node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
6,086 | 4 | Cliqz:cliqz cliqz privacy oriented web browser developed cliqz gmbh majority-owned hubert burda media available desktop mobile web browser well extension firefox fork firefox web browser privacy-oriented changes among crowdsourced anti-tracking mechanism in-house search engine embedded within browser utilizing index web pages produce suggestions within address bar dropdown menu rather separate pages browser developers argued privacy-focused search engines may still pass user ip address third-party search providers august 2016 mozilla developer firefox made minority investment cliqz cliqz plans eventually monetize software program known cliqz offers deliver sponsored offers users based interests browsing history however recommendations processed locally based remote repository offers personally identifiable data sent remote servers 15 february 2017 cliqz international gmbh wholly owned subsidiary cliqz gmbh acquired privacy-oriented browser extension ghostery 6 october 2017 mozilla announced test approximately 1 users downloading firefox germany would receive version cliqz software included feature providedrecommendations directly browser search field including news weather sports websites based user browsing history activities press release noted users receive version firefox cliqz browsing activity sent cliqz servers including urls pages visit cliqz uses several techniques attempt remove sensitive information browsing data sent firefox according firefox support website version firefox collects sends data cliqz corporation including text typed address bar queries search engines information visited webpages interactions including mouse movement scrolling amount time spent user interactions user interface cliqz software data tied unique identifier allowing cliqz track long-term performance interaction data collected sent mozilla corporation includes among things counts visits search engine pages search engines used cliqz identifier data collection enabled default users must actively opt-out wish data transmitted | [
1664,
6528,
6657,
3971,
3462,
7943,
8584,
6797,
2579,
7572,
7965,
10910,
8351,
5026,
1834,
9770,
7340,
559,
7983,
9908,
4661,
3639,
823,
11449,
4797,
64,
10057,
11466,
5707,
7885,
4048,
7889,
10834,
4310,
5078,
6231,
6747,
8923,
737,
5605... | Test |
6,087 | 2 | Virtual_address_space:virtual address space computing virtual address space vas address space set ranges virtual addresses operating system makes available process range virtual addresses usually starts low address extend highest address allowed computer instruction set architecture supported operating system pointer size implementation 4 bytes 32-bit 8 bytes 64-bit os versions provides several benefits one security process isolation assuming process given separate address space new application 32-bit os executed process vas one memory addresses 0 2 − 1 space single byte value initially none values '- represents value using setting values vas would cause memory exception application executable file mapped vas addresses process vas mapped bytes exe file os manages mapping v values bytes mapped file required dll files mapped includes custom libraries well system ones kernel32.dll user32.dll process starts executing bytes exe file however way process use set '- values vas ask os map bytes file common way use vas memory way map page file page file single file multiple distinct sets contiguous bytes mapped vas different parts page file map vas different processes microsoft windows 32-bit default made available processes use used operating system later 32-bit editions microsoft windows possible extend user-mode virtual address space left kernel-mode virtual address space marking programs image_file_large_address_aware enabling /3gb switch boot.ini file microsoft windows 64-bit process running executable linked /largeaddressaware operating system artificially limits user mode portion process virtual address space 2 gib applies 32- 64-bit executables processes running executables linked /largeaddressaware yes option default 64-bit visual studio 2010 later access virtual address space 32-bit executables 64-bit executables windows windows 8 64-bit executables windows 8.1 later allocating memory via c malloc establishes page file backing store new virtual address space however process also explicitly map file bytes x86 cpus linux 32-bit allows splitting user kernel address ranges different ways 3g/1g user/kernel default 1g/3g user/kernel 2g/2g user/kernel | [
4101,
9466,
3725,
6797,
7053,
8080,
8976,
11539,
5783,
7833,
11674,
3615,
10145,
5796,
6829,
7471,
7728,
6705,
2045,
7983,
11574,
823,
7607,
8251,
2627,
6084,
4424,
7762,
7421,
5598,
6239,
9829,
8551,
4075,
499,
3702,
8186,
2556,
5885,
17... | Test |
6,088 | 2 | Windows_Speech_Recognition:windows speech recognition windows speech recognition wsr speech recognition component developed microsoft windows vista operating system enables use voice commands control desktop user interface dictate text electronic documents email navigate websites perform keyboard shortcuts operate mouse cursor also supports creation custom macros perform additional tasks wsr locally-processed speech recognition platform rely cloud computing accuracy dictation recognition adapts based user context grammar input speech samples training sessions vocabulary dictation provides personal dictionary allows users include exclude words expressions optionally record pronunciations increase recognition accuracy windows search wsr also optionally analyze collect text documents email handwritten input tablet pc contextualize disambiguate terms adapt personalize recognizer custom language models adapt recognizer specific context phonetics terminology users particular occupational fields legal medical also supported wsr developed integrated component windows vista windows previously supported speech recognition limited individual applications windows media player microsoft office xp introduced speech recognition support limited internet explorer office windows vista majority integrated applications controlled speech office 2007 later versions office rely wsr replacing separate office speech recognition present windows 7 windows 8 windows 8.1 windows rt windows 10 microsoft involved speech recognition speech synthesis research many years 1993 microsoft hired xuedong huang carnegie mellon university lead speech development efforts company research eventually led development speech api introduced 1994 speech recognition also used microsoft products prior wsr versions microsoft office including office xp office 2003 provided speech recognition capabilities among internet explorer office applications installation office also enabled limited speech functionality windows 98 windows windows nt 4.0 windows 2000 2002 tablet pc edition windows xp included speech recognition tablet pc input panel microsoft plus windows xp expansion package enabled voice commands used windows media player however support limited individual applications windows vista windows include integrated speech recognition capabilities 2002 windows hardware engineering conference winhec 2002 microsoft announced windows vista known codename longhorn would include advances speech recognition features microphone array support features part company goal provide consistent quality audio infrastructure natural continuous speech recognition discrete command control bill gates stated 2003 professional developers conference pdc 2003 microsoft would build speech capabilities system -- big advance 'longhorn recognition synthesis real-time pre-release builds throughout development windows vista included speech engine training features pdc 2003 developer presentation dedicated user input stated windows vista would also include user interface microphone feedback control well separate user configuration training features microsoft later clarified extent speech recognition would integrated stated pre-release software development kit common speech scenarios like speech-enabling menus buttons enabled system-wide winhec 2004 microsoft listed wsr part longhorn mobile pc strategy improve productivity winhec 2005 microsoft emphasized accessibility new mobility scenarios improvements speech user experience unlike speech support included windows xp integrated tablet pc input panel required switching separate commanding dictation modes windows vista would introduce dedicated interface speech input desktop unify separate speech modes users could previously speak command dictating vice versa without first switching two modes microsoft also stated windows vista would improve dictation accuracy support additional languages microphone arrays demonstration winhec 2005 focused email dictation correction editing commands presentation microphone arrays also shown windows vista beta 1 later included integrated speech recognition application incentivize company employees analyze wsr software glitches provide feedback development microsoft offered opportunity testers win premium model xbox 360 video game console july 27 2006 operating system release manufacturing rtm notable incident involving wsr occurred demonstration microsoft resulted unintended output dear aunt let set double killer delete select several attempts dictate led consecutive output errors incident subject significant derision among analysts journalists audience microsoft later revealed issues due audio gain glitch caused speech recognizer distort dictated words glitch fixed windows vista release early 2007 reports surfaced wsr might vulnerable attack could allow attackers play audio computer speakers thereby using capabilities perform undesired user operations target computer first vulnerability discovered windows vista general availability microsoft stated attack theoretically possible would meet number prerequisites successful target system would speech recognition feature properly configured activated speakers microphone connected targeted system would need turned exploit would require software interpret commands without user noticing—an unlikely scenario affected system would perform visible interface operations produce audible feedback mitigating factors include dictation clarity microphone feedback placement user account control exploit nature also would able perform privileged operations users protected administrators without explicit consent windows 7 microsoft introduced several changes improve user experience recognizer updated use microsoft ui automation—substantially enhancing performance—and recognition engine uses wasapi audio stack enables support echo cancellation document harvester optionally analyzes collects text email documents contextualize disambiguate user terms improved performance updated run periodically background instead recognizer startup sleep mode also seen performance improvements address security issues windows 7 introduces new voice activation option—enabled default—that turns recognizer users speak stop listening instead putting recognizer sleep windows 7 also introduces option submit speech training data microsoft improve future recognizer versions windows 7 introduced optional dictation scratchpad interface functions temporary document users dictate type text insertion applications compatible text services framework wsr previously provided enable dictation everywhere option windows vista wsr used control metro user interface windows 8 windows 8.1 windows rt commands open charms bar press windows c display commands metro-style apps press windows z perform tasks e.g. change celsius msn weather display installed apps listed start screen apps wsr featured settings application starting windows 10 april 2018 update version 1803 change first appeared insider preview build 17083 april 2018 update also introduces new ++ keyboard shortcut activate wsr wsr allows user control computer including operating system desktop user interface voice commands applications including bundled windows also controlled voice commands using speech recognition users dictate text within documents email forms control operating system user interface perform keyboard shortcuts move mouse cursor wsr uses local speech profile store information user voice accuracy speech recognition increases use helps feature adapt user grammar speech patterns vocabulary word usage speech recognition also includes tutorial improve accuracy optionally review user personal documents—including email—to improve command dictation accuracy individual speech profiles created per-user basis backups profiles performed via windows easy transfer wsr supports following languages chinese traditional chinese simplified english u.s. english u.k. french german japanese spanish wsr relies speech api developed microsoft third-party applications must support text services framework wsr interface consists status area displays instructions information commands e.g. command heard recognizer status recognizer voice meter displays visual feedback volume levels status area represents current state wsr total three modes listed respective meanings colors recognizer listening mode button denote various modes operation blue listening blue-gray sleeping gray turned yellow user switches context e.g. desktop taskbar voice command misinterpreted status area also display custom user information part windows speech recognition macros alternates panel disambiguation interface displays list items interpreted relevant user spoken word word phrase user desired insert application listed among results user speak corresponding number word phrase results confirm choice speaking ok insert within application alternates panel also appear launching applications speaking commands refer one item e.g. speaking start internet explorer may list web browser version browser add-ons disabled however exactmatchoverpartialmatch windows registry entry limit commands items exact names one instance included results listed common wsr commands words italics indicate word substituted desired item e.g. word direction scroll direction command substituted word start typing command enables wsr interpret dictation commands keyboard shortcuts mousegrid command enables users control mouse cursor overlaying numbers across nine regions screen regions gradually narrow user speaks number region focus desired interface element reached regions user interact based commands including click number region moves mouse cursor desired region clicks mark number region allows item computer icon region selected clicked previous click command user also simultaneously interact multiple regions mousegrid applications interface elements present identifiable commands still controlled asking system overlay numbers top show numbers command active speaking overlaid number selects item user open perform operations show numbers designed users could interact items readily identifiable wsr enables dictation text operating system applications dictation mistake occurs corrected speaking correct word correct alternates panel appear provide suggestions correction suggestions selected speaking number corresponding number suggestion list speaking ok. desired item listed among suggestions user speak might appear alternatively users speak spell 'll spell speak desired item per-letter basis users use personal alphabet nato phonetic alphabet spelling multiple words sentence corrected simultaneously example user speaks dictating recognizer interprets word thing user state correct thing correct words english language 100,000 words recognized default wsr includes personal dictionary allows users include exclude certain words expressions dictation user adds word beginning capital letter dictionary user specify whether always capitalized capitalization depends context word spoken users also record pronunciations words added dictionary increase recognition accuracy words written via stylus tablet pc windows handwriting recognition feature also stored information stored within dictionary included part user speech profile wsr supports custom macros supplementary application microsoft enables additional natural language commands example functionality email macro released microsoft enables natural language command user state send email contact subject opens microsoft outlook compose new message designated contact subject automatically inserted microsoft also released sample macros speech dictionary windows media player microsoft powerpoint speech synthesis switch multiple microphones customize various aspects audio device configuration volume levels general natural language queries weather forecast time date answers queries spoken via speech synthesizer users developers create macros based text transcription substitution application execution support command-line arguments keyboard shortcuts emulation existing voice commands combination items xml jscript vbscript supported macros limited individual applications desired rules macros defined programmatically macro load must stored speech macros folder within current user documents directory macros digitally signed default user certificate available ensure commands corrupted loaded third-parties one available administrator create certificate use macros utility also includes security levels prohibit unsigned macros loaded prompt users sign macros load unsigned macros wsr uses microsoft speech recognizer 8.0 changed since windows vista dictation found 93.6 accurate without training mark hachman senior editor pc world —a rate accurate competing software according microsoft rate accuracy trained 99 hachman commented microsoft publicly discuss wsr attributing 2006 incident development windows vista users knowing documents could dictated within windows introduction cortana | [
11270,
5643,
4624,
9744,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
1581,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
4194,
7780,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
8315,
10... | None |
6,089 | 4 | Relocatable_user_backup:relocatable user backup relocatable user backup rub ability restore relocate backups another system site one primary ways mitigate threat service-provider lock-in software service model also provides backup event service-provider suffers catastrophic failure concept requires 3 fundamental components third component also contains implication either application provided backup consistent ongoing application upgrade path prevent situation restore rub prevented due obsolete version application software | [
467,
3366
] | Test |
6,090 | 3 | Poqet_PC:poqet pc poqet pc small portable ibm pc compatible computer introduced 1989 poqet computer corporation price 2000 computer discontinued fujitsu ltd. bought poqet computer corp first subnotebook form factor ibm pc compatible computer ran ms-dos poqet pc powered two aa-size batteries use aggressive power management includes stopping cpu keystrokes batteries able power computer anywhere couple weeks couple months depending usage computer also uses instant feature powering used immediately without go full booting sequence poqet pc comparable hp 95lx/hp 100lx/hp 200lx atari portfolio handheld computers three variants produced poqet pc first introduced poqet pc prime followed shortly original version subsequently renamed poqet pc classic several years later poqet pc plus introduced main difference poqet pc classic prime expansion ram 512 640 kb enhancement power management features several years poqet prime classic time fujitsu purchased poqet computer corp. new improved poqet pc plus introduced poqet pc plus significant differences classic prime models better others features rechargeable battery pack holds smaller charge classic enhanced pc card slots support pc cards transflective backlit lcd 2 mb ram 640 kb dos 64 kb shadow 1-1344 kb ram disk poqet classic lcd n't backlight prone breaking poqet pc plus also took type release 1.0 sram cards opposed type ii cards release 2.0 cards including flash sram modem cards plus also memory despite many improvements plus also drawbacks poqet pc plus considerably larger heavier predecessors weighed approximately opposed classic also odd miniature 26-pin serial connector currently available adapter however many toshiba external floppy drives dongles used jae connector amateur radio hobbyist uses poqet found way make suitable adapter also totally pcmcia release 2.0 compatible memory cards work bryan mason says poqet site pnb samantha modem megahertz 14.4 kbit/s modem xjack paradyne keepintouch 14.4 kbit/s modems work addition compactflash cards work poqet users found many machines work newer cf cards poqet pc one first subnotebooks exist marketplace still today one smallest although beaten hp 200lx immediately recognized milestone portable computing pc magazine awarded poqet pc development team ian h. s. cullimore john p. fairbanks leroy d. harper shinpei ichikawa stavro evangelo prodromou coveted technical excellence award 1989 device pc world called one 50 greatest gadgets last 50 years short lifespan 1989-1994 poqet bought fujitsu poqet soon axed short time poqet value declined onset windows ce similar decline hp 200lx demand also occurred introduction hp windows ce machines however despite new machines power operating system soon proved inefficient poqets hp 'lx dos machines became high demand recently hp 200lx sold 182 ebay poqets also fairly high demand fetch somewhat lower prices cherry hill nj business disks n data stock classics pluses owner store jerry tessler put sold twenty minutes unlike running windows ce running dos near-standard specifications meant everything lotus 1-2-3 zork worked expected | [
577,
321,
2179,
6090,
7243,
8301,
9166,
1776,
3281,
5681,
6129,
9137,
10768,
4125
] | None |
6,091 | 4 | Point-of-sale_malware:point-of-sale malware point-of-sale malware pos malware usually type malicious software malware used cybercriminals target point sale pos payment terminals intent obtain credit card debit card information card track 1 track 2 data even cvv code various man-in-the-middle attacks interception processing retail checkout point sale system simplest evasive approach ram-scraping accessing system memory exporting copied information via remote access trojan rat minimizes software hardware tampering potentially leaving footprints pos attacks may also include use various bits hardware dongles trojan card readers wireless data transmitters receivers gateway transactions pos malware enables hackers process steal thousands even millions transaction payment data depending upon target number devices affected long attack goes undetected done outside card information usually encrypted sent payment processor authorization discovered 2011 installs windows computer service called rdasrv.exe scans track 1 track 2 credit card data using perl compatible regular expressions includes customer card holder ’ name account number expiry date cvv code discretionary information information gets scraped stored data.txt currentblock.txt sent hacker discovered october 2012 gets installed pc automatically gets embedded auto script loads malware memory scrapes credit card cc data pos software vskimmer scrapes information windows system detecting card readers attached reader sends captured data cyber criminal control server discovered december 2012 steal system information along track 1 track 2 card details help keylogger installed onto computer spyware created steal credit debit card information pos system blackpos gets pc stealth-based methods steals information send external server memory-scraping malware tracks track 2 data access card magnetic stripe help magnetic stripe readers sends data hacker clone fake credit cards fastpos malware pos malware discovered trend micro researchers strikes point sale system fast snatches credit debit card information sends data cyber criminal instantly malware capability exfiltrate track data using two techniques key logger memory scraper pandalabs discovered malware infects point sale system breach credit debit card details punkeypos malware uses two functions keylogger ram scraper steal information point sale terminal information stolen encrypted sent cybercriminal ’ control command server c c new variant pos malware point sale malware discovered fireeye follows new advanced technique steal retail customer ’ card information help lunh algorithm exfiltrate stolen information first block http ftp traffic monitors data exfiltration belongs family newposthings malware centerpos pos point sale malware found year 2015 september along malicious malware blackpos newposthings alina malware fireeye experts scrapes stolen credit debit card sends data http post request help triple des encryption malumpos point sale malware records point sale ’ data running oracle micros payment system breached 333,000 data world uses delphi programming language stealing credit debit card details stolen data sent cyber criminal sold black market | [
7553,
10509,
8206,
9102,
7441,
8978,
9745,
10392,
9242,
3629,
10364,
4672,
10309,
4304,
4945,
6360,
218,
7515,
9569,
5603,
11621,
4081,
1781,
4471,
127,
4863
] | Train |
6,092 | 4 | Chkrootkit:chkrootkit chkrootkit check rootkit common unix-based program intended help system administrators check system known rootkits shell script using common unix/linux tools like codice_1 codice_2 commands search core system programs signatures comparing traversal codice_3 filesystem output codice_4 process status command look discrepancies used rescue disc typically live cd optionally use alternative directory run commands techniques allow chkrootkit trust commands upon depends bit inherent limitations reliability program attempts detect compromises rootkits computer viruses newer rootkits may specifically attempt detect compromise copies chkrootkit programs take measures evade detection | [
5506,
3395,
6606,
7983,
8399,
10387,
5492,
11188,
823,
1304,
7192,
186,
7739,
1150,
9791
] | Train |
6,093 | 2 | IBoot:iboot iboot stage 2 bootloader apple products replaces old bootloader bootx compared predecessor iboot improves authentication performed boot chain macos boot process starts running code stored secured uefi boot rom first stage boot rom two primary responsibilities initialize system hardware post component select operating system run uefi component ios boot process starts running device boot rom code systems s1 processors a9 earlier a-series processors boot rom loads low-level bootloader llb loads iboot systems newer processors boot rom loads iboot goes well iboot proceed load ios kernel well rest operating system llb iboot fails load ios fails verify ios bootloader jumps recovery mode otherwise loads remaining kernel modules macos iboot located codice_1 kernel drivers necessary booting loaded boot loader starts kernel ’ initialization procedure point enough drivers loaded kernel find root device | [
11521,
2819,
1796,
3719,
4615,
10888,
11402,
9100,
5647,
10512,
1042,
10130,
8852,
9109,
7318,
4888,
3228,
11037,
2207,
1439,
811,
3371,
5292,
1710,
6700,
7983,
8877,
1074,
10036,
3766,
2232,
9912,
11257,
9406,
6849,
4933,
713,
9418,
9035,
... | Validation |
6,094 | 4 | Bayesian_poisoning:bayesian poisoning bayesian poisoning technique used e-mail spammers attempt degrade effectiveness spam filters rely bayesian spam filtering bayesian filtering relies bayesian probability determine whether incoming mail spam spam spammer hopes addition random even carefully selected words unlikely appear spam message cause spam filter believe message legitimate—a statistical type ii error spammers also hope cause spam filter higher false positive rate turning previously innocent words spammy words bayesian database statistical type errors user trains spam filter poisoned message indicating filter words added spammer good indication spam spam conference held mit 2004 john graham-cumming presented two possible attacks popfile bayesian engine one unsuccessful worked impractical identified two types poisoning attack passive words added without feedback spammer active spammer gets feedback spam received passive method adding random words small spam ineffective method attack 0.04 modified spam messages delivered active attack involved adding random words small spam using web bug determine whether spam received another bayesian system trained using poison words sending 10,000 spams single user determined small set words could used get spam simple countermeasure disabling remote images web bugs emails eliminates problem conference email anti-spam 2004 wittel wu presented paper showed passive addition random words spam ineffective crm114 effective spambayes 100 words added per spam also showed smarter passive attack adding common english words still ineffective crm114 even effective spambayes needed add 50 words spam get past spambayes however wittel wu testing criticized due minimal header information present emails using bayesian spam filters make extensive use header information message metadata determining likelihood message spam discussion spambayes results counter evidence found spambayes mailing list archive attacks type ii attacks attacks attempt get spam delivered type attack attempts cause false positives turning previously innocent words spammy words bayesian database also 2004 stern mason shepherd wrote technical report dalhousie university detailed passive type ii attack added common english words spam messages used training testing spam filter two tests showed common words decreased spam filter precision percentage messages classified spam really spam 84 67 94 84 examining data shows poisoned filter biased towards believing messages likely spam ham good email thus increasing false positive rate proposed two countermeasures ignoring common words performing classification smoothing probabilities based trustworthiness word word trustworthy probability attacker unlikely able guess whether part individual vocabulary thus common words untrustworthy probability would smoothed 0.5 making neutral 2005 conference email anti-spam lowd meek presented paper demonstrated passive attacks adding random common words spam ineffective naïve bayesian filter fact showed john graham-cumming demonstrated back 2004 adding random words improves spam filtering accuracy demonstrated adding hammy words words likely appear ham non-spam email content spam effective naïve bayesian filter enabled spam slip went detail two active attacks attacks require feedback spammer effective spam filters course preventing feedback spammers non-delivery reports smtp level errors web bugs defeats active attack trivially also showed retraining filter effective preventing attack types even retraining data poisoned published research shows adding random words spam messages ineffective form attack active attacks effective adding carefully chosen words work cases defend attacks vital feedback received spammers statistical filters retrained regularly research also shows continuing investigate attacks statistical filters worthwhile working attacks demonstrated countermeasures required ensure statistical filters remain accurate | [
3908,
1771,
8747,
10450,
1653,
2969
] | None |
6,095 | 5 | TCP_fusion:tcp fusion tcp fusion feature providing tcp loopback implemented transmission control protocol stack within oracle solaris-10 solaris-11 operating systems well number software projects based open source codebase opensolaris project idea trivial client server connection local loopback interface within system need entire tcp/ip protocol stack exchange data therefore provide faster data path fusion two end points source code well documented inet/tcp/tcp_fusion.c clearly states tcp fusion protocol-less data path tcp loopback connections fusion two local tcp endpoints occurs connection establishment time various conditions see details tcp_fuse need met fusion successful fails fall back regular tcp data path succeeds endpoints proceed use tcp_fuse_output transmit path tcp_fuse_output enqueues application data directly onto peer receive queue protocol processing involved sychronization handled squeue mutex tcp_non_sq_lock one requirements fusion succeed endpoints need using squeue ensures neither side disappear side still sending data flow control information manipulated outside squeue tcp_non_sq_lock must held touching tcp_flow_stopped feature may enabled disabled via /etc/system config file solaris genunix kernel line required set ip do_tcp_fusion 0x0 set feature false 0x1 hexadecimal true see https //github.com/illumos/illumos-gate/blob/master/usr/src/uts/common/inet/tcp/ | [
11363
] | Test |
6,096 | 3 | Dragon_Quest_II:dragon quest ii dragon quest ii luminaries legendary line titled dragon warrior ii initially localized north america role-playing video game rpg developed chunsoft published enix 1987 family computer famicom part dragon quest series enix u.s. subsidiary published american version dragon warrior ii nintendo entertainment system nes 1990 dragon quest ii set one hundred years events first game game story centers prince midenhall ordered stop evil wizard named hargon hargon destroys moonbrooke castle adventure accompanied two cousins prince cannock princess moonbrooke dragon quest ii expands first game larger party areas explore multiple heroes enemies battle sailing ship game successor dragon quest iii follows ancestor main characters legendary hero erdrick three games collectively called erdrick saga trilogy planning began month original dragon quest released one major goal development exciting combat system inspired similar multi-character party systems one found wizardry artwork used basis characters monsters painted akira toriyama translated pixel art game hit delays due game balance fully corrected early sections game combined staff included students familiar coding debugging process pushed back release month developers also many ideas discarded due technical limitations famicom system though later incorporated subsequent remakes game sequel dragon quest iii dragon quest ii successful japan original famicom version shipped 2.4 million copies later game remade super famicom game boy color combined original dragon quest game release entitled dragon quest ii version game android ios released japan june 26 2014 worldwide october 9 2014 dragon quest ii luminaries legendary line game praised improving almost aspects original including better graphics larger world explore characters participate dynamic combat system dragon quest ii known one difficult dragon quest games especially late game retained reputation even later ports platforms made game somewhat forgiving dragon quest ii role-playing video game allows player control one character characteristics first game dragon quest series game introduced party system instead beginning game entire party common previous computer rpgs player begins game one character gradually recruits party members course game player controls characters move game world search treasure chests talk trade villagers equip weapons armor cast spells wandering fields towers caves seas dungeons player randomly encounters monsters game shifts battle mode game battle mode introduces groups monsters upgrade one-on-one battles dragon quest battle mode player gives orders characters fight monsters player defeats monsters characters gain experience points gold experience points raise characters experience levels improves characters attributes may also learn new spells win player must fight monsters improve characters experience levels get gold buy better weapons armor eventually player characters become strong enough make next town dungeon repeats player reaches final boss defeats however gameplay necessarily linear especially player gets boat exploration key component game game offers spots save game towns talking king minister saves game american version incorporated battery saved games rather password system original talking king also allows deletion moving saved games dragon quest ii noted greatly expanding upon gameplay previous game dragon quest game first series feature multiple heroes enemies battle well sailing ship also allowed player land ship anywhere making possible explore entire game world open-ended manner included new gameplay features weapons cast spells used battles compared predecessor dragon warrior ii offers wider array spells items much larger world game also expanded inventory management system predecessor giving character individual inventory holds eight items placing greater emphasis conservative item management characters dragon quest ii luminaries legendary line also first dragon quest game include game chance played lottery tickets player finds also first dragon quest game use multiple key types include travel doors warp gates dragon quest ii set one hundred years dragon quest story begins attack upon moonbrooke castle wizard hargon seeks summon demon malroth destroy world wounded soldier escaped battle fled kingdom midenhall informs king attack dies king commands son descendant erdrick known loto japanese translations later localizations defeat hargon prince begins quest alone later joined two cousins prince cannock princess moonbrooke finding prince cannock began similar journey time prince midenhall restore princess moonbrooke human form transformed dog hargon assault moonbrooke castle reduced ruins trio quest find defeat hargon secure ship allows travel across oceans reach new continents including alefgard dragon quest took place meet grandson dragonlord villain previous game gives party valuable information tells collecting five crests hidden around world party create charm rubiss allowing defeat hargon illusions obtaining charm rubiss party travels hargon castle ice-covered plateau rhone confronts hargon throne room hargon defeated offers malroth demon emerges destroy heroes together three heroes slay malroth return midenhall prince named new king like main games dragon quest series yuji horii wrote story dragon quest ii akira toriyama artwork koichi sugiyama composed music co-creator koichi nakamura chunsoft president directed game half programming planning dragon quest ii began april 1986 month release original dragon quest system memory map decided started development early july beginning development producer yukinobu chida asked director programmer koichi nakamura definite release date offhandedly set one development team divided two groups one designing story well monsters one programming initial deadline set early november game ultimately suffered small delay development team finished programming almost everything time initial release believed game could released end year japanese magazine weekly shōnen jump published november 11 1986 announced game would released late december however developers found game difficult delayed month adjust balance finish final version mid-december rushed deliver nintendo make physical game cartridges game released january 26 1987 developers believed dragon quest one-vs-one combat system tedious simple leveling system boring decided dragon quest ii use party system players controlling multiple characters another game time entitled wizardry players control party six characters directly nakamura saw liked idea wanted something similar due technical restrictions decided use three characters famicom video game system supports display eight sprites side side one game character used two units direction possible three characters talk non-playable character npc yuji horii believed many players would play dragon quest ii without first playing dragon quest thus players search party members development staff discussed idea deprecating stair command predecessor several times nakamura stated cave rhone found game inspired classic trick exit mazes always moving forward sticking right-hand side wall avoid traps story group monsters first thing designed monsters names skills personalities decided first drawn artist akira toriyama yuji horii allowed toriyama paint full drawings rather directly create pixel art would shown game artwork converted computer graphics toriyama unfamiliar computer graphics technology staff took charge many new monsters needed designed make game feel real process laborious toriyama also said compared manga comics used enjoyed painting balance experience positive yuji horii stated process like manga film creators quickly outlines story plot mind regard map design blank map used create physical shape place like castle cave tower key elements story created together afterwards scenarios mainly written friend hiroshi miyaoka compared write lines writing paper design map graph paper staff wrote two 5 mm graph papers a4 felt easy organizing manuscript thickness 15 cm compared predecessor game advanced nearly technological aspects koichi nakamura programmed several students since first time working team n't know delegate work communicate goals since students unfamiliar coding process know debug keep track whose code came nakamura caused delays programming maps first worked characters including numbered characters maps assigned lines designed npc moving route next step programming items final step setting monsters data converting toriyama artwork work completed end october due aforementioned balance issues game initially difficult especially later stages nakamura written program simulated every single combat used adjust game setting character leveling strength enemies players would encounter program failed account larger monster groups however fell outside model caused game difficult enemies leveling weapons power designed area koichi nakamura n't think boat players get boat land might quickly defeated developers realized balance problem modifications limiting number enemies midenhall groups three moving cannock castle closer midenhall castle due lack cartridge space many ideas abandoned development alternate ending lorasia prince assassinated prince cannock sister dies final battle elements later used remakes sequels subplot prince cannock cursed added super famicom remake later remakes also promontory olivia dragon quest iii initially idea dragon quest ii game cartridge rom capacity 1 mbit 10 bytes free space remains final products north american release game dragon warrior ii created enix published 1990 unlike original japanese famicom version used passwords saving nes version used internal battery backup instead record player progress storyline introduction moonbrooke presented exclusively dragon warrior ii japanese original game starts right injured soldier moonbrooke entering midenhall castle seeking help king dialogue american localization often used intentionally archaic english vocabulary among differences japanese version like dragon warrior american version dragon warrior ii censored aspects example used ghost-like sprite instead original defeated character coffin cross sprite koichi sugiyama composed directed music game first album dragon quest ii suite dragon quest ii ~gods evil spirits~ released february 1987 covers ten orchestra version soundtracks twenty-five minute original sound story suite performed tokyo strings ensemble tracks classical jazz august 20 1987 first family classic concert held concert dragon quest dragon quest ii nowiki /nowiki music performed tokyo strings ensemble later october 1987 concert recording released symphonic suite cd title dragon quest concert music dragon quest ii also released piano cd drama cd several symphonic suite albums dragon quest ii nowiki /nowiki musics also collected music compilations like symphonic suite dragon quest best selection vol.1 ~roto~ 1997 dragon quest game music super collection vol 1 – 3 2001–2002 symphonic suite dragon quest complete cd-box 2003 symphonic suite dragon quest scene-separated i~ix 2011 lonely boy background music game name password input interface single anna makino since original dragon quest opened pop song sugiyama decided use song make games stylistically connected music also used japan professional baseball team chiba lotte marines fight song song played wandering fields dragon quest unknown world also played hero area ending theme road journey also ending song related anime dragon quest ii ported msx computers february 1988 ported version many issues like choppy scrolling black-surround characters titles poor graphics along sluggish combat menus msx2 ported version released may 1988 japan december 18 1993 dragon quest ii remade combined dragon quest part dragon quest ii super famicom used dragon quest v nowiki /nowiki engine besides enhanced graphics sound gameplay also improved super famicom remake features improved enemy targeting system enemy defeated character assigned attack perform attack move character attack another enemy rather nothing like famicom version like successors players find stat-improving items pots dressers super famicom remake released japan 1999 dragon quest ii released game boy color game also compatible game boy year later localized america dragon warrior ii remake similar super famicom version 8-bit graphics compared nes version featured better graphics less difficult remake also provided quick-save function allow players save load game anywhere unless reset game boy game boy color localization main characters towns names retranslated similar original japanese names legendary hero erdrick retranslated loto castle name midenhall re-dubbed lorasia original translation lot errors enix changed names help fix dragon quest ii remade japanese ntt docomo brand cell phones 2005 remakes size four times bigger original dragon quest port since phone capacity limited game divided two parts first part pre-installed cell phones second part could downloaded free world map provided pre-installed pdf file 2006 japanese mobile companies brew softbank also started selling game mobile platforms famicom super famicom versions game along dragon quest dragon quest iii re-released dragon quest 25th anniversary collection compilation wii japan september 15 2011 wii compilation featured interruptive save functions games compilation also included original copies strategy guides games along original artwork material games development square enix announced first eight dragon quest titles would re-released android ios japan dragon quest ii based previous cell phone version optimized smartphones released june 26 2014 japan english version released october 9 2014 title dragon quest ii luminaries legendary line square enix registed trademark japan 2013 united states early 2014 several guide books published first published shueisha february 1987 second tokuma shoten july 1987 third game publisher enix 1988 official guide book similar early main games series dragon quest ii novelized adapted game books dragon quest ii novel written hideo takayashiki published 1989 reprinted 1991 2000 dragon quest ii game book series also published 1989 famicom version sold approximately 2.4 million copies japan together super famicom game boy color remakes shipped excess 1.92 million copies worldwide japan mobile version downloaded one million times game included 2011 compilation called dragon quest collection wii sold 403,953 copies dragon quest ii received critical financial success japan readers gave score 28.02 30 named best overall cartridge game year 2006 readers famitsu magazine voted game 17th best video game time game generally known fixing problems found first game including improvements allowing parties three characters larger world better graphics ability carry items noted improvements keys used multiple times new strategic elements introduced larger parties larger groups enemies game music often praised despite limited 8-bit capabilities considered classic rpg genre game regarded praiseworthy japanese reviews highlighted famicom version difficulty stemming issues many traps cave rhone final boss ability cast healall spell led critics calling game difficult dragon quest dragon quest iii released director koichi nakamura said result dragon quest ii received favourable everybody creator side feel half wanted remakes dragon quest ii also successful well received famitsu awarded japanese super famicom remake 35/40 game boy color remake got 30/40 famitsu u.s. version dragon warrior ii received fairly high marks including 8.0 10 ign 9.6 10 gamespot 8 10 nintendo power also received rpgamer game boy color award year 2000 release dragon quest ii also promoted sales original dragon quest success dragon quest ii series became japanese cultural phenomenon sequel dragon quest ii dragon quest iii seeds salvation released 1988 japan serves prequel first two games follows ancestor main characters legendary hero erdrick three games collectively called erdrick saga trilogy also success game boy color remake enix released game boy color dragon warrior iii 2001 based japan-only super famicom update original dragon quest iii world dragon quest ii later used setting game boy advance | [
5762,
3181,
9006,
7023,
10931
] | Test |
6,097 | 4 | DShield:dshield dshield community-based collaborative firewall log correlation system receives logs volunteers worldwide uses analyze attack trends used data collection engine behind sans internet storm center isc dshield officially launched end november 2000 johannes ullrich since grown dominating attack correlation engine worldwide coverage dshield regularly used media cover current events analysis provided dshield used early detection several worms like ramen code red leaves sql snake dshield data regularly used researchers analyze attack patterns goal dshield project allow access correlated information public charge raise awareness provide accurate current snapshots internet attacks several data feeds provided users either include web sites use aide analyze events | [
4467,
3852,
183
] | None |
6,098 | 4 | Kerberos_(protocol):kerberos protocol kerberos computer-network authentication protocol works basis tickets allow nodes communicating non-secure network prove identity one another secure manner protocol named character kerberos cerberus greek mythology ferocious three-headed guard dog hades designers aimed primarily client–server model provides mutual authentication—both user server verify identity kerberos protocol messages protected eavesdropping replay attacks kerberos builds symmetric key cryptography requires trusted third party optionally may use public-key cryptography certain phases authentication kerberos uses udp port 88 default massachusetts institute technology mit developed kerberos protect network services provided project athena protocol based earlier needham–schroeder symmetric key protocol several versions protocol exist versions 1–3 occurred internally mit kerberos version 4 primarily designed steve miller clifford neuman published late 1980s version 4 also targeted project athena neuman kohl published version 5 1993 intention overcoming existing limitations security problems version 5 appeared rfc 1510 made obsolete rfc 4120 2005 authorities united states classified kerberos auxiliary military equipment us munitions list banned export used data encryption standard des encryption algorithm 56-bit keys non-us kerberos 4 implementation kth-krb developed royal institute technology sweden made system available outside us us changed cryptography export regulations circa 2000 swedish implementation based limited version called ebones ebones based exported mit bones release stripped encryption functions calls based version kerberos 4 patch-level 9 2005 internet engineering task force ietf kerberos working group updated specifications updates included mit makes implementation kerberos freely available copyright permissions similar used bsd 2007 mit formed kerberos consortium foster continued development founding sponsors include vendors oracle apple inc. google microsoft centrify corporation teamf1 inc. academic institutions royal institute technology sweden stanford university mit vendors cybersafe offering commercially supported versions windows 2000 later versions use kerberos default authentication method microsoft additions kerberos suite protocols documented rfc 3244 microsoft windows 2000 kerberos change password set password protocols rfc 4757 documents microsoft use rc4 cipher microsoft uses extends kerberos protocol use mit software kerberos used preferred authentication method general joining client windows domain means enabling kerberos default protocol authentications client services windows domain domains trust relationships domain contrast either client server joined domain part trusted domain environment windows instead use ntlm authentication client server intranet web applications enforce kerberos authentication method domain joined clients using apis provided sspi many unix unix-like operating systems including freebsd openbsd apple macos red hat enterprise linux oracle solaris ibm aix z/os hp hp-ux openvms others include software kerberos authentication users services embedded implementation kerberos v authentication protocol client agents network services running embedded platforms also available companies client authenticates server forwards username key distribution center kdc kdc issues ticket-granting ticket tgt time stamped encrypts using ticket-granting service tgs secret key returns encrypted result user workstation done infrequently typically user logon tgt expires point although may transparently renewed user session manager logged client needs communicate another node principal kerberos parlance service node client sends tgt tgs usually shares host kdc service must registered tgt service principal name spn client uses spn request access service verifying tgt valid user permitted access requested service tgs issues ticket session keys client client sends ticket service server ss along service request protocol described detail data encryption standard des cipher used combination kerberos longer internet standard weak security vulnerabilities exist many legacy products implement kerberos updated use newer ciphers like aes instead des november 2014 microsoft released patch ms14-068 rectify exploitable vulnerability windows implementation kerberos key distribution center kdc vulnerability purportedly allows users elevate abuse privileges domain level | [
513,
517,
7,
537,
2080,
2083,
2087,
4140,
3629,
5166,
8758,
4663,
8760,
9786,
2112,
6750,
2143,
10341,
9320,
5225,
10344,
2163,
9336,
4729,
2168,
8828,
7804,
5254,
4242,
6808,
9884,
6816,
8358,
168,
5800,
1709,
1222,
7368,
8404,
2274,
6... | Test |
6,099 | 4 | European_Information_Technologies_Certification:european information technologies certification european information technologies certification eitc programme international professional ict knowledge skills certification standard developed governed eitci institute non-profit organization based brussels provides certification individuals knowledge skills narrow specialized single-subject areas ict office software computer-aided project management online collaboration systems raster graphics processing | [
6105
] | Test |
6,100 | 2 | MiNT:mint mint tos mint free software alternative operating system kernel atari st system successors multi-tasking alternate tos magic together free system components fvdi device drivers xaaes graphical user interface widgets teradesk file manager mint provides free tos compatible replacement os multitask work mint began 1989 developer eric smith trying port gnu library related utilities atari st tos turned quickly much easier add unix-like layer tos patch gnu software mint began tos extension help porting mint originally released eric smith mint tos recursive acronym style gnu unix may 1990 new kernel got traction people contributing port minix filesystem port atari tt time atari looking enhance tos multitasking abilities found mint could fulfill job hired eric smith mint adopted official alternative kernel release atari falcon slightly altering mint acronym mint tos atari bundled mint multitasking version graphics environment manager gem name multitos floppy disk based installer atari left computer market mint development continued name freemint maintained team volunteers freemint development follows classic open-source approach source code hosted public cvs concurrent versions system repository development discussed public mailing list development since moved publicly browsable freemint git repository github mailing list still maintained sourceforge earlier 2014 move atariforge maintained almost 20 years minimal install mint run atari st stock 8 mhz 68000 cpu 4 mb ram harddrive highly recommended atari computer 16 mhz 68030 cpu 8 mb ram used mint also run inside emulators hatari steem networking 68040 virtual machine aranym freemint provides kernel several linux distributions support mint notably rpm package manager rpm based sparemint debian gnu/mint porting effort although freemint use graphical user interface tos graphics environment manager gem application environment services aes better served enhanced aes use multi-tasking abilities default one currently xaaes developed freemint kernel module older n.aes also works however modern alternative myaes | [
1668,
8262,
5096,
2345,
7305,
7849,
5612,
7983,
2290,
5363,
2197,
3797,
5397,
6104,
1530,
7483,
2045
] | None |
6,101 | 1 | Suppliers_and_Parts_database:suppliers parts database suppliers parts database example relational database referred extensively literature described detail c. j date introduction 8ed simple database comprising three tables supplier part shipment often used minimal exemplar interrelationships found database following sql schema one possible expression suppliers-and-parts database notes | [
10632,
3556,
9286
] | None |
6,102 | 9 | Reserved_word:reserved word computer language reserved word also known reserved identifier word used identifier name variable function label – reserved use syntactic definition reserved word may meaning closely related often conflated notion keyword word special meaning particular context semantic definition contrast names standard library built language considered reserved words keywords terms reserved word keyword often used interchangeably – one may say reserved word reserved use keyword – formal use varies language language article distinguish general reserved words keywords need coincide modern languages keywords subset reserved words makes parsing easier since keywords confused identifiers languages like c python reserved words keywords coincide languages like java keywords reserved words reserved words keywords – reserved future use yet languages older languages algol fortran pl/i keywords reserved words keywords distinguished identifiers means makes parsing difficult look-ahead parsers necessary sets reserved words keywords language often coincide almost equal distinction subtle terms often used interchangeably however careful usage distinguished making keywords reserved words makes lexing easier string characters unambiguously either keyword identifier without depending context thus keywords usually subset reserved words however reserved words need keywords – example java codice_1 reserved word meaning appear production rules grammar usually done forward compatibility reserved word may become keyword future version without breaking existing programs conversely keywords need reserved words role understood context may distinguished another manner stropping example phrase codice_2 unambiguous grammars since control statement clause start codice_3 thus allowed languages fortran alternatively algol 68 keywords must stropped – marked way distinguished – strict language listing bold thus reserved words thus strict language following expression legal bold keyword conflict ordinary identifier codice_4 however algol 68 also stropping regime keywords reserved words example distinct concepts often coincide followed many modern languages reserved word one looks like normal word allowed used normal word formally means satisfies usual lexical syntax syntax words identifiers – example sequence letters – used identifiers used example word codice_4 commonly reserved word codice_6 generally codice_7 valid assignment codice_2 keywords varied uses primarily fall classes part phrase grammar specifically production rule nonterminal symbols various meanings often used control flow word codice_4 procedural languages indicates conditional takes clauses nonterminal symbols names primitive types language support type system codice_10 primitive literal values codice_11 boolean true sometimes special commands like codice_12 uses keywords phrases input/output codice_13 distinct definitions clear language analyzed combination lexer parser syntax language generated lexical grammar words context-free grammar production rules phrases common analyzing modern languages case keywords subset reserved words must distinguished identifiers word level hence reserved words syntactically analyzed differently phrase level keywords case reserved words defined part lexical grammar tokenized separate type distinct identifiers conventional notation reserved words codice_4 codice_15 example tokenized types codice_16 codice_17 respectively codice_6 codice_19 tokenized type codice_20 keywords contrast syntactically appear phrase grammar terminal symbols example production rule conditional expression may codice_21 case codice_16 codice_17 terminal symbols meaning token type codice_16 codice_17 respectively – due lexical grammar means string codice_4 codice_15 original source example primitive constant value codice_11 may keyword representing boolean value true case appear grammar possible expansion production codice_29 instance beyond reserving specific lists words languages reserve entire ranges words use private spaces future language version different dialects compiler vendor-specific extensions internal use compiler notably name mangling often done using prefix often one underscores c c++ notable respect c99 reserves identifiers start two underscores underscore followed uppercase letter reserves identifiers start single underscore ordinary tag spaces use file scope c++03 reserves identifiers contain double underscore anywhere – allows use double underscore separator connect user identifiers instance frequent use double underscores internal identifiers python gave rise abbreviation dunder coined mark jackson independently tim hochberg within minutes reply question 2002 list reserved words keywords language defined language developed form part language formal specification generally one wishes minimize number reserved words avoid restricting valid identifier names introducing new reserved words breaks existing programs use word backwards compatible avoided prevent provide forward compatibility sometimes words reserved without current use reserved word keyword allows word used future without breaking existing programs alternatively new language features implemented predefineds overridden thus breaking existing programs reasons flexibility include allowing compiler vendors extend specification including non-standard features different standard dialects language extend future versions language include additional features example procedural language may anticipate adding object-oriented capabilities future version dialect point one might add keywords like codice_30 codice_31 accommodate possibility current specification may make reserved words even currently used notable example java codice_32 codice_1 reserved words — meaning java also used identifiers reserving terms implemented future versions java desired without breaking older java source code example proposal 1999 add c++-like codice_32 language possible using codice_32 word since reserved currently unused however proposal rejected – notably even though adding feature would break existing programs using standard library notably collections would break compatibility javascript also contains number reserved words without special functionality exact list varies version mode languages differ significantly frequently introduce new reserved words keywords name languages conservative introducing new keywords rarely never avoid breaking existing programs languages introduce new keywords freely requiring existing programs change existing identifiers conflict case study given new keywords c11 compared c++11 2011 – recall c c++ identifiers begin underscore followed uppercase letter reserved c11 introduced keyword codice_36 within existing set reserved words certain prefix used separate facility macro processing allow use new keyword without prefixing c++11 introduce keyword codice_37 despite existing reserved word breaking programs used without requiring macro processing related notion reserved words predefined functions methods subroutines variables particularly library routines standard library similar part basic language may used similar purposes however differ name predefined function method subroutine typically categorized identifier instead reserved word treated specially syntactic analysis reserved words may redefined programmer predefineds often overridden capacity languages vary provided keyword predefined languages instance provide keywords input/output operations whereas others library routines python versions earlier 3.0 many basic dialects codice_13 keyword contrast c lisp python 3.0 equivalents codice_39 codice_40 codice_13 functions standard library similarly python prior 3.0 codice_42 codice_43 codice_44 predefined variables reserved words python 3.0 made reserved words use terms keyword reserved word interchangeably others distinguish usage say using keyword mean word special certain contexts reserved word mean special word used user-defined name meaning keywords — indeed meaning notion keyword — differs widely language language concretely algol 68 keywords stropped strict language written bold reserved words – unstropped word used ordinary identifier java language specification uses term keyword iso 9899 standard c programming language uses term keyword many languages c similar environments like c++ keyword reserved word identifies syntactic form words used control flow constructs codice_15 codice_46 keywords languages keywords also used names variables functions languages algol algol 68 keywords written verbatim must stropped means keywords must marked somehow e.g quoting prefixing special character consequence keywords reserved words thus word used normal identifier however one stropping regime strop keywords instead simply reserved words languages postscript extremely liberal approach allowing core keywords redefined specific purposes common lisp term keyword keyword symbol used special sort symbol identifier unlike symbols usually stand variables functions keywords self-quoting self-evaluating interned keyword package keywords usually used label named arguments functions represent symbolic values symbols name functions variables special forms macros package named common-lisp basically reserved words effect redefining undefined ansi common lisp binding possible instance expression codice_47 possible codice_4 local variable leftmost codice_4 refers codice_4 operator remaining symbols interpreted variable names since separate namespace functions variables codice_4 could local variable common lisp however two special symbols keyword package symbols codice_52 codice_53 evaluated expressions evaluate used names functions variables de facto reserved codice_54 well-formed expression codice_55 operator permit usage typically programmer attempts use keyword variable function name compilation error triggered modern editors keywords automatically set particular text colour remind inform programmers keywords languages macros lazy evaluation control flow constructs codice_4 implemented macros functions languages without expressive features generally keywords languages numbers reserved words example java c derivatives rather sparse complement reserved words—approximately 50 – whereas cobol approximately 400 end spectrum pure prolog pl/i none number reserved words language little “ powerful ” language cobol designed 1950s business language made self-documenting using english-like structural elements verbs clauses sentences sections divisions c hand written terse syntactically get text screen example compare equivalent blocks code c cobol calculate weekly earnings pure prolog logic expressed terms relations execution triggered running queries relations constructs loops implemented using recursive relationships three languages solve types “ problems ” even though differing numbers reserved words “ power ” relates belonging set turing-complete languages definition reserved words language raises problems language may difficult new users learn long list reserved words memorize ca n't used identifiers may difficult extend language addition reserved words new features might invalidate existing programs conversely overloading existing reserved words new meanings confusing porting programs problematic word reserved one system/compiler might reserved another microsoft ’ .net common language infrastructure cli specification allows code written 40+ different programming languages combined together final product identifier/reserved word collisions occur code implemented one language tries execute code written another language example visual basic.net library may contain class definition class definition visual basic.net public class end class compiled distributed part toolbox c programmer wishing define variable type “ codice_57 ” would encounter problem codice_58 reserved word c thus following compile c // using class c x new // wo n't compile similar issue arises accessing members overriding virtual methods identifying namespaces resolved stropping order work around issue specification allows programmer c place at-sign identifier forces considered identifier rather reserved word compiler // using class c x new // compile consistency usage also permitted non-public settings local variables parameter names private members | [
512,
5635,
3462,
6536,
2316,
2062,
9871,
10510,
155,
7710,
3999,
5677,
5428,
8628,
8502,
1724,
9665,
10953,
1611,
7889,
11474,
3923,
380,
3164,
6502,
8554,
6640,
10739,
3573,
2936,
2556,
2045,
1535
] | None |
6,103 | 5 | Registration_Data_Access_Protocol:registration data access protocol registration data access protocol rdap computer network communications protocol standardized working group internet engineering task force 2015 experimental developments thorough discussions successor whois protocol used look relevant registration data internet resources domain names ip addresses autonomous system numbers whois essentially retrieves free text rdap delivers data standard machine-readable json format order accomplish goal output operative whois servers analyzed taking census labels used rdap designers many members number name registries strove keep protocol simple possible since complexity considered one reasons previous attempts crisp failed rdap based restful web services error codes user identification authentication access control delivered http biggest delay getting rdap done turned bootstrap figuring server top level domain ip range asn range iana agreed host bootstrap information suitable registries publish well-known location urls json format registries started empty gradually populated registrants domains address spaces provide rdap server information iana number registries arin set public rdap service also features bootstrap url similar whois name registries icann requires rdap compliance since 2013 | [
8204,
11221,
2887
] | Test |
6,104 | 2 | EmuTOS:emutos emutos replacement tos operating system atari st successors released free software mainly intended used atari emulators clones hatari firebee emutos provides support modern hardware avoids use old proprietary tos usually difficult obtain unlike original tos latest emutos work sometimes limited support atari hardware even amiga computers support features available coldfire cpu ide fat partitions emulators native features support support lacks deprecated os apis though line-a api functions included design emutos lacks support non-documented os features support atari falcon sound matrix dsp support missing vdi supports 1- 2- 4- 8-bit interleaved graphics modes support atari falcon amiga 16-bit resolutions completely missing therefore certain old games demos applications also falcon-specific software may work release 0.9.1 support firebee evaluation boards 256 colours display videl systems xbios dma sound functions emucon2 shell tab completion renaming folders added full-featured desktop included also smallest 192k rom version release 0.9.2 bugfix release 0.9.3 support sd/mmc cards external ide connector poweroff functions firebee platform compactflash used ide media handling fat partition media change detection enhanced fixes improvements emutos-ram booting fvdi compatibility general vdi speed acsi xhdi support see atari tos release 0.9.4 compiled -o2 default better performance except 192k version use less ram add new variant coldfire evaluation boards bas_gcc bios desktop display text files move files/folders control key release 0.9.5 fix issues steem emulator hard disk emulation add alt+arrow mouse emulation pexec mode 7 support dual keyboard support user specify boot partition startup recovery exceptions user programs stack initialization amiga translated text object alignment improvements support line-a functions completed release 0.9.6 fixes real tt hw full vdi support atari tt video resolutions enable midi input add emucon 'mode command support etv_term function many fixes release 0.9.7 support extended mbr partitions monster board eiffel bus coldfire evb apollo core 68080 freemint support non-atari hardware desktop 'install devices 'install icon 'remove desktop icon features standalone version emucon2 | [
2179,
8262,
7849,
178,
2290,
6100,
11221,
1530
] | Test |
6,105 | 4 | European_Information_Technologies_Certification_Academy:european information technologies certification academy european information technologies certification academy eitca programme international professional ict knowledge skills certification standard developed governed eitci institute – non-profit organization based brussels provides certification individuals knowledge skills broad field-oriented areas ict expertise computer graphics information security etc eitca programmes referred eitca academies include selected sets several dozen individual eitc programmes together comprise particular area qualifications june 2015 eitca certification standard includes following academies | [
10307,
357,
9607,
8462,
5010,
6099,
1493,
3447
] | None |
6,106 | 3 | Duncan's_Taxonomy:duncan taxonomy duncan taxonomy classification computer architectures proposed ralph duncan 1990 duncan proposed modifications flynn taxonomy include pipelined vector processes taxonomy developed 1988-1990 first published 1990 original categories indicated category includes parallel architectures coordinate concurrent execution lockstep fashion via mechanisms global clocks central control units vector unit controllers subdivision category made primarily basis synchronization mechanism pipelined vector processors characterized pipelined functional units accept sequential stream array vector elements different stages filled pipeline processing different elements vector given time parallelism provided pipelining individual functional units described well operating multiple units kind parallel chaining output one unit another unit input vector architectures stream vector elements functional units special vector registers termed register-to-register architectures feed functional units special memory buffers designated memory-to-memory architectures early examples register-to-register architectures 1960s early 1970s include cray-1 fujitsu vp-200 control data cyber 205 texas instruments advanced scientific computer early examples memory-to-memory vector architectures late 1980s early 1990s saw introduction vector architectures cray y-mp/4 nippon electric corporation sx-3 supported 4-10 vector processors shared memory see nec sx architecture scheme uses simd single instruction stream multiple data stream category flynn taxonomy root class processor array associative memory subclasses simd architectures characterized control unit broadcast common instruction processing elements execute instruction lockstep diverse operands local data common features include ability individual processors disable instruction ability propagate instruction results immediate neighbors interconnection network systolic arrays proposed 1980s multiprocessors data partial results rhythmically pumped processor processor regular local interconnection network systolic architectures use global clock explicit timing delays synchronize data flow processor processor processor systolic system executes invariant sequence instructions data results pulsed neighboring processors based flynn multiple-instruction-multiple-data streams terminology category spans wide spectrum architectures processors execute multiple instruction sequences potentially dissimilar data streams without strict synchronization although instruction data streams different processor need thus mimd architectures run identical programs various stages given time run unique instruction data streams processor execute combination scenarios category subdivided primarily basis memory organization mimd-based paradigms category subsumes systems specific programming execution paradigm least fundamental architectural design structural considerations thus design dataflow architectures reduction machines much product supporting distinctive execution paradigm product connecting processors memories mimd fashion category subdivisions defined paradigms | [
9932
] | Test |
6,107 | 3 | SPARC_T_series:sparc series sparc t-series family risc processors server computers based sparc v9 architecture originally developed sun microsystems later oracle corporation acquisition sun distinguishing feature earlier sparc iterations introduction chip multithreading cmt technology multithreading multicore design intended drive greater processor utilization lower power consumption first generation t-series processor ultrasparc t1 servers based announced december 2005 later generations introduced term series used refer entire family processors sun microsystems sun fire sparc enterprise product lines based early generations cmt technology ultrasparc t1 based sun fire t2000 t1000 servers launched december 2005 early 2006 respectively later rebranded match name ultrasparc t2 t2 plus based sun sparc enterprise t5**0 servers september 2010 oracle announced range sparc t3 processor based servers branded sparc t3 series sparc enterprise brand dropped sparc t3-series servers include t3-1b blade server module fits sun blade 6000 system t3 based servers rack mounted systems subsequent t-series server generations also include blade server sun blade 6000 form factor september 26 2011 oracle announced range sparc t4-based servers systems use chassis earlier t3 based systems main features similar exception march 26 2013 oracle announced refreshed sparc servers based new sparc t5 microprocessor company claims world fastest t5 range servers single socket rackmount server design deprecated new eight-socket rackmount server introduced october 26 2015 oracle announced family systems built 32-core 256-thread sparc m7 microprocessor unlike prior generations t- m-series systems introduced using processor sparc t-series servers partitioned using oracle logical domains technology additional virtualization provided oracle solaris zones aka solaris containers create isolated virtual servers within single operating system instance logical domains solaris zones used together increase server utilization | [
9090,
1539,
4241,
8863,
8353,
8994,
8871,
1707,
2731,
5677,
9010,
10675,
9012,
4664,
10553,
1594,
9665,
6338,
6341,
597,
6107,
731,
2269,
1755,
1250,
10340,
11626,
7022,
8434,
1399
] | None |
6,108 | 7 | Integrated_Middleware_Platform:integrated middleware platform imp integrated middleware platform external system aiming service logic communication imp receives messages outside translates messages understandable scs way imp isolates external platform enhances communication efficiency safety way imp connect olc server csip server northbound interface | [
8122
] | Test |
6,109 | 3 | Lode_Runner:lode runner lode runner 2d fixed-screen platform game video game first published broderbund 1983 levels lode runner puzzle-oriented player controls one character must collect gold pieces level get end chased number enemies one first games include level editor original game number remakes spin-offs sequels published lode runner series different computers consoles different developers publishers tozai games currently holds copyright trademark rights prototype later became lode runner game developed douglas e. smith renton washington time architecture student university washington prototype called kong written prime computer 550 minicomputer limited one building uw campus shortly thereafter kong ported vax minicomputers terminals available campus game programmed fortran used ascii character graphics kong ported vax pascal sections mixed original fortran code one weekend 1982 smith able build crude playable version 6502 assembly language apple ii+ renamed game miner end year refined version black-and-white joystick support submitted rough version brøderbund around october 1982 received one-line rejection letter response effect thank submitting game concept unfortunately fit within product line miner like text-based kong predecessors simple animation characters move across screen block increments primitive acceptable commercial product brøderbund wanted detailed pixel-level movement smith new game would one first include level editor feature allows players create levels game according article smith given 10,000 advance brøderbund develop inter-square animation provide 150 levels play 2010 interview game designer john romero claimed smith added level editing function request neighborhood kids testing game ton levels designed ended final game smith borrowed money purchase color monitor joystick continued improve game around christmas 1982 submitted game renamed lode runner four publishers quickly received offers four sierra sirius synergistic brøderbund took deal brøderbund game released mid-1983 original microcomputer versions apple ii atari 8-bit family vic-20 commodore 64 ibm pc vic-20 version released cartridge even including level editor commodore 64 disk cartridge release latter 32 levels ibm version originally self-booting disk incompatible video cards cga later pc release appeared 1986 runs video card port original 128k macintosh followed 1984 run machines os 6 also used system 7 patch versions include atari st sinclair spectrum 48k/128k licensed version msx computer published ascii corporation sega sg-1000 nes windows 3.1 macintosh original game boy nes version released hudson soft 1984 north american release 1986 became one earliest third-party games made system 50 levels scrolling screens added music graphics redone cartoon-like style addition fruits vegetables randomly appear may grabbed additional points although level editor included way save levels created arcade game lode runner produced added features like ability hang ends ladders improved enemy ai brøderbund released special enhanced version championship lode runner 1985 50 levels much higher difficulty original company offered commemorative certificate anyone could submit proof beaten entire game submitted proof purchase show copy game pirated ported apple atari c64 msx pc well nes although version reach north america atari 8-bit version lode runner converted cartridge re-released atari corporation 1987 one series releases atari xegs console version contains 150 levels level editor required disk drive player controls stick figure must collect gold level avoiding guards try catch player collecting gold player must reach top screen reach next level 150 levels game progressively challenge players problem-solving abilities reaction times levels feature multi-story brick platform motif ladders suspended hand-to-hand bars offer multiple ways travel throughout player dig holes floors temporarily trap guards may safely walk atop trapped guards guard carrying bar gold falls hole left behind retrieved player time floors dug regenerate filling holes trapped guard escape hole fills consumed immediately respawning random location top level unlike guards player character may climb hole killed fills escape means floors may also contain trapdoors player guards fall bedrock player dig notably player dig hole sides directly underneath introduces important strategy digging hole x blocks deep player must first dig gap least x wide able dig number spaces shrink layer player needs least one free adjacent space able dig however exceptions rule arise player digs position standing ladder hanging hand-to-hand bar allows player repeatedly dig descend one row kind digging involved solving many levels player starts five lives level completion awards extra life guard catch player one life subtracted current level restarts player character fall arbitrary heights without injury jump players trap pits escape abort level costing life begin guards simply home player always taking shortest path also move counter-intuitive ways according strange algorithm key factor game logic especially advanced levels exploiting behavior guards essential toward attaining solution sometimes player guard ladder instance guard move away player general depending exact positioning relative lode runner guards sometimes appear repelled behavior far random however big part mastering game involves developing intuition predict movement guards player may come contact guard directly stick figure feet touching guard head enables player walk guards temporarily stuck hole dug also possible make contact guard player free fall since player runs faster guards also falls faster moreover possible survive feet-to-head contact guard standing platform begins move forms contact necessary solve levels sometimes necessary liberate trapped guard digging standing head moving rapidly opposite direction guard begins marching freedom levels necessary use falling guard bridge reach otherwise unreachable area one subtlety movement initiated standing guard head briefly touching guard head free fall consequences fatal levels guards deliberately trapped various ways instance lured entering part level escape situations player liberate trapped guards digging levels collect gold pieces player must exploit guards collecting gold pieces positioned whichever figure collects become trapped guard collects piece becomes trapped player release guard later steal gold guard drops falls hole levels gold pieces collected killing guards trapping dug holes close deceased guards come back life locations near top screen may allow reach parts level reached player levels require careful ordering traversal divided zones connected passages impossible traverse reverse direction gold piece remains unreachable zone player may abort level start losing life unless way coax guard bringing gold game puzzles advanced levels time-sensitive player must dig order penetrate interior cavern collect gold quickly return way digging repairs enclosing lode runner cavern means escape puzzles require deliberate timing among digging actions lode runner must run previously dug-out tiles repaired enough time pass ones yet repaired lode runner successful broderbund second best-selling commodore game late 1987 sales surpassed 250,000 copies november 1989 computer gaming world held contest best reader-built level softline 1983 praised lode runner calling smooth thoughtful quite addictive magazine approved large number unique levels level editor possibilities astounding emphasis wits strategy violence computer gaming world praised lode runner unusually easy-to-use level editor strategy necessary arcade title describing one thinking men arcade games praises introduction strategy climbing game genre intuitive level editor repeated video magazine review game well praise graphics animation apple ii version described stand ing far ahead pack ahoy 1984 called game top-notch action game requires quick mind agile joystick easy-to-use game generator magazine concluded lode runner one best games available c-64 unconditionally wholeheartedly recommended pc magazine gave game 16.25 18 points magazine called game tour de force american ingenuity ... first release long long time honestly bear title 'computer game ... lode runner uses power pc create something much video version ping pong game requires thought magazine praised ibm pc version graphics increasingly difficult level design level editor commodore 64 home companion said lots education hidden level editor concluding lode runner one first new breed computer game lets player creator 1985 game still selling well video magazine reporting 6th best-selling recreational title march april year zzap 64 called commodore 64 version one recent games certainly one best ... classic long time come ... graphically minuscule aurally crude game sheer addiction kept eyes propped open owls went bed 1984 lode runner awarded 1984 computer game year 5th annual arkie awards judges praised outstanding design described fascinating irresistible thinking player climbing conquest softline readers named lode runner popular apple fourth most-popular atari program 1983 1993 spectrum version game voted number 37 sinclair official top 100 games time gamespot named lode runner one greatest games time 1996 computer gaming world declared lode runner 80th-best computer game ever released time 2010 rated lode runner 1 game 10 greatest games apple ii list orson scott card wrote compute 1989 editor first game let family express creativity gaming tetris designer alexey pajitnov claimed 2008 lode runner favorite puzzle game many years 1984 irem developed arcade conversion lode runner contained 24 remixed levels 150 original levels irem brought many arcade inspired levels famicom disk system names super lode runner super lode runner ii arcade version numerous sequels including several versions lode runner released u.s. lode runner twin power lode runner 1999 sfc vary gameplay mostly adding different characters scenarios another title battle lode runner originally exclusive japan made available 23 april 2007 first japan-only game appear nintendo virtual console service original lode runner followed june 2007 also cubic lode runner 3-d lode runner variant released japan nintendo gamecube playstation 2 nes version developed hudson soft marked first appearance bombermen opposing robots end screen bomberman nes notes original white bomberman turned human hints appearance another game lode runner behind japanese version reference direct congratulations bomber man becomes runner see lode runner japan famicom version lode runner allows editing creating levels share friends using famicom data recorder hudson soft also announced version lode runner nintendo ds released 2006 unreleased version game atari lynx discovered 2008 old atari corp. hard drive january 7 2008 remake lode runner developed tozai southend interactive announced ces '08 released april 22 2009 game features revamped 3d graphics additional game modes cooperative competitive multiplayer support six new block types level editor well live leaderboards timeline game history lode runner classic made available xbox live enhanced game windows phone 7 series phones july 18 2012 features graphics gameplay 150 levels original lode runner game january 17 2013 lode runner classic released ios android phones | [
5762,
9446,
10855,
8925,
8524,
6797,
9006,
10316,
6109,
7281,
6546,
10931,
11604,
3960,
10010,
477,
7679
] | None |
6,110 | 4 | Nexor:nexor nexor limited privately held company based nottingham providing product services safeguard government defence critical national infrastructure computer systems originally known x-tel services limited nexor limited founded 1989 x-tel services limited university nottingham ucl following research x.400 x.500 systems isode project 1992 stephen kingan joined business ceo 1993 x-tel services limited renamed nexor limited 1996 3i invested business launch nexor inc 2004 kingan nigel fasey acquired business 2008 colin robbins appointed board cto 2012 kingan acquired 100 ownership nexor october 2013 company moved headquarters nottingham science park ng2 business park nexor customers include nato european defence agency uk mod us dod canadian dnd foreign commonwealth office met office nexor designed deployed first public internet search engine aliweb associated robots exclusion standard nexor contributor internet engineering task force worked internet rfcs 1086 1165 1488 1606 1778 nexor developed microsoft exchange client unix nexor first organisation awarded intellect best practice certificate nexor run regular demonstrations coalition warrior interoperability demonstration nexor first organisation achieve tickitplus quality-management certification program software development nexor strategic partnerships boldon james qinetiq nexor data diode product supplied via oem relationship fox-it nexor supplier uk government g-cloud cloudstore official cyber security supplier uk government nexor 2013 dsei innovation challenge nexor contributor cyber champions community initiative promote best practices digital literacy online safety awareness schools youth organisations interest groups across uk nexor sponsor cyber security challenge designed promote careers cyber security nexor first batch companies achieve uk ’ cyber essential standard contributor industry launch partner pas754 software development standard led trustworthy software initiative 2015 nexor launched consulting arm qonex nexor primarily focused secure information exchange defence governments critical infrastructure products services include several nexor products evaluated common criteria scheme obtain independent verification claimed functionality including nexor contributor following collaborative research development projects paradise 1989-2002 piloting research directory osi environment part esprit cosine project establish pan-european computer-based network infrastructure enabled research workers communicate using osi later prefixed nameflow-paradise paradise implemented distributed x.500 systems across 700 dsas 30 countries project documented nameflow archive quipu major x.500 implementation used paradise implementations also came inria led christian huitema siemens dirx originating thorn project implementing ecma tr32 standard david goodman project manager maits multilingual application interface telematic services developed multilingual interfaces x.400 x.500 top paradise password 1993-1995 piloting secure service within osi r european community-sponsored value program comprising consortia france germany gmd darmstadt uk ucl nexor establish pilot security infrastructure network applications european research community consortium developed secured applications based x.509 including osisec pki primary application pem forerunner s/mime seeoti goodman ucl project manager joerg reichelt nexor lead engineer eurocoop 1991-1992 esprit iii project 5303 follow project eurocode 1992-1995 esprit iii project 6155 aimed develop powerful effective systems supporting distributed collaborative work partners included aarhus university gmd darmstadt rank xerox icl approach adopted integrate components number existing systems develop new collaborative tools based study large-scale technical application encompasses many collaboration problems single components tools developed integrated existing tools able interoperate icw closely related dti funded project pippa hennessy nexor project manager regis 1995–1998 collaborative project diamond cable communications university sheffield investigate problems inherent providing regional business communities low-cost high-speed access local information services robbins nexor project manager eu acts project renaissance 1995–97 led fretwell downing develop virtual vocational training environment university sheffield diamond cable communications yorkshire cable delivered uk national centre popular music harold combs nexor project manager igrc project 2010-2012 collaborative project hp assuria infogov cranfield university loughborough university birkbeck university london automate threat level control status changes real-time management complexity risk resilience secure information infrastructure cloudfilter 2012–13 epsrc collaborative project imperial college explore novel methods exercising control sensitive data propagation across multiple cloud providers project led 2ic deliver proof-of-concept demonstration cross domain tactical service bus. winning dsei innovation award 2013 project de montfort university research develop implement use hardware robust alternative software high assurance network security devices defence science technology laboratory dstl behalf uk ministry defence established programme realise potential benefits novel technology front line forces consortium led qinetiq called sirius comprising 40 organisations provides experience research capability csiis september 2014 nexor best research poster annual symposium uk information assurance advisory council iaac based csiis work many nexor employees current former made contributions internet business community including | [
6337,
2558,
4806,
5384,
6054,
8904,
11470,
1297,
6110,
10238,
6648,
3930,
6651,
8859,
4573,
1086
] | None |
6,111 | 7 | Chrome_River_Technologies:chrome river technologies chrome river technologies american software-as-a-service company creates expense reporting supplier invoice automation software mid-size large commercial non profit organizations higher education institutions worldwide founded 2007 alan rich dave terry formerly executives thomson reuters elite los angeles-based company received several awards recognition including rankings inc. 5000 deloitte fast 500 los angeles business journal fast growth company headquartered sag-aftra plaza los angeles miracle mile chrome river co-founded alan rich dave terry 2007 rich originally started software company elite data processing father harvey rich 1988 company specializing similar field financial management systems renamed thomson elite acquired thomson corporation 2003 rich stepped thomson elite february 2007 founding chrome river march year chrome river first released market 2008 initially focusing law firms 2012 chrome river used almost half 100 largest law firms united states company began focus expanding general corporate market 2012 company took us 3 million investment fund expansion chrome river also announced first overseas expansion london 2012 january 2014 company received us 17 million capital bain capital ventures.. june 2015 equity firm great hill partners invested us 100 million company order grow company global presence company using capital accelerate development enterprise mobile technologies continue global expansion 35 million raised company 2018 2016 chrome river announced international expansion launch presence sydney 2018 company launched presence germany 2018 chrome river listed los angeles business journal fastest growing companies list inc. 500/5000 seven times deloitte fast 500 five times chrome river software focuses automating processes around expense reporting supplier invoice processing businesses focusing corporate expense management software offered software service company solution uses optical character recognition data extraction technologies extract categorize data images typically paper receipts html email receipts create line items expense reports chrome river ’ interface web app built using html5 featuring responsive web design rwd allows accessed via mobile web browser without need download mobile app company prosper product integrates company expense data sales data salesforce.com crm solution allowing sales finance teams visualize expense types influence sales managers deploy sales staff based upcoming travel plans company partners number financial institutions including u.s. bank western union business travel software providers including amadeus sabre expedia egencia corporate travel division yatra create solutions streamline process creating processing expenses 2018 analyst firm idc positioned chrome river leader marketscape analysis expense management software vendors chrome river customer base 1,000 organizations 2 million users across 115 countries company predominantly sells global 2000 fortune 500 organizations although also multiple small medium-sized enterprise non-profit customers result company ’ heritage legal industry chrome river used three-quarters amlaw 100 two-thirds global 100 law firms chrome river also 100 customers higher education result partnership education management software provider ellucian notable customers include cargill coca-cola hellenic bosch sabre corporation | [
5857,
10090,
467
] | Validation |
6,112 | 9 | Clipper_(programming_language):clipper programming language clipper xbase compiler computer programming language used create software programs originally operated primarily ms-dos although powerful general-purpose programming language primarily used create database/business programs clipper created nantucket corporation company started 1984 barry rebell management brian russell technical 1992 company sold computer associates 190 million dollars product renamed ca-clipper clipper created replacement programming language ashton tate dbase iii popular database language time advantage clipper dbase could compiled executed ms-dos standalone application years 1985 1992 millions clipper applications built typically small businesses dealing databases concerning many aspects client management inventory management many smaller businesses clipper application designed specific needs first experience software development also lot applications banking insurance companies developed especially cases application considered small developed run traditional mainframes environments clipper also served front end existing mainframe applications product matured remained dos tool many years added elements c programming language pascal programming language well oop code-block data-type hybridizing concepts dbase macros string-evaluation function pointers become far powerful original nantucket aspen project later matured windows native-code visual objects compiler despite efforts early nineties new ownership clipper proved unable make smooth transition ms-dos microsoft windows era result almost new commercial applications written clipper 1995 four important languages took clipper visual basic microsoft access delphi powerbuilder existing clipper applications continued use ten fifteen years requiring regular maintenance around 2015 number clipper applications still used commercially daily basis small clipper language actively implemented extended multiple organizations/vendors like xbase++ alaska software flagship well free gpl-licensed projects like harbour xharbour many current implementations portable dos windows linux 32- 64-bit unix 32- 64-bit macos supporting many language extensions greatly extended runtime libraries well various replaceable database drivers rdd supporting many popular database formats like dbf dbtntx dbfcdx foxpro apollo comix advantage database server machsix six driver apollo sql newer implementations strive full compatibility standard dbase/xbase syntax also offering oop approaches target-based syntax sqlexecute clipper usenet newsgroups comp.lang.clipper comp.lang.clipper.visual-objects simple hello world application simple data base input mask various versions clipper nantucket corporation seasonal versions billed dbase compilers nantucket corporation clipper 5 computer associates ca-clipper 5 additional standard clipper library notable additional library named clipper tools developed ca beginning clipper production three versions library manufactured associated 5st clippers version library became de facto standard clipper clones xharbour also cloned number clipper clones manufacturers | [
6147,
4614,
6797,
10899,
3350,
2462,
1952,
5154,
8868,
10921,
5546,
10413,
7983,
823,
8262,
8393,
4042,
9166,
847,
2901,
2903,
987,
6631,
3435,
2929,
9714,
5492,
2045,
5374
] | None |
6,113 | 7 | Parallelization_contract:parallelization contract parallelization contract pact programming model generalization mapreduce programming model uses second order functions perform concurrent computations large petabytes data sets parallel similar mapreduce arbitrary user code handed executed pacts however pact generalizes couple mapreduce concepts apache flink open-source parallel data processing platform implemented pacts flink allows users specify user functions annotations parallelization contracts pacts data processing operators data flow therefore pact one data inputs one outputs pact consists two components figure shows components work together input contracts split input data independently processable subset user code called independent subsets calls executed parallel subsets independent optionally user code annotated additional information annotations disclose information behavior black-box user function pact compiler utilize information obtain efficient execution plans however missing annotation change result execution incorrect output contract produces wrong results currently supported input contracts annotation presented discussed following input contracts split input data pact independently processable subsets handed user function pact input contracts vary number data inputs way independent subsets generated formally input contracts second-order functions first-order function user code one input sets none key fields per input parameters first-order function called one multiple times subsets input set since first-order functions side effects call independent calls done parallel second-order functions map reduce mapreduce programming model input contracts context pact programming model map input contract works way mapreduce single input assigns input record subset hence records processed independently see figure \\ reduce input contract semantics reduce function mapreduce single input groups together records identical key fields groups handed whole user code processed see figure pact programming model also support optional combiners e.g partial aggregations \\ cross input contract works two inputs builds cartesian product records inputs element cartesian product pair records handed user code \\ match input contract works two inputs inputs matches records identical key fields come different inputs hence resembles equality join keys inputs attributes join matched pair records handed user code \\ cogroup input contract works two inputs well seen reduce two inputs input records grouped key reduce handed user code contrast match user code also called key one input pair see blue key example contrast mapreduce pact uses generic data model records pact record pass data functions pact record thought tuple free schema interpretation fields record user function key/value pair mapreduce special case record two fields key value input contracts operate keys like //reduce// //match// //cogroup// one specifies combination record fields make key arbitrary combination fields may used see query example programs defining //reduce// //match// contracts one fields written minimally move data fields record may sparsely filled i.e may fields //null// values legal produce record example fields 2 5 set fields 1 3 4 interpreted //null// fields used contract key fields may however null exception raised user code annotation optional pact programming model allow developer make certain behaviors her/his user code explicit optimizer pact optimizer utilize information obtain efficient execution plans however impact correctness result valid annotation attached user code hand invalidly specified annotations might cause computation wrong results following list current set available output contracts **constant fields** annotation marks fields modified user code function note every input record constant field may change content position output record case binary second-order functions cross match cogroup user specify one annotation per input **constant fields except** annotation inverse **constant fields** annotation annotates fields might modified annotated user-function hence optimizer considers **any annotated field constant** annotation used carefully binary second-order functions cross match cogroup one annotation per input defined note either constant fields constant fields except annotation may used input pact programs constructed data flow graphs consist data sources pacts data sinks one data sources read files contain input data generate records files records processed one pacts consisting input contract user code optional code annotations finally results written back output files one data sinks contrast mapreduce programming model pact program arbitrary complex fixed structure \\ figure shows pact program two data sources four pacts one data sink data source reads data specified location file system sources forward data respective pacts map input contracts user code shown figure output map pacts streams pact match input contract last pact reduce input contract forwards result data sink detailed comparison mapreduce pact programming models read paper // mapreduce pact comparing data parallel programming models // see page | [
9179,
11343
] | Test |
6,114 | 2 | Desktop_Window_Manager:desktop window manager desktop window manager dwm previously desktop compositing engine dce window manager windows vista windows 7 windows 8 windows 10 enables use hardware acceleration render graphical user interface windows originally created enable portions new windows aero user experience allowed effects transparency 3d window switching also included windows server 2008 requires desktop experience feature compatible graphics drivers installed desktop window manager compositing window manager means program buffer writes data dwm composites program buffer final image comparison stacking window manager windows xp earlier also windows vista windows 7 windows aero disabled comprises single display buffer programs write dwm works different ways depending operating system windows 7 windows vista version graphics drivers uses wddm 1.0 1.1 windows 7 wddm 1.1 drivers dwm writes program buffer video ram even graphics device interface gdi program windows 7 supports limited hardware acceleration gdi need keep copy buffer system ram cpu write compositor access graphics applications easily allows visual effects string together visuals multiple applications transparency dwm uses directx 9 perform function compositing rendering gpu freeing cpu task managing rendering off-screen buffers display however affect applications painting off-screen buffers – depending technologies used might still cpu-bound dwm-agnostic rendering techniques like gdi redirected buffers rendering user interface ui bitmaps dwm-aware rendering technologies like wpf directly make internal data structures available dwm-compatible format window contents buffers converted directx textures desktop full-screen direct3d surface windows represented mesh consisting two adjacent mutually-inverted triangles transformed represent 2d rectangle texture representing ui chrome mapped onto rectangles window transitions implemented transformations meshes using shader programs windows vista transitions limited set built-in shaders implement transformations greg schechter developer microsoft suggested might opened developers users plug effects future release dwm maps primary desktop object 3d surface desktop objects including virtual desktops well secure desktop used user account control applications render off-screen buffer read buffer embedded applications well since off-screen buffer constantly updated application embedded rendering dynamic representation application window static rendering live thumbnail previews windows flip work windows vista windows 7 dwm exposes public api allows applications access thumbnail representations size thumbnail fixed applications request thumbnails size smaller original window size even larger dwm scale properly returning windows flip 3d use public thumbnail apis allow directly accessing direct3d textures instead flip 3d implemented directly dwm engine desktop window manager uses media integration layer mil unmanaged compositor shares windows presentation foundation represent windows composition nodes composition tree composition tree represents desktop windows hosted rendered mil back scene front since windows contribute final image color resultant pixel decided one window used implement effects per-pixel transparency dwm allows custom shaders invoked control pixels multiple applications used create displayed pixel dwm includes built-in pixel shader 2.0 programs compute color pixel window averaging color pixel determined window behind neighboring pixels shaders used dwm achieve blur effect window borders windows managed dwm optionally areas requested application since mil provides retained mode graphics system caching composition trees job repainting refreshing screen windows moved handled dwm mil freeing application responsibility background data already composition tree off-screen buffers directly used render background pre-vista windows oss background applications requested re-render sending codice_1 message dwm uses double-buffered graphics prevent flickering tearing moving windows compositing engine uses optimizations culling improve performance well redrawing areas changed compositor multi-monitor aware dwm natively supports full-screen applications games dwm perform window compositing therefore performance appreciably decrease windows 8 windows server 2012 dwm used times disabled due new start screen experience implemented since dwm process usually required run times windows 8 users experiencing issue process seeing memory usage decrease system reboot often first step long list troubleshooting tasks help possible prevent dwm restarting temporarily windows 8 causes desktop turn black taskbar grey break start screen/modern apps desktop apps continue function appear like windows 7 vista basic theme based single-buffer renderer used xp also use windows 8 centered title bar visible within windows preinstallation environment starting windows without dwm work lock screen requires dwm done fly practical purposes starting windows 10 disabling dwm way cause entire compositing engine break even traditional desktop apps due universal app implementations taskbar new start menu.unlike predecessors windows 8 supports basic display adapters windows advanced rasterization platform warp uses software rendering cpu render interface rather graphics card allows dwm function without compatible drivers level performance normal graphics card dwm windows 8 also adds support stereoscopic 3d rendering techniques dwm-aware output must redirected dwm buffers windows either gdi directx used rendering make two work dwm redirection techniques provided gdi used ui rendering technique microsoft windows application window notified part comes view job application render without dwm rendering rasterizes ui buffer video memory rendered screen dwm gdi calls redirected use canonical display driver cdd.dll software renderer buffer equal size window allocated system memory cdd.dll outputs buffer rather video memory another buffer allocated video memory represent directx surface used texture window meshes system memory buffer converted directx surface separately kept sync round-about route required gdi output directly directx pixel format surface read compositor composited desktop video memory writing output gdi system memory hardware accelerated conversion directx surface gdi window minimized invisible visible monitor full screen directx application limitation gdi gdi bitmap buffer longer received application requesting device context painting updating sometimes seen gdi operation copying one window another outputs black empty regions instead expected window content thus dwm uses last bitmap rendered buffer application minimized starting windows 7 canonical display driver longer renders system memory copy wddm 1.1/dxgi 1.1 compliant video driver present applications using directx write 3d surface directx implementation windows vista uses wddm share surface dwm dwm uses surface directly maps window meshes windows presentation foundation wpf applications directx applications compositor renders shared surfaces composited final desktop applications mix either rendering technique across multiple child windows long gdi directx used render window case ordering directx gdi rendering guaranteed guaranteed gdi bitmap system memory translated video memory surface means final composition may contain gdi-rendered elements prevent dwm temporarily turned long application mixes gdi directx window running windows vista dwm requires compatible physical virtual hardware windows 7 desktop window manager reworked use direct3d 10.1 hardware requirements remain windows vista direct3d 9 hardware supported 10 level 9 layer introduced direct3d 11 runtime windows 8 requirements 7 also use software rendering compatible video hardware absent hardware virtualization software emulate hardware required dwm include virtualbox 4.1 later vmware fusion 3.0 later vmware workstation 7.0 onwards addition windows virtual pc allows composition using remote desktop protocol | [
10243,
6150,
11270,
5643,
4624,
10769,
9234,
1043,
537,
540,
3102,
1055,
9762,
2083,
8227,
8740,
11300,
1577,
10281,
1581,
4143,
9263,
11316,
1077,
2101,
8246,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
9813,
10839,
603,... | None |
6,115 | 2 | Driver_Verifier:driver verifier driver verifier tool included microsoft windows replaces default operating system subroutines ones specifically developed catch device driver bugs enabled monitors stresses drivers detect illegal function calls actions may causing system corruption acts within kernel mode target specific device drivers continual checking make driver verifier functionality multithreaded several device drivers stressed time simulate certain conditions low memory i/o verification pool tracking irql checking deadlock detection dma checks irp logging etc verifier works forcing drivers work minimal resources making potential errors might happen rarely working system manifest immediately typically fatal system errors generated stressed drivers test environment producing core dumps analysed debugged immediately without stressing intermittent faults would occur field without proper troubleshooting facilities personnel driver verifier verifier.exe first introduced command-line utility windows 2000 windows xp gained easy-to-use graphical user interface called driver verifier manager makes possible enable standard custom set settings select drivers test verify new windows version since introduced several new stringent checks testing verifying drivers detecting new classes driver defects driver verifier normally used machines used productive work cause undetected relatively harmless errors drivers manifest especially ones digitally signed windows hardware quality labs causing blue screen fatal system errors also causes resource-starved drivers underperform slow general operation constraints imposed verifier reversed debugging microsoft recommends verifying drivers time | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2101,
4668,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10879,
8841,
6797,
2193,
9... | Test |
6,116 | 2 | Olivetti_X/OS:olivetti x/os x/os unix computer manufacturer olivetti based 4.2bsd unix system v support ran lsx line computers based motorola 68000-series cpus | [
7269,
7983,
2995,
5492,
9151
] | None |
6,117 | 3 | SigmaTel_STMP3700:sigmatel stmp3700 sigmatel stmp3700 low power system chip made pmp portable media players stmp3700 using single arm processor core clocked maximum 300 mhz system chip developed 2007 use portable media players supports playing video qvga decoding various media formats used creative zen 2007 creative zen x-fi 2008 stmp378x supports vga resolutions 640×480 higher clock frequencies video hardware assist sony walkman models using product line include salsa newton freed appeared ces 2009 see freescale stmp3700 series site info | [
9964
] | Test |
6,118 | 3 | INT_13H:int 13h int 13h shorthand bios interrupt call 13 20th interrupt vector x86-based computer system bios typically sets real mode interrupt handler vector provides sector-based hard disk floppy disk read write services using cylinder-head-sector chs addressing int x86 instruction triggers software interrupt 13 interrupt number hexadecimal value called modern computers come bios int 0x13 uefi functionality provides services exception uefi class 3 completely removes csm thus lacks int 13h interrupts typically uefi drivers use lba-addressing instead chs-addressing real mode operating systems dos calling int 13h would jump computer rom-bios code low-level disk services would carry physical sector-based disk read write operations program dos serves low-level interface built-in block device drivers hard disks floppy disks allows int 25h int 26h provide absolute disk read/write functions logical sectors fat file system driver dos kernel handles file-related requests dos api int 21h functions protected mode operating systems microsoft windows nt derivatives e.g nt4 2000 xp server 2003 linux dosemu os intercepts call passes operating system native disk i/o mechanism windows 9x windows workgroups 3.11 also bypass bios routines using 32-bit file access original bios real-mode int 13h interface supports drives sizes 504 mb using commonly referred physical chs addressing limit originates hardware interface ibm pc/xt disk hardware bios used cylinder-head-sector chs address given int 13h call transferred directly hardware interface interface later extended support addressing exactly 8064 mb using commonly referred logical chs addressing limit originates combination register value based calling convention used int 13h interface goal maintaining backward compatibility originally number bioses offered incompatible versions interface eventually computer industry standardized interface developed microid research mr bios 1989 limit uses 1024 cylinders 256 heads 63 sectors 512 byte blocks allowing exactly 7.875 gib addressing 1024 256 63 512 bytes support even larger addressing modes interface known int 13h extensions introduced western digital phoenix technologies part bios enhanced disk drive services edd uses 64-bit logical block addressing lba allows addressing 8 zib drive also support 28-bit 48-bit lba allows 128 gib 128 pib respectively assuming 512-byte sector/block size packet interface uses pointer packet information rather register based calling convention original int 13h interface packet data structure contains interface version data size lbas versions ms-dos including ms-dos 7 windows 95 bug prevents booting disk drives 256 heads register value 0xff many modern bioses provide mappings 255 0xfe heads thus reducing total addressable space exactly 8032.5 mib approx 7.844 gib cache drivers flush buffers detecting dos bypassed directly issuing int 13h applications dummy read used one several methods force cache flushing unknown caches e.g rebooting ami bioses around 1990–1991 trash word unaligned buffers dos tsr programs clobber interrupt enabling registers pc dos ms-dos install filters prevent award bios ami 386sx bios extended handle 1024 cylinders placing bits 10 11 cylinder number bits 6 7 dh second column empty function may used floppy hard disk bit 7=0 floppy drive bit 7=1 fixed drive register cx contains cylinder number 10 bits possible values 0 1023 sector number 6 bits possible values 1 63 cylinder sector bits numbered examples translation addressing buffer guarantee complete buffer inside given segment i.e codice_1 otherwise interrupt may fail bios hardware versions assume want read 16 sectors 2000h bytes buffer starts memory address 4ff00h utilizing memory segmentation different ways calculate register values e.g function 02h interrupt 13h may read sectors first 16,450,560 sectors hard drive read sectors beyond 8 gb limit use function 42h extensions another alternate may dos interrupt 25h reads sectors within partition difference function function 02h see function 0ah reads 516 bytes per sector instead 512 last 4 bytes contains error correction code ecc checksum sector data physical chs values function 48h may/should differ logical values function 08h | [
5312,
9762,
389,
4424,
1515,
7501,
9166,
9791,
5823,
499,
4563,
823,
5080,
4441,
5596,
9597,
1247
] | Test |
6,119 | 2 | Pip_(package_manager):pip package manager pip de facto standard package-management system used install manage software packages written python many packages found default source packages dependencies — python package index pypi distributions python come pip preinstalled python 2.7.9 later python2 series python 3.4 later include pip pip3 python 3 default pip recursive acronym pip installs packages one major advantage pip ease command-line interface makes installing python software packages easy issuing command users also easily remove package importantly pip feature manage full lists packages corresponding version numbers possible requirements file permits efficient re-creation entire group packages separate environment e.g another computer virtual environment achieved properly formatted file following command codice_1 name file install package specific version python codice_2 replaced 2 3 3.4 etc | [
8068,
11525,
3462,
8582,
10760,
5130,
2955,
7435,
6797,
7947,
9487,
788,
1813,
5397,
8213,
6680,
10900,
10394,
8476,
9245,
5155,
5670,
4775,
7722,
6828,
5677,
6446,
7983,
1842,
823,
2872,
6583,
5819,
10172,
190,
9151,
3777,
10817,
8644,
9... | None |
6,120 | 6 | Rm_(Unix):rm unix computing codice_1 short remove basic command unix unix-like operating systems used remove objects computer files directories symbolic links file systems also special files device nodes pipes sockets similar codice_2 command ms-dos os/2 microsoft windows command also available efi shell codice_1 command removes references objects filesystem using unlink system call objects might multiple references example file two different names objects discarded references removed programs still open handles objects allows scenarios program open file immediately remove filesystem use temporary space knowing file space reclaimed program exits even exits crashing command generally destroy file data since purpose really merely unlink references filesystem space freed may still contain leftover data removed file security concern cases hardened versions sometimes provide wiping data last link cut programs shred srm available specifically provide data wiping capability codice_1 generally seen unix-derived operating systems typically provide recovery deleted files mechanism like recycle bin hence tendency users enclose codice_1 kind wrapper limit accidental file deletion undelete utilities attempt reconstruct index bring file back parts reused old versions unix codice_1 command would delete directories empty behaviour still obtained versions codice_1 codice_8 flag e.g. bsds freebsd netbsd openbsd macos derived 4.4bsd-lite2 version codice_1 bundled gnu coreutils written paul rubin david mackenzie richard stallman jim meyering version also provides codice_8 option help compatibility functionality provided standard codice_11 command codice_12 option version 7 replaced codice_13 delete switches debuted version 1 doug mcilroy wrote codice_13 desperation tool designed clean files unutterable names kolibrios includes implementation command codice_1 deletes file specified options added users use full path relative file path specify files delete codice_1 n't delete directory default deletes file foo directory user currently codice_1 like commands uses options specify behave codice_1 overlain shell alias c shell alias bourne shell bash function codice_27 avoid accidental deletion files user still wishes delete large number files without confirmation manually cancel codice_12 argument adding codice_20 option option specified later expanded command line codice_30 takes precedence unfortunately approach generates dangerous habits towards use wildcarding leading version accidental removals codice_31 variously codice_32 codice_33 others frequently used jokes anecdotes unix disasters. ref name= linux/unix delete file /ref codice_32 variant command run superuser would cause every file accessible present file system deleted machine codice_1 often used conjunction xargs supply list files delete remove png images directories current one usually filesystems deleting file requires write permission parent directory execute permission order enter directory first place note confusingly beginners permissions file irrelevant however gnu codice_1 asks confirmation write-protected file deleted unless -f option used delete directory codice_37 one must delete contents recursively requires one must read write execute permission directory empty non-empty subdirectories recursively read permissions needed list contents directory order delete sometimes leads odd situation non-empty directory deleted one n't write permission delete contents directory empty one would able delete file resides directory sticky bit set deleting file requires one owner file sun microsystems introduced codice_32 protection solaris 10 first released 2005 upon executing command system reports removal allowed shortly functionality introduced freebsd version codice_1 utility gnu codice_1 refuses execute codice_32 codice_42 option given default since version 6.4 gnu core utilities released 2006 newer systems failsafe always active even without option run command user must bypass failsafe adding option codice_43 even superuser systems administrators designers even users often attempt defend accidentally deleting files creating alias function along lines results codice_1 asking user confirm file-by-file basis whether deleted pressing n key unfortunately tends train users careless wildcards hand codice_1 commands well encouraging tendency alternately pound codice_46 return key affirm removes past one file needed keep users even seen going far codice_47 automatically inserts yes file compromise allows users confirm encourages proper wildcarding makes verification list easier achieved something like important note function made shell script would run risk found ahead system codice_1 search path allowed non-interactive shells could break batch jobs enclosing definition codice_49 construct protects latter exist third-party alternatives prevent accidental deletion important files safe-rm trash gnu core utilities implementation used multiple linux distributions limited command line arguments bytes number pages allocated within kernel command-line arguments kernel 2.6.23 released 9 october 2007 defined kernel compile time variable codice_50 codice_51 file new kernels limits maximum argument length 25 maximum stack limit ulimit -s error codice_52 prompt command-line argument limit exceed | [
515,
516,
9733,
9735,
6664,
521,
8729,
7196,
9762,
2599,
8236,
5706,
3659,
9298,
1109,
8306,
5759,
5256,
6281,
6797,
4750,
10387,
2198,
6812,
7325,
7847,
700,
7356,
2245,
1741,
10967,
9946,
6369,
9444,
11494,
4850,
10484,
8954,
8975,
4369... | None |
6,121 | 3 | Full_Throttle_(1984_video_game):full throttle 1984 video game full throttle video game released 1984 zx spectrum msx player races 500cc grand prix motorcycle ten world top racing circuits selecting track race player starts back grid 39 bikes cornering quickly cause skid running road slow bike making contact another rider forces bike halt allowing following riders stream past player bike gets going ten circuits game part key winning know circuit well enough predict bends practice mode player rides round track without riders player choose race one five laps best position achieved shown bottom menu-screen along player time ahead second-place man soon track number laps changed record reset game written mervyn estcourt creator 3d deathchase reviews positive crash giving 91 crash smash spectrum rating 4/5 computer video games sinclair user rating 8/10 | [
9006
] | Validation |
6,122 | 8 | Mod_qos:mod qos mod_qos quality service qos module apache http server implementing control mechanisms provide different priority different requests web server serve limited number concurrent requests qos used ensure important resources stay available high server load mod_qos used reject requests unimportant resources granting access important applications also possible disable access restrictions example requests important resources important users control mechanisms available following levels module useful used reverse proxy order divide resources different webserver first use case shows mod_qos avoid service outage web server due slow responses single application case application /ccc slow requests wait timeout occurs due many waiting requests web server runs free tcp connections able process requests application /aaa /bbb mod_qos limits concurrent requests application order assure availability resources keep-alive extension http 1.1 allows persistent tcp connections multiple request/responses accelerates access web server due less optimised network traffic disadvantage persistent connections server resources blocked even though data exchanged client server mod_qos allows server support keep-alive long sufficient connections free stopping keep-alive support defined connection threshold reached single client may open many simultaneous tcp connections order download different content web server client gets many connections users may able access server since free connections remain mod_qos limit number concurrent connections single ip source address limit number requests url mod_qos help mod_qos limits maximum number requests per second url module may also control bandwidth simply specify maximum allowed bandwidth moq_qos starts throttling becomes necessary mod_qos may help protect apache web server low-bandwidth dos attacks enforcing minimum upload/download throughput client must generate initial release mod_qos created may 2007 published sourceforge.net open source software project able limit number concurrent http requests specified resources path portion request urls web server features added useful protect apache servers dos attacks 2012 mod_qos included ubuntu linux distribution major releases | [
2945,
2409,
5612,
2060,
7983,
2045
] | Validation |
6,123 | 8 | Law360:law360 law360 subscription-based legal news service operated portfolio media company subsidiary lexisnexis marius meland founded portfolio media october 2003 2004 began publishing daily online newsletter intellectual property law later named law360 march 20 2012 company acquired lexisnexis meland hoglund serving co-ceos publication 11 news bureaus across u.s | [
5919
] | None |
6,124 | 1 | Partition_(database):partition database partition division logical database constituent elements distinct independent parts database partitioning normally done manageability performance availability reasons load balancing popular application partitioning distributed database management system partition may spread multiple nodes users node perform local transactions partition increases performance sites regular transactions involving certain views data whilst maintaining availability security current high end relational database management systems provide different criteria split database take partitioning key assign partition based certain criteria common criteria partitioning done either building separate smaller databases tables indices transaction logs splitting selected elements example one table horizontal partitioning involves putting different rows different tables example customers zip codes less 50000 stored customerseast customers zip codes greater equal 50000 stored customerswest two partition tables customerseast customerswest view union might created provide complete view customers vertical partitioning involves creating tables fewer columns using additional tables store remaining columns normalization also involves splitting columns across tables vertical partitioning goes beyond partitions columns even already normalized different physical storage might used realize vertical partitioning well storing infrequently used wide columns different device example method vertical partitioning done explicitly implicitly type partitioning called row splitting row split columns common form vertical partitioning split dynamic data slow find static data fast find table dynamic data used often static creating view across two newly created tables restores original table performance penalty however performance increase accessing static data e.g statistical analysis taken ultimate end results something like columnar database | [
8195,
10632,
8201,
11400,
8979,
2068,
10389,
4630,
7446,
2456,
1049,
5658,
5403,
9112,
10137,
11030,
4255,
9248,
9631,
9634,
11552,
1447,
2344,
4263,
7080,
10793,
10413,
10286,
9397,
9782,
3004,
1341,
7868,
11324,
10048,
2369,
5953,
6850,
2... | Test |
6,125 | 4 | Team8:team8 team8 cyber security company based tel aviv israel describes think tank company creation platform news partnership intel via spin company illusive networks citigroup microsoft qualcomm amongst others also news receiving funding bessemer venture partners company founded 2014 ronni zehavi liran grinberg israel grimberg nadav zafrir three former leaders israel ’ military intelligence unit 8200 understood illusive networks built solution advanced persistent threats apts building false “ virtual networks ” designed lure trick trap malicious hackers partnership microsoft believed researching cybersecurity challenges former nsa director admiral mike rogers joined israeli think tank october 2018 becoming member board advisers | [
9863
] | None |
6,126 | 6 | Filename_mangling:filename mangling process filename mangling computing involves translation file name compatibility operating system level occurs filename filesystem appears form incompatible operating system accessing mangling occurs example computer networks windows machine attempts access file unix server file filename includes characters valid windows common example name mangling occurs vfat file systems versions windows windows 95 onwards vfat specification allows long file names lfns backwards-compatibility ms-dos older windows software recognizes filenames maximum 11 characters length 8.3 format i.e eight-letter filename dot three-letter extension codice_1 files lfns get stored disk 8.3 format codice_2 becoming codice_3 long file name stored elsewhere disk normally using compatible windows programs use standard windows methods reading disk i/o subsystem returns long filename program — however old dos application old windows application tries address file use older 8.3-only apis work lower level perform disk access results return 8.3 filename case filenames become mangled taking first six non-space characters filename adding tilde number ensure uniqueness 8.3 filename disk mangling scheme turn example codice_4 codice_5 technique persists today people use dosbox play classic dos games use windows 3.1 conjunction play win16 games 64-bit windows unix file names contain colons backslashes whereas windows interprets characters ways accordingly software could mangle unix file notes 11\04\03 notes_ 11-04-03 enable windows software remotely access file unix-like systems samba unix use different mangling systems map long filenames dos-compatible filenames although samba administrators configure behavior config file macos finder displays instances file directory names classic mac os used character internally path separator listing files directories using terminal emulator displays rather character though | [
2432,
3330,
5514,
6797,
5397,
8988,
6813,
9762,
5158,
1193,
7983,
52,
1844,
1724,
9533,
576,
3522,
9166,
5969,
6358,
5975,
1509,
7663,
9840,
3571,
5492,
7540
] | Validation |
6,127 | 8 | JSON-RPC:json-rpc json-rpc remote procedure call protocol encoded json simple protocol similar xml-rpc defining data types commands json-rpc allows notifications data sent server require response multiple calls sent server may answered order json-rpc works sending request server implementing protocol client case typically software intending call single method remote system multiple input parameters passed remote method array object whereas method return multiple output data well depends implemented version transfer types single objects serialized using json request call specific method provided remote system must contain three certain properties receiver request must reply valid response received requests response must contain properties mentioned since situations response needed even desired notifications introduced notification similar request except id needed response returned case codice_3 property omitted version 2.0 codice_8 version 1.0 examples codice_9 denotes data sent service request codice_10 denotes data coming service although codice_10 often called response client–server computing depending json-rpc version necessarily imply answer request request response notification response request response request response category json category web services category remote procedure call | [
9441,
11105,
803,
10020,
7338,
6993,
10486,
5915,
3839
] | Test |
6,128 | 2 | Hardware_abstraction:hardware abstraction hardware abstractions sets routines software emulate platform-specific details giving programs direct access hardware resources often allow programmers write device-independent high performance applications providing standard operating system os calls hardware process abstracting pieces hardware often done perspective cpu type cpu specific instruction set architecture isa isa represents primitive operations machine available use assembly programmers compiler writers one main functions compiler allow programmer write algorithm high-level language without care cpu-specific instructions job compiler generate cpu-specific executable type abstraction made operating systems os apis represent primitive operations machine rather isa allows programmer use os-level operations e.g task creation/deletion programs retaining portability variety different platforms many early computer systems form hardware abstraction meant anyone writing program system would know hardware device communicated rest system significant challenge software developers since know every hardware device system worked ensure software compatibility hardware abstraction rather program communicating directly hardware device communicates operating system device generates hardware-dependent instruction device meant programmers n't need know specific devices worked making programs compatible device example might joystick abstraction joystick device many physical implementations readable/writable api many joystick-like devices might share joystick-devices might report movement directions many joystick-devices might sensitivity-settings configured outside application joystick abstraction hides details e.g. register format i2c address hardware programmer using abstracted api need understand details device physical interface also allows code reuse since code process standardized messages kind implementation supplies joystick abstraction nudge forward potentiometer capacitive touch sensor recognises swipe gestures long provide signal related movement physical limitations e.g resolution sensor temporal update frequency may vary hardware api little hide assuming least common denominator model thus certain deep architectural decisions implementation may become relevant users particular instantiation abstraction good metaphor abstraction transportation bicycling driving car transportation commonalities e.g. must steer physical differences e.g. use feet one always specify abstraction drive let implementor decide whether bicycling driving car best wheeled terrestrial transport function abstracted details drive encapsulated examples abstractions pc include video input printers audio input output block devices e.g hard disk drives usb flash drive etc certain computer science domains operating systems embedded systems abstractions slightly different appearances instance operating systems tend standardized interfaces concept abstraction encapsulation complexity common deep hardware abstraction layer reside application programming interface api software stack whereas application layer often written high level language resides api communicates hardware calling functions api hardware abstraction layer hal abstraction layer implemented software physical hardware computer software runs computer function hide differences hardware operating system kernel kernel-mode code need changed run systems different hardware pc hal basically considered driver motherboard allows instructions higher level computer languages communicate lower level components prevents direct access hardware cp/m cp/m bios dos dos bios solaris linux bsd macos portable operating systems also hal even explicitly designated operating systems linux ability insert one running like adeos netbsd operating system widely known clean hardware abstraction layer allows highly portable part system subsystems popular buses used one architecture also abstracted isa eisa pci pcie etc. allowing drivers also highly portable minimum code modification operating systems defined hal easily portable across different hardware especially important embedded systems run dozens different platforms windows nt kernel hal kernel space hardware executive services contained file ntoskrnl.exe windows \system32\hal.dll allows portability windows nt kernel-mode code variety processors different memory management unit architectures variety systems different i/o bus architectures code runs without change systems compiled instruction set applicable systems example sgi intel x86-based workstations ibm pc compatible workstations due hal windows 2000 able run since windows vista windows server 2008 hal used automatically determined startup extreme example hal found system/38 as/400 architecture compilers systems generate abstract machine code licensed internal code lic translates virtual machine code native code processor running executes resulting native code exceptions compilers generate lic compilers available outside ibm successful application software operating system software lic layer compiled original s/38 run without modification without recompilation latest as/400 systems despite fact underlying hardware changed dramatically least three different types processors use android introduced hal known vendor interface codenamed project treble version 8.0 oreo abstracts low-level code android os framework must made forward compatible support future versions android ease development firmware updates.. android hal existed even | [
2560,
6155,
6675,
7187,
10776,
25,
4637,
9762,
4643,
6180,
5158,
3631,
7217,
10803,
9784,
10809,
576,
2625,
6221,
3160,
10333,
97,
11363,
1126,
6760,
10856,
8298,
9835,
8301,
7285,
4727,
2168,
9335,
634,
1147,
3197,
1150,
5247,
11390,
217... | None |
6,129 | 3 | IBM_PC_compatible:ibm pc compatible ibm pc compatible computers computers similar original ibm pc xt able use software expansion cards computers referred pc clones ibm clones duplicate almost exactly significant features pc architecture facilitated ibm choice commodity hardware components various manufacturers ability reverse engineer bios firmware using clean room design technique columbia data products built first clone ibm personal computer clean room implementation bios early ibm pc compatibles used computer bus original pc models ibm compatible bus later named industry standard architecture isa bus manufacturers compatible computers term ibm pc compatible historical description since ibm ended personal computer sales descendants ibm pc compatibles comprise majority personal computers market presently dominant operating system microsoft windows although interoperability bus structure peripherals original pc architecture may limited non-existent computers ran ms-dos enough hardware differences ibm compatible software could used examples include slight differences memory map serial ports video hardware macintosh kept significant market share without compatibility ibm pc ibm decided 1980 market low-cost single-user computer quickly possible 12 august 1981 first ibm pc went sale three operating systems os available least expensive popular pc dos made microsoft crucial concession ibm agreement allowed microsoft sell version ms-dos non-ibm computers component original pc architecture exclusive ibm bios basic input/output system ibm first asked developers avoid writing software addressed computer hardware directly instead make standard calls bios functions carried hardware-dependent operations software would run machine using ms-dos pc-dos software directly addressed hardware instead making standard calls faster however particularly relevant games software addressing ibm pc hardware way would run ms-dos machines different hardware ibm pc sold high enough volumes justify writing software specifically encouraged manufacturers produce machines could use programs expansion cards peripherals pc 808x computer marketplace rapidly excluded machines hardware- software-compatible pc 640 kb barrier conventional system memory available ms-dos legacy period non-clone machines subject limit could exceed 640 kb rumors lookalike compatible computers created without ibm approval began almost immediately ibm pc release infoworld wrote first anniversary ibm pc june 1983 pc magazine defined pc 'clone computer accommodate user takes disk home ibm pc walks across room plugs 'foreign machine shortage ibm pcs year many customers purchased clones instead columbia data products produced first computer less compatible ibm pc standard june 1982 soon followed eagle computer compaq announced first ibm pc compatible november 1982 compaq portable compaq first sewing machine-sized portable computer essentially 100 pc-compatible company could copy bios directly result court decision apple v. franklin could reverse-engineer ibm bios write bios using clean room design time many manufacturers tandy/radioshack xerox hewlett-packard digital equipment corporation sanyo texas instruments tulip wang olivetti introduced personal computers supported ms-dos completely software- hardware-compatible ibm pc tandy described tandy 2000 example 'next generation true 16-bit cpu speed disk storage expansion ibm pc ms-dos computers admitting 1984 many ms-dos programs support computer company stated popular sophisticated software market available either immediately next six months like ibm microsoft intention application writers would write application programming interfaces ms-dos firmware bios would form would termed hardware abstraction layer computer would original equipment manufacturer oem version ms-dos customized hardware software written ms-dos would operate ms-dos computer despite variations hardware design expectation seemed reasonable computer marketplace time microsoft based primarily computer languages basic established small system operating software cp/m digital research use hobbyist level professional using microcomputers achieve widespread use thus make product viable economically os operate across range machines different vendors widely varying hardware customers needed applications starter programs could reasonably expect publishers offer products variety computers suitable media microsoft competing os intended initially operate similar varied spectrum hardware although based 8086 processor thus ms-dos several years sold oem product microsoft-branded ms-dos ms-dos could purchased directly microsoft oem release packaged trade dress given pc vendor malfunctions reported oem microsoft however machines compatible ibm hardware—thus supporting direct calls hardware—became widespread soon became clear oem versions ms-dos virtually identical except perhaps provision utility programs ms-dos provided adequate functionality character-oriented applications could implemented text-only terminal bulk commercially important software nature low-level hardware compatibility might mattered however order provide maximum performance leverage hardware features work around hardware bugs pc applications quickly developed beyond simple terminal applications ms-dos supported directly spreadsheets wysiwyg word processors presentation software remote communication software established new markets exploited pc strengths required capabilities beyond ms-dos provided thus early development ms-dos software environment many significant commercial software products written directly hardware variety reasons may 1983 future computing defined four levels compatibility development compaq engineers found microsoft flight simulator would run sublogic bruce artwick described bug one intel chips forcing make new computer bug compatible ibm pc first clones compaq offered truly full compatibility jerry pournelle purchased ibm pc mid-1983 rotten keyboard four cubic feet unevaluated software much wo n't run anything ibm pc although lot machines claim 100 percent ibm pc compatible 've yet one arrive ... alas lot stuff n't run eagle z-100 compupro anything else around columbia university reported january 1984 kermit ran without modification compaq columbia data products clones eagle seequa ms-dos computers also required custom code many companies reluctant products pc compatibility tested pc magazine requested samples computer manufacturers claimed produce compatibles april 1984 review 14 31 declined corona data systems specified systems run software conforms ibm pc programming standards popular software byte journalist asked test peachtext spring 1983 comdex corona representatives hemmed hawed bit finally led ... corner one would see fail magazine reported hesitancy unnecessary disk booted without problem zenith data systems bolder bragging z-150 ran applications people brought test 1984 west coast computer faire creative computing 1985 stated reiterate standard line regarding ibm pc compatibles try package want use buy computer companies modified computers bios work newly discovered incompatible applications reviewers users developed stress tests measure compatibility 1984 ability operate lotus 1-2-3 flight simulator became standard compatibles specifically designed run ibm believed companies eagle corona handwell infringed copyright apple computer inc. v. franklin computer corp. successfully forced clone makers stop using bios phoenix bios 1984 however similar products ami bios permitted computer makers legally build essentially 100 -compatible clones without reverse-engineer pc bios september 1985 infoworld chart listed seven compatibles 256 kb ram two disk drives monochrome monitors 1,495 2,320 equivalent ibm pc cost 2,820 1986 compute stated clones generally reliable 99 percent compatible february 1984 byte wrote ibm burgeoning influence pc community stifling innovation many companies mimicking big blue market grew ibm influence diminished november 1985 pc magazine stated created pc market market n't necessarily need ibm machines may depend ibm set standards develop higher-performance machines ibm better conform existing standards hurt users january 1987 bruce webster wrote byte rumors ibm would introduce proprietary personal computers proprietary operating system cares ibm likely isolate largest marketplace really ca n't compete anymore anyway magazine predicted 1987 market complete transition ibm standard intel/ms-dos/expansion bus standard ... folks n't much concerned ibm compatibility lotus 1-2-3 compatibility 1992 macworld stated clones ibm lost control market became minor player technology ibm announced os/2-oriented ps/2 line early 1987 sales existing dos-compatible pc compatibles rose part proprietary operating system available 1988 gartner group estimated public purchased 1.5 clones every ibm pc 1989 compaq influential industry executives spoke compaq compatible observers stating customers saw company ibm equal 1987 ibm pc compatibles dominated home business markets commodity computers notable alternative architectures used niche markets like macintosh computers offered apple inc. used mainly desktop publishing time aging 8-bit commodore 64 selling 150 time became world best-selling computer 32-bit commodore amiga line used television video production 32-bit atari st used music industry however ibm lost main role market ibm pc compatibles 1990 events retrospect important despite popularity thinkpad set laptop pc ibm finally relinquished role consumer pc manufacturer april 2005 sold laptop desktop pc divisions lenovo us 1.75 billion october 2007 hewlett-packard dell largest shares pc market north america also successful overseas acer lenovo toshiba also notable worldwide huge number pcs white box systems assembled myriad local systems builders despite advances computer technology current ibm pc compatibles remain much compatible original ibm pc computers although components implement compatibility special backward compatibility modes used system boot often practical run old software modern system using emulator rather relying features 2014 lenovo acquired ibm x86-based server business us 2.1 billion one strengths pc compatible design modular hardware design end-users could readily upgrade peripherals degree processor memory without modifying computer motherboard replacing whole computer case many microcomputers time however processor speed memory width increased limits original xt/at bus design soon reached particularly driving graphics video cards ibm introduce upgraded bus ibm ps/2 computer overcame many technical limits xt/at bus rarely used basis ibm compatible computers since required licence payments ibm ps/2 bus prior at-bus designs produced company seeking license unpopular hardware manufacturers several competing bus standards developed consortiums agreeable license terms various attempts standardize interfaces made practice many attempts either flawed ignored even many expansion options despite confusion users pc compatible design advanced much faster competing designs time even market dominance 1990s ibm influence pc architecture started decline ibm-brand pc became exception rather rule instead placing importance compatibility ibm pc vendors began emphasize compatibility windows 1993 version windows nt released could operate processors x86 set required applications recompiled developers hardware independence used silicon graphics sgi x86 workstations–thanks nt hardware abstraction layer hal could operate nt vast application library mass-market personal computer hardware vendor dared incompatible latest version windows microsoft annual winhec conferences provided setting microsoft could lobby for—and cases dictate—the pace direction hardware pc industry microsoft intel become important ongoing development pc hardware industry writers began using word wintel refer combined hardware-software system terminology becoming misnomer intel lost absolute control direction x86 hardware development amd amd64 also non-windows operating systems like macos linux established presence x86 architecture although ibm pc designed expandability designers could anticipate hardware developments 1980s size industry would engender make things worse ibm choice intel 8088 cpu introduced several limitations developing software pc compatible platform example 8088 processor 20-bit memory addressing space expand pc beyond one megabyte lotus intel microsoft jointly created expanded memory ems bank-switching scheme allow memory provided add-in hardware accessed set four 16-kilobyte windows inside 20-bit addressing later intel cpus larger address spaces could directly address 16- megabytes mibs 80286 causing microsoft develop extended memory xms require additional hardware expanded extended memory incompatible interfaces anyone writing software used one megabyte provide systems greatest compatibility ms-dos began including emm386 simulated ems memory using xms memory protected mode os also written 80286 dos application compatibility difficult expected dos applications accessed hardware directly bypassing bios routines intended ensure compatibility also bios requests made first 32 interrupt vectors marked reserved protected mode processor exceptions intel video cards suffered incompatibilities standard interface using higher-resolution svga graphics modes supported later video cards manufacturer developed methods accessing screen memory including different mode numberings different bank switching arrangements latter used address large images within single 64kb segment memory previously vga standard used planar video memory arrangements effect easily extend greater colour depths higher resolutions offered svga adapters attempt creating standard named vesa bios extensions vbe made manufacturers used 386 introduced protected mode os could written time dos compatibility much easier virtual 8086 mode unfortunately programs could switch directly eventually new memory-model apis developed vcpi dpmi latter becoming popular great number third-party adapters standard programming pc could difficult professional developers would operate large test-suite various known-to-be-popular hardware combinations meanwhile consumers overwhelmed competing incompatible standards many different combinations hardware offer give idea sort pc would need operate software multimedia pc mpc standard set 1990 pc met minimum mpc standard could marketed mpc logo giving consumers easy-to-understand specification look software could operate minimally mpc-compliant pc would guaranteed operate mpc mpc level 2 mpc level 3 standards set later term mpc compliant never became popular mpc level 3 1996 mpc standards established late 1990s success microsoft windows driven rival commercial operating systems near-extinction ensured “ ibm pc compatible ” computer dominant computing platform meant developer made software wintel platform would still able reach vast majority computer users late 1980s major competitor windows percentage points market share apple inc. macintosh mac started billed computer rest us mac high prices closed architecture meant dos/windows onslaught quickly drove macintosh education desktop publishing niche emerged mid-2000s mid-1990s mac market share dwindled around 5 introducing new rival operating system become risky commercial venture experience shown even operating system technically superior windows would failure market beos os/2 example 1989 steve jobs said new next system either last new hardware platform succeed first fail four years later 1993 next announced ending production nextcube porting nextstep intel processors early pc history companies introduced xt-compatible chipsets example chips technologies introduced 82c100 xt controller integrated replaced six original xt circuits one 8237 dma controller one 8253 interrupt timer one 8255 parallel interface controller one 8259 interrupt controller one 8284 clock generator one 8288 bus controller similar non-intel chipsets appeared at-compatibles example opti 82c206 82c495xlc found many 486 early pentium systems x86 chipset market volatile though 1993 vlsi technology become dominant market player virtually wiped intel year later intel uncontested leader ever since wintel platform gained dominance intel gradually abandoned practice licensing technologies chipset makers 2010 intel involved litigation related refusal license processor bus related technologies companies like nvidia companies amd cyrix developed alternative cpus functionally compatible intel towards end 1990s amd taking increasing share cpu market pcs amd even ended playing significant role directing development x86 platform athlon line processors continued develop classic x86 architecture intel deviated netburst architecture pentium 4 cpus ia-64 architecture itanium set server cpus amd developed amd64 first major extension created intel intel later adopted x86-64 2006 intel began abandoning netburst release set core processors represented development earlier pentium iii major alternative wintel domination rise alternative operating systems since early 2000s marked start post-pc era term ibm pc compatible commonly used presently current mainstream desktop laptop computers based pc architecture ibm longer makes pcs competing hardware architectures either discontinued like amiga relegated niche enthusiast markets past successful exception apple macintosh platform used non-intel processors inception although macintosh initially based motorola 68000 family transitioned powerpc architecture macintosh computers transitioned intel processors beginning 2006 today macintosh computers share system architecture wintel counterparts boot microsoft windows without dos compatibility card processor speed memory capacity modern pcs many orders magnitude greater original ibm pc yet backwards compatibility largely maintained 32-bit operating system still operate many simpler programs written os early 1980s without needing emulator though emulator like dosbox near-native functionality full speed additionally many modern pcs still run dos directly although special options usb legacy mode sata-to-pata emulation may need set bios setup utility computers using extensible firmware interface might need set legacy bios mode able boot dos however bios/efi options mass-produced consumer-grade computers limited configured truly handle oses original variants dos recent spread x86-64 architecture distanced current computers operating systems internal similarity original ibm pc introducing yet another processor mode instruction set modified 64-bit addressing x86-64 capable processors also retain standard x86 compatibility | [
6148,
6660,
6150,
10757,
10768,
532,
533,
7188,
7190,
8732,
10273,
4642,
7715,
548,
1576,
1071,
9777,
563,
4150,
7739,
4674,
6213,
5702,
10312,
585,
6730,
5709,
1617,
7772,
3166,
8287,
4705,
10337,
107,
8301,
2159,
2161,
7285,
4727,
10359... | Test |
6,130 | 3 | Macintosh_Quadra_610:macintosh quadra 610 macintosh quadra 610 originally called macintosh centris 610 personal computer designed manufactured sold apple computer february 1993 july 1994 centris 610 introduced alongside larger centris 650 replacement macintosh iisi intended start new midrange centris line computers later 1993 apple decided follow emerging industry trend naming product families target customers quadra business lc education performa home folded centris 610 quadra family 610 second macintosh case design macintosh lc family use pizza box form factor later used centris quadra 660av power macintosh 6100 quadra 610 also sold dos compatible model additional 486sx processor 25 mhz processor direct slot card server variant workgroup server 60 introduced july 1993 20 mhz processor received 25 mhz upgrade october dos compatible version introduced february 1994 way apple judge whether market would interested macintosh could also run dos product deemed apple success selling 25,000 units produced two months quadra 610 replaced quadra 630 july 1994 workgroup server 6150 replaced workgroup server 60 apple entry-level server offering standard equipment centris 610 models includes onboard video vga support via adapter two adb two serial ports external scsi connector two simm slots support 4 8 16 32 mb simms allowing 68 mb ram ethernet-capable models aaui port nubus slots optional expansion card offered plugs processor direct slot allows single 7-inch nubus card installed horizontal orientation arrangement initially precluded use full 68040 processor insufficient clearance heat sink something 68lc040 require longer issue time quadra 610 dos compatible released included full 68040 cpu centris 610 first introduced 7-inch nubus cards existed 12 inches smaller size part upcoming update nubus standard system 7.1 included standard mac os 8.1 highest supported version introduced february 10 1993 introduced july 26 1993 introduced october 21 1993 introduced february 28 1994 | [
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
1090,
4180,
10838,
10840,
3167,
9312,
8806,
6258,
10357,
4220,
10365,
10878,
6783,
4741,
7305,
8842,
6283,
7824,
147,
7830,
6807,
4258,
7842,
7844,
7869,
8893,
8896,
... | None |
6,131 | 1 | Spatiotemporal_database:spatiotemporal database spatiotemporal database database manages space time information common examples include spatiotemporal databases extension spatial databases spatiotemporal database embodies spatial temporal spatiotemporal database concepts captures spatial temporal aspects data deals although exist numerous relational databases spatial extensions spatiotemporal databases based relational model practical reasons chiefly among data multi-dimensional capturing complex structures behaviours 2008 rdbms products spatiotemporal extensions products open-source terralib use middleware approach storing data relational database unlike pure spatial domain however official de facto standards spatio-temporal data models querying general theory area also less well-developed another approach constraint database system mlpq management linear programming queries geomesa open-source distributed spatiotemporal index built top bigtable-style databases using implementation z-order_curve create multi-dimensional index combining space time | [
2818,
9893,
9286,
3880,
1161,
522,
7816,
2512,
11474,
2612,
2901,
8085,
8122
] | Test |
6,132 | 9 | GameMonkey_Script:gamemonkey script gamemonkey script small cross-platform scripting language designed embedding games gamemonkey bears many similarities lua except syntax similar c. gamemonkey script written 2002 matthew riek greg douglas part closed-source project auran development however 12 june 2003 auran granted license full source code gamemonkey released public mit license currently used commercial hobby applications wide range machines windows pc apple mac microsoft xbox sony playstation 2 playstation 3 nintendo gamecube nintendo ds nintendo wii various distributions linux like lua primary data structure gamemonkey script table tables allow variety data structures created arrays sets hashmaps lists records also used simulate namespaces c++ class structures containing functions properties | [
2304,
4777,
5612,
9780,
2045
] | Validation |
6,133 | 5 | Firefox_3.5:firefox 3.5 mozilla firefox 3.5 version firefox web browser released june 2009 adding variety new features firefox version 3.5 touted twice fast 3.0 due tracemonkey javascript engine rendering improvements includes private browsing tear-off tabs uses gecko 1.9.1 engine codenamed shiretoko development initially numbered firefox 3.1 mozilla developers decided change version 3.5 reflect inclusion significantly greater scope changes originally planned last major version support x bitmap images estimates firefox 3.5 global market share february 2010 around 15–20 rose rapidly july 2009 users migrated firefox 3.0 january 2010 began decline users migrated firefox 3.6 mid-december 2009 february 2010 firefox 3.5 popular browser counting individual browser versions according statcounter one top 3 browser versions according net applications milestones involved passing internet explorer 7 previously held 1 3 spots popularity according statcounter net applications respectively due january 2010 well-publicized vulnerability microsoft internet explorer browser german french australian governments publicly issued warnings internet explorer users use alternative browsers least fix security hole made first browser recommended mozilla firefox followed google chrome even release firefox 3.0 june 17 2008 firefox 3.1 development codename shiretoko planned include new interface features tab previews tag auto-completion html 5 video tag support css text shadows first alpha released july 28 2008 new tab switching behavior implemented switches recently used tab instead adjacent one switching thumbnails displayed user preview tabs switching awesome bar also improved filtering bookmarks history gecko engine updated include css3 features includes html canvas text api alpha release showed 18 improvement acid3 test firefox 3.0 scoring 84/100 version 3.1 alpha 2 launched september 5 2008 implementing html 5 video element support preliminary support web worker thread enhancing speed javascript computations october 14 2008 first beta firefox 3.1 released included new tracemonkey javascript engine enabled default implementation w3c geolocation api beta 2 released december 8 2008 included new private browsing feature new tab switching behavior interface dropped beta since developer found needed work firefox 3.1 beta 3 released march 12 2009 followed beta 4 first labeled version 3.5 april 27 2009 june 8 2009 mozilla released firefox 3.5 preview labeled 3.5b99 order receive additional testing became release candidate release candidate 1 released update firefox 3.5 preview users june 17 2009 released candidate 2 made widely available june 19 2009 followed third rc june 24 2009 firefox 3.5 officially released june 30 2009 firefox 3.5 uses gecko 1.9.1 engine adds features included 3.0 release include support codice_1 codice_2 elements defined html 5 draft specification including native support ogg theora encoded video vorbis encoded audio goal offer video audio playback without encumbered patent issues associated plugin codec technologies features new firefox 3.5 include private browsing mode native support json web worker threads many new web technologies multi-touch support also added release including gesture support like pinching zooming swiping back forward firefox 3.5 also features updated logo previous releases minor change version 3.5 default search engine russian language builds uses search engine yandex rather google survey russian firefox users indicated preferred yandex first update 3.5.1 released july 16 2009 solved vulnerabilities detected final release another update 3.5.2 released august 3 2009 followed version 3.5.3 september 9 2009 version 3.5.4 october 27 2009 version 3.5.5 november 5 2009 version 3.5.6 december 15 2009 version 3.5.7 january 5 2010 starting july 14 2009 upgrade 3.5 offered users firefox 3.0 automatic internal push update mechanism security stability updates firefox 3.5.x scheduled end august 2010 however firefox 3.5.12 released september 7 2010 mozilla continued shipping incremental stability security fixes build 3.5.19 released april 28 2011 release firefox 3.6.18 mozilla issued update move remaining firefox 3.5 users new browser finally ending support 3.5 | [
6657,
9736,
2579,
6171,
9757,
7713,
3110,
10791,
9768,
9770,
559,
2095,
4661,
3639,
9275,
64,
9281,
5707,
10834,
6231,
8281,
6747,
11363,
1642,
9834,
10860,
115,
9843,
3191,
119,
4728,
637,
1664,
6791,
6797,
11418,
10910,
8351,
7340,
1713... | None |
6,134 | 2 | IPython:ipython ipython interactive python command shell interactive computing multiple programming languages originally developed python programming language offers introspection rich media shell syntax tab completion history ipython provides following features ipython based architecture provides parallel distributed computing ipython enables parallel applications developed executed debugged monitored interactively hence interactive ipython architecture abstracts parallelism enabling ipython support many different styles parallelism including release ipython 4.0 parallel computing capabilities made optional released ipyparallel python package ipython frequently draws scipy stack libraries like numpy scipy often installed alongside one many scientific python distributions ipython provides integration libraries scipy stack notably matplotlib producing inline graphs used jupyter notebook python libraries implement ipython specific hooks customize rich object display sympy example implements rendering mathematical expressions rendered latex used within ipython context ipython allows non-blocking interaction tkinter pygtk pyqt/pyside wxpython standard python shell allows interaction tkinter ipython interactively manage parallel computing clusters using asynchronous status callbacks and/or mpi ipython also used system shell replacement default behavior largely similar unix shells allows customization flexibility executing code live python environment using ipython shell replacement less common recommended use xonsh provide ipython feature better shell integrations ipython 5.x long time support series last version ipython support python 2 ipython project pledged support python 2 beyond 2020 one first projects join python 3 statement 6.x series compatible python 3 still possible though run ipython kernel jupyter notebook server different python versions allowing user still access python 2 newer version jupyter 2014 fernando pérez announced spin-off project ipython called project jupyter ipython continued exist python shell kernel jupyter notebook interface language-agnostic parts ipython moved jupyter name jupyter language agnostic name reference core programming languages supported jupyter julia python r. jupyter notebook formerly ipython notebooks web-based interactive computational environment creating executing visualizing jupyter notebooks similar notebook interface programs maple mathematica sagemath computational interface style originated mathematica 1980s supports execution environments aka kernels dozens languages default jupyter notebook ships ipython kernel 100 jupyter kernels may 2018 ipython mentioned popular computing press popular media presence scientific conferences scientific engineering work often presented companion tool matplotlib beginning 1 january 2013 alfred p. sloan foundation announced would support ipython development two years 23 march 2013 fernando perez awarded free software foundation advancement free software award ipython august 2013 microsoft made donation 100,000 sponsor ipython ’ continued development january 2014 jolt productivity award dr. dobb category coding tools july 2015 project funding 6 million gordon betty moore foundation alfred p. sloan foundation leona m. harry b. helmsley charitable trust may 2018 awarded 2017 acm software system award largest team award | [
7684,
2181,
3462,
4840,
5833,
8554,
5612,
462,
7983,
6993,
11442,
10771,
11221,
8923,
7325,
6718
] | Test |
6,135 | 0 | ELAN_software:elan software elan computer software professional tool manually semi-automatically annotate transcribe audio video recordings tier-based data model supports multi-level multi-participant annotation time-based media applied humanities social sciences research language documentation sign language gesture research purpose documentation qualitative quantitative analysis distributed free open source software gnu general public license version 3 elan well established professional-grade software widely used academia well received several academic disciplines example psychology medicine psychiatry education behavioral studies topics human computer interaction sign language conversation analysis group interactions music therapy bilingualism child language acquisition analysis non-verbal communication gesture analysis animal behavior several third-party tools developed enrich analyse elan data corpora features include elan developed max planck institute psycholinguistics nijmegen first version released around year 2000 name eat eudico annotation tool renamed elan 2002 since two three new versions released year developed programming language java interfaces platform native media frameworks developed c c++ objective-c | [
5380,
10470,
5356,
5677,
6797,
7983,
5075,
823,
2045,
479
] | Test |
6,136 | 4 | Ralph_Canine:ralph canine ralph julian canine november 9 1895 – march 8 1969 lieutenant general united states army first director national security agency canine born 1895 flora indiana one two children local superintendent schools left home intent doctor completed pre-med studies northwestern university entered united states army world war commissioned second lieutenant canine served various combat posts france world war elected stay army armistice signed 1918 interwar period education traveled one army post another filling job vacant world war ii broke canine well fitted responsibility became chief staff xii corps served general george patton third army race across france 1944 war rewarded command 1st infantry division 1951 canine became director armed forces security agency america first tentative step toward cryptologic unification long enough one year see organization lacked president harry s. truman created national security agency 1952 canine continued first director died unexpectedly pulmonary embolism march 1969 | [
6017,
8726,
1189,
6572,
9517,
1838,
5308,
1986,
6343,
6344,
11335,
7119,
7759,
7887,
3154,
8276,
7893,
991,
7137,
3305,
7145,
2419,
6005,
766
] | None |
6,137 | 9 | Praspel:praspel praspel php realistic annotation specification language formal specification language php based design-by-contract paradigm uses preconditions postconditions invariants etc specifications written comments php code always accessible praspel used manual automatic software validation verification thanks realistic domains | [
9345,
8644,
8262,
9320,
11625,
7983
] | Test |
6,138 | 2 | Chgrp:chgrp chgrp change group command may used unprivileged users unix-like systems change group associated file system object file directory link one member file system object 3 sets access permissions one set owner one set group one set others changing group object could used change users write file codice_1 chgrp name_of_group_to_change file_name -r recurse subdirectories -v verbosely output names objects changed useful fso list -f force forge ahead objects even error encountered command changes group associated file prog.conf wheel staff provided executing user member group could used allow members staff modify configuration programs prog prox | [
515,
9733,
9735,
3976,
521,
5256,
6281,
6664,
4750,
8975,
11663,
4369,
5397,
2198,
6812,
7196,
4001,
2599,
7847,
8236,
4398,
7983,
1336,
8504,
7356,
451,
1987,
965,
2245,
8517,
9542,
5706,
3659,
8522,
1741,
10967,
9946,
6369,
8675,
10727,... | Test |
6,139 | 3 | Deferred_Procedure_Call:deferred procedure call deferred procedure call dpc microsoft windows operating system mechanism allows high-priority tasks e.g interrupt handler defer required lower-priority tasks later execution permits device drivers low-level event consumers perform high-priority part processing quickly schedule non-critical additional processing execution lower priority dpcs implemented dpc objects created initialized kernel device driver kernel mode program issues requests dpc dpc request added end dpc queue processor separate dpc queue dpcs three priority levels low medium high default dpcs set medium priority windows drops irql dispatch/dpc level checks dpc queue pending dpcs executes queue empty interrupt higher irql occurs example clock interrupt generated clock interrupt handler generally increments counter current thread calculate total execution time thread decrements quantum time remaining 1 counter drops zero thread scheduler invoked choose next thread executed processor dispatcher perform context switch since clock interrupt occurs much higher irql desirable perform thread dispatching less critical task later time processor irql drops clock interrupt handler requests dpc object adds end dpc queue process dispatching processor irql drops dpc/dispatch level working streaming audio video uses interrupts dpcs used process audio buffer stream another dpc poorly written driver takes long another interrupt generates new buffer data first one processed drop-out results | [
6797,
5823
] | None |
6,140 | 5 | Harvest_project:harvest project harvest darpa funded research project internet research task force research group resource discovery ietf-rd hosted university colorado boulder provided web cache developed standards internet cache protocol summary object interchange format spawned many technologies software products conclusion project 1996 development harvest object cache continued university edinburgh releasing version 1.5 open source squid cache commercial netcache based harvest object cache | [
6569,
6894,
119
] | Test |
6,141 | 4 | Security_hologram:security hologram security holograms labels hologram printed onto sale security reasons holograms security labels difficult forge replicated master hologram requires expensive specialized technologically advanced equipment used widely several banknotes around world particular high denominations also used passports credit bank cards well quality products herman lopata president new york-based automatic toll systems inc. received patent 1987 credit card security hologram part early work high speed highway toll collection—the predecessor modern ez pass type equipment holograms classified different types reference degree level optical security incorporated process master origination different classifications described far common type hologram – fact holograms true sense words term hologram taken secondary meaning due widespread use multilayer image credit cards driver licenses type hologram consists two images stacked way alternately visible depending upon angle perspective viewer technology similar technology used past 50 years make red safety night reflectors bicycles trucks cars holograms therefore artwork holograms may two layers i.e background foreground three layers background middle ground foreground case two-layer holograms matter middle ground usually superimposed matter background hologram holograms display unique multilevel multi-colour effect images one two levels flat graphics “ floating ” surface hologram matter background appears behind hologram giving illusion depth holograms maximum resolution 10 micrometres per optical element produced specialized machines making forgery difficult expensive design optical elements several algorithms used shape scattered radiation patterns flip-flop hologram master origination technique used produce holograms display flip-flop effect produced used 2d/3d master shooting system two channel effect 2d/3d holograms displays two different images different angles holograms often fabricated using supreme quality material final master obtained flip-flop mastering technique used manufacture holograms gives flip-flop effects excellent blend 2d/3d flipping images offers holographic images excellent depth dazzling appeal types hologram created using highly sophisticated expensive electron-beam lithography systems kind technology allows creation surface holograms resolution 0.1 micrometres 254,000 dpi technique requires development various algorithms designing optical elements shapes scattered radiation patterns type hologram offers features like viewing four lasers single point 2d/3d raster text switch effects 3d effects concealed images laser readable text true colour images various kinds features possible security holograms mentioned usually take form thin lines contours concealed images seen large angle light diffraction one particular angle sets thin lines complicated geometry guilloché patterns drawn high resolution technology allows continuous visual changes colour along separated lines seen conditions hologram observations changed turning inclining hologram allows movements certain features image studied dot matrix holograms capable embedding microtext various sizes three types microtexts holograms high contrast microtexts size 50 – 150 micrometres diffractive grating filled microtexts size 50 – 150 micrometres low contrast microtexts microtexts sizes smaller 50 micrometres referred nanotext nanotext sizes less 50 micrometres observed microscope dot matrix holograms also support covert laser readable clr imagery simple laser device may used verify hologram authenticity computing clr images complicated mathematical task involves solving ill-posed problems two types clr dynamic clr multigrade clr dynamic clr set clr fragments produce animated images screen control device moves along hologram surface multigrade clr images produce certain images screen controlling device differ first minus first orders laser light diffraction variant hidden image negative positive plus one minus one order respectively may created recently novel computer-generated holograms proposed working structured light carrying phase singularities optical elements improve security level since encoded information appears input illumination endowed correct intensity phase distribution technology allows 2d 3d images combined security features microtexts concealed images clr etc combination effect achieved using traditional technologies origination 2d/3d hologram masters developed 2d/3d master shooting lab incorporates highly sensitive machines advanced equipment microprocessor-controlled automatic positioning equipment optical table he-cd laser laser power controller silver coatings related technologies final master obtained 2d/3d mastering used manufacture 2d/3d hologram stickers stickers consist multitude two-dimensional layers images placed one behind thereby offering excellent depth stickers colorful images 3d depth different layers true colour images effective decorative pictures synthesized computer may include microtexts hidden images security features yielding attractive high-security holograms true color hologram masters produced using 2d/3d master shooting system final master obtained mastering technique comprises true photographic images like images people animals flags etc type holograms ’ duplicated case ’ obtain original photo true color holograms one best ways prevent counterfeiters duplicating | [
5433,
10163,
1845,
1087
] | Test |
6,142 | 9 | Java_compiler:java compiler java compiler compiler programming language java common form output java compiler java class files containing platform-neutral java bytecode also compilers output optimized native machine code particular hardware/operating system combination java-to-bytecode compilers jikes well known exception virtually optimization leaving run time done jre java virtual machine jvm loads class files either interprets bytecode just-in-time compiles machine code possibly optimizes using dynamic compilation standard interact java compilers programmatically specified jsr 199 2019 following major java compilers | [
1952,
4960,
8609,
9665,
5677,
7983,
5872,
9714,
2808,
7421
] | Validation |
6,143 | 9 | Rhino_(JavaScript_engine):rhino javascript engine rhino javascript engine written fully java managed mozilla foundation open source software separate spidermonkey engine also developed mozilla written c++ used mozilla firefox rhino project started netscape 1997 time netscape planning produce version netscape navigator written fully java needed implementation javascript written java netscape stopped work javagator called rhino project finished javascript engine since couple major companies including sun microsystems licensed rhino use products paid netscape allowing work continue originally rhino compiled javascript code java bytecode generated java class files produced best performance often beating c++ implementation javascript run just-in-time compilation jit suffered two faults first compiling time long since generating bytecode loading generated classes resource-intensive process also implementation effectively leaked memory since java virtual machines jvm n't collect unused classes strings interned result loading class file changed later versions java result fall 1998 rhino added interpretive mode classfile generation code moved optional dynamically loaded package compiling faster scripts longer use collected like java object rhino released mozilla foundation april 1998 originally rhino classfile generation held back release however licensors rhino agreed release rhino open source including class file generation since release open source rhino found variety uses increasing number people contributed code project gets name animal cover javascript book o'reilly media version 1.7r11 rhino supports java 8 supports number ecmascript es6/es2015 features rhino converts javascript scripts classes rhino works compiled interpreted mode intended used desktop server-side applications hence built-in support web browser objects commonly associated javascript rhino used debugger using rhino shell javascript shell provides simple way run scripts batch mode within interactive environment exploratory programming used applications embedding rhino slightly modified version rhino 1.6r2 comes bundled sun microsystems release java se version 6 released december 2006 makes easier integrate javascript part java programs access java resources javascript implementations java 6 may differ | [
7176,
9736,
9757,
5677,
572,
9281,
7750,
4171,
84,
6231,
2138,
603,
2658,
5219,
10860,
4728,
3705,
8825,
637,
1664,
3712,
6791,
8854,
11418,
1713,
3761,
7861,
11449,
5311,
7871,
6860,
7889,
4822,
220,
1250,
7396,
10991,
5872,
8443,
2304,
... | Test |
6,144 | 0 | EXMARaLDA:exmaralda exmaralda extensible markup language discourse annotation set free software tools creating managing analyzing spoken language corpora consists transcription tool comparable tools like praat transcriber tool administering corpus meta data tool queries kwic searches spoken language corpora exmaralda used conversation discourse analysis dialectology phonology research first second language acquisition children adults exmaralda based open standards xml unicode programmed java | [
10409,
5677,
6797,
7983,
823,
9787,
5212,
479
] | None |
6,145 | 0 | GermaNet:germanet germanet lexical-semantic net german language relates nouns verbs adjectives semantically grouping lexical units express concept synsets defining semantic relations synsets germanet free academic use signing license germanet much common english wordnet viewed on-line thesaurus light-weight ontology germanet developed maintained within various projects research group general computational linguistics university tübingen since 1997 integrated eurowordnet multilingual lexical-semantic database germanet partitions lexical space set concepts interlinked semantic relations semantic concept modeled synset synset set words called lexical units words taken almost meaning.thus synset set synonyms grouped one definition gloss addition gloss synsets labeled syntactic function accompanied example sentences distinct meaning synset wordnet word category semantic space divided number semantic fields closely related major nodes semantic network ort location körper body etc following up-to-date statistics germanet version 11.0 contents release may 2016 germanet data stored relational postgresql 5 database database model follows internal structure germanet tables store synsets lexical units conceptual lexical relations etc distribution format germanet data xml two types files one synsets relations represent data available germanet database several application programming interfaces api available java perl apis distributed freely provide easy access information various versions germanet germanet 11.0 released may 2016 free academic distributed one following types license agreements open-de-wordnet freely available wordnet-compatible alternative germanet germanet used variety applications including semantic analysis shallow recognition implicit document structure compound analysis analyzing sectional preferences word sense disambiguation etc | [
416,
8582,
7597,
5677,
7839,
2100,
10452,
8539,
479
] | Validation |
6,146 | 5 | Karn's_algorithm:karn algorithm karn algorithm addresses problem getting accurate estimates round-trip time messages using transmission control protocol tcp computer networking algorithm also sometimes termed karn-partridge algorithm proposed paper phil karn craig partridge 1987 accurate round trip estimates tcp difficult calculate ambiguity created retransmitted segments round trip time estimated difference time segment sent time acknowledgment returned sender packets re-transmitted ambiguity acknowledgment may response first transmission segment subsequent re-transmission karn algorithm ignores retransmitted segments updating round-trip time estimate round trip time estimation based unambiguous acknowledgments acknowledgments segments sent simplistic implementation karn algorithm lead problems well consider happens tcp sends segment sharp increase delay using prior round-trip time estimate tcp computes timeout retransmits segment tcp ignores round-trip time retransmitted packets round trip estimate never updated tcp continue retransmitting every segment never adjusting increased delay solution problem incorporate transmission timeouts timer backoff strategy timer backoff strategy computes initial timeout timer expires causes retransmission tcp increases timeout generally factor two algorithm proven extremely effective balancing performance efficiency networks high packet loss ideally karn algorithm would needed networks high round-trip time retransmission timeouts investigated using root cause analysis techniques | [
10924,
8628
] | Test |
6,147 | 9 | Clarion_(programming_language):clarion programming language clarion commercial proprietary 4gl multi-paradigm programming language integrated development environment softvelocity used program database applications compatible isam sql ado data access methods reads writes several flat file desktop database formats including ascii csv dos binary foxpro clipper dbase relational databases via odbc ms sql server sybase sql anywhere oracle use accelerated native database drivers xml clarion used output html xml plaintext pdf among others clarion development environment ide sits top clarion programming language ide provides code generation facilities via system templates allow programmers describe program abstract level higher actual code statements generator turns higher level code turn compiled linked using normal compiler linker generation layer sometimes referred 4gl programming.the generation layer required possible create programs completely code level so-called 3gl layer bypassing code generation facilities templates used generate code programmers able inject code generated code alter extend functionality offered template layer process embedding code done viewing surrounding generated code mixing template code generated code allows template settings updated code regenerated without loss embedded code templates code generated provided source form developers free create templates large collection templates written various developers offered commercial add-ons free several clarion products available clarion professional edition clarion enterprise edition clarion.net first release clarion language dos product called clarion 1.0 first released april 1986 clarion created bruce barrington one founders healthcare firm hbo company later acquired mckesson corporation small team developers barrington goal create language would compact expressive would maximize use memory-mapped screen ibm pc creating screen designer version 1 produced pseudocode initial release included screen designer interpreter editor debugger initially supported databases composed dat files clarion ’ proprietary isam file format bruce barrington formed barrington systems released version 1.0 clarion 1.0 required use dongle time industry sentiment turning dongles offset ability create royalty-free applications however dongle removed release 1.1 time even basic version sold called personal developer limited user could adequate basic database applications fraction cost professional developer 1.x version 2.0 released may 1988 known clarion professional developer cpd included component called designer incorporated data dictionary cpd generated clarion code based contents dictionary template called model file model file text file could modified limited ways create custom code model file implemented browse form paradigm data initially displayed user list box updating done via form called via buttons associated list designer created essential crud create read update delete code developers could enhance functionality inserting code specified points generated code hand-coding new procedures clarion professional developer also introduced language extension modules lems could extend clarion language using modules compiled languages built lem format clarion software many third-party tool developers created lems purposes including extension connecting databases dbase clipper paradox cpd 2.x database solution everything required screens reports databases help files version clarion 2.x end-users clarion personal developer also released business user creating personal applications around time period clarion released clarion report writer created stand-alone product end-users clarion personal developer users programs written developers cpd built-in program bundled clarion professional developer version 2.1 released 1989 1991 barrington licensed compiler technology company called jensen partners international jpi jpi founded 1987 niels jensen earlier 1979 1981 one founders borland philippe kahn marketing personnel built borland around 99 turbo pascal compiler niels team working new compiler technology borland philippe kahn decided buy wizard c call turbo c. niels several developers left borland started jpi continued work compiler technology christened topspeed bought borland 1.7 million clarion database developer 3.0 cdd released 1993 revolutionary product adding many features technology could create programs “ windows like ” cua common user access user interface much cdd changes fit well windows programming paradigm laid groundwork future clarion windows product cdd ide completely new based jpi ide included many professional programmer quality tools editor project system compiler linker visual debugger gone p-code cpd jpi compiler clarion language produced true machine code exes libs dlls binaries could compiled protected mode allowing dos programs use extended memory breaking 640kb barrier clarion 3.0 language enhanced many ways e.g new data types cstring pstring date time ushort ulong file driver system e.g btrieve clarion dbase foxpro paradox queues tables enhanced screen processing enhanced cua code generation models replaced “ templates ” features extensible allowed generation much robust complex code new power came complexity many existing users found transition cdd difficult cpd simple easy use attracted many non-programmers could build programs answering questions cdd suited professional programmers programs could still developed easily size vast features ide made appear complex first 5 patch releases cdd buggy point unusable caused many users abandon product nearly complete disaster company clarion kept working cdd version 3.007 usable version 3.1 named clarion dos cfd released 1995 proved much stable time little interest dos development tools significant feature topspeed file driver isam file format allowing indexes multiple data files contained one disk file time relationship clarion software jpi grew closer april 30 1992 clarion merged jpi form entity would eventually called topspeed corporation employees topspeed development centre london went work cdd ironed many bugs topspeed released clarion windows version 1.0 a.k.a cw 1.0 january 1995 final 1.003 release june 1995 ide completely written windows gui could produce win16 exe dll binaries run windows 3.x language featured many enhancements required support event driven windows user interface clarion developer could easily create multithreaded mdi application cw 1.0 continued database flexibility added cdd well adding odbc driver allowing connection sql databases source supported odbc dos monolithic template model significantly enhanced cw 1.0 replaced model allowed window use multiple templates extension control procedure templates example dos screen procedure could support browsing single data table cw 1.0 window could use multiple browse control templates one displaying different table design change major improvement power clarion code generation clarion windows version 1.5 a.k.a cw 1.5 released september 1995 final 1.502 release january 1996 version added support creating native win32 binaries windows 95 windows nt 4 source could target win16 win32 ide remained 16-bit added 32-bit compilers linker debugger clarion windows version 2 a.k.a cw20 released june 1996 final 2.003 release march 1997 cw20 added classic object orientation language including inheritance encapsulation virtual methods overloading cw20 enhanced 32-bit support added activex support enhanced sql support clarion 4 a.k.a c4 released december 1997 final 4.002 release may 1998 topspeed elected skip dreaded version number three official explanation cw 1.5 cw 2.0 cw 2.0 cw 3.0 let ’ call next one version 4 due dos development dead name dropped windows title c4 came new template set class library called application builder classes “ abc ” original template set generated procedural code becoming increasingly complex abc template set generated far less code leveraged class library contained actual logic windows browses forms etc c4 enhanced oop adding constructors destructors without parameters clarion 5 a.k.a c5 released may 1998 final 5.0b release june 1999 product split professional enterprise editions clarion 5.5 a.k.a c55 released august 2000 final 5.507 release january 2002 c55 added interfaces oop clarion 6.0 a.k.a c6 released november 2003 added direct support pre-emptive multi-threading clarion 6.1 released may 2004 clarion 6.2 released may 2005 clarion 6.3 released jan 2006 excluding patches final release 16 bit clarion development environment use 16 bit ide produced problems using current windows technologies activex ocx com doc ... however note series 6.x clarion produces native win32 executables 32-bit exes and/or dlls previous versions produced 16-bit 32-bit executables 16-bit support dropped end-user product version 6.0 clarion april 13 2009 softvelocity released clarion 7 a.k.a c7 new ide look familiar sharpdevelop users softvelocity obtained commercial license sharpdevelop code integrated clarion code generation application generation technology fixed extended basic functionality major new features standard modern ide features lacking c6 include build system based msbuild backward compatibility releases clarion going back clarion windows 1.5 clarion still win32 development environment beta .net version clarion language called clarion available clarion c7 share ide although present shipped separate products unlike clarion 7 later releases clarion yet dictionary editor application generator expected single clarion7+/clarion.net ide would supported win32 .net development however given least 14 years passed since clarion.net announced without gold release clarion.net future unclear best new ide clarion mode retains ability build .net applications vb.net c september 12 2011 softvelocity released clarion 8 continues line clarion 7 latest release c7.3 august 2014 c9.1 gold released november 2015 clarion 10 released october 2018 clarion 11 released c10 re-worked build .net 4 clarion historically notable one first 4gl computer programming tools first developed 1980s trial version edition clarion time writing thus possible produce simple hello world program clarion without purchasing license first clarion documentation varying standard mixture enterprise level .net capabilities intertwined single one-serves-all help source result functionality described help together code snippets functionality specific product used example clarion.net documentation included even clarion.net product installed documentation specific one product though clearly labelled documentation lagged behind product clear completely reviewed every release example numerous references clarion 7 within clarion 9 documentation problem evidenced tutorial sample application level well clarion imperative programming language supports object orientated programming syntax clarion programming language case insensitive line endings treated implicit statement terminators unless explicit line continuation character used data program labels always declared column 1 code always indented column 2 onwards indentation optional code syntax resembles basic pascal structure although language quite different code blocks typically implicit start begin word used either explicit implicit end example period used place end statement code concatenated onto single line using separator case statement note period terminating statement block clarion generates code means templates code generated templates tends reliable especially template use time templates shipped source form edited however editing shipping templates recommended code generated templates augmented altered either creating additional custom templates embedding specific code templates capable generating text based file limited clarion language statements clarion language capable interacting dll produced languages compatible libraries using pascal method c method parameter passing windows api calls made directly language clarion data-centric meaning designed used among wide variety database vendors focused around data focus data starts data dictionary method formally declaring data tables dictionary used extensively templates generating program changes dictionary level cascade program causing automatic changes program data dictionary provides vendor independent method declaring tables turn means changing program one database vendor another relatively straightforward within constraints features chosen database provides clarion supports sql databases non-sql data stores support popular isam file types dbase btrieve etc built two proprietary isam file systems topspeed tps clarion dat also provided program code tables native data type table access provided standard dll interface known database driver separates program chosen data store abstraction allows chosen backend change either minimal changes program clarion natively supports following database formats including limited ascii basic btrieve clarion .dat topspeed .tps clipper dbaseiii dbaseiv dos foxpro/foxbase ms-sql t-sql odbc pervasive sql sqllite mysql oracle ado odbc driver allows access odbc source firebird postgres popular options accessed via odbc addition due ability readily interact .net class library able leverage latest technologies database perspective including asp.net others microsoft makes available including windows communication foundation windows communication foundation windows workflow foundation version clarion simple language resembling basic pascal addition objects classes areas data dictionary data declaration sections namely global data section module-specific data declaration section local data data declaration sections declare simple complex data type variable also declare prompt label mask picture whether read-only whether skipped form foreground background colors transparency whole host attributes ever drop variable form clarion ide adopts properties reflected automatically words data dictionary 'database sql terms contains information data also information represented applications make use database declaration time clarion developer spends defining data-dictionary time save later 4gl application generator produces output typically lists data full crud capabilities validation automatic lookup child tables demonstration hello world program clarion sample code shown hello world example example hand-written code clarion compiler gladly compile however developers write whole programs code level make use templates generate code ability describe program level higher code clarion popular non-programmers programmers limited skills abilities possible non-programmers generate sophisticated data based programs time either writing language code adding minimal amounts code one things clarion includes called global map inside procedure definitions declared including required declarations external dll libraries written non-clarion languages use clarion application clarion also ability generate dll consumed external non-clarion applications taking full advantage clarion 4gl capabilities simply plugging procedures created within map able leverage windows-api declarations using required no-longer documented data types core windows o/s easily clarion based .net version 4 version used develop clarion 10 ide allows developer use .net libraries advantage using clarion directly compilation clarion dll generates lib file compatible clarion windows allows clarion windows program call .net functionality clarion dll manner win32 dlls clarion developer wants use code compiled using languages use unmanaged exports nuget package developed robert gieseck https //www.nuget.org/packages/unmanagedexports unmanaged exports allows developer expose functions developed using .net native languages windows helpful forced maintain clarion product way upgrading third party tools due lack support third party tools rewritten .net ease | [
6112,
8868,
4614,
2183,
8262,
8393,
4042,
6797,
10286,
7983,
9360,
10289,
10413,
10899,
11219,
11030,
479
] | Validation |
6,148 | 2 | IBM_PC_DOS:ibm pc dos ibm pc dos acronym ibm personal computer disk operating system discontinued operating system ibm personal computer manufactured sold ibm early 1980s 2000s ibm task force assembled develop pc decided critical components machine including operating system would come outside vendors radical break company tradition in-house development one key decisions made ibm pc industry standard time private company microsoft founded five years earlier bill gates eventually selected operating system ibm wanted microsoft retain ownership whatever software developed wanted nothing helping microsoft making suggestions afar according task force member jack sams reasons internal terrible problem sued people claiming stolen stuff could horribly expensive us programmers look code belonged someone else would come back say stole made money lost series suits n't want product clearly someone else product worked ibm people went microsoft proposition wanted product ibm first contacted microsoft look company july 1980 negotiations continued months followed paperwork officially signed early november although ibm expected customers would use pc dos ibm pc also supported cp/m-86 became available six months pc dos ucsd p-system operating systems ibm expectation proved correct one survey found 96.3 pcs ordered 40 pc dos compared 3.4 240 cp/m-86 history ibm pc dos various versions developed ibm and/or microsoft time pc dos 3.0 completed ibm team developers covering full os point time either ibm microsoft completely developed versions ibm pc dos going forward 1985 joint development agreement jda ibm microsoft development pc dos company giving company completely developed version time branded versions identical however cases companies made minor modifications version dos fall 1984 ibm gave source code documentation internally developed ibm topview dos microsoft microsoft could fully understand develop object-oriented operating environment overlapping windows development windows 2.0 multitasking windows used cooperative method share cpu entire life windows 1.0 millennium microsoft first licensed purchased 86-dos seattle computer products scp modified ibm pc microsoft employee bob o'rear assistance scp later microsoft employee tim paterson o'rear got 86-dos run prototype pc february 1981 86-dos converted 8-inch 5.25-inch floppy disks integrated bios microsoft helping ibm write ibm people writing requirements computer microsoft writing code o'rear often felt overwhelmed number people deal esd entry systems division facility boca raton florida perhaps first public mention operating system july 1981 byte discussed rumors forthcoming personal computer cp/m-like dos ... called simply 'ibm personal computer dos 86-dos rebranded ibm pc dos 1.0 august 1981 release ibm pc initial version dos largely based cp/m-80 1.x architecture function calls file-naming conventions copied directly older os significant difference fact introduced different file system fat12 unlike later dos versions date time commands separate executables rather part command.com single-sided 160 kilobyte kb 5.25 floppies disk format supported late 1981 paterson microsoft began writing pc dos 1.10 debuted may 1982 along revision b ibm pc support new double-sided drives added allowing 320 kb per disk number bugs fixed error messages prompts made less cryptic debug utility able load files greater 64k size later group microsoft programmers primarily paul allen mark zbikowski aaron reynolds began work pc dos 2.0 completely rewritten dos 2.0 added subdirectories hard disk support new ibm xt debuted march 1983 new 9-sector format bumped capacity floppy disks 360 kb unix-inspired kernel featured file handles place cp/m-derivative file control blocks loadable device drivers could used adding hardware beyond ibm pc bios supported basic utilities provided dos substantially upgraded well major undertaking took almost 10 months work dos 2.0 twice big dos 1.x occupying around 28k ram compared 12k predecessor would form basis microsoft consumer-oriented oses 2001 windows xp based windows nt released october 1983 officially november 1 dos 2.1 debuted fixed bugs added support half-height floppy drives new ibm pcjr 1983 compaq released compaq portable first 100 ibm pc compatible licensed oem version dos 1.10 quickly replaced dos 2.00 microsoft pc compatibles followed suit included hardware-specific dos features although generic august 1984 ibm introduced intel 80286-derived ibm pc/at next-generation machine along dos 3.00 despite jumping whole version number proved little incremental upgrade adding nothing substantial support new 1.2 megabyte mb floppy disks planned networking capabilities dos 3.00 judged buggy usable microsoft disabled prior os release case ibm original plans equip proper next-generation os would use extended features never materialized pc dos 3.1 released march 1985 fixed bugs dos 3.00 supported ibm network adapter card ibm pc network pc dos 3.2 added support 3½-inch double-density 720 kb floppy disk drives supporting ibm pc convertible ibm first computer use 3½-inch floppy disks released april 1986 later ibm personal system/2 1987 june 1985 ibm microsoft signed long-term joint development agreement share specified dos code create new operating system scratch known time advanced dos april 2 1987 os/2 announced first product produced agreement time ibm released next generation personal computers ibm personal system/2 ps/2 pc dos 3.3 released ps/2 line added support high density 3½-inch 1.44 megabyte mb floppy disk drives ibm introduced 80286-based higher ps/2 models upgrade dos 3.2 3.3 completely written ibm development effort part microsoft working advanced dos 1.0 dos 3.30 last version designed ibm xt floppy-only systems mind became one popular versions many users preferred buggy successor pc dos 4.0 internally known dos 3.4 originally shipped july 1988 dos 4.0 compatibility issues low-level disk utilities due internal data structure changes dos 4.0 used memory dos 3.30 also glitches newly added ems drivers compatible ibm ems boards common intel ast ones dos 4.0 also notable including first version dos shell full-screen utility designed make command-line os user-friendly microsoft took back control development released bug-fixed dos 4.01 dos 5 debuted june 1991 one biggest upgrades dos history dos 5 supported use high memory area hma upper memory blocks umbs 80286 later systems reduce conventional memory usage also dos commands supported option display command syntax aside ibm pc dos ms-dos version available oem editions vanished since time pcs 100 compatible customizations hardware differences longer necessary last version dos ibm microsoft shared full code dos integrated os/2 2.0 later windows nt virtual dos machine pc dos remained rebranded version ms-dos 1993 ibm microsoft parted ways—ms-dos 6 released march pc dos 6.1 separately developed followed june new features ms-dos 6.0 appeared pc dos 6.1 including new boot menu support new commands choice deltree move qbasic dropped ms-dos editor replaced ibm e editor pc dos 6.1 reports dos 6.00 pc dos 6.3 followed december pc dos 6.3 also used os/2 powerpc pc dos 6.3 also featured superstor disk compression technology addstor pc dos 7 released april 1995 last release dos ibm software development development ibm viavoice moved austin rexx programming language added well support new floppy disk format xdf extended standard 1.44 mb floppy disk 1.86 mb superstor disk compression technology replaced stac electronics stacker algebraic command line calculator utility program load device drivers command line added pc dos 7 also included many optimizations increase performance reduce memory usage recent retail release pc dos 2000 – released austin 1998 – found niche embedded software market elsewhere pc dos 2000 slipstream 7.0 y2k fixes applied applications pc dos 2000 reports ibm pc dos 7.00 revision 1 contrast original pc dos 7 reported ibm pc dos 7.00 revision 0 hitachi used pc dos 2000 legacy drive fitness test 4.15 hitachi feature tool 2.15 2009 thinkpad products copy latest version pc dos rescue recovery partition pc dos 7.1 added support logical block addressing lba fat32 partitions various builds 1999 2003 released retail used products ibm serverguide scripting toolkit build version dos appeared norton ghost symantec version 7.1 indicates support fat32 also ms-dos builds version dos limited kernel files ibmbio.com ibmdos.com command.com updated programs fdisk32 format32 allow one prepare fat32 disks additional utilities taken pc dos 2000 needed 1986 ibm announced pc dos support client access file services defined distributed data management architecture ddm enabled programs pcs create manage access record-oriented files available ibm system/36 ibm system/38 ibm mainframe computers running cics 1988 client support stream-oriented files hierarchical directories added pc dos became available ddm server systems | [
10757,
2055,
10257,
6675,
10273,
7217,
8241,
2045,
573,
8262,
5220,
9829,
8301,
2168,
2172,
4735,
10883,
4228,
4244,
7317,
2201,
7847,
5293,
178,
9907,
6325,
11454,
1219,
8900,
6342,
3304,
6893,
5359,
5363,
3323,
2811,
2813,
11008,
4870,
... | Validation |
6,149 | 4 | WANSecure_Firewall:wansecure firewall wanbound company provides hardware software products small medium-sized offices products include firewalls vpn backup devices content filtering wansecure firewall remotely monitored managed firewall top management services provided secured wanbound services offered wansecure firewall include | [
3941,
3366,
9488,
10392,
7515
] | Validation |
6,150 | 2 | Windows_Virtual_PC:windows virtual pc windows virtual pc successor microsoft virtual pc 2007 microsoft virtual pc 2004 connectix virtual pc virtualization program microsoft windows july 2006 microsoft released windows version free product august 2006 microsoft announced macintosh version would ported intel-based macintosh computers effectively discontinuing product powerpc-based macintosh computers longer manufactured newest release windows virtual pc run versions windows earlier windows 7 officially support ms-dos operating systems earlier windows xp professional sp3 guests older versions support wider range host guest operating systems remain available starting windows 8 hyper-v supersedes windows virtual pc virtual pc virtualizes standard ibm pc compatible device associated hardware supported windows operating systems run inside virtual pc operating systems linux may run officially supported microsoft provide necessary virtual machine additions include essential drivers linux connectix virtual pc microsoft virtual pc 2004 microsoft virtual pc 2007 windows virtual pc successive versions software windows virtual pc runs windows 7 supports running windows xp professional later earlier microsoft versions run older versions windows still available support operating systems older windows xp microsoft replaced hyper-v virtual pc originally developed macintosh application system 7.5 released connectix june 1997 first version virtual pc designed windows-based systems version 4.0 released june 2001 connectix sold versions virtual pc bundled variety guest operating systems including windows os/2 red hat linux virtualization importance enterprise users became clear microsoft took interest sector acquired virtual pc virtual server unreleased time connectix february 2003 virtual pc 4 requires mac os 8.5 later g3 g4 processor running windows windows 2000 red hat linux requires mac os 9.0 later virtual pc 4 first version expandable drive images virtual pc 5 requires mac os 9.1 newer mac os x 10.1 later usb support mac os x recommended run virtual pc 5 mac os x 400 mhz faster processor required earlier versions virtual pc supported following features removed microsoft virtual pc 2004 2007 windows virtual pc agreement connectix innotek gmbh makers virtualbox part oracle ported version 5.0 run os/2 host version also included guest extensions vm additions os/2 guests could run windows os/2 mac os x hosts using virtual pc versions 5 6 7 new version guest extensions later included microsoft virtual pc 2004 july 12 2006 microsoft released virtual pc 2004 sp1 windows free charge mac version made free equivalent version mac version 7 final version virtual pc mac ran mac os x 10.2.8 later powerpc proprietary commercial software product virtual pc 2007 released windows platform public beta testing beginning october 11 2006 production release february 19 2007 added support hardware virtualization viewing virtual machines multiple monitors support windows vista host guest windows aero interface disabled windows vista guests due limitations emulated video hardware however aero effects rendered connecting guest via remote desktop services aero-enabled windows vista host provided guest running windows vista business higher edition may 15 2008 microsoft released virtual pc 2007 service pack 1 added support windows xp sp3 windows vista sp1 guest host oses well windows server 2008 standard guest os hotfix rollup virtual pc 2007 sp1 released february 20 2009 solved networking issues enhanced maximum screen resolution 2048×1920 32-bit enabling 16:9 resolutions 1920×1080 security update released july 14 2009 address elevation privilege vulnerability guest operating systems microsoft virtual pc 2004 2007 work windows 10 64-bit even 32-bit platforms lack internet connectivity due lack vpc driver also impacts windows mobile emulators windows virtual pc entered public beta testing april 30 2009 released alongside windows 7 unlike predecessors version supports windows 7 host operating systems originally required hardware virtualization support march 19 2010 microsoft released update microsoft virtual pc allows run pcs without hardware support windows virtual pc available free charge certain editions windows 7 either pre-installed oems via download microsoft website new features include system requirements windows virtual pc windows xp mode xpm virtual machine package windows virtual pc containing pre-installed licensed copy windows xp professional service pack 3 guest os previously cpu motherboard host support hardware virtualization update early 2010 eliminated requirement pre-installed integration components allow applications running within virtualized environment appear running directly host sharing native desktop start menu windows 7 well participating file type associations windows xp mode applications run terminal services session virtualized windows xp accessed via remote desktop protocol client running windows 7 host applications running windows xp mode compatibility issues actually running inside windows xp virtual machine redirected using rdp windows 7 host windows xp mode may used run 16-bit applications includes ntvdm although might impossible run 16-bit applications require hardware acceleration windows virtual pc hardware acceleration windows xp mode available free charge users windows 7 professional enterprise ultimate users editions windows 7 eligible download use restriction apply windows virtual pc windows xp mode also run vmware player vmware workstation however like virtual pc vmware products import windows xp mode windows 7 professional enterprise ultimate adhere microsoft licensing requirements virtual pc emulates following environments implementation earlier versions virtual pc supported following features removed microsoft virtual pc 2004 2007 windows virtual pc windows virtual pc may enable guest operating systems running inside virtual machines interact host operating system beyond feasible two physical computers sharing physical hardware components exchanging data however integration components must installed guest operating systems integration component installed mean communicating two machines either virtual physical virtual network interface even mouse cursor controlled one operating system either real virtual given time however integration components installed guest operating systems following features automatically activated addition features described guest operating systems may also take advantage following integration features administrator activates windows virtual pc enabling integration features automatically makes virtual machine user account accessible using remote desktop connection virtual pc allows multiple guest operating systems run virtualized single physical host although number popular host guest operating systems lack official microsoft support sometimes technical obstacles impeding installation instead configuration may unsupported due microsoft licensing restrictions decision focus testing support resources elsewhere especially production use legacy product fades program manager microsoft core virtualization team explains official support entails product positioned desktop use virtual pc provides official support different set operating systems server-oriented counterpart microsoft virtual server advanced hyper-v latter products support range server operating systems virtual pc 2007 supports one variety host another guest successor windows virtual pc supports none whereas virtual server hyper-v officially supported select linux guests since 2006 2008 respectively microsoft release virtual pc officially supported linux nonetheless number linux distributions run successfully virtual pc 2007 used virtual machine additions virtual server see lastly 64-bit host support introduced virtual pc 2007 release able virtualize 64-bit guest microsoft thus far reserved functionality hyper-v runs 64-bit x64 editions windows server 2008 windows server 2012 windows server 2012 r2 windows server 2016 windows 8/8.1 pro enterprise windows 10 pro enterprise education following table notes support refers official microsoft support described notes – details microsoft support notes – supported installations installing linux-based guest environment virtual pc possible redhat suse linux guests supported linux additions supported microsoft virtual server additions also work virtual pc linux distributions must installed text mode support microsoft virtual pc emulated graphics chip ubuntu 8.10 intrepid ibex must installed safemode require changes websites specialize listing operating systems run successfully virtual pc guests help users avoid issues installing linux distributions operating systems lacking official microsoft support microsoft announced august 7 2006 virtual pc mac would ported intel mac platform microsoft stated alternative solutions offered apple vendors combined fully packaged retail copy windows satisfy need similar products available announced time parallels desktop vmware fusion | [
2058,
3082,
4112,
9745,
9780,
7733,
8757,
5697,
582,
5702,
6730,
7248,
4695,
3167,
10338,
617,
8315,
636,
1150,
639,
641,
9353,
651,
6797,
4238,
10900,
2212,
6827,
7349,
2236,
4289,
10957,
6377,
8439,
5368,
5378,
4356,
11524,
6924,
782,
... | Test |
6,151 | 3 | AMD_K6:amd k6 k6 microprocessor launched amd 1997 main advantage particular microprocessor designed fit existing desktop designs pentium-branded cpus marketed product could perform well intel pentium ii equivalent significantly lower price k6 considerable impact pc market presented intel serious competition amd k6 superscalar p5 pentium-class microprocessor manufactured amd superseded k5 amd k6 based nx686 microprocessor nexgen designing acquired amd despite name implying design evolving k5 fact totally different design created nexgen team including chief processor architect greg favor adapted amd purchase k6 processor included feedback dynamic instruction reordering mechanism mmx instructions floating-point unit fpu also made pin-compatible intel pentium enabling used widely available socket 7 -based motherboards like amd k5 nx586 nx686 k6 translated x86 instructions fly dynamic buffered sequences micro-operations later variation k6 cpu k6-2 added floating-point-based simd instructions called 3dnow k6 originally launched april 1997 running speeds 166 200 mhz followed 233 mhz version later 1997 initially amd k6 processors used pentium ii-based performance rating pr2 designate speed pr2 rating dropped rated frequency processor real frequency release 266 mhz version chip second quarter 1998 amd able move 0.25-micrometre manufacturing process lower voltage higher multiplier k6-266 meant fully compatible socket 7 motherboards similar later k6-2 processors final iteration k6 design released may 1998 running 300 mhz | [
3586,
3459,
5380,
8322,
9092,
8327,
10375,
6924,
1677,
398,
5645,
8851,
7963,
1820,
4252,
2719,
6815,
5541,
11047,
2094,
5821,
8125,
6978,
7234,
3911,
11080,
2764,
5326,
473,
2791,
3175,
5225,
7913,
9707,
1260,
1005,
5356,
9964,
1776,
113... | None |
6,152 | 5 | KA9Q:ka9q ka9q also called ka9q nos simply nos popular early implementation tcp/ip associated protocols amateur packet radio systems smaller personal computers connected via serial lines named amateur radio callsign phil karn first wrote software cp/m system ported dos ibm pc ka9q code open-source many radio amateurs modified many different versions available time ka9q later maintained anthony frost callsign g8udv adam goodfellow ported acorn archimedes jonathan naylor g4klx 1995 standard access software provided british dial-up internet service provider demon internet modern operating systems provide built-in implementation tcp/ip protocol linux especially includes necessary kernel functions support utilities tcp/ip amateur radio systems well basic ax.25 net/rom functionality therefore nos regarded obsolete original developer still may uses embedded systems small linux ka9q also name ip-over-ip tunneling protocol | [
2306,
1030,
1192,
9868,
10862,
4335,
4409,
5531
] | Test |
6,153 | 7 | VMware:vmware vmware inc. publicly traded software company listed nyse stock ticker vmw dell technologies majority share holder vmware provides cloud computing virtualization software services one first commercially successful companies virtualize x86 architecture vmware desktop software runs microsoft windows linux macos enterprise software hypervisor servers vmware esxi bare-metal hypervisor runs directly server hardware without requiring additional underlying operating system 1998 vmware founded diane greene mendel rosenblum scott devine ellen wang edouard bugnion greene rosenblum married first met university california berkeley edouard bugnion remained chief architect cto vmware 2005 went found nuova systems part cisco first year vmware operated stealth mode roughly 20 employees end 1998 company launched officially early second year february 1999 demo conference organized chris shipley first product vmware workstation delivered may 1999 company entered server market 2001 vmware gsx server hosted vmware esx server hostless 2003 vmware launched vmware virtual center vmotion virtual smp technology 64-bit support introduced 2004 january 9 2004 terms definitive agreement announced december 15 2003 emc dell emc acquired company 625 million cash august 14 2007 emc sold 15 vmware public via initial public offering shares priced per share closed day july 8 2008 disappointing financial performance board directors fired vmware co-founder president ceo diane greene replaced paul maritz retired 14-year microsoft veteran heading emc cloud computing business unit greene ceo since company founding ten years earlier september 10 2008 mendel rosenblum company co-founder chief scientist husband diane greene resigned september 16 2008 vmware announced collaboration cisco systems one result cisco nexus 1000v distributed virtual software switch integrated option vmware infrastructure april 2011 emc transferred control mozy backup service vmware april 12 2011 vmware released open-source platform-as-a-service system called cloud foundry well hosted version service supported application deployment java ruby rails sinatra node.js scala well database support mysql mongodb redis postgres rabbitmq march 2013 vmware announced corporate spin-off pivotal software general electric making investment company vmware application- developer-oriented products including spring tc server cloud foundry rabbitmq gemfire sqlfire transferred organization may 2013 vmware launched iaas service vcloud hybrid service new palo alto headquarters vcloud hybrid service rebranded vcloud air subsequently sold cloud provider ovh announcing early access program las vegas data center service designed function extension customer existing vsphere installations full compatibility existing virtual machines virtualized vmware software tightly integrated networking service based vcloud director 5.1/vsphere 5.1 september 2013 vmworld san francisco vmware announced general availability vcloud hybrid service expansion sterling virginia santa clara california dallas texas service beta uk announced acquisition desktone october 2013 january 2016 anticipation dell acquisition emc vmware announced restructuring reduce 800 positions executives resigned entire development team behind vmware workstation fusion disbanded us developers immediately fired april 24 2016 maintenance release 12.1.1 released september 8 2016 vmware announced release workstation 12.5 fusion 8.5 free upgrade supporting windows 10 windows server 2016 april 2016 vmware president coo carl eschenbach left vmware join sequoia capital martin casado vmware general manager networking security business left join andreessen horowitz analysts commented cultures dell emc emc vmware different said heard impending corporate cultural collisions potentially radical product overlap pruning would cause many emc vmware personnel leave vmware ceo pat gelsinger following rumours categorically denied would leave august 2016 vmware introduced vmware cloud provider website new branch role funneling cloud related information central source cloud provider technology content thanks “ services first ” approach cloud providers find differentiated monetizable services deliver leveraging vmware ’ platform latest case studies demos blogs architecture toolkits vmware available one place mozy transferred dell 2016 merger dell emc april 2017 according glassdoor vmware ranked 3rd list highest paying companies united states q2 2017 vmware sold vcloud air french cloud service provider ovh march 2015 software freedom conservancy announced funding litigation christoph hellwig hamburg germany vmware alleged violation copyrights esxi product sfc claimed vmware using linux kernel busybox without respecting terms gpl copyright license vmware told journalists believed case without merit expressed disappointment conservancy resorted litigation lawsuit dismissed court july 2016 hellwig announced would file appeal appeal decided february 2019 dismissed german court basis meeting procedural requirements burden proof plaintiff vmware notable products hypervisors vmware became well known first type 2 hypervisor known gsx product since evolved two hypervisor products lines vmware type 1 hypervisors running directly hardware hosted type 2 hypervisors vmware software provides completely virtualized set hardware guest operating system vmware software virtualizes hardware video adapter network adapter hard disk adapters host provides pass-through drivers guest usb serial parallel devices way vmware virtual machines become highly portable computers every host looks nearly identical guest practice system administrator pause operations virtual machine guest move copy guest another physical computer resume execution exactly point suspension alternatively enterprise servers feature called vmotion allows migration operational guest virtual machines similar separate hardware hosts sharing storage vmotion storage separate storage used transitions completely transparent users virtual machine time migrated vmware workstation server esx take optimized path running target operating systems host emulators bochs simulate function cpu instruction target machine one-by-one dynamic recompilation compiles blocks machine-instructions first time execute uses translated code directly code runs subsequently microsoft virtual pc macos takes approach vmware software emulate instruction set different hardware physically present significantly boosts performance cause problems moving virtual machine guests hardware hosts using different instruction sets found 64-bit intel amd cpus hardware hosts differing number cpus software cpu agnostic usually survive transition unless agnostic forking startup case software guest os must stopped moving restarted move vmware products predate virtualization extensions x86 instruction set require virtualization-enabled processors newer processors hypervisor designed take advantage extensions however unlike many hypervisors vmware still supports older processors cases uses cpu run code directly whenever possible example running user-mode virtual 8086 mode code x86 direct execution operate kernel-level real-mode code vmware products use binary translation bt re-write code dynamically translated code gets stored spare memory typically end address space segmentation mechanisms protect make invisible reasons vmware operates dramatically faster emulators running 80 speed virtual guest operating system would run directly hardware one study vmware claims slowdown native ranging 0–6 percent vmware esx server vmware approach avoids difficulties virtualization x86-based platforms virtual machines may deal offending instructions replacing simply running kernel code user mode replacing instructions runs risk code may fail find expected content reads one protect code reading allowing normal execution replacing place becomes complicated running code unmodified user mode also fail instructions read machine state cause exception betray real state program certain instructions silently change behavior user mode one must always rewrite performing simulation current program counter original location necessary notably remapping hardware code breakpoints although vmware virtual machines run user mode vmware workstation requires installation various device drivers host operating system notably dynamically switch global descriptor table gdt interrupt descriptor table idt vmware product line also run different operating systems dual-boot system simultaneously booting one partition natively using guest within vmware workstation vmware esxi enterprise software product deliver greater performance freeware vmware server due lower system computational overhead vmware esxi bare-metal product runs directly server hardware allowing virtual servers also use hardware less directly addition vmware esxi integrates vmware vcenter offers extra services vmware workspace portal self-service app store workspace management vmware storage availability products composed two primary offerings vmware nsx vmware network virtualization product marketed using term software-defined data center sddc technology included acquired 2012 purchase nicira workspace one allows mobile users access apps data vix virtual infrastructure extension api allows automated scripted management computer virtualized using either vmware vsphere workstation player fusion products vix provides bindings programming languages c perl visual basic vbscript c | [
9218,
8201,
9739,
4112,
18,
1560,
10782,
10788,
5677,
6703,
54,
5174,
5689,
2107,
10302,
3654,
6730,
10827,
1102,
10322,
4695,
5210,
4699,
10843,
94,
5217,
4194,
1638,
2154,
9844,
3705,
9337,
127,
4235,
6797,
3214,
11410,
9365,
4761,
2717... | Test |
6,154 | 9 | PhpStorm:phpstorm jetbrains phpstorm commercial cross-platform ide integrated development environment php built jetbrains intellij idea platform phpstorm provides editor php html javascript on-the-fly code analysis error prevention automated refactorings php javascript code phpstorm code completion supports php 5.3 5.4 5.5 5.6 7.0 7.1 7.2 modern legacy projects including generators coroutines finally keyword list foreach namespaces closures traits short array syntax includes full-fledged sql editor editable query results phpstorm built intellij idea written java users extend ide installing plugins created intellij platform write plugins features available webstorm included phpstorm adds support php databases webstorm ships pre-installed javascript plugins node.js ultimate edition jetbrains polyglot ide intellij idea supports functionality phpstorm plugins november 2015 jetbrains switched licensing phpstorm subscription basis annual subscriptions monthly subscriptions maintained 12 consecutive months also receive perpetual fallback license major version available time purchase phpstorm available individual developers business organizations additional discounted complementary licenses available startups students teachers non-commercial open source projects complementary licenses require approval include perpetual fallback clause i.e expire | [
1034,
9738,
5663,
6176,
5677,
4171,
6231,
11357,
8289,
10341,
7785,
5747,
7293,
1668,
6791,
6797,
8854,
10910,
1698,
10413,
7346,
1203,
7355,
190,
5311,
7871,
6338,
7364,
5833,
8923,
10478,
10991,
11503,
4853,
6910,
1802,
4885,
2338,
2348,
... | Validation |
6,155 | 2 | MS/8:ms/8 ms/8 rl monitor system discontinued operating system developed digital equipment corporation pdp-8 1966 richard f. lary submitted decus 1970 disk oriented system faster predecessor 4k disk monitor system tricks make run quickly dectape based systems ms/8 since replaced p s/8 cos-310 | [
2179,
10499,
10883,
394,
3978,
1804,
6797,
273,
7057,
6675,
7187,
11539,
9366,
11667,
6296,
25,
10776,
8092,
4637,
7325,
8732,
9887,
10016,
9762,
421,
5158,
10235,
2345,
8876,
7983,
3248,
6448,
7217,
11184,
6837,
823,
9784,
4409,
10809,
6... | Test |
6,156 | 1 | Cockroach_Labs:cockroach labs cockroach labs computer software company develops commercial database management systems best known cockroachdb compared google spanner cockroachdb project designed store copies data multiple locations order deliver speed access described scalable consistently-replicated transactional datastore cockroach labs founded 2015 ex-google employees spencer kimball peter mattis ben darnell prior cockroach labs kimball mattis key members google file system team darnell key member google reader team google three previously used bigtable acquainted successor spanner leaving google wanted design build something similar companies outside google june 2015 company nine cockroachdb engineers spencer kimball wrote first iteration design january 2014 began open-source project github february 2014 allowing outside access contributions attracted community experienced contributors co-founders actively supporting project conferences networking meet-ups collaborations github earned open source rookie year title awarded black duck software open-source projects june 2015 company closed 6.25 million funding benchmark sequoia google ventures firstmark capital benchmark general partner peter fenton named company board directors additional investors included hortonworks chief executive rob bearden coreos ceo alex polvi cloudera co-founder jeff hammerbacher june 2019 cockroach labs announced cockroachdb would change license free software license apache license 2.0 proprietary license cockroach labs raised 55 million series c round august 2019 led altimeter capital database scalable single instance scale single laptop thousands servers cockroachdb designed run cloud resilient failures result database described almost impossible take even multiple servers entire datacenter go offline cockroachdb would keep services online | [
9344,
7841,
7816,
5034,
3795,
5332,
10389,
11221,
7802
] | Test |
6,157 | 2 | Wallace_v._International_Business_Machines_Corp.:wallace v. international business machines corp. wallace v. international business machines corp. 467 f.3d 1104 7th cir 2006 significant case development free software case decided court appeals seventh circuit united states law gnu general public license gpl contravene federal antitrust laws daniel wallace united states citizen sued free software foundation fsf price fixing later lawsuit unsuccessfully sued ibm novell red hat wallace claimed free linux prevented making profit selling operating system 2005 daniel wallace filed suit fsf u.s. district court southern district indiana stating gpl requiring copies computer software licensed made available freely possibly even cost tantamount price fixing november 2005 case dismissed without prejudice wallace filed multiple amended complaints effort satisfy requirements antitrust allegation fourth final amended complaint dismissed march 20 2006 judge john daniel tinder wallace ordered pay fsf costs decision grant motion dismiss court ruled wallace failed allege antitrust injury claim could based since wallace obligated claim injured also market court instead found court also noted prior cases established sherman act enacted assure customers benefits price competition emphasized act primary purpose protecting economic freedom participants relevant market decision thus supports right authors content creators offer creations free charge 2006 daniel wallace filed lawsuit software companies ibm novell red hat profit distribution open-source software specifically gnu/linux operating system wallace allegation software companies engaging anticompetitive price fixing may 16 2006 judge richard l. young dismissed case prejudice wallace later filed appeal seventh circuit appeal court case heard de novo front three-judge panel led frank easterbrook lost appeal judge citing number problems complaint | [
6311,
5450,
8792,
6157,
5006,
7983,
9455,
10040,
9397,
823,
3960,
3323
] | Test |
6,158 | 2 | Macpup:macpup macpup operating system based puppy linux puppy normal jwm window manager available also includes enlightenment wm users quickly switch window managers without rebooting macpup enlightenment interface installed features mac os x-like dockbar many enlightenment themes available macpup comes firefox web browser like parent macpup run ram live .iso uses 184mb ram | [
5067,
5356,
9964,
499,
5363,
5397,
5078,
823,
6393,
7483
] | Test |
6,159 | 4 | Dynamic_secrets:dynamic secrets dynamic secrets novel key management scheme secure communications proposed sheng xiao weibo gong towsley first academic publication nominated infocom 2010 best paper award later monograph published springer extend scheme framework dynamic secrets applied bi-directional communication systems single-directional communication systems improve communication security three main benefits 1. encryption authentication keys rapidly automatically updated pair communication devices 2. key update process binds communication process incurs negligible computing bandwidth cost 3 use cloned key either authentication encrypted communication guaranteed detected detection false alarms cost computing networking resources dynamic secrets automatically break secure communication clone key legitimate key co-exist however order find attacker takes actions consumes computing power network bandwidth | [
5433,
939,
2932,
3629
] | Test |
6,160 | 9 | Assignment_(computer_science):assignment computer science computer programming assignment statement sets and/or re-sets value stored storage location denoted variable name words copies value variable imperative programming languages assignment statement expression fundamental construct today commonly used notation basic operation come codice_1 originally superplan 1949–51 popularized fortran 1957 c followed codice_2 originally algol 1958 popularised pascal although many notations use languages symbol used regarded operator meaning assignment statement whole returns value others define assignment statement meaning used expression assignments typically allow variable hold different values different times life-span scope however languages primarily strictly functional allow kind destructive reassignment might imply changes non-local state purpose enforce referential transparency i.e functions depend state variable produce results given set parametric inputs point time modern programs languages also often use similar strategies although less strict certain parts order reduce complexity normally conjunction complementing methodologies data structuring structured programming object orientation assignment operation process imperative programming different values associated particular variable name time passes program model operates changing state using successive assignment statements primitives imperative programming languages rely assignment iteration lowest level assignment implemented using machine operations codice_3 codice_4 variables containers values possible put value variable later replace new one assignment operation modifies current state executing program consequently assignment dependent concept variables assignment example assuming codice_7 numeric variable assignment codice_8 means content variable codice_7 doubled execution statement example segment c code sample variable codice_10 first declared int assigned value 10 notice declaration assignment occur statement second line codice_11 declared without assignment third line codice_10 reassigned value 23 finally codice_11 assigned value 32.4 assignment operation necessary value codice_5 well-defined valid rvalue codice_6 represents modifiable entity valid modifiable non-const lvalue languages typically dynamic ones necessary declare variable prior assigning value languages variable automatically declared first time assigned scope declared varying language assignment changes existing value e.g codice_16 disallowed purely functional languages functional programming assignment discouraged favor single assignment also called initialization single assignment example name binding differs assignment described article done usually variable created subsequent reassignment allowed evaluation expression side effect change observable state machine produces values input imperative assignment introduce side effects destroying making old value unavailable substituting new one referred destructive assignment reason lisp functional programming similar destructive updating single assignment form assignment available purely functional languages haskell variables sense imperative programming languages rather named constant values possibly compound nature elements progressively defined on-demand purely functional languages provide opportunity computation performed parallel avoiding von neumann bottleneck sequential one step time execution since values independent impure functional languages provide single assignment well true assignment though true assignment typically used less frequency imperative programming languages example scheme single assignment codice_17 true assignment codice_18 used variables specialized primitives provided destructive update inside lists vectors strings etc ocaml single assignment allowed variables via codice_19 syntax however destructive update used elements arrays strings separate codice_20 operator well fields records objects explicitly declared mutable meaning capable changed initial declaration programmer functional programming languages use single assignment include clojure data structures vars erlang accepts multiple assignment values equal contrast haskell f haskell lava ocaml oz dataflow variables cells racket data structures like lists symbols sasl scala vals sisal standard ml non-backtracking prolog code considered explicit single-assignment explicit sense named variables explicitly unassigned state set exactly haskell contrast unassigned variables every variable thought implicitly set value rather computational object produce value demand created programming languages assignment statement returns value others expression-oriented programming languages example c assignment statement returns assigned value allowing idioms codice_21 assignment statement codice_22 returns value codice_7 assigned codice_10 statement codice_25 return value function used control loop assigning value variable programming languages scheme example return value assignment undefined idioms invalid haskell variable assignment operations similar assignment like assigning field array field mutable data structure usually evaluate unit type represented codice_26 type one possible value therefore containing information typically type expression evaluated purely side effects certain use patterns common thus often special syntax support primarily syntactic sugar reduce redundancy source code also assists readers code understanding programmer intent provides compiler clue possible optimization case assigned value depends previous one common many imperative languages notably c majority descendants provide special operators called augmented assignment like codice_27 codice_28 instead written codice_29 beyond syntactic sugar assists task compiler making clear in-place modification variable codice_7 possible statement like codice_31 called chained assignment value codice_32 assigned multiple variables codice_33 codice_11 chained assignments often used initialize multiple variables codice_35 programming languages support chained assignment chained assignments equivalent sequence assignments evaluation strategy differs languages simple chained assignments like initializing multiple variables evaluation strategy matter targets l-values assignment connected way evaluation strategy affects result programming languages c example chained assignments supported assignments expressions values case chain assignment implemented right-associative assignment assignments happen right-to-left example codice_36 equivalent codice_37 c++ also available values class types declaring appropriate return type assignment operator python assignment statements expressions thus value instead chained assignments series statements multiple targets single expression assignments executed left-to-right codice_36 evaluates expression codice_39 assigns result leftmost target codice_40 assigns result next target codice_41 using new value codice_40 essentially equivalent codice_43 though actual variable produced temporary value programming languages apl common lisp go javascript since 1.7 php maple lua occam 2 perl python rebol ruby windows powershell allow several variables assigned parallel syntax like simultaneously assigns 0 codice_7 1 codice_45 often known parallel assignment introduced cpl 1963 name simultaneous assignment sometimes called multiple assignment though confusing used single assignment opposites right-hand side assignment single variable e.g array structure feature called unpacking destructuring assignment list unpacked 0 assigned codice_7 1 codice_45 furthermore swaps values codice_7 codice_45 languages without parallel assignment would written use temporary variable since codice_50 leaves codice_7 codice_45 original value codice_45 languages go python combine parallel assignment tuples automatic allow multiple return values single function python example provides alternative use output parameters returning multiple values function dates clu 1974 clu helped popularize parallel assignment generally c c++ comma operator similar parallel assignment allowing multiple assignments occur within single statement writing codice_54 instead codice_55 primarily used loops replaced parallel assignment languages go however c++ code ensure perfect simultaneity since right side following code codice_56 evaluated left side languages python codice_57 assign two variables concurrently using initial value compute new b use equals sign codice_58 assignment operator frequently criticized due conflict equals comparison equality results confusion novices writing code confusion even experienced programmers reading code use equals assignment dates back heinz rutishauser language superplan designed 1949 1951 particularly popularized fortran beginning programmers sometimes confuse assignment relational operator equality means equality mathematics used assignment many languages assignment alters value variable equality testing tests whether two expressions value languages basic single equals sign codice_59 used assignment operator equality relational operator context determining meant languages use different symbols two operators example similarity two symbols lead errors programmer forgets form codice_58 codice_67 codice_68 appropriate mistypes codice_58 codice_67 intended common programming problem languages c including one famous attempt backdoor linux kernel assignment operator also returns value assigned way function returns value validly nested inside expressions intention compare two values codice_71 statement instance assignment quite likely return value interpretable boolean true case codice_72 clause executed leading program behave unexpectedly language processors gcc detect situations warn programmer potential error two common representations copying assignment equals sign codice_58 colon-equals codice_68 forms may semantically denote either assignment statement assignment operator also value depending language and/or usage possibilities include left arrow keyword though rarer variants mathematical pseudo code assignments generally depicted left-arrow platforms put expression left variable right expression-oriented languages lisp tcl uniformly use prefix postfix syntax statements including assignment | [
512,
2062,
9245,
8225,
5677,
1591,
2617,
3642,
8262,
1613,
7259,
7775,
8289,
2666,
2670,
623,
8822,
6775,
3705,
5760,
9345,
1672,
655,
5783,
3736,
4777,
6313,
9385,
5806,
692,
3765,
3767,
9915,
8382,
8385,
10435,
5833,
8397,
7894,
7386,
... | Test |
6,161 | 7 | Gremlin_(programming_language):gremlin programming language gremlin graph traversal language virtual machine developed apache tinkerpop apache software foundation gremlin works oltp-based graph databases well olap-based graph processors gremlin automata functional language foundation enable gremlin naturally support imperative declarative querying host language agnosticism user-defined domain specific languages extensible compiler/optimizer single- multi-machine execution models hybrid depth- breadth-first evaluation well turing completeness explanatory analogy apache tinkerpop gremlin graph databases jdbc sql relational databases likewise gremlin traversal machine graph computing java virtual machine general purpose computing gremlin apache2-licensed graph traversal language used graph system vendors typically two types graph system vendors oltp graph databases olap graph processors table outlines graph vendors support gremlin following examples gremlin queries responses gremlin-groovy environment relative graph representation movielens dataset dataset includes users rate movies users one occupation movie one categories associated movielens graph schema detailed gremlin supports declarative graph pattern matching similar sparql instance following query uses gremlin match -step gremlin virtual machine composed instruction set well execution engine analogy drawn gremlin java following traversal gremlin traversal gremlin-java8 dialect gremlin language i.e fluent-style expressing graph traversal represented host language supports function composition function nesting due simple requirement exists various gremlin dialects including gremlin-groovy gremlin-scala gremlin-clojure etc gremlin-java8 traversal ultimately compiled step sequence called traversal string representation traversal provided steps primitives gremlin graph traversal machine parameterized instructions machine ultimately executes gremlin instruction set approximately 30 steps steps sufficient provide general purpose computing typically required express common motifs graph traversal query given gremlin language instruction set virtual machine possible design another traversal language compiles gremlin traversal machine analogous scala compiles jvm instance popular sparql graph pattern match language compiled execute gremlin machine following sparql query would compile gremlin-java8 sparql query would represented compile identical gremlin step sequence i.e traversal gremlin graph traversal machine execute single machine across multi-machine compute cluster execution agnosticism allows gremlin run graph databases oltp graph processors olap | [
5632,
8451,
10377,
7567,
1296,
1047,
151,
1913,
1306,
6555,
2972,
8217,
8860,
9631,
11161,
3877,
10661,
5031,
11303,
5677,
10413,
7983,
7159,
4919,
5047,
4538,
1851,
6074,
7485,
7742,
9789,
7233,
6338,
1222,
1991,
4294,
7750,
5066,
8139,
... | Test |
6,162 | 4 | Computer_security_policy:computer security policy computer security policy defines goals elements organization computer systems definition highly formal informal security policies enforced organizational policies security mechanisms technical implementation defines whether computer system secure insecure formal policy models categorized core security principles confidentiality integrity availability example bell-la padula model confidentiality policy model whereas biba model integrity policy model system regarded finite-state automaton set transitions operations change system state security policy seen statement partitions states authorized unauthorized ones given simple definition one define secure system one starts authorized state never enter unauthorized state represent concrete policy especially automated enforcement language representation needed exist lot application specific languages closely coupled security mechanisms enforce policy application compared abstract policy languages e.g domain type enforcement-language independent concrete mechanism | [
3616,
3969,
8259,
8998,
4583,
1961,
4554,
10968,
1364,
1013,
3924,
6360,
3417
] | Test |
6,163 | 9 | FX-87:fx-87 fx-87 polymorphic typed functional language based system static program analysis every expression two static properties type effect study done mit fx-87 yields similar performance results functional languages programs contain side effects fibonacci factorial fx-87 yield great performance increase matching dna sequences kfx kernel language fx-87 described 'polymorphic effect systems j.m lucassen et al. proceedings 15th annual acm conference popl acm 1988 pp 47–57 | [
10571,
8262
] | Test |
6,164 | 4 | Francis_Raven:francis raven francis raven april 26 1914 december 1983 american cryptologist early employee national security agency helped crack many codes assist united states world war ii also helped nsa training program creating two cryptology courses graduated yale university 1934 joined united states navy reserve officer assigned naval security group commission reactivated 1940 rejoined nsg working japanese problems agnes driscoll brief period working german ciphers returned japanese issues part group systematically solved many low level codes starting 1942 important source cribs used working jn-25 fleet code also worked jade coral machines successfully cracked war stayed civilian employee nsg joining armed forces security agency 1946 moving nsa formation 1952 1956 held series executive posts within agency culminating appointment chief office nsa training program played major part development two cryptology courses efforts several civilian awards retirement established firm genealogical research active death 1983 | [
6755,
9156,
7887
] | None |
6,165 | 3 | PowerBook_100:powerbook 100 powerbook 100 portable subnotebook personal computer designed manufactured sony apple computer introduced october 21 1991 comdex computer expo las vegas nevada priced us 2,300 powerbook 100 low-end model first three simultaneously released powerbooks cpu overall speed closely resembled predecessor macintosh portable motorola 68000 16-megahertz mhz processor 2-8 megabytes mb memory monochrome backlit liquid crystal display lcd 640 × 400 pixel resolution system 7.0.1 operating system built-in floppy disk drive noted unique compact design placed trackball pointing device front keyboard ease use apple then-chief executive officer ceo john sculley started powerbook project 1990 allocating 1 million marketing despite small marketing budget new powerbook line success generating 1 billion revenue apple first year sony designed manufactured powerbook 100 collaboration apple industrial design group apple internal design team discontinued september 3 1992 superseded powerbook 145 powerbook duo series since praised several times design pc world named powerbook 100 tenth-greatest pc time 2006 us magazine mobile pc chose powerbook 100 greatest gadget time 2005 1990 john sculley ceo apple oversaw product development personally ensure apple released new computers market quickly new strategy increase market share lowering prices releasing hit products strategy contributed commercial success low-end macintosh classic macintosh lc desktop computers released apple 1990 sculley wanted replicate success products apple new powerbook line sculley began project 1990 wanted powerbook released within one year project three managers john medica managed engineering new laptop randy battat vice president product marketing neil selvin headed marketing effort 1991 two leaders laptop computer industry toshiba compaq introduced models weighing less medica battat selvin deliberately designed powerbook weigh less competitors sculley allocated 1 million marketing budget powerbook product line contrast 25 million used market macintosh classic medica battat selvin used money produce air television commercial viewers would remember advertising agency chiat/day filmed retired los angeles lakers basketball star kareem abdul-jabbar sitting uncomfortably small airline coach seat yet typing comfortably powerbook ad caption read least hands comfortable apple unveiled powerbook 100 october 21 1991 comdex computer expo las vegas alongside two models powerbook 140 powerbook 170 advertisement product successful apple projected us sales 200,000 powerbooks first year peak demand first three months release january 1992 apple sold 100,000 powerbooks time short supply apple soon solved supply problems proceeds powerbook sales reached 1 billion first year launch apple surpassed toshiba compaq market leader worldwide share portable computer shipments powerbook 100 140 170 contributed greatly apple financial success 1992 end financial year apple announced highest figures yet 7.1 billion revenues increase global market share 8 8.5 highest four years however initial popularity powerbook 100 last sales decreased december 1991 140 170 models become popular customers willing pay built-in floppy disk drive second serial port powerbook 100 lacked august 10 1992 apple quietly dropped powerbook 100 price list continued sell existing stock dealers alternative discount consumer-oriented stores price club stores 4mb ram/40mb hard drive configuration floppy drive sold less 1,000 1,500 less similar 2mb/20mb configuration original list price september 17 1992 apple recalled 60,000 powerbook 100s potential safety problem electrical short discovered could melt small hole casing occurred three 60,000 notebooks manufactured october 1991 march 1992 day recall apple shares closed 47 1.25 analysts discounted recall importance addition original power supplies problems insulation cracks could cause short fuse motherboard computer prone cracks power adapter socket motherboard required 400 replacement motherboard warranty expired powerbook 100 internal components based predecessor macintosh portable included motorola 68hc000 16 mhz processor 2 mb memory floppy disk drive cost approximately 2,300 external floppy disk drive available 279 dimensions powerbook 100 improvement portable deep wide high compared portable deep wide high another significant difference less expensive passive matrix display used instead sharper active matrix used portable 170 powerbook 100 included system 7.0.1 operating system standard support versions system 7.5.5 apple however released system 6.0.8l allowed powerbook 100 run system 6 could also used earlier system 6 versions although apple officially support powerbook 100 one external serial port designed use printer compatible rs-422 device first macintosh omit external modem port instead offering optional built-in 2400 baud modem communications result first time user could print directly access appletalk faster external modem simultaneously devices advanced midi interfaces could used required dedicated use ports third-party serial modem port could however installed internal modem slot consumers needed traditional functions computer use contents memory preserved long main lead-acid battery remained charged powerbook 100 power manager integrated circuit usually placed logic board powerbook responsible power management computer identical macintosh portable controlled display backlight hard drive spin-down sleep wake battery charging trackball control input/output i/o 100 add new feature 3.5 v batteries backed permanent expansion random access memory ram powerbook 100 battery replaced 100 otherwise temporarily removed power sources made perfect candidate use apple ram disk help increase battery life accessing hard disk less frequently since 100 powerbook maintained contents ram shutdown order reduce startup time powerbook 100 first powerbook incorporate scsi disk mode allowed used external hard disk desktop macintosh provided convenient method software installed onto powerbook transferred desktop without need 100 optional floppy disk drive specialized scsi cable unique connector required however use scsi device powerbook series second dedicated cable required scsi disk mode feature unique 100 apple introduced new powerbooks year later two versions powerbook 100 qwerty layout keyboard domestic us version 63 keys international iso version 64 keys caps lock key powerbook 100 locking position lighted indicator status compensate system 7 operating system software includes extension file causes icon international caps lock symbol ⇪ appear upper right-hand corner menu bar caps lock active internals powerbook 100 basis apple wizzy active lifestyle telephone prototype powerbook 140 170 designed 100 apple industrial design group march 1990-february 1991 100 styling based computers represents first improvements powerbook line apple benefited lessons learned developing powerful models enclosure 100 designed september december 1990 retained design elements variation snow white design language apple using since 1984 specifically raised ridges spaced apart intended tie existing product line apple approached sony late 1989 enough engineers handle number new products planned delivery 1991 using basic blueprint apple including list chips components portable architecture 100 miniaturized manufactured sony san diego california japan sony engineers little experience building personal computers nonetheless completed apple smallest lightest machine 13 months cancelling projects giving powerbook 100 top priority sony president norio ohga gave project manager kihey yamamoto permission recruit engineers sony division robert brunner apple head industrial design time led design team developed laptop including trackball granite color brunner said designed powerbook would easy use carry regular book dark granite grey color set apart notebook computers time also apple products traditionally beige platinum grey trackball another new design element placed middle computer allowing powerbook easily operated left- right-handed users designers trying create fashion statement overall design laptop felt made personal accessory like wallet briefcase brunner said says something identity person carrying crystal waters home office computing praised powerbook 100 unique effective design disappointed internal modem receive faxes 100 monitor port low-capacity 20 mb hard drive also criticized user core applications installed little room left optional programs documents waters concluded used 100 constantly past weeks know would n't feel cheated buying 40mb hard-disk drive option pc week benchmarked powerbook 100 measuring predecessor macintosh portable powerbook 100 took 5.3 seconds open microsoft word document 2.5 seconds save portable took 5.4 2.6 seconds respectively pc week tested battery life delivered 3 hours 47 minutes use byte magazine review concluded powerbook 100 recommended word processing communications tasks higher-end products offer enough power complex reports large spreadsheets professional graphics macweek described ideal writers others tight budget powerbook 100 continues receive recognition press pc world named powerbook 100 10th-greatest pc time 2006 2005 us magazine mobile pc chose powerbook 100 greatest gadget time ahead sony walkman atari 2600 powerbook 100 received multiple awards design including 1999 idsa silver design decade award form magazine 1993 designer design awards 1992 isda gold industrial design excellence award 1992 appliance manufacturer excellence design award industry forum design 10 best hannover fair award | [
7697,
4114,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
1090,
4180,
10838,
10840,
9312,
1121,
7269,
8806,
6258,
10357,
4220,
10365,
10878,
6783,
4741,
8842,
6283,
7824,
147,
7830,
6807,
4258,
7842,
7844,
7869,
8893,
8896,
4807,
... | None |
6,166 | 1 | LibreOffice_Base:libreoffice base libreoffice base free open-source relational database management system part libreoffice office suite libreoffice base built fork openoffice.org first released version 3.4.0.1 october 4 2011 similarly packages libreoffice suite base supported across multiple platforms including microsoft windows macos linux base recognized cross-platform compatibility relative microsoft access developed exclusively windows libreoffice base designed allow users easily create access modify view databases data done providing users graphical user interface allows users work four main tools tables queries forms reports base includes software wizards assist users various aspects program base able work embedded external database files embedded databases stored single file using c++ based firebird java-based hsqldb storage engine connecting external databases base acts graphical user interface front-end facilitate interactions various database systems including microsoft access databases jet odbc/jdbc data sources mysql mariadb postgresql base described unusual project niche database management system software tends toward proprietary software designed enterprise users proprietary database management software costs described reason use base small businesses work ongoing transition embedded storage engine hsqldb firebird sql back-end firebird included libreoffice experimental option since libreoffice 4.2 august 2018 document foundation announced release libreoffice version 6.1 experimental mode used embedded firebird engine support fully available old hsqldb engine deprecated—although still available—and replaced firebird default option february 2019 document foundation released libreoffice version 6.2 embedded firebird engine support moved experimental mode operational firebird migration assistant create backup copy content xml document migration process | [
7523,
8683,
6797,
7022,
7983,
9389,
9455,
8539,
10737,
823,
5401,
987,
9471
] | Test |
6,167 | 4 | Killer_poke:killer poke computer jargon killer poke method inducing physical hardware damage machine peripherals insertion invalid values via example basic poke command memory-mapped control register term typically used describe family fairly well known tricks overload analog electronics crt monitors computers lacking hardware sanity checking notable examples ibm portable commodore pet pet-specific killer poke connected architecture machine video rasterizer circuits early pets writing certain value memory address certain i/o register codice_1 made machine able display text screen much faster pet range revamped updated hardware discovered performing old trick new hardware led strange behavior new video chip could possibly damage pet integrated crt monitor commodore 64 optional external 5-1/4 floppy drive commodore 1541 contained 6502 microprocessor used run commodore dos also manage drive mechanism drives stored data 40 tracks 0–39 stepper motor could manually controlled basic print -ing memory-write commands drive correspond poke command basic write drive internal memory i/o registers computer drive either end range track 0 track 39 commanded continue moving software firmware method prevent drive damage continued knocking drive head stop would throw mechanism alignment problem exacerbated copy protection techniques used non-standard disk formats unusual track counts commodore 1571 optical head stop instead mechanical one trs-80 model iii ability switch 32-character-wide display 64-character display actuated relay video hardware accomplished writing specific memory-mapped control register programs repeatedly switched 32- 64-character modes high speed either purpose accidentally could permanently damage video hardware single killer poke demonstrates software failure mode could permanently damage hardware trs-80 color computer ibm pc ibm pcjr nascom msx amstrad cpc bbc micro acorn computers contained built-in relay controlling external tape recorder toggling motor control relay tight loop would reduce relay longevity floppy drive commodore amiga personal computer could made produce noises various pitches making drive heads move back forth program existed could play el cóndor pasa less correctly amiga floppy drive sounds relied head assembly hitting stop gradually sent head alignment certain models lg cd-rom drives specific firmware used abnormal command update firmware clear buffer command usually used cd-rw drives linux uses command tell difference cd-rom cd-rw drives cd-rom drives dependably return error unsupported cd-rw command faulty drives interpreted update firmware causing stop working casual parlance bricked systemd mounts variables used unified extensible firmware interface linux system sysfs writable root user system result possible root user system completely brick system non-conforming uefi implementation specifically msi laptops using codice_2 command delete codice_3 directory recursively delete root directory game boy lcd screen turned game software outside vertical blanking interval damage hardware | [
3843,
9006,
5744,
2226,
9972,
823,
4764
] | Validation |
6,168 | 9 | WBEM_Services_Specification:wbem services specification jsr 48 java wbem api specification java specification request developed java community process specifies java language binding dmtf common information model/web-based enterprise management standards jsr 48 expert group completed public review 2006 way create technology compatibility kit order finalize standard api regarded stable jsr 48 requires java platform standard edition java se formerly j2se 7 higher ws jsr-48 api api composed 5 packages ws provides jsr-48 implementation part ws sdk pro ws also uses jsr-48 ws j wbem server wave wbem agent validation environment sblim cim client java adopted jsr 48 api stated openpegasus project use jsr 48 jmpi provider interface although status yet available | [
4960,
4771,
3562,
6511,
11344,
1079
] | Train |
6,169 | 4 | Zeroday_Emergency_Response_Team:zeroday emergency response team computer security zeroday emergency response team zert group volunteer security researchers produced emergency patches zero day attack vulnerabilities proprietary software came public notice late september 2006 patch month vector markup language vulnerability microsoft later producing patch older versions microsoft windows longer supported microsoft team included several members prominent antivirus network security work manifesto states zert members work together team release non-vendor patch so-called 0day zero-day exploit appears open poses serious risk public infrastructure internet purpose zert crack products rather uncrack averting security vulnerabilities widely exploited zert website updated since april 2007 group presumed inactive | [
3944,
6797,
2558
] | Test |
6,170 | 4 | Dirtbox_(cell_phone):dirtbox cell phone dirtbox drt box cell site simulator phone device mimicking cell phone tower creates signal strong enough cause nearby dormant mobile phones switch mounted aircraft used united states marshals service locate collect information cell phones believed connected criminal activity also used jam phones device name comes company developed digital receiver technology inc. drt owned boeing company boeing describes device hybrid jamming managed access detection similar device smaller range controversial stingray phone tracker widely used u.s. federal entities including federal bureau investigation fbi known drt first manufactured dirtbox company publicly advertise stating web site due sensitive nature work unable publicly advertise many products wall street journal wrote u.s marshals service program utilizing device fully matured 2007 boeing bought drt 2008 similar devices harris corporation like stingray phone tracker sold around time since 2008 airborne mounting kit cell phone surveillance said cost 9,000 june 11 2010 boeing company asked national telecommunications information administration advise united states congress ... communications act 1934 modified allow prison officials state local law enforcement use appropriate cell phone management suggested special weapons tactics swat teams paramilitary tactical units could use devices control wireless communications raids chicago police department bought dirtboxes eavesdrop demonstrators 2012 nato summit used 2014 black lives matter demonstrations 2015 became known los angeles police department purchased devices device described size mimic cell phone tower utilizes imsi-catcher international mobile subscriber identity technology phone services use identify individual subscribers emits pilot signal made appear stronger nearest cell tower causing phones within range broadcast imsi numbers electronic serial numbers esn encryption prevent process devices retrieve phone encryption session keys less one second success rates 50–75 real world conditions aircraft-mounted device locate phone within 10 feet another source claims triangulating flights dirtbox pinpoint phone location two feet dirtbox hybrid detection managed access jamming technologies according wall street journal people knowledge program determine phones belong suspects non-suspects cell phones interest belonging prison personnel commercial users area returned local network also selectively interrupt prevent calls certain phones used block unauthorized phone use prison inmates also retrieve data phones according boeing technology unobtrusive legitimate wireless communications bypasses phone companies operations u.s marshals service technical operations group used device fixed manned airplanes track fugitives said deploy targets requested parts justice program devices operated least five u.s. airports covering u.s. population unclear whether u.s marshals service requests court orders use devices marshals service used dirtboxes mexican drug war tracking fugitives coordination mexico naval infantry force flights guatemala dirtboxes also used united states special operations command drug enforcement administration fbi u.s. customs border protection according procurement documents u.s. navy bought dirtboxes mount drones naval air weapons station china lake research development facility southern california pentagon washington headquarters services bought dirtboxes 2011 based references drtbox nsa boundless informant screenshots leaked edward snowden dirtboxes probably used nsa 2013 french newspaper lemonde wrote thanks drtbox 62.5 million phone data collected france united states naval special warfare development group group one bought digital receiver technology 1301b system april 2 2007 25,000 according united states government procurement web site national telecommunications information administration ntia known dirtboxes since least 2010 2014 united states department justice refused confirm deny government agencies used official said would utterly false conflate law-enforcement program collection bulk telephone records national security agency federal communications commission responsible licensing regulating cell-service providers aware dirtbox activity prior wall street journal exposé january 2015 us senate judiciary committee asked department justice department homeland security law enforcement agencies used drtboxes specify legal processes policies existed protect privacy whose information collected privacy advocates including u.s. rep. alan grayson d-florida criticized dirtbox use violation fourth amendment united states constitution brian owsley law professor indiana institute technology former united states magistrate said use devices legally think government would need obtain search warrant based probable cause consistent fourth amendment guardian quoted michael german professor new york university law school former fbi agent saying overriding problem excessive secrecy hides government ’ ever-expanding surveillance programs public accountability senator edward markey d-massachusetts former senator al franken d-minnesota warned americans privacy rights must assured | [
3495,
1070,
7887,
3088,
8849
] | Validation |
6,171 | 2 | Internet_Explorer_10:internet explorer 10 internet explorer 10 ie10 tenth version internet explorer web browser released microsoft 2012 default browser windows 8 ie10 expands internet explorer 9 functionality regard css3 support hardware acceleration html5 support windows 8 divided two editions different user interfaces metro app support plug-ins traditional desktop application retains plug-in support 64-bit computers metro edition runs 64-bit mode default desktop edition run 64-bit mode enabling enhanced protected mode april 12 2011 microsoft released first ie10 platform preview runs windows 7 later second platform preview also available windows 7 later next four platform previews ran windows 8 first preview release came four weeks final release internet explorer 9 ie10 reached general availability september 4 2012 component windows server 2012 preview ie10 windows 7 made available download november 2012 february 26 2013 internet explorer 10 made available download windows 7 sp1 users january 12 2016 support ended ie10 windows operating systems capable running internet explorer 11 due new support policies dictating newest version ie available supported version windows supported ie10 supported windows server 2012 windows embedded 8 standard internet explorer 10 reach end support january 31 2020 ie 11 supported version internet explorer windows server 2012 windows embedded 8 standard ie 11 available piloting starting spring 2019 internet explorer 10 first announced april 12 2011 mix 11 conference las vegas conference microsoft showcased demo version internet explorer 10 along demo version windows 8 day platform preview internet explorer 10 released microsoft internet explorer test drive website supports windows 7 later platform previews support windows 8 internet explorer 10 platform preview 1 supports css3 grid layout css3 flexible box layout css3 multi-column layout css3 gradient full hardware acceleration reviewers responses release internet explorer 10 platform preview varied however noted soon 29 days release internet explorer 9 microsoft began talking next version reisinger eweek listed requested features next version michael muchmore pc magazine tested platform preview 1 performance html5 support microsoft third parties test suites test platform preview 1 performed better internet explorer 9 always better competing web browsers september 13 2011 microsoft released developer preview windows 8 general public came internet explorer developer preview first full browser incarnation internet explorer 10 although internet explorer last major web browser – among mozilla firefox google chrome opera safari – support spell checking first desktop browser windows support autocorrection internet explorer 10 released manufacturing along windows 8 windows server 2012 latter reached general availability september 4 2012 former reached general availability october 26 2012 preview internet explorer 10 windows 7 windows server 2008 r2 released november 13 2012 compatible previous versions windows windows 8 internet explorer 10 includes built-in adobe flash player microsoft adobe worked together ensure version adobe flash included internet explorer 10 drain battery impact performance negative ways metro version internet explorer features adobe flash included battery life performance security purposes features work well touch also removed metro version internet explorer however originally websites use adobe flash metro version internet explorer microsoft adobe maintain list approved websites reportedly video content games desktop version internet explorer 10 features adobe flash available march 12 2013 microsoft changed behavior allowing sites whitelist display flash content allowing sites display flash content except curated compatibility view cv list blacklist maintained microsoft desktop version internet explorer 10 available windows 7 windows 8 retains user interface ui internet explorer 9 minor refinements removing gradients metro version internet explorer 10 available windows 8 includes new ui hidden webpage viewed takes entire screen ui revealed right click mouse swipe top bottom edges touchscreen ui shown tabs listed top screen small preview webpage tab button add new tab placed top-right corner bottom screen address bar navigational buttons shown navigational buttons include back button navigate previous page refresh button reload active page pin button create new shortcut tile active page start screen wrench-shaped icon opens menu ie10 contains options view desktop opens current webpage desktop version internet explorer 10 find page find text string word phrase arbitrary set letters active page internet explorer 10 also introduces new feature called flip ahead works metro desktop versions internet explorer 10 allows users move articles span multiple pages well search results web pages next page similar button feature turned default user browsing history sent microsoft order provide feature according windows supersite microsoft said sites may need updated ensure work intended internet explorer 10 longer features supports following windows phone developer summit june 2012 joe belfiore announced windows phone 8 due towards end 2012 include mobile version internet explorer 10 offers four times faster javascript performance two times support html 5 features includes microsoft smartscreen supports touch html5 apps internet explorer 10 new user agent string following general format depending system different parts user string may change last token touch appears systems equipped touchscreen platform token may following | [
6657,
9736,
2579,
7708,
9757,
7713,
10791,
9770,
10282,
559,
4661,
3639,
10808,
64,
5707,
9808,
10834,
6231,
8281,
2139,
603,
6747,
9834,
1642,
9328,
115,
9843,
119,
4728,
637,
1664,
5765,
6797,
10910,
8351,
7340,
9908,
11449,
4797,
7364,... | None |
6,172 | 4 | NetTransformer:nettransformer nettransformer cross-platform network discovery program software created idea discovering set snmp queries ip networks state produce various data models use data models inputs transform network one state another per original phd author used nettransformer demonstrate network transformation isp network ipv4 ipv6 state transformation long lasting process typically driven strategy passes many states example initial state current state network services offered ipv4 long term goal network service ipv6 achieve isp pass many intermediate states depending transformation strategy network mapping perspective nettransformer generates 3 distinct data models software generating topology views network topology diff views network centric data model thus lot people use simply network mapping one important concepts network treated separate project since many kinds networks years appeared various kinds project types example free graph working kind graph using rest diff visualization capabilities software | [
4005,
2085,
5677,
6797,
7983,
823,
5469,
5470
] | Test |
6,173 | 3 | Snail_Maze:snail maze snail maze 1986 video game sega part sega master system instead released cartridge built system bios could played starting system without game cartridge inserted holding buttons 1 2 simultaneously later console models included minimal bios memory constraints snail maze removed systems instead included built alex kidd miracle world sonic hedgehog snail maze never released cartridge card format simple game snail maze involves navigating small orange snail yellow shell blue maze goal area clearly marked players must attempt reach within time limit despite relative simplicity compared games era snail maze could quite challenging subsequent levels reduce time available giving progressively lower margin error snail maze fans worked keep game becoming obscure footnote video game history example 2004 port snail maze made japanese msx computer platform port included enhanced graphics well new title screen version snail maze included coleco sonic handheld system created 2006 port snail maze released december 2015 ti-84 plus ce graphing calculator written ez80 assembly language james vernon | [
1515,
9006
] | Test |
6,174 | 0 | Manually_Annotated_Sub-Corpus:manually annotated sub-corpus masc balanced subset 500k words written texts transcribed speech drawn primarily open american national corpus oanc oanc 15 million word growing corpus american english produced since 1990 public domain otherwise free usage redistribution restrictions masc includes manually validated annotations logical structure headings sections paragraphs etc sentence boundaries three different tokenizations associated part speech tags shallow parse noun verb chunks named entities person location organization date time penn treebank syntax additional manually produced validated annotations produced masc project portions sub-corpus including full-text annotation framenet frame elements 100k+ sentence corpus wordnet 3.1 sense tags one-tenth also annotated framenet frame elements annotations portions sub-corpus wide variety linguistic phenomena contributed projects including propbank timebank mpqa opinion several others co-reference annotations clause boundaries entire masc corpus scheduled released end 2016 wordnet sense annotations occurrences 114 words also included masc distribution well framenet annotations 50-100 occurrences 114 words sentences wordnet framenet annotations also distributed part masc sentence corpus unlike freely available corpora including wide variety linguistic annotations masc contains balanced selection texts broad range genres present masc includes seventeen different types linguistic annotation production ** currently available original format masc annotations whether contributed produced in-house transduced graph annotation format graf defined iso tc37 sc4 ’ linguistic annotation framework laf online tool anc2go transduce annotations parts masc several formats including conll iob format formats use uima general architecture text engineering masc open data resource used anyone purpose time collaborative community resource sustained community contributions annotations derived data freely downloadable masc download page linguistic data consortium masc also distributed part-of-speech-tagged form natural language toolkit | [
416,
5667,
8323,
5639,
9577
] | Test |
6,175 | 3 | LGA_771:lga 771 lga 771 also known socket j cpu interface introduced intel 2006 used intel core microarchitecture netburst microarchitecture dempsey based dp-capable server processors dual-core xeon codenamed dempsey woodcrest wolfdale quad-core processors clovertown harpertown yorkfield-cl also used core 2 extreme qx9775 succeeded lga 1366 nehalem-based xeon processors name implies land grid array 771 contacts word socket instance misnomer processor interface pin holes instead 771 protruding lands touch contact points underside microprocessor j socket j refers now-canceled processor codenamed jayhawk expected debut alongside interface intended successor socket 604 takes much design lga 775 almost pin compatible lga 775 socket 771 cpus rotated 90 degrees two pins swapped small adapters developed chinese computer diy enthusiasts available allow lga 771 cpus installed lga 775 motherboards bios microcode supports also able add supportion microcode manually | [
3588,
9611,
5901,
5523,
2455,
3992,
3352,
8855,
3995,
4252,
11417,
7714,
10019,
4523,
2604,
2350,
6192,
9649,
4537,
7105,
6339,
4805,
7110,
8394,
3403,
4427,
4179,
3798,
4185,
7002,
9945,
11484,
9570,
10468,
613,
8552,
7657,
1260,
4717,
1... | Test |
6,176 | 7 | Koding:koding koding development environment automation platform owned koding inc. allows software developers define development environments definition file called stack script file calls various cloud providers provision defined development environment file visible entire team updated administrators account environments provisioned file shared web browser without needs downloading software development kits developers also able download command line tool called kd allows mount provisioned vms computers thus enabling development using developers local ides since platform able create linux vms supports multiple programming languages including c c++ go java node.js perl php python ruby name=ram 2009 kodingen predecessor koding launched included features koding today later application temporarily closed development resulted koding first version koding launched 16 january 2012 private beta public beta began 24 july 2012 final beta version single developer version released public 7 august 2013 march 2016 koding released teams version geared towards enterprises teams developers koding received 20m date khosla ventures series b matrix partners series rtp ventures greycroft partners seed funding koding via environment definition files able create resources cloud providers developers able write code created resources | [
8068,
3462,
8582,
1802,
6154,
1435,
9245,
1698,
5677,
1203,
438,
4920,
1470,
7871,
8644,
8262,
339,
4056,
9560,
9561,
11357,
735,
8289,
482,
10854,
8554,
9195,
5101,
10991,
10744,
2045
] | Test |
6,177 | 4 | Xplico:xplico xplico network forensics analysis tool nfat software reconstructs contents acquisitions performed packet sniffer e.g wireshark tcpdump netsniff-ng unlike protocol analyzer whose main characteristic reconstruction data carried protocols xplico born expressly aim reconstruct protocol application data able recognize protocols technique named port independent protocol identification pipi name xplico refers latin verb explico significance xplico free open-source software subject requirements gnu general public license gpl version 2 clarify xplico imagine raw data ethernet ppp web navigation http protocol case xplico able extract reconstruct web pages contents images files cookies similarly xplico able reconstruct e-mail exchanged imap pop smtp protocols among protocols xplico identifies reconstructs voip msn irc http imap pop smtp ftp xplico software architecture provides output module xplico different user interfaces fact used command line web user interface called xplico interface protocol dissector modules decoding individual protocol protocol dissector reconstruct extract data protocol modules plug-in configuration file loaded execution program allows focus decoding want decode voip calls web traffic configure xplico load rtp sip modules excluding http module another feature xplico ability process reconstruct huge amounts data able manage pcap files multiple gigabytes even terabytes multiple capture probes simultaneously thanks use various types input modules pcap files uploaded many ways directly xplico web user interface sftp transmission channel called pcap-over-ip features xplico used contexts lawful interception network forensics xplico also specific version called pcap2wav able decode voip calls based rtp protocol sip h323 mgcp skinny supports decodidica audio codecs g711ulaw g711alaw g722 g729 g723 g726 msrta microsoft real-time audio examples assumed eth0 used network interface xplico -m rltm -i eth0 xplico -m pcap -f example.pcap xplico -m pcap -d /path/dir/ cases data decoded stored directory named xdecode parameter -m select input module type input module named rltm acquires data directly network interface vice versa input module named pcap acquires data form pcap files directory xplico installed default major distributions digital forensics penetration testing | [
2437,
10271,
7968,
5284,
9381,
1064,
7337,
1580,
11182,
7983,
4789,
9909,
823,
8635,
2494,
830,
7364,
8644,
6345,
842,
6475,
4049,
5843,
9939,
9440,
4834,
5475,
7525,
614,
9319,
8554,
8432,
381,
2292,
2045
] | Train |
6,178 | 2 | Palm_Pixi:palm pixi palm pixi pixi plus multimedia smartphones developed palm purchased 2010 hp device viewed successor palm centro smartphone palm second webos device palm pre phones considered smallest smartphone market able browse internet access facebook social media sites well online banking original pixi announced september 8 2009 palm official blog released november 15 2009 sprint carrier network u.s pixi plus announced ces 2010 plus versions include wifi ability act 3g mobile hotspot sometimes known mifi phone released january 7 2010 verizon wireless carrier network subsequently mobility released may 28 2010 o2 united kingdom pixi touch screen capability qwerty keyboard access battery interior hardware phone metal faceplate sits plastic backing palm inc. detailed specifications palm pixi company product web page according information given pixi features 2.63-inch capacitive touchscreen 18-bit color 320x400 screen resolution sub-hvga display device weighs 92.5 grams 3.51 ounces 55.0 mm 2.17 inches width 111.0 mm 4.37 inches height 10.85 mm 0.43 inches thick board radios include gps dual-band cdma2000 3g evdo rev data networking e-mail supports microsoft exchange services direct push well pop3 imap yahoo mail gmail aol microsoft outlook messaging features include im sms mms features 2 megapixel camera led flash proximity sensor accelerometer bluetooth 2.1 a2dp stereo microusb connector 3.5 mm headphone jack 8 gigabytes flash memory roughly 7 gigabytes available user like palm pre pixi features webos includes over-the-air synergy synchronization pixi plus display pixi hardware specs include qualcomm msm7627 600mhz cpu adreno 200 graphics 8gb storage 256 mb ram 802.11 b/g wifi bluetooth 2.1 capable using hsdpa 3.6 mbit/s well gprs offers a-gps navigation location services battery changeable 1,150 mah unit 5.5h talk time 2g 350h standby according manufacturer camera 2 megapixel device rear led flash | [
1537,
3585,
4609,
2308,
10500,
6790,
9863,
5384,
3340,
1682,
2962,
405,
3606,
8982,
10393,
5019,
5164,
9266,
9013,
694,
1849,
1083,
1728,
7492,
10820,
5318,
11337,
5963,
9163,
9037,
2258,
2259,
1621,
6618,
5339,
2784,
4449,
4832,
3300,
99... | Test |
6,179 | 2 | Catamount_(operating_system):catamount operating system catamount operating system supercomputers catamount lightweight kernel provides basic functionality aims efficiency roots catamount go back 1991 sunmos developed sandia national laboratories university new mexico lightweight operating system cray xt3 uses catamount compute nodes linux server nodes case study ieee assessed performance particle transport code awe cray xt3 8,000-core supercomputer running images catamount cray linux environment cle operating systems work demonstrated running number small benchmarks test machine possible speculate performance impact upgrading one operating system another system whole study findings allows researchers minimise system downtime exploring software-system upgrades results show benchmark tests run less 256 cores would suggest impact upgrading operating system cle less 10 | [
3328,
1795,
1480,
7432,
10411,
7983,
1168,
8242,
6675,
823
] | None |
6,180 | 3 | Linux_kernel_interfaces:linux kernel interfaces linux kernel provides several interfaces user-space applications used different purposes different properties design two types application programming interface api linux kernel confused kernel–user space api kernel internal api linux api kernel–user space api allows programs user space access system resources services linux kernel composed system call interface linux kernel subroutines gnu c library glibc focus development linux api provide usable features specifications defined posix way reasonably compatible robust performant provide additional useful features defined posix kernel–user space apis systems implementing posix api also provide additional features defined posix linux api choice kept stable decades never breaks stability guarantees portability source code time linux kernel developers historically conservative meticulous introducing new system calls much available free open-source software written posix api since much development flows linux kernel compared posix-compliant combinations kernel c standard library linux kernel api augmented additional features far additional features provide technical advantage programming linux api preferred posix-api well-known current examples udev systemd weston people lennart poettering openly advocate prefer linux api posix api offers advantages fosdem 2016 michael kerrisk explained perceived issues linux kernel user-space api describing contains multiple design errors non-extensible unmaintainable overly complex limited purpose violation standards inconsistent mistakes fixed would break abi kernel presents user space system call interface denomination entirety implemented available system calls kernel various subsystems e.g drm define system calls entirety called system call interface various issues organization linux kernel system calls publicly discussed issues pointed andy lutomirski michael kerrisk others gnu c library wrapper around system calls linux kernel combination linux kernel system call interface glibc builds linux api unix-like systems additional capabilities linux kernel exist part posix drm paramount development implementations well-defined performant free open-source graphics device drivers without rendering acceleration would available even worse 2d drivers would available x.org server drm developed linux since ported operating systems well term linux abi refers kernel–user space abi application binary interface refers compiled binaries machine code abi therefore bound instruction set defining useful abi keeping stable less responsibility linux kernel developers developers gnu c library task linux distributions independent software vendor isvs wish sell provide support proprietary software binaries single linux abi opposed supporting multiple linux abis abi defined every instruction set x86 x86-64 mips armv7-a 32-bit armv8-a 64-bit etc endianness supported able compile software different compilers definitions specified abi achieve full binary compatibility compilers free open-source software e.g gnu compiler collection llvm/clang end-users fact interested linux api windows api abis lot kernel-internal apis subsystems interface one another kept fairly stable guarantee stability case new research insights make change seem favorable api changed necessary rewrite testing done author linux kernel monolithic kernel hence device drivers kernel components ease burden companies maintaining proprietary device drivers out-of-tree stable apis device drivers repeatedly requested linux kernel developers repeatedly denied guaranteeing stable in-kernel apis device drivers guaranteeing would faltered development linux kernel past would still future due nature free open-source software necessary ergo choice linux kernel stable in-kernel api since stable in-kernel apis stable in-kernel abis several use cases linux api considered low-level higher abstraction apis used course still need work top low-level linux apis examples | [
4616,
3082,
5139,
6675,
7187,
10776,
25,
10780,
4637,
10785,
9762,
6180,
5158,
7217,
8242,
9266,
9784,
10809,
2109,
576,
4161,
7234,
8772,
6213,
8268,
589,
593,
10333,
1632,
97,
6244,
5222,
10856,
8298,
4207,
9839,
7285,
9335,
2168,
5754,... | None |
6,181 | 3 | Instruction_unit:instruction unit instruction unit iu also called instruction fetch unit ifu instruction issue unit isu central processing unit cpu responsible organising program instructions fetched memory executed appropriate order part control unit turn part cpu simplest style computer architecture instruction cycle rigid runs exactly specified programmer instruction fetch part cycle value instruction pointer ip register address next instruction fetched value placed address bus sent memory unit memory unit returns instruction address latched instruction register ir value ip incremented over-written new value case jump branch instruction ready next instruction cycle becomes lot complicated though performance-enhancing features added instruction pipelining out-of-order execution even introduction simple instruction cache | [
7173,
9739,
7699,
5655,
27,
10781,
8231,
7218,
2623,
2113,
7234,
3142,
2638,
1122,
3175,
8815,
630,
8822,
7313,
6815,
8352,
5793,
6818,
6821,
7852,
9391,
7858,
9911,
8890,
4286,
2241,
2243,
6339,
9932,
5329,
10966,
731,
7911,
10985,
9964,... | None |
6,182 | 9 | Grammar-oriented_programming:grammar-oriented programming grammar-oriented programming gop grammar-oriented object design good good designing creating domain-specific programming language dsl specific business domain good used drive execution application used embed declarative processing logic context-aware component cac context-aware service cas good method creating maintaining dynamically reconfigurable software architectures driven business-process architectures business compiler used capture business processes within real-time workshops various lines business create executable simulation processes used instead using one dsl entire programming activity good suggests combination defining domain-specific behavioral semantics conjunction use traditional general purpose programming languages | [
9345,
2374,
9926,
9224,
7851,
1591,
2680,
5081,
10042,
1051
] | None |
6,183 | 3 | PowerBook_150:powerbook 150 powerbook 150 laptop personal computer created apple computer inc. introduced july 13 1994 released july 18 1994 last member powerbook 100 series use original case design affordable series introduced priced 1,450 1,600 also last consumer model 8 mhz faster predecessor powerbook 145b lacked adb port used lower-quality passive matrix display contemporary offerings reduce price also lacked external monitor support like duos powerbook 100 150 single serial printer port however third party adapter available use optional modem slot though used 140 case design internals based powerbook duo 230 actually similar features powerbook 190 used powerbook 5300 case design notably new logicboard design allowed 100 series powerbook use 14 mb ram first time well first macintosh ever use less expensive larger ide drives formatting required unique software application limiting selection compatible drives also first 100 series include lithium-ion backup battery preserve ram contents battery replaced last powerbook model include trackball however like 145b replaced 150 could used scsi disk mode unlike duo 190 5300 hd target mode implemented | [
7697,
4114,
6165,
11289,
7706,
8222,
1057,
1576,
4139,
7211,
8253,
1090,
4180,
10838,
10840,
9312,
8806,
6258,
10357,
4220,
10365,
10878,
6783,
7299,
4741,
8842,
6283,
7824,
147,
7830,
6807,
4258,
7842,
7844,
7869,
8893,
8896,
4807,
4810,
... | None |
6,184 | 4 | Race_condition:race condition race condition race hazard behavior electronics software system system substantive behavior dependent sequence timing uncontrollable events becomes bug one possible behaviors undesirable term race condition already use 1954 example david a. huffman doctoral thesis synthesis sequential switching circuits race conditions occur especially logic circuits multithreaded distributed software programs typical example race condition may occur logic gate combines signals traveled along different paths source inputs gate change slightly different times response change source signal output may brief period change unwanted state settling back designed state certain systems tolerate glitches output functions clock signal systems contain memory example system rapidly depart designed behaviour effect temporary glitch becomes permanent glitch consider example two-input gate fed logic signal one input negation another input theory output never true however changes value take longer propagate second input first changes false true brief period ensue inputs true gate output also true design techniques karnaugh maps encourage designers recognize eliminate race conditions cause problems often logic redundancy added eliminate kinds races well problems logic elements enter metastable states create problems circuit designers critical race condition occurs order internal variables changed determines eventual state state machine end non-critical race condition occurs order internal variables changed determine eventual state state machine end static race condition occurs signal complement combined together dynamic race condition occurs results multiple transitions one intended due interaction gates eliminated using two levels gating essential race condition occurs input two transitions less total feedback propagation time sometimes cured using inductive delay line elements effectively increase time duration input signal race conditions arise software application depends sequence timing processes threads operate properly electronics critical race conditions result invalid execution bugs critical race conditions often happen processes threads depend shared state operations upon shared states critical sections must mutually exclusive failure obey rule opens possibility corrupting shared state concept called data race type race condition data races important parts various formal memory models notably memory model defined c11 c++11 standards specify c c++ program containing data race undefined behavior race conditions reputation difficult reproduce debug since end result nondeterministic depends relative timing interfering threads problems occurring production systems therefore disappear running debug mode additional logging added attaching debugger often referred heisenbug therefore better avoid race conditions careful software design rather attempting fix afterwards simple example let us assume two threads want increment value global integer variable one ideally following sequence operations would take place case shown final value 2 expected however two threads run simultaneously without locking synchronization outcome operation could wrong alternative sequence operations demonstrates scenario case final value 1 instead expected result 2 occurs increment operations mutually exclusive mutually exclusive operations interrupted accessing resource memory location regard data races subset race conditions precise definition data race specific formal concurrency model used typically refers situation memory operation one thread could potentially attempt access memory location time memory operation another thread writing memory location context dangerous implies data race different race condition possible nondeterminism due timing even program without data races example program memory accesses use atomic operations dangerous many platforms two threads write memory location time may possible memory location end holding value arbitrary meaningless combination bits representing values thread attempting write could result memory corruption resulting value one neither thread attempted write sometimes called 'torn write similarly one thread reads location another thread writing may possible read return value arbitrary meaningless combination bits representing value memory location held write bits representing value written many platforms special memory operations provided simultaneous access cases typically simultaneous access using special operations safe simultaneous access using memory operations dangerous sometimes special operations safe simultaneous access called atomic synchronization operations whereas ordinary operations unsafe simultaneous access called data operations probably term data race many platforms race condition involving synchronization operations race may nondeterministic otherwise safe data race could lead memory corruption undefined behavior precise definition data race differs across formal concurrency models matters concurrent behavior often non-intuitive formal reasoning sometimes applied c++ standard draft n4296 2014-11-19 defines data race follows section 1.10.23 page 14 two actions potentially concurrent execution program contains data race contains two potentially concurrent conflicting actions least one atomic neither happens except special case signal handlers described omitted data race results undefined behavior parts definition relating signal handlers idiosyncratic c++ typical definitions data race paper detecting data races weak memory systems provides different definition two memory operations conflict access location least one write operation ... two memory operations x sequentially consistent execution form race 〈x y〉 iff x conflict ordered hb1 relation execution race 〈x y〉 data race iff least one x data operation two memory operations accessing location one write hb1 relation defined elsewhere paper example typical happens-before relation intuitively prove situation one memory operation x guaranteed executed completion another memory operation begins say x happens-before neither x happens-before happens-before x say x ordered hb1 relation clause ... ordered hb1 relation execution intuitively translated ... x potentially simultaneous paper considers dangerous situations least one memory operations data operation parts paper paper also defines class synchronization operations safe potentially simultaneous use contrast data operations java language specification provides different definition two accesses reads writes variable said conflicting least one accesses write ... program contains two conflicting accesses §17.4.1 ordered happens-before relationship said contain data race ... data race cause incorrect behavior returning wrong length array critical difference c++ approach java approach c++ data race undefined behavior whereas java data race merely affects inter-thread actions means c++ attempt execute program containing data race could still adhering spec crash could exhibit insecure bizarre behavior whereas java attempt execute program containing data race may produce undesired concurrency behavior otherwise assuming implementation adheres spec safe important facet data races contexts program free data races guaranteed execute sequentially consistent manner greatly easing reasoning concurrent behavior program formal memory models provide guarantee said exhibit sc drf sequential consistency data race freedom property approach said achieved recent consensus presumably compared approaches guarantee sequential consistency cases approaches guarantee example java guarantee directly specified program correctly synchronized sequentially consistent executions free data races program correctly synchronized executions program appear sequentially consistent §17.4.3 extremely strong guarantee programmers programmers need reason reorderings determine code contains data races therefore need reason reorderings determining whether code correctly synchronized determination code correctly synchronized made programmer need worry reorderings affect code program must correctly synchronized avoid kinds counterintuitive behaviors observed code reordered use correct synchronization ensure overall behavior program correct however use allow programmer reason possible behaviors program simple way behavior correctly synchronized program much less dependent possible reorderings without correct synchronization strange confusing counterintuitive behaviors possible contrast draft c++ specification directly require sc drf property merely observes exists theorem providing note shown programs correctly use mutexes memory_order_seq_cst operations prevent data races use synchronization operations behave operations executed constituent threads simply interleaved value computation object taken last side effect object interleaving normally referred “ sequential consistency ” however applies data-race-free programs data-race-free programs observe program transformations change single-threaded program semantics fact single-threaded program transformations continue allowed since program behaves differently result must perform undefined operation.— end note note c++ draft specification admits possibility programs valid use synchronization operations memory_order memory_order_seq_cst case result may program correct guarantee sequentially consistency provided words c++ correct programs sequentially consistent approach thought give c++ programmers freedom choose faster program execution cost giving ease reasoning program various theorems often provided form memory models provide sc drf guarantees given various contexts premises theorems typically place constraints upon memory model therefore upon implementation also upon programmer say typically case programs meet premises theorem could guaranteed execute sequentially consistent manner drf1 memory model provides sc drf allows optimizations wo weak ordering rcsc release consistency sequentially consistent special operations vax memory model data-race-free-0 memory models plpc memory model provides sc drf allows optimizations tso total store order pso pc processor consistency rcpc release consistency processor consistency special operations models drfrlx provides sketch sc drf theorem presence relaxed atomics many software race conditions associated computer security implications race condition allows attacker access shared resource cause actors utilize resource malfunction resulting effects including denial service privilege escalation specific kind race condition involves checking predicate e.g authentication acting predicate state change time check time use kind bug exists security-sensitive code security vulnerability called time-of-check-to-time-of-use tocttou bug created race conditions also intentionally used create hardware random number generators physically unclonable functions pufs created designing circuit topologies identical paths node relying manufacturing variations randomly determine paths complete first measuring manufactured circuit specific set race condition outcomes profile collected circuit kept secret order later verify circuit identity two programs may collide attempts modify access file system result data corruption privilege escalation file locking provides commonly used solution cumbersome remedy involves organizing system way one unique process running daemon like exclusive access file processes need access data file via interprocess communication one process requires synchronization process level different form race condition exists file systems unrelated programs may affect suddenly using available resources disk space memory space processor cycles software carefully designed anticipate handle race situation may become unpredictable risk may overlooked long time system seems reliable eventually enough data may accumulate enough software may added critically destabilize many parts system example occurred near loss mars rover spirit long landing solution software request reserve resources need beginning task request fails task postponed avoiding many points failure could occurred alternatively points equipped error handling success entire task verified afterwards continuing common approach simply verify enough system resources available starting task however may adequate complex systems actions running programs unpredictable networking consider distributed chat network like irc user starts channel automatically acquires channel-operator privileges two users different servers different ends network try start same-named channel time user respective server grant channel-operator privileges user since neither server yet received server signal allocated channel problem largely solved various irc server implementations case race condition concept shared resource covers state network channels exist well users started therefore privileges server freely change long signals servers network changes update conception state network however latency across network makes possible kind race condition described case heading race conditions imposing form control access shared resource—say appointing one server control holds privileges—would mean turning distributed network centralized one least one part network operation race conditions also exist computer program written non-blocking sockets case performance program dependent speed network link software flaws life-critical systems disastrous race conditions among flaws therac-25 radiation therapy machine led death least three patients injuries several another example energy management system provided ge energy used ohio-based firstenergy corp among power facilities race condition existed alarm subsystem three sagging power lines tripped simultaneously condition prevented alerts raised monitoring technicians delaying awareness problem software flaw eventually led north american blackout 2003 ge energy later developed software patch correct previously undiscovered error neuroscience demonstrating race conditions occur mammal rat brains well many software tools exist help detect race conditions software largely categorized two groups static analysis tools dynamic analysis tools thread safety analysis static analysis tool annotation-based intra-procedural static analysis originally implemented branch gcc reimplemented clang supporting pthreads dynamic analysis tools include several benchmarks designed evaluate effectiveness data race detection tools | [
9224,
7699,
8726,
10781,
7218,
2113,
8773,
2558,
6228,
602,
2140,
4194,
5223,
8810,
4205,
1137,
6774,
7802,
6269,
3197,
5251,
7313,
6815,
2210,
5798,
1193,
5805,
7341,
187,
4286,
2243,
5325,
4308,
2262,
2264,
731,
2281,
8946,
9466,
6909,
... | Validation |
6,185 | 7 | Sixa:sixa sixa inc. cloud-computing startup company lets users on-demand access personal virtual computer company founded september 2015 headquartered san francisco california company offers custom computers developers designers gamers relevant preinstalled software service allows users access powerful cloud computer device eliminates need buy new hardware computational power needed service available windows mac os x android operating systems sixa backed combinator join summer 2016 batch july 2016 raised 261,000 funding startupbootcamp istanbul ws investments combinator starting december 2016 sixa service publicly available usage part launch company raised 3.5 million seed investment round led tandem capital | [
4194
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.