto homepage unknown known downloading malware onto computer replaces default homepage without user permission numerous antivirus websites blogs report searchgol virus potentially unwanted program pup sneaks inside system bundle programs initiates changes system without user permission removing searchgol easy victim must perform browser restore removing programs related downloaded browser hijacker searchnu.com domain domain search-results.com belong iac search media inc company known name ask jeeves inc lot popular domains web famous ask.com something searched searchnu search engine search results redirect ask.com related websites user still access google either entering address bar searching searchnu still homepage searchnu 3 clones searchnu.com/406 /409 /421 however removing searchnu easy following instructions shorte.st browser hijacker alters users ’ web browser settings without permission adware function injecting unwanted advertising users ’ browser detail shorte.st enter device modifies internet settings start tracking users internet activities cookies browser histories shares information third parties users ip address web page visits time users spend browser hijackers break devices several ways manual removal shorte.st work cases device may malfunction removal done correctly however removing shorte.st easy automatic following instructions snap.do smartbar developed resoft potential malware categorized browser hijacker spyware causes internet browsers redirect snap.do search engine snap.do manually downloaded resoft website though many users entrapped unethical terms affects windows removed add/remove program menu snap.do also download many malicious toolbars add-ons plug-ins like dvdvideosofttb general crawler save valet general crawler installed snap.do known use backdoor process re-installs re-enables every time affected user removes browser snap.do disable option change homepage default search engine resoft track following information using resoft products user consents personal data transferred processed within outside united states america using resoft website user agrees preceding uses information way resoft previous installer sourceforge included adware pup installers one particular one changes browser settings firefox chrome internet explorer show website istartsurf.com homepage changing registry settings installing software resets settings user tries change june 1 2015 sourceforge claimed stopped coupling third party offers unmaintained sourceforge projects taplika browser hijacker contains trojan viruses steals personal information user sends third party encrypt personal files folders well emails photographs video documents etc infects system user may lose data affected system could cause possible hardware damage tv wizard injekt internet toolbar/plugin internet explorer runs bho chrome firefox run extension plugs user default web browser modify number settings taking control browser search home pages new tab functionality well dns 'not found redirections additionally tv wizard change security settings browser might also lower overall security user pc done order allow program run uninterrupted user attempt uninstall tv wizard using standard methods add/remove programs parts program uninstalled items modified search home pages may still point unwanted web page privacy policy program states program track report behaviors user plugin installed including limited urls web pages user visits well search terms search results user queries vosteran browser hijacker changes browser home page default search provider vosteran.com infection essentially bundled third-party applications vosteran carries pup virus identity vosteran protected privacyprotect.org australia vosteran registered whiteknight suptab pup hijacker installation adds search toolbars redirects home page another link displays unwanted ads program bundled installation random freeware shareware programs may remain unseen security programs like legitimate software found installing cheat engine different version vlc player www.oldapps.com downloading applications certain freeware sites softonic.com download.com trovi uses bing legitimate search engine provide results user address bar changes bing.com searching n't fooled still searching trovi trovi used use website show search results logo top left hand corner page later switched bing attempt fool users little easier trovi deadly used taking ads search results depending browser using still considered browser hijacker also hijacks homepage new tab page settings change back original settings depending browser using might see ads page infects makes browser redirect google search engines trovi.com trovi created using conduit toolbar creation service known infect similar ways conduit toolbar
[ 7809, 6797, 5776, 8978, 9746, 1046, 10392, 2213, 681, 9771, 11313, 2739, 5442, 4165, 2887, 9803, 1622, 87, 5078, 11225, 7515, 106, 107, 8299, 877, 6382, 6643, 4605, 5631 ]
None
5,936
5
Remote_job_entry:remote job entry remote job entry procedure sending requests data processing tasks 'jobs mainframe computers remote workstations extension process receiving output tasks remote workstation rje workstation called remote usually located distance host computer workstation connects host modem local area network lan today known client–server model rje early form request–response architecture terms remote batch remote job system remote job processing also used rje facilities remote job entry rje also name os/360 component provided rje services rje workstation operator may complete console control job flow workstation mainframe depending local configuration policy conversational remote job entry crje component os/360 os/vs1 provides job submission job retrieval editing user interactive terminal netrjs protocol developed campus computing network ucla deliver batch jobs ibm 360 model 91 protocol originally assigned arpanet initial connection protocol sockets 71 73 75 later reassigned internet ports 71-74
[ 1121, 868, 11236, 6342, 10508, 2222, 8687, 10415, 340, 2132, 4151, 2519, 10072, 8474, 11416, 3359 ]
Test
5,937
8
Usage_analysis:usage analysis usage analysis technique understanding usage statistics something example web statistics website
[ 119 ]
Test
5,938
2
Smarterphone:smarterphone smarterphone norwegian company making software mobile phones founded 1993 kvaleberg renamed december 2010 june 2007 venture capital investor ferd invested €2 million company january 2010 €3.6 million invested nokia completed acquisition smarterphone november 2011 head office oslo norway company also offices taiwan south korea japan united states smarterphone develops mobile software handsets mobile phone oems odms chipset vendors customers company also provides professional services areas 2008 kvaleberg company joined limo foundation 2009 mobile world congress presented madrid handset cooperation compal communications company main product smarterphone os platform-independent full mobile phone operating system applications suite feature phone segment smarterphone os called mimiria first unveiled mobile world congress show february 2008 used handsets kyocera c4700 vibo t588 madrid limo device smarterphone architecture clean-room strict model-view-controller design enables variations implemented little effort user interface smarterphone os programmed scripting language variant scheme object-oriented extensions smarterphone os includes user interface mmi software stack implementing full user interface middleware 2g 3g feature phones also integrates range third-party modules java jvm oracle corporation mobile browser obigo mms sms stack mobile messaging factory predictive text input nuance cootek handwriting recognition sinovoice nokia asha platform inherits capabilities smarterphone
[ 1216, 10083, 6276, 8262, 9863, 3561, 9964, 9262, 5201, 2259, 5363, 5178, 2235, 2525 ]
Test
5,939
3
IBM_ThinkPad_240:ibm thinkpad 240 ibm thinkpad 240 ultra-portable laptop computer designed produced ibm june 1999 2001 one thinkpad 200 series models made available america smallest lightest thinkpad model produced date 240 series discontinued well 570 series replaced thinkpad x series 2000 first 240 series models included 300 mhz mobile celeron processor 64 mb built-in ram one slot memory expansion maximum 320 mb laptop also one first feature mini pci card slot built-in optical drive diskette drive included due size limitations external drive access via usb 1.0 port and/or ibm external floppy drive connector unit shipped either standard 6 gb hard disk drive 12 gb upgrade option 240 series models feature 10.4 tft display first models featured neomagic magicgraph128xd graphics chips 2 mb video memory 240 capable displaying svga 800x600 tft display xga output available external monitor 240s also audio controllers vga ports connect external display devices
[ 5606, 3304, 1776, 3250, 8850, 3323 ]
Test
5,940
6
Shadow_paging:shadow paging computer science shadow paging technique providing atomicity durability two acid properties database systems page context refers unit physical storage probably hard disk typically order 1 64 kib shadow paging copy-on-write technique avoiding in-place updates pages instead page modified shadow page allocated since shadow page references pages disk modified liberally without concern consistency constraints etc page ready become durable pages referred original updated refer new replacement page instead page activated ready atomic referring pages must also updated via shadow paging procedure may recurse many times becoming quite costly one solution employed wafl file system write anywhere file layout lazy making pages durable i.e write-behind caching increases performance significantly avoiding many writes hotspots high referential hierarchy e.g file system superblock cost high commit latency write-ahead logging popular solution uses in-place updates shadow paging similar old master–new master batch processing technique used mainframe database systems systems output batch run possibly day work written two separate disks form storage medium one kept backup used starting point next day work shadow paging also similar purely functional data structures in-place updates avoided
[ 5120, 890, 10048 ]
Train
5,941
4
Emergency_power_system:emergency power system emergency power system independent source electrical power supports important electrical systems loss normal power supply standby power system may include standby generator batteries apparatus emergency power systems installed protect life property consequences loss primary electric power supply type continual power system find uses wide variety settings homes hospitals scientific laboratories data centers telecommunication equipment ships emergency power systems rely generators deep-cycle batteries flywheel energy storage fuel cells emergency power systems used early world war ii naval ships combat ship may lose function boilers power steam turbines ship generator case one diesel engines used drive back-up generators early transfer switches relied manual operation two switches would placed horizontally line position facing rod placed order operate switch one source must turned rod moved side source turned mains power lost due downed lines malfunctions sub-station inclement weather planned blackouts extreme cases grid-wide failure modern buildings emergency power systems still based generators usually generators diesel engine driven although smaller buildings may use gasoline engine driven generator larger ones gas turbine however lately use made deep cycle batteries technologies flywheel energy storage fuel cells latter systems produce polluting gases thereby allowing placement done within building also second advantage require separate shed built fuel storage regular generators automatic transfer switch used connect emergency power one side connected normal power feed emergency power feed side connected load designated emergency electricity comes normal side transfer switch uses solenoid throw triple pole single throw switch switches feed normal emergency power loss normal power also triggers battery operated starter system start generator similar using car battery start engine transfer switch switched generator starts building emergency power comes back going normal power lost unlike emergency lights emergency lighting type light fixture pattern building normal lights provides path lights allow safe exit lights service areas mechanical rooms electric rooms exit signs fire alarm systems back batteries electric motor pumps fire sprinklers almost always emergency power equipment emergency power may include smoke isolation dampers smoke evacuation fans elevators handicap doors outlets service areas hospitals use emergency power outlets power life support systems monitoring equipment buildings may even use emergency power part normal operations theater using power show equipment show must go use emergency power systems aviation either aircraft ground commercial military aircraft critical maintain power essential systems emergency done via ram air turbines battery emergency power supplies enables pilots maintain radio contact continue navigate using mfd gps vor receiver directional gyro hour localizer glideslope instrument landing aids microwave transmitters high power consumers mission-critical reliably operated battery supply even short periods hence absolute reliability required category 3 operations force airport usual run system diesel generator automatic switchover mains supply generator fail avoids interruption transmission generator brought operating speed opposed typical view emergency power systems backup generators seen secondary mains electrical supply computers communication networks modern electronic devices need power also steady flow continue operate source voltage drops significantly drops completely devices fail even power loss fraction second even generator back-up provide protection start-up time involved achieve comprehensive loss protection extra equipment surge protectors inverters sometimes complete uninterruptible power supply ups used ups systems local one device one power outlet may extend building-wide local ups small box fits desk telecom rack powers small number devices building-wide ups may take several different forms depending application directly feeds system outlets designated ups feed power large number devices since telephone exchanges use dc building battery room generally wired directly consuming equipment floats continuously output rectifiers normally supply dc rectified utility power utility power fails battery carries load without needing switch simple though somewhat expensive system exchanges never lost power moment since 1920s recent years large units utility power station usually designed unit system basis required devices including boiler turbine generator unit power step unit auxiliary transformer solidly connected one unit less common set-up consists two units grouped together one common station auxiliary turbine generator unit attached unit auxiliary transformer connected circuit automatically starting unit auxiliaries supplied power another unit auxiliary transformer station auxiliary transformer period switching first unit transformer next unit designed automatic instantaneous operation times emergency power system needs kick imperative power unit auxiliaries fail station shutdown occurrence known black-out regular units temporarily fail instead shutdowns grid expected remain operational problems occur usually due reverse power relays frequency-operated relays grid lines due severe grid disturbances circumstances emergency station supply must kick avoid damage equipment prevent hazardous situations release hydrogen gas generators local environment emergency power systems called emergency diesel generators edgs required feature nuclear power plants typically installed sets three edg installation designed safety-grade requirements safety systems plant next upcoming generation nuclear power plants includes designs multiple independent banks edgs abwrs 208 vac emergency supply system central battery system automatic controls located power station building used avoid long electric supply wires central battery system consists lead-acid battery cell units make 12 24 vdc system well stand-by cells battery charging unit also needed voltage sensing unit capable receiving 208 vac automatic system able signal activate emergency supply circuit case failure 208 vac station supply
[ 8233, 8811, 3181, 5327, 7248 ]
None
5,942
3
Exerion:exerion exerion ported msx family computer sg-1000 two sequels released exerion features parallax effects inertia simulation player shoots formations bizarre alien amoeba egg-throwing birds pterosaur-like creatures well ufos flying surface planet player two types guns slow double shot unlimited fast single shot limited family computer version game included compilation jaleco collection vol 1 playstation 2003 well game boy advance game jajamaru jr. denshoki jaleco memorial along five jaleco family computer games original arcade version later released playstation 4 part arcade archives label october 23 2014 japan july 7 2015 north america two sequels game released exerion ii zorni released msx 1984 alongside port original arcade game second exerizer released arcades 1987 released north america nichibutsu title sky fox player ship fighter ex playable character jaleco game tengoku series
[ 2121, 3788, 9006, 1776, 10064, 10931 ]
None
5,943
9
PDA_Optional_Packages_for_the_J2ME_Platform:pda optional packages j2me platform pda optional packages j2me platform jsr 75 specification standardizes access java embedded devices mobile phones pdas data resides natively mobile devices jsr 75 part java framework sits top cldc set lower level programming interfaces 2 main components devices claim implement jsr 75 implement components
[ 4960, 3561, 5677, 8882, 9011 ]
None
5,944
1
Dark_data:dark data dark data data acquired various computer network operations used manner derive insights decision making ability organisation collect data exceed throughput analyse data cases organisation may even aware data collected ibm estimate roughly 90 percent data generated sensors analog-to-digital conversions never get used industrial context dark data include information gathered sensors telematics organizations retain dark data multitude reasons estimated companies analyzing 1 data often stored regulatory compliance record keeping organizations believe dark data could useful future acquired better analytic business intelligence technology process information storage inexpensive storing data easy however storing securing data usually entails greater expenses even risk potential return profit lot dark data unstructured means information formats may difficult categorise read computer thus analysed often reason business analyse dark data amount resources would take difficulty data analysed according computer weekly 60 organisations believe business intelligence reporting capability inadequate 65 say somewhat disorganised content management approaches useful data may become dark data becomes irrelevant processed fast enough called perishable insights live flowing data example geolocation customer known business business make offer based location however data processed immediately may irrelevant future according ibm 60 percent data loses value immediately analysing data immediately letting go 'dark lead significant losses organisation terms identifying fraud example fast enough addressing issue late according new york times 90 energy used data centres wasted data stored energy costs could saved furthermore costs associated underutilisation information thus missed opportunities according datamation storage environments emea organizations consist 54 percent dark data 32 percent redundant obsolete trivial data 14 percent business-critical data 2020 add 891 billion storage management costs otherwise avoided continuous storage dark data put organisation risk especially data sensitive case breach result serious repercussions financial legal seriously hurt organisation reputation example breach private records customers could result stealing sensitive information could result identity theft another example could breach company sensitive information example relating research development risks mitigated assessing auditing whether data useful organisation employing strong encryption security finally determined discarded discarded way becomes unretrievable generally considered advanced computing systems analysis data built higher value dark data noted data analytics foundation modern industrial revolution course includes data currently considered dark data since enough resources process data collected used future bring maximum productivity ability organisations meet consumers demand technology advancements helping leverage dark data affordably thanks young innovative companies datumize veritas lucidworks furthermore many organisations realise value dark data right example healthcare education organisations deal large amounts data could create significant potential service students patients manner consumer financial services pursue target population
[ 3323 ]
Test
5,945
8
ERuby:eruby eruby embedded ruby templating system embeds ruby text document often used embed ruby code html document similar asp jsp php server-side scripting languages templating system eruby combines ruby code plain text provide flow control variable substitution thus making easy maintain view module rails responsible display response output browser simplest form view piece html code static content applications static content may enough many rails applications require dynamic content created controller action method displayed view made possible using embedded ruby generate templates contain dynamic content embedded ruby allows ruby code embedded view document code gets replaced proper value resulted execution code run time ability embed code view document risk bridging clear separation present mvc frame thus responsibility developer make sure clear separation responsibility among model view controller modules his/her application eruby allows ruby code embedded within pair codice_1 codice_2 delimiters embedded code blocks evaluated in-place replaced result evaluation apart creating web pages eruby also used create xml documents rss feeds forms structured text files eruby dynamically generates static files based templates functionalities eruby found erb library different types tag markers used erb templates indicates tag encloses expression tag starts opening tag delimiter followed equal symbol ends end tag delimiter rendering template piece code gets substituted result code evaluated result string gets converted string rendered example resulting text looks like value x 500 code enclosed tags called scriptlet code tag gets executed result gets replaced place scriptlet tags must matching tag denote end functional block example example text list item gets printed four times scriptlet produces text makes enclosed statement run multiple times output code contents comment tags n't get rendered output tags start open tag delimiter followed hash symbol end end tag delimiter example comment tag shown comment ruby ruby code ignored generates nothing things common eruby simply common ruby string substitution codice_3 similar languages perl php newlines eruby suppressed adding hyphen beginning end tag delimiter example 2.times end output code value name gets printed twice line several implementations eruby namely erb implementation eruby written purely ruby programming language included ruby standard library template generated running piece code written using erb object simple example shown require 'erb' x 400 simple_template value x x renderer erb.new simple_template puts output renderer.result binding result looks follows value x 400 could achieved using code make use erb object x 400 string value x x puts string code snippets generate output happens interchange lines 2 line 3 first code snippet line 1 line 2 second code snippet first snippet changes code shown require 'erb' simple_template value x x x 400 renderer erb.new simple_template puts output renderer.result binding still generates output i.e. value x 400 second code snippet changes code string value x x x 400 puts string code get executed 1st line know value x gets executed thus main reason using erb object write templates ahead time binding variables methods may exist given time template gets processed result called erb object order get access instance methods instance variable object erb makes use binding object access variables methods object given private binding object exists ruby class easy get access methods variables within method class access variables different class class expose binding object via public method example shown class erbexample end example erbexample.new variable1 renderer erb.new template puts output renderer.result example.get_binding see example exposing binding object class erbexample furthermore used binding object access variables methods class within one methods new method erb object takes two parameters second parameter specifies safety level giving number second parameter max value 4 one make template run different thread value number determines safety level maximum isolation level unless binding object marked trusted erb use third parameter specify optional modifiers used control adding newlines output example make sure erb output newlines tag ends create erb object shown renderer erb.new template 3 provide third parameter ignore second parameter use 0 input second parameter erb many methods exposed used render template full list apis exposed erb object refer erb documentation given reference section already explained previous sections erb used generate templates often used generate web pages text files usually needs erb push output desired file achieve use redirection ability provided command-line redirect output file rather making print standard output example output gets redirected my_view.html.erb file linking third party libraries achievable making use -r option providing name library remember functionality one remember ruby key word require functionality -r option example uses ipaddr library mentioned safety levels previous section one specify safety level command line argument using -s option erubis implementation eruby implemented ruby also java according home page runs faster eruby erb several useful options including alternate tags allowing valid xml ember pure ruby implementation eruby linux allows debugging eruby templates improves composability provides powerful shorthand eruby directives table compares tags available implementations
[ 7430, 8582, 9229, 2191, 7695, 10771, 9245, 5677, 3120, 564, 1973, 4277, 823, 4918, 10555, 1852, 5567, 6338, 8644, 11208, 5578, 10973, 479, 1379, 11625, 7026, 2804, 2556 ]
Test
5,946
9
Heinz_Rutishauser:heinz rutishauser heinz rutishauser 30 january 1918 – 10 november 1970 swiss mathematician pioneer modern numerical mathematics computer science heinz rutishauser father died 13 years old mother died three years later together younger brother sister went live uncle home 1936 rutishauser studied mathematics eth zürich graduated 1942 1942 1945 assistant walter saxer eth 1945 1948 mathematics teacher glarisegg trogen 1948 received phd eth well-received thesis complex analysis 1948 1949 rutishauser united states universities harvard princeton order study state art computing 1949 1955 research associate institute applied mathematics eth zürich recently founded eduard stiefel worked together ambros speiser development first swiss computer ermeth developed programming language superplan 1949–1951 name reference rechenplan i.e computation plan konrad zuse terminology designating single plankalkül-program contributed particular field compiler pioneering work eventually involved defining programming languages algol 58 algol 60 among contributions introduced number basic syntactic features programming notably keyword codice_1 loop first german für superplan next via english translation algol 58 1951 rutishauser became lecturer german privatdozent 1955 appointed extraordinary professor 1962 associate professor applied mathematics eth 1968 became head group computer science later became computer science institute ultimately 1981 division computer science eth zürich least since 1950s rutishauser suffered heart problems 1964 suffered heart attack recovered died 10 november 1970 office acute heart failure untimely death wife margaret took care publication posthumous works
[ 512, 1952, 8262, 1610, 9804, 8813, 6160, 9330, 6036, 1783, 5496 ]
Test
5,947
9
Andrew_D._Gordon:andrew d. gordon andrew d. gordon british computer scientist employed microsoft research research interests include programming language design formal methods concurrency cryptography access control gordon earned ph.d. university cambridge 1992 1997 gordon research fellow university cambridge computer laboratory joined microsoft research laboratory cambridge england principal researcher programming principles tools group also holds professorship university edinburgh gordon one designers concurrent haskell functional programming language explicit primitives concurrency co-designer martin abadi spi calculus extension π-calculus formalized reasoning cryptographic systems luca cardelli invented ambient calculus reasoning mobile code moritz y. becker cédric fournet gordon also designed secpal microsoft specification language access control policies gordon ph.d. thesis functional programming input/output 1993 distinguished dissertation award british computer society 2000 paper ambient calculus subject luca cardelli anytime anywhere modal logics mobile ambients 2010 sigplan influential popl paper award
[ 2737, 4916, 8262, 9535 ]
Test
5,948
3
Instruction-level_parallelism:instruction-level parallelism instruction-level parallelism ilp measure many instructions computer program executed simultaneously two approaches instruction level parallelism hardware level works upon dynamic parallelism whereas software level works static parallelism dynamic parallelism means processor decides run time instructions execute parallel whereas static parallelism means compiler decides instructions execute parallel pentium processor works dynamic sequence parallel execution itanium processor works static level parallelism consider following program operation 3 depends results operations 1 2 calculated completed however operations 1 2 depend operation calculated simultaneously assume operation completed one unit time three instructions completed total two units time giving ilp 3/2 goal compiler processor designers identify take advantage much ilp possible ordinary programs typically written sequential execution model instructions execute one order specified programmer ilp allows compiler processor overlap execution multiple instructions even change order instructions executed much ilp exists programs application specific certain fields graphics scientific computing amount large however workloads cryptography may exhibit much less parallelism micro-architectural techniques used exploit ilp include known ilp exploited compiler hardware support compiler also provides inherent implicit ilp programs hardware compilation optimization optimization techniques extracting available ilp programs would include scheduling register allocation/renaming memory access optimization dataflow architectures another class architectures ilp explicitly specified recent example see trips architecture recent years ilp techniques used provide performance improvements spite growing disparity processor operating frequencies memory access times early ilp designs ibm system/360 model 91 used ilp techniques overcome limitations imposed relatively small register file presently cache miss penalty main memory costs several hundreds cpu cycles principle possible use ilp tolerate even memory latencies associated resource power dissipation costs disproportionate moreover complexity often latency underlying hardware structures results reduced operating frequency reducing benefits hence aforementioned techniques prove inadequate keep cpu stalling off-chip data instead industry heading towards exploiting higher levels parallelism exploited techniques multiprocessing multithreading
[ 7173, 9739, 2066, 7699, 5655, 10779, 10781, 6181, 8231, 6184, 3630, 6705, 7218, 2623, 2113, 7234, 3142, 2638, 604, 2140, 1122, 4194, 3175, 5223, 8810, 4205, 8815, 630, 6774, 8822, 7802, 6268, 3197, 7313, 6815, 8352, 5793, 2210, 6818, 6821...
Test
5,949
3
Ampere_(microarchitecture):ampere microarchitecture ampere codename graphics processing unit gpu microarchitecture developed nvidia successor turing architecture scheduled release 2020 named french mathematician physicist andré-marie ampère june 2019 samsung electronics announced awarded contract produce ampere 7nm euv finfet process replacing tsmc nvidia partner
[ 10658, 2277, 7111 ]
None
5,950
4
Hiya_(company):hiya company hiya seattle-based company provides caller profile information help consumers identify incoming calls block unwanted ones hiya originally developed caller-id app whitepages largest database contact information americans april 2016 hiya spun whitepages april 2016 hiya app 25 million downloads whitepages founder alex algard stepped parent company focus leading hiya april 2016 employs 40 february 2016 hiya time part whitepages reached deal samsung integrate caller profile spam protection services galaxy s7 galaxy s7 edge phones 16 countries.the company extended partnership samsung separate deal august 2016 include service galaxy note 7 expand partnership total 28 countries august 2016 hiya launched hiya cloud network level caller id call-blocking offering offering limited version app iphones hiya announced september 2016 full version app would available ios 10 soon hiya began providing spam protection services phones call protect product 2017 hiya entered similar partnership zte provide call spam protection services axon 7 users october 2017 hiya announced received first outside funding series 18 million led balderton capital participation nautilus venture partners lumia capital hiya said would use funds expand globally following investment balderton ’ lars fjeldsoe-nielsen early executive uber dropbox joined hiya ’ board hiya database 1.5 billion phone numbers draws identify source incoming calls helps users make decision whether want pick call unknown number service automatically block calls numbers deemed associated fraud notifies user blocked call cases app let call go notify user number suspected spam users report numbers associated unwanted calls app well block future calls certain phone numbers
[ 4623 ]
Test
5,951
7
Monitoring_as_a_service:monitoring service monitoring service maas one many cloud computing delivery models anything service xaas framework facilitates deployment monitoring functionalities various services applications within cloud common application maas online state monitoring continuously tracks certain states applications networks systems instances element may deployable within cloud
[ 4194 ]
None
5,952
2
.NET_Core:.net core .net core free open-source managed computer software framework windows linux macos operating systems open source cross platform successor .net framework project primarily developed microsoft released mit license 1.0 announced november 12 2014 released june 27 2016 along microsoft visual studio 2015 update 3 enables .net core development 1.0.4 .net core 1.1.1 released along .net core tools 1.0 visual studio 2017 march 7 2017 .net core 2.0 released august 14 2017 along visual studio 2017 15.3 asp.net core 2.0 entity framework core 2.0 2.1 released may 30 2018 .net core 2.2 released december 4 2018 .net core 3 announced may 7 2019 microsoft build currently preview builds available official release planned september 2019 .net core 3 framework get support development desktop application software artificial intelligence/machine learning iot apps next release .net core 3.0 .net 5 .net framework deprecated .net 5 .net going forwardhence removal core branding skipping version 4 avoid confusion .net framework 4.x .net core fully supports c f partially supports visual basic .net currently vb.net compiles runs .net core separate visual basic runtime implemented microsoft announced .net core 3 would include visual basic runtime c++/cli yet supported although support planned windows supports four cross-platform scenarios asp.net core web apps command-line apps libraries universal windows platform apps prior .net core 3.0 implement windows forms windows presentation foundation wpf render standard gui desktop software windows however .net core 3 supports desktop technologies winforms wpf universal windows platform uwp supports use nuget packages unlike .net framework serviced using windows update relies package manager receive updates similar .net framework implements common language infrastructure cli via common language runtime clr framework class library fcl two main components coreclr corefx respectively cli implementation virtual execution system ves coreclr complete runtime virtual machine managed execution programs includes just-in-time compiler called ryujit also contains corert runtime optimized integrated aot compiled native binaries cli implementation foundational standard libraries corefx shares subset apis however also comes apis part variant library used uwp command-line interface offers execution entry point operating systems provides developer services like compilation package management
[ 10243, 2063, 10769, 1043, 1055, 2083, 8227, 1577, 2603, 4143, 9263, 11316, 1077, 8246, 4174, 4178, 9813, 603, 2145, 1656, 3705, 9340, 5761, 5765, 10886, 2183, 5259, 653, 6797, 10388, 3224, 3736, 4771, 7846, 10414, 8391, 214, 9943, 9434, 2...
Validation
5,953
1
Transaction_log:transaction log field databases computer science transaction log also transaction journal database log binary log audit trail history actions executed database management system used guarantee acid properties crashes hardware failures physically log file listing changes database stored stable storage format start database found inconsistent state shut properly database management system reviews database logs uncommitted transactions rolls back changes made transactions additionally transactions already committed whose changes yet materialized database re-applied done ensure atomicity durability transactions term confused human-readable logs database management system usually provides database management systems journal record data altered given process database log record made log records include general log attributes also attributes depending type recorded type attribute
[ 2432, 10632, 8201, 10505, 3219, 2068, 8979, 7446, 10389, 3096, 2456, 1049, 5403, 5658, 9112, 10137, 4255, 9248, 9631, 9634, 1447, 2344, 4263, 7080, 10793, 10921, 10413, 10286, 7347, 9397, 3004, 1341, 7868, 11324, 10048, 2369, 5953, 6850, 82...
None
5,954
1
Universal_IR_Evaluation:universal ir evaluation computer science universal ir evaluation information retrieval evaluation aims develop measures database retrieval performance shall comparable across information retrieval tasks ir information retrieval evaluation begins whenever user submits query search term database user able determine relevance document database relevant relevant query complete set documents naturally divided four distinct mutually exclusive subsets relevant documents retrieved relevant documents retrieved relevant documents retrieved relevant documents retrieved four subsets documents denoted letters b c respectively called swets variables named inventor addition swets definitions four relevance metrics also defined precision refers fraction relevant documents retrieved a/ a+b recall refers fraction retrieved documents relevant a/ a+c commonly used well-known relevance metrics found ir evaluation literature two less commonly used metrics include fallout i.e. fraction relevant documents retrieved b/ b+d miss refers fraction relevant documents retrieved c/ c+d given search universal ir evaluation addresses mathematical possibilities relationships among four relevance metrics precision recall fallout miss denoted p r f respectively one aspect problem involves finding mathematical derivation complete set universal ir evaluation points complete set 16 points one quadruple form p r f describes possible universal ir outcomes example many us experience querying database retrieving documents case precision would take undetermined form 0/0 recall fallout would zero miss would value greater zero less one assuming mix relevant relevant documents database none retrieved universal ir evaluation point would thus denoted 0/0 0 0 represents one 16 possible universal ir outcomes mathematics universal ir evaluation fairly new subject since relevance metrics p r f analyzed collectively recently within past decade lot theoretical groundwork already formulated new insights area await discovery detailed mathematical analysis query sciencedirect database universal ir evaluation retrieves several relevant peer-reviewed papers
[ 2901 ]
Train
5,955
7
BaseN:basen basen global full stack internet things iot operator headquartered helsinki finland basen established 2001 provide extremely scalable fault-tolerant network service management systems telecom operators large multinational enterprises basen develops markets software service saas suite basen platform public private infrastructures basen platform built redundant computing grid due basen linearly scalable flexible resilient components grid work together function separately automatically take roles grid architecture also allows quick deployment individual components functional immediately installation spimes record manage full lifecycle physical representations physical hardware support software come go object considered spime essential programming managed cloud spime concept originally crafted author bruce sterling neologism futuristic internet things object basen founded 2001 pasi hurri president ceo basen holds following us patents technology us20170139788a1 us 20120158328 us 20120089523 us 20120158327 us 20120154171 us 20120158329 basen developed system telecom networks basen one founders fennogrid association whose purpose sharing information grid peer-to-peer research promotion cooperation projects fields basen also member international e-science consortium enabling grids e-science 2015 tm forum awarded basen partners innovative catalyst digital health 2013 basen awarded two industry awards tm forum one innovative catalyst smart grid empowering digital customer one significant contribution frameworx ehealth – curing complexity
[ 467, 5956, 8589 ]
Test
5,956
7
Grid_computing:grid computing grid computing use widely distributed computer resources reach common goal computing grid thought distributed system non-interactive workloads involve large number files grid computing distinguished conventional high-performance computing systems cluster computing grid computers node set perform different task/application grid computers also tend heterogeneous geographically dispersed thus physically coupled cluster computers although single grid dedicated particular application commonly grid used variety purposes grids often constructed general-purpose grid middleware software libraries grid sizes quite large grids form distributed computing whereby super virtual computer composed many networked loosely coupled computers acting together perform large tasks certain applications distributed grid computing seen special type parallel computing relies complete computers onboard cpus storage power supplies network interfaces etc connected computer network private public conventional network interface ethernet contrast traditional notion supercomputer many processors connected local high-speed computer bus grid computing combines computers multiple administrative domains reach common goal solve single task may disappear quickly size grid may vary small—confined network computer workstations within corporation example—to large public collaborations across many companies networks notion confined grid may also known intra-nodes cooperation whereas notion larger wider grid may thus refer inter-nodes cooperation grids form distributed computing whereby “ super virtual computer ” composed many networked loosely coupled computers acting together perform large tasks technology applied computationally intensive scientific mathematical academic problems volunteer computing used commercial enterprises diverse applications drug discovery economic forecasting seismic analysis back office data processing support e-commerce web services coordinating applications grids complex task especially coordinating flow information across distributed computing resources grid workflow systems developed specialized form workflow management system designed specifically compose execute series computational data manipulation steps workflow grid context “ distributed ” “ grid ” computing general special type parallel computing relies complete computers onboard cpus storage power supplies network interfaces etc connected network private public internet conventional network interface producing commodity hardware compared lower efficiency designing constructing small number custom supercomputers primary performance disadvantage various processors local storage areas high-speed connections arrangement thus well-suited applications multiple parallel computations take place independently without need communicate intermediate results processors high-end scalability geographically dispersed grids generally favorable due low need connectivity nodes relative capacity public internet also differences programming mc costly difficult write programs run environment supercomputer may custom operating system require program address concurrency issues problem adequately parallelized “ thin ” layer “ grid ” infrastructure allow conventional standalone programs given different part problem run multiple machines makes possible write debug single conventional machine eliminates complications due multiple instances program running shared memory storage space time one feature distributed grids formed computing resources belonging one multiple individuals organizations known multiple administrative domains facilitate commercial transactions utility computing make easier assemble volunteer computing networks one disadvantage feature computers actually performing calculations might entirely trustworthy designers system must thus introduce measures prevent malfunctions malicious participants producing false misleading erroneous results using system attack vector often involves assigning work randomly different nodes presumably different owners checking least two different nodes report answer given work unit discrepancies would identify malfunctioning malicious nodes however due lack central control hardware way guarantee nodes drop network random times nodes like laptops dial-up internet customers may also available computation network communications unpredictable periods variations accommodated assigning large work units thus reducing need continuous network connectivity reassigning work units given node fails report results expected time another set could termed social compatibility issues early days grid computing related goals grid developers carry innovation beyond original field high-performance computing across disciplinary boundaries new fields like high-energy physics impacts trust availability performance development difficulty influence choice whether deploy onto dedicated cluster idle machines internal developing organization open external network volunteers contractors many cases participating nodes must trust central system abuse access granted interfering operation programs mangling stored information transmitting private data creating new security holes systems employ measures reduce amount trust “ client ” nodes must place central system placing applications virtual machines public systems crossing administrative domains including different departments organization often result need run heterogeneous systems using different operating systems hardware architectures many languages trade-off investment software development number platforms supported thus size resulting network cross-platform languages reduce need make tradeoff though potentially expense high performance given node due run-time interpretation lack optimization particular platform various middleware projects created generic infrastructure allow diverse scientific commercial projects harness particular associated grid purpose setting new grids boinc common one various academic projects seeking public volunteers listed end article fact middleware seen layer hardware software top middleware number technical areas considered may may middleware independent example areas include sla management trust security virtual organization management license management portals data management technical areas may taken care commercial solution though cutting edge area often found within specific research projects examining field segmentation grid computing market two perspectives need considered provider side user side overall grid market comprises several specific markets grid middleware market market grid-enabled applications utility computing market software-as-a-service saas market grid middleware specific software product enables sharing heterogeneous resources virtual organizations installed integrated existing infrastructure involved company companies provides special layer placed among heterogeneous infrastructure specific user applications major grid middlewares globus toolkit glite unicore utility computing referred provision grid computing applications service either open grid utility hosting solution one organization vo major players utility computing market sun microsystems ibm hp grid-enabled applications specific software applications utilize grid infrastructure made possible use grid middleware pointed software service saas “ software owned delivered managed remotely one providers. ” gartner 2007 additionally saas applications based single set common code data definitions consumed one-to-many model saas uses pay go payg model subscription model based usage providers saas necessarily computing resources required run saas therefore saas providers may draw upon utility computing market utility computing market provides computing resources saas providers companies demand user side grid computing market different segments significant implications deployment strategy deployment strategy well type investments made relevant aspects potential grid users play important role grid adoption cpu-scavenging cycle-scavenging shared computing creates “ grid ” idle resources network participants whether worldwide internal organization typically technique exploits 'spare instruction cycles resulting intermittent inactivity typically occurs night lunch breaks even comparably miniscule though numerous moments idle waiting modern desktop cpu experience throughout day computer waiting io user network storage practice participating computers also donate supporting amount disk storage space ram network bandwidth addition raw cpu power many volunteer computing projects boinc use cpu scavenging model since nodes likely go offline time time owners use resources primary purpose model must designed handle contingencies creating opportunistic environment another implementation cpu-scavenging special workload management system harvests idle desktop computers compute-intensive jobs also refers enterprise desktop grid edg instance htcondor open-source high-throughput computing software framework coarse-grained distributed rationalization computationally intensive tasks configured use desktop machines keyboard mouse idle effectively harness wasted cpu power otherwise idle desktop workstations like full-featured batch systems htcondor provides job queueing mechanism scheduling policy priority scheme resource monitoring resource management used manage workload dedicated cluster computers well seamlessly integrate dedicated resources rack-mounted clusters non-dedicated desktop machines cycle scavenging one computing environment term grid computing originated early 1990s metaphor making computer power easy access electric power grid power grid metaphor accessible computing quickly became canonical ian foster carl kesselman published seminal work grid blueprint new computing infrastructure 1999 preceded decades metaphor utility computing 1961 computing public utility analogous phone system cpu scavenging volunteer computing popularized beginning 1997 distributed.net later 1999 seti home harness power networked pcs worldwide order solve cpu-intensive research problems ideas grid including distributed computing object-oriented programming web services brought together ian foster steve tuecke university chicago carl kesselman university southern california information sciences institute trio led effort create globus toolkit widely regarded fathers grid toolkit incorporates computation management also storage management security provisioning data movement monitoring toolkit developing additional services based infrastructure including agreement negotiation notification mechanisms trigger services information aggregation globus toolkit remains de facto standard building grid solutions number tools built answer subset services needed create enterprise global grid 2007 term cloud computing came popularity conceptually similar canonical foster definition grid computing terms computing resources consumed electricity power grid earlier utility computing indeed grid computing often always associated delivery cloud computing systems exemplified applogic system 3tera november 2006 seidel received sidney fernbach award supercomputing conference tampa florida outstanding contributions development software hpc grid computing enable collaborative numerical investigation complex problems physics particular modeling black hole collisions award one highest honors computing awarded achievements numerical relativity also march 2019 bitcoin network measured computing power equivalent 80,000,000 pflops floating-point operations per second measurement reflects number flops required equal hash output bitcoin network rather capacity general floating-point arithmetic operations since elements bitcoin network perform specific cryptographic hash computation required bitcoin protocol grid computing offers way solve grand challenge problems protein folding financial modeling earthquake simulation climate/weather modeling grids offer way using information technology resources optimally inside organization also provide means offering information technology utility commercial noncommercial clients clients paying use electricity water october 2016 4 million machines running open-source berkeley open infrastructure network computing boinc platform members world community grid one projects using boinc seti home using 400,000 computers achieve 0.828 tflops october 2016 october 2016 folding home part boinc achieved 101 x86-equivalent petaflops 110,000 machines european union funded projects framework programmes european commission beingrid business experiments grid research project funded european commission integrated project sixth framework programme fp6 sponsorship program started june 1 2006 project ran 42 months november 2009 project coordinated atos origin according project fact sheet mission “ establish effective routes foster adoption grid computing across eu stimulate research innovative business models using grid technologies ” extract best practice common themes experimental implementations two groups consultants analyzing series pilots one technical one business project significant long duration also budget 24.8 million euros largest fp6 integrated project 15.7 million provided european commission remainder 98 contributing partner companies since end project results beingrid taken carried forward it-tude.com enabling grids e-science project based european union included sites asia united states follow-up project european datagrid edg evolved european grid infrastructure along lhc computing grid lcg developed support experiments using cern large hadron collider list active sites participating within lcg found online real time monitoring egee infrastructure relevant software documentation also publicly accessible speculation dedicated fiber optic links installed cern address lcg data-intensive needs may one day available home users thereby providing internet services speeds 10,000 times faster traditional broadband connection european grid infrastructure also used research activities experiments simulation oncological clinical trials distributed.net project started 1997 nasa advanced supercomputing facility nas ran genetic algorithms using condor cycle scavenger running 350 sun microsystems sgi workstations 2001 united devices operated united devices cancer research project based grid mp product cycle-scavenges volunteer pcs connected internet project ran 3.1 million machines close 2007 today many definitions grid computing
[ 10247, 3083, 526, 2064, 531, 7699, 5654, 6184, 7218, 2555, 1087, 2113, 1607, 9301, 3158, 8792, 11353, 2651, 2140, 11359, 4194, 4195, 10340, 5223, 105, 8810, 4205, 11377, 6774, 7802, 6268, 3197, 7294, 11393, 5767, 7303, 4233, 5258, 9867, 5...
Test
5,957
1
Leuven_Database_of_Ancient_Books:leuven database ancient books leuven database ancient books ldab resource ancient written literary manuscripts 500 bc ad 800 currently lists 16.000 greek latin coptic syriac demotic literary texts attempts collect basic information ancient literary texts includes authors homer gregory great 3.600 texts unidentified authors founded 1998 ku leuven willy clarysse
[]
Validation
5,958
7
Brownout_(software_engineering):brownout software engineering brownout software engineering technique increase robustness application computing capacity shortage many users simultaneously accessing application hosted online underlying computing infrastructure may become overloaded rendering application unresponsive users likely abandon application switch competing alternatives hence incurring long-term revenue loss better deal situation application given brownout capabilities application disable certain features – e.g. online shop longer display recommendations related products – avoid overload although reducing features generally negative impact short-term revenue application owner long-term revenue loss avoided technique inspired brownouts power grids consists reducing power grid voltage case electricity demand exceeds production consumers incandescent light bulbs dim – hence originating term – draw less power thus helping match demand production similarly brownout application helps match computing capacity requirements available target infrastructure brownout complements elasticity former help application withstand short-term capacity shortage without changing capacity available application contrast elasticity consists adding removing capacity application preferably advance avoid capacity shortage altogether two techniques combined e.g. brownout triggered number users increases unexpectedly elasticity triggered latter usually requiring minutes show effect brownout relatively non-intrusive developer example implemented advice aspect-oriented programming however surrounding components load-balancers need made brownout-aware distinguish cases application running normally cases application maintains low response time triggering brownout
[ 3993, 3725 ]
Test
5,959
4
VyOS:vyos vyos open source network operating system based debian gnu/linux vyos provides free routing platform competes directly commercially available solutions well known network providers vyos run standard amd64 i586 systems able used router firewall platform cloud deployments brocade communications stopped development vyatta core edition vyatta routing software small group enthusiasts took last community edition worked building open source fork live place end life vc vyos version 1.0.0 hydrogen released december 22 2013 october 9 2014 version 1.1.0 helium released versions released thus far based debian 6.0 squeeze available 32-bit images 64-bit images physical virtual machines january 28 2019 version 1.2.0 crux released version 1.2.0 based debian 8 jessie version 1.0 1.1 named elements new naming scheme based constellations used version 1.2 vyos ova image vmware released february 3 2014 maintenance release allows convenient setup vyos vmware platform includes vmware tools paravirtual drivers ova image downloaded standard download site starting version 1.0.2 amazon ec2 customers select vyos ami image deprecated removed february 2018 starting version 1.1.7 aws customers use new marketplace vyos ami starting version 1.2.0 aws customers deploy new marketplace ami new offering comes support starting version 1.2.0 azure customers use vyos azure
[ 4611, 8211, 9764, 9253, 11305, 56, 59, 9279, 10303, 4673, 8265, 1110, 2136, 4194, 3685, 9318, 10860, 2671, 5749, 11388, 8837, 10394, 3742, 673, 3745, 4268, 686, 7854, 10417, 2738, 7859, 2228, 4790, 3777, 10433, 9927, 5322, 8907, 11468, 78...
Test
5,960
1
Amazon_Redshift:amazon redshift amazon redshift internet hosting service data warehouse product forms part larger cloud-computing platform amazon web services built top technology massive parallel processing mpp data warehouse company paraccel later acquired actian handle large scale data sets database migrations redshift differs amazon hosted database offering amazon rds ability handle analytic workloads big data data sets stored column-oriented dbms principle amazon redshift based older version postgresql 8.0.2 redshift made changes version initial preview beta released november 2012 full release made available february 15 2013 service handle connections applications using odbc jdbc connections according cloud data warehouse report published forrester q4 2018 amazon redshift largest cloud data warehouse deployments 6,500 deployments 2018 redshift came second industry wide benchmark test run gigaom behind microsoft azure amazon listed number business intelligence software proprietors partners tested tools apn partner program including actian actuate corporation alteryx dundas data visualization ibm cognos inetsoft infor logi analytics looker company microstrategy pentaho qlik sisense tableau software yellowfin partner companies providing data integration tools include informatica snaplogic system integration consulting partners include accenture deloitte capgemini dxc technology
[ 11392, 8962, 3, 8451, 6027, 1935, 10134, 1816, 5660, 11038, 6943, 10912, 11556, 2217, 7983, 10681, 11201, 10185, 6348, 590, 7248, 2901, 7767, 7512, 4696, 8921, 8539, 9177, 735, 4194, 1001, 5612, 10735, 8434, 8181 ]
Validation
5,961
9
Comparison_of_programming_languages_(object-oriented_programming):comparison programming languages object-oriented programming comparison programming languages compares object-oriented programming languages c++ java smalltalk object pascal perl python others manipulate data structures declare property named bar access members object x
[ 2304, 10752, 3462, 8582, 1931, 4747, 6414, 10510, 6160, 5521, 3736, 155, 9245, 5796, 5165, 5677, 5679, 5806, 9008, 3765, 7479, 10043, 10684, 6335, 963, 8644, 1610, 1611, 9804, 3577, 8397, 11212, 7292, 11219, 5588, 3414, 7894, 4057, 10586, ...
Test
5,962
2
Scott_James_Remnant:scott james remnant scott james remnant born 18 july 1980 open source software engineer scott served long-time debian developer 2006 worked ubuntu developer manager ubuntu linux distribution canonical ltd works google technical lead bluetooth systems scott openly gay believes important open support others open source community
[ 2180, 11410, 11669, 8727, 4123, 8476, 926, 3245, 6445, 8112, 439, 9407, 3654, 975, 1107, 4951, 3550, 4192, 3685, 5990, 7913, 7020, 9324, 8177, 2930, 7027, 1396, 9074, 9971, 5369, 5755, 3068, 11263 ]
Validation
5,963
3
Devices_using_Qualcomm_Snapdragon_systems-on-chip:devices using qualcomm snapdragon systems-on-chip list devices using qualcomm snapdragon chips snapdragon family mobile system chip soc made qualcomm use smartphones tablets smartbook devices
[ 7170, 8196, 8720, 11282, 9235, 11289, 1057, 6178, 38, 4139, 8237, 9774, 8250, 1083, 8253, 10303, 7745, 7235, 7747, 2635, 99, 8812, 11374, 10361, 638, 644, 10884, 9863, 8842, 146, 659, 1170, 7833, 666, 5786, 4258, 4773, 9913, 10945, 9928, ...
Test
5,964
1
SQLyog:sqlyog sqlyog gui tool rdbms mysql developed webyog inc. based bangalore india santa clara california sqlyog used 30,000 customers worldwide downloaded 2,000,000 times sqlyog v0.9 first released public 2001 eight months development sqlyog available free charge closed source code v3.0 made fully commercial software nowadays sqlyog distributed free software well several paid proprietary versions free software version known community edition github paid versions sold professional enterprise ultimate editions prominent features sqlyog sqlyog works windows platform ranging windows vista windows 10 windows 9x/me support removed version 5.0 windows 2000 support stopped version 8.6 windows xp support ended version 12.5 also made work linux various unixes including macos using wine environment subset sqlyog enterprise/ultimate functionalities available free sja sqlyog job agent linux native linux utility makes possible specify test scheduled jobs windows environment port execution parameters seamlessly linux environment webyog provides priority support customers primarily ticket based support system users community edition get support webyog forums 15000 registered users webyog also maintains extensive faq commonly asked questions
[ 8195, 9481, 6797, 10258, 6424, 7453, 1950, 9503, 5546, 7339, 7983, 9010, 823, 4797, 6721, 5198, 7506, 11221, 9687, 9177, 10459, 1632, 6245, 10341, 8295, 8683, 2413, 7022, 3188, 10873, 2810 ]
Validation
5,965
7
Traversed_edges_per_second:traversed edges per second number traversed edges per second teps performed supercomputer cluster measure communications capabilities computational power machine contrast standard metric floating point operations per second flops give weight communication capabilities machine term first entered usage 2010 advent petascale computing since measured many world largest supercomputers context edge connection two vertices graph traversal ability machine communicate data two points standardized benchmark associated graph500 september 2011 calls executing graph generation search algorithms graphs large 1.1 petabyte ability application utilize supercomputer cluster effectively depends raw speed processor also communication network importance communication capability varies application application clear linpack benchmarks traditionally used rating flops supercomputers require communications capability many scientific applications therefore alternative metrics characterize performance machine holistic manner may relevant many scientific applications may desirable making purchasing decisions
[ 1480, 1933 ]
Test
5,966
7
LiveTiles:livetiles livetiles software company founded 2014 offers cloud based intelligent workplace software commercial government education markets 2018 raised 50 million total funding including seed funding company headquartered new york city offices globally including locations seattle tri-cities washington state san francisco los angeles chicago minneapolis north carolina london sligo zurich netherlands sydney melbourne geelong hobart livetiles founded australia 2014 2015 became listed australian securities exchange reverse acquisition coal company modun resources limited initial ipo 57 million ceo company karl redenbach cofounded livetiles peter nguyen-brown 2017 company raised 12 million equity financing share purchase plan may 2018 livetiles acquired us based microsoft ai firm hyperfish 8.9 million february 2019 livetiles acquired danish digital workplace software company wizdom maximum total purchase price eur 30 million approximately 47.6 million company develops sells cloud-based intelligent workplace software office 365 azure sharepoint includes various solutions including livetiles mosaic developed k-12 educational institutions 1.2 million users livetiles commercial also provide livetiles mx mobile app digital workplace design tools called livetiles cloud livetiles sharepoint artificial intelligence platform livetiles intelligence livetiles sap software 2017 livetiles partnered microsoft launch joint venture ai australia australian-based artificial intelligence development firm
[ 1935 ]
None
5,967
2
Least_frequently_used:least frequently used least frequently used lfu type cache algorithm used manage memory within computer standard characteristics method involve system keeping track number times block referenced memory cache full requires room system purge item lowest reference frequency lfu sometimes combined least recently used algorithm called lrfu simplest method employ lfu algorithm assign counter every block loaded cache time reference made block counter increased one cache reaches capacity new block waiting inserted system search block lowest counter remove cache lfu method may seem like intuitive approach memory management without faults consider item memory referenced repeatedly short period time accessed extended period time due rapidly accessed counter increased drastically even though used decent amount time leaves blocks may actually used frequently susceptible purging simply accessed different method moreover new items entered cache subject removed soon start low counter even though might used frequently due major issues like explicit lfu system fairly uncommon instead hybrids utilize lfu concepts
[ 2339, 2250, 5840, 11674, 5661 ]
Test
5,968
9
Winbatch:winbatch winbatch microsoft windows scripting language originally developed wilson windowware currently supported maintained enhanced island lake consulting llc environment includes interpreter code editor along dialog designer optional compiler create self-contained executables language structure syntax cross dos batch command basic fortran c. developed years functions added support things like .net activex controls com ole unicode uac code signing wilson windowware founded 1989 product command post 1991 menuing language command post became winbatch shortly corporate version released included code binder program combines bytecode version program along interpreter july 2017 wilson windowware ceased operation winbatch acquired newly formed island lake consulting llc documentation available german spanish japanese languages winbatch hello world program extenders add additional commands winbatch programming language popular extenders included default winbatch installer additional extenders available download
[ 9728, 1121, 7364, 8262, 10886, 780, 6797, 8588, 7343, 7983, 3218, 8692, 9780, 5622, 9909 ]
Test
5,969
6
Symbolic_link:symbolic link computing symbolic link also symlink soft link term file contains reference another file directory form absolute relative path affects pathname resolution symbolic links already present 1978 minicomputer operating systems dec data general rdos today supported posix operating system standard unix-like operating systems freebsd linux macos limited support also exists windows operating systems windows vista windows 7 degree windows 2000 windows xp form shortcut files symbolic link contains text string automatically interpreted followed operating system path another file directory file directory called target symbolic link second file exists independently target symbolic link deleted target remains unaffected symbolic link points target sometime later target moved renamed deleted symbolic link automatically updated deleted continues exist still points old target non-existing location file symbolic links pointing moved non-existing targets sometimes called broken orphaned dead dangling symbolic links different hard links hard links link paths different volumes file systems whereas symbolic links may point file directory irrespective volumes link target reside hard links always refer existing file whereas symbolic links may contain arbitrary path point anything symbolic links operate transparently many operations programs read write files named symbolic link behave operating directly target file however effect changing otherwise hierarchical filesystem tree directed graph consequences simple operations determining current directory process even unix standard navigating directory parent directory longer works reliably face symlinks shells heuristically try uphold illusion tree-shaped hierarchy causes produce different results programs manipulate pathnames without heuristic relying operating system instead programs need handle symbolic links specially e.g. shells backup utilities thus need identify manipulate directly unix well linux distributions use symbolic links extensively effort reorder file system hierarchy accomplished several mechanisms variant context-dependent symbolic links offers opportunity create intuitive application-specific directory tree reorganize system without redesign core set system functions utilities posix-compliant operating systems symbolic links created codice_1 system call codice_2 shell command normally uses codice_3 system call creates hard link codice_4 flag specified symlink system call used instead creating symbolic link symlinks introduced 4.2bsd unix u.c berkeley following command creates symbolic link command-line interface shell target_path relative absolute path symbolic link point usually target exist although symbolic links may created non-existent targets link_path path symbolic link creating symbolic link may generally treated alias target file system management commands e.g. codice_5 codice_6 may used symbolic link commands read write file contents access contents target file codice_6 delete file command however removes link target file likewise codice_8 command moves renames link target posix directory listing application codice_9 denotes symbolic links arrow name pointing name target file see following example long directory list requested codice_10 option directory listing symbolic link points directory requested link displayed order obtain listing linked directory path must include trailing directory separator character '/ slash note example create three directory creation link /tmp directory early implementations symbolic links stored symbolic link information data regular files file contained textual reference link ’ target indicator denoting symbolic link method slow inefficient use disk-space small systems improvement called fast symlinks allowed storage target path within data structures used storing file information disk inodes space normally stores list disk block addresses allocated file thus symlinks short target paths accessed quickly systems fast symlinks often fall back using original method target path exceeds available inode space original style retroactively termed slow symlink also used disk compatibility older versions operating systems although storing link value inside inode saves disk block disk read operating system still needs parse path name link always requires reading additional inodes generally requires reading potentially many directories processing list files inodes finds match link path components link points file directory fast symlinks provide significantly better performance symlinks vast majority posix-compliant implementations use fast symlinks however posix standard require entire set file status information common regular files implemented symlinks allows implementations use solutions storing symlink data directory entries file system permissions symbolic link used access modes target file controlled target file permissions operating systems freebsd offer ability modify file permissions filesystem attributes symbolic link codice_11 codice_12 system calls respectively reported size symlink number characters path points mac os applications users also employ aliases added feature following target even moved another location volume confused shell command alias ntfs 3.1 introduced support symbolic links type file included windows xp enabled default kernel mode programs windows vista later versions windows enabled support symbolic links user mode applications well supplied command line utility codice_13 creating third-party drivers required enable support ntfs symbolic links windows xp unlike junction points symbolic link also point file remote server message block smb network path additionally ntfs symbolic link implementation provides full support cross-filesystem links however functionality enabling cross-host symbolic links requires remote system also support symbolic links designed aid migration application compatibility posix operating systems microsoft aimed windows vista symbolic links function like unix links however implementation varies unix symbolic links several ways example windows vista users must manually indicate creating symbolic link whether file directory windows 7 vista support maximum 31 reparse points therefore symbolic links given path i.e given path 31 indirections windows gives users new create symbolic link privilege administrators default create symbolic links desired behavior must changed local security policy management console additionally ntfs symbolic links files distinct ntfs symbolic links directories therefore used interchangeably unlike posix symbolic link refer either files directories windows vista later working directory path ends symbolic link current parent path reference refer parent directory symbolic link rather target behaviour also found shell level least posix systems including linux never accessing files directories operating system calls instance bash builtin commands operate current logical directory often used scripts determine actual current working directory path used system call use use actual filesystem parent directory containing pseudo-directory entry may return completely different results example example 2 windows 2000 version ntfs introduced reparse points enabled among things use volume mount points junction points junction points directories moreover local directories junction points remote shares unsupported windows 2000 xp resource kits include program called linkd create junction points powerful one named junction distributed sysinternals mark russinovich standard applications support reparse points noticeably backup suffers problem issue error message 0x80070003 folders backed contain reparse point shortcuts supported graphical file browsers operating systems may resemble symbolic links differ number important ways one difference type software able follow another difference capabilities mechanism almost like shortcuts transparent windows shell implemented ordinary folders need read and/or system attribute containing shortcut named target.lnk refers target hidden desktop.ini least following contents folder shortcuts created used windows shell network neighborhood example shell objects shell folders defined windows registry used implement sort symbolic link like folder shortcuts transparent windows shell minimal implementation clsid 00000000-0000-0000-0000-000000000000 used placeholder documents folder desktop well fonts administrative tools folders control panel examples shell objects redirected file-system folders cygwin simulates posix-compliant symbolic links microsoft windows file system uses identical programming user utility interfaces unix see creates windows shortcuts .lnk files additional information used cygwin time symlink resolution cygwin symlinks compliant windows posix standard additionally cygwin set support native windows symbolic links used cygwin without restrictions requires differences exist however cygwin way specify shortcut-related information – working directory icon – place parameters codice_14 command create standard microsoft .lnk files cygwin provides codice_15 codice_16 utilities cygwin user guide information topic command creating symbolic links codice_17 also used hard links internally dos.library returns error code indicating target soft link try perform actions legal file applications wish follow symbolic link needs explicitly make call follow link retry operation amigados shell follow links automatically os/2 operating system symbolic links somewhat resemble shadows graphical workplace shell however shadows due fully object-oriented system object model considerably powerful robust simple link example shadows lose capabilities renamed either object subject link relocated symbolic links may implemented context-dependent variable fashion link points varying targets depending configuration parameter run-time parameter instantaneous condition variable variant symbolic link symbolic link variable name embedded allows flexibility filesystem order possible standard symbolic link variables embedded symbolic link may include user environment specific information operating systems make use variant symbolic links include netbsd dragonfly bsd domain/os tru64 uses context dependent symbolic link context cluster member number pyramid technology osx operating system implemented conditional symbolic links pointed different locations depending universe program running universes supported sysv.3 berkeley software distribution bsd 4.3 example ps command run att universe symbolic link directory /bin would point /.attbin program /.attbin/ps would executed whereas ps command run ucb universe /bin would point /.ucbbin /.ucbbin/ps would executed similar conditional symbolic links also created directories /lib /usr/lib /usr/include
[ 5120, 516, 6669, 3598, 10257, 6677, 5142, 8214, 9762, 5158, 2095, 52, 11323, 576, 8772, 6727, 2120, 7244, 3170, 4708, 8298, 9836, 7789, 9840, 9333, 6263, 9335, 9343, 1668, 7818, 6797, 654, 2193, 2194, 2197, 2198, 2199, 10394, 11419, 6813,...
None
5,970
2
OpenNTPD:openntpd openntpd also known openbsd ntp daemon unix daemon implementing network time protocol synchronize local clock computer system remote ntp servers also able act ntp server ntp-compatible clients openntpd primarily developed henning brauer part openbsd project design goals include secure non-exploitable easy configure accurate enough purposes portable version like openssh developed child project adds portability code openbsd version releases separately portable version developed brent cook project developers receive funding openbsd foundation development openntpd motivated combination issues current ntp daemons difficult configuration complicated difficult audit code unsuitable licensing openntpd designed solve problems make time synchronization accessible wider userbase period development openntpd first appeared openbsd 3.6 first release announced 2 november 2004 openntpd attempt openbsd team produce ntp daemon implementation secure simple audit trivial set administer reasonably accurate light system resources design goals openntpd security ease use performance security openntpd achieved robust validity check network input path use bounded buffer operations via strlcpy privilege separation mitigate effects possible security bugs exploiting daemon privilege escalation order simplify use ntp openntpd implements smaller set functionalities available ntp daemons provided network time protocol project objective provide enough features satisfy typical usage risk unsuitability esoteric niche requirements openntpd configured configuration file ntpd.conf minimal number options offered ip address hostname openntpd listen timedelta sensor device used set servers time synchronized accuracy openntpd best-effort daemon attempts accurate possible specific accuracy guaranteed openntpd gradually adjusts system clock seen output openntpd running linux system openntpd criticized less accurate ntp daemon produced internet software consortium isc internally openntpd maintain millisecond accuracy vary 50-200ms real time omits variety algorithms increase accuracy favour code simplicity openntpd project acknowledged criticism stated lack microsecond precision design tradeoff benefited simplicity security openntpd design goals state project intent r reasonable accuracy without sacrificing secure design getting last nanosecond obscure edge case september 2004 shortly release openntpd 3.6 isc ntp contributor brad knowles published article entitled openntpd considered harmful criticizing various aspects openntpd implementation ntp protocol well split development model project employs also used development openssh openbgpd december 2004 darren tucker principal developer portable branch openntpd wrote detailed response knowles acknowledging issues valid rejecting several others unwarranted considering yet others misleading among serious issues raised knowles openntpd servers claimed stratum 1 servers issue however already fixed time tucker response march 2005 knowles acknowledged tucker response stated going everything could work tucker get remaining issues resolved additionally openbsd networking faq expanded response knowles initial criticism openntpd openbsd kernel ignore leap seconds care taken using openntpd higher-stratum source ntpd servers high-resolution time requirements reference coordinated universal time leap seconds used coordinated universal time international atomic time global positioning system time signals united states naval observatory bureau international des poids et mesures recommends systems implementing leap seconds referenced international atomic time directly gps time signals
[ 9223, 10631, 2825, 3465, 1932, 3473, 274, 8725, 7702, 8344, 10105, 6702, 7983, 9520, 823, 8637, 2245, 1993, 8778, 3404, 11086, 5084, 7139, 1637, 4071, 10344, 5230, 5492, 1785, 8954, 2045 ]
None
5,971
4
CARO:caro caro computer antivirus research organization organization established 1990 research study malware organization perhaps best known virus naming convention 1991 subsequent revisions though widely adopted still faced usage obstacles led proposal new naming systems product vendors industry groups annual workshop biggest caro event workshop usually organized hosted one anti-virus firm home country workshops started 2007 attendance limited 120-130 top anti-malware experts strict policy photography recordings kind br caro collaboration eicar european institute computer antivirus research developed eicar test file executable string designed test integrity antivirus software caro membership private issue members choosing publicize membership members caro founders current publicly stated membership point include friðrik skúlason founder frisk software international dr. alan solomon founder dr solomon antivirus toolkit vesselin bontchev mikko hyppönen cro f-secure eugene kaspersky founder kaspersky lab nick fitzgerald peter ferrie dmitry gryaznov igor muttik atley padgett peterson costin raiu peter kruse morton swimmer righard zwienenberg philipp wolf
[ 7809, 9537, 37, 2213, 2601, 43, 5586, 4441, 7515, 9246 ]
Test
5,972
4
Session_border_controller:session border controller session border controller sbc network element deployed protect sip based voice internet protocol voip networks early deployments sbcs focused borders two service provider networks peering environment role expanded include significant deployments service provider access network backbone network provide service residential and/or enterprise customers term session refers communication two parties – context telephony would call call consists one call signaling message exchanges control call one call media streams carry call audio video data along information call statistics quality together streams make session job session border controller exert influence data flows sessions term border refers point demarcation one part network another simple example edge corporate network firewall demarcates local network inside corporation rest internet outside corporation complex example large corporation different departments security needs location perhaps kind data case filtering routers network elements used control flow data streams job session border controller assist policy administrators managing flow session data across borders term controller refers influence session border controllers data streams comprise sessions traverse borders one part network another additionally session border controllers often provide measurement access control data conversion facilities calls control sbcs commonly maintain full session state offer following functions advent webrtc sbcs also assumed role sip webrtc gateway translate sip one signalling protocol mandated webrtc specifications sip websockets rfc 7118 often used partially due applicability sip envisaged communication scenarios well availability open source software jssip case sbc acts gateway webrtc applications sip end points sbcs inserted signaling and/or media paths calling called parties voip call predominantly using session initiation protocol sip h.323 mgcp call-signaling protocols many cases sbc hides network topology protects service provider enterprise packet networks sbc terminates inbound call initiates second call leg destination party technical terms used sip protocol defines back-to-back user agent b2bua effect behavior signaling traffic also media traffic voice video controlled sbc cases sbc capability provide media services sbcs also able redirect media traffic different element elsewhere network recording generation music-on-hold media-related purposes conversely without sbc media traffic travels directly endpoints without in-network call signaling elements control path cases sbc simply modifies stream call control signaling data involved call perhaps limiting kinds calls conducted changing codec choices ultimately sbcs allow network operators manage calls made networks fix change protocols protocol syntax achieve interoperability also overcome problems firewalls network address translators nats present voip calls show operation sbc one compare simple call establishment sequence call establishment sequence sbc simplest session establishment sequence one proxy user agents proxy ’ task identify callee ’ location forward request proxy also adds via header address indicate path response traverse proxy change dialog identification information present message tag header call-id cseq proxies also alter information sip message bodies note session initiation phase user agents exchange sip messages sdp bodies include addresses agents expect media traffic successfully finishing session initiation phase user agents exchange media traffic directly without involvement proxy sbcs designed many applications used operators enterprises achieve variety goals even sbc implementation might act differently depending configuration use case hence easily possible describe exact sbc behavior would apply sbc implementations general possible identify certain features common sbcs example sbcs implemented back-to-back user agent b2bua proxy-like server splits sip transaction two call legs side facing user agent client uac acts server side facing user agent server uas acts client proxy usually keeps state information related active transactions b2buas keep state information active dialogs e.g. calls proxy receives sip request save state information transaction e.g. receiving response state information soon deleted b2bua maintain state information active calls delete information call terminated sbc included call path sbc acts b2bua behaves user agent server towards caller user agent client towards callee sense sbc actually terminates call generated caller starts new call towards callee invite message sent sbc contains longer clear reference caller invite sent sbc proxy includes via contact headers point sbc caller sbcs often also manipulate dialog identification information listed call-id tag case sbc configured also control media traffic sbc also changes media addressing information included c lines sdp body thereby sip messages traverse sbc also audio video packets invite sent sbc establishes new dialog sbc also manipulates message sequence number cseq well max-forwards value note list header manipulations listed subset possible changes sbc might introduce sip message furthermore sbcs might listed manipulations sbc expected control media traffic might need change anything sdp header sbcs change dialog identification information others might even change addressing information sbcs often used corporations along firewalls intrusion prevention systems ips enable voip calls protected enterprise network voip service providers use sbcs allow use voip protocols private networks internet connections using nat also implement strong security measures necessary maintain high quality service sbcs also replace function application-level gateways larger enterprises sbcs also used conjunction sip trunks provide call control make routing/policy decisions calls routed lan/wan often tremendous cost savings associated routing traffic internal ip networks enterprise rather routing calls traditional circuit-switched phone network additionally sbcs allow voip calls set two phones using different voip signaling protocols e.g. sip h.323 megaco/mgcp well performing transcoding media stream different codecs use sbcs also provide firewall features voip traffic denial service protection call filtering bandwidth management protocol normalization header manipulation also commonly provided sbcs enabling communication different vendors networks ip multimedia subsystem ims 3gpp 3rd generation partnership project architecture perspective sbc integration p-cscf ims-alg signaling plane ims access gateway media plane access side interconnect side sbc maps ibcf iwf signaling plane trgw transition gateway media plane ims/tispan architecture perspective sbc integration p-cscf c-bgf functions access side ibcf iwf thig i-bgf functions peering side sbcs decomposed meaning signaling functions located separate hardware platform media relay functions – words p-cscf separated c-bgf ibcf/iwf separated i-bgf functions physically standards-based protocol h.248 ia profile used signaling platform control media one sbcs use proprietary protocols infancy concept sbc controversial proponents end-to-end systems peer-to-peer networking controversy surrounding sbcs pertains whether call control remain solely two endpoints call service owners rather shared network elements owned organizations managing various networks involved connecting two call endpoints example call control remain alice bob two callers call control shared operators ip networks involved connecting alice bob voip phones together debate point vigorous almost religious nature wanted unfettered control endpoints also greatly frustrated various realities modern networks firewalls filtering/throttling side network operators typically concerned overall network performance interoperability quality want ensure secure sbc may provide session media usually rtp signaling often sip wiretap services used providers enforce requests lawful interception network sessions standards interception services provided atis tia cablelabs etsi among others according jonathan rosenberg author rfc 3261 sip numerous related rfcs dynamicsoft developed first working sbc conjunction aravox product never truly gained marketshare newport networks first ipo london stock exchange aim may 2004 nng cisco publicly traded since 1990 acme packet followed october 2006 floating nasdaq field narrowed acquisition nextone merged reefpoint becoming nextpoint subsequently acquired 2008 genband time emerged “ integrated ” sbc border control function integrated another edge device 2009 ingate systems ’ firewall became first sbc earn certification icsa labs milestone certifying voip security capabilities sbc continuing growth voip networks pushes sbcs edge mandating adaptation capacity complexity voip network grows traffic volume increases sessions passing sbc vendors addressing new scale requirements variety ways developed separate load balancing systems sit front sbc clusters others developed new architectures using latest generation chipsets offering higher performance sbcs scalability using service cards
[ 8640, 9381, 8998, 6951, 2376, 2409, 3081, 939, 9834, 7214, 7407, 3792, 6512, 5843, 4084, 1942, 3742, 10271 ]
Test
5,973
1
Nature_Research:nature research nature research formerly known nature publishing group division international scientific publishing company springer nature publishes academic journals magazines online databases services science medicine nature research flagship publication nature weekly multidisciplinary journal first published 1869 also publishes nature- titled research journals nature reviews journals since 2000 society-owned academic journals range open access journals including scientific reports nature communications springer nature also publishes scientific american 16 languages magazine intended general public 2013 prior merger springer creation springer nature nature publishing group owner holtzbrinck publishing group bought controlling stake frontiers springer nature formed 2015 nature research nature publishing group part macmillan science education fully owned subsidiary holtzbrinck publishing group nature research employs 800 people offices london new york city san francisco seoul washington d.c. boston tokyo paris berlin munich madrid hong kong shanghai delhi melbourne mexico city buenos aires são paulo basingstoke september 2016 nature research publishes 148 academic journals former nature clinical practice series rebranded folded nature reviews series april 2009 also publish npj nature partner journals series cases costs springer nature publications recovered via subscription individuals institutions 40 journals allow authors publish open access articles author institution research funder paying publication charge journal publisher also several open access journals authors also allowed post accepted unedited papers websites funding body archives earlier 6 months publication june 2010 letter outlining university california libraries pricing challenges npg distributed university faculty campus librarians support systemwide university committee library scholarly communication letter also described potential boycott dispute resolved august 2010 joint statement released stating two organizations agreed work together coming months address mutual short- long-term challenges including exploration potential new approaches evolving publishing models 2 december 2014 npg announced would make content nature journals available online free however articles presented using digital rights management system readcube funded macmillan subsidiary digital science provides read-only access allow readers download copy print otherwise distribute content additionally links articles generated nature subscribers group selected media outlets—but links publicly distributed online articles social networks afterwards providers also provide annotations linked articles move designed counter trend dark sharing leveraging readcube provide analytics considering compromise fully restricted access critics consider true open access scheme due restrictions use distribution 2011 nature launched first line electronic textbooks college market starting principles biology adopted california state university textbook line described vikram savkar senior vice president publishing director nature publishing group potentially breaking traditional textbook publishing model active nature research services include past experiments offering online services include
[ 5833, 743 ]
None
5,974
3
PlayStation_Broadband_Navigator:playstation broadband navigator playstation broadband navigator also referred bb navigator psbbn software japanese playstation 2 consoles formats hard disk drive use consoles provides interface manipulating data hard disk drive works official playstation 2 hdd units apparently playstation broadband navigator strict region lock normal playstation 2 software software boot ntsc-j systems model number ending 0 meaning sold japan making software unusable korean asian ntsc-j playstation 2 consoles playstation broadband navigator offers many features available original hdd utility disc software japanese releases take advantage features may even require specific version higher software sony computer entertainment america released hdd march 23 2004 hdd utility disc 1.01 bundled final fantasy xi consumers knew playstation broadband navigator confused n't included hdd utility disc scea response always playstation broadband navigator would released north america later date date appears never light scea switched manufacturing slim hdd-incompatible playstation 2 models stopping manufacture hdd units region sony computer entertainment europe sony computer entertainment australia never released hdd outside linux kit switching manufacturing slim playstation 2 model appears neither hdd utility disc playstation broadband navigator released regions broadband navigator used ps2 using modified var games require playstation broadband navigator either certain features work game work
[ 10316, 5215, 823 ]
Test
5,975
3
Read_(system_call):read system call modern posix compliant operating systems program needs access data file stored file system uses read system call file identified file descriptor normally obtained previous call open system call reads data bytes number specified caller file stores buffer supplied calling process read system call takes three arguments read system call interface standardized posix specification data file read calling read function value returned number bytes read zero indicates end file file position advanced number error number smaller number bytes requested may happen example fewer bytes actually available right maybe close end-of-file reading pipe terminal system call interrupted signal alternatively -1 returned error occurs case errno set appropriately left unspecified whether file position changes
[ 4616, 3082, 7188, 10785, 9762, 6180, 5158, 8242, 52, 4161, 8772, 6213, 8268, 589, 593, 6244, 5222, 10856, 4207, 9840, 5244, 4734, 11391, 7821, 4238, 10382, 2711, 6808, 9882, 6813, 1694, 2723, 1193, 8364, 10933, 5822, 5824, 1736, 2762, 635...
Test
5,976
3
Mac_OS_nanokernel:mac os nanokernel mac os nanokernel extremely simple operating system kernel serving basis powerpc based system software versions 7 9 classic mac os predating mac os x initial revision software extremely simple single tasking system delegates tasks emulator running motorola 68000 series 68k version operating system second major revision supports multitasking multiprocessing message passing would properly called microkernel unlike 68k-derived mac os kernel running within powerpc kernel exists protected memory space executes device drivers user mode nanokernel different copland os microkernel although created succession similar goals original nanokernel tightly integrated mac 68k emulator written emulation consultant gary davidian main purpose allow existing motorola 68k version operating system run new hardware normal state system running 68k code operating system little activated interrupt quickly mapped 68k equivalent within virtual machine tasks may include switching back powerpc mode necessary upon completion interrupt handler mapping macintosh virtual memory system powerpc hardware however software little documented might instead handled emulator running user mode nanokernel stored mac os rom chip integrated old world rom computers inside mac os rom file disk new world rom computers rather installed familiar sense progress 1994 demanded additional functionality forward-looking architecture introduced pci card drivers anticipation copland microkernel called nukernel supports memory protection open transport networking architecture introduced standardized powerpc synchronization primitives daystar digital genesis mp macintosh clone requires kernel extensions support multiprocessing evolution would later affect overhaul nanokernel mac os 8.6 mac os 8.6 nanokernel rewritten rené a. vega add multiprocessing services 2.0 support powermacinfo distributed multiprocessing sdk application displays statistics nanokernel operation
[ 7561, 1042, 7187, 10516, 11539, 6300, 5029, 7335, 2345, 11180, 7983, 11447, 5049, 10813, 576, 2761, 9931, 5457, 3324, 9176, 3167, 8551, 5864, 5363, 11123, 8700 ]
Test
5,977
9
Patrick_Cousot:patrick cousot patrick cousot born 3 december 1948 french computer scientist currently silver professor computer science courant institute mathematical sciences new york university usa professor école normale supérieure ens paris france école polytechnique palaiseau france university metz france research scientist french national center scientific research cnrs joseph fourier university grenoble france together wife radhia cousot 1947–2014 patrick cousot originator abstract interpretation influential technique formal methods 2000s worked practical methods static analysis critical embedded software astrée found avionics 1999 received cnrs silver medal 2006 great prize eads foundation 2001 bestowed honorary doctorate saarland university germany radhia cousot received acm sigplan programming languages achievement award 2013 ieee computer society harlan d. mills award 2014 “ invention ‘ abstract interpretation ’ development tool support practical application ” received humboldt research award 2008 2018 ieee john von neumann medal introducing abstract interpretation powerful framework automatically calculating program properties broad application verification optimisation knight chevalier ordre national du mérite ordre des palmes académiques member academia europaea informatics section since 2006 member board trustees imdea software institute
[ 7520, 11005, 1783 ]
Test
5,978
7
B.A.T.M.A.N.:b.a.t.m.a.n better approach mobile adhoc networking b.a.t.m.a.n routing protocol multi-hop mobile ad hoc networks development german freifunk community intended replace optimized link state routing protocol olsr b.a.t.m.a.n crucial point decentralization knowledge best route network — single node data technique eliminates need spread information concerning network changes every node network individual node saves information direction received data sends data accordingly data gets passed node node packets get individual dynamically created routes network collective intelligence created early 2007 b.a.t.m.a.n developers started experimenting idea routing layer 2 ethernet layer instead layer 3 differentiate layer 3 routing daemon suffix adv advanced chosen instead manipulating routing tables based information exchanged via udp/ip provides virtual network interface transparently transports ethernet packets batman-adv kernel module part official linux kernel since 2.6.38 b.a.t.m.a.n elements classical routing protocols detects b.a.t.m.a.n nodes finds best way route also keeps track new nodes informs neighbors existence static networks network administrators technicians decide computer reached via way cable radio networks undergo constant changes low participation-thresholds vital part freifunk -networks foundation task automated much possible regular basis every node sends broadcast thereby informing neighbors existence neighbors relay message neighbors carries information every node network order find best way certain node b.a.t.m.a.n counts originator-messages received logs neighbor message came like distance-vector protocols b.a.t.m.a.n try determine entire route using originator-messages packet first step right direction data handed next neighbor direction turn uses mechanism process repeated data reaches destination addition radio networks b.a.t.m.a.n also used common wired cable connections ethernet task create protocol easy small fast possible seemed therefore sensible split development several phases implement complex functions using iterative process first phase routing algorithm implemented tested practicality suitability task hand sending receiving originator-messages information existence udp port 1966 chosen version one algorithm made significant assumption soon node receives existence data another node assumes also send data back radio networks however may well one-way communication possible i.e. asymmetric links mechanism incorporated protocol allow solve arising problems mechanism enables node determine whether neighbouring node provides bidirectional communication bidirectional nodes considered part network one-way nodes longer fully included greatest innovation version b.a.t.m.a.n support multiple network devices computer router running b.a.t.m.a.n deployed central location like church another high building several wired wireless network interfaces attached deployed b.a.t.m.a.n relay network data one direction without retransmission delay certain unusual phenomena special circumstances could appear determination best route network tackled counteracted prevent circular routing prevent data reaching destination occurring node inform network provides access internet nodes use information evaluate whether connection internet close much bandwidth available either use specific gateway allow b.a.t.m.a.n determine gateway use based criteria connection speed announcing devices running b.a.t.m.a.n also included version usually method used connect home networks mesh-networks antenna installation roof connect wireless network b.a.t.m.a.n rest building simply announced thus also reachable version b.a.t.m.a.n shown exhibit high levels stability slightly slow convergence times real-world conditions confirmed theoretical analysis batman-experimental bmx aims approximate real exponent also sending ogms multiple times independent broadcast datagrams originated independent branch batman developed axel neumann extended version incorporates securely-entrusted multi-topology routing semtor called bmx7 2017 b.a.t.m.a.n written whiteboard hbo series silicon valley season 4 episode 2 show lead character richard hendricks appears include b.a.t.m.a.n component new internet concept text visible top-right whiteboard
[ 4611, 7812, 11399, 2825, 9098, 2829, 5397, 1814, 11413, 152, 2206, 8862, 2085, 3751, 3752, 686, 7983, 9279, 7232, 10433, 5959, 5322, 11086, 10451, 9048, 3036, 5472, 1761, 610, 2045 ]
Test
5,979
4
Lace_card:lace card lace card punched card holes punched also called whoopee card ventilator card flyswatter card ibm doily mainly used practical jokes cause unwanted disruption card readers card readers tended jam lace card inserted resulting card little structural strength avoid buckling inside mechanism card punches could also jam trying produce cards holes punched owing power-supply problems lace card fed reader card knife card saw flat tool used punched card readers card punches needed clear jam
[ 3872, 1801, 3323, 2423 ]
Test
5,980
3
Appendix_H:appendix h appendix h name infamous appendix pentium processor family developer manual volume 3 appendix contained reference documentation available legally binding nda ndaed documentation described various new features introduced pentium processor notably virtual mode extensions vme 4 mb paging vme confused later intel vt virtualization technology vme added additional feature existing virtual 8086 mode introduced 80386 processor included optimized handling delivery interrupts virtual machines appendix referenced official chapters documentation provoking irritation among public allowed access detailed descriptions started movement observers trying reverse-engineer information various ways notably robert collins writing dr. dobb journal christian ludloff owner sandpile.org website played major role
[ 5840, 6730 ]
None
5,981
4
Wazuh:wazuh wazuh free open-source host-based intrusion detection system hids performs log analysis integrity checking windows registry monitoring rootkit detection time-based alerting active response provides intrusion detection operating systems including linux openbsd freebsd os x solaris windows wazuh centralized cross-platform architecture allowing multiple systems monitored managed wazuh fork ossec
[ 5612, 6797, 7983, 823, 186, 2558, 9791 ]
Validation
5,982
2
HDOS:hdos hdos early microcomputer operating system originally written heathkit h8 computer system later also available heathkit h89 zenith z-89 computers author heath company employee gordon letwin later early employee microsoft lead architect os/2 hdos originally came limited set system software tools including assembler many commercial large set freeware programs hug heath user group became available eventually hdos 2.0 notable one first microcomputer operating systems use loadable device drivers achieve degree device independence extensibility device names followed rsx-11-style convention dkn first two letters device driver file name n number dk0 dk1 would handled dk.sys similarities rsx included use pip file transfer use eot file termination similar heath/zenith published complete schematics part lists computers company sold users source code hdos full source paper listing held yesterpc.org old computer museum item references heathkit part number hos-1-sl part number 595-2466
[ 2179, 9166, 7983, 3056, 6675, 477, 10590 ]
Test
5,983
1
Data_retrieval:data retrieval data retrieval means obtaining data database management system odbms case considered data represented structured way ambiguity data order retrieve desired data user present set criteria query database management system dbms software managing databases selects demanded data database retrieved data may stored file printed viewed screen query language structured query language sql used prepare queries sql american national standards institute ansi standardized query language developed specifically write database queries dbms may language relational reports queries two primary forms retrieved data database overlaps queries generally select relatively small portion database reports show larger amounts data queries also present data standard format usually display monitor whereas reports allow formatting output however like normally printed reports designed using report generator built dbms
[ 3556, 9286, 4797, 10471, 7229 ]
Test
5,984
1
Architectuul:architectuul architectuul online architecture catalog uses crowdsourcing build content founded 2010 team architects graphic designers software engineers content images uploaded site use creative commons license making process similar wikipedia architectuul buildings various era large range 20th century rare constructivist architecture architectuul utilised source several publications universities including wall street journal
[]
Validation
5,985
2
Single_user_mode:single user mode single user mode mode multiuser computer operating system boots single superuser mainly used maintenance multi-user environments network servers tasks may require exclusive access shared resources example running codice_1 network share mode also used security purposes network services run eliminating possibility outside interference systems lost superuser password changed switching single user mode asking password circumstances viewed security vulnerability unix-like operating systems provide single user mode functionality either system v-style runlevels bsd-style boot-loader options boot-time options run-level usually changed using codice_2 command runlevel 1 boot single user mode boot-loader options changed startup execution kernel freebsd dragonfly bsd changed rebooting system command codice_3 bootloader offers option bootup start single user mode solaris command codice_4 cause reboot single user mode macos users accomplish holding powering system user may required enter password set firmware os x el capitan later releases macos mode reversed single user mode command codice_5 terminal system fully rebooted single-user mode command codice_6 single user mode different safe mode boot system goes directly console instead starting core elements macos items codice_7 ignoring codice_8 codice_9 et al. users encouraged prompt run fsck command line utilities needed installed microsoft windows provides recovery console last known good configuration safe mode recently windows recovery environment standard recovery means also bootable bartpe-based third-party recovery discs available recovery console recovery discs different single user modes operating systems independent maintained operating system works like chrooting environment kernel linux
[ 866, 9540, 5256, 6797, 9709, 7983, 10896, 5106, 5397, 5500, 2811, 700, 2399 ]
Test