node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
5,986 | 4 | Cyber-collection:cyber-collection cyber-collection refers use cyber-warfare techniques order conduct espionage cyber-collection activities typically rely insertion malware targeted network computer order scan collect exfiltrate sensitive information cyber-collection started far back 1996 widespread deployment internet connectivity government corporate systems gained momentum since time numerous cases activity addition state sponsored examples cyber-collection also used organized crime identity e-banking theft corporate spies operation high roller used cyber-collection agents order collect pc smart-phone information used electronically raid bank accounts rocra aka red october collection system espionage hire operation organized criminals sell collected information highest bidder cyber-collection tools developed governments private interests nearly every computer smart-phone operating system tools known exist microsoft apple linux computers iphone android blackberry windows phones major manufacturers commercial off-the-shelf cots cyber collection technology include gamma group uk hacking team italy bespoke cyber-collection tool companies many offering cots packages zero-day exploits include endgame inc. netragard united states vupen france state intelligence agencies often teams develop cyber-collection tools stuxnet require constant source zero-day exploits order insert tools newly targeted systems specific technical details attack methods often sells six figure sums common functionality cyber-collection systems include several common ways infect access target cyber-collection agents usually installed payload delivery software constructed using zero-day attacks delivered via infected usb drives e-mail attachments malicious web sites state sponsored cyber-collections efforts used official operating system certificates place relying security vulnerabilities flame operation microsoft states microsoft certificate used impersonate windows update forged however experts believe may acquired humint efforts | [
7424,
3843,
5764,
10756,
1544,
5002,
9233,
8978,
150,
8726,
8478,
5024,
7348,
10935,
7893,
9688,
7515,
9440,
3555,
7652,
7527,
9460,
8574
] | Train |
5,987 | 1 | Ebean:ebean ebean object-relational mapping product written java designed simpler use understand jpa java persistence api jdo java data objects products ebean simpler api jpa achieves 'session less architecture ebean require jpa entitymanager jdo persistencemanager removes concepts detached/attached beans issues associated flushing/clearing 'session management entitymanagers adds make ebean api much easier learn understand use although ebean full orm features equivalent jpa also incorporated 'sql/relational features idea many development efforts require control exact sql calling stored procedures simply solved 'relational approaches ultimate goal ebean combine best orm features jpa best 'relational features products like mybatis single persistence framework ebean uses mapping jpa entity table onetomany etc annotations xml mapping entity beans compatible ebean jpa going beyond jpa ebean supports java generics fetching partial objects query object | [
4358,
3080,
910,
10526,
5031,
9896,
5677,
7983,
7475,
6074,
10683,
7485,
5567,
9665,
6860,
10573,
3920,
4960,
2658,
3560,
3561,
3562,
5612,
5872,
8825,
9078,
3705,
9467,
3710,
6143
] | Test |
5,988 | 2 | Fedora_Project:fedora project fedora project project sponsored red hat primarily co-ordinate development linux-based fedora operating system operating vision project creates world free culture welcoming widespread collaboration commonplace people control content devices project also oversees extra packages enterprise linux special interest group maintains eponymous packages project founded 2003 result merger red hat linux rhl fedora linux projects red hat employees make 35 project contributors 2,000 contributors unaffiliated members community fedora project founded red hat decided split red hat linux red hat enterprise linux rhel community-based operating system fedora red hat professional workstation created time intention filling niche rhl filled created without certain future option quickly fell wayside non-enterprise rhl users favor fedora first edition fedora operating system—then known fedora core 1—was released november 6 2003 fedora community continues thrive fedora distribution reputation foss distribution focuses innovation close work upstream linux communities project current vision statement new october 2010 board worked synthesize ideas many different parts community concise statement 2017 board project leader matthew miller began work drafting updated mission statement august 2008 several fedora servers compromised upon investigation found one compromised servers used signing fedora update packages fedora project stated attacker get package signing key could used introduce malicious software onto fedora users systems update process project administrators performed checks software find anything suggest trojan horse introduced software precaution project converted new package signing keys fedora published full details march 30 2009 fedora project separate legal entity organization red hat retains liability actions fedora council currently top-level community leadership governance body council composed mix representatives different areas project named roles appointed red hat variable number seats connected medium-term project goals previous governance structure fedora board comprised five red hat appointed members five community-elected members additionally fedora project leader veto power board decision current model voting members block issues valid reason red hat one point announced intentions create separate fedora foundation govern project consideration variety issues canceled favor board model currently place community also involved organizing lower levels leadership fedora engineering steering committee fesco mindshare committee responsible technical community oversight respectively community-elected bodies manage significant portions project project facilitates online communication among developers community members public mailing lists wiki pages also coordinates two main events known fedora users developers conference fudcon flock flock fedora fudcon free software event held different locations two designated regions latin america asia/pacific typically revolves around combination conferencing social events hackathon flock similar event replaced fudcon north america europe/the middle east task-specific flexibly scheduled events known fedora activity days also gather many project contributors together various regions | [
9353,
1553,
2974,
7983,
1075,
823,
9016,
10172,
10831,
10961,
11135,
8539,
5723,
10971,
4961,
5096,
4841,
9455,
4729,
11643,
6012,
3582,
4479
] | None |
5,989 | 2 | AsteroidOS:asteroidos asteroidos open source operating system designed smartwatches available firmware replacement android wear devices motto asteroidos project hack wrist asteroidos built like embedded linux distribution openembedded works top linux kernel systemd service manager asteroidos also includes various mobile linux middlewares originally developed mer nemo mobile lipstick mce user interface completely written qt5 framework applications coded qml graphic components coming qt quick qml-asteroid sdk cross-compilation toolchain integrated qt creator generated openembedded easier development asteroid-launcher wayland compositor customizable home screen managing applications watchfaces notifications quick settings asteroid-launcher runs top libhybris compatibility layer make use bionic gpu drivers asteroidos offers bluetooth low energy synchronization capabilities asteroid-btsyncd daemon running top bluez5 reference client named asteroidos sync available android users 1.0 release following applications shipped pre-installed default asteroidos | [
10658,
1603,
8262,
8326,
6508,
7983,
3248,
5397,
8122
] | Test |
5,990 | 2 | NUbuntu:nubuntu nubuntu network ubuntu project take existing ubuntu operating system livecd full installer remaster tools needed penetration testing servers networks main idea keep ubuntu ease use mix popular penetration testing tools besides usage network server testing nubuntu made desktop distribution advanced linux users nubuntu uses light window manager fluxbox includes used security programs linux wireshark nmap dsniff ettercap april 4 2010 official website closed explanation list previous current releases | [
8837,
7435,
10127,
2321,
4500,
5397,
3478,
4887,
10394,
8476,
673,
3745,
5410,
10530,
6393,
9253,
10149,
11305,
7854,
7983,
8112,
2738,
2739,
4790,
823,
439,
56,
59,
10860,
3903,
10687,
4673,
3654,
2375,
4039,
842,
5962,
8907,
1107,
1110,... | Test |
5,991 | 5 | Internet_Protocol_Control_Protocol:internet protocol control protocol computer networking internet protocol control protocol ipcp network control protocol ncp establishing configuring internet protocol point-to-point protocol link ipcp responsible configuring ip addresses well enabling disabling ip protocol modules ends point-to-point link ipcp uses packet exchange mechanism link control protocol ipcp packets may exchanged ppp reached network-layer protocol phase ipcp packets received phase reached silently discarded ipcp ncp protocol code number 0x8021 two endpoints ppp connection must send ipcp configure request peer tcp/ip options independent direction ppp connection ppp endpoint request specific ip address peer also ask peer suggest ip address requesting address 0.0.0.0 peer sends suggestion ipcp nak packet first peer must subsequently request order complete negotiation practice protocols like pppoe commonly used home broadband connections latter method request suggestion nak suggestion request suggested address used set ip address isp client endpoint i.e customer-premises equipment former method request address used inform client isp endpoint ip provider edge equipment similar ncp ipv6 control protocol exists ipv6 used together ipcp ppp connection dual stack link interfacing newer older equipment n't support ipv6 one sees lcp protrej messages protocol 0x8057 side n't support ipv6cp configuration done link able carry ip data payload ppp frame code indicates ip data carried ipcp header code 8 bits. br specifies function performed identifier 8 bits used match requests replies length 16 bits. br size packet including header data variable length. br zero bytes data indicated length field may contain one options ipcp configuration options allow negotiatiation desirable internet protocol parameters ipcp uses configuration option format defined lcp link control protocol separate set options ipcp configuration options option 8 bits length 8 bits data variable length microsoft implementation common ipcp options include ip address ip addresses dns netbios name servers | [
5472,
4609,
5991,
8432,
1618,
2996,
6649,
5470
] | Validation |
5,992 | 2 | Marc_Rochkind:marc rochkind marc j. rochkind invented source code control system working bell labs well wrote advanced unix programming founded xvt software inc | [
7666,
515,
2132,
8991
] | None |
5,993 | 9 | LispMe:lispme lispme interpreter scheme programming language developed fred bayer palm os pdas free software released gnu general public license reasonably close standard scheme fully r5rs compliant scheme source programs stored palm os memopad format scheme sessions stored palm os pdb database files interrupted restarted support palm os user interface primitives lispme also provides database support lispme sessions given starter icon appears applications menu enabling session run palm pilot application product ended development august 2008 fairly complete quite robust | [
9714,
10083,
8262,
7983
] | Validation |
5,994 | 7 | CISPE_-_Cloud_Infrastructure_Services_Providers_in_Europe:cispe cloud infrastructure services providers europe cispe cloud infrastructure services providers europe trade association gathering infrastructure service iaas cloud providers express views european scale cispe non profit organisation registered belgium declared european union transparency register 041495920038-44 association started since iaas players difficulties make business model understood policy makers association aims advocate eu wide cloud first public procurement policy engage european digital single market including promotion high level security data protection rules/standards well avoiding vendor lock-in although association formally registered early 2017 operating since 2015 order help iaas providers customers reach compliance coming eu general data protection regulation gdpr enter force 25 may 2018 cispe released cispe data protection code conduct top required compliance meet gdpr code also ensures iaas customers may choose data located processed exclusively europe supplier re-use customer data compliance declared cisps/iaas providers service service cispe code conduct launched 27 september 2016 european parliament first 30 services declared first cisps/iaas providers 14 february 2017 announcements received large press coverage across europe including le monde infodsi el pais la repubblica silicon cloud magazine computer sweden tom hardware l'informaticien global security mag eu observer politico computer weekly iapp il corriere della sicurezza lemagit bloomberg tv itr manager heise.de cor.com zdnet eleconomista.es channel europapress 01net register cio dive many others members supportive organizations manage operations 15 european countries including france germany italy ireland uk finland sweden netherlands spain bulgaria poland switzerland companies members cispe and/or supporting code conduct includes arsys art automation aruba aws bit dada daticum dominion enter fasthosts fjordit gigas hetzner online home host europe group ids ikoula leaseweb lomaco netalia netcetera outscale ovh seeweb serverplan solidhost upcloud vtx xxl webhosting 1 1 internet cispe non profit association belgian law general assembly elects within members board less 10 members composition board directors time take account composition rules majority board composed european headquartered companies majority board composed small mid caps eur 1b turnover represent least 3 different eu countries considering worldwide hq location first chairman board alban schmutz general secretary named board first general secretary francisco mingorance board also names code conduct task force cispe cctf charge working evolution improvements cispe data protection code conduct organization open member operating least one iaas service one european country engaging declare least one service cispe code conduct within 6 months | [
4429,
9901
] | Test |
5,995 | 3 | Balloon_Fight:balloon fight player controls unnamed balloon fighter two balloons attached helmet repeatedly pressing button holding b button causes balloon fighter flap arms rise air balloon popped player flotation decreased making harder rise life lost balloons popped enemy balloon fighters player falls water gets eaten large piranha near surface water hit lightning two modes play 1-player/2-player game goal clear screen enemies balloon trip goal avoid obstacles side-scrolling stage original arcade game include balloon trip level layouts completely different take advantage vertical scrolling addition minor gameplay differences defeat enemies screen clear stage mode played alone co-operatively second player player starts three extra lives 3ds balloon fight port comes download play option allows play along friend another 3ds system enemy balloon fighters float around screen player must hit balloons defeat enemy also fall water eaten fish flying close water surface enemy defeated falls water bubble rise screen hit extra points play progresses stages number enemies platforms increases every three stages bonus stage goal burst balloons float screen chimneys bottom single-player game goal avoid lightning sparks collect balloons aiming move ranks compete high score player starts one life home nintendo entertainment system version ported nec pc-8801 october 1985 sharp x1 november 1985 game boy advance balloon fight-e e-reader united states september 16 2002 part famicom mini series japan may 21 2004 also played animal crossing gamecube nintendo released game watch version name based nes version balloon trip mode protagonist balloon man unlike balloon fighters balloon men use rocket suits instead flapping hands elevate holding balloons sequel balloon fight called balloon kid released october 1990 north america january 31 1991 europe game boy expands game roots revamped full platforming adventure title released japan game boy colorized versions titled hello kitty world published character soft famicom balloon fight gb game boy color later released japan september 2001 game ported sharp zaurus series pdas balloon fighter flipper trophies obtainable super smash bros. melee flipper also usable item replacing bumper previous game balloon fighter considered playable role development super smash bros. melee ice climbers chosen instead original background music balloon trip balloon fight heard melee icicle mountain stage alternate music giant fish makes cameo appearance super smash bros. brawl appears ice climber-based stage summit tries attack players sea addition remixed version main theme titled balloon trip available summit stage well stickers balloon fighter balloon fight enemy collected brawl addition villager animal crossing series uses balloon fighter helmet one special moves super smash bros. nintendo 3ds wii u 3ds version game stage based balloon fight appears original 8-bit graphics stage returns super smash bros ultimate balloon fighter appears spirit said game warioware inc. series 9-volt games based balloon fight also minigame functioning three-dimensional version balloon trip players use wii remote microgame version also use nunchuk complete 3d balloon trip original tech demo yoshi touch go called yoshi balloon trip balloon fight theme touch mode tetris ds although mode almost nothing game music decorative graphics april 12 2007 club nintendo released tingle balloon fight nintendo ds exclusive game featuring tingle nintendo character originated legend zelda series game remake home version featuring balloon fight balloon trip modes levels expanded slightly utilize screens similar arcade game except based entirely around nes levels gallery contained concept art also included piece could unlocked completing specific in-game tasks balloon fighter appears super mario maker unlockable mystery mushroom costume part update balloon fight re-released part nintendo virtual console june 8 2007 balloon fight released europe followed release north america july 16 2007 japan november 12 2007 game released virtual console nintendo 3ds part system ambassador program september 2011 nintendo land attraction called balloon trip breeze similar balloon trip original balloon fight game released wii u virtual console service january 23 2013 north america february 23 2013 part promotion celebrating 30th anniversary release original nintendo famicom balloon fight became first wii u virtual console title released november 11 2016 game alongside 29 games included nes classic edition nintendo classic mini europe nes version balloon fight re-released one launch titles nintendo switch online september 18 2018 | [
1776,
7281,
10855
] | Test |
5,996 | 8 | WS-Context:ws-context ws-context web services specification developed oasis organization part ws-caf suite purpose provide means reference shared context relates set interactions web services termed activity context provides details application-specific execution environment services typically included header soap message contexts may passed value reference case retrieved using context manager service context service described allows management activities means begin complete operations create destroy context respectively | [
7878,
489,
4979,
10486,
119
] | Test |
5,997 | 9 | Refal:refal refal recursive functions algorithmic language functional programming language oriented toward symbolic computations including string processing language translation artificial intelligence one oldest members family first conceived 1966 theoretical tool first implementation appearing 1968 refal intended combine mathematical simplicity practicality writing large sophisticated programs one first functional programming languages unlike lisp time refal based pattern matching pattern matching works conjunction term rewriting basic data structure lisp prolog linear list built cons operation sequential manner thus n access list n th element refal lists built scanned ends pattern matching working nested lists well top-level one effect basic data structure refal tree rather list gives freedom convenience creating data structures using mathematically simple control mechanisms pattern matching substitution refal also includes feature called freezer support efficient partial evaluation refal applied processing transformation tree structures similarly xslt refal hello world example shown program includes two functions named go hello function written name function followed function body curly braces go function marked entry point program using entry directive one could think expressions function bodies function calls lisp-like syntax example hello function appears call built-in prout function string 'hello world argument meaning mechanism call however quite different illustrate difference consider following function determines whether string palindrome example shows function complex body consisting four sentences clauses sentence begins pattern followed equal sign followed general expression right hand side sentence terminated semicolon example pattern second sentence function s.1 expression true example shows patterns include pattern variables form character identifying type variable variable matches followed variable identifier variables begin match single symbol begin e match arbitrary expression variable identifier arbitrary alphanumeric sequence optionally separated type identifier dot function executes comparing argument patterns sentences order appear definition first pattern matches function replaces argument expression right hand side matched sentence result function application includes subexpression angle brackets third sentence example applied result processed refal invoking function identified first symbol brackets execution stops result angle brackets expand way function pal thus read informally expression empty replace true otherwise expression single symbol replace true otherwise expression symbol followed arbitrary expression e.2 followed symbol replace expression pal e.2 words throw away two identical symbols beginning end recurse otherwise replace expression false pattern e.1 always matches following three step-by-step execution traces annotated sentence numbers applied step produce next see hello world example fact executes sequence following expression transformations fact 0 1 0 matches 0 number produces 1 symbol number multiply result fact s.n 1 note prefix style operators fact s.n loop s.n 1 seen s.n acts loop counter equal function defined given two terms terms first clause matches produces true else second clause matches produces false important property refal functions refal single argument may decomposed terms expression defining control structures easy e1 evaluated expression entered matches 'true e1 else e2 e2 squeeze first clause matches whenever function squeeze encounters double blanks input expression replaces single blank second clause matches first one returns resultant value current expression squeeze | [
9345,
4101,
8262,
6502,
11625,
8430,
502,
10616
] | Validation |
5,998 | 2 | Nokia_E90_Communicator:nokia e90 communicator nokia e90 communicator 3g smartphone nokia fifth generation communicator also part eseries announced 11 february 2007 3gsm show barcelona succeeded nokia 9500 communicator unlike predecessors e90 runs s60 platform symbian os 3rd edition feature pack 1 v9.2 respectively previous communicators meanwhile based either geos symbian-based series 80 move common s60 good software compatibility get rid exclusive series 80 ui behaviours e90 also first communicator umts/hsdpa connectivity integrated gps features osgi ercp eclipse rcp embedded systems first nokia e90 unit sold auction jakarta indonesia 17 may 2007 rp 45,000,000 5,000 us indonesia one largest market share nokia communicator series cited reason unit first launch location early user-feedback reviews highlighted defect microphone communicator nokia initially denied existence defect nokia europe later acknowledged q3 earnings report released 18 october 2007 stated issue fully resolved replacement qwerty-ridden interface series 80 s60 software designed used one thumb criticised people communicator firmware version 7.40.1.2 released late october 2007 added support a-gps improved gps performance version also upgraded maps application communicator recent firmware version 400.34.93 free navigation program ovi maps also available communicator currently without free navigation | [
1537,
8577,
3205,
11655,
9359,
1424,
529,
2449,
8083,
10770,
5143,
2072,
7063,
5274,
5019,
5659,
669,
8472,
11545,
2208,
4003,
4132,
6310,
167,
40,
3626,
5290,
10410,
10802,
7220,
821,
5175,
7866,
1083,
1728,
7617,
4291,
7877,
10053,
199,... | Test |
5,999 | 3 | NonStop_SQL:nonstop sql nonstop sql commercial relational database management system designed fault tolerance scalability currently offered hewlett packard enterprise latest version sql/mx 3.4 product originally developed tandem computers tandem acquired compaq 1997 compaq later acquired hewlett packard 2002 hewlett packard split 2015 hp inc. hewlett packard enterprise nonstop sql rest nonstop product line went hewlett packard enterprise product primarily used online transaction processing tailored organizations need high availability scalability database system typical users product stock exchanges telecommunications pos bank atm networks nonstop sql designed run effectively parallel computers adding functionality distributed data distributed execution distributed transactions first released 1987 second version 1989 added ability run queries parallel product became fairly famous one systems scales almost linearly number processors machine adding second cpu existing nonstop sql server almost exactly doubled performance second version added /mp name massively parallel third version nonstop sql/mx attempt tandem computers create product ansi sql compliant predecessor nonstop sql/mx shipped nonstop platform since 2002 access tables created nonstop sql/mp although native sql/mx tables offer ansi compliance many oracle-like enhancements hp neoview business intelligence platform built using nonstop sql origins nonstop sql/mx hp oltp database product parts neoview code base open-sourced 2014 name trafodion top-level apache project | [
8229,
1638,
1606,
8282,
9677,
10286,
10413,
4817,
10389,
9782,
7802,
6780
] | Test |
6,000 | 4 | Internet_police:internet police internet police generic term police government agencies departments organizations charge policing internet number countries major purposes internet police depending state fighting cybercrime well censorship propaganda several attempts made introduce tools would allow law enforcement security agencies eavesdrop online communications without warrant latest bill c-30 tabled february 2012 abandoned strong public opposition computer emergency response team estonia cert estonia established 2006 organization responsible management security incidents .ee computer networks task assist estonian internet users implementation preventive measures order reduce possible damage security incidents help responding security threats cert estonia deals security incidents occur estonian networks started notified citizens institutions either estonia abroad cyber crime investigation cell wing mumbai police india deal computer crimes enforce provisions india information technology law namely information technology act 2000 various cyber crime related provisions criminal laws including indian penal code companies act india subsection it-sector responsibilities corporate measures protect cybersecurity cyber crime investigation cell part crime branch criminal investigation department mumbai police andhra pradesh cyber crime investigation cell wing hyderabad police india deal cyber crimes indian computer emergency response team cert-in also deals cyber security cyber police hi-tech crime enquire cell kerala police dutch police reported set internet brigade fight cybercrime allowed infiltrate internet newsgroups discussion forums intelligence gathering make pseudo-purchase provide services reported 2005 departments provincial municipal governments mainland china began creating teams internet commentators propaganda police departments offering classes marxism propaganda techniques internet reported guide discussion public bulletin boards away politically sensitive topics posting opinions anonymously false names chinese internet police also erase anti-communist comments posts pro-government messages chinese communist party leader hu jintao declared party intent strengthen administration online environment maintain initiative online opinion 2006 coup thailand thai police active monitoring silencing dissidents online censorship internet carried ministry information communications technology thailand royal thai police collaboration communications authority thailand telecommunication authority thailand 29 april 2010 wipas raksakulthai arrested charges lèse majesté following post facebook account criticizing king bhumibol may 2011 amnesty international named prisoner conscience internet watch foundation iwf recognised organisation united kingdom operating internet 'hotline public professionals report exposure potentially illegal content online works partnership police government public internet service providers wider online industry | [
1169,
9233,
5531,
1692,
1317,
1070,
11695,
10417,
9909,
4797,
10303,
2887,
10446,
4945,
4435,
5472,
615,
1650,
7541,
119
] | Test |
6,001 | 3 | List_of_Qualcomm_Snapdragon_systems-on-chip:list qualcomm snapdragon systems-on-chip list qualcomm snapdragon chips snapdragon family mobile system chip soc made qualcomm use smartphones tablets watches smartbook devices three types snapdragon s4 s4 play s4 plus s4 pro launched 2012 snapdragon s4 prime mpq8064 processor announced part snapdragon 600 series snapdragon 208 snapdragon 210 announced september 9 2014 snapdragon 212 announced july 28 2015 qualcomm 205 mobile platform formally falls mobile platform brand practically snapdragon 208 x5 lte modem announced march 20 2017 qualcomm 215 announced july 9 2019 snapdragon 410 announced december 9 2013 qualcomm first 64-bit mobile system chip snapdragon 412 announced july 28 2015 snapdragon 415 older snapdragon 425 later cancelled announced february 18 2015 snapdragon 425 427 430 435 pin software compatible software compatible snapdragon 429 439 450 625 626 632 snapdragon 430 announced september 15 2015 new snapdragon 425 snapdragon 435 announced february 11 2016 snapdragon 427 announced october 18 2016 snapdragon 450 announced june 28 2017 pin software compatible snapdragon 625 626 632 software compatible snapdragon 425 427 429 430 435 439 snapdragon 429 439 announced june 26 2018 snapdragon 429 439 pin software compatibility software compatible snapdragon 425 427 430 435 450 625 626 632 snapdragon 600 announced january 8 2013 snapdragon 610 snapdragon 615 announced february 24 2014 snapdragon 615 qualcomm first octa-core soc snapdragon 616 announced july 31 2015 snapdragon 617 announced september 15 2015 snapdragon 625 announced february 11 2016 snapdragon 626 announced october 18 2016 snapdragon 625 626 632 450 pin software compatible software compatible snapdragon 425 427 429 430 435 439 snapdragon 618 snapdragon 620 announced february 18 2015 since renamed snapdragon 650 snapdragon 652 respectively snapdragon 653 announced october 18 2016 snapdragon 630 636 660 pin software compatible snapdragon 630 snapdragon 660 announced may 9 2017 snapdragon 636 announced october 17 2017 snapdragon 632 announced june 26 2018 pin software compatible snapdragon 625 626 450 software compatible snapdragon 425 427 429 430 435 439 snapdragon 670 announced august 8 2018 pin software compatible snapdragon 710 snapdragon 675 announced october 22 2018 snapdragon 665 announced april 9 2019 february 27 2018 qualcomm introduces new snapdragon 700 mobile platform series snapdragon 710 announced may 23 2018 pin software compatible snapdragon 670 snapdragon 712 announced february 6 2019 snapdragon 730 730g announced april 9 2019 snapdragon 802 chip 8092 use smart tvs formerly announced qualcomm later confirmed released demand processors market smaller anticipated snapdragon 800 announced january 8 2013 snapdragon 801 announced february 24 2014. notable features snapdragon 805 announced november 20 2013 snapdragon 808 810 announced april 7 2014 snapdragon 808 notable features predecessor 805 snapdragon 810 notable features lower end 808 snapdragon 820 announced mobile world congress march 2015 first phones featuring soc released early 2016 snapdragon 821 announced july 2016 821 provides 10 improvement performance 820 due faster clocked cpu otherwise similar features qualcomm stating 821 designed complement rather replace 820. notable features predecessor snapdragon 808 810 snapdragon 835 announced november 17 2016 snapdragon 835 mobile compute platform windows 10 pcs announced december 5 2017. notable features predecessor 821 snapdragon 845 announced december 7 2017 snapdragon 845 notable features snapdragon 850 mobile compute platform windows 10 pcs announced june 4 2018 essentially over-clocked version snapdragon 845 snapdragon 855 announced december 5 2018 snapdragon 855 qualcomm first 7 nm finfet chipset notable features predecessor 845 snapdragon 8cx compute platform windows 10 pcs announced december 6 2018. notable features 855 snapdragon 855+ announced july 15 2019 different video codecs supported snapdragon socs decode e encode fhd fullhd 1080p 1920x1080px hd 720p 1366x768px 1280x720px different video codecs supported snapdragon 200 series different video codecs supported snapdragon 400 series different video codecs supported snapdragon 600 series different video codecs supported snapdragon 700 series different video codecs supported snapdragon 800 series qualcomm snapdragon wear 2100 processor designed smartwatches available connected 4g/lte 3g tethered bluetooth wi-fi versions lg watch style uses processor snapdragon wear 2500 announced june 26 2018 snapdragon wear 3100 announced september 10 2018 snapdragon 602a application motor industry announced january 6 2014 snapdragon 820a announced january 6 2016 snapdragon 410e embedded snapdragon 600e embedded announced september 28 2016 snapdragon 800 embedded snapdragon 810 embedded snapdragon 820e embedded announced february 21 2018 qualcomm vision intelligence platform announced april 11 2018 qualcomm vision intelligence platform purpose built bring powerful visual computing edge computing machine learning wide range iot devices qualcomm smart audio platform apq8009 apq8017 announced june 14 2017 qualcomm 212 home hub apq8009 qualcomm 624 home hub apq8053 announced january 9 2018 qcs400 series announced march 19 2019 may 2018 qualcomm announced snapdragon xr1 platform first purpose-built soc augmented reality virtual reality mixed reality qualcomm also announced htc vive pico meta vuzix would announcing consumer products featuring xr1 end 2018 following qualcomm acquisition csr 2015 qualcomm designs ultra-low-power bluetooth socs csr qca qcc brands wireless headphones earbuds qualcomm worked amazon google reference designs help manufactures develop headsets support alexa google assistant google fast pair qualcomm announced qcc5100 series ces 2018 | [
4609,
3586,
7170,
8720,
11282,
9235,
11289,
1057,
38,
4139,
8237,
9774,
2097,
8250,
1083,
8253,
7745,
7235,
7747,
2635,
1121,
99,
8812,
11374,
10361,
638,
644,
9863,
8842,
146,
659,
1170,
7833,
666,
5786,
7835,
4258,
4773,
9913,
8383,
1... | Validation |
6,002 | 8 | Clean_URL:clean url clean urls also sometimes referred restful urls user-friendly urls search engine-friendly urls uniform resource locators urls intended improve usability accessibility website web service immediately intuitively meaningful non-expert users url schemes tend reflect conceptual structure collection information decouple user interface server internal representation information reasons using clean urls include search engine optimization seo conforming representational state transfer rest style software architecture ensuring individual web resources remain consistently url makes world wide web stable useful system allows durable reliable bookmarking web resources clean urls also contain implementation details underlying web application carries benefit reducing difficulty changing implementation resource later date example many urls include filename server-side script underlying implementation resource changed urls would need change along likewise urls clean site database moved restructured potential cause broken links internally external sites latter lead removal search engine listings use clean urls presents consistent location resources user-agents regardless internal structure potential benefit use clean urls concealment internal server application information improve security system url often comprise path script name query string query string parameters dictate content show page frequently include information opaque irrelevant users—such internal numeric identifiers values database illegibly-encoded data session ids implementation details clean urls contrast contain path resource hierarchy reflects logical structure users easily interpret manipulate implementation clean urls involves url mapping via pattern matching transparent rewriting techniques usually takes place server side clean url often form seen user search engine optimization purposes web developers often take opportunity include relevant keywords url remove irrelevant words common words removed include articles conjunctions descriptive keywords added increase user-friendliness improve search engine rankings fragment identifier included end clean url references within page need user-readable systems define slug part url identifies page human-readable keywords usually end part url interpreted name resource similar basename filename title page name based use word slug news media indicate short name given article internal use slugs typically generated automatically page title also entered altered manually page title remains designed display human readability slug may optimized brevity consumption search engines long page titles may also truncated keep final url reasonable length slugs may entirely lowercase accented characters replaced letters english alphabet whitespace characters replaced dash underscore avoid encoded punctuation marks generally removed also remove short common words conjunctions example original title outré collection would generated slug | [
2945,
10020,
5641,
7370,
10506,
10579,
5012,
2901,
119,
2936,
7673,
1723,
5724,
2558,
8639
] | Validation |
6,003 | 3 | Disk_array:disk array disk array disk storage system contains multiple disk drives differentiated disk enclosure array cache memory advanced functionality like raid virtualization components typical disk array include typically disk array provides increased availability resiliency maintainability using additional redundant components controllers power supplies fans etc often point single points failure spofs eliminated design additionally disk array components often hot-swappable typically disk arrays divided categories primary vendors storage systems include coraid inc. datadirect networks dell emc fujitsu hewlett packard enterprise hitachi data systems huawei ibm infortrend netapp oracle corporation panasas pure storage companies often act oem vendors market storage components manufacture | [
1675,
1049,
2339,
7715,
3366,
1450,
11179,
2870,
9277,
10302,
10303,
8900,
9285,
1990,
1993,
7881,
9677,
2383,
4438,
7802,
3042,
1891,
10340,
1638,
2421,
4598,
3450,
3323,
6014,
9343
] | Train |
6,004 | 3 | SpursEngine:spursengine spursengine microprocessor toshiba built media oriented coprocessor designed 3d- video processing consumer electronics set-top boxes computers spursengine processor also known quad core hd processor announced 20 september 2007 spursengine stream processor powered four synergistic processing elements spe also used cell processor featured sony playstation 3 processing elements fed chip h.264 mpeg-2 codecs controlled die host cpu connected chip pcie controller contrast cell processor chip cpu ppe similar work enable smoother interaction host spursengine toshiba also integrated simple proprietary 32-bit control core spursengine employs dedicated xdr dram working memory spursengine designed work much lower frequencies cell toshiba also optimized circuit layout spes reduce size 30 resulting chip consumes 10-20 w power spursengine accessible developer device driver developed windows linux systems software supporting spursengine limited primarily realm video editing encoding first generation spursengine processors specified follows april 2008 toshiba shipped samples spursengine se1000 device pcie-based reference board toshiba included spursengine processors qosmio laptops models f50 g50 g55 third quarter 2008 | [
9472,
643,
11657,
6797,
6415,
9126,
6311,
306,
7218,
823,
6072,
8120,
1985,
10749,
3025,
6738,
342,
1115,
4060,
859,
3677,
9445,
8937,
10985,
4587,
508,
2293,
1784,
3323,
6268,
6909
] | Validation |
6,005 | 4 | Kenneth_Minihan:kenneth minihan kenneth a. minihan born december 31 1943 former united states air force lieutenant general served director national security agency defense intelligence agency retiring may 1 1999 minihan born pampa texas entered united states air force 1966 distinguished graduate reserve officer training corps program florida state university also member phi kappa psi served senior intelligence officer air force senior staff officer positions pentagon headquarters tactical air command langley air force base virginia electronic security command kelly air force base texas defense intelligence agency washington d.c. national security agency fort george g. meade maryland commanded squadrons groups major air command united states overseas assistant chief staff intelligence headquarters united states air force washington d.c. director defense intelligence agency retiring united states air force minihan served president security affairs support association 1999 2002 currently serves managing director paladin capital group | [
6017,
8726,
8478,
1189,
9517,
1838,
5308,
1986,
7107,
6343,
6344,
11335,
7119,
7759,
7887,
3154,
8276,
7893,
991,
7137,
3305,
7145,
2419,
6136,
766
] | Test |
6,006 | 3 | Weitek:weitek weitek corporation american chip-design company originally focused floating-point units number commercial cpu designs early mid-1980s weitek designs could found powering number high-end designs parallel-processing supercomputers early 1990s cpu designs started including fpus built system basically “ free ” weitek made series attempts break general cpu graphics driver market 1995 company almost dead late 1996 remains purchased rockwell semiconductor systems quickly disappeared weitek started 1981 several intel engineers left form company weitek developed math coprocessors several systems including based motorola 68000 family 1064 intel-based i286 systems 1067 intel fpu design i386 fell far behind development weitek delivered 1167 later upgrades design led 2167 3167 4167 weitek would later deliver similar fpus mips architecture known xl line weitek fpus several differences compared x87 offerings lacking extended double precision register-file rather stack-based model orders increased supercomputer applications weitek found seriously disadvantaged fab becoming rather “ outdated ” hp approached deal use newer fabs proved advantageous soon hp ’ fabs open anyone weitek also worked hp design latest pa-risc design sold version known risc 8200 sold embedded design use laser printers late 1980s weitek saw new opportunity started developing frame buffers sun microsystems workstations early 1990s also introduced sparc power µp “ power-up ” technically referred wtl 8601 pin-compatible version sparc processor µp could dropped existing sparcstation 2 sparcstation ipx workstations ran 80 mhz double clock speed cpus replaced 8701 ran twice fast internally providing boost 50–60 overall speed due bus getting faster however pursue concept later generations sparc processors weitek turned frame-buffer experience pc market early 90s introduced series svga multimedia chipsets known “ power ” systems consisting two chips one drawing graphics known p9000 another handling output videopower 5x86 power series used number third-party designs based vesa local bus standard p9001 moved pci became fairly popular 1994 known viper designs diamond orchid final generation p9100 combined p9001 5286 single chip weitek adapters fairly successful early days 486 market fell use less expensive systems introduced host new players mid-1990s weitek attempted re-enter low-end market w464 486 w564 p5 systems used host machine ram frame buffer lower costs one reasons company purchased rockwell shortly shipped | [
9665,
7234,
9955,
10051,
1480,
5384,
11627,
9422,
2895,
1776,
6256,
6415,
499,
8944,
1461,
1399,
5498
] | Test |
6,007 | 8 | Web_Services_Flow_Language:web services flow language web services flow language 1.0 wsfl xml programming language proposed ibm 2001 describing web services compositions language considered two types compositions first type describing business processes collection web services second describing interactions partners wsfl proposed layered top web services description language 2003 ibm microsoft combined wsfl xlang bpel4ws submitted oasis standardization oasis published bpel4ws ws-bpel properly fit naming ws-* standards web services endpoint language wsel xml format proposed used description non-operational characteristics service endpoints quality-of-service cost security properties format proposed part report published web service flow language never gained wide acceptance | [
10020,
2501,
8070,
8262,
4979,
3323,
9629,
479
] | Train |
6,008 | 9 | MIIS_(programming_language):miis programming language miis meditech interpretive information system mumps-like programming language created a.neil pappalardo curt w. marble dec pdp mass general hospital 1964 1968 mumps evolution took two major directions mumps proper miis mumps became ansi iso-standard language many mumps implementations standardized compatible miis standardize became proprietary system instead example differences mumps miis value logical expression mumps may false zero 0 true non-zero canonically one 1 miis value false empty string value true string consisting ascii delete character code 127 decimal also philosophical difference dialects miis often takes approach code march along regardless possible errors mumps error prevent serious problems example encountering undefined variable mumps generates error miis treats nil 1980s brigham women hospital massachusetts used miis program data general mainframe 1986 scamc reported vancouver general hospital also integrated cardiology patient management system written miis miis language used programming library systems well health industry systems oclc library system one example also used create financial systems insurance brokers seen ireland uk late 1970s | [
7076,
8262
] | Validation |
6,009 | 3 | Vivante_Corporation:vivante corporation vivante corporation fabless semiconductor company headquartered sunnyvale california r center shanghai china company founded 2004 giquila focused portable gaming market company first product directx-compatible graphics processing unit gpu capable playing pc games 2007 giquila changed name vivante changed direction company focus design licensing embedded graphics processing unit designs company licensing mobile visual reality semiconductor solution providers serve embedded computing markets mobile gaming high-definition home entertainment image processing automotive display entertainment vivante named contributor hsa heterogeneous system architecture foundation 2015 verisilicon holdings co. ltd. acquired vivante corporation all-stock transaction since changing directions vivante developed range gpu cores compliant opengl es 1.1 2.0 standards well openvg standard created verisilicon support vulkan api 1.0 openvx 1.0 provided least 6 major desktop embedded operating systems 2d graphics products vector gpus summarized vendor term composition processing cores cpc sometimes mentioned feature single pass composition blending capability 8 higher gc300 gc320 gc350 gp355 openvg core additional listing gc200 gc420 nxp mentions gc255 presentation i.mx models nxp i.mx8 series come 2 units gc7000lite gc7000 vector processor 3d graphics products please see table legend notes listing announced 2009 least fifteen licensees used gpus twenty embedded designs application processors using vivante gpu technology vivante sold verisilicon arcturus gc8000 series released verisilicon supports newer technologies opencl 2.0 openvx 1.1 openvg 1.1 opengl es 3.2 opengl 4.0 vulkan 1.0 plans writing new drm/kms driver kernel driver vivante hardware since vivante previously put linux kernel component gnu general public license gpl instead maintaining proprietary blob free gallium3d-style device driver codice_1 surpassed vivante proprietary user-space driver benchmarks supports vivante product line gc400 series gc800 series gc1000 series gc2000 series gc3000 series gc4000 series | [
1377,
7745,
7747,
644,
2788,
10658,
10945,
2635,
6705,
9042,
11282,
2838,
3511,
7833,
9851,
4124,
10971,
2943
] | None |
6,010 | 7 | Powtoon:powtoon powtoon company sells cloud-based software saas creating animated presentations animated explainer videos powtoon founded january 2012 following 180k seed round investment december 2011 company released beta version august 2012 seen fast subscriber growth since december 2012 powtoon secured 600,000 investment los angeles-based venture capital firm startup minds february 2013 powtoon introduced free account option allowing users create animated videos exported youtube free videos include powtoon branding powtoon web-based animation software allows users create animated presentations manipulating pre-created objects imported images provided music user-created voice-overs powtoon uses apache flex engine generate xml file played powtoon online viewer exported youtube downloaded mp4 file powtoon also available google chrome store application edmodo.com | [
467
] | Test |
6,011 | 3 | The_Tower_of_Cabin:tower cabin tower cabin unusual spinoff fantasy role-playing video game series called japanese developer microcabin tower cabin released microcabin decided discontinue development msx tower cabin also ported nec pc9801 game player plays new microcabin employee wander microcabin headquarters building japan goal work various lead programmers developers making company successful similar japanese game known segagaga dreamcast player runs entire sega company president sega corporation game featured many characters xak series latok fray pixie two unlockable mini-games tower cabin short fighting game pixie fray text adventure called crusader took place within xak universe game setting takes place microcabin office building japan player descends ascends various floors throughout building carrying various business related tasks besides main character player several miscellaneous npc player talk order proceed game addition characters microcabin games make cameo appearance game played traveling office building various departments relaying information employees completing various business related tasks order ensure success microcabin company | [
145,
10339,
4181,
10534
] | Test |
6,012 | 2 | List_of_tools_to_create_Live_USB_systems:list tools create live usb systems list utilities creating live usb multiboot means tool allows multiple systems usb stick well bootloader usb flash drive choose system load boot time | [
7938,
5123,
3079,
5895,
7431,
8076,
4637,
9377,
6436,
5930,
7983,
4145,
4929,
10306,
4309,
6371,
5988,
7914,
2930,
5618,
1150
] | Test |
6,013 | 4 | ARP_spoofing:arp spoofing computer networking arp spoofing arp cache poisoning arp poison routing technique attacker sends spoofed address resolution protocol arp messages onto local area network generally aim associate attacker mac address ip address another host default gateway causing traffic meant ip address sent attacker instead arp spoofing may allow attacker intercept data frames network modify traffic stop traffic often attack used opening attacks denial service man middle session hijacking attacks attack used networks use arp requires attacker direct access local network segment attacked address resolution protocol arp widely used communications protocol resolving internet layer addresses link layer addresses internet protocol ip datagram sent one host another local area network destination ip address must resolved mac address transmission via data link layer another host ip address known mac address needed broadcast packet sent local network packet known arp request destination machine ip arp request responds arp reply contains mac address ip arp stateless protocol network hosts automatically cache arp replies receive regardless whether network hosts requested even arp entries yet expired overwritten new arp reply packet received method arp protocol host authenticate peer packet originated behavior vulnerability allows arp spoofing occur basic principle behind arp spoofing exploit lack authentication arp protocol sending spoofed arp messages onto lan arp spoofing attacks run compromised host lan attacker machine connected directly target lan generally goal attack associate attacker host mac address ip address target host traffic meant target host sent attacker host attacker may choose inspect packets spying forwarding traffic actual default destination avoid discovery modify data forwarding man-in-the-middle attack launch denial-of-service attack causing packets network dropped simplest form certification use static read-only entries critical services arp cache host ip address-to-mac address mappings local arp cache may statically entered hosts n't need transmit arp requests entries exist static entries provide security spoofing result maintenance efforts address mappings systems network must generated distributed scale large network since mapping set pair machines resulting n n arp entries configured n machines present machine must arp entry every machine network n-1 arp entries n machines software detects arp spoofing generally relies form certification cross-checking arp responses uncertified arp responses blocked techniques may integrated dhcp server dynamic static ip addresses certified capability may implemented individual hosts may integrated ethernet switches network equipment existence multiple ip addresses associated single mac address may indicate arp spoof attack although legitimate uses configuration passive approach device listens arp replies network sends notification via email arp entry changes antiarp also provides windows-based spoofing prevention kernel level arpstar linux module kernel 2.6 linksys routers drops invalid packets violate mapping contains option repoison/heal virtualized environment kvm also provides security mechanism prevent mac spoofing guest running host additionally ethernet adapters provides mac vlan anti-spoofing features openbsd watches passively hosts impersonating local host notifies case attempt overwrite permanent entry operating systems react differently linux ignores unsolicited replies hand uses responses requests machines update cache solaris accepts updates entries timeout microsoft windows behavior arp cache configured several registry entries hkey_local_machine\system\currentcontrolset\services\tcpip\parameters arpcachelife arpcacheminreferencelife arpuseethersnap arptrsingleroute arpalwayssourceroute arpretrycount techniques used arp spoofing also used implement redundancy network services example software allows backup server issue gratuitous arp request order take defective server transparently offer redundancy arp spoofing often used developers debug ip traffic two hosts switch use host host b communicating ethernet switch traffic would normally invisible third monitoring host m. developer configures mac address b b mac address also configures forward packets monitor traffic exactly man-in-the-middle attack tools used carry arp spoofing attacks | [
7426,
2947,
138,
10005,
6295,
10905,
3486,
2339,
939,
2996,
6456,
5561,
7865,
5437,
8641,
3395,
4163,
4689,
4307,
87,
7895,
4953,
5472,
9440,
10343,
2409,
10092,
5486,
367,
7411,
4085,
8439,
2430,
4863
] | Test |
6,014 | 3 | Disk_array_controller:disk array controller disk array controller device manages physical disk drives presents computer logical units almost always implements hardware raid thus sometimes referred raid controller also often provides additional disk cache disk array controller name often improperly shortened disk controller two confused provide different functionality disk array controller provides front-end interfaces back-end interfaces single controller may use different protocols back-end front-end communication many enterprise controllers use fc front-end sata back-end modern enterprise architecture disk array controllers sometimes also called storage processors sps parts physically independent enclosures disk arrays placed storage area network san network-attached storage nas servers external disk arrays usually purchased integrated subsystem raid controllers disk drives power supplies management software controllers provide advanced functionality various vendors name differently simple disk array controller may fit inside computer either pci expansion card built onto motherboard controller usually provides host bus adapter hba functionality save physical space hence sometimes called raid adapter hardware raid controllers available long time always required expensive scsi hard drives aimed server high-end computing market scsi technology advantages include allowing 15 devices one bus independent data transfers hot-swapping much higher mtbf around 1997 introduction atapi-4 thus ultra-dma-mode 0 enabled fast data-transfers less cpu utilization first ata raid controllers introduced pci expansion cards raid systems made way consumer market users wanted fault-tolerance raid without investing expensive scsi drives ata drives make possible build raid systems lower cost scsi ata raid controllers lack dedicated buffer high-performance xor hardware parity calculation result ata raid performs relatively poorly compared scsi raid controllers additionally data safety suffers battery backup finish writes interrupted power outage hardware raid controllers present assembled raid volumes operating systems n't strictly required implement complete configuration assembly controller often basic features implemented open-source software driver extended features provided binary blobs directly hardware manufacturer normally raid controllers fully configured card bios operating system booted operating system booted proprietary configuration utilities available manufacturer controller exact feature set controller may specific manufacturer product unlike network interface controllers ethernet usually configured serviced entirely common operating system paradigms like ifconfig unix without need third-party tools manufacturer raid controller usually provides proprietary software tooling operating system deem support ensuring vendor lock-in contributing reliability issues example freebsd order access configuration adaptec raid controllers users required enable linux compatibility layer use linux tooling adaptec potentially compromising stability reliability security setup especially taking long term view mind however greatly depends controller whether appropriate hardware documentation available order write driver controllers open-source versions configuration utilities example codice_1 codice_2 available freebsd since freebsd 8.0 2009 well codice_3/codice_4 since 2015 supporting respective device drivers latter fact contributing code bloat operating systems implemented generic frameworks interfacing raid controller provide tools monitoring raid volume status well facilitation drive identification led blinking alarm management hot spare disk designations within operating system without reboot card bios example approach taken openbsd 2005 bio 4 pseudo-device driver bioctl utility provide volume status allow led/alarm/hotspare control well sensors including drive sensor health monitoring approach subsequently adopted extended netbsd 2007 well bioctl feature set intentionally kept minimum controller supported tool way initial configuration controller meant performed card bios initial configuration day-to-day monitoring repair possible unified generic tools bioctl set accomplish | [
2051,
1049,
2339,
11179,
7983,
2870,
7863,
8379,
1990,
1993,
9677,
3450,
4438,
1891,
1637,
1515,
7151,
6003,
5492,
2421,
10102,
7802,
9343
] | None |
6,015 | 1 | DBEdit:dbedit dbedit 2 database editor connect oracle db2 mysql database provides jdbc driver runs windows linux solaris dbedit free open source software distributed gnu general public license source code hosted sourceforge dbedit developed jef van den ouweland first windows version released january 2006 used edit oracle db2 database written java later generic jdbc support added application could connect basically type database provides jdbc driver one year first release support operating systems linux solaris added last version dbedit released may 2012 | [
10340,
9286,
5677,
7022,
6797,
7983,
10413,
823,
9177,
7100
] | Test |
6,016 | 9 | Red_(programming_language):red programming language red computer programming language red made overcome limitations programming language rebol introduced 2011 nenad rakocevic red imperative functional programming language syntax general usage overlaps interpreted rebol language introduced 1997 implementation choices red intend create full stack programming language red used extremely high-level programming dsls guis well low-level programming operating systems device drivers key approach language two parts red/system red red seeks remain independent toolchain code generation therefore possible cross-compile red programs platform supports via command-line switch red red/system distributed open-source software modified bsd license runtime library distributed permissive boost software license version 0.6.4 red includes garbage collector simple gc red introduced netherlands february 2011 rebol boron conference author nenad rakocevic september 2011 red programming language presented larger audience software freedom day 2011 rakocevic long-time rebol developer known creator cheyenne http server red syntax semantics close rebol like rebol strongly supports metaprogramming domain-specific languages dsls therefore highly efficient tool dialecting creating embedded dsls red includes dialect called red/system c-level language provides system programming facilities red easy integrate tools languages dll libred lightweight around 1 mb also able cross-compile various platforms see cross compilation section create packages platforms require e.g. .apk android red also includes fully reactive cross-platform gui system based underlying reactive dataflow engine 2d drawing dialect comparable svg compile-time runtime macro support 40 standard datatypes following list red goals presented software freedom day 2011 red development planned done two phases red currently supports following cross-compilation targets important intended syntax examples red 64-bit support integer example overflow 32-bit integer quickly changing float go farther merely show syntax language following factorial example red following factorial example red/system simple case source code similar red version | [
2304,
9345,
3462,
8582,
9224,
2186,
6797,
8973,
5521,
10387,
1435,
9245,
7326,
8479,
8609,
3876,
4777,
5677,
7983,
9780,
823,
1849,
6074,
6718,
8644,
8262,
9926,
5833,
8524,
9166,
7889,
11219,
11221,
2519,
477,
225,
6502,
10470,
8554,
996... | None |
6,017 | 4 | John_Michael_McConnell:john michael mcconnell john michael mcconnell born july 26 1943 former vice admiral united states navy naval career served director national security agency 1992 1996 civilian career includes serving united states director national intelligence 20 february 2007 27 january 2009 bush administration seven days obama administration currently vice chairman booz allen hamilton mcconnell born grew greenville south carolina mcconnell received commission united states navy 1967 worked intelligence officer j2 chairman joint chiefs staff united states secretary defense operation desert shield/storm dissolution soviet union developed improving information flow among intelligence agencies combat forces gulf war 1992 1996 mcconnell served director national security agency nsa led nsa adapted multi-polar threats brought end cold war leadership nsa routinely provided global intelligence information security services white house cabinet officials united states congress broad array military civilian intelligence customers also served member director central intelligence senior leadership team address major intelligence programmatic substantive issues 1992 1996 1996 mcconnell retired navy vice admiral 29 years service – 26 career intelligence officer addition many nation highest military awards meritorious service holds nation highest award service intelligence community also served chairman intelligence national security alliance mcconnell second person hold position director national intelligence nominated president george w. bush january 5 2007 sworn bolling air force base washington d.c. february 20 2007 mcconnell appointment post initially greeted broad bipartisan support although since attracted criticism advocating bush administration controversial policies nomination dni mcconnell served senior vice president consulting firm booz allen hamilton focusing intelligence national security areas 2005 confirmation dni 2007 also chairman board intelligence national security alliance premier not-for-profit nonpartisan private sector professional organization providing structure interactive forum thought leadership sharing ideas networking within intelligence national security communities whose members include leaders industry government academia tuesday august 14 2007 mcconnell visited texas house intelligence committee chairman silvestre reyes review border security granted wide-ranging interview el paso times newspaper surprised many intelligence community candor sensitive topics recent changes foreign intelligence surveillance act nsa warrantless surveillance controversy end interview mcconnell cautioned reporter chris roberts consider whether enemies u.s. could gain information shared leaving paper decide publish el paso times put entire unexpurgated interview website august 22 executive editor dionicio flores saying n't believe damaged national security endangered people resurgent taliban back charge parts afghanistan mcconnell told cnn february 27 2008 assessment differed one made january 2008 defense secretary robert gates january 24 2009 announced mcconnell would return booz allen senior vice president two months taking office mcconnell created series initiatives designed build foundation increased cooperation reform u.s. intelligence community ic plan dubbed 100 day plan integration collaboration focused efforts enable ic act unified enterprise collaborative manner focused six enterprise integration priorities 100 day plan accomplished launch civilian joint duty program improved security clearance processing times increased diversity intelligence workforce information sharing across community 500 day plan designed sustain momentum expanded set initiatives greater level participation set deepen integration community people processes technologies plan address new performance management framework entail six performance elements agencies must entail 100 day plan meant jump start series initiatives based deliberate planning process specific deadlines measures ensure needed reforms implemented 500 day plan started august 2007 designed accelerate sustain momentum expanded set initiatives broader ic participation contains 10 core initiatives tracked senior leadership intelligence community 33 enabling initiatives initiatives based six focus areas described 100 day plan top initiatives director mcconnell ended office near 400th day 500-day plan mcconnell approached congress early august 2007 need modernize fisa claiming two changes needed initial efforts began april – see factsheet first intelligence community required technology changes since 1978 obtain court orders effectively collect foreign intelligence foreign targets located overseas also argued telecoms sued violating nation wiretapping laws must protected liability—regardless veracity charges shortly thereafter mcconnell took active role capitol hill legislation drafted congress august 3 mcconnell announced strongly oppose house proposal n't strong enough heated debate congress updated fisa passing protect america act 2007 september 10 2007 testimony senate committee homeland security governmental affairs mcconnell asserted recently passed protect america act 2007 eased restrictions fisa helped foil major terror plot germany u.s. intelligence-community officials questioned accuracy mcconnell testimony urged office correct statement issued september 12 2007 critics cited incident example bush administration exaggerated claims contradictory statements surveillance activities counterterrorism officials familiar background mcconnell testimony said believe made inaccurate statements intentionally part strategy administration persuade congress make new eavesdropping law permanent officials said believed mcconnell gave wrong answer overwhelmed information merely mixed facts testimony mcconnell blamed death kidnapped american soldier iraq requirements fisa slowness courts however timeline later released showed delays mostly inside nsa casting doubt mcconnell truthfulness mcconnell speaking congressional panel defense protect america act said russian chinese foreign intelligence services nearly active cold war september 18 2007 testimony house judiciary committee mcconnell addressed nsa warrantless surveillance controversy saying agency conducted telephone surveillance americans without obtaining warrant advance since became director national intelligence february 2007 mcconnell called fisa foundational law important legacy protecting rights americans passed era watergate aftermath church pike investigations stressed changes honor legacy privacy foreign threats july 2008 director mcconnell issued directive icd 205 analysts build relationships outside experts topics concern intelligence community—a recommendation highlighted wmd commission report director mcconnell worked white house overhaul executive order 12333 outlines fundamental guidance intelligence agencies mcconnell believes update necessary incorporate intelligence community ’ new organizations new technologies methods redo expected help sixteen intelligence agencies work together reflect post 9/11 threat environment july 2008 president bush issued executive order 13470 amended 12333 one mcconnell last acts dni signed icd501 discovery dissemination retrieval information within intelligence community dramatically increase access several databases held various agencies community policy establishes rules govern disputes access granted dni final adjudicator resolve disputes organizations also established intelligence information integration program i2p leadership then-cio patrick gorman nsa-cio dr. prescott winter goal i2p create shared infrastructure family shared services means increase information access sharing collaboration throughout us intelligence community mcconnell led effort create integrated planning programming budgeting system fully integrate optimize capabilities intelligence community previously agency budget developed independently aggregated congress issuance icd106 strategic enterprise management ic sem intelligence community budget closely aligned strategic goals objectives requirements performance criteria icd 106 replaced icd 116 2011 early april 2010 admiral mcconnell called expanding powers dni giving tenure creating department intelligence dni oversee fully control settle continued fighting amongst agencies within various departments | [
8726,
1189,
3495,
9517,
1838,
5308,
1986,
6343,
6344,
11335,
7119,
7759,
7887,
3154,
8276,
7893,
9688,
991,
10207,
7137,
2405,
3305,
7145,
2419,
6005,
6136,
766
] | Test |
6,018 | 7 | SAP_Converged_Cloud:sap converged cloud sap converged cloud private managed cloud developed marketed sap set cloud computing services offers managed private cloud based openstack technology-based public cloud used sap organization internal resources create mix different cloud computing environments made openstack services offers compute storage platform services accessible sap 2012 sap promoted aspects cloud computing october 2012 sap announced platform service offering called sap cloud platform may 2013 managed private cloud offering called s/4hana enterprise cloud service announced sap converged cloud announced january 2015 sap converged cloud managed sap business unit established 2015 named converged cloud unit headed markus riedinger unit manager converged cloud beta went live may 2017 included openstack technology-based storage compute network components shared new services made sap later designate dns service added well 2017 year sap charged superior cloud innovation customers sizes sap s/4hana cloud sap ariba sap successfactors sap cloud applications customers access complete portfolio cloud-based solutions support digital transformation journeys june 7 2017 sap announced company plans invest 1 billion cloud next two years business organizations want use cloud computing choice using private cloud cloud infrastructure run specifically single organization built third-party public cloud whereby service provider makes available applications storage resources general public decision use based number factors whether company operates highly regulated sector pharmaceuticals industry must comply rules regarding control security data business must bring services market quickly web applications developer first would opt private cloud security peace mind web developer would choose public cloud offering companies would operate mixture two also known hybrid cloud delivery employing hybrid delivery cloud strategy lets organizations use different cloud delivery services specific applications instance public cloud may cost-effective service compute-intensive task processing analytics data would remain local private comply regulations hybrid delivery strategy lets organizations run applications services across different clouds collocation data centers example benefit delivery mechanism organizations move app one geographic location another major storms different types hybrid clouds specific tasks infrastructure service iaas model hybrid cloud could use operating systems virtualization technologies public private cloud infrastructure provide cloud services models mix on-premises cloud public cloud technologies include platform service paas includes infrastructure services combined development tools middleware software service saas used develop packaged software however moving data cloud difficult procedure case software service saas difficult particularly incumbent cloud provider used proprietary software altered open source application way mitigate cloud migration difficulties architect applications cloud reduce eliminate dependencies cloud application stack capabilities cloud service provider another way select generic higher-level applications move cloud first place another method select open standards cloud computing best practice avoiding cloud migration problems use management platform support applications environment user organization likely use described using best-of-breed approach companies engage cloud professional services consultants help plan incorporate cloud services business operations consultants advise businesses whether use public private hybrid delivery model implement consume delivery models example cloud professional services consultants might recommend businesses interested cost savings place appropriate applications public cloud keep higher-security application private cloud hybrid cloud 2013 competitive vendor analysis report international data corporation market research firm authors state cloud professional services help companies map short-term long-term strategy use cloud way aids business goals common reason businesses engage cloud professional services assistance incorporating cloud technology existing environments plan implement cloud according study published february 2014 independent research firm technology business research inc according published reports use cloud professional services indicates businesses adequate internal resources knowledgeable implementing cloud sap converged cloud follows premise converged infrastructure integration compute storage networking components technologies self-provisioning pools shared resources supported services one benefits data center based converged infrastructure including converged infrastructure data center delivers cloud services manual tasks automated thus reducing time cost carry sap converged cloud supporting vmware hypervisors supports multiple operating systems microsoft red hat ubuntu etc supports wide range development environments based openstack technology means compatible public cloud platforms based openstack technology rackspace nebula sap converged cloud consultants work sap users help configure best cloud approach users receive advice implement cloud consistent manner get value cloud investment users also receive advice manage cloud sap cloud marketing—delivers information possible uses cloud services solutions identifies opportunities begin implementing cloud sap converged cloud includes security features businesses connect private cloud on-site network using software-defined networking technology multiple copies virtual lan vlan supplied providing method businesses connect firewall on-site network converged cloud appearing part on-site network backup service load balancing using f5 networks allows service load balancing across virtual servers cloud storage data stored off-site file systems server operating systems sap retains local backups postgresql swift containers 30 days user organizations choose 50gb 100gb one-terabyte blocks storage area network san storage server nodes high-availability clustering added instances microsoft windows server red hat enterprise linux suse linux enterprise server sap converged cloud service solution sap hana private service developed sap sap hana in-memory database migration services businesses want move sap hana platform system designed enable businesses analyze big data november 2016 sap opened walldorf first data centers host converged cloud according published reports data centers provide disaster recovery services high availability | [
1801,
6153,
4236,
10893,
911,
1935,
4623,
8592,
2965,
2328,
4377,
8986,
9762,
6307,
8998,
5159,
9766,
6444,
7983,
8495,
3121,
823,
7352,
5178,
2496,
4289,
1224,
8520,
3660,
4429,
7248,
1362,
467,
9682,
11221,
11097,
5210,
8539,
6367,
4194... | Train |
6,019 | 4 | Cyber_resilience:cyber resilience cyber resilience refers entity ability continuously deliver intended outcome despite adverse cyber events cyber resilience evolving perspective rapidly gaining recognition concept essentially brings areas information security business continuity organizational resilience together entities potential need cyber resilience abilities include limited systems critical infrastructure business processes organizations societies nation-states adverse cyber events negatively impact availability integrity confidentiality networked systems associated information services events may intentional e.g cyber attack unintentional e.g failed software update caused humans nature combination thereof objective cyber resilience maintain entity ability deliver intended outcome continuously times means even regular delivery mechanisms failed crisis security breach concept also includes ability restore regular delivery mechanisms events well ability continuously change modify delivery mechanisms needed face new risks backups disaster recovery operations part process restoring delivery mechanisms resilience defined presidential policy directive ppd-21 ability prepare adapt changing conditions withstand recover rapidly disruptions cyber resilience focuses preventative detective reactive controls information technology environment assess gaps drive enhancements overall security posture entity cyber resilience review crr one framework assessment entity resiliency created department homeland security another framework created symantec based 5 pillars prepare/identify protect detect respond recover national institute standards technology special publication 800-160 volume 2 offers framework engineering secure reliable systems—treating adverse cyber events resiliency security issues particular 800-160 identifies fourteen techniques used improve resiliency cyber security consists technologies processes measures designed protect systems networks data cyber crimes effective cyber security reduces risk cyber attack protects entities organisations individuals deliberate exploitation systems networks technologies cyber resilience looks wider scope comprises cyber security business resilience cyber security effective without compromising usability systems robust continuity business plan resume operations cyber attack successful cyber resilience helps businesses recognize hackers advantage innovative tools element surprise target successful attempt concept helps business prepare prevent respond successfully recover intended secure state cultural shift organization sees security full-time job embedded security best practices day-to-day operations comparison cyber security cyber resilience requires business think differently agile handling attacks | [
8640,
9184,
9569,
3366,
6514,
3897,
5373
] | None |
6,020 | 3 | Computer_compatibility:computer compatibility family computer models said compatible certain software runs one models also run models family computer models may differ performance reliability characteristic differences may affect outcome running software software compatibility refer compatibility particular software running particular cpu architecture intel powerpc software compatibility also refer ability software run particular operating system rarely compiled software compatible multiple different cpu architectures normally application compiled different cpu architectures operating systems allow compatible different system interpreted software hand normally run many different cpu architectures operating systems interpreter available architecture operating system software incompatibility occurs many times new software released newer version operating system incompatible older version operating system may miss features functionality software depends hardware compatibility refer compatibility computer hardware components particular cpu architecture bus motherboard operating system hardware compatible may always run highest stated performance nevertheless work legacy components example ram chips run lower sometimes higher clock rate rated hardware designed one operating system may work another device kernel drivers unavailable example much hardware mac os x proprietary hardware drivers unavailable use operating systems linux | [
2948,
5389,
11157,
10142,
10916,
3238,
7983,
823,
3386,
4682,
3923,
2903,
1501,
6502,
5612,
7151,
9714,
3194,
8700
] | Test |
6,021 | 2 | Device_driver_synthesis_and_verification:device driver synthesis verification device drivers programs allow software higher-level computer programs interact hardware device software components act link devices operating systems communicating systems executing commands provide abstraction layer software also mediate communication operating system kernel devices usually operating systems comes support common device drivers usually hardware vendors provide device driver hardware devices platforms aggressive scaling hardware devices complex software components made device driver development process cumbersome complex size functionality drivers started increasing device drivers became key factor defining reliability system created incentive towards automatic synthesis verification device drivers article sheds light approaches synthesis verification device drivers device drivers principal failing component systems berkeley open infrastructure network computing boinc project found os crashes predominantly caused poorly written device driver code windows xp drivers account 85 reported failures linux kernel 2.4.1 device driver code accounts 70 code size driver fault crash whole system running kernel mode findings resulted various methodologies techniques verification device drivers alternative develop techniques synthesize device drivers robustly less human interaction development process proper specification device operating systems lead reliable drivers motivation driver synthesis large number flavors operating systems device combinations set input/output control specifications makes support hardware devices operating systems difficult ability use device operating system requires availability corresponding device driver combination hardware vendors usually supply drivers windows linux mac os due high development porting costs technical support difficulties unable provide drivers platforms automated synthesis technique help vendors providing drivers support devices operating system two challenges limit testing device drivers wave verification device drivers initiated microsoft slam project early year 2000 motivation project 500,000 crashes reported day found caused one video driver leading concern great vulnerability using complex device drivers details found speech delivered bill gates large number static runtime techniques since proposed bug detection isolation static analysis means analyzing program check whether complies safety-critical properties specified example system software conform rules check user permissions writing kernel data structures n't reference null pointer without check prohibit overflowing buffer size etc checks made without actually executing code checked using traditional testing process dynamic execution requires writing many test cases exercise paths drive system error states process take long time effort practical solution another theoretically possible approach manual inspection impractical modern systems millions lines code involved making logic complex analyzed humans rules straightforward mapping source code checked using compiler rule violations found checking source operation make sense example rules like enabling interrupt disabled checked looking order function calls source code type system specify rules semantics compilers catch errors kind many type-safe languages allow memory safety violations resulting unsafe type casting detected compiler another approach use meta-level compilation mc metacompilers constructed purpose may extend compilers lightweight system specific checkers optimizers extensions need written system implementers high level language dynamically linked compilers strict static analysis software model checking algorithmic analysis programs prove properties executions automates reasoning program behavior respect given correct specifications model checking symbolic execution used verify safety-critical properties device drivers input model checker program temporal safety properties output proof program correct demonstration exists violation specification means counterexample form specific execution path tool sdv static driver verifier microsoft uses static analysis windows device drivers back end analysis engine slam used model checking symbolic execution compile time static verification rules observed drivers api specified c like language slic specification language interface checking analysis engine finds paths lead violations api usage rules presented source level error paths driver source code internally abstracts c code boolean program set predicates rules observed program uses symbolic model checking validate predicates boolean program model checker blast berkeley lazy abstraction software verification tool used find memory safety incorrect locking errors linux kernel code uses abstraction algorithm called lazy abstraction build model driver c code successful verifying temporal safety properties c programs 50k lines code also used determine change source code affects proof property previous version demonstrated windows device driver avinux another tool facilitates automatic analysis linux device drives built top bounded model checker cbmc exist fault localization methods find bug location model checking tools return long counter example trace hard find exact faulty location dynamic program analysis performed running program sufficient test inputs produce interesting behaviors safe drive low overhead system detecting recovering type safety violations device drivers 4 changes source code linux network drivers able implement safedrive give better protection recovery linux kernel similar project using hardware isolate device drivers main kernel nook place device drivers separate hardware protection domain called nooks separate permission setting pages making sure driver modify pages domain read kernel data since share address space another similar work area automatic recovery operating systems due driver faults minix 3 operating system isolate major faults defects detected failing components replaced fly alternative verification isolation faults deploy techniques device driver development process make robust given device specification operating system functions one method synthesize device driver device helps reduce human introduced errors well cost time involved developing system software synthesis methods rely form specification hardware device manufacturers operating system functions hardware operating code usually low level prone errors code development engineer rely hardware documentation typically contains imprecise inaccurate information several interface definition languages idl express hardware functionalities modern oses uses idls glue components hide heterogeneity like remote procedural call idl applies hardware functionalities well section discuss writing device drivers domain specific languages helps abstract low level coding use specific compilers generate code devil allows high level definition communication device hardware components expressed i/o ports memory-mapped registers specifications converted set c macros called driver code thus eliminates error induced programmer writing low level functions ndl enhancement devil describing driver terms operational interface uses devil interface definition syntax includes set register definitions protocols accessing registers collection device functions device functions translated series operations interface device driver generation one first write driver functionalities interface specification languages use compiler generate low level driver code hail hardware access interface language another domain-specific device driver specification language driver developer needs write following hail compiler takes inputs translates specification c code hardware software co-design designer specifies structure behavior system using finite state machines communicate among series testing simulation formal verification done state machines deciding components go hardware software hardware usually done field programmable gate arrays fpgas application specific integrated circuits asics whereas software part translated low-level programming language approach mostly applies embedded systems defined collection programmable parts interact continuously environment sensors existing techniques intended generating simple micro-controllers drivers standalone synthesis device system software done separately device modeled using hardware description language hdl software developer access hdl specifications hardware developers put forth device interface data sheet device data sheet driver developer extracts register memory layout device behavioral model form finite state machines expressed domain specific languages described interface language section final step involves generating code specifications tool termite takes three specifications generate driver given specifications termite generate driver implementation translates valid sequence os request sequence device commands due formal specification interfaces termite generate driver code holds safety liveness properties another interesting hacking effort done revnic generates driver state machine reverse engineering existing driver create inter-portable safe drivers new platforms reverse engineer driver wiretaps hardware i/o operations executing driver using symbolic concrete executions output wiretap fed synthesizer reconstructs control flow graph original driver multiple traces along boilerplate template corresponding device class using methods researchers ported windows drivers network interfaces linux embedded operating systems many static analysis tools widely used many driver synthesis verification tools seen widespread acceptance practice one reasons drivers tend support multiple devices driver synthesis work usually generates one driver per device supported potentially lead large number drivers another reason drivers also processing state machine model drivers depict processing various verification synthesis techniques surveyed article advantages disadvantages example runtime fault isolation performance overhead whereas static analysis cover classes errors complete automation device driver synthesis still early stages promising future research direction progress facilitated many languages available today interface specification eventually consolidate single format supported universally device vendors operating systems teams payoff standardization effort could realization completely automated synthesis reliable device drivers future | [
6403,
5415,
7983,
823,
4572
] | None |
6,022 | 6 | StuffIt_Expander:stuffit expander stuffit expander proprietary freeware closed source decompression software utility developed allume systems subsidiary smith micro software formerly known aladdin systems runs classic mac os macos microsoft windows prior 2011 linux version also available download latest version mac platform follows stuffit target criticism dissatisfaction mac users past file format changes frequently notably introduction stuffit version 5.0 expander 5.0 contained many bugs file format readable earlier version 4.5 leaving mac users time without viable compression utility latest stand-alone version windows 2009 13.0 unlike version 12.0 able decompress newer .sitx zip archives version 2009 claims able decompress 30 formats listed executables require .net v2.0 framework msvc 2008 9.0 runtimes previous stand-alone version able decompress .sit classic mac os-specific archives 7.02 distributed stuffit v7.0.x windows versions 7.5.x 11 expander capabilities actually performed stuffit standard edition allowed decompression even end trial period start stuffit expander mode following command line switches used -expand -uiexpander note registration reminder dialogue box shown case older versions stuffit expander classic mac os platform stuffit expander 3.5 possible enhance capabilities stuffit expander add support decompressing additional archive formats means shareware dropstuff expander enhancer software aladdin systems also command line dos application called unstuff v1.1 allows decompression .sit files stuffit expander 2009 decompresses files following formats | [
10121,
1420,
6797,
1940,
3222,
9880,
11171,
3114,
3371,
10027,
3629,
7983,
823,
6713,
576,
2755,
11076,
1352,
4296,
10317,
10575,
4561,
722,
2389,
11614,
1631,
3296,
9953,
5858,
6759,
6377,
7529,
4459,
237,
1646,
7667,
3573,
6389,
4089,
8... | Test |
6,023 | 2 | IOS_8:ios 8 ios 8 eighth major release ios mobile operating system developed apple inc. successor ios 7 announced company worldwide developers conference june 2 2014 released september 17 2014 succeeded ios 9 september 16 2015. ios 8 incorporated significant changes operating system introduced continuity cross-platform mac iphone ipad system enables communication devices different product categories ability answer calls reply sms mac ipad continuity includes handoff feature lets users start task one device continue another changes included new spotlight suggestions search results feature provides detailed results family sharing family link together accounts share content one parent administrator permission controls updated keyboard quicktype providing contextual predictive word suggestions extensibility allows easier sharing content apps third-party developers got additional features integrate apps deeper operating system including support widgets notification center ability make keyboards users replace default ios keyboard app updates release included new health app aggregate data different fitness apps well enabling medical id accessible lock screen emergencies support icloud photo library photos app enables photos synchronized stored cloud icloud drive lets users store files cloud browse across devices ios 8.4 apple updated music app streaming service called apple music 24-hour radio station called beats 1 reception ios 8 positive critics praised continuity extensibility major features enabling easier control interaction different apps devices also liked quicktype keyboard word suggestions highlighted spotlight suggestions making iphone almost portable search portal everything however reviewers noted full potential ios 8 would realized third-party developers integrated apps support new features particularly widgets notification center roughly week release ios 8 reached 46 ios usage share october 2014 reported adoption rate stalled increasing single percentage point previous month situation blamed requirement high amount free storage space install upgrade especially difficult iphones sold 8 16 gigabytes maximum storage space following december ios 8 reached 63 usage share notable 16 increase october measurement ios 8 introduced company worldwide developers conference june 2 2014 first beta made available conference attendees keynote presentation ios 8 officially released september 17 2014. ios 8.0.1 released september 24 2014 first update ios 8 update meant bring various bug fixes however update withdrawn due issue disabled touch id cellular network connectivity models apple instead recommended affected users reinstall initial ios 8 release wait version 8.0.2 ready ios 8.0.2 released september 25 2014 day release ios 8.0.1 included fixes bugs present previous update ios 8.1 released october 20 2014 update introduced apple pay iphone 6 6 plus united states added icloud photo library beta status returned camera roll photos added continuity features enable iphone users read send sms mms ipad mac also introduced instant hotspot allowing mac users remotely activate personal hotspot feature nearby iphone ios 8.1.1 released november 17 2014 bug fixes performance improvements iphone 4s ipad 2. ios 8.1.2 released december 9 2014 fix issue ringtones purchased itunes store would removed ios device ios 8.1.3 released january 27 2015 update included bug fixes reduced amount storage space required perform ios update ios 8.2 released march 9 2015 update included support apple watch apple watch app iphone providing app store configuration options access health options units measurement well lots stability improvements bug fixes release ios 8.3 apple announced public beta testing program allowing consumers receive test upcoming versions ios software official general release ios 8.3 released april 8 2015 update included emoji improvements updated emoji keyboard picker organizes emoji categories new diversified emoji skin tone modifiers new languages siri support wireless carplay well major bug fixes improvements ios 8.4 released june 30 2015 update introduced apple music therefore overhauled existing music app apple music service ios 8.4 also relocated audiobooks music app ibooks app ios 8.4.1 released august 13 2015 various fixes apple music ios 8 introduced continuity cross-platform mac iphone ipad system enables communication devices different product categories continuity enables phone call functionality ipad mac calls routed iphone secondary device secondary device serves speaker phone also brings sms support ipad mac extension imessage feature previous versions continuity adds feature called handoff lets users start task one device continue another composing e-mail iphone continuing ipad sending mac order support handoff continuity macs needed os x yosemite operating system released october 2014 well support bluetooth low energy ios 8 introduced spotlight suggestions new search feature integrates many websites services show detailed search results including snippets wikipedia articles local news quick access apps installed device itunes content movie showtimes nearby places info various websites spotlight suggestions available ios home screen well safari web browser search bar drop-down notification center redesigned allow widget functionality third-party apps add widget support apps let users see information notification center without open respective app users add rearrange remove widgets time examples widgets include weather app showing current weather calendar app showing upcoming events notifications actionable allowing users reply message appears quick drop-down act notification notification center ios 8 includes new predictive typing feature called quicktype displays word predictions keyboard user types apple allows third-party developers make keyboard apps users replace default ios keyboard added privacy apple added settings toggle called allow full access optionally enables keyboard act outside app sandbox synchronizing keyboard data cloud third-party keyboards allowed use siri voice dictation secure text fields allow input ios 8 introduced family sharing allows 6 people register unique itunes accounts linked together one parent becoming administrator controlling overall experience purchases made one account shared family members purchases made kids 13 years age require parental approval purchases made adults visible kids family sharing also extends apps shared album automatically generated photos app family member allowing everyone add photos videos comments shared place ask buy feature allows anyone request purchase items app store itunes store ibooks store well in-app purchases icloud storage administrator option either approve deny purchase multitasking screen shows list recently called favorited contacts feature turned settings ios 8 includes additional data roaming option settings european users allowing greater control data usage abroad siri personal voice assistant integrated shazam support asking siri song identify song playing wi-fi calling added allow mobile phone calls wi-fi mobile operator carriers enable voice-over-wi-fi functionality services camera app gets two new features time-lapse self-timer time-lapse records frames shorter intervals normal film frequencies builds movies showing events faster speed self-timer gives user option three-second ten-second countdown automatically taking photo ipads take pictures panoramic mode ios 8 added icloud photo library support photos app enabling photo synchronization different apple devices photos videos backed full resolution original formats feature almost meant lower-quality versions photos could cached device rather full-size images potentially saving significant storage space models limited storage availability photos app received better search different search categorization options including nearby one year ago favorites home based geolocation date photo capture additionally photos app gained precise editing controls including improved rotation one-touch auto-enhancement tools deeper color adjustments brightness contrast exposure shadows also option hide photo without deleting apple added extensibility feature ios 8 allows filters effects third-party apps accessed directly within menu standard photos app rather import export photos respective app apply effects initial release ios 8 apple removed camera roll feature photos app camera roll overview photos device replaced recently added photo view displaying photos recently user captured despite replaced recently added album removal camera roll sparked user complaints apple returned feature ios 8.1 update ios 8 messages gets new features group conversations including disturb mode disables conversation notifications well ability remove participants chat new tap talk chat button lets users send quick voice comments recipient record button allows users record short videos interaction two apple users messages app allows users send short picture video audio clips 2-minute expiration time settings app user option messages automatically deleted certain time period safari web browser developers add support safari password sharing allows share credentials sites apps potentially cutting number times users need type credentials apps services browser also adds support webgl graphics api similar style file manager icloud drive file hosting service enabled settings lets users save kind file app media synchronized ios devices well mac ios 8 apple updated app store explore tab providing improved app discovery trending searches search tab ability developers bundle multiple apps single discounted package new preview videos allow developers visually show app function healthkit service allows developers make apps integrate new health app health app primarily aggregates data fitness apps installed user device except steps flights climbed tracked motion processor user iphone users enter medical history medical id accessible lock screen case emergency homekit serves software framework lets users set iphone configure communicate control smart-home appliances designing rooms items actions homekit service users enable automatic actions house simple voice dictation siri apps manufacturers homekit-enabled devices required purchase license homekit products required encryption co-processor equipment manufactured without homekit-support enabled use gateway product hub connects devices homekit service passbook app ios 8 updated include apple pay digital payment service available iphone 6 6 plus release ios 8.1 new music streaming service apple music introduced ios 8.4 update allows subscribers listen unlimited number songs on-demand subscriptions release music service standard music app ios revamped visually functionally include apple music well 24-hour live radio station beats 1 notes received rich text editing support ability bold italicize underline text image support allowing users post photos app weather app uses weather data weather channel instead yahoo app also received slight changes user interface ios 8 added new tips app shows tips brief information features ios weekly basis ios 8 allows touch id used third-party apps ios 8 received positive reviews brad molen engadget highlighted continuity major advancement users multiple apple devices also praised extensibility feature allowing apps share data liked support third-party keyboards however molen noted new introductions family sharing continuity icloud drive require diving apple ecosystem work particularly enjoyed actionable notifications third-party widget support notification center charles arthur guardian also liked extensibility well new quicktype word suggestions functionality ios keyboard criticized lack option choosing default apps also criticized settings menu confusing unintuitive darrell etherington techcrunch praised improvements imessage writing best ability mute leave group conversations something ’ sorely missing since introduction group imessage conversations liked new search editing features photos quicktype feature keyboard particularly highlighted spotlight suggestions one better features ios 8 even ’ small service addition noting makes iphone almost portable search portal everything martin bryant next web wrote real advances yet come adding apple included demonstrations done true power ’ hood realized coming days weeks months third-party developers gradually incorporate new features apps september 23 2014 roughly week release ios 8 user adoption ios 8 reached 46 october 2014 andrew cunningham ars technica reported ios 8 user adoption rate stalled climbing single percentage point since previous september measurement 46 cunningham blamed over-the-air update requiring 5 gigabytes install unusually large amount may posed challenges using 8 gigabyte 16 gigabyte devices alternative apple offered update via itunes software cunningham noted itunes hookup going even way days years ago least apple spent last three years coaching people use idevices independently computers december new report ars technica stated ios 8 usage increased 63 solid 16 percent study apteligent formerly crittercism found rate apps crashed tests 3.56 ios 8 higher 2 found ios 7.1 september 2014 ios 8.0.1 update caused significant issues touch id iphone 6 cellular network connectivity models apple stated affected users reinstall initial ios 8 release version 8.0.2 ready ios 8.0.2 released one day 8.0.1 fix issues caused 8.0.1 update forbes published several articles focusing problems ios 8 regarding wi-fi battery bluetooth calendar may 2015 news outlets reported bug receiving text message specific combination symbols arabic characters caused messages application crash iphone reboot bug named effective power could potentially continuously reboot device message visible lock screen flaw exploited purpose trolling intentionally causing others phones crash bug fixed ios 8.4 update released june 2015 september 2014 hoax apple advertisement alleged feature called wave ios 8 circulated twitter promised users would able recharge iphone heating microwave oven feature exist media cited numerous people reporting twitter destroyed iphone following procedure described advertisement release apple dropped support iphone 4 | [
10755,
9732,
1549,
4111,
5647,
7697,
3602,
6675,
11289,
7199,
8735,
8736,
6186,
4139,
6700,
1074,
8754,
7736,
9784,
8253,
8767,
576,
5696,
8774,
8783,
4180,
10838,
1623,
3672,
9308,
3167,
3681,
9826,
8806,
3691,
2673,
6264,
7292,
2686,
67... | Test |
6,024 | 4 | Screening_router:screening router screening router performs packet-filtering used firewall cases screening router may used perimeter protection internal network entire firewall solution | [
8998,
3941,
6262,
4895
] | None |
6,025 | 3 | MOVDDUP:movddup x86 assembly programming language movddup name specific action performable modern x86 processors 3rd-generation streaming simd extensions sse3 action involves copying number temporary space processor use computations specifically movddup causes one double-precision floating-point source copied lower half upper half xmm register source operand either xmm register xmm2 memory address m64 source operand xmm register lower half register used operation source operand memory address assumed address 8-byte region value used operation destination operand must xmm register xmm1 x86 instruction listings | [
10689,
6596,
977,
499,
8853,
1915,
8126
] | Test |
6,026 | 5 | Route_poisoning:route poisoning route poisoning method prevent router sending packets route become invalid within computer networks distance-vector routing protocols computer networks use route poisoning indicate routers route longer reachable considered routing tables unlike split horizon poison reverse route poisoning provides sending updates unreachable hop counts immediately nodes network protocol detects invalid route routers network informed bad route infinite ∞ route metric makes nodes invalid route seem infinitely distant preventing routers sending packets invalid route distance-vector routing protocols rip use maximum hop count determine many routers traffic must go reach destination route hop count number assigned incremented routing information passed router router route considered unreachable hop count exceeds maximum allowed route poisoning method quickly forgetting outdated routing information router routing tables changing hop count unreachable higher maximum number hops allowed sending routing update case rip maximum hop count 15 perform route poisoning route hop count changed 16 deeming unreachable routing update sent updates lost nodes network would informed route invalid could attempt send packets bad route cause problem known routing loop therefore route poisoning used conjunction holddowns keep update messages falsely reinstating validity bad route prevents routing loops improving overall efficiency network | [
3752,
3095
] | Test |
6,027 | 1 | Amazon_SimpleDB:amazon simpledb amazon simpledb distributed database written erlang amazon.com used web service concert amazon elastic compute cloud ec2 amazon s3 part amazon web services announced december 13 2007 ec2 s3 amazon charges fees simpledb storage transfer throughput internet december 1 2008 amazon introduced new pricing free tier 1 gb data 25 machine hours transfer amazon web services free charge simpledb provides eventual consistency weaker form consistency compared database management systems often considered limitation harder reason makes harder write correct programs make use simpledb limitation result fundamental design trade-off foregoing consistency system able achieve two highly desirable properties component failures assumed inevitable thus properties deemed necessary order provide reliable web service cap theorem states possible system exhibit properties along consistency thus designers needed settle weaker form consistency published limitations conditional put conditional delete new operations added february 2010 address problem arises accessing simpledb concurrently consider simple program uses simpledb store counter i.e number incremented program must three things program runs programs access simpledb work correctly however often desirable software applications particularly web applications access data concurrently data accessed concurrently race condition arises would result undetectable data loss continuing previous example consider two processes b running program suppose simpledb services requests data described step 1 b b see value let say current value counter 0 steps 2 3 try store 1 b try thus final counter value 1 even though expected final counter value 2 system attempted two increment operations one another b problem solved use conditional put suppose change step 3 follows instead unconditionally storing new value program asks simpledb store new value value currently holds value retrieved step 1 sure counter value actually increases introduces additional complexity simpledb able store new value current value expected program must repeat steps 1-3 conditional put operation actually changes stored value consistent read new feature released time conditional put conditional delete name suggests consistent read addresses problems arise due simpledb eventual consistency model see limitations section consider following sequence operations simpledb eventual consistency guarantee allow us say data retrieved step 2 reflects updates made step 1 eventual consistency guarantees step 2 reflects complete set updates step 1 none updates consistent read used ensure data retrieved step 2 reflect changes step 1 reason inconsistent results arise consistent read operation used simpledb stores data multiple locations availability new data step 1 might written locations simpledb receives data request step 2 case possible data request step 2 serviced one locations new data written amazon discourages use consistent read unless required correctness reason recommendation rate consistent read operations serviced lower regular reads talk simpledb superseded dynamodb longer iterated though amazon plan remove dynamodb appears successor | [
8962,
8451,
4236,
10893,
911,
1935,
4623,
8592,
5139,
2965,
2328,
4377,
8986,
5660,
11038,
6307,
7076,
10020,
9766,
5159,
6184,
2217,
11556,
6444,
8495,
3121,
7352,
10681,
2496,
4289,
11201,
1224,
5960,
8520,
10185,
4429,
590,
7248,
1362,
... | Test |
6,028 | 2 | Internet_Explorer_7:internet explorer 7 windows internet explorer 7 ie7 codenamed rincon web browser windows released microsoft october 2006 internet explorer 7 part long line versions internet explorer first major update browser 5 years default browser windows vista windows server 2008 replace internet explorer 6 windows xp windows server 2003 unlike version 6 version support windows nt 4.0 windows 98 windows 98 se windows 2000 windows portions underlying architecture including rendering engine security framework improved new features include tabbed browsing page zooming integrated search box feed reader better internationalization improved support web standards although pass acid2 acid3 tests security enhancements include phishing filter stronger encryption windows vista 256-bit 128-bit xp delete browsing history button easily clear private data also first version internet explorer branded marketed name 'windows instead 'microsoft ie7 shipped default browser windows vista windows server 2008 offered replacement internet explorer 6 windows server 2003 windows xp ie7 superseded internet explorer 8 march 2009 2001 microsoft released internet explorer 6 update windows 98 second edition windows windows nt 4.0 service packs 6 windows 2000 included default windows xp release ie6 service pack 1 2003 microsoft announced future upgrades internet explorer would come future upgrades windows stating improvements ie require enhancements underlying os february 15 2005 rsa conference san francisco microsoft chairman bill gates announced microsoft planning new version internet explorer would run windows xp dean hachamovitch general manager internet explorer team cited needed security improvements primary reason new version first beta ie7 released july 27 2005 technical testing first public preview version internet explorer 7 beta 2 preview pre-beta 2 version released january 31 2006 final public version released october 18 2006 day yahoo provided post-beta version internet explorer 7 bundled yahoo toolbar yahoo -specific customizations late 2007 microsoft announced ie7 would included part windows xp sp3 internet explorer 6 7 receiving updates pc manufacturers however pre-installed internet explorer 7 well 8 new xp pc especially netbooks october 8 2007 microsoft removed windows genuine advantage component ie7 allowing downloaded installed without genuine copy windows within year ie7 release end 2006 end 2007 support calls microsoft decreased 10-20 december 16 2008 security flaw found internet explorer 7 exploited crackers steal users passwords following day patch issued fix flaw estimated affected around 10,000 websites estimates ie7 global market share 1.5-5 version internet explorer renamed microsoft internet explorer windows internet explorer part microsoft rebranding components included windows internet explorer 7 introduces windows rss platform tightly integrated subscribe rss atom feeds synchronize update schedule display built-in style sheet version 7 intended defend users phishing well deceptive malicious software also features full user control activex better security framework including integrated much windows previous versions thereby increasing security unlike previous versions internet explorer activex control hosted windows explorer process rather runs process also includes bug fixes enhancements support web standards tabbed browsing tab preview management multiple-engine search box web feeds reader internationalized domain name support idn antiphishing filter october 5 2007 microsoft removed 'genuine software validation install means versions windows whether able pass validation able install browser integrated search box supports opensearch windows vista internet explorer operates special protected mode runs browser security sandbox write access rest operating system file system running protected mode ie7 low integrity process gain write access files registry keys outside low-integrity portions user profile feature aims mitigate problems whereby newly discovered flaws browser add-ons hosted inside allowed crackers subversively install software user computer typically spyware microsoft addressed security issues two distinct ways within windows vista user account control forces user confirm action could affect stability security system even logged administrator protected-mode ie runs web browser process much lower permissions user first vulnerability exclusive internet explorer 7 posted 6 days january 12 2016 new microsoft lifecycle support policy internet explorer went effect wepos became remaining supported os ie7 support continued wepos reached eol april 12 2016 making april 2016 security update last ever public update ie7 users criticised phishing filter easy circumvent one successful method bypassing internet explorer phishing filter reported redirecting blacklisted web page another non-blacklisted page using server-side redirect new page blocked well attack remain active flaw means phishers keep links previous emails functioning simply moving new server original web page blacklisted adding redirect criticised doubly serious presence phishing filter may lull users false sense security filter bypassed phishing filter went developed renamed safety filter smartscreen microsoft development internet explorer 8 internet explorer 7 adds support per-pixel alpha transparency png well minor improvements html css dom support microsoft stated goal version 7 fix significant bugs areas caused trouble developers however full compatibility standards postponed internet explorer 7 additionally features update wininet api new version better support ipv6 handles hexadecimal literals ipv6 address also includes better support gzip deflate compression communication web server compressed thus require less data transferred internet explorer protected mode support wininet exclusive windows vista although internet explorer 7 compliant previous versions according figures remains least standards-compliant compared major browsers period pass acid2 acid3 tests two test cases designed web standards project verify css compliance 2008 msnbc article tim berners-lee said lack support internet explorer responsible holding back widespread adoption webmasters several new open technology standards specifically scalable vector graphics svg supported elsewhere since 2001 available internet explorer using 3rd party plugin release internet explorer 9 ie7 requires least | [
6657,
517,
9736,
537,
6171,
9757,
8735,
7713,
10791,
10282,
3629,
2611,
4661,
3639,
10808,
3643,
9275,
3137,
1098,
10828,
9808,
6231,
1113,
8281,
2139,
603,
5225,
9328,
4722,
119,
10872,
8315,
637,
1664,
5765,
134,
653,
5784,
10910,
3250,... | None |
6,029 | 3 | MLX_(software):mlx software mlx series machine language entry utilities published magazines compute compute gazette well books compute publications programs designed allow relatively easy entry type-in machine language listings often included publications versions available commodore 64 pet vic-20 atari 8-bit family apple ii mlx introduced december 1983 issue compute versions commodore 64 atari 8-bit family followed january 1984 issue compute gazette version vic-20 8k expansion march 1984 issue tiny mlx version unexpanded vic-20 versions mlx shared format consisting six data bytes decimal format plus seventh byte served checksum although line began memory address bytes separated commas typed program auto-incremented address automatically printed comma delimiters every three characters invalid keystrokes filtered line completely typed automatically verified checksum value matched user would prompted next line warning buzzer would sound invalid input would discarded user could retype line commodore version beginning may 1984 issue compute several keyboard keys redefined create makeshift numeric keypad mlx listings reserved relatively long machine language programs speedscript shorter programs often printed form basic loaders used codice_1 statements codice_2 code memory although original mlx efficient entry method basic loaders codice_1 statements number issues foremost among codice_2d data entered directly affected area memory since many machine language programs located partially entirely basic ram area meant user manually adjust pointers top bottom basic ram using codice_2 statements provided article running mlx keep entry program encroaching code vice versa program entered multiple sittings done time also decimal storage required seven keystrokes two bytes entered taking account checksums furthermore many transposition errors overlooked original mlx unsophisticated checksum algorithm new version mlx introduced apple ii june 1985 issue version used 8-byte-per-line hexadecimal format sophisticated hash algorithm implemented catch errors overlooked original failing notice substitution 0xff 0x00 improved layout hashing backported commodore 64 version also added editor buffer located single location memory removing need codice_2 memory locations startup new version known title screen mlx ii otherwise simply new mlx first appeared december 1985 issue compute appeared compute gazette following month replacement version mlx continued used compute gazette switched disk-only format december 1993 | [
7421
] | Test |
6,030 | 3 | Phantasie_(video_game):phantasie video game phantasie first video game phantasie series based isle gelnor phantasie allows group six characters adventure countryside try defeat evil black knights sorcerer leader nikademus players could choose one six character classes thief fighter ranger monk priest wizard could also choose races human dwarf halfling elf gnome selecting random one could also choose ogre troll pixie gnoll orc lizard man minotaur races game notable taking advantage broad mix styles game town window allowed purchasing various shops top-down style dungeon crawl view top-down world map separate combat window character class unique fighting styles options characters could choose strategy particular round turn-based combat segments combat experience awarded players would return town purchase levels qualified 50,000 copies sold north america phantasie successful ssi company best-selling commodore game late 1987 game reviewers hartley pattie lesser 1987 complimented atari st version phantasie role computers column dragon 120 1987 recommending atari st owners consider phantasie game well-worth attention analog computing 1988 called phantasie sequel best fantasy role-playing games atari 8-bit 1991 1993 computer gaming world scorpia called phantasie surprisingly good little game many interesting features phantasie phantasie iii questron ii later re-released together reviewed 1994 dragon 203 sandy petersen eye monitor column petersen gave compilation 2 5 stars | [
9006,
6426,
9166,
8062
] | None |
6,031 | 4 | The_Plot_to_Hack_America:plot hack america plot hack america putin cyberspies wikileaks tried steal 2016 election non-fiction book malcolm nance author describes russian interference 2016 united states elections published paperback audiobook e-book formats 2016 skyhorse publishing second edition also published year third edition 2017 nance researched russian intelligence working russian interpreter studying kgb history nance described black propaganda warfare known active measures rt russia today sputnik news recounts vladimir putin kgb rise details trump campaign ties russia nance concludes putin managed cyberattack hacker groups cozy bear fancy bear wall street journal placed book list best-selling books week february 19 2017 seventh place category nonfiction e-books new york journal books called essential primer anyone wanting fully informed unprecedented events surrounding 2016 u.s. presidential election napa valley register described nance work best book subject huffington post remarked putin played game thrones election newsweek wrote problem disinformation tactics time debunked public already consumed falsehoods book dedicated u.s. army officer humayun khan begins foreword spencer ackerman nance details russian interference 2016 u.s. elections describes march 2016 democratic national committee dnc servers hacked someone seeking opposition research donald trump nance learnt hacker guccifer 2.0 would release hacked dnc materials nance gives context including trump motivations run president made fun 2011 white house correspondents association dinner criticism barack obama entry 2016 race white house nance discusses black propaganda techniques used russian federation characterizes rt russia today sputnik news agencies disinformation asserts putin intimately involved russian intelligence operation elect trump directing entire covert operation trump agents putin assets nance delves links trump associates russian officials asserting multiple agents trump assets putin providing access trump nance identifies putin strategy electing trump u.s. president referred operation lucky-7 kremlin plan elect president describes multitask effort involving hacking dnc acquire personal information members well seek compromising material known kompromat battles cyber bears describes two hacker entities tied russian intelligence cozy bear fancy bear cozy bear believed linked russian federal security service fsb foreign intelligence service svr fancy bear associated russian military intelligence agency gru nance describes russian intelligence attempted make releases leaked dnc emails appear deniable wikileaks russia intelligence laundromat likens use whistleblower website wikileaks money laundering nance asserts wikileaks willingly collaborated operation cyber bears attack describes impact podesta emails dnc email leaks 2016 clinton campaign finally cyberwar defend democracy nance reiterates u.s. target cyberwarfare russian intelligence agencies gru fsb directly ordered putin nance writes russia succeeded casting doubt citizens strength u.s. democracy posits u.s. populace large internalize future acts cyberwarfare dangerous attempts subvert daily life could lead actual war beginning research plot hack america nance gained counter-intelligence experience u.s. navy senior chief petty officer naval cryptology served 1981–2001 garnered expertise within fields intelligence counterterrorism author learned russian history interpreter russian began working intelligence field research history soviet union spying agency kgb devoted years research analyzing foreign relations russia prior analyzing russian interference 2016 u.s. elections nance background counter-intelligence analysis included management think tank called terror asymmetrics project strategy tactics radical ideologies consisting central intelligence agency military intelligence officers direct prior field experience nance books counter-terrorism include end al-qaeda terrorist recognition handbook terrorists iraq defeating isis hacking isis nance began work plot hack america incidentally already engaged writing hacking isis course research hacking isis discovered computer hacking germany legislative body bundestag french television station tv5monde time hacks thought caused isis instead traced back russian hacking group cyber bears nance knew russian intelligence gru operated group realized attribution isis false flag operation throw investigators trail gave nance prior knowledge russian intelligence tactics cyber bears infiltrate servers purposes disrupting government case germany injecting propaganda case france 2016 hack dnc apparent nance identical foreign agency carried attack gru nance suspicions borne accurate security firm crowdstrike determined cozy bear fancy bear behind attack nance saw akin watergate scandal albeit virtual attack instead physical break-in democratic facilities nance told c-span majority working life identified member u.s. republican party describing colin powell school republicanism plot hack america written desire intelligence expert document background behind attack foreign power u.s. democratic institutions nance realized gravity attack considered operation must sanctioned managed former kgb officer vladimir putin nance member board directors international spy museum washington d.c work museum nance befriended former kgb general oleg kalugin advised kgb always kgb nance considered putin objectives would simply harm hillary clinton actually attempt achieve ascendancy donald trump u.s. president plot hack america first published online format september 23 2016 day united states intelligence community assessments russian interference 2016 united states elections delivered president barack obama appendix book notes timing points many conclusions included consensus opinion principal three intelligence agencies nsa cia fbi identical plot hack america first paperback format published october 10 2016 second edition released year addition ebook format another edition published 2017 along audiobook narrated gregory itzin author subject hecklers appeared event discuss work books books miami florida 2017 book commercial success wall street journal placed plot hack america list best-selling books week february 19 2017 7th place category nonfiction e-books book included reading course political science pasadena city college review new york journal books michael lipkin effusive writing malcolm nance plot hack america essential primer anyone wanting fully informed unprecedented events surrounding 2016 u.s. presidential election lipkin wrote author expertise subject matter patriot highly experienced respected intelligence expert bringing bear deep extensive knowledge conclusions perhaps one important developments american history lawrence swaim gave nance work favorable reception book review napa valley register wrote quick read present easily best book subject swaim recommended resources back book writing ’ really killer nance book appendix contains extremely revealing assessments made american intelligence agencies presented unclassified format kenneth j. bernstein wrote daily kos convince read important book echoed warning conclusion dangers posed cyberwarfare bernstein wrote book argumentation strengthened every single assertion nance offers backed material ... clearly documented end notes bernstein wrote favorably addition book foreword guardian editor national security spencer ackerman italian language newspaper la stampa called book molto bello writing independent andy martin commented suppose weak spot subtitle word 'tried surely 'try maclean wrote plot hack america prescient russia ’ meddling 2016 u.s election brian lamb founder retired ceo c-span commented book titled choice seemed political nature strategic finance noted nance focuses new hybrid cyber warfare kompromat uses cyber assets way attack political enemies techgenix journalist michael adams wrote nance provides in-depth analysis issue characterized multiple commentators national controversy rivalling watergate scandal adams called book engaging tale espionage including context russian intelligence background vladimir putin kgb voice america commented nance capably outlined evidence book fears russian foreign manipulation 2016 election bob burnett wrote huffington post nance described game thrones strategem vladimir putin using donald trump tool embarrass hillary clinton barack obama burnett observed nance posited trump putin play trump avarice narcissism jeff stein newsweek wrote power disinformation tactics described nance book genius technique correction takes days weeks catch fiction gullible masses digested fabrications truth plot hack america published october 2016 nance interviewed april 2017 c-span book impact media operations american society argued russia today actions back notion black propaganda operations effective referencing impact disinformation operations nance cited research senate intelligence committee house intelligence committee director national intelligence russia today methods publishing propaganda propagating fake news traced larger problem echo chambers wherein false invented story sputnik news traveled bloggers breitbart news became believed factual trump administration officials eventually re-reported russia today falsely stating simply reporting events created white house author recalled c-span days soviet union soviet intelligence operation practice infiltrate manage reporting agencies communist party addition political figures right left perspectives order denigrate u.s. democratic interests nance warned russia control vladimir putin motivated identical initiative armed greater tools funding soviet union past lamented prior putin appointment prime minister russia boris yeltsin country taking steps towards democracy nance traced putin rise descent democracy russia favor oligarchy ruling class wealthy individuals managing autocratic society nance said u.s. citizens become agents russia employ russia today due naivete nature russian propaganda operations geared harm u.s. values civil liberties nance placed utilization propaganda russian intelligence agencies russia today outlets including social media part larger effort global cyberwarfare characterized form hybrid warfare blending traditional propaganda computer tools subversion media organizations case study cited aleksandr dugin russian neofascist political activist views favored putin whose tweets expound perspectives u.s democratic institutions successful | [
176,
4689,
8288,
9688
] | Test |
6,032 | 9 | Shading_language:shading language shading language graphics programming language adapted programming shader effects characterizing surfaces volumes objects language forms usually consist special data types like vector matrix color normal due variety target markets 3d computer graphics different shading languages developed shading languages used offline rendering produce maximum image quality material properties totally abstracted little programming skill hardware knowledge required kind shaders often developed artists get right look texture mapping lighting facets work processing shaders time-consuming computational power required expensive ability produce photorealistic results time production rendering run large computer clusters renderman shading language often referenced rsl sl short defined renderman interface specification common shading language production-quality rendering also one first shading languages ever implemented language defines six major shader types houdini vex vector expressions shading language often abbreviated vex closely modeled renderman however integration complete 3d package means shader writer access information inside shader feature usually available rendering context language differences rsl vex mainly syntactic addition differences regarding names several shadeop names gelato shading language like houdini vex closely modeled renderman differences gelato shading language rsl mainly syntactical — gelato uses semicolons instead commas separate arguments function definitions shadeops different names parameters open shading language osl developed sony pictures imageworks use arnold renderer also used blender cycles render engine osl surface volume shaders define surfaces volumes scatter light way allows importance sampling thus well suited physically-based renderers support ray tracing global illumination shading languages real-time rendering widespread provide higher hardware abstraction flexible programming model previous paradigms hardcoded transformation shading equations gives programmer greater control rendering process delivers richer content lower overhead shaders designed executed directly gpu became useful high throughput general processing stream programming model led development compute shaders running similar hardware see also gpgpu historically languages successful establishing maintaining strong market position short description languages follows opengl architecture review board established arb assembly language 2002 standard low-level instruction set programmable graphics processors high-level opengl shading languages often compile arb assembly loading execution unlike high-level shading languages arb assembly support control flow branching however continues used cross-gpu portability required also known glsl glslang standardized shading language meant used opengl language unifies vertex fragment processing single instruction set allowing conditional loops generally branches historically glsl preceded arb assembly language programming language cg developed nvidia designed easy efficient production pipeline integration language features api independence comes large variety free tools improve asset management development cg stopped 2012 language deprecated shader assembly language direct3d 8 9 main programming language vertex pixel shaders shader model 1.0/1.1 2.0 3.0 shader assembly language direct representation intermediate shader bytecode passed graphics driver execution shader assembly language directly used program unified shader model 4.0 4.1 5.0 5.1 although retains function representation intermediate bytecode debug purposes high-level shading language also called hlsl short c-style shader language directx 9 higher xbox game consoles similar nvidia cg supported directx xbox hlsl programs compiled bytecode equivalent directx shader assembly language hlsl introduced optional alternative shader assembly language direct3d 9 became requirement direct3d 10 higher shader assembly language deprecated adobe systems added pixel bender part adobe flash 10 api pixel bender could process pixel 3d-vertex data flash 11 introduced entirely new 3d api called stage3d uses shading language called adobe graphics assembly language agal offers full 3d acceleration support gpu acceleration pixel bender removed flash 11.8 agal low-level platform-independent shading language compiled example glsl sony announced pssl playstation shader language platform-specific shading language similar hlsl playstation 4 apple created low-level graphics api called metal runs macs made since 2012 iphones since 5s ipads since ipad air metal introduces shading language called metal shading language msl based c++14 implemented using clang llvm msl unifies vertex fragment compute processing | [
9345,
10145,
10658,
2374,
8262,
4042,
4332,
10796,
10512,
305,
10672,
6420,
3159,
987,
508,
2943
] | Test |
6,033 | 3 | ECC_memory:ecc memory error-correcting code memory ecc memory type computer data storage detect correct most-common kinds internal data corruption ecc memory used computers data corruption tolerated circumstances scientific financial computing typically ecc memory maintains memory system immune single-bit errors data read word always data written even one bits actually stored flipped wrong state non-ecc memory detect errors although non-ecc memory parity support allows detection correction electrical magnetic interference inside computer system cause single bit dynamic random-access memory dram spontaneously flip opposite state initially thought mainly due alpha particles emitted contaminants chip packaging material research shown majority one-off soft errors dram chips occur result background radiation chiefly neutrons cosmic ray secondaries may change contents one memory cells interfere circuitry used read write hence error rates increase rapidly rising altitude example compared sea level rate neutron flux 3.5 times higher 1.5 km 300 times higher 10–12 km cruising altitude commercial airplanes result systems operating high altitudes require special provision reliability example spacecraft cassini–huygens launched 1997 contained two identical flight recorders 2.5 gigabits memory form arrays commercial dram chips thanks built-in edac functionality spacecraft engineering telemetry reported number correctable single-bit-per-word errors uncorrectable double-bit-per-word errors first 2.5 years flight spacecraft reported nearly constant single-bit error rate 280 errors per day however november 6 1997 first month space number errors increased factor four single day attributed solar particle event detected satellite goes 9 concern dram density increases thus components chips get smaller time operating voltages continue fall dram chips affected radiation frequently—since lower-energy particles able change memory cell state hand smaller cells make smaller targets moves technologies soi may make individual cells less susceptible counteract even reverse trend recent studies show single-event upsets due cosmic radiation dropping dramatically process geometry previous concerns increasing bit cell error rates unfounded work published 2007 2009 showed widely varying error rates 7 orders magnitude difference ranging 10 error/bit·h roughly one bit error per hour per gigabyte memory 10 error/bit·h roughly one bit error per millennium per gigabyte memory large-scale study based google large number servers presented sigmetrics/performance ’ 09 conference actual error rate found several orders magnitude higher previous small-scale laboratory studies 25,000 roughly 2.5 × 10 error/bit·h 70,000 roughly 7 × 10 error/bit·h 5 bit errors per 8 gigabytes ram per hour errors per billion device hours per megabit 8 dimm memory modules affected errors per year consequence memory error system-dependent systems without ecc error lead either crash corruption data large-scale production sites memory errors one most-common hardware causes machine crashes memory errors cause security vulnerabilities memory error consequences changes bit neither causes observable malfunctioning affects data used calculations saved 2010 simulation study showed web browser small fraction memory errors caused data corruption although many memory errors intermittent correlated effects memory errors greater would expected independent soft errors tests conclude isolation dram memory cells circumvented unintended side effects specially crafted accesses adjacent cells thus accessing data stored dram causes memory cell leak charges interact electrically result high cell density modern memory altering content nearby memory rows actually addressed original memory access effect known row hammer also used privilege escalation computer security exploits example single-bit error would ignored system error-checking would halt machine parity checking would invisibly corrected ecc single bit stuck 1 due faulty chip becomes changed 1 due background cosmic radiation spreadsheet storing numbers ascii format loaded character 8 decimal value 56 ascii encoding stored byte contains stuck bit lowest bit position change made spreadsheet saved result 8 0011 1000 binary silently become 9 0011 1001 several approaches developed deal unwanted bit-flips including immunity-aware programming ram parity memory ecc memory problem mitigated using dram modules include extra memory bits memory controllers exploit bits extra bits used record parity use error-correcting code ecc parity allows detection single-bit errors actually odd number wrong bits most-common error correcting code single-error correction double-error detection secded hamming code allows single-bit error corrected usual configuration extra parity bit double-bit errors detected chipkill ecc effective version also corrects multiple bit errors including loss entire memory chip seymour cray famously said parity farmers asked left cdc 6600 later included parity cdc 7600 caused pundits remark apparently lot farmers buy computers original ibm pc pcs early 1990s used parity checking later ones mostly many current microprocessor memory controllers including almost amd 64-bit offerings support ecc many motherboards particular using low-end chipsets ecc-capable memory controller detect correct errors single bit per 64-bit word unit bus transfer detect correct errors two bits per 64-bit word bios computers matched operating systems versions linux macos windows allows counting detected corrected memory errors part help identify failing memory modules problem becomes catastrophic dram chips include internal on-chip error correction circuits allow systems non-ecc memory controllers still gain benefits ecc memory systems similar effect may achieved using eos memory modules error detection correction edac depends expectation kinds errors occur implicitly assumed failure bit word memory independent resulting improbability two simultaneous errors used case memory chips one-bit wide typical first half 1980s later developments moved many bits chip weakness addressed various technologies including ibm chipkill sun microsystems extended ecc hewlett packard chipspare intel single device data correction sddc dram memory may provide increased protection soft errors relying error correcting codes error-correcting memory known ecc edac-protected memory particularly desirable high fault-tolerant applications servers well deep-space applications due increased radiation systems also scrub memory periodically reading addresses writing back corrected versions necessary remove soft errors interleaving allows distribution effect single cosmic ray potentially upsetting multiple physically neighboring bits across multiple words associating neighboring bits different words long single event upset seu exceed error threshold e.g. single error particular word accesses corrected e.g. single-bit error correcting code effectively error-free memory system may maintained error-correcting memory controllers traditionally use hamming codes although use triple modular redundancy tmr latter preferred hardware faster hamming error correction scheme space satellite systems often use tmr although satellite ram usually uses hamming error correction many early implementations ecc memory mask correctable errors acting error never occurred report uncorrectable errors modern implementations log correctable errors ce uncorrectable errors ue people proactively replace memory modules exhibit high error rates order reduce likelihood uncorrectable error events many ecc memory systems use external edac circuit cpu memory systems ecc memory use internal external edac systems external edac system designed correct certain errors internal edac system unable correct modern desktop server cpus integrate edac circuit cpu especially shift toward cpu-integrated memory controllers related numa architecture 2009 most-common error-correction codes use hamming hsiao codes provide single-bit error correction double-bit error detection sec-ded error-correction codes proposed protecting memory double-bit error correcting triple-bit error detecting dec-ted codes single-nibble error correcting double-nibble error detecting snc-dnd codes reed–solomon error correction codes etc however practice multi-bit correction usually implemented interleaving multiple sec-ded codes early research attempted minimize area delay overheads ecc circuits hamming first demonstrated sec-ded codes possible one particular check matrix hsiao showed alternative matrix odd weight columns provides sec-ded capability less hardware area shorter delay traditional hamming sec-ded codes recent research also attempts minimize power addition minimizing area delay many processors use error-correction codes on-chip cache including intel itanium xeon processors amd athlon opteron zen- zen+-based processors epyc epyc embedded ryzen ryzen threadripper dec alpha 21264. edc/ecc ecc/ecc two most-common cache error-protection techniques used commercial microprocessors edc/ecc technique uses error-detecting code edc level 1 cache error detected data recovered ecc-protected level 2 cache ecc/ecc technique uses ecc-protected level 1 cache ecc-protected level 2 cache cpus use edc/ecc technique always write-through stores level 2 cache error detected read level 1 data cache copy data recovered level 2 cache registered buffered memory ecc technologies perform different functions usual memory used servers registered allow many memory modules used without electrical problems ecc data integrity memory used desktop computers neither economy however unbuffered not-registered ecc memory available non-server motherboards support ecc functionality modules used cpu supports ecc registered memory work reliably motherboards without buffering circuitry vice versa ultimately trade-off protection unusual loss data higher cost ecc protects undetected memory data corruption used computers corruption unacceptable example scientific financial computing applications file servers ecc also reduces number crashes especially unacceptable multi-user server applications maximum-availability systems motherboards processors less critical application designed support ecc prices kept lower ecc-enabled boards processors able support unbuffered unregistered ecc also work non-ecc memory system firmware enables ecc functionality ecc ram installed ecc memory usually involves higher price compared non-ecc memory due additional hardware required producing ecc memory modules due lower production volumes ecc memory associated system hardware motherboards chipsets processors support ecc may also expensive ecc may lower memory performance around 2–3 percent systems depending application implementation due additional time needed ecc memory controllers perform error checking however modern systems integrate ecc testing cpu generating additional delay memory accesses long errors detected | [
6659,
9092,
1414,
1801,
5645,
3473,
5523,
6804,
5883,
2339,
4773,
9599,
11183,
7601,
306,
823,
6071,
1722,
9665,
10945,
7235,
2503,
2764,
2383,
7631,
3153,
9551,
9685,
2525,
2791,
1515,
10734,
3323,
9343
] | Test |
6,034 | 8 | HTML5test:html5test html5test web application evaluating web browser accuracy implementing web standards html5 web sql database developed world wide web consortium well webgl standard developed mozilla foundation khronos group test suite developed dutch web programmer niels leenheer published march 2010 test web browser user must visit home page website html5test.com application returns integer score possible 555 points point total changed multiple times evolution software leenheer introduced present scoring system part major redesign test introduced november 2013 html5test evaluates browser support web storage w3c geolocation api html5-specific html elements including canvas element features evaluate browser conformance web standards cascading style sheets ecmascript scalable vector graphics document object model conformance testing standards within purview acid3 automated test published ian hickson 2008 similarly acid3 evaluate browser html5 conformance test scope html5test test scope acid3 mutually exclusive | [
417,
3462,
4326,
488,
8296,
9275,
8689,
8854,
2139,
124,
8923,
735
] | None |
6,035 | 4 | TrashMail:trashmail trashmail trashmail.net free disposable e-mail address service created 2002 stephan ferraro computer science student epitech paris belongs ferraro ltd service provides temporary email addresses abandoned start receiving email spam mainly forwards emails real hidden email address trashmail receives emails forwards real hidden email address account creation option set number total forwards date disposable email expires forwarded email counter decreased 1 counter reaches 0 date limit expired temporary email address deleted temporary email address deleted incoming email rejected smtp code 550 5.1.1 trashmail also provides free open-source add-on mozilla firefox available official store email registration community forum provided https ssl http access protect privacy additionally smtp server communication tls enabled many spammers rely harvested email addresses best method avoiding spam publish one real email address providing temporary address trashmail allows users protect real email trashmail differs disposable email address services possibility use challenge-response system free disposable email address additionally provides real-time spam stats main page possible verify current incoming spam amount site trashmail used homepage www.trashmail.net however api provided documented forum explains write custom software use free service following trashmail software written | [
8455,
9909,
5078,
6975
] | None |
6,036 | 9 | Konrad_Zuse:konrad zuse konrad zuse 22 june 1910 – 18 december 1995 german civil engineer computer scientist inventor businessman computer pioneer greatest achievement world first programmable computer functional program-controlled turing-complete z3 became operational may 1941 thanks machine predecessors zuse often regarded inventor modern computer zuse also noted s2 computing machine considered first process control computer founded one earliest computer businesses 1941 producing z4 became world first commercial computer 1943 1945 designed first high-level programming language plankalkül 1969 zuse suggested concept computation-based universe book rechnender raum calculating space much early work financed family commerce 1939 given resources nazi german government due world war ii zuse work went largely unnoticed united kingdom united states possibly first documented influence us company ibm option patents 1946 replica z3 well original z4 deutsches museum munich deutsches technikmuseum berlin exhibition devoted zuse displaying twelve machines including replica z1 several zuse paintings born berlin 22 june 1910 moved family 1912 east prussian braunsberg braniewo poland father postal clerk zuse attended collegium hosianum braunsberg 1923 family moved hoyerswerda passed abitur 1928 qualifying enter university enrolled technische hochschule berlin technical university berlin explored engineering architecture found boring zuse pursued civil engineering graduating 1935 time worked ford motor company using considerable artistic skills design advertisements started work design engineer henschel aircraft factory schönefeld near berlin required performance many routine calculations hand found mind-numbingly boring leading dream machine beginning 1935 experimented construction computers parents flat wrangelstraße 38 moving new flat methfesselstraße 10 street leading kreuzberg berlin working parents apartment 1936 produced first attempt z1 floating point binary mechanical calculator limited programmability reading instructions perforated 35 mm film 1937 zuse submitted two patents anticipated von neumann architecture finished z1 1938 z1 contained 30,000 metal parts never worked well due insufficient mechanical precision 30 january 1944 z1 original blueprints destroyed parents flat many neighbouring buildings british air raid world war ii 1987 1989 zuse recreated z1 suffering heart attack midway project cost 800,000 dm approximately 500,000 required four individuals including zuse assemble funding retrocomputing project provided siemens consortium five companies zuse completed work entirely independently leading computer scientists mathematicians day 1936 1945 near-total intellectual isolation 1939 zuse called military service given resources ultimately build z2 september 1940 zuse presented z2 covering several rooms parental flat experts deutsche versuchsanstalt für luftfahrt dvl i.e german research institute aviation z2 revised version z1 using telephone relays dvl granted research subsidies 1941 zuse started company zuse apparatebau zuse apparatus construction manufacture machines renting workshop opposite side methfesselstraße 7 stretching block belle-alliance straße 29 renamed renumbered mehringdamm 84 1947 improving basic z2 machine built z3 1941 12 may 1941 zuse presented z3 built workshop public z3 binary 22-bit floating point calculator featuring programmability loops without conditional jumps memory calculation unit based telephone relays telephone relays used machines largely collected discarded stock despite absence conditional jumps z3 turing complete computer however turing-completeness never considered zuse practical applications mind demonstrated 1998 see history computing hardware z3 first fully operational electromechanical computer partially financed german government-supported dvl wanted extensive calculations automated request co-worker helmut schreyer—who helped zuse build z3 prototype 1938—for government funding electronic successor z3 denied strategically unimportant work z4 could resumed immediately extreme privation post-war germany 1949 able resume work showed mathematician eduard stiefel swiss federal institute technology zurich eidgenössische technische hochschule eth zürich ordered one 1950 8 november 1949 zuse kg founded z4 delivered eth zurich 12 july 1950 proved reliable 1940 german government began funding aerodynamische versuchsanstalt ava aerodynamic research institute forerunner dlr used work production glide bombs zuse built s1 s2 computing machines special purpose devices computed aerodynamic corrections wings radio-controlled flying bombs s2 featured integrated analog-to-digital converter program control making first process-controlled computer machines contributed henschel werke hs 293 hs 294 guided missiles developed german military 1941 1945 precursors modern cruise missile circuit design s1 predecessor zuse z11 zuse believed machines captured occupying soviet troops 1945 working z4 computer zuse realised programming machine code complicated started working phd thesis containing groundbreaking research years ahead time mainly first high-level programming language plankalkül plan calculus elaborate example program first real computer chess engine 1945 luisenstadt bombing flew berlin rural allgäu unable hardware development continued working plankalkül eventually publishing brief excerpts thesis 1948 1959 work entirety however remained unpublished 1972 phd thesis submitted university augsburg rejected formal reasons zuse forgot pay 400 mark university enrollment fee rejection bother plankalkül slightly influenced design algol 58 implemented 1975 dissertation joachim hohmann heinz rutishauser one inventors algol wrote first attempt devise algorithmic language undertaken 1948 k. zuse notation quite general proposal never attained consideration deserved implementations followed 1998 2000 team free university berlin donald knuth suggested thought experiment might happened bombing taken place phd thesis accordingly published planned addition computing-related work described zuse began work 1956 high precision large format plotter demonstrated 1961 hanover fair became well known also outside technical world thanks frieder nake pioneering computer art work plotters designed zuse include zuse z90 zuse z9004 last years life zuse conceptualized created purely mechanical extensible modular tower automaton named helix tower helixturm structure based gear drive employs rotary motion e.g provided crank assemble modular components storage space elevating tube-shaped tower process reversible inverting input direction deconstruct tower store components deutsches museum restored zuse original 1:30 functional model extended height 2.7 m. zuse intended full construction reach height 120 envisioned use wind power generators radio transmission installations konrad zuse married gisela brandes january 1945 employing carriage dressed tailcoat top hat gisela wedding veil zuse attached importance noble ceremony son horst first five children born november 1945 zuse never became member nazi party known expressed doubts qualms working nazi war effort much later suggested modern times best scientists engineers usually choose either work less questionable business military interests faustian bargain pursuing line work according memoirs german computer pioneer heinz billing max planck institute physics published genscher düsseldorf meeting alan turing konrad zuse took place göttingen 1947 encounter form colloquium participants womersley turing porter england german researchers like zuse walther billing details see herbert bruderer konrad zuse und die schweiz retired focused hobby painting zuse atheist zuse died 18 december 1995 hünfeld hesse near fulda heart failure world war 2 zuse founded one earliest computer companies zuse-ingenieurbüro hopferau capital raised 1946 eth zurich ibm option zuse patents zuse founded another company zuse kg haunetal-neukirchen 1949 1957 company head office moved bad hersfeld z4 finished delivered eth zurich switzerland september 1950 time working computer continental europe second computer world sold beaten binac never worked properly delivered computers numbered leading z z43 built zuse company notable z11 sold optics industry universities z22 first computer memory based magnetic storage 1967 zuse kg built total 251 computers owing financial problems company sold siemens 1967 zuse also suggested universe running cellular automaton similar computational structure digital physics 1969 published book rechnender raum translated english calculating space idea attracted lot attention since physical evidence zuse thesis edward fredkin 1980s jürgen schmidhuber 1990s others expanded zuse received several awards work zuse institute berlin named honour konrad zuse medal gesellschaft für informatik konrad zuse medal zentralverband des deutschen baugewerbes central association german construction named zuse 100th anniversary birth computer pioneer celebrated exhibitions lectures workshops remember life work bring attention importance invention digital age movie revolves around world inside computer system features character named zuse presumably honour konrad zuse german posts dp ag issued commemorative stamp occasion june 6 2010 zuse portrait composed solely binary code numbers 1 0 fine print | [
512,
1952,
6950,
8262,
10953,
9804,
9932,
2798,
1776,
5585,
9330,
5946,
3323,
7421
] | Test |
6,037 | 2 | Target_Disk_Mode:target disk mode target disk mode sometimes referred tdm target mode boot mode unique macintosh computers mac supports target disk mode started 't key held operating system boot instead mac firmware enables drives behave scsi firewire thunderbolt and/or usb-c external mass storage device mac booted target mode attached port computer mac pc appear external device hard drives within target mac example formatted partitioned etc. exactly like external drive computers also make internal cd/dvd drives internal external peripheral hardware available host computer target disk mode useful accessing contents mac booted operating system target disk mode preferred form old-computer new-computer interconnect used apple migration assistant migration assistant supports ethernet wired wi-fi tdm neither supports usb however thunderbolt-to-firewire thunderbolt-to-gigabit-ethernet usb-3.0-to-gigabit-ethernet adapters option one computers firewire thunderbolt apple introduced disk mode access original powerbook 100 continued offer subsequent powerbook series firewire-equipped macs long requisite software appeared system rom mac could booted disk mode originally called scsi disk mode special cable scsi system cable allowed original powerbook series attach desktop mac external scsi disk unique system control panel powerbook used select non-conflicting scsi id number host mac also made possible select disk startup control panel boot change ide drives starting powerbook 150 190 apple implemented hd target mode essentially enabled scsi disk mode translating external scsi commands via ata driver officially reserved apple portables powerbooks exclusively supported disk mode except 140 145 145b 150 170 however scsi disk mode implemented unofficially macintosh external scsi port suspending startup process interrupt switch long internal drives chain set different ids active host system devices apple dropped scsi interface starting agp power mac g4 “ pismo ” powerbook g3 firewire target disk mode replaced earlier disk mode implementation also receiving official support beyond laptops subsequent macs built-in firewire thunderbolt supports target disk mode 12-inch retina macbook early 2015 one expansion port usb-c port supports charging external displays target disk mode using target disk mode macbook requires cable supports usb 3.0 usb 3.1 either usb-a usb-c connector one end usb-c connector end macbook target computer computer placed tdm must host computer computer target disk mode booted computer plugged merely needs meet requirements external mass storage device using bus question access native mac formatted partitions boot volume desired support correct version hierarchical file system classic mac os means firewire 2.3.3 later mac os 8.6 later required use firewire target host computer may run microsoft windows possible shortcomings read mac hfs-formatted partitions extra drivers macdrive transmac macdisk hfsexplorer necessary users also must ensure computer possesses appropriate interface hardware order physically connect mac target mode macdrive also read-only option prevent accidental editing computer target disk mode however mode set hfs/hfs+ disk mounted addition hfs drivers apple bootcamp also become possible macs running windows read write hfs partitions without purchase software users separated drivers main bootcamp install also install windows computers host computers running linux also able read write mac hfs hfs+ formatted devices target disk mode working out-of-the-box distributions hfs+ support part linux kernel however filesystems checked errors shrinking moving partitions preferred use mac os | [
11521,
2723,
6183,
6797,
8525,
7983,
5616,
5457,
6769,
147,
8114,
6165,
823,
2811,
1439
] | Test |
6,038 | 3 | MDMX:mdmx mdmx mips digital media extension also known madmax extension mips architecture released october 1996 microprocessor forum mdmx developed accelerate multimedia applications becoming popular common 1990s risc cisc systems mdmx defines new set thirty-two 64-bit registers called media registers mapped onto existing floating-point registers save hardware 192-bit extended product accumulator media registers hold two new data types octo byte ob quad half qh contain eight bytes 8-bit four halfwords 16-bit integers variants existing instructions operate data types performing saturating arithmetic logical shift compare align operations mdmx also introduced 19 instructions permutation manipulating bytes registers performing arithmetic accumulator accumulator access | [
8450,
2821,
1798,
4491,
6924,
4237,
9369,
9500,
2088,
9391,
8120,
8506,
1085,
8125,
8126,
833,
7234,
9541,
3142,
5326,
977,
2514,
5844,
9428,
8795,
2655,
1122,
7783,
10985,
9964,
5358,
9582,
8944,
499,
1399,
9976,
4603,
10620
] | Test |
6,039 | 9 | Java_Metadata_Interface:java metadata interface given metadata set descriptive structural administrative data group computer data example database schema java metadata interface jmi platform-neutral specification defines creation storage access lookup exchange metadata java programming language jmi specification developed java community process defined jsr 40 jsr formal document describe proposed specifications technologies adding java platform jmi based meta-object facility mof specification object management group omg mof metamodel model kind metadata used notably define unified modeling language uml supports exchange metadata xmi xmi standard exchanging metadata information via extensible markup language xml mof/xmi specifications used exchange uml models essentially jmi used write tools java manipulating uml models used model driven architecture and/or model driven development many implementations jmi including reference implementation unisys sap netweaver sun microsystems open-source implementation netbeans group jmi compatible java se 1.3 | [
4960,
9665,
6338,
8262,
5677,
6039,
7326
] | None |
6,040 | 4 | DerbyCon:derbycon derbycon computer security conference based louisville kentucky first derbycon took place 2011 founded martin bos dave kennedy alex kah adrian crenshaw conference held hyatt regency louisville typically late september january 14 2019 organizers announced derbycon 9.0 held september 2019 would last series citing increasing difficulty holding conferences face small yet vocal group people creating negativity polarization disruption derbycon common activities include along five parallel tracks also vendors tables games training village lockpick feature also included book publishers hardware vendors t-shirts printed | [
7449,
11435
] | Test |
6,041 | 3 | Dprobes:dprobes dprobes dynamic probes linux kernel analysis framework created 2004 features ability insert software probes dynamically running code based kprobes first versions released june 2004. dprobes first introduced suse linux enterprise server sles since 2006 commercial linux distributions headed towards systemtap chosen analysis mechanism | [
11506,
5222,
823
] | None |
6,042 | 7 | MTA_SZTAKI_Laboratory_of_Parallel_and_Distributed_Systems:mta sztaki laboratory parallel distributed systems laboratory parallel distributed systems lpds department mta sztaki research laboratory distributed grid cloud technologies lpds founding member hungarian grid competence centre hungarian national grid initiative hungarian opennebula community also coordinates several european grid/cloud projects mission lpds twofold one hand would like provide efficient software development tools high-level services together customizable scientific gateways hand lpds developing easy-to-maintain middleware solutions technologies interoperability enables cost-efficient alternative distributed grid cloud platforms scientific business applications lpds laboratory cooperation departments mta sztaki involved development sztaki cloud takes part cloud-based projects lpds cloud research focusing field infrastructure service iaas -based cloud systems make previously evolved products services lpds available cloud-based executing scalable transparent way guse grid cloud user support environment well-known permanently improving open source science gateway framework enables users convenient easy access grid cloud infrastructures developed support large variety user communities provides general purpose workflow-oriented graphical user interface create run workflows various distributed computing infrastructures including clusters grids desktop grids clouds guse framework used national grid initiatives ngis support small user communities afford develop customized science gateway p-grade portal liferay technology-based web portal guse accessed via major modern web browsers like chrome firefox etc supports development submission distributed applications executed computational resources various distributed computing infrastructures dcis including clusters service grids desktop grids clouds data avenue file commander tool data transfer enabling easy data moving various storage services various network protocols data avenue integrated ws-pgrade portlet goal sztaki cloud develop deploy institutional cloud infrastructure allows significant improvement traditional institutional infrastructure new cloud-based infrastructure significantly effective cost efficient former infrastructure built traditional conceptions individual specific servers sztaki desktop grid provides enterprise solution exploit pcs clusters located different sites company institute solving large scale distributed programs via easy-to-use application programming interface extended include clusters single powerful pcs hierarchically propagate work one desktop grid lpds participated national international grid cloud research projects since 2000 outstanding results area grid/cloud resources development high-level user interfaces field important result ws-pgrade/guse used several european grid made access grid cloud systems portal convenient user-friendly way additionally lpds participates big data management storage within field agricultural research ongoing projects participation lpds laboratory maintains comprehensive list projects lpds played active role providing grid cloud trainings europe worldwide national international trainings laboratory provides knowledge transfer targets new users industry well science lpds organized hosted summer schools trainings grid- cloud-related topics since 2005 head lpds prof. dr. péter kacsuk deputy head lpds dr. robert lovas 1 dsc 10 phds 20 full part-time members work laboratory english hungarian | [
4194,
5956,
8420,
8912,
8370,
5654,
4510
] | Train |
6,043 | 4 | Data_Security_Threats_Database:data security threats database data security threats database bdu russian federation national vulnerability database maintained russian federal service technical export control 2018 bdu contained roughly one-tenth number entries corresponding u.s. national vulnerability database | [
2558,
4626,
2446,
575
] | None |
6,044 | 2 | Whitix:whitix whitix desktop computer operating system written scratch x86 architecture matthew whitworth others project aims combine proven system technology unix-like kernel offering consistent clear interface new way navigate desktop operating system runs custom open source kernel written whitworth new features include icfs dynamic configuration filesystem replaces ioctl modular kernel whitix licensed gnu general public license fully preemptive multitasking kernel multithreading supports number filesystems including fat family filesystems ext3 journaling reiserfs iso9660 whitix available live cd download installed hard drive beginning version 0.2 userspace comprises native shell burn text editor fruity range ported applications c-based bsd-licensed software development kit available bindings various languages whitix contains posix compatibility library codice_1 aim full posix compliance whitix windowing environment xynth lightweight windowing environment developed alper akcan custom userspace software whitix consists range third party applications burn non-posix shell fruity simple text editor several filesystem utilities software ported whitix includes mono runtime environment c compiler python gnu compiler collection lua mplayer ports operating system self-hosting since october 2008 built gnu build chain 0.3 port gtk several linux applications planned whitix also adopts centralized approach userland configuration similar windows registry although widely used whitix software moment includes settings operating system software also linked whitix package management system currently development whitix supports several programming languages using utilities ported operating systems common collection utilities building whitix applications operating system programs found within gnu toolchain includes gnu compiler collection gcc gnu build system amongst others gcc provides compilers ada c c++ fortran whitix kernel designed built gcc ports languages python lua dynamic languages available ports .net languages also supported mono ported platform applications planned blaze platform built managed code development team issue releases ready however versions whitix declared stable general use latest release 0.2b released 1 march 2009 timing release depends stability features planned included although monthly release pattern minor versions improvements aim developers whitix.org | [
5413,
2345,
4777,
428,
7983,
9335,
499,
5363,
3197,
3573,
2199,
3960,
5397,
2045,
1150
] | Validation |
6,045 | 4 | In-session_phishing:in-session phishing in-session phishing form potential phishing attack relies one web browsing session able detect presence another session visit online banking website web browser launch pop-up window pretends opened targeted session pop-up window user believes part targeted session used steal user data way phishing attacks advantage in-session phishing attacker need targeted website compromised way relying instead combination data leakage within web browser capacity web browsers run active content ability modern web browsers support one session time social engineering user technique exploited vulnerability javascript handling major browsers found amit klein cto security vendor trusteer ltd subsequent security updates browsers may made technique impossible | [
2611,
119
] | None |
6,046 | 7 | Ntractive:ntractive ntractive privately held software development company based grand forks north dakota marketed business software small medium-sized companies established 2006 company main product elements crm mac crm customer relationship management application aimed small business use mac os x computers ipads iphones. elements crm cloud computing web application employed unique site-specific browser merge desktop web application functionality product first introduced public keynote address apple 2007 world wide developer conference official launch elements sbm products original name 1.0 took place macworld 2009 product renamed elements crm 2.0 release awarded honor apple staff pick july 2009 architecture overall development elements crm product line initially began 2003 company founder justin bartak company later founded january 2006 justin bartak dale jensen company specializing cloud computing mac crm customer relationship management apple hardware devices company elements crm platform part desktop part cloud powered webkit company ceased operations end 2016 mac customer relationship management mac crm approach managing company ’ interaction current future customers apple inc desktop computers ios devices mac crm solutions web-based applications use web browser interaction instead mac crm combination cloud based app built apple programming language objective-c swift programming language mac crms involve using apple devices technology organize automate synchronize sales marketing customer service technical support elements crm mac customer relationship management mac crm solution apple business offered subscription-based service elements crm part desktop part cloud main functions include managing leads contact information tracking communication history managing tasks follow ups tracking email communication creating estimates invoices managing projects elements crm ios universal mobile app iphone ipad ipad mini elements crm ios add-on elements crm desktop app ipad crm version elements crm ios looks works feels like desktop app iphone crm app limited version important functions desktop app elements crm mail email tracking tool works conjunction elements crm monitors user email server communication leads clients stored elements crm match found copy email stored elements crm within client record | [
4194,
2950,
10470,
1300,
7292,
4190
] | Test |
6,047 | 9 | Structure_and_Interpretation_of_Computer_Programs:structure interpretation computer programs structure interpretation computer programs sicp computer science textbook massachusetts institute technology mit professors harold abelson gerald jay sussman julie sussman known wizard book hacker culture teaches fundamental principles computer programming including recursion abstraction modularity programming language design implementation mit press published first edition 1985 second edition 1996 formerly used textbook mit introductory course electrical engineering computer science sicp focuses discovering general patterns solving specific problems building software systems make use patterns book describes computer science concepts using scheme dialect lisp also uses virtual register machine assembler implement lisp interpreters compilers several fictional characters appear book book licensed creative commons attribution sharealike 4.0 license book used textbook mit former introductory programming course 6.001 course replaced 6.0001 uses python schools also made use book course textbook used textbook mit large scale symbolic systems class 6.945 byte recommended sicp professional programmers really interested profession magazine said book easy read would expose experienced programmers old new topics sicp influential computer science education several later books inspired style | [
10752,
5635,
11269,
2056,
2062,
9231,
7184,
2577,
9749,
8728,
4633,
4122,
8226,
3119,
2105,
3132,
6717,
8258,
8771,
8262,
1613,
9299,
10324,
10841,
3675,
7267,
2660,
8293,
2666,
5751,
7805,
1159,
9865,
9877,
5783,
5803,
2225,
7867,
4799,
... | None |
6,048 | 2 | Label_(Mac_OS):label mac os labels macintosh operating systems type seven distinct colored parameters metadata attributed files folders disks operating system labels introduced system 7 kept release mac os 9 mac os x versions 10.0 10.2 lacked attribute reintroduced mac os x version 10.3 though without criticism labels macos let user give colored backgrounds system items three different types views action menu applicable selected icon older classic mac os versions choice color would cause icon completely wash color losing distinct traits process new label feature applies color background file names labeled item selected macos column view colored dot name indicates label choice seven colors easily exchanged colors names colors however changed represent categories assigned label colors label colors names customized classic mac os systems however mac os 8 9 provided functionality labels tab finder preferences dialog system 7 provided separate labels control panel labels mac os 9 earlier specific individual install booting another install another mac different disk would show different colors names unless set identically | [
576,
11171,
9700,
1542,
713,
6377,
9035,
4844,
3598,
5520,
8114,
5619,
213,
1592,
7163,
3324,
11037,
3167
] | None |
6,049 | 3 | OpenIndiana:openindiana openindiana free open-source unix operating system derived opensolaris based illumos developers forked opensolaris oracle corporation discontinued order continue development distribution source code openindiana project stewarded illumos foundation also stewards illumos operating system openindiana developers strive make de facto opensolaris distribution production servers security bug fixes required free charge project indiana originally conceived sun microsystems construct binary distribution around opensolaris source code base openindiana conceived negotiations takeover sun microsystems oracle proceeding order ensure continued availability development opensolaris-based os widely used uncertainty among opensolaris development community led developers form tentative plans fork existing codebase plans came fruition following announcement discontinuation support opensolaris project oracle formal announcement openindiana project made september 14 2010 jisc centre london first release operating system made available publicly time despite untested reason untested release openindiana team set launch date ahead oracle openworld order beat release solaris 11 express announcement openindiana met mainly positive response 350 people viewed online announcement iso image downloaded 2000 times twitter account obtained 500 followers numerous notable press websites wrote release broadcast bandwidth announcement substantial noted top 350mbit/second network package depot server experienced 20x much traffic interested distribution originally planned resulting threads later provisioned reporting positive online articles questioned relevance solaris given market penetration linux one article critical openindiana launch citing lack professionalism regard releasing untested build project lack commitment release schedule initial openindiana release advertised experimental directly based latest opensolaris development build preliminary opensolaris 2010 release opensolaris binary distribution moved solarisexpress real-time feed opensolaris updates discontinued concerns abounded would happen openindiana oracle decided stop feeding source code back community openindiana team mitigated concerns announced intention move source code feed illumos foundation concerns raised possible discontinuation free access oracle-owned compiler used produce openindiana response openindiana modified able compile open source gnu compiler collection hcl hardware compatibility list remains somewhat informal fragmented un-centralized requiring much end-user research hardware selection lack comprehensive centralized hcl follows fact opensolaris hcl hosted oracle server infrastructure server-side code device driver utility submission made available august 2012 founding project lead alasdair lumsden stepped project citing personal reasons frustration lack progress made project among reasons lack progress lack developers resources resignation lumsden wrote many us first open source project ever contributed included task hand vast ill equipped deal since resignation project developed team volunteers completely horizontal participative community effort september 2013 distrowatch review stated openindiana project seemingly steady decline last couple years review concluded openindiana progressed significantly state opensolaris five years may 2015 distrowatch review openindiana similarly concluded little major progress made system years review stated package selection hardware support seemed lag behind systems many system administration features either replicated ported linux bsd review concludes claims lack package support may mitigated fact 3500+ software packages provided openindiana hipster split several packages would artificially increase package count e.g like linux distributions image packaging system file-based package management providing incremental updates package facets making splitting unnecessary burden course first two years existence hipster project migrated updated 1500 packages maintains collection selected software packages relying third-party repositories like sfe add-ons extended selection pkgsrc system supported joyent readily provides 20000+ packages illumos systems openindiana fork technical sense continuation opensolaris spirit project intends deliver system v family operating system binary-compatible oracle products solaris 11 solaris 11 express however rather based os/net consolidation like opensolaris openindiana based illumos project use image packaging system ips package management system opensolaris openindiana codebase initially based majority publicly available code oracle case since oi_151a development builds based illumos september 2011 onwards project effectively moved away oracle-owned tools sun studio builds since 2013 including active hipster branch use gnu compiler collection gcc sole compiler illumos project built gcc since june 15 2012 first experimental release openindiana build 147 released september 14 2010 second experimental release build 148 released december 17 2010 first development release build 151 released september 14 2011 first release based upon illumos martux 151a0 released first sparc build openindiana build 151a7 intel/amd architectures released october 6 2012 build 151a8 released august 10 2013 opensxce 2013.01 sparc build 151a formerly martux released openindiana february 1 2013 second possibly last openindiana sparc build subsequent releases based upon dilos since development model inherited opensolaris project unsuitable community project hipster initiative created late 2013 reboot modernize openindiana hipster project fast development branch openindiana based rolling-release model horizontal contribution scheme oi-userland build system use continuous integration hipster actively maintained repository receives software updates well security fixes installation images published twice year every snapshot release announced via mailing list twitter first snapshot release delivered february 14 2014 subsequent snapshots based six-month development cycle notable features hipster list features updated development cycle roadmap page issue tracker | [
2179,
6787,
6412,
8077,
1422,
1813,
5397,
2967,
1304,
3487,
5280,
10016,
3241,
6445,
8621,
7983,
3248,
11184,
2995,
9141,
823,
9784,
7483,
6591,
9151,
9665,
10436,
8262,
5067,
463,
5078,
5335,
8539,
1632,
6369,
6371,
11363,
5356,
366,
881... | Test |
6,050 | 3 | ARM_Accredited_Engineer:arm accredited engineer arm accredited engineer aae program professional accreditations awarded arm holdings aae program designed computer software hardware engineers wishing validate knowledge arm technology program launched 2012 series events including arm techcon 2012 aae program consists number certifications syllabus assessed means separate one-hour multiple-choice exam aae program ended 2016 two accreditations currently available others launched next years http //ds.arm.com/developer-resources/arm-accredited-engineer-program/ aae entry-level accreditation first launched aae syllabus covers software-related aspects armv7 architecture specific focus cortex-a cortex-r profiles including applications processors real-time processors syllabus cover cortex-m systems aae certification aimed general embedded software systems developers broad knowledge arm technology syllabus covers following subject areas aame accreditation launched 16 september 2013 entry-level accreditation similar basic aae accreditation focused armv7 cortex-m profile accreditation aimed general embedded software engineers broad knowledge arm technology bias toward microcontrollers syllabus covers following subject areas following accreditations considered launch 2013 2016 aae program exams delivered prometric inc. supervised computer-based tests dedicated test platforms throughout network 10,000 authorized prometric test centers aptcs around world 70 multiple choice questions candidates given one hour complete test results issued instantly on-screen grades either pass fail letter percentage grades issued passing exam candidates also request paper certificate mailed | [
9964,
4773
] | Validation |
6,051 | 4 | David_Litchfield:david litchfield david litchfield born 1975 security expert united kingdom anne saita writing information security magazine called along brother mark litchfield world best bug hunters december 2003.also 2003 sister amelia litchfield born litchfield found hundreds vulnerabilities many popular products among outstanding discoveries products microsoft oracle ibm blackhat security briefings july 2002 presented exploit code demonstrate buffer overflow vulnerability discovered microsoft sql server 2000 six months later 25 january 2003 persons unknown used code template sql slammer worm several years vulnerability research litchfield made move oracle forensics documented perform forensic analysis compromised database server series white papers – oracle forensics parts 1 6 process researching developing open source tool called forensic examiner database scalpel f.e.d.s litchfield founded company named cerberus information security acquired stake july 2000 year half later founded next generation security software five colleagues stake author various software packages also many technical documents security issues author oracle hacker handbook co-author database hacker handbook shellcoder handbook sql server security also contributing author special ops david litchfield currently employed apple | [
736,
10340,
5512,
3704,
3323
] | Validation |
6,052 | 0 | Boris_Katz:boris katz boris katz born october 5 1947 chișinău moldavian ssr soviet union chișinău moldova principal american research scientist computer scientist mit computer science artificial intelligence laboratory massachusetts institute technology cambridge head laboratory infolab group research interests include natural language processing understanding machine learning intelligent information access brother victor kac mathematician mit able get ussr help u.s senator ted kennedy end cold war last several decades boris katz developing start natural language system allows user access various types information using english boris katz born october 5 1947 chișinău family hersh katz died 1976 hayki klara landman born 1921 lipcani briceni district died 2006 cambridge middlesex county moved lipcani town located northern bessarabian chișinău war graduated moscow state university november 1978 left united states thanks personal intervention senator edward m. kennedy defended thesis candidate physical mathematical sciences 1975 supervision evgenii m. landis currently lives boston heads infolabresearch team laboratory informatics artificial intelligence massachusetts institute technology boris katz creator start information processing system since 1993 internet author several works field processing generation perception natural languages machine learning accelerated access multimedia information brothers victor gershevich katz american mathematician professor massachusetts institute technology mikhail gershevich katz israeli mathematician graduate harvard columbia ph.d. 1984 universities professor bar-ilan university author monograph systolic geometry topology mathematical surveys monographs vol 137 american mathematical society providence 2007 daughter luba katz bioinformatics scientist husband alan jasanoff neuroimaging scientist professor mit son harvard university professors jay jasanoff sheila jasanoff | [
7780,
1783
] | Test |
6,053 | 3 | Ring_King:ring king ring king known pal regions king boxer known japan arcade boxing game published 1985 data east north america woodplace inc. pal regions game continues series theme comical sports player takes role boxer makes way debut become world champion ring king though perhaps unintentionally standard boxing creations era via providing quirky monikers opponents player encounters arcade release number eight 8 violence jo entry level fighter champion nes version brown pants white wolf bomba vern beat brown blue warker reigning champion arcade version green hante onetta yank assuming player wins championship arcade play continues cycling last afore-listed three blue warker green hante onetta yank player choose several different types punches defensive maneuvers along unique special attacks player revives stamina round interval pressing button rapidly boxer abilities determined three different stats punch stamina speed player improve stats using power points gained match performing well matches allows player create powerful boxers player save game progress recording password two players face two-player mode though game rudimentary possible counter-punch missing many punches causes boxer stamina decrease biggest characteristic game comical set special attacks moves activated player presses attack button right timing right distance attacks capability instantly knock opponent countered special attack causes extraordinary amount damage well first special attack powerful hook boxer throws spinning around like top second straight punch propels opponent ropes connects third type uppercut launches opponent straight air thrown right timing uppercut blast opponent straight ring resulting technical knockout ring king sales surpassed 250,000 copies november 1989 game later ported nintendo entertainment system famicom japan 1987 published data east north america namco japan version also released vs. unisystem vs. tko boxing sony later ported msx2 exclusively japan 1988 famicom msx2 versions released third game family sports game series family stadium family jocky famicom japan namco game later converted i-mode mobile phone application released exclusively january 2004 namco | [
9006
] | None |
6,054 | 4 | Colin_Robbins_(software_engineer):colin robbins software engineer colin robbins born 1964 network protocol software engineer credited research work distributed directory systems co-inventor ldap educated alleyn school holds bsc computer science electronic engineering first class honours university college london robbins developed quipu directory part iso development environment isode research assistant ucl working peter kirstein became custodian isode marshall rose 1991 quipu used prototype dixie dased merged invent ldap robbins wrote string representation standard attribute syntaxes element defined rfcs 1448 1778 published ietf robbins wrote part 3 steve kille book implementing x.400 x.500 pp quipu systems robbins technical architect vice-chairman europe-wide nameflow paradise directory world ’ largest distributed deployment x.500 also led electronic messaging association ema world directory challenge received ema distinguished service award 1997 led european electronic messaging association eema security challenge robbins awarded eema personality year 1998 robbins chartered institute directors serving boards nexor information assurance advisory council iaac sponsor member co-chair information assurance collaboration group iacg 2012-2014 water polo coach vice-chair nottingham leander swimming club | [
11456,
6110,
2359,
6648,
6651,
10238
] | None |
6,055 | 2 | Berry_Linux:berry linux berry linux live cd linux distribution english japanese support berry linux based compatible fedora 20 packages distribution primarily focused use live cd also installed live usb drive berry linux used try showcase linux educational purposes rescue system without need make changes hard disk current version 1.19 released berry includes read/write ntfs support aiglx beryl bundled 3d desktop effects berry also uses bootsplash giving graphical startup full version v1.12 includes runs linux kernel 3.0.4 alsa sound system acpi support selinux berry linux features automatic hardware detection support many graphics cards sound cards scsi usb devices many peripherals network devices automatically configured dhcp full version berry linux uses kde version 4.6.5 berry linux mini uses fluxbox window manager full version 512.7mb mini version 273.4mb test berry linux necessary install distribution hard disk operating system runs entirely cd-rom however possible install berry linux hard disk requires 1.7 gigabytes free space supporting japanese berry includes whiz sharp kana-kanji conversion system also comes libreoffice version 3.4.3 microsoft office compatible office suite well textmaker/planmaker berry office software gimp version 2.6.10 bundled graphics software berry includes media players audacious mplayer xine kaffeine dvd divx codecs installed default berry linux historical releases following | [
5380,
8837,
7435,
10127,
2193,
2321,
5397,
4887,
10394,
4637,
673,
3745,
10530,
9064,
9253,
10149,
11305,
7854,
561,
2738,
4790,
823,
439,
56,
59,
7483,
3903,
4673,
2375,
4039,
5067,
8907,
7375,
1110,
2134,
9693,
2914,
6371,
485,
3685,
... | Test |
6,056 | 2 | PRIMOS:primos primos operating system developed 1970s prime computer minicomputer systems rapidly gained popularity mid-1980s serious contender mainline minicomputer operating system advent pcs decline minicomputer industry prime forced market early 1990s end 2010 trademarks prime primos longer existed prime also offered customizable real-time os called rtos one feature primos like unix largely written high level language callable assembly language library functions available first language fortran iv odd choice pure computer science standpoint pointers if-then-else native string type etc fortran however language known engineers engineers big market prime early years unusual choice fortran os programming language people founded prime worked honeywell nasa project fortran language used nasa many mit honeywell time uninterested minicomputers left founded prime taking code developed hardware optimized run fortran including machine instructions directly implemented fortran distinctive 3-way branch operation since prime hardware perform byte addressing impetus create c compiler late models hardware eventually modified support i-mode programs compiled c. later around version 18 version pl/1 called pl/p became high level language choice within primos pl/p modula-2 languages used kernel furthermore new primos utilities written sp/l similar pl/p source code primos available customers thanks fortran pl/p customers could reasonably modify primos needed example around 1990 university salford uk modified primos running five 9955 systems undergraduates could longer use message command wrapped primos smsg call send messages undergraduates online chatting using command becoming rife tying terminals limited pool available messaging using command akin sms text messaging today except maximum 80 characters could sent per message early versions primos revision 6 originally called dos primos 2 later dosvm primos 3 starting primos 4 p400 system primos name stuck many major releases primos last official revision 24.0.0.r52 released july 3 1997 time company called peritus employed number ex-prime engineers maintaining primos revision 19 major portions primos written languages spl modula-2 usage prime macro assembler pma fortran iv pl/p declined considerably around time programs guaranteed run current prime processors subject sufficient resources available well subsequent prime processors versions primos ca 1977 later filesystem included distinctive construct known segment directory unlike traditional directories files anchored segment directory located using integer index effectively reducing searches directory simple hash function segment directories used keyed-index/direct access ki/da file access system later versions system loader indexed data could stored midas file multi-indexed data access system accessed via cobol fortran among third party tools package named queo powerful cobol despite less verbose primos character set basically ascii 8th bit inverted original 7-bit standard ascii left 8th bit unspecified commonly available teletype model 33 asr bit customarily set 1 became prime standard vital realize transferring data primos almost system time prime computer demise list languages supported primos included also available relatively uncommon late versions primos included scripting language cpl command processing language esri used basis platform-independent scripting languages aml arcinfo sml pc-arc/info step beyond already available via phantoms form unattended background processes immediately began run background initiated phantom command conventional batch jobs initiated via job command including ability schedule particular time primes main offerings covering specific need prime primenet software designed enable transparent access system network without burdening user extra commands primenet user system could access files system b system even log another system using rlogin remote login command released similar timing primenet 2780/3790 emulation included 1985 prime port unix system v called primix became available primos release 19.4.2 modified include unix functions co-existed primos allowing users switch back forth | [
512,
477,
6529,
2179,
9751,
11075,
8262,
7983,
5714,
2995,
5363,
6675,
6772,
8502,
9780,
7483,
2045,
6558
] | None |
6,057 | 2 | Dalvik_Turbo_virtual_machine:dalvik turbo virtual machine dalvik turbo proprietary alternative google implementation dalvik virtual machine runs android operating system platforms developed french/swiss firm myriad group virtual machine runs java platform compatible mobile devices runs applications converted compact dalvik executable .dex format suitable systems constrained terms memory processor speed mips technologies/imagination technologies entered license agreement myriad make dalvik turbo virtual machine vm available licensees part standard distribution android mips architecture myriad claims applications run dalvik turbo three times faster reducing battery drain giving developers power need create graphically intense games dalvik turbo shown video 2.8 times faster running benchmark test | [
4098,
8711,
8719,
7700,
4124,
9244,
11294,
1578,
5677,
8237,
1083,
7234,
6212,
69,
8262,
10316,
4685,
3664,
8280,
8285,
2658,
6247,
6250,
6252,
6253,
6256,
5237,
9851,
1670,
8327,
5262,
10393,
7835,
673,
8870,
1191,
196,
8907,
8413,
9949,... | Test |
6,058 | 3 | LibreELEC:libreelec libreelec short libre embedded linux entertainment center non-profit fork openelec open source software appliance enough linux distro kodi fork openelec announced march 2016 split openelec team creative differences taking active developers time join new libreelec project conservative fork openelec project stronger focus pre-release testing post-release change management | [
1700,
1674,
5612,
6380,
6797,
9806,
3664,
4432,
7602,
1107,
4147,
5363,
5397,
823,
4219,
8124
] | None |
6,059 | 4 | Trojan.WinLNK.Agent:trojan.winlnk.agent trojan.winlnk.agent also trojan win32/startpage.os definition kaspersky labs trojan downloader trojan dropper trojan spy first known detection goes back may 31 2011 according microsoft malware protection center trojanware opens internet explorer browser predefined page like i.163vv.com/ 96 trojan files lnk extension expression windows shortcut malicious file program folder lnk file family launches malicious executable may dropped malware files mostly used worms spread via usb drives i.e | [
7809,
131,
10756,
1417,
1994,
10392,
2041,
858,
7515
] | Test |
6,060 | 2 | Remote_Data_Services:remote data services remote data services rds formerly known advanced data connector adc microsoft technology used conjunction activex data objects ado allowed retrieval set data database server client altered way sent back server processing popular adoption transact-sql extends sql programming constructs loops conditional statements became less necessary eventually deprecated microsoft data access components version 2.7 microsoft produced soap toolkit 2.0 allows clients via open xml-based standard | [
736,
8262,
2183,
8607,
5225,
10413,
2901,
10486,
479
] | None |
6,061 | 9 | Aspect_weaver:aspect weaver aspect weaver metaprogramming utility aspect-oriented languages designed take instructions specified aspects isolated representations significant concepts program generate final implementation code weaver integrates aspects locations specified software pre-compilation step merging aspects classes representations structure entities program weaver generates woven class aspect weavers take instructions known advice specified use pointcuts join points special segments code indicate methods handled aspect code implementation aspect specifies whether related code added throughout related methods aspect weavers improve modularity keeping code one place would otherwise interspersed throughout various unrelated classes many programming languages already widely accepted understood however desire create radically different programming languages support aspect-oriented programming paradigm significant due business-related concerns risks associated adopting new technologies use entirely new language relies business ability acquire new developers additionally existing code base business would need discarded finally business would need acquire new toolchain suite tools development often expense money time primary concerns roadmaps adoption new technologies tend need train new developers adapt existing processes new technology address business concerns aspect weaver enables use widely adopted languages like java aspect-oriented programming minor adaptations aspectj work existing tools instead developing entirely new language aspect weaver interprets extensions defined aspectj builds woven java code used existing java compiler ensures existing object oriented code still valid aspect-oriented code development feel like natural extension object-oriented language aspectc++ programming language extends c++ use aspect weaver offering additional efficiency aspectj necessary embedded systems still retaining benefits aspect-oriented programming aspect weavers operate taking instructions specified aspects known advice distributing throughout various classes program automatically result weaving process set classes names original classes additional code injected classes functions automatically advice specifies exact location functionality injected code weaving process aspect weavers allow code would otherwise duplicated across classes eliminating duplication aspect weavers promote modularity cross-cutting concerns aspects define implementation code would otherwise duplicated use pointcuts join points define advice weaving aspect weaver uses pointcuts join points known pointcut designator identify positions candidate classes implementation injected implementation injected classes points identified thus permitting code executed appropriate times without relying manual duplication programmer programming language aspectj pointcuts join points modularized code defined aspect block similar java classes classes defined using java syntax weaving process consists executing aspect advice produce set generated classes aspect implementation code woven example right shows potential implementation aspect logs entry exit methods without aspect weaver feature would necessitate duplication code class every method instead entry exit code defined solely within aspect aspect weaver analyzes advice specified pointcut aspect uses advice distribute implementation code defined class code differs slightly method due slight variances requirements method method identifier changed aspect weaver determines appropriate code generate situation defined implementation advice injects methods matching specified pointcut instead generating set woven source code aspectj weavers instead weave aspects classes together directly bytecode acting aspect weaver compiler expected performance aspect weavers also perform compilation process require computation time due weaving process involved however bytecode weaving process produces efficient runtime code would usually achieved compiled woven source developments aspectj revealed potential incorporate just-in-time compilation execution aspect-oriented code address performance demands run-time aspect weaver could translate aspects efficient manner traditional static weaving approaches using aspectj java virtual machine dynamic weaving aspects run-time shown improve code performance 26 implementations just-in-time virtual machines implement capability new virtual machine implementations designed use features already exist current virtual machines requirement new virtual machine contrary one original design goals aspectj accomplish just-in-time weaving change virtual machine executes compiled bytecode necessary proposed solution aspectj uses layered approach builds upon existing java virtual machine add support join point management callbacks dynamic aspect-oriented programming engine alternative implementation uses weaving engine uses breakpoints halt execution pointcut select appropriate method embed application continue use breakpoints manner shown reduce performance due large number context switches aspect weavers performance well performance code produce subject analysis preferable improvement modularity supplied aspect weaving impact run-time performance aspect weavers able perform aspect-specific optimizations traditional optimizations elimination unused special variables aspect code done compile-time optimizations performed aspect weaver example aspectj contains two similar distinct keywords codice_1 contains information particular instance woven code codice_2 contains information common instances code relevant set advice optimization replacing codice_1 efficient static keyword codice_2 done aspect weaver performing replacement woven program avoids creation join point object every execution studies shown unnecessary creation join point objects aspectj lead performance overhead 5 run-time performance degradation approximately 1 object created compile-time performance generally worse aspect weavers traditional compiler counterparts due additional work necessary locating methods match specified pointcuts study done showed aspectj compiler ajc 34 slower sun microsystems java 1.3 compiler 62 slower java 1.4 compiler | [
1952,
8609,
9665,
6403,
8262,
5896,
5677,
8173,
2936,
2556
] | None |
6,062 | 6 | Universal_Disk_Format:universal disk format universal disk format udf profile specification known iso/iec 13346 ecma-167 open vendor-neutral file system computer data storage broad range media practice widely used dvds newer optical disc formats supplanting iso 9660 due design well suited incremental updates recordable writable optical media udf developed maintained optical storage technology association osta normally authoring software master udf file system batch process write optical media single pass packet writing rewritable media cd-rw udf allows files created deleted changed on-disc general-purpose filesystem would removable media like floppy disks flash drives also possible write-once media cd-r case space occupied deleted files reclaimed instead becomes inaccessible multi-session mastering also possible udf though implementations may unable read disks multiple sessions optical storage technology association standardized udf file system form common file system optical media read-only media re-writable optical media first standardized udf file system aimed replace iso 9660 allowing support read-only writable media release first version udf dvd consortium adopted official file system dvd-video dvd-audio multiple revisions udf released udf revisions internally encoded binary-coded decimals revision 2.60 example represented 0x0260 addition declaring revision compatibility volume defined minimum read minimum write revisions signalling requirements operations possible every structure image maximum write revision additionally records highest udf support level implementations written image example udf 2.01 volume use stream files introduced udf 2.00 uses vat udf 1.50 created udf 2.60-capable implementation may revision declared 0x0201 minimum read revision set 0x0150 minimum write 0x0150 maximum write 0x0260 udf standard defines three file system variations called builds introduced first version standard format used type disk allows random read/write access hard disks dvd+rw dvd-ram media metadata v2.50 file data addressed less directly writing disk format physical block disk may chosen allocation new updated files since basic format practically operating system file system driver claiming support udf able read format write-once media dvd-r cd-r limitations written physical block written writing must happen incrementally thus plain build udf written cd-rs pre-mastering data writing data one piece media similar way iso 9660 file system gets written cd media enable cd-r used virtually like hard disk whereby user add modify files cd-r so-called drive letter access windows osta added vat build udf standard revision 1.5 vat additional structure disc allows packet writing remapping physical blocks files data disc modified deleted write-once media entire disc virtualized making write-once nature transparent user disc treated way one would treat rewritable disc write-once nature cd-r dvd-r media means file deleted disc file data still remains disc appear directory still occupies original space stored eventually using scheme time disc full free space recovered deleting files special tools used access previous state disc state delete occurred making recovery possible drives fully implement version 1.5 higher udf may therefore unable handle vat builds rewriteable media dvd-rw cd-rw fewer limitations dvd-r cd-r media sectors rewritten random though packets time media erased entirely time making disc blank ready writing new udf file system e.g. iso 9660 cd audio however sectors -rw media may wear meaning data becomes unreliable rewritten often typically hundred rewrites cd-rw plain vat builds udf format used rewriteable media limitations plain build used -rw media file-system level modification data must allowed would quickly wear often-used sectors disc directory block allocation data would go unnoticed lead data loss allow modification files disc rewriteable discs used like -r media using vat build ensures blocks get written successively ensuring blocks get rewritten often others way rw disc erased reused many times become unreliable however eventually become unreliable easy way detecting using vat build cd-rw/dvd-rw media effectively appears cd-r dvd+/-r media computer however media may erased time spared build added revision 1.5 address particularities rewriteable media build adds extra sparing table order manage defects eventually occur parts disc rewritten many times table keeps track worn-out sectors remaps working ones udf defect management apply systems already implement another form defect management mount rainier mrw optical discs disk controller hard drive tools drives fully support revision 1.5 udf ignore sparing table would lead read outdated worn-out sectors leading retrieval corrupted data udf specifications allow one character set osta cs0 store unicode code point excluding u+feff u+fffe additional character sets defined ecma-167 used since errata dcn-5157 range code points expanded code points unicode 4.0 newer older version includes supplementary multilingual plane characters dcn-5157 also recommends normalizing strings normalization form c. osta cs0 character set stores 16-bit unicode string compressed 8-bit 16-bit units preceded single-byte compid tag indicate compression type 8-bit storage functionally equivalent iso-8859-1 16-bit storage utf-16 big endian reference algorithm neither checks forbidden code points interprets surrogate pairs due dcn-5157 unicode string needs interpreted utf-16 represent plane 1–16 code points emoji many dvd players support udf revision version 1.02 discs created newer revision may still work players iso 9660 bridge format used even operating system claims able read udf 1.50 still may support plain build necessarily either vat spared udf builds mac os x 10.4.5 claims support revision 1.50 see man mount_udf yet mount disks plain build properly provides virtualization support mount udf disks vat seen sony mavica issue releases 10.4.11 mount disks sparing table read files correctly version 10.4.11 fixes problem similarly windows xp service pack 2 sp2 read dvd-rw discs use udf 2.00 sparing tables defect management system problem occurs udf defect management system creates sparing table spans one sector dvd-rw disc windows xp sp2 recognize dvd using udf windows explorer displays contents dvd empty folder hotfix available included service pack 3 | [
5120,
2564,
11270,
5643,
6669,
3598,
4624,
10257,
9236,
6677,
5142,
8214,
537,
3611,
540,
5661,
3102,
9249,
9762,
8227,
8740,
5158,
7720,
1577,
10281,
2101,
7225,
11323,
10812,
62,
3648,
10306,
8772,
10310,
1098,
7754,
8266,
4173,
4174,
5... | None |
6,063 | 3 | Interrupt_priority_level:interrupt priority level interrupt priority level ipl part current system interrupt state indicates interrupt requests currently accepted ipl may indicated hardware registers programmable interrupt controller software bitmask integer value source code threads integer based ipl may small single bit two values 0 interrupts enabled 1 interrupts disabled mos technology 6502 however architectures permit greater range values value enables interrupt requests specify higher level blocking ones lower level assigning different priorities interrupt requests useful trying balance system throughput versus interrupt latency kinds interrupts need responded quickly others amount processing might large makes sense assign higher priority kind interrupt control interrupt level also used synchronize access kernel data structures thus level-3 scheduler interrupt handler would temporarily raise ipl 7 accessing actual scheduler data structures lower back 3 actually switching process contexts however allowed interrupt handler lower ipl entered since could destroy integrity synchronization system course multiprocessor systems add complications addressed regardless hardware might support typical unix-type systems make use two levels minimum interrupts disabled maximum interrupts enabled example one elaborate ipl-handling systems ever deployed vax computer associated vms operating system supports 32 priority levels 0 31 priorities 16 requests external hardware values 16 available software interrupts used internally operating system schedule activities values actually used important ones alpha hardware contains native support ipls openvms ported itanium 2001 ipl scheme simulated using features provided itanium hardware | [
3142,
3272,
4553,
5457,
5823,
5523,
7281,
11604,
823,
3615
] | Test |
6,064 | 4 | Mutual_authentication:mutual authentication mutual authentication two-way authentication refers two parties authenticating time default mode authentication protocols ike ssh optional others tls default tls protocol proves identity server client using x.509 certificate authentication client server left application layer tls also offers client-to-server authentication using client-side x.509 authentication requires provisioning certificates clients involves less user-friendly experience rarely used end-user applications mutual tls authentication mtls much widespread business-to-business b2b applications limited number programmatic homogeneous clients connecting specific web services operational burden limited security requirements usually much higher compared consumer environments mutual authentication machine-to-machine leaving chance whether users notice care remote authentication fails e.g red address bar browser padlock wrong domain name non-technical mutual-authentication also exists mitigate problem requiring user complete challenge effectively forcing notice blocking authenticating false endpoint mutual authentication two types | [
4874,
6794,
10908,
3742,
10915,
7338,
10801,
2483,
5433,
957,
6975,
3521,
6220,
6098,
2274,
10341,
11244,
4722,
6904,
2558,
4863
] | Test |
6,065 | 3 | SEX_(computing):sex computing computing sex assembly language mnemonic often used codice_1 machine instruction found motorola 6809 computer cpu sex also mean endianness computer architecture used x86 computers byte sex hc11 computers example functions sometimes needed computers different endianness communicate internet protocols often use big endian byte coding default rca 1802 series microprocessors sex codice_2 instruction used designate machine sixteen 16-bit registers x index register tla sex humorously said stand software exchange meaning copying software file sharing sometimes spread computer viruses stated “ illicit sex transmit viral diseases computer. ” involvement ftp servers /pub directories process led name explained contraction 'pubic | [
7364,
9932,
499,
7739,
477
] | Test |
6,066 | 4 | Mary_D'Imperio:mary d'imperio mary d'imperio american cryptographer introduced problem voynich manuscript john tiltman 1975 written several books journal articles manuscript include 'the voynich manuscript elegant enigma 'the voynich manuscript scholarly mystery 'an application cluster analysis multiple scaling question hands languages voynich manuscript d'imperio degrees comparative philology classics radcliffe college graduated magna cum laude structural linguistics university pennsylvania elected member phi beta kappa radcliffe 1950 according 1976 introduction vera filby career government since 1951 linguist cryptanalyst thinks mainly computer programmer 1960 1962 d'imperio created temac text macro compiler language processing text 1987 2006 frequent contributor north american breeding bird survey reports father philadelphia sculptor dominic d'imperio | [
1941
] | Test |
6,067 | 9 | Java_Management_Extensions:java management extensions managing monitoring applications designed developed using java dynamic management kit jsr 003 java community process defined jmx 1.0 1.1 1.2 jmx 2.0 developed jsr 255 jsr subsequently withdrawn jmx remote api 1.0 remote management monitoring specified jsr 160 extension jmx remote api web services developed jsr 262 adopted early j2ee community jmx part j2se since version 5.0 jmx trademark oracle corporation jmx uses three-level architecture applications generic consoles jconsole mc4j domain-specific monitoring applications external applications interact mbeans use jmx connectors protocol adapters connectors serve connect agent remote jmx-enabled management application form communication involves connector jmx agent connector client management application protocol adapters provide management view jmx agent given protocol management applications connect protocol adapter usually specific given protocol managed bean sometimes simply referred mbean type javabean created dependency injection managed beans particularly used java management extensions technology java ee 6 specification provides detailed meaning managed bean mbean represents resource running java virtual machine application java ee technical service transactional monitor jdbc driver etc. used collecting statistics concerns like performance resources usage problems pull getting setting application configurations properties push/pull notifying events like faults state changes push java ee 6 provides managed bean bean implemented java class called bean class top-level java class managed bean defined managed bean java ee technology specification example javaserver faces technology specification meets following conditions special declaration annotation required define managed bean mbean notify mbeanserver internal changes attributes implementing codice_3 application interested mbean changes registers listener codice_4 mbeanserver note jmx guarantee listeners receive notifications two basic types mbean additional types open mbeans model mbeans monitor mbeans open mbeans dynamic mbeans rely basic data types self-explanatory user-friendly model mbeans dynamic mbeans configured runtime generic mbean class also provided dynamically configuring resources program runtime mxbean platform mbean special type mbean reifies java virtual machine subsystems garbage collection jit compilation memory pools multi-threading etc mlet management applet utility mbean load instantiate register mbeans mbeanserver xml description format xml descriptor jmx supported various levels different vendors | [
2304,
7042,
9988,
4358,
4233,
3341,
910,
7187,
10526,
6433,
8609,
2596,
10020,
5031,
5677,
5047,
2106,
6074,
4668,
3517,
3133,
3518,
3008,
5567,
6334,
9665,
10683,
11582,
7878,
1095,
6860,
3278,
3920,
1363,
3545,
1756,
479,
4959,
4960,
12... | None |
6,068 | 5 | VB5_interface:vb5 interface vb5 set protocols define interface broadband user access node service node broadband equivalent v5 interface member broadband isdn architecture | [
10626
] | None |
6,069 | 2 | Mode_setting:mode setting mode setting software operation activates display mode screen resolution color depth refresh rate computer display controller kernel mode-setting kms display mode set kernel user-space mode-setting ums display mode set userland process kernel mode-setting flexible allows displaying error case fatal system error kernel even using user-space display server user-space mode setting would require superuser privileges direct hardware access kernel-based mode setting shuns requirement user-space graphics server microsoft windows versions nt-based use kernel mode setting kernel error display made possible kernel mode setting officially called bug check commonly known blue screen death linux kernel got prerequisite kernel-based mode setting accepting intel gem version 2.6.28 released december 2008 replaced tungstens graphics ttm translation table maps memory manager supports gem api ttm developed free open-source drivers radeon s3 graphics graphic chipsets see free open-source graphics device driver support intel gma graphic chipsets accepted version 2.6.29 released march 23 2009 support pre-r600 ati radeon graphics cards accepted version 2.6.31 released september 9 2009 support r600 r700 development within drm merged version 2.6.32 support evergreen r800 merged version 2.6.34 nvidia release needed documentation graphics chip development proceeded nouveau project uses reverse engineering build working open-source driver nvidia cards nouveau accepted version 2.6.33 kernel released december 10 2009 kernel-based mode setting supported nouveau driver required wayland compositors e.g weston kmscon depend kernel mode setting via ioctl freebsd support kernel-based mode setting gem later generations intel gpus ironlake sandybridge ivybridge starting version 9.1 netbsd support kernel-based mode setting accelerated graphics intel radeon devices implementation introduced version 7.0 porting linux 3.15 drm/kms code openbsd kernel-based mode setting support intel radeon gpus starting version 5.4 openbsd support intel gpus available release version 5.5 implementation extended add support radeon chipsets well following alternatives presented linux plumbers conference 2013 | [
2594,
9604,
11322,
4902,
4423,
5386,
6797,
8976,
7442,
3162,
10971,
4636,
10173
] | None |
6,070 | 9 | Logical_framework:logical framework logic logical framework provides means define present logic signature higher-order type theory way provability formula original logic reduces type inhabitation problem framework type theory approach used successfully interactive automated theorem proving first logical framework automath however name idea comes widely known edinburgh logical framework lf several recent proof tools like isabelle based idea unlike direct embedding logical framework approach allows many logics embedded type system logical framework based general treatment syntax rules proofs means dependently typed lambda calculus syntax treated style similar general per martin-löf system arities describe logical framework one must provide following summarized case lf logical framework meta-language λπ-calculus system first-order dependent function types related propositions types principle first-order minimal logic key features λπ-calculus consists entities three levels objects types kinds type classes families types predicative well-typed terms strongly normalizing church-rosser property well-typed decidable however type inference undecidable logic represented lf logical framework judgements-as-types representation mechanism inspired per martin-löf development kant notion judgement 1983 siena lectures two higher-order judgements hypothetical formula_1 general formula_2 correspond ordinary dependent function space respectively methodology judgements-as-types judgements represented types proofs logical system formula_3 represented signature assigns kinds types finite set constants represents syntax judgements rule schemes object-logic rules proofs seen primitive proofs hypothetico-general judgements formula_4 implementation lf logical framework provided twelf system carnegie mellon university twelf includes | [
6306,
7394,
5796,
4455,
11034,
5213,
4670
] | Test |
6,071 | 3 | Sun_Fire_T2000:sun fire t2000 sun fire t2000 server code named ontario system engineered sun microsystems applications including web 2.0 databasing part sun fire line t2000 among first servers leverage sun coolthreads processing technology improves energy-efficiency systems introduced december 2005 sun t2000 reached end life eol november 2009 t2000 powered four-core six-core eight-core ultrasparc t1 processor supports 64 gib ecc ddr2 sdram system memory using 16 dimm slots 584 gigabytes internal storage serial attached scsi drives infoworld noted system light class 3.5 inches tall 16.7 inches wide 24.4 inches deep weighs 40 pounds t2000 offered sun preloaded solaris 10 operating system | [
6033,
9665,
597,
8863
] | Test |
6,072 | 3 | James_A._Kahle:james a. kahle jim kahle ibm fellow chief architect many ibm power microprocessors mr. kahle born venezuela father worked oil business received b.s degree rice university 1983 working ibm since early 1980s risc-based microprocessors work started physical design tools currently concentrated risc architecture 20 years experience chip design 160 patents key defining power architecture superscalar microprocessor designs ibm forefront developing multicore designs asymmetric multiprocessors smt microarchitectures key designer rios processor launched rs/6000 family workstations servers one founders somerset design center birthplace powerpc architecture project manager powerpc 603 subsequent designs like powerpc 750 also chief architect power4 core later director technology sti design center cell technology austin texas | [
9472,
643,
3846,
398,
6815,
9126,
6311,
306,
7218,
10675,
8120,
1985,
3025,
6738,
342,
1115,
859,
4060,
3677,
9445,
8937,
10985,
4587,
5235,
6004,
2293,
8700,
1784,
3323,
6268,
6909
] | Test |
6,073 | 7 | Radek_Maneuver:radek maneuver radek maneuver scale-up-then-scale-down tactic used administration web services specifically deployed cloud computing paradigm provider e.g amazon elastic compute cloud microsoft azure developed olivier radek dabrowski mid-2010 radek maneuver originally conceived using maintaining applications running paas system radek maneuver consists series steps usually executed via paas web portal interface tactic used service misbehaving otherwise experiencing errors suspected cause underlying cloud layer rather application layer includes networking issues bad box problems steps follows scale-up-scale-down method understood shift application different physical machine underlying paas service application virtual machine layer cloud computing stack generally access application developer instead hands cloud provider maneuver allows troubleshooting dodging errors layer | [
4194,
10020,
1935
] | Validation |
6,074 | 9 | Apache_Groovy:apache groovy apache groovy java-syntax-compatible object-oriented programming language java platform static dynamic language features similar python ruby perl smalltalk used programming language scripting language java platform compiled java virtual machine jvm bytecode interoperates seamlessly java code libraries groovy uses curly-bracket syntax similar java groovy supports closures multiline strings expressions embedded strings much groovy power lies ast transformations triggered annotations groovy 1.0 released january 2 2007 groovy 2.0 july 2012 since version 2 groovy compiled statically offering type inference performance near java groovy 2.4 last major release pivotal software sponsorship ended march 2015 groovy 2.5.8 latest stable version groovy groovy since changed governance structure project management committee apache software foundation james strachan first talked development groovy blog august 2003 march 2004 groovy submitted jcp jsr 241 accepted ballot several versions released 2004 2006 java community process jcp standardization effort began version numbering changed version called 1.0 released january 2 2007 various betas release candidates numbered 1.1 december 7 2007 groovy 1.1 final released immediately renumbered groovy 1.5 reflect many changes made 2007 groovy first prize jax 2007 innovation award 2008 grails groovy web framework second prize jax 2008 innovation award november 2008 springsource acquired groovy grails company g2one august 2009 vmware acquired springsource april 2012 eight years inactivity spec lead changed status jsr 241 dormant strachan left project silently year groovy 1.0 release 2007 oct 2016 strachan stated still love groovy jenkins pipelines groovy java go typescript kotlin july 2 2012 groovy 2.0 released among new features added static compiling static type checking pivotal software joint venture spun-off emc corporation emc vmware april 2013 groovy grails formed part product portfolio pivotal ceased sponsoring groovy grails april 2015 month groovy changed governance structure codehaus repository project management committee pmc apache software foundation via incubator groovy graduated apache incubator became top-level project november 2015 valid java files also valid groovy files although two languages similar groovy code compact need elements java needs makes possible java programmers learn groovy gradually starting familiar java syntax acquiring groovy programming idioms groovy features available java include static dynamic typing keyword codice_1 operator overloading native syntax lists associative arrays maps native support regular expressions polymorphic iteration string interpolation added helper methods safe navigation operator codice_2 check automatically null pointers example codice_3 codice_4 since version 2 groovy also supports modularity able ship needed jars according project needs thus reducing size groovy library type checking static compiling project coin syntax enhancements multicatch blocks ongoing performance enhancements using codice_5 instruction introduced java 7 groovy provides native support various markup languages xml html accomplished via inline document object model dom syntax feature enables definition manipulation many types heterogeneous data assets uniform concise syntax programming methodology unlike java groovy source code file executed uncompiled script contains code outside class definition class main method runnable groovytestcase groovy script fully parsed compiled generated executing similar perl ruby occurs hood compiled version saved artifact process groovybeans groovy version javabeans groovy implicitly generates getters setters following code codice_6 codice_7 implicitly generated last two lines appear access color directly actually calling implicitly generated methods groovy offers simple consistent syntax handling lists maps reminiscent java array syntax groovy offers support prototype extension codice_8 extension modules groovy 2 objective-c-like categories codice_9 codice_8 offers domain-specific language dsl express changes class easily similar ruby open class concept groovy changes code prototyping visible java since attribute/method invocation groovy goes metaclass registry changed code accessed java going metaclass registry groovy also allows overriding methods codice_11 codice_12 among others enabling developer intercept calls object specify action simplified aspect-oriented way following code enables class codice_13 respond codice_14 property grails framework uses metaprogramming extensively enable gorm dynamic finders like codice_15 others groovy syntax permits omitting parentheses dots situations following groovy code written enabling development domain-specific languages dsls look like plain english although groovy mostly object-oriented language also offers functional programming features according groovy documentation closures groovy work similar 'method pointer enabling code written run later point time groovy closures support free variables i.e variables explicitly passed parameter exist declaration context partial application terms 'currying delegation implicit typed untyped parameters working collections determined type closure passed operation collection inferred group expressions written closure block without reference implementation responding object assigned later point using delegation usually called partial application groovy feature allows closures parameters set default parameter arguments creating new closure bound value supplying one argument codice_16 method fix argument one supplying n arguments fix arguments 1 .. n. curry also used reverse direction fixing arguments n n 1 using codice_17 groovy also supports lazy evaluation reduce/fold infinite structures immutability among others javascript object notation json xml processing groovy employs builder pattern making production data structure less verbose example following xml generated via following groovy code also processed streaming way codice_18 change implementation json codice_19 swapped codice_20 parse search functional language groovy codice_21 method serve groovy strings interpolated variables expressions using gstrings gstrings containing variables expressions must declared using double quotes complex expression must enclosed curly brackets prevents parts interpreted belonging surrounding string instead expression expression evaluation deferred employing arrow syntax according groovy documentation groovy compiler compiles groovy scripts classes point process source code end represented memory form concrete syntax tree transformed abstract syntax tree purpose ast transformations let developers hook compilation process able modify ast turned bytecode run jvm ast transformations provides groovy improved compile-time metaprogramming capabilities allowing powerful flexibility language level without runtime performance penalty examples asts groovy among others according groovy documentation traits structural construct language allows composition behaviors runtime implementation interfaces behavior overriding compatibility static type checking/compilation traits seen interfaces carrying default implementations state trait defined using trait keyword used like normal interface using keyword codice_22 traits allow wide range abilities simple composition testing notable examples groovy adoption include many integrated development environments ides text editors support groovy one alternative implementation groovy | [
7176,
6153,
2576,
6161,
1047,
8217,
9245,
8739,
11303,
5677,
2045,
9780,
1591,
572,
9789,
6718,
7742,
7233,
7750,
8262,
595,
84,
6228,
7261,
8799,
2658,
102,
10854,
1130,
8810,
2163,
3705,
1657,
8825,
7292,
3712,
9345,
1673,
10377,
6797,
... | None |
6,075 | 2 | TRIPOS:tripos tripos trivial portable operating system computer operating system development started 1976 computer laboratory cambridge university headed dr. martin richards first version appeared january 1978 originally ran pdp-11 later ported computer automation lsi4 data general nova work motorola 68000 version started 1981 university bath metacomco acquired rights 68000 version continued development tripos chosen commodore amiga march 1985 form part operating system new computer also used cambridge part cambridge distributed computing system july 1985 amiga introduced incorporating tripos amigados module amigaos amigados included command line interface amiga file system entire amigados module originally written bcpl ancestor c programming language language used write tripos amigados would later rewritten c amigaos 2.x onwards retaining backwards compatibility 1.x amigaos 4 completely rewritten c amigados abandoned bcpl legacy tripos provided features pre-emptive multi-tasking using strict-priority scheduling hierarchical file system multiple command line interpreters important tripos concepts non-memory-management approach meaning checks performed stop programs using unallocated memory message passing means passing pointers instead copying message contents two concepts together allowed sending receiving 1250 packets per second 10 mhz motorola 68010 cpu tripos implemented bcpl kernel device drivers implemented assembly language one notable feature tripos/bcpl cultural use shared libraries untypical time resulting small therefore fast loading utilities example many standard system utilities well 0.5 kbytes size compared typical minimum 20 kbytes functionally equivalent code modern unix linux tripos ported number machines including data general nova 2 computer automation lsi4 motorola 68000 intel 8086- based hardware included support cambridge ring local area network recently martin richards produced port tripos run linux using cintcode bcpl virtual machine january 2019 tripos still actively maintained open g ltd. formerly misys financial systems worcestershire uk many british insurance brokers linux/intel based tripos system serving networked workstations tcp/ip connection systems used run open g brooms application suite open g added number features support modern office ability integrate many mainstream applications services sql server citrix xenapp terminal servers etc following list commands supported tripos cli cintpos experimental interpretive version tripos runs cintcode bcpl virtual machine also developed martin richards | [
2560,
6155,
6675,
7187,
9236,
10776,
25,
1561,
2073,
4637,
9249,
9762,
4643,
6180,
7217,
10803,
10809,
576,
2625,
8262,
5709,
6221,
3160,
6233,
10333,
97,
11363,
7269,
6760,
10856,
11370,
9835,
5743,
7285,
4727,
9335,
634,
1147,
3197,
115... | Test |
6,076 | 4 | IID_(company):iid company iid previously internet identity privately held internet security company based tacoma washington united states iid acquired all-cash transaction infoblox february 8 2016 primarily provides cyberthreat data platform exchange cyberthreat data anti-phishing malware domain control security services us federal government agencies financial service firms e-commerce social networking internet service provider isp companies microsoft uses iid data feed anti-phishing software well partner domain defense program customers include becu boeing employees ’ credit union monster.com yakima valley credit union iid founded 1996 providing outsourced domain management services 1997 company claims discovered disabled one earliest phishing attacks since iid ’ business revolved around protecting companies cyber attacks 2013 iid accepted first round institutional funding 8 million bessemer venture partners iid acquired all-cash transaction infoblox february 8 2016 activetrust iid ’ threat intelligence management system company claims gets threat data thousands sources determines data useful defend cyberattacks activetrust feeds data fortune 500 companies ’ u.s. government agencies ’ cybersecurity appliances leading iid claim activetrust world ’ largest commercial cyberthreat data exchange provides list latest malicious compromised ip addresses domains e-mail accounts identifies bad players organization connected extended enterprise activetrust data formerly known activeknowledge iid ’ threat intelligence team investigates analyzes validates threat data identify patterns trends revealing ongoing attacks future hazards ti team takes shared data activetrust uses filtering analysis add structure context detects diagnoses mitigates dns domain name system security configuration issues organization extended enterprise tool reportedly helped iid identify dns hijacking twitter december 2009 also reportedly helped find half fortune 500 companies infected dnschanger provides anti-phishing malware security solutions help organizations ensure online brands trusted mitigation formerly known activecontrol power shark iid holds leadership positions various security industry groups including anti-phishing working group apwg internet corporation assigned names numbers icann messaging anti-abuse working group maawg | [
7515,
507,
3941,
8054
] | Test |
6,077 | 3 | Hydlide:hydlide april 28 1995 remake released sega saturn title virtual hydlide japan western countries kingdom fairyland three magic jewels enshrined palace maintain peace kingdom one day evil man broke palace stole one three magic jewels without third jewel two remaining jewels lost magic sparkle magic spell sealed power varalys vicious demon kingdom broken turmoil followed last two jewels stolen varalys cast special magic princess ann turning three fairies hid somewhere kingdom let loose horde monsters across land became ruler kingdom young knight jim stood took action restore peace kingdom bravely made way wilderness full armor fight monsters ... game created e soft tokohiro naito idea behind hydlide mix together action rpg elements new action rpg genre inspired tower druaga black onyx said black onyx direct influence hydlide design leans towards action rather role-playing hydlide essentially took tower druaga formula colorful open world added rpg mechanics naito noted completely unaware western role-playing games like ultima wizardry developing hydlide never used apple ii said became aware two japanese action rpg projects dragon slayer courageous perseus reading magazine hydlide development shocked find hydlide attempt concept underestimated dragon slayer felt threatened courageous perseus believing latter visually impressive courageous perseus turned successful whereas dragon slayer went become hydlide biggest competitor subsequent sequels hydlide initially well-received considered innovator released japan back 1984 hydlide one first action role-playing games along courageous perseus dragon slayer hydlide also early open world game rewarding exploration open world environment also ability switch attack mode defense mode quick save load options used moment game introduction health regeneration mechanic health slowly regenerates standing still sold 2 million copies japan including 1 million home computers including pc-88 pc-98 pc-66 sharp x1 fm7 msx msx2 mz-2000 1 million famicom console first computer game receive platinum award toshiba emi million sales however failed capture attention beyond japan game influential action rpg genre including titles ys example ys uses similar health-regeneration mechanic recharging health mechanic first introduced hydlide 1984 would decades later become common mechanic widely used many video games including shooter games halo hydlide open world game design inspired hideo kojima designed metal gear solid v captures open-world feel felt first played hydlide pc platinumgames director hideki kamiya inspired hydlide series cited influence scalebound open world action rpg hydlide initially released outside japan european release msx version beyond 1989 saw release localization hydlide special nes simply titled hydlide unlike dragon quest 1 improved upon us localization hydlide left essentially unaltered beyond minor changes title screen prompts/messages received negative reception often compared unfavorably legend zelda 1986 improved significantly upon hydlide nes version hydlide became notorious west repetitive background music bears similarity john williams indiana jones theme disney small world repetitive nature one two nrom single bank rpg/adventure games famicom/nes enix adventure game portopia serial murder case music hydlide several follow-ups | [
2469,
2249,
3113,
9006,
3346,
10931,
11443,
11575,
5753
] | None |
6,078 | 2 | General_protection_fault:general protection fault general protection fault gpf x86 instruction set architectures isas fault type interrupt initiated isa-defined protection mechanisms response access violation caused running code either kernel user program mechanism first described intel manuals datasheets intel 80286 cpu introduced 1983 also described section 9.8.13 intel 80386 programmer reference manual 1986 general protection fault implemented interrupt vector number 13 operating systems may also classify exceptions related access violations illegal opcode exceptions general protection faults even though nothing memory protection cpu detects protection violation stops executing code sends gpf interrupt cases operating system removes failing process execution queue signals user continues executing processes however operating system fails catch general protection fault i.e another protection violation occurs operating system returns previous gpf interrupt cpu signals double fault stopping operating system yet another failure triple fault occurs cpu unable recover since 80286 cpu enters special halt state called shutdown exited hardware reset ibm pc first pc-compatible system contain 80286 hardware detects shutdown state automatically resets cpu occurs descendants pc pc triple fault causes immediate system reset microsoft windows general protection fault presents varied language depending product version unix linux errors reported separately e.g segmentation fault memory errors memory errors faulting program accesses memory access examples include however many modern operating systems implement memory access-control schemes via paging instead segmentation often case invalid memory references operating systems windows reported via page faults instead general protection faults operating systems typically provide abstraction layer exception handling signals hides whatever internal processor mechanism used raise memory access error program purposes providing standard interface handling many different types processor-generated error conditions terms x86 architecture general protection faults specific segmentation-based protection comes memory accesses however general protection faults still used report protection violations aside memory access violations paging used use instructions accessible current privilege level cpl theoretically possible operating system utilize paging segmentation part common operating systems typically rely paging bulk memory access control needs things computer reserved exclusive use operating system program part operating system attempts use one features may cause general protection fault additionally storage locations reserved operating system processor consequence reservation read-only attempt write data unprivileged program error general protection faults raised processor protected instruction encountered exceeds permission level currently executing task either user-mode program attempting protected instruction operating system issued request would put processor undefined state general protection faults caught handled modern operating systems generally fault originated user-mode program user-mode program terminated however fault originated core system driver operating system operating system usually saves diagnostic information either file screen stops operating either restarts computer displays error screen blue screen death kernel panic segment limits exceeded segment permissions violated occur faults occur task state segment tss structure causes general protection faults | [
2560,
6155,
6675,
7187,
10776,
25,
4637,
3615,
9762,
4643,
6180,
5158,
7217,
10803,
9784,
10809,
576,
2625,
2627,
6730,
6221,
3160,
10333,
6751,
97,
11363,
6760,
10856,
8298,
9835,
8301,
7285,
4727,
2168,
9335,
634,
1147,
7804,
3197,
1150... | None |
6,079 | 8 | Web_Services_Conversation_Language:web services conversation language web service conversation language wscl proposal defines overall input output message sequences one web service using finite state automaton fsa alphabet message types | [
10020,
2501,
7878,
8626,
119,
7198
] | Test |
6,080 | 4 | Prolexic_Technologies:prolexic technologies prolexic technologies u.s.-based provider security solutions protecting web sites data centers enterprise ip applications distributed denial service ddos attacks network transport application layers february 2014 akamai technologies acquired prolexic technologies operated ddos mitigation platform global network traffic scrubbing centers real-time monitoring mitigation services provided 24/7 security operations control center socc prolexic indicated ddos mitigation services make websites data centers enterprise ip applications harder take via ddos attacks 2003 prolexic technologies founded barrett lyon subject book fatal system error joseph menn prolexic protects organizations following markets airlines/hospitality e-commerce energy financial services gambling gaming public sector software service sony said customer company prolexic claims largest banks clients 2005 company named one 100 hottest private companies north america red herring 2011 prolexic indicated secured payment card industry data security standard pci dss level 2 compliance certification pci security standards council would speed deployment remediation compliant organizations encrypted application layer 7 ddos attacks 2011 prolexic ceo scott hammack president stuart scholly joined company prolexic acquired internet content delivery network akamai technologies 370 million deal completed february 2014 2011 prolexic completed two financing rounds led kennet partners totaling 15.9 million 2012 company reported 2011 achieved profitability compound annual growth rate 45 2012 baltimore private equity firm camden partners invested 6 million company american trading production corp invested 2 million part 8 million series b funding round deal jason tagler camden partners joined board directors prolexic prolexic said would use series b money support staff augment network 2013 prolexic closed us 30 million series c funding round led new investors trident capital intel capital kennet partners camden partners medina capital took part funding round company claims partners bt global services datacraft grove internap ip converge level 3 communications preventia telstra prolexic provides three kinds ddos protection services clients monitoring attack detection services mitigation services intercept attacks attack intelligence post-attack intelligence services addition prolexic aggregates intelligence information reports active botnets fraud-linked ip addresses company opened first network traffic scrubbing center north america 2003 europe 2005 asia 2007 2012 company ’ traffic scrubbing capability excess 500 gbit/s bandwidth comprised multiple carriers distributed global network firm said investing infrastructure cope 1.2tbit/s peak traffic loads end 2013 many ddos attacks concerted efforts sophisticated live attackers prolexic uses combination automated tools human expertise part services 2012 company said successfully stopped ddos attacks affecting clients date including attacks application servers layer 4 syn floods layer 7 attacks well http get flood attacks zero-day attacks udp/icmp floods tcp flag abuses dns reflection dns attacks prolexic said mitigated largest ddos attack 2011 involved 250,000 computers infected malware company ’ service typically mitigates attacks within 5 20 minutes client network traffic starts flowing scrubbing center prolexic mitigated 30,000 ddos attacks 2003–2011 2011 prolexic mitigated 10 80 attacks daily 2012 hacktivism vandalism cited main inspiration ddos attacks rather extortion past type motivation said make company victim high-profile organizations organizations sizes said risk ddos attacks newer application-level attacks targeted classic ddos botnet attacks ’ need many resources deploy cloud-based ddos mitigation approach used prolexic employs technology redirect traffic company ’ ddos mitigation service scrub traffic send legitimate traffic client site attack mitigation approach said lower-cost traditional approach company maintaining network firewall making ddos attack prevention option firms business web | [
8998,
2409,
8170,
6347,
9181,
7515,
4883,
467,
10106,
2299,
7037,
7102
] | Validation |
6,081 | 4 | Sendio:sendio sendio newport beach california-based e-mail security company privately held company founded 2004 tal golan currently serves company president cto using sender address verification technology sendio provides e-mail security solution stops spam viruses malware phishing attacks unsolicited e-mail reaching e-mail inbox february 2007 sendio received 4 million venture capital funding vicente capital shepherd ventures athenian venture partners former microsoft cio rick devenuti appointed board directors sendio 2007 sendio customers include central dupage hospital arnerich massena inc. leading hotels world penn state sentinel real estate corporation sendio e-mail security platform formerly named i.c.e box appliance solution eliminates spam viruses e-mail security platform esp uses verification model first-time unsolicited senders scans viruses phishing directions outbound message recipients added user personal accept contact list authenticated subsequent messages sender assured reaching recipient inbox esp combines silverlisting technology includes set low-level smtp tests determine legitimacy sending e-mail server sender address verification verifies authenticity first-time unsolicited senders introduces human element process combination silverlisting sav prevents 100 spam esp employs verification model similar one embraced millions social networking users facebook linkedin “ buddy ” list model used leading instant messaging providers skype yahoo google aol sendio i.c.e box named best best product year 2006 government computer news email integrity award winner 2007 tomorrow technology today sendio named emerging vendor crn magazine security technology sector june 2008 | [
488,
7515,
8735
] | Test |
6,082 | 2 | PC/TCP_Packet_Driver:pc/tcp packet driver pc/tcp packet driver networking api ms-dos pc dos later x86 dos implementations dr-dos freedos etc implements lowest levels tcp/ip stack remainder typically implemented either tsr drivers library linked application program invented 1983 mit lab computer science csr/csc group jerry saltzer david d. clark commercialized 1986 ftp software packet driver uses x86 interrupt number int number used detected runtime commonly 60h may changed avoid application programs use fixed interrupts internal communications interrupt vector used pointer 4-bytes little endian address possible interrupt handler text string pkt drvr found within first 12-bytes immediately following entry point driver located packet drivers implement many different network interfaces including ethernet token ring rs-232 arcnet x.25 winpkt driver enables use packet drivers microsoft windows moves around applications willy nilly w3c507 dll packet driver microsoft windows environment support ethernet alike network interface using 8250 uart cslip ipx token ring localtalk arcnet | [
292,
1030,
9992,
7501,
9166,
1648,
178,
499,
7706,
10079
] | Validation |
6,083 | 8 | Tcpkill:tcpkill tcpkill network utility program used kill connections particular host network port combination programs take standard berkeley packet filter bpf filters used port mirroring arp spoofing prevent connections host www.google.com use command computer attempting go site blocked site surf site good idea either redirect output nothingness 2 /dev/null 1 /dev/null file later analysis file.tcpkill default redirect output console hosts specified command block well−known ports e.g. napster port 8888 port 6699 gnutella port 6346 command tcpkill used create dos attack within wan lan done using sniffer like dsniff tcpdump look packets transmitted pick target want deny service assume target identified 192.168.100.38 simple command like tcpkill -9 host 192.168.100.38 kill outgoing tcp packets tcp segment target rest network prior attack target receive packets rest network -i -i option specify interface want program listen default option interface computers eth0 computers one interface -1 ... 9 -1 -9 specify degree brute force want attack use target -1 least brute -9 brute computers network fast connection usually require brute force order successfully perform dos attack otherwise command run without -1 -9 option -i option description one various dsniff programs text belongs dsniff “ readme ” written author dug song see also filesnarf macof mailsnarf msfsnarf sshmitm tcpnice urlsnarf webmitm webspy | [
2292,
7895
] | Validation |
6,084 | 3 | IBM_ROMP:ibm romp romp reduced instruction set computer risc microprocessor designed ibm late 1970s also known research opd microprocessor two ibm divisions collaborated inception ibm research office products division opd 032 romp originally developed office equipment small computers intended follow-on mid-1970s ibm opd mini processor microprocessor used ibm office system/6 word-processing system first examples became available 1981 first used commercially ibm rt pc announced january 1986 time rt pc planned personal computer romp replacing intel 8088 found ibm personal computer however rt pc later re-positioned engineering scientific workstation computer later cmos version romp first used coprocessor board ibm 6152 academic system introduced 1988 later appeared models rt pc architectural work romp started late spring 1977 spin-off ibm research 801 risc processor hence research acronym architectural changes cost reduction adding 16-bit instructions byte-efficiency original romp 24-bit architecture instruction set changed 32 bits years development first chips ready early 1981 making romp first industrial risc processor revealed international solid-state circuits conference 1984 romp first appeared commercial product processor ibm rt pc workstation introduced 1986 provide examples rt pc production volume production romp mmu began 1985 delay completion romp design introduction rt pc caused overly ambitious software plans rt pc operating system os os virtualized hardware could host multiple operating systems technology called virtualization commonplace mainframe systems began gain traction smaller systems 21st century improved cmos version romp first used ibm 6152 academic system workstation later models rt pc ibm research used romp research parallel processor prototype rp3 early experimental scalable shared-memory multiprocessor supported 512 processors first detailed 1985 cmos version ace experimental numa multiprocessor operational 1988 romp architecture based original version ibm research 801 minicomputer main differences larger word size 32 bits instead 24 inclusion virtual memory architecture supported 8- 16- 32-bit integers 32-bit addressing 40-bit virtual address space instruction pointer register sixteen 32-bit general-purpose registers microprocessor controlled 118 simple 16- 32-bit instructions romp virtual memory segmented 40-bit 1tb address space consisting 4,096 256mb segments 40-bit virtual address formed mmu concatenating 12-bit segment identifier 28 low-order bits 32-bit romp-computed virtual address segment identifier obtained set 16 segment identifiers stored mmu addressed four high-order bits 32-bit romp-computed virtual address romp scalar processor three-stage pipeline first stage instructions 16-byte instruction prefetch buffer instruction fetched decoded operands general-purpose register file read instruction prefetch buffer read 32-bit word memory whenever romp accessing instructions executed second stage written back general-purpose register file third stage romp used bypass network appropriate scheduled register file reads writes support back-to-back execution dependent instructions register-to-register instructions executed single cycle 118 instructions 84 single-cycle latency romp ibm-developed companion integrated circuit code-named rosetta development rosetta memory management unit mmu provided romp address translation facilities translation lookaside buffer store buffer romp rosetta originally implemented ibm 2μm silicon-gate nmos technology two levels metal interconnect romp consists 45,000 transistors 7.65×7.65mm large 58.52mm rosetta consists 61,500 transistors 9.02×9.02mm large 81.36mm packaged 135-pin ceramic pin grid arrays cmos version romp rosetta called romp-c rosetta-c later developed | [
8450,
6415,
1298,
11539,
9371,
8861,
3493,
6311,
682,
10796,
4269,
3630,
7983,
2224,
4144,
9391,
1462,
9911,
7234,
3014,
3142,
4424,
6087,
9932,
3323,
6607,
2517,
7911,
10985,
9964,
5358,
8048,
8944,
757,
2039,
249,
3451,
8700,
1399
] | Test |
6,085 | 1 | Flat-file_database:flat-file database flat-file database database stored file called flat file records follow uniform format structures indexing recognizing relationships records file simple flat file plain text file binary file relationships inferred data database database format make relationships explicit term generally implied small database large databases also flat plain text files usually contain one record per line different conventions depicting data comma-separated values delimiter-separated values files fields separated delimiters comma tab characters cases field may fixed length short values may padded space characters extra formatting may needed avoid delimiter collision using delimiters incurs overhead locating every time processed unlike fixed-width formatting may performance implications however use character delimiters especially commas also crude form data compression may assist overall performance reducing data volumes — especially data transmission purposes use character delimiters include length component declarative notation comparatively rare vastly reduces overhead associated locating extent field examples flat files include codice_1 codice_2 unix-like operating systems another example flat file name-and-address list fields name address phone number list names addresses phone numbers written hand sheet paper flat-file database also done typewriter word processor spreadsheet text editor program may used implement flat-file database may printed used online improved search capabilities herman hollerith work us census bureau first exercised 1890 united states census involving data tabulated via hole punches paper cards may considered first computerized flat-file database presumably included cards indexing cards otherwise relating individual records i.e individual cards one another save group membership 1980s configurable flat-file database computer applications popular ibm pc macintosh programs designed make easy individuals design use databases almost par word processors spreadsheets popularity examples flat-file database software include early versions filemaker shareware pc-file popular dbase flat-file databases common ubiquitous easy write edit suit myriad purposes uncomplicated way linear stores nosql data json formatted data primitive spreadsheets perhaps comma-separated tab-delimited text files seen flat-file databases lack integrated indexes built-in references data elements complex data types programs manage collections books appointments address book may use essentially single-purpose flat-file databases storing retrieving information flat files unadorned indexes pointing systems user write table contents text file text file format include concept table contents user may write friends kathy notes section john contact information interpreted user rather built-in feature database database system begins recognize codify relationships records begins drift away flat detailed system describing types hierarchical relationships structured considered flat following example illustrates typical elements flat-file database data arrangement consists series columns rows organized tabular format specific example uses one table columns include name person name second column team name athletic team supported person third column numeric unique id used uniquely identify records first column example textual representation described data type data representation quite standard flat-file database although additional considerations readily apparent text | [
2688,
5632,
4486,
4614,
8201,
5397,
9631,
1697,
9762,
10145,
9397,
9147,
7868,
4155,
11324,
11457,
9286,
2512,
2901,
7767,
11098,
4065,
7650,
8291,
9828,
10471,
1146,
6395,
3196
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.