node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
6,186
2
IOS_9:ios 9 ios 9 ninth major release ios mobile operating system developed apple inc. successor ios 8 announced company worldwide developers conference june 8 2015 released september 16 2015 succeeded ios 10 september 13 2016. ios 9 incorporated many feature updates built-in apps notably notes received ability draw sketches different tools image insertion prominent visual appearance website links map locations advanced list formatting all-new apple news app aggregates articles different sources apple maps received mass transit support although limited number locations launch major new system updates include proactivity siri advanced search combined make operating system contextually aware information time location provide user information ahead time searching proactive intelligence display instant results widget-like format including weather sports news ios 9 also added multiple forms multitasking ipad ios 9.3 apple added night shift mode changes color device display warmer less blue light shade prevent potential negative screen effect users circadian rhythms additionally ios 9 brought new user experience functions including quick actions peek pop based touch-sensitive display technology iphone 6s quick actions shortcuts home screen app icons users preview peek content without moving away current screen enter pop previewed content full view reception ios 9 positive critics praised proactivity siri making notification center central location information potential future updates improve functionality new multitasking features ipad complimented drawing photo insertion notes app however apple news criticized low number decent-looking articles apple maps criticized limited geographical availability mass transit support five days release apple announced ios 9 installed 50 active ios devices apple described fastest adoption rate ever new operating system ios 9 introduced apple worldwide developers conference june 8 2015 first beta made available registered developers keynote public beta made available july marked first time general public able test new versions ios official release eddy cue apple senior vice president internet software services telling fast company public beta program started maps referring company apple maps launch significant issues early days ios 9 officially released september 16 2015. ios 9.0.1 released september 23 2015 first update ios 9 fixed playback issues alarms timers made setup assistant work properly resolved distortion paused frames video playback photos safari ios 9.0.2 released september 30 2015 fix multiple bugs including lock screen bypass issue ios 9.1 released october 21 2015 update included support ipad pro apple pencil 4th-generation apple tv also added support 150 new emoji part unicode 7.0 8.0 emoji standards live photos intelligently sense user raises lowers phone n't record movements bug fixes improvements security performance also included ios 9.2 released december 8 2015 update included arabic language support siri iphone support apple lightning-to-sd-card reader accessory lets users transfer photos videos sd card commonly used dslr cameras iphone without need computer ios 9.2 also included new visual download indicator apple music support wi-fi calling users along bug fixes stability improvements ios 9.2.1 released january 19 2016 bug fixes february 18 2016 second version ios 9.2.1 released fix bricking issue impacted iphones touch id sensors repaired third-party ios 9.3 released march 21 2016 new 3d touch quick actions several apple built-in apps night shift mode notes password protection touch id news better personalized recommendations support in-line video iphone landscape view health activity view carplay updates apple music apple maps new languages siri multi-user mode ipad education support pairing multiple apple watches one iphone wi-fi calling verizon users support playing videos encoded dolby digital plus audio streams select lightning-equipped ios devices well major bug fixes ios 9.3.1 released march 31 2016 fix issue caused apps become unresponsive crash tapping links ios 9.3.2 released may 16 2016 update made possible use night shift low power mode simultaneously previously possible also fixed bluetooth issue iphone se however ios 9.3.2 bricked 9.7-inch ipad pros preventing used apple pulled update ipad pro may 20 2016 re-released 9.3.2 device june 2 2016 fixing issue ios 9.3.3 released july 18 2016 bug fixes performance improvements ios 9.3.4 released august 4 2016 fix memory corruption issue could enable app execute arbitrary code kernel privileges update consequently patched ios jailbreaking method used chinese programming group pangu team ios 9.3.5 released august 25 2016 fix three critical security vulnerabilities user clicked malicious link jailbreak enabled device installed spyware pegasus intercept collect information device well activate microphone track device location spyware used strong encryption avoid detection ios 9.3.6 released july 22 2019 address issue could impact gps location performance could cause system date time incorrect update available iphone 4s cellular models ipad mini 1st generation ipad 2 ipad 3rd generation iphone 6s iphone 6s plus touch-sensitive display feature called 3d touch incorporated ios 9 similar force touch found trackpad apple macbook computers quick actions shortcuts added apps support 3d touch feature triggered pressing slightly harder app icon also introduces actions known peek pop lets users firmly hold preview peek kind content hovering window optionally apply pressure enter pop content full view taptic engine iphone 6s provides haptic feedback time users press screen harder ios 9 comes two important battery-saving updates phone placed face-down screen light upon receiving notifications apple also added low power mode modifies amount energy dedicated background services animations example background app refresh push email paused low power mode phone reaches 20 battery level users automatically prompted turn low power mode changes color battery icon top row status bar screen yellow battery goes higher 80 level low power mode automatically turns back san francisco new system font replaced helvetica neue system typeface ios ios 9 added new battery widget notification center displayed battery life charging status connected bluetooth device shift button inactive lowercase letters displayed keyboard instead all-caps representation previous ios versions ios 9 smaller update ios 8 requiring 1.3 gb space compared 4.58 gb ios 8 additionally ios 9 includes option temporarily delete apps allow update install update installed apps automatically restored ios 9 also features app thinning functionality whereby necessary assets needed run apps individual device downloaded rather entire app potentially saving space ios 9 adds number features ipad improve productivity include slide split screen picture picture enhanced multitasking similar experience found os x el capitan slide allows user pull second app swipe right edge display app takes 1/3 screen sticks right side screen interactivity within full-screen app disabled left inactive background feature allows users perform quick tasks dismiss app user taps handle next slide window extends window towards left screen user enters split screen allows interact two apps simultaneously side-by-side 50/50 split users also switch another app either slide mode split screen view pulling handle top either app selecting another app list replace existing one picture picture mode allows users minimize facetime calls supported videos smaller window continue watching tasks ipad split screen multitasking feature available ipad air 2 ipad mini 4 ipad pro slide picture picture features available ipad air ipad air 2 ipad mini 2 newer ipad pro banner notifications tapped causing another app open back button top-left corner screen added bringing user back previous app night shift display mode introduced ios 9.3 mode shifts colors device display warmer similar f.lux popular program microsoft windows apple macos computers enabled uses device clock geographic location determine turn feature optionally user set manual schedule schedule ease access new night shift toggle control center settings night shift located display brightness settings app top enabling feature setting schedule user also set warmth display despite introduced ios 9.3 march 2016 n't possible use night shift low power mode simultaneously release ios 9.3.2 two months later night shift requires 64-bit processor found apple a7 newer chips means older ios devices including iphone 4s iphone 5 iphone 5c ipad 2 ipad 3 ipad 4 first-generation ipad mini ipod touch 5 receive night shift mode ios 9 includes performance speed improvements thanks expanded use metal api metal introduced ios 8 previously limited game developers ios 9 use metal expanded let handle many core user interface elements graphics intelligence one main features ios 9 consisting newly integrated siri search previously known spotlight well proactivity throughout operating system ios aware contextual information time location proactively provides user may need advance save time effort typing search also improved display instant answers at-a-glance widget-like format similar provided siri interface search display current weather sports scores news search screen proactive suggestions accessed either pulling notifications window safari web browser search bar left home screen intelligence also extends apps instance mail events automatically added calendar details found message content likely additional recipients suggested message composition siri also aware currently screen engaged holding home button ios 9 introduces multiple security enhancements introduces 6-digit passcode default extra two digits previous 4-digit default well support two-factor authentication original ios 9 release september 2015 fixed security issue within previous ios versions flaw allowed anyone within range airdrop user install malware target device tweak ios settings exploit would still work victim rejected incoming airdrop file settings app ios 9 search bar makes easier find settings options user also options notifications grouped app came ability turn shake undo ipad two-finger drag keyboard moves cursor freely like traditional trackpad making positioning cursor selecting text easier keyboard-to-trackpad feature also extended iphone 6s 6s plus users 3d touch force press keyboard enable trackpad also ipad shortcut bar added cut copy paste undo redo functions folders display 16 apps per page 4-by-4 arrangement compared 9 iphone allowing increased total 240 apps single folder ios 9 introduced wi-fi assist feature default automatically switches phone cellular data wi-fi connection spotty whenever user presented flight information user click link view preview flight ios 9.3 pdfs saved ibooks application via safari itunes synced icloud ios 9 setting enables icloud drive app home screen icloud drive lets user save browse files folders icloud health app introduced ios 8 received landscape mode iphone also added support reproductive health uv exposure water intake sedentary state data types ios 9.3 also tracks sleep exercise weight apple watch messages app allows user search text text highlighted scrolled apple maps adds support transit directions baltimore berlin chicago london los angeles mexico city new york city paris philadelphia san francisco toronto washington d.c. along 300 locations china maps app also enhanced location details including nearby feature recommends shops restaurants places drink close proximity user places serving food users specify exactly type food want ios 9 includes new apple news app replacing newsstand app aggregates news different sources similar style flipboard app features mobile-formatted layout loads quickly informative animations full-bleed images additionally news supports rss feeds safari web browser launch news app available united states expanded united kingdom australia ios 9.1 update march 2016 apple opened news platform news agencies including independent bloggers notes app received number enhancements ios 9 including ability draw sketches number different tools including ruler straight lines images also added links websites map locations get prominent visual appearance added notes ipad iphone landscape mode notes range color options drawing well eraser advanced formatting options including checked bulleted dashed numbered lists app also supports icloud allows easy folder creation secure notes feature introduced ios 9.3 lets ios user protect notes either passcode touch id photos app ios 9 included improved scrubber bar photo viewer screenshots selfies albums ability hold select multiple photos easily without delete individually also allows user hide sensitive material new hide option app also allows user pinch-to-zoom playing video release ios 9 safari web browser allows third-party content blocking apps safari also allows users customize appearance reader mode options font background color days release ios 9 ad blocking software topped app store charts marco arment developer peace app saying web advertising behavioral tracking control ... 're unacceptably creepy bloated annoying insecure 're getting worse alarming pace passbook application renamed wallet ios 9 includes many new changes support store loyalty cards gift cards discover credit/debit cards apple pay uk wallet app also accessed lock screen ios 9.3 music api allows developers integrate apps apple music streaming service ios 9 received mostly positive reviews dan seifert verge praised improvements proactivity siri highlighting notification drop-down contains information user needs although pointed google google microsoft cortana personal assistants offer similar services sometimes better varied ways achieving results improvements ios lay foundation even capabilities future chris velazco engadget liked small thoughtful design changes impressed new multitasking features ipad referring split screen lovely little feature however criticize low number decent-looking articles apple news writing 'll notice discrepancy articles handled -- formatted text white background outlet logo top also noted limited number locations apple maps launch supported mass transit directions matt swider techradar wrote siri proactivity lists robust enjoyed notifications sorted chronologically rather app samuel gibbs guardian welcomed changes built-in apps drawing photo insertion notes unknown number identification emails phone siri automatically launching music app upon plugging headphones also praised updates keyboard calling much easier use apple facing 5 million lawsuit allegedly slowing iphone 4s ios 9 according lawsuit ios 9 update slowed iphone 4s point phone unusable performance sluggish apple knew fact planned obsolescence september 21 2015 apple announced ios 9 installed 50 active ios devices measured app store according apple fastest adoption rate ever new operating system february 2016 news outlets reported users updated ios 9 particular device components repaired third-party notably touch id fingerprint recognition sensor rendered phone bricked issue named error 53 according ifixit limited iphone 6 6 plus devices apple stated protect fingerprint data using secure enclave uniquely paired touch id sensor iphone serviced authorised apple service provider apple retail store changes affect touch id sensor pairing re-validated ... check ensures device ios features related touch id remain secure without unique pairing malicious touch id sensor could substituted thereby gaining access secure enclave ios detects pairing fails touch id including apple pay disabled device remains secure apple released new version ios 9.2.1 later february fix issue february 2016 bug discovered could permanently disable 64-bit devices bug setting time 1 january 1970 would cause device get stuck reboot process ios 9.3 released march 21 2016 fixed issue may 2016 apple released ios 9.3.2 update followed reports bricked 9.7-inch ipad pros connect itunes message error 56 message itunes could n't restore tablet apple temporarily stopped offering 9.3.2 update re-release version june 2016 fixed issue release ios 9.3.3 july 2016 followed reports ibooks store crashed however apple explained august timing coincidence ibooks app crash result server issue software update release ios 9.3.5 august 2016 fixed three critical security vulnerabilities vulnerabilities could exploited silently enable jailbreak allow malicious installation spyware called pegasus pegasus could intercept read text messages emails track calls trace phone location activate microphone gather information apps including limited imessage gmail viber facebook whatsapp telegram skype discovery vulnerabilities dated 10 days 9.3.5 update released arab human rights defender ahmed mansoor received suspicious text message link sent citizen lab investigation ensued collaboration lookout revealed mansoor clicked link would jailbroken phone implanted spyware citizen lab linked attack israeli surveillance company known nso group sells pegasus governments lawful interception regarding widespread issue lookout explained blog post believe spyware wild significant amount time based indicators within code pointed code shows signs kernel mapping table values way back ios 7 news spyware received significant media attention particularly called sophisticated smartphone attack ever first time iphone history remote jailbreak exploit detected july 2017 information critical wi-fi security vulnerability affecting one billion ios android devices published issue named broadpwn allows attacker remotely take control nearby vulnerable smartphones turn affected devices rogue access points spreading infection nearby devices apple released security patch issue part ios 10.3.3 update though older devices running ios 9 including ipad 2 iphone 4s left without available update causing concerns safety product schools release apple drop support ios devices devices supporting ios 8 also able run ios 9
[ 10755, 9732, 1549, 4111, 5647, 7697, 6675, 11289, 4139, 6700, 1074, 8754, 9784, 1083, 5181, 8253, 8767, 576, 5696, 8774, 8783, 4180, 10838, 1623, 3672, 9308, 3167, 3681, 9826, 8806, 3691, 1134, 2673, 6264, 7292, 2686, 6783, 7806, 10878, 6...
Test
6,187
3
VMEbus:vmebus vmebus versa module europa versa module eurocard bus computer bus standard originally developed motorola 68000 line cpus later widely used many applications standardized iec ansi/ieee 1014-1987 physically based eurocard sizes mechanicals connectors din 41612 uses signalling system eurocard define first developed 1981 continues see widespread use today 1979 development motorola 68000 cpu one engineers jack kister decided set creating standardized bus system 68000-based systems motorola team brainstormed days select name versabus versabus cards large used edge connectors products adopted including ibm system 9000 instrument controller automatix robot machine vision systems kister later joined john black refined specifications created versamodule product concept young engineer working black julie keahey designed first versamodule card versabus adaptor module used run existing cards new versabus sven rau max loesel motorola-europe added mechanical specification system basing eurocard standard late standardization process result first known versabus-e later renamed vmebus versamodule eurocard bus although refer versa module europa point number companies involved 68000 ecosystem agreed use standard including signetics philips thomson mostek soon officially standardized iec iec 821 vmebus ansi ieee ansi/ieee 1014-1987 original standard 16-bit bus designed fit within existing eurocard din connectors however several updates system allow wider bus widths current vme64 includes full 64-bit bus 6u-sized cards 32-bit 3u cards vme64 protocol typical performance 40 mb/s associated standards added hot-swapping plug-and-play vme64x smaller 'ip cards plug single vmebus card various interconnect standards linking vme systems together late 1990s synchronous protocols proved favourable research project called vme320 vita standards organization called new standard unmodified vme32/64 backplanes new 2esst protocol approved ansi/vita 1.5 1999 years many extensions added vme interface providing 'sideband channels communication parallel vme examples ip module raceway interlink scsa gigabit ethernet vme64x backplanes pci express rapidio starfabric infiniband vmebus also used develop closely related standards vxibus vpx vmebus strong influence many later computer buses stebus architectural concepts vmebus based versabus developed late 1970s motorola motorola european microsystems group munich west germany proposed development versabus-like product line based eurocard mechanical standard demonstrate concept max loesel sven rau developed three prototype boards 1 68000 cpu board 2 dynamic memory board 3 static memory board named new bus versabus-e later renamed vme short versa module european lyman lym hevle vp motorola microsystems operation later founder vme marketing group subsequently renamed vme international trade association vita early 1981 motorola mostek signetics agreed jointly develop support new bus architecture companies early supporters 68000 microprocessor family john black motorola craig mackenna mostek cecil kaplinsky signetics developed first draft vmebus specification october 1981 system '81 trade show munich west germany motorola mostek signetics/philips thomson csf announced joint support vmebus also placed revision specification public domain august 1982 revision b vmebus specification published newly formed vmebus manufacturers group vita new revision refined electrical specifications signal line drivers receivers brought mechanical specification line developing iec 297 standard formal specification eurocard mechanical formats latter 1982 french delegation international electrotechnical commission iec proposed revision b vmebus international standard iec sc47b subcommittee nominated mira pauker philips france chairperson editorial committee thus formally starting international standardization vmebus march 1983 ieee microprocessor standards committee msc requested authorization establish working group could standardize vmebus us request approved ieee standards board p1014 working group established wayne fischer appointed first chairman working group john black served chairman p1014 technical subcommittee iec ieee vmebus manufacturers group vita distributed copies revision b comment received resulting requests changes document comments made clear time go past revision b december 1983 meeting held included john black mira pauker wayne fischer craig mackenna agreed revision c created take consideration comments received three organizations john black shlomo pri-tal motorola incorporated changes sources common document vmebus manufacturers group labelled document revision c.1 placed public domain ieee labelled p1014 draft 1.2 iec labelled iec 821 bus subsequent ballots ieee p1014 working group msc resulted comments required ieee p1014 draft updated resulted ansi/ieee 1014-1987 specification 1985 aitech developed contract us tacom first conduction-cooled 6u vmebus board although electrically providing compliant vmebus protocol interface mechanically board interchangeable use air-cooled lab vmebus development chassis late 1987 technical committee formed vita direction ieee create first military conduction-cooled 6u x 160mm fully electrically mechanically compatible vmebus board co-chaired dale young dy4 systems doug patterson plessey microsystems radstone technology ansi/ieee-1101.2-1992 later ratified released 1992 remains place conduction-cooled international standard 6u vmebus products 1989 john peters performance technologies inc. developed initial concept vme64 multiplexing address data lines a64/d64 vmebus concept demonstrated year placed vita technical committee 1990 performance enhancement vmebus specification 1991 par project authorization request p1014r revisions vmebus specification granted ieee ray alderman technical director vita co-chaired activity kim clohessy dy-4 systems end 1992 additional enhancements vmebus a40/d32 locked cycles rescinding dtack* autoslot-id auto system controller enhanced din connector mechanicals required work complete document vita technical committee suspended work ieee sought accreditation standards developer organization sdo american national standards institute ansi original ieee par p1014r subsequently withdrawn ieee vita technical committee returned using public domain vmebus c.1 specification base-level document added new enhancements enhancement work undertaken entirely vita technical committee resulted ansi/vita 1-1994 tremendous undertaking document editing accomplished kim clohessy dy-4 systems technical co-chair activity great help frank hom created mechanical drawings exceptional contributions chapter editor additional enhancements proposed vme64 subcommittee placed vme64 extensions document two activities began late 1992 blli vmebus board-level live insertion specifications vsli vmebus system-level live insertion fault tolerance 1993 new activities began base-vme architecture involving implementation high-speed serial parallel sub-buses use i/o interconnections data mover subsystems architectures used message switches routers small multiprocessor parallel architectures vita application recognition accredited standards developer organization ansi granted june 1993 numerous documents including mezzanine p2 serial bus standards placed vita public domain administrator technologies detailed timeline vmebus history found vita website many ways vmebus equivalent analogous pins 68000 run onto backplane however one key features 68000 flat 32-bit memory model free memory segmentation anti-features result vme 68000-like 68000 generic enough make issue cases like 68000 vme uses separate 32-bit data address buses 68000 address bus actually 24-bit data bus 16-bit although 32/32 internally designers already looking towards full 32-bit implementation order allow bus widths vme uses two different eurocard connectors p1 p2 p1 contains three rows 32 pins implementing first 24 address bits 16 data bits control signals p2 contains one row includes remaining 8 address bits 16 data bits bus controlled set nine lines known arbitration bus communications controlled card slot one eurocard chassis known arbiter module two arbitration modes supported round robin prioritized regardless arbitration mode card attempt become bus master holding one four bus request lines low round robin arbitration arbiter cycles amongst bus request lines br0-br3 determine potentially simultaneous requesters granted bus priority arbitration br0-br3 use fixed priority scheme br0 lowest br3 highest arbiter grant bus highest priority requestor arbiter determined bus requests grant asserts corresponding bus grant line bg0 bg3 level bus mastership two masters simultaneously request bus using br line bus grant daisy-chain effectively breaks tie granting bus module closest arbiter master granted bus indicate bus use asserting bus busy bbsy* point master gained access bus write data card drives address address modifier data onto bus drives address strobe line two data strobe lines low indicate data ready drives write pin indicate transfer direction two data strobes *lword line cards indicate data width 8 16 32 bits 64 vme64 card bus address reads data pulls data transfer acknowledge low line transfer complete transfer complete pull bus error line low reading data essentially controlling card drives address bus leaves data bus tri-stated drives read pin slave card drives read data onto data bus drives data strobe pins low data ready signalling scheme asynchronous meaning transfer tied timing bus clock pin unlike synchronous buses pci block transfer protocol allows several bus transfers occur single address cycle block transfer mode first transfer includes address cycle subsequent transfers require data cycles slave responsible ensuring transfers use successive addresses bus masters release bus two ways release done rwd master releases bus completes transfer must re-arbitrate bus every subsequent transfer release request ror master retains bus continuing assert bbsy* transfers ror allows master retain control bus bus clear bclr* asserted another master wishes arbitrate bus thus master generates bursts traffic optimize performance arbitrating bus first transfer burst decrease transfer latency comes cost somewhat higher transfer latency masters address modifiers used divide vme bus address space several distinct sub-spaces address modifier 6 bit wide set signals backplane address modifiers specify number significant address bits privilege mode allow processors distinguish bus accesses user level system level software whether transfer block transfer incomplete table address modifiers vme also decodes seven 68000 interrupt levels onto 7-pin interrupt bus interrupt scheme one prioritized vectored interrupts interrupt request lines irq1 irq7 prioritize interrupts interrupting module asserts one interrupt request lines module bus may potentially handle interrupt interrupt handling module recognizes interrupt request priority handles arbitrates bus usual fashion described performs read interrupt vector driving binary version irq line handles e.g irq5 handled binary 101 onto address bus also asserts iack line along appropriate data transfer strobes width status/id read lword* ds0* ds1* allow status/id read cycles 8 16 32 bit wide transfers existing hardware interrupters use 8 bit status/ids interrupter responds transferring status/id data bus describe interrupt interrupt handling module usually cpu usually use status/id number identify run appropriate software interrupt service routine vme bus transfers dma every card master slave bus standards considerable amount complexity added order support various transfer types master/slave selection instance isa bus features added alongside existing channels model whereby communications handled host cpu makes vme considerably simpler conceptual level powerful though requires complex controllers card developing and/or troubleshooting vme bus examination hardware signals important logic analyzers bus analyzers tools collect analyze decode store signals people view high-speed waveforms leisure vita offers comprehensive faq assist front end design development vme systems computers using vmebus include
[ 8708, 7045, 7302, 7049, 3594, 10104, 5270, 408, 2201, 3098, 7709, 799, 9633, 2723, 5671, 7849, 4396, 6904, 8625, 434, 3762, 6329, 11321, 5439, 7104, 10051, 3780, 3142, 2895, 5457, 10833, 9686, 10332, 6624, 9955, 4581, 7269, 5863, 11627, 1...
Test
6,188
9
Matita:matita matita experimental proof assistant development computer science department university bologna tool aiding development formal proofs man-machine collaboration providing programming environment formal specifications executable algorithms automatically verifiable correctness certificates naturally coexist matita based dependent type system known calculus co inductive constructions derivative calculus constructions compatible extent coq word matita means pencil italian simple widespread editing tool reasonably small simple application whose architectural software complexity meant mastered students providing tool particularly suited testing innovative ideas solutions matita adopts tactic-based editing mode xml-encoded proof objects produced storage exchange existential variables native matita allowing simpler management dependent goals matita implements bidirectional type inference algorithm exploiting inferred expected types power type inference system refiner augmented mechanism hints helps synthetizing unifiers particular situations specified user matita supports sophisticated disambiguation strategy based dialog parser typechecker interactive level system implements small step execution structured tactics allowing much better management proof development naturally leading structured readable scripts matita employed cerco certified complexity fp7 european project focused development formally verified complexity preserving compiler large subset c assembler mcs-51 microprocessor matita tutorial provides pragmatic introduction main functionalities matita interactive theorem prover offering guided tour set trivial examples field software specification verification
[ 8924, 5796, 8511, 415, 823, 8926, 7983, 369, 4791, 5399, 6239, 479 ]
Test
6,189
5
Vsftpd:vsftpd vsftpd secure ftp daemon ftp server unix-like systems including linux licensed gnu general public license supports ipv6 ssl vsftpd supports explicit since 2.0.0 implicit since 2.1.0 ftps vsftpd default ftp server ubuntu centos fedora nimblex slackware rhel linux distributions july 2011 discovered vsftpd version 2.3.4 downloadable master site compromised users logging compromised vsftpd-2.3.4 server may issue smileyface username gain command shell port 6200 issue security hole vsftpd instead unknown attacker uploaded different version vsftpd contained backdoor since site moved google app engine
[ 7364, 3717, 1062, 10149, 8957, 107, 7983, 8368, 5397, 823, 4349, 5470 ]
None
6,190
1
SQLBits:sqlbits sqlbits largest community-led sql server microsoft data platform conference europe founded 2007 group individuals passionate microsoft sql server azure product suite volunteers include committee members speakers helpers industry sponsors come together provide microsoft sql server education sqlbits held year sessions recorded hosted sqlbits website freely available everyone download one key principles sqlbits community led conference located one specific area uk instead conference reaches sql server community moving event around uk 16 sqlbits conferences date key dates locations listed
[ 11030, 1935 ]
Test
6,191
9
DataViva:dataviva dataviva information visualization engine created strategic priorities office government minas gerais dataviva makes official data exports industries locations occupations available entirety brazil eight apps 100 million possible visualizations first set datum – also available aliceweb – provided mdic ministry development industry foreign trade secex secretariat foreign trade official institution government brazil shows foreign trade statistics exporting municipalities country database provided ministério trabalho e emprego mte – ministry labor employment shows information industries occupations brazil rais – annual social information report platform consists eight core applications allows different ways visualizing data available applications descriptive showing data aggregated various levels simple comparative way treemapping others prescriptive using calculations allow analytic visualization data based theories product space applications generated using d3plus open source javascript library built top d3.js alexander simoes dave landry inspired observatory economic complexity dataviva open data open-source free use tool developed partnership datawheel co-founded mit media lab professor césar hidalgo maintained government minas gerais
[ 8554, 11221, 3462 ]
Test
6,192
3
Socket_M:socket socket mpga478mt cpu interface introduced intel 2006 intel core line mobile processors socket used intel core products well core-derived dual-core xeon codenamed sossaman also used first generation mobile version intel core 2 duo specifically t5x00 t7x00 merom lines referred napa refresh though line switched socket p santa rosa 2007 typically uses intel 945pm/945gm chipsets support 667 mhz fsb intel pm965/gm965 allows 800 mhz fsb support though socket pm965/gm965 combination less common sossaman xeons use e7520 chipset socket pin-compatible desktop socket mpga478a electrically compatible socket pin-compatible older desktop socket 478 mpga478b newer mobile socket p mpga478mn location one pin also incompatible versions older mobile socket 479 pentium iii-m processors designed first version socket 479 physically fit socket electrically incompatible although conflicting information published 45 nm penryn processors released socket
[ 3588, 9611, 5901, 5523, 2455, 3352, 3992, 8855, 3995, 4252, 11417, 6175, 7714, 10019, 4523, 2604, 2350, 9649, 4537, 7105, 4805, 7110, 8394, 3403, 4427, 4179, 3798, 4185, 7002, 9945, 11484, 9570, 10468, 613, 8552, 1260, 4717, 10225, 371, 3...
None
6,193
4
Rohit_Khare:rohit khare rohit khare computer science entrepreneur active many aspects development world wide web founder ångströ co-founder knownow former director commercenet labs key player microformats community holds ph.d. university california irvine bachelors caltech computer science previously worked internet security w3c also active representational state transfer rest community august 2007 authored arrested paper syndication-oriented architecture variant service-oriented architecture
[ 4107, 3941, 119 ]
Test
6,194
2
Event_flag:event flag event flag process synchronization primitive openvms operating system two possible states set cleared following basic primitive operations provided additional synchronization operations event flags either local per-process common accessible one process process set 64 local flags numbered 0-63 also possible associate process 2 sets common event flags come sets 32 process assign numbers 64-95 96-127 come existence first process associates disappear last process removes association every potentially time-consuming asynchronous system call qio among others includes argument specifying number event flag set completion compare semaphore
[ 10590 ]
Test
6,195
4
Australian_Information_Security_Association:australian information security association nationally recognised not-for-profit organisation charity australian information security association aisa champions development robust information security sector building capacity professionals australia advancing cyber security safety australian public well businesses governments australia established 1999 aisa become recognised authority information security australia membership 3000 individuals across country aisa caters domains information security industry particular focus sharing expertise field meetings focus groups networking opportunities around australia aisa vision world people businesses governments educated risks dangers cyber attack data theft enable take reasonable precautions protect independent non-profit association created provide leadership development promotion improvement profession strategic plan calls continued work areas advocacy diversity education organisational excellence aisa hosts australia largest independent not-for-profit cyber security conference australian cyber conference https //cyberconference.com.au/ guidelines provide direction post-nominals represented indicate aisa membership status post-nominals letters placed following person ’ last name indicate aisa membership status encourage members use maisa aaisa faisa applicable post-nominals every opportunity including email sign-offs official letters tender documents etc helps raise profile professional status membership aisa post-nominals listed following order
[ 4435 ]
Validation
6,196
3
Lot_Lot:lot lot player controls one arrow move pellets resemble pachinko balls upper cells four-second delay lower ones without confront evil crab grab player pellets try prevent player scoring cutting elastic crab forced leave board pellets find
[ 10931, 9006 ]
Test
6,197
3
1chipMSX:1chipmsx one chip msx 1chipmsx d4 enterprise distributional name ese msx system 3 re-implementation msx-2 home computer uses single fpga implement electronics except ram msx-2 including msx-music scc+ audio extensions system housed transparent blue plastic box used standard monitor tv pc keyboard original msx cartridges inserted well sd mmc memory cards external storage medium even though lacks 3.5 disk drive disks supported emulation memory card including support booting msx-dos due vhdl programmable hardware possible give device new hardware extensions simply running reconfiguration program msx-dos one chip-msx equipped two usb connectors used adding supporting vhdl code ese msx system 3 designed ese artists factory distributed 1chipmsx d4 enterprise supposed distributed outside japan bazix however due rohs regulations europe claimed could distributed europe original form european market wait adapted version would produced bazix distributed europe bazix however violation rohs ever proven identifiable components pcb power supply rohs-compliant bazix stopped representative msx association thus bring 1chipmsx western market end msx association dissolved due dispute parties involved resulting shift intellectual property rights concerning msx msx licensing corporation bazix also dissolved dispute made end efforts ambitions bring 1chipmsx western market along projects also dependent japanese partners included also default specifications implemented msx system
[ 9006, 7983, 1776, 5265, 3762, 403 ]
None
6,198
6
Romfs:romfs computing romfs rom filesystem extremely simple file system lacking many features intended burning important files onto eeprom available linux possibly unix-like systems useful initial rom holding kernel modules loaded later needed small code wise description filesystem layout available lxr -- romfs.txt bo brantén created romfs file system driver windows nt/2k/xp nikolay aleksandrov written romfs image extraction manipulation tool called romfser primarily targeted bsd family operating systems lack support romfs
[ 9762, 7983, 5397, 823, 2395 ]
Test
6,199
7
Proven_(company):proven company proven hiring tool content hub small businesses across united states proven software allowed managers post jobs 100 job sites including simply hired craigslist indeed proven proven also offered tools allow users sort evaluate message onboard applicants job seekers could apply directly jobs proven mobile apps proven website proven job board partners proven based san francisco california austin texas used 1,000 small businesses throughout united states proven co-founded pablo fuentes sean falconer joe mellin 2009 company privately held seed investment andreessen horowitz greylock partners kapor capital 500 startups founder collective morado ventures angels august 2012 proven launched free proven job search app ios december 2012 proven job search android launched proven job search allows users search apply jobs directly ios android device users also import resume create one directly within app 2013 proven pivoted become hiring tool job board specifically restaurant hospitality industries proven app remains active tool applicants apply jobs early 2015 proven also rolled onboarding feature stores documents allows applicants sign electronically fall 2015 proven expanded hiring tool job board small businesses industries nationwide august 2019 proven announced acquired upward.net job site headquartered newark california
[]
Test
6,200
8
WalkMe:walkme walkme owned walkme inc. software-as-a-service saas company helps users navigate features web-based services walkme digital adoption platform dap works overlaying information tip-balloons browser window balloons break online processes step-by-step instructions according company dap collects data users behaviors action patterns platforms helps users complete online tasks without leaving screen watch video tutorials read manuals faq pages also allows users automatically get specific guidance according preference language walkme inc. founded 2011 dan adika raphael sweary eyal cohen yuval shalom ozanna april 2012 launched product walkme headquarters san francisco california january 2017 walkme acquired abbi startup specializes mobile a/b testing app engagement walkme retired abbi brand integrated services walkme ’ platform process also migrated abbi ’ existing customers april year walkme acquired jaco
[]
Validation
6,201
9
Kyoto_Common_Lisp:kyoto common lisp kyoto common lisp kcl implementation common lisp taichi yuasa masami hagiya written c run unix-like operating systems kcl compiled ansi c. conforms common lisp described 1984 first edition guy steele book common lisp language available licence agreement kcl notable implemented scratch outside standard committee solely basis specification one first common lisp implementations ever exposed number holes mistakes specification gone unnoticed
[ 4865, 2438, 9865, 2062, 9877, 4122, 1448, 9128, 4779, 8883, 6969, 8258, 8771, 4550, 11083, 8908, 1613, 9299, 1365, 2392, 6493, 3176, 2667, 5492, 1397, 5494, 2045, 4606 ]
Test
6,202
1
Global_Ideas_Bank:global ideas bank global ideas bank origins lie institute social inventions set 1985 nicholas albery social inventor visionary small beginnings network inventors quarterly newsletter institute grew full-fledged organisation leadership producing annual compendium running social inventions workshops promoting creative solutions around world part first european social innovations exchange 2001 institute awarded margaret mead special recognition award community creativity new century 1995 global ideas bank originally suggested american correspondent gregory wright first established online since become name entire project work work several volunteer programmers technical wizards especially flemming funch new civilization network new features added online submission voting systems categorisation message board
[ 7114, 4651 ]
None
6,203
3
Zilog_Encore!_32:zilog encore 32 zilog encore 32 arm9-based microcontroller zilog inc company second attempt produce arm-based controllers system-on-a-chip includes integrated memory controller interfaces universal serial bus usb liquid crystal display lcd serial peripheral interface bus spi variants include version supporting magnetic stripe reader smart card reader toolkit also includes linux support
[ 4682, 2573, 9745, 823, 4569, 1501 ]
None
6,204
4
Shell_Control_Box:shell control box shell control box scb network security appliance controls privileged access remote systems records activities replayable audit trails prevents malicious actions example records system administrator updates file server third-party network operator configures router recorded audit trails replayed like movie review events occurred content audit trails indexed make searching events automatic reporting possible scb linux-based device developed balabit application level proxy gateway 2017 balabit changed name product privileged session management psm repositioned core module privileged access management solution balabit ’ privileged session management psm shell control box scb device controls monitors audits remote administrative access servers network devices tool oversee system administrators controlling encrypted connections used administration psm scb full control ssh rdp telnet tn3270 tn5250 citrix ica vnc connections providing framework solid boundaries work administrators psm scb acts authentication gateway enforcing strong authentication users access assets psm also integrate user directories example microsoft active directory resolve group memberships users access protected servers credentials accessing server retrieved transparently psm ’ credential store third-party password management system psm impersonating authenticated user automatic password retrieval protects confidentiality passwords users never access psm controls audits privileged access wide-spread protocols ssh rdp http detailed access management helps control access servers also possible control advanced features protocols like type channels permitted example unneeded channels like file transfer file sharing disabled reducing security risk server psm policies privileged access enforced one single system avoid accidental misconfiguration human errors psm supports 4-eyes authorization principle achieved requiring authorizer allow administrators access server authorizer also possibility monitor – terminate session administrator real-time watching screen psm monitor network traffic real time execute various actions certain pattern example suspicious command window title text appears screen psm also detect specific patterns credit card numbers case detecting suspicious user action psm send e-mail alert immediately terminate connection example psm block connection destructive administrator command „ rm ” comes effect psm makes user activities traceable recording tamper-proof confidential audit trails records selected sessions encrypted timestamped digitally signed audit trails audit trails browsed online followed real-time monitor activities users psm replays recorded sessions like movie – actions users seen exactly appeared monitor balabit desktop player enables fast forwarding replays searching events example typed commands pressing enter texts seen user case problems database manipulation unexpected shutdown etc circumstances event readily available trails thus cause incident identified addition recording audit trails transferred files also recorded extracted analysis
[ 4965, 11112, 823, 5433, 10747 ]
Test
6,205
5
Transmux:transmux transmux transcode-multiplexing signaling format change telecommunications signaling synchronous optical network signals sonet asynchronous ds3 signals ds3 signal multiplexed 28 individual ds1 signals bit-interleaved fashion framing overhead determined intervals sonet differs approach using byte-interleaved synchronous multiplexing technique several variations payload types sonet payload carry multiplexed lower rate streams ds1 e1 ds3 etc well octet-based format tcp/ip atm frame relay ethernet etc cross-connect capability maintained vt1.5 level individual ds1 signals extracted parent ds3 electrical t1 transmuxed individually vt1.5 complete ds3 signal delivered sonet drop entire ds3 transmuxed intact sts container subsequent cross-connect capability exists sonet payload vt1.5 level white rock networks description product transmux support applications conversion ds3 vt1.5 mapped sts-1s required transmux allows ds3 embedded within sts-1 circuit adapted vt1.5 mapped sts-1 without physically terminating circuit ds3 ec-1
[ 8192 ]
Validation
6,206
4
Patch-through_access:patch-through access patch-through access refers security clearance used various applications according application may regarded high low level security clearance
[]
Test
6,207
2
Comparison_of_real-time_operating_systems:comparison real-time operating systems list real-time operating systems rtos operating system time taken process input stimulus less time lapsed next input stimulus type
[ 7170, 5638, 8720, 6675, 2073, 7745, 7234, 7235, 2137, 7774, 5220, 1126, 9320, 9835, 3185, 11383, 5754, 2179, 6276, 10883, 4743, 6797, 2704, 1170, 659, 9366, 7319, 9368, 2201, 5786, 9371, 4773, 682, 9391, 2224, 11447, 1221, 8902, 9927, 992...
Test
6,208
0
Chatbot:chatbot chatbot piece software conducts conversation via auditory textual methods programs often designed convincingly simulate human would behave conversational partner although 2019 far short able pass turing test chatbots typically used dialog systems various practical purposes including customer service information acquisition chatbots use sophisticated natural language processing systems many simpler ones scan keywords within input pull reply matching keywords similar wording pattern database term chatterbot originally coined michael mauldin creator first verbot julia 1994 describe conversational programs today chatbots accessed via virtual assistants google assistant amazon alexa via messaging apps facebook messenger wechat via individual organizations apps websites chatbots classified usage categories conversational commerce e-commerce via chat analytics communication customer support design developer tools education entertainment finance food games health hr marketing news personal productivity shopping social sports travel utilities beyond chatbots conversational ai refers use messaging apps speech-based assistants chatbots automate communication create personalized customer experiences scale 1950 alan turing famous article computing machinery intelligence published proposed called turing test criterion intelligence criterion depends ability computer program impersonate human real-time written conversation human judge sufficiently well judge unable distinguish reliably—on basis conversational content alone—between program real human notoriety turing proposed test stimulated great interest joseph weizenbaum program eliza published 1966 seemed able fool users believing conversing real human however weizenbaum claim eliza genuinely intelligent introduction paper presented debunking exercise artificial intelligence ... machines made behave wondrous ways often sufficient dazzle even experienced observer particular program unmasked inner workings explained ... magic crumbles away stands revealed mere collection procedures ... observer says could written thought moves program question shelf marked intelligent reserved curios ... object paper cause re-evaluation program explained programs ever needed eliza key method operation copied chatbot designers ever since involves recognition clue words phrases input output corresponding pre-prepared pre-programmed responses move conversation forward apparently meaningful way e.g responding input contains word 'mother 'tell family thus illusion understanding generated even though processing involved merely superficial eliza showed illusion surprisingly easy generate human judges ready give benefit doubt conversational responses capable interpreted intelligent interface designers come appreciate humans readiness interpret computer output genuinely conversational—even actually based rather simple pattern-matching—can exploited useful purposes people prefer engage programs human-like gives chatbot-style techniques potentially useful role interactive systems need elicit information users long information relatively straightforward falls predictable categories thus example online help systems usefully employ chatbot techniques identify area help users require potentially providing friendlier interface formal search menu system sort usage holds prospect moving chatbot technology weizenbaum shelf ... reserved curios marked genuinely useful computational methods classic historic early chatbots eliza 1966 parry 1972 recent notable programs include a.l.i.c.e. jabberwacky d.u.d.e agence nationale de la recherche cnrs 2006 eliza parry used exclusively simulate typed conversation many chatbots include functional features games web searching abilities 1984 book called policeman beard half constructed published allegedly written chatbot racter though program released would capable one pertinent field ai research natural language processing usually weak ai fields employ specialized software programming languages created specifically narrow function required example a.l.i.c.e uses markup language called aiml specific function conversational agent since adopted various developers called alicebots nevertheless a.l.i.c.e still purely based pattern matching techniques without reasoning capabilities technique eliza using back 1966 strong ai would require sapience logical reasoning abilities jabberwacky learns new responses context based real-time user interactions rather driven static database recent chatbots also combine real-time learning evolutionary algorithms optimise ability communicate based conversation held still currently general purpose conversational artificial intelligence software developers focus practical aspect information retrieval chatbot competitions focus turing test specific goals two annual contests loebner prize chatterbox challenge latter offline since 2015 however materials still found web archives chatbots used diverse fashion across verticals many different types channel e.g websites social messaging etc business application accelerated rapidly 2019 leading van baker research vice president gartner predict “ 2020 50 medium large enterprises deployed product chatbots many companies chatbots run messaging apps simply via sms used b2c customer service sales marketing 2016 facebook messenger allowed developers place chatbots platform 30,000 bots created messenger first six months rising 100,000 september 2017 since september 2017 also part pilot program whatsapp airlines klm aeroméxico announced participation testing airlines previously launched customer services facebook messenger platform bots usually appear one user contacts sometimes act participants group chat many banks insurers media companies e-commerce companies airlines hotel chains retailers health care providers government entities restaurant chains used chatbots answer simple questions increase customer engagement promotion offer additional ways order 2017 study showed 4 companies used chatbots according 2016 study 80 businesses said intended one 2020 previous generations chatbots present company websites e.g ask jenn alaska airlines debuted 2008 expedia virtual customer service agent launched 2011 newer generation chatbots includes ibm watson-powered rocky introduced february 2017 new york city-based e-commerce company rare carat provide information prospective diamond buyers used marketers script sequences messages similar autoresponder sequence sequences triggered user opt-in use keywords within user interactions trigger occurs sequence messages delivered next anticipated user response user response used decision tree help chatbot navigate response sequnces deliver correct response message companies explore ways use chatbots internally example customer support human resources even internet-of-things iot projects overstock.com one reportedly launched chatbot named mila automate certain simple yet time-consuming processes requesting sick leave large companies lloyds banking group royal bank scotland renault citroën using automated online assistants instead call centres humans provide first point contact saas chatbot business ecosystem steadily growing since f8 conference facebook mark zuckerberg unveiled messenger would allow chatbots app large companies like hospitals aviation organizations architects designing reference architectures intelligent chatbots used unlock share knowledge experience organization efficiently reduce errors answers expert service desks significantly intelligent chatbots make use kinds artificial intelligence like image moderation natural language understanding nlu natural language generation nlg machine learning deep learning nowadays high majority high-tech banking organizations looking integration automated ai-based solutions chatbots customer service order provide faster cheaper assistance clients becoming increasingly technodexterous particularly chatbots efficiently conduct dialogue usually substituting communication tools email phone sms banking area major application related quick customer service answering common requests transactional support several studies accomplished analytics agencies juniper gartner report significant reduction cost customer services leading billions dollars economy next 10 years gartner predicts integration 2020 chatbots least 85 client applications customer service juniper study announces impressive amount 8 billion retained annually 2022 due use chatbots since 2016 facebook allows businesses deliver automated customer support e-commerce guidance content interactive experiences chatbots large variety chatbots facebook messenger platform developed 2016 russia-based tochka bank launched world first facebook bot range financial services particularly including possibility making payments july 2016 barclays africa also launched facebook chatbot making first bank africa france third largest bank total assets société générale launched chatbot called sobot march 2018 80 users sobot express satisfaction tested il never remplace expertise provided human advisor according sg deputy director bertrand cozzarolo several potential advantages using chatbots interaction customer banking chatbots also incorporated devices primarily meant computing toys hello barbie internet-connected version doll uses chatbot provided company toytalk previously used chatbot range smartphone-based characters children characters behaviors constrained set rules effect emulate particular character produce storyline ibm watson computer used basis chatbot-based educational toys companies cognitoys intended interact children educational purposes process building testing deploying chatbots done cloud-based chatbot development platforms offered cloud platform service paas providers oracle cloud platform snatchbot ibm watson cloud platforms provide natural language processing artificial intelligence mobile backend service chatbot development api companies like microsoft azure aarc currently providing bot engines chatbot platforms software developed malicious chatbots frequently used fill chat rooms spam advertisements mimicking human behavior conversations entice people revealing personal information bank account numbers commonly found yahoo messenger windows live messenger aol instant messenger instant messaging protocols also published report chatbot used fake personal ad dating service website tay ai chatbot learns previous interaction caused major controversy due targeted internet trolls twitter bot exploited 16 hours began send extremely offensive tweets users suggests although bot learnt effectively experience adequate protection put place prevent misuse text-sending algorithm pass human instead chatbot message would credible therefore human-seeming chatbots well-crafted online identities could start scattering fake news seem plausible instance making false claims presidential election enough chatbots might even possible achieve artificial social proof creation implementation chatbots still developing area heavily related artificial intelligence machine learning provided solutions possessing obvious advantages important limitations terms functionalities use cases however changing time common ones listed chatbots increasingly present businesses often used automate tasks require skill-based talents customer service taking place via messaging apps well phone calls growing numbers use-cases chatbot deployment gives organisations clear return investment call centre workers may particularly risk ai-driven chatbots study forrester june 2017 predicts 25 today jobs likely impacted ai technologies 2019
[ 5122, 4995, 3460, 10242, 2440, 2059, 1036, 6798, 11408, 11538, 10231, 1044, 5399, 3610, 538, 3228, 10271, 3105, 7333, 9511, 11692, 7599, 9519, 4531, 4662, 3127, 2488, 8758, 1467, 4923, 10557, 10748, 6982, 6855, 2760, 1738, 2892, 3533, 5197,...
Validation
6,209
4
DNS_rebinding:dns rebinding dns rebinding form computer attack attack malicious web page causes visitors run client-side script attacks machines elsewhere network theory same-origin policy prevents happening client-side scripts allowed access content host served script comparing domain names essential part enforcing policy dns rebinding circumvents protection abusing domain name system dns attack used breach private network causing victim web browser access computers private ip addresses return results attacker also employed use victim machine spamming distributed denial-of-service attacks malicious activities attacker registers domain attacker.com delegates dns server attacker control server configured respond short time live ttl record preventing dns response cached victim browses malicious domain attacker dns server first responds ip address server hosting malicious client-side code instance could point victim browser website contains malicious javascript flash scripts intended execute victim computer malicious client-side code makes additional accesses original domain name attacker.com permitted same-origin policy however victim browser runs script makes new dns request domain attacker replies new ip address instance could reply internal ip address ip address target somewhere else internet following techniques attempt prevent dns rebinding attacks
[ 3462, 2887, 5543, 8998, 138, 11250, 11221, 5078, 8054, 2558 ]
Test
6,210
2
Shadow_RAM_(Acorn):shadow ram acorn shadow ram acorn bbc microcomputer master-series microcomputer special framebuffer implementation free main memory permit double-buffered graphics bbc micro master-series machines used 8-bit 6502 65c102 processors 16-bit address space address space split 32 kb ram 0x0000 0x7fff 16 kb sideways paged address space 0x8000 0xbfff 16 kb operating system space 0xc000 0xffff video memory allocated 0x7fff downwards necessary 1 kb teletext mode 7 20 kb modes 0-2 32 kb ram available video memory could eat sizable amount memory shadow ram 20 kb block ram sits outside real address space accessed via operating system calls framebuffer running shadow ram memory normally used video free program use shadow ram activated setting most-significant bit memory mode number example use mode 1 shadow ram enabled request mode 129 128 1 switching main shadow memory alternate frames double-buffered video could used acorn provided demonstration program basic showing scrolling cloud animation without double buffering video game firetrack would also use double buffering shadow ram present shadow ram fitted standard model b+ bbc micro bbc master series optional third-party extra feature model model b bbc micro systems
[ 6499, 1801, 8429, 7983, 7281, 9563 ]
Test
6,211
4
Federal_Information_Security_Modernization_Act_of_2014:federal information security modernization act 2014 federal information security modernization act 2014 pub.l 113-283 s. 2521 commonly referred fisma reform signed federal law president barack obama december 18 2014 passed response increasing amount cyber attacks federal government amended existing laws enable federal government better respond cyber attacks departments agencies earlier version legislation proposed house oversight government reform chairman darrell issa co-sponsored committee ranking member elijah cummins h.r.1163 federal information security amendments act 2013 bill passed u.s. house representatives vote 416-0 final version legislation introduced united states senate committee homeland security governmental affairs thomas carper d–de june 24 2014 passed december 8 2014 senate december 10 2014 house
[ 4689, 5780 ]
None
6,212
2
ColorOS:coloros coloros operating system created oppo electronics based google operating system android presently oppo launched 6th version major difference google stock android oppo coloros latter additional features features include customizable gestures screen screen communication phone manager lock screen magazines options long screen shot eye protection changing warmer color temperature ftp server others coloros respects looks similar ios made apple coloros removes many settings well ability restrict app background data usage removed data settings entry users may set alarms mobile data reaches certain limit opposed stock android also automatically turn mobile data moreover coloros manages ram peculiarly allows apps games run background forever apps n't force stopped apps individual settings list coloros releases 3.^ https //c.realme.com/in/board/detail/1057096670929485824
[ 5637, 8719, 3600, 7700, 9244, 11294, 1578, 5677, 1083, 69, 8262, 4685, 3664, 8280, 8285, 2658, 11391, 1670, 5262, 10393, 7835, 673, 8870, 1191, 196, 7364, 8907, 2259, 8413, 9949, 1255, 8940, 5892, 7428, 2828, 280, 10009, 10525, 798, 288, ...
Test
6,213
3
Linux_console:linux console linux console system console internal linux kernel system console device receives kernel messages warnings allows logins single user mode linux console provides way kernel processes send text output user receive text input user user typically enters text computer keyboard reads output text computer monitor linux kernel supports virtual consoles consoles logically separate access physical keyboard display linux console linux virtual consoles implemented vt subsystem linux kernel rely user space software contrast terminal emulator user space process emulates terminal typically used graphical display environment linux console one first features kernel originally written linus torvalds 1991 see history linux two main implementations framebuffer text mode framebuffer implementation default modern linux distributions together kernel mode setting provides kernel-level support display hardware features showing graphics system booting legacy text mode implementation used pc-compatible systems cga ega mda vga graphics cards non-x86 architectures used framebuffer mode graphics cards implement text mode linux console uses fixed-size bitmap monospace fonts usually defaulting 8x16 pixels per character linux console optional kernel feature embedded linux systems enable systems typically provide alternative user interface e.g web based boot immediately graphical user interface use primary means interacting user implementations linux console include braille console support refreshable braille displays serial port console linux console provides way kernel processes output text-based messages user receive text-based input user linux several devices used system console virtual terminal serial port usb serial port vga text-mode framebuffer modern linux-based systems deprecated kernel based text-mode input output instead show graphical logo progress bar system booting followed immediate start graphical user interface e.g x.org server desktop distributions surfaceflinger android kernel boot console commonly used display boot log kernel boot log includes information detected hardware updates status boot procedure point time kernel software running hence logging via user-space e.g syslog possible console provides convenient place output information kernel finished booting runs init process also sending output console handles booting rest system including starting background daemons init boot process complete console used multiplex multiple virtual terminals accessible pressing ctrl-alt-f1 ctrl-alt-f2 etc. ctrl-alt-leftarrow ctrl-alt-rightarrow using chvt virtual terminal getty process run turn runs /bin/login authenticate user authentication command shell run virtual terminals like console supported linux kernel level linux console implements terminal type linux escape sequences uses console_codes man page virtual consoles allow storage multiple text buffers enabling different console programs run simultaneously interact user different contexts user point view creates illusion several independent consoles virtual console character set keyboard layout linux 2.6 introduced ability load different font virtual console kernel versions predating 2.6 change font demand text mode implementation used pc-based systems legacy cga/ega/mda/vga video card implements text-based video modes text mode kernel sends 2d array characters video card video card converts characters pixels display text buffer part vga memory describes content text screen terms code points character attributes code points text buffer font generally encoding used text terminal semantics put characters screen set glyphs screen determined current font text screen handled console.c consolemap.c drivers utility altering fonts terminal encodings called consolechars linux kernel keyboard.c driver almost complete support keyboard input keyboard layouts remains bit inconsistent interacts badly different character sets layouts loaded loadkeys utility two utilities corresponding data files packed linux console tools http //lct.sourceforge.net/ shipped many linux distributions efforts internationalization linux kernel level started early 1994 markus kuhn andries brouwer linux console capable supporting vga-style text mode kernel limited means set modes svgatextmode helps enable complex text modes standard ega vga modes fully compatible console tools conflicts dosemu svgalib display servers currently support different modes different virtual consoles microsoft windows version fully functional support console comparable feature application software win32 console linux framebuffer fbdev graphic hardware-independent abstraction layer originally implemented allow linux kernel emulate text console systems apple macintosh text-mode display offers kernel space text mode emulation platform advantage currently unmaintained svgatextmode reliance better hardware compatibility also permits overpass technical restrictions vga text modes linux framebuffer console differs vga one ways drawing characters processing keyboard events virtual consoles ’ support exactly linux serial console console implementation via serial port enabled option config_serial_console kernel configuration may used embedded systems servers direct interaction operator expected serial console allows mode access system usually slower speed due small bandwidth rs-232 serial console often used development software embedded systems sometimes left accessible via debug port console responds number control characters press escape key console also supports extended escape sequences ansi csi mode sequences dec private mode sequences extended sequences control colors visual effects like blinking underline intensity inverse video bell tone frequency duration vesa screen blanking interval aside textual blanking known way place vga adapter standby kmscon projects aims create modern user-space replacement linux console development priorities include support multi-monitor setups unicode font rendering pango xkb keyboard handling gpu opengl acceleration complaints current kernel implementation include user-interface kernel-space code poorly maintained handles keyboards badly produces bad font rendering misses mode-setting multi-head support contains multi-seat awareness limited hot-plugging handling limited vt102 compliance
[ 4616, 3082, 10253, 5139, 10780, 10785, 6180, 8242, 9266, 4161, 8772, 8268, 589, 593, 6244, 5222, 10856, 4207, 5243, 5244, 4734, 11391, 6273, 7812, 6797, 4238, 7821, 10382, 2195, 2711, 6808, 9882, 7325, 1694, 2723, 8364, 10933, 5815, 5822, ...
Test
6,214
5
Gateway_Load_Balancing_Protocol:gateway load balancing protocol gateway load balancing protocol glbp cisco proprietary protocol attempts overcome limitations existing redundant router protocols adding basic load balancing functionality addition able set priorities different gateway routers glbp allows weighting parameter set based weighting compared others virtual router group arp requests answered mac addresses pointing different routers thus default load balancing based traffic load rather number hosts use gateway router default glbp load balances round-robin fashion glbp elects one avg active virtual gateway group group members act backup case avg failure case two members second best avg placed standby state members placed listening state monitored using hello holdtime timers 3 10 seconds default elected avg assigns virtual mac address member glbp group including thus enabling avfs active virtual forwarders avf assumes responsibility forwarding packets sent virtual mac address could four avfs time default glbp routers use local multicast address 224.0.0.102 send hello packets peers every 3 seconds udp 3222 source destination cisco implemented ipv6 support glbp ios release 12.2 33 sxi
[ 841, 8073, 6834, 7411, 5437, 5470 ]
Test
6,215
9
State_space_enumeration:state space enumeration computer science state space enumeration methods consider reachable program state determine whether program satisfies given property programs increase size complexity state space grows exponentially state space used methods reduced maintaining parts state space relevant analysis however use state memory reduction techniques makes runtime major limiting factor
[]
None
6,216
3
MirrorLink:mirrorlink mirrorlink device interoperability standard offers integration smartphone car infotainment system mirrorlink transforms smartphones automotive application platforms apps hosted run smartphone drivers passengers interact steering wheel controls dashboard buttons touch screens car in-vehicle infotainment ivi system mirrorlink utilizes set well-established non-proprietary technologies ip usb wi-fi bluetooth real-time protocol rtp audio universal plug play upnp addition mirrorlink uses virtual network computing vnc baseline protocol display user interface smartphone applications infotainment system screens communicate user input back mobile device mirrorlink started research project researcher jörg brakensiek nokia research center palo alto us took results nobounds project—invented researcher bernd steinke nokia research center bochum germany—and applied automotive domain initial approach applied bernd steinke contained three specialised sub-protocols optimal power efficiency 2d 3d media support 2d graphics composition via x11 mirroring needed requirements chosen source device nokia n800 mobile linux device desire speed demo availability show mirroring use cases opengl es used fast 3d graphics alpha based porter-duff compositing shine-through 2d effects make future relevant approach available limited n800 mesa 3d used local playback high definition media streaming implemented via openmax rtp timed sideband control allow synchronous displayed streaming original video file without transcoding initial implementations remoted gui games media content nokia n800 later n810 mobile linux device demonstration time expected capabilities mobile devices widely reported parallel member ce4a company seen initial results contacted nokia collaboration nokia ce4a started first ideas published demonstrated using nokia n810 internet tablet ieee ccnc 2009 conference together two researchers raja bose keun-young park nokia research center palo alto close collaboration consumer electronics automotive ce4a group german car manufacturer original terminal mode concept created name terminal mode originated name expert group within ce4a created positioning paper nokia together magneti marelli publicly demonstrated first terminal mode concept navteq connection event conjunction frankfurt international auto show iaa september 2009 first car integration shown geneva auto show march 2010 using nokia n97 prototype implementation terminal mode integrated valmet concept car draft 0.9 specification version released march 2010 july 2010 terminal mode presented integrated vw passat mobilebeat 2010 first real live demonstration seen september 2010 shortly terminal mode specification became public 6 october 2010 early adopters included continental alpine clarion collaboration nokia ce4a terminal mode led formation car connectivity consortium car connectivity consortium brought together major players automotive mobile device industries including large number tier-i suppliers even network providers 12 september 2011 terminal mode renamed mirrorlink became commercial trademark owned car connectivity consortium may 2012 car connectivity consortium 56 members included almost major automobile mobile device manufacturers world car connectivity consortium made various auto electronic manufacturers joined together establish industry standard certifying apps devices safe useful drivers called mirrorlink joint effort car manufacturers phone makers aimed developing open standards define operations smartphones linked cars unique element mirrorlink ability show smartphone interface variety mobile os platforms audio head-unit display mirrorlink currently works symbian phones nokia belle phones s60v5 phones many manufacturers samsung galaxy series android lollipop 5.0 sony xperia z series android phones sony audio launched two audio head units 2012 q2 mirrorlink compliant phone maker motorola audio head unit maker alpine also members group supporting mirrorlink alpine offer mirrorlink based aftermarket systems us 2013 vw offer mirrorlink based infotainment systems starting 2nd generation mib infotainment hardware starting 2014 new polo india maruti suzuki ciaz scross ertiga baleno hatchback vitara brezza car models also infotainment system mirrorlink feature
[ 5472, 1537, 5019, 9381, 199, 7983, 5620, 7700, 1083 ]
Validation
6,217
7
Emergent_Payments:emergent payments emergent payments online payments company focusing offering local payment methods global markets digital companies company based palo alto california previously company named live gamer june 2015 changed name emergent payments indicate shift gaming e-commerce broader market digital payments company also sold microtransactions engine elements focus fully online payments firm originated 2008 live gamer new york pay+ emergent payments saas-based payments platform service offers 200 payment methods 180 countries
[ 467 ]
None
6,218
2
TUNIS:tunis tunis toronto university system unix-like operating system developed university toronto early 1980s tunis portable operating system compatible unix v7 completely redesigned kernel written concurrent euclid programs ran unix v7 could run tunis modification tunis designed teaching intended provide model design well-structured highly portable easily understood unix-like operating systems made extensive use concurrent euclid modules isolate machine dependencies provide clean internal structure information hiding concurrent euclid built-in processes synchronization features make easy understand maintain tunis targeted pdp-11 motorola 6809 68000 national semiconductor 32016 architectures supported distribution across multiple cpus using concurrent euclid synchronization features
[ 2179, 6787, 6412, 5397, 1304, 3487, 3241, 7983, 3248, 2995, 9141, 823, 9784, 9151, 10436, 8262, 6369, 9444, 5492, 2424, 633, 11132 ]
Test
6,219
1
Prepared_statement:prepared statement database management systems dbms prepared statement parameterized statement feature used execute similar database statements repeatedly high efficiency typically used sql statements queries updates prepared statement takes form template certain constant values substituted execution typical workflow using prepared statement follows compared executing statements directly prepared statements offer two main advantages hand query executed server-side prepared statements slower additional round-trip server implementation limitations may also lead performance penalties example versions mysql cache results prepared queries stored procedure also precompiled stored server later execution similar advantages unlike stored procedure prepared statement normally written procedural language use modify variables use control flow structures relying instead declarative database query language due simplicity client-side emulation prepared statements portable across vendors major dbmss including mysql oracle db2 microsoft sql server postgresql widely support prepared statements prepared statements normally executed non-sql binary protocol efficiency protection sql injection dbmss mysql prepared statements also available using sql syntax debugging purposes number programming languages support prepared statements standard libraries emulate client side even underlying dbms support including java jdbc perl dbi php pdo python db-api client-side emulation faster queries executed reducing number round trips server usually slower queries executed many times resists sql injection attacks equally effectively many types sql injection attacks eliminated disabling literals effectively requiring use prepared statements h2 supports feature example uses java jdbc java codice_1 provides setters codice_2 etc major built-in data types example uses php pdo example uses perl dbi example uses c ado.net ado.net codice_3 accept type codice_4 parameter codice_5 type conversion occurs automatically note use named parameters i.e codice_6 rather codice_7—this allows use parameter multiple times arbitrary order within query command text however addwithvalue method used variable length data types like varchar nvarchar .net assumes length parameter length given value rather getting actual length database via reflection consequence different query plan compiled stored different length general maximum number duplicate plans product lengths variable length columns specified database reason important use standard add method variable length columns paramlength length specified database since standard add method needs used variable length data types good habit use parameter types example uses python db-api example uses direct sql fourth generation language like edeveloper unipaas magic xpa magic software enterprises purebasic since v5.40 lts manage 7 types link following commands setdatabaseblob setdatabasedouble setdatabasefloat setdatabaselong setdatabasenull setdatabasequad setdatabasestring 2 different methods depending type database sqlite odbc mariadb/mysql use postgresql use 1 2 3 ...
[ 899, 8644, 10340, 8582, 8554, 1579, 6636, 5677, 7022, 9263, 2544, 10413, 8539, 11030, 5403 ]
Test
6,220
4
Reliance_authentication:reliance authentication reliance authentication part trust-based identity attribution process whereby second entity relies upon authentication processes put place first entity second entity creates element unique specific purpose retrieved accessed authentication processes first entity first met reliance authentication achieved one tokens random characteristics transmitted secure area controlled first entity secure area accessible person authorised use account secure area may online banking portal telephone banking system mobile banking application token often form single plural debit credits financial account numerical values debit credits form token whose numeric value confirmed account holder token retrieved cardholder accessing secure area first entity secure area protected accessible satisfying first entity authentication means case financial services authentication access secure area normally includes multi-factor sepa would likely involve strong authentication transmission requirement retrieve token adds challenge response factor overall authentication process considered point view second party generates transmits token token may generated second party dynamically thus act one-time password reliance authentication method particular application financial instruments credit cards e-mandate direct debit transactions whereby person may instigate transaction financial instrument however financial instrument verified belonging person person confirms value token reliance method often incorporates out-of-band response means tokens retrieved secure area reliance authentication uses multi-step inputs ensure user fraud everyone uses even aware examples include introduction strong customer authentication online payment transactions within european union links verified person account person identified accordance statutory requirements prior account opened reliance authentication makes use pre-existing accounts piggyback services upon accounts providing original source 'reliable concept reliability legal one derived various anti money laundering aml counter-terrorism funding ctf legislation usa eu28 australia singapore new zealand second parties may place reliance customer due diligence process first party first party say financial institution australian legislation 'reliance based upon section 38 anti-money laundering counter-terrorism financing act 2006 cth european commission proposal directive european parliament council prevention use financial system purpose money laundering terrorist financing reliance based upon article 11 1 reliance uk specific meaning relates process regulation 17 money laundering regulations 2007 reliance purpose aml reliance authentication although use similar concepts federal financial institutions examination council united states america ffiec issued authentication internet banking environment dated october 2005 reliance authentication outlined per final paragraph page 14 advantages reliance authentication methods disadvantages reliance authentication methods
[ 11619, 4965, 519, 11244, 6064, 5433 ]
Validation
6,221
2
Virtual_memory_compression:virtual memory compression virtual memory compression also referred ram compression memory compression memory management technique utilizes data compression reduce size number paging requests auxiliary storage virtual memory compression system paging requests compressed stored physical memory usually random-access memory ram sent compressed auxiliary storage hard disk drive hdd solid-state drive ssd cases virtual memory range whose contents compressed paging request marked inaccessible attempts access compressed pages trigger page faults reversal process retrieval auxiliary storage decompression footprint data paged reduced compression process first instance freed ram returned available physical memory pool compressed portion kept ram second instance compressed data sent auxiliary storage resulting i/o operation smaller therefore takes less time implementations including zswap zram helix software company ’ hurricane entire process implemented software systems ibm mxt compression process occurs dedicated processor handles transfers local cache ram virtual memory compression distinct garbage collection gc systems remove unused memory blocks cases consolidate used memory regions reducing fragmentation improving efficiency virtual memory compression also distinct context switching systems connectix ram doubler though also online compression apple os 7.1 inactive processes suspended compressed whole reducing i/o activity caused paging requests virtual memory compression produce overall performance improvements degree performance improvement depends variety factors including availability compression co-processors spare bandwidth cpu speed i/o channel speed physical memory compressibility physical memory contents multi-core multithreaded cpus benchmarks show performance improvements 50 situations embedded devices auxiliary storage limited non-existent cases virtual memory compression allow virtual memory system operate otherwise virtual memory would disabled allows system run certain software would otherwise unable operate environment virtual memory flash memory certain endurance limitations maximum number erase cycles undergo low 100 erase cycles systems flash memory used auxiliary storage system implementing virtual memory compression reduce total quantity data written auxiliary storage improving system reliability one primary issues degree contents physical memory compressed real-world loads program code much data held physical memory often highly compressible since efficient programming techniques data architectures designed automatically eliminate redundancy data sets various studies show typical data compression ratios ranging 2:1 2.5:1 program data similar typically achieval compression ratios disk compression order virtual memory compression provide measurable performance improvements throughput virtual memory system must improved compared uncompressed equivalent thus additional amount processing introduced compression must increase overall latency however i/o-bound systems applications highly compressible data sets gains substantial physical memory used compression system reduces amount physical memory available processes system runs may result increased paging activity reduced overall effectiveness virtual memory compression relationship paging activity available physical memory roughly exponential meaning reducing amount physical memory available system processes results exponential increase paging activity circumstances amount free physical memory low paging fairly prevalent performance gains provided compression system compared paging directly auxiliary storage may offset increased page fault rate leads thrashing degraded system performance opposite state enough physical memory available paging activity low compression may impact performance enough noticeable middle ground two circumstanceslow ram high paging activity plenty ram low paging activityis virtual memory compression may useful however compressible program data pronounced performance improvements less physical memory needed hold compressed data example order maximize use compressed pages cache helix software company hurricane 2.0 provides user-configurable compression rejection threshold compressing first 256 512 bytes 4 kib page virtual memory compression system determines whether configured compression level threshold achieved particular page achievable rest page would compressed retained compressed cache otherwise page would sent auxiliary storage normal paging system default setting threshold 8:1 compression ratio hardware implementations technology also relies price differentials various components system example difference cost ram cost processor dedicated compression relative price/performance differences various components tend vary time example addition compression co-processor may minimal impact cost cpu typical virtual memory implementation paging happens least recently used basis potentially causing compression algorithm use cpu cycles dealing lowest priority data furthermore program code usually read-only therefore never paged-out instead code simply discarded re-loaded program ’ auxiliary storage file needed case bar compression higher since i/o cycle attempting eliminate much shorter particularly flash memory devices virtual memory compression gone favor technology price speed ram external storage plummeted due moore law improved ram interfaces ddr3 thus reducing need virtual memory compression multi-core processors server farms mobile technology together advent flash based systems make virtual memory compression attractive paul r. wilson proposed compressed caching virtual memory pages 1990 paper circulated acm oopsla/ecoop '90 workshop garbage collection issues strategies heap management memory hierarchies appearing acm sigplan notices january 1991 helix software company pioneered virtual memory compression 1992 filing patent application process october year 1994 1995 helix refined process using test-compression secondary memory caches video cards devices however helix release product incorporating virtual memory compression july 1996 release hurricane 2.0 used stac electronics lempel–ziv–stac compression algorithm also used off-screen video ram compression buffer gain performance benefits 1995 ram cost nearly 50 per megabyte microsoft windows 95 listed minimum requirement 4 mb ram due high ram requirement several programs released claimed use compression technology gain “ memory ” notorious softram program syncronys softcorp softram revealed “ placebo software ” include compression technology products including hurricane magnaram included virtual memory compression implemented run-length encoding poor results giving technology negative reputation 8 april 1997 issue pc magazine published comprehensive test performance enhancement claims several software virtual memory compression tools testing pc magazine found minimal 5 overall performance improvement use hurricane none packages however tests run intel pentium systems single core single threaded thus compression directly impacted system activity 1996 ibm began experimenting compression 2000 ibm announced memory expansion technology mxt mxt stand-alone chip acted cpu cache cpu memory controller mxt integrated compression engine compressed data heading to/from physical memory subsequent testing technology intel showed 5–20 overall system performance improvement similar results obtained pc magazine hurricane
[ 6675, 7187, 10776, 25, 541, 4637, 3615, 9762, 5158, 7217, 9784, 10809, 576, 2625, 6730, 86, 10333, 97, 2152, 8296, 8298, 7796, 7285, 9335, 2168, 634, 1147, 3197, 1150, 2179, 10883, 4747, 3725, 6797, 9366, 6296, 7325, 9887, 3248, 6837, 8...
Test
6,222
4
OneSpan:onespan onespan formerly vasco data security international inc. publicly traded cybersecurity technology company based chicago illinois offices montreal brussels zurich company offers cloud-based open architected anti-fraud platform historically known multi-factor authentication electronic signature software founded t. kendall hunt 1991 held initial public offering ipo january 2000 onespan member fido alliance board 1984 t. kendall hunt founded vasco corp. consulting software services company corporate governmental agencies company acquired thumbscan inc. claimed first fingerprint reader device computer 1991 renamed vasco data security international inc. 1993 expanded offerings include data security vasco incorporated 1997 held initial public offering january 2000 vasco started developing digipass technology early 2000s company marketed technology internationally belgium 2009 vasco announced digipass two-factor authentication available app store iphone ipod touch forbes recognized vasco list america fastest-growing tech companies year january 2011 vasco acquired diginotar dutch certificate authority june 2011 diginotar hacked started issuing false security certificates news broke confidence shattered issued certificates cancelled company went bankrupt company established international headquarters dubai silicon oasis 2012 vasco announced would lower emea channel entry vars time became member fast identity online fido alliance june 2014 later recognized gartner magic quadrant user authentication october 2015 vasco acquired silanis technology inc. canadian document e-signature company 113 million early 2016 company cloud electronic signature software esignlive updated include integration salesforce vasco announced face recognition authentification feature digipass may 2016 company partnerships financial institutions including hsbc bank usa fedict rabobank arab bank riyadh bank may 30 2018 vasco changed name onespan trades ticker symbol ospn may 2018 company acquired dealflo uk canada-based financial agreement automation software company gbp 41 million solutions delivered onespan open cloud-based trusted identity tid platform
[ 1346, 9732, 9063, 5918, 11248, 1496, 2558 ]
Test
6,223
0
Trigram:trigram trigrams special case n -gram n 3 often used natural language processing performing statistical analysis texts cryptography control use ciphers codes context important varying analysis rankings percentages easily derived drawing different sample sizes different authors different document types poetry science-fiction technology documentation writing levels stories children versus adults military orders recipes typical cryptanalytic frequency analysis finds 16 common character-level trigrams english encrypted messages sent telegraph often omit punctuation spaces cryptographic frequency analysis messages includes trigrams straddle word boundaries causes trigrams edt occur frequently even though may never occur one word messages sentence quick red fox jumps lazy brown dog following word level trigrams word-level trigram quick red following character-level trigrams underscore marks space
[ 5122, 2440, 2059, 6798, 9617, 11538, 1044, 1941, 5399, 538, 7599, 4531, 4662, 3127, 2488, 10557, 6208, 9798, 3533, 5197, 8538, 3808, 5857, 7780, 7918, 8046, 8688, 10231, 8440, 7164, 8318 ]
Test
6,224
4
Federal_Desktop_Core_Configuration:federal desktop core configuration federal desktop core configuration list security settings recommended national institute standards technology general-purpose microcomputers connected directly network united states government agency fdcc list agreed upon microsoft windows operating system common core system functions applications files services changed configuration around framework secure security-reliable ms windows operating system created standards made mandatory every federal government computer effective feb 1 2008 wanted connect federal office computer network system meet exceed fdcc standard denied access fdcc applied windows xp vista desktop laptop computers replaced united states government configuration baseline usgcb included settings windows 7 red hat enterprise linux 5 windows 7 nist changed naming convention us government computer baseline usgcb ver 2.0 addition un-classifying general windows settings guide nist also publishes guides specifically windows firewall internet explorer guide vista-energy example created capture settings adhere energy conservation policies 20 march 2007 office management budget issued memorandum instructing united states government agencies develop plans using microsoft windows xp vista security configurations united states air force common security configurations windows xp proposed early model standards could developed fdcc baseline developed maintained national institute standards technology collaboration omb dhs doi disa nsa usaf microsoft input public comment applies windows xp professional vista systems only—these security policies tested according nist work windows 9 x /me/nt/2000 windows server 2003 major version 1.1 released 31 october 2008 new changed settings expanded scap reporting options previous versions standard applicable general-purpose workstations laptops end users windows xp vista systems use servers exempt standard also exempt embedded computers special purpose systems defined specialized scientific medical process control experimental systems though still recommends fdcc security configuration considered feasible appropriate fdcc settings generally speaking block open connections operating systems disables functions disables rarely used applications soho environment disables unnecessary services changes permissions items changes way log files collected recorded affects group policy object gpo settings alters entries windows system registry infoweek introduced fdcc mostly administrators engineers article titled ‘ feds ’ allow ’ written kelly jackson higgins darkreading.com published february 4 2008 due complexity guidelines response initially slow implementation took time settings internally researched government enterprise implementation techs nist nsa published guidelines hundreds-of-page texts introduced called scap files applications see wikipedia scap page windows platform built easy interoperability networking therefore left opportunities within operating systems types auto- semi-automatic connections computers ’ flaws programming mistakes purposefully built way example found looking windows remote connection program enabled default typical windows operating system installation fdcc/usgcb configuration instance reverses setting manually re-enable allow remote connections organizations required document fdcc compliance using scap tools 600+ settings average fdcc/usgcb document – usable average small home office soho computer instance released 20 june 2008 fdcc major version 1.0 specifies 674 settings example wireless interfaces disabled recognition recommended settings practical every system exceptions authorized enterprise wireless networks made documented fdcc deviation report strict implementation recommended settings known cause usability issues nist publishes list known issues found nowiki https //usgcb.nist.gov/usgcb/microsoft_content.html /nowiki third-party software vendors emerged claim tested settings soho environment however time general public still remains relatively unaware fdcc usgcb security settings developed put forward nist
[ 635, 5780, 2558, 7887 ]
Validation
6,225
1
Text_Database_and_Dictionary_of_Classic_Mayan:text database dictionary classic mayan project text database dictionary classic mayan abbr twkm promotes research writing language pre-hispanic maya culture housed faculty arts university bonn established funding north rhine-westphalian academy sciences humanities arts project projected run-time fifteen years directed nikolai grube department anthropology americas university bonn goal project conduct computer-based studies extant maya hieroglyphic texts epigraphic cultural-historical standpoint produce publish database comprehensive dictionary classic mayan language text database well dictionary compiled conclusion project assembled based known texts pre-hispanic maya culture texts produced used approximately third century b.c a.d. 1500 region today includes parts countries mexico guatemala belize honduras thousands hieroglyphic inscriptions monuments ceramics daily objects survived present offer insight language ’ vocabulary structure project ’ database dictionary digitally represent original spellings using logo-syllabic maya hieroglyphs well transcription transliteration roman alphabet data additionally annotated various epigraphic analyses translations object-specific information twkm employ digital technologies order compile make available data metadata well publish project ’ research results project thereby methodologically positions field digital humanities project conducted cooperation project partners research association ehumanities textgrid well university regional library bonn ulb working environment currently construction data metadata compiled annotated realized thetextgrid laboratory software virtual research environment component software textgrid repository make data authorized publication freely available online ensure long-term storage tools data compilation annotation attained modularly constructed extended textgrid lab thereby provide necessary materials facilitating research team ’ typical epigraphic workflow workflow usually begins documenting texts objects preserved compiling descriptive data continues various levels epigraphic linguistic analysis concludes best case scenario translation analyzed inscription corresponding publication cooperation ulb selected data additionally made available project ’ virtual inscription archive present online digital collections ulb hieroglyphic inscriptions selected published data repository including image brief information texts objects written epigraphic analysis translation one project ’ goals produce dictionary classic mayan digital print form towards end project run-time additionally database corpus inscriptions including translations epigraphic analyses made freely available online database furthermore provide ontology-like link contextual object data inscriptions thereby allowing cultural-historical arrangement contents within periods pre-hispanic maya culture contents database additionally linked citations relevant literature result database also make freely available scientific community interested parties bibliography representing research history base knowledge concerning ancient maya culture script addition classic maya script temporally defined stages language development gathered documented comprehensive language corpus aid information gathered project collaboration project participants corpus data used together aid various comparable analyses also computational linguistic methods inference-based methods confirm readings hieroglyphs currently partially confirmed eventually completely decipher classic maya script
[]
None
6,226
2
KeyRus:keyrus keyrus dos-based tsr device driver keyboard display written donetsk student hacker 1989 widely distributed ussr outside country free charge last version keyrus released 1994 long gurtyak suddenly died keyrus distributed primarily via electronic bulletin boards nikolai bezroukov softpanorama electronic magazine loaded fonts ega/vga supported changes keyboard layout initially could change russian latin keyboard layouts later became configurable distribution included layout font editors later versions keyrus utilized original font compression technique bitmaps stored memory packed unpacked loading graphics adapter allowed keyrus occupy minimum limited dos memory space
[ 6226, 477, 7983 ]
None
6,227
2
APT-RPM:apt-rpm apt-rpm version advanced packaging tool modified work rpm package manager originally ported rpm alfredo kojima developed improved gustavo niemeyer working conectiva linux distribution time march 2005 maintainer program gustavo niemeyer announced would continue developing would instead focus smart package manager planned successor apt-rpm march 2006 development picked panu matilainen red hat new home introducing basic multilib functionality support common repository metadata distributions using apt-rpm package management
[ 11525, 2310, 10760, 2955, 7435, 7181, 7947, 9487, 2448, 788, 1813, 8213, 10900, 6680, 8476, 5670, 4775, 7847, 6828, 6446, 7983, 1842, 823, 2872, 6583, 3131, 5819, 10172, 190, 2239, 3649, 10817, 9671, 5067, 3918, 463, 3667, 7293, 4951, 636...
None
6,228
9
ParaSail_(programming_language):parasail programming language parallel specification implementation language parasail object-oriented parallel programming language design ongoing implementation described blog official website parasail uses pointer-free programming model objects grow shrink value semantics used assignment global garbage collected heap instead region-based memory management used throughout types recursive long recursive components declared optional global variables parameter aliasing subexpressions expression evaluated parallel assertions preconditions postconditions class invariants etc. part standard syntax using hoare-like notation possible race conditions detected compile time initial design parasail began september 2009 s. tucker taft interpreter using parasail virtual machine llvm-based parasail compiler available work stealing used scheduling parasail light-weight threads latest version downloaded parasail website parasail goals syntax parasail similar modula class-and-interface-based object-oriented programming model similar java c recently parallel constructs parasail adapted syntaxes produce java-like python-like ada-like parallel languages dubbed respectively javallel parython sparkel named ada subset spark based compilers interpreters languages included parasail implementation following hello world program parasail func hello_world var io end func hello_world following interface basic map module interface bmap key_type ordered element_type assignable » end interface bmap possible implementation map module using binary tree class bmap end class bmap simple test program bmap module import psl :core :random import bmap func test_bmap num univ_integer seed univ_integer end func test_bmap articles parasail appeared various forums
[ 2304, 9345, 3462, 8582, 9224, 6797, 9871, 10387, 10649, 1435, 155, 3613, 7326, 8990, 1952, 9245, 10013, 3876, 6184, 4777, 428, 5677, 7983, 823, 6074, 6718, 8644, 8262, 5833, 8524, 7889, 5074, 11219, 2519, 7386, 477, 6502, 10470, 11625, 85...
None
6,229
5
WHOIS++:whois++ whois++ protocol distributed directory system originally designed provide white pages search mechanism find humans could actually used arbitrary information retrieval tasks developed early 1990s bunyip information systems documented ietf whois++ devised extension pre-existing whois system whois early networked directory service originally maintained sri international defense data network whois protocol still widely used allow domain ownership records internet easily queried whois++ attempted address short comings original whois protocol become apparent years supported multiple languages character sets help i18n issues advanced query syntax ability generate forward knowledge form 'centroid data structures could used route queries one server another protocol designed backward compatible older whois standard whois++ clients could still extract meaningful information already deployed whois servers whilst whois++ white pages directory service never really took compared competitors x.500 gain notable amount use united kingdom underlying search retrieval protocol number subject based gateways funded part jisc electronic library programme achieved using software called roads provided whois++ base index servers cgi based web interfaces whois++ clients use centroids provide forward knowledge query routing allowed subject gateway provide resources academic users database also point jisc funded subject gateways might useful information whois++ protocol designated ietf historic protocol longer deployed new systems developed
[ 8204, 2485, 3191, 10238, 3967 ]
Train
6,230
3
European_Committee_for_Interoperable_Systems:european committee interoperable systems european committee interoperable systems ecis international non-profit association founded 1989 order promote interoperability market conditions information communications technology ict sector allowing vigorous competition merits diversity consumer choice ecis represented members many issues related interoperability competition european national international bodies including european union institutions world intellectual property organization wipo ecis members include large smaller information communications technology hardware software providers adobe systems corel corporation ibm linspire nokia opera software oracle corporation realnetworks red hat sun microsystems past years ecis actively involved european commission ’ antitrust condemnation microsoft upheld european court first instance september 2007 ziff-davis eweek comments complaints microsoft include
[ 9665, 1347, 2948, 9455, 3323, 11263 ]
None
6,231
5
SeaMonkey:seamonkey seamonkey free open-source internet suite continuation former mozilla application suite based source code grew netscape communicator formed base netscape 6 netscape 7 seamonkey created 2005 mozilla foundation decided focus standalone projects firefox thunderbird development seamonkey community-driven contrast mozilla application suite last released version 1.7.13 governed mozilla foundation new project-leading group called seamonkey council compared firefox seamonkey web browser keeps traditional-looking interface netscape mozilla suite many xul-based firefox thunderbird add-ons modified compatibility seamonkey although add-ons built webextensions architecture used newer firefox versions yet compatible seamonkey consists web browser descendant netscape family e-mail news client program seamonkey mail newsgroups shares code mozilla thunderbird html editor seamonkey composer software suite supports skins comes two skins default installation modern classic recent versions include irc client chatzilla installed extension seamonkey mail traditional e-mail client includes support multiple accounts junk mail detection message filters html message support address books among features shares code mozilla thunderbird thunderbird seamonkey built mozilla comm-central source tree seamonkey composer wysiwyg html editor main user interface features four tabs normal wysiwyg html tags html code browser preview generated code html 4.01 transitional seamonkey composer longer actively maintained underlying editor code shared mail component seamonkey project releases official builds linux macos windows also releases “ unofficial ” x86-64 builds linux avoid confusing organizations still want use original mozilla suite new product needed new name initial speculation members community july 2 2005 announcement confirmed seamonkey would officially become name internet suite superseding mozilla suite seamonkey lowercase refers brine shrimp used netscape mozilla foundation code name never-released netscape communicator 5 later mozilla suite originally name seamonkey derived netscape management replace buttmonkey developers chosen following internal contest codename.. seamonkey council trademarked name help mozilla foundation project uses separate numbering scheme first release called seamonkey 1.0 despite different name version number seamonkey 1.0 based code mozilla suite 1.7 trademark copyright reasons debian rebranded seamonkey distributed iceape 2013 march 10 2005 mozilla foundation announced would release official versions mozilla application suite beyond 1.7.x since focused standalone applications firefox thunderbird however foundation emphasized would still provide infrastructure community members wished continue development effect meant suite would still continue developed seamonkey council instead mozilla foundation seamonkey first released september 15 2005 seamonkey 1 released january 30 2006 core mozilla project source code licensed disjunctive tri-license changing mpl 2.0 gave choice one three following sets licensing terms mozilla public license version 1.1 later gnu general public license version 2.0 later gnu lesser general public license version 2.1 later seamonkey council team responsible project release management currently consists philip chee karsten düsterloh jens hatlak robert kaiser ian neal neil rashbrook justin wood parts table based seamonkey release notes roadmap meeting notes
[ 513, 2050, 6657, 9736, 6154, 2579, 9747, 6171, 2076, 9757, 7713, 3110, 10791, 9770, 559, 1075, 2101, 4661, 3639, 10808, 3643, 9275, 64, 9281, 4171, 5707, 3578, 10834, 5205, 6231, 7255, 8281, 2139, 6747, 6237, 7785, 1642, 9834, 10860, 1086...
Test
6,232
4
Network_enclave:network enclave network enclave section internal network subdivided rest network purpose network enclave limit internal access portion network necessary set resources differs general network surroundings typically network enclaves publicly accessible internal accessibility restricted use internal firewalls vlans network admissions control vpns network enclaves consist standalone assets interact information systems networks major difference dmz demilitarized zone network enclave dmz allows inbound outbound traffic access firewall boundaries traversed enclave firewall boundaries traversed enclave protection tools used provide protection within specific security domains mechanisms installed part intranet connect networks similar security requirements dmz established within enclave host publicly accessible systems ideal design build dmz separate network interface enclave perimeter firewall dmz traffic would routed firewall processing dmz would still kept separate rest protected network
[ 5608, 939, 5749 ]
Validation
6,233
3
AmigaOS_4_version_history:amigaos 4 version history new version amigaos released december 24 2006 five years development hyperion entertainment belgium license amiga inc. amigaone registered users five years development users amigaone machines could download hyperion repository pre-release versions amigaos 4.0 long made available witnessed many users amiga discussion forum sites versions stable reliable despite fact technically labeled pre-releases last stable version amigaos 4.0 amigaone computers july 2007 update released download 18 july 2007 registered users amigaone machines amigaos 4 classic released commercially older amiga computers cyberstormppc blizzardppc accelerator cards november 2007 previously available developers beta-testers new version powerpc-native finally abandoning motorola 68k processor amigaos 4.0 run powerpc hardware currently includes a1200 a3000 a4000 powerpc accelerator boards amigaone motherboards amiga inc. distribution policies amigaos 4.0 later versions require third-party hardware os must bundled sole exception amigas phase 5 powerpc accelerator boards os sold separately amigaos 4.0 final introduced new memory system based slab allocator features among others developer pre-release version snapshot amigaos 4.0 amigaone contained html installation guide english german french italian amigaos 4.0 sdk amigaos 4.0 sdk allowed creation new software migration existing amigaos versions 3.x source code os 4.0 amigaos 4.0 developer pre-release update came form full iso image 33 mb needed burned cd-r w user intended replace original amigaos 4.0 developer pre-release cd installation rescue purposes release date 10 october 2004 among features amigaos 4.0 developer pre-release update came form free download registered users update featured usb stack update i.e mass storage support numerous bug fixes enhancements core components system release date 27 december 2004 release date 14 june 2005 following non-exhaustive list features update 3 prominent features fourth amigaos 4.0 developer pre-release update return screen dragging ability petunia just-in-time 68k emulator release date 8 february 2006 new features pre-release include 24 december 2006 final update released came iso image ≈45 mb burned onto cd cd bootable may used standalone installation cd amigaos 4.0 final update introduced new memory system based slab allocator features amigaos 4.0 among others release date 18 july 2007 improvements amigaos 4.0 july 2007 update amigaos 4.0 amiga 1200 amiga 3000 amiga 4000 series computers equipped phase5 powerup powerpc accelerator cards put sale november 2007 feature set equal july 2007 update drivers amiga expansion cards devices minor improvements e.g amigainput update amigaos 4.0 classic amiga computers addressed issues compatibility problems release date 23 february 2008 amigaos 4.1 presented public july 11 2008 put sale september 2008 new version simple update features among others amigaos 4.1 presented public 11 july 2008 put sale september 2008 new version simple update features among others 21 june 2009 hyperion entertainment announced immediate availability quick fix package amigaone sam/sam flex pegasos ii features include 14 january 2010 hyperion entertainment announced immediate availability amigaos 4.1 update 1 first full update amigaos 4.1 features include upgrades following 30 april 2010 hyperion entertainment announced immediate availability update 2 amigaos 4.1 amigaone sam440ep pegasos ii registered users features 17 may 2011 amigaos 4.1 commodore amigas powerup accelerators released august 29 2011 hyperion entertainment made available update 3 amigaos 4.1 amigaone sam440ep sam 460 classic amigas ppc cards pegasos ii registered users final bugfixes updates amigaos 4.1 new features reserved os 4.2 december 22 2011 hyperion entertainment released minor update correct many bugfixes third update amigaos 4.1 introduces something new update 5 first public release amigaone x1000 28 january 2012 later 16 august 2012 update 5 released platforms update 6 released november 30 2012 rather unusual update regard included bug fixes except new ide xena kicklayout files amigaone x1000 update consisted mainly new efficient way delivering bug fixes new update software ... menu item workbench launch amiupdate handles future amigaos 4 software updates amigaos 4.1 final edition released 18 december 2014 new functionality amigaos 4.1 final edition includes
[ 5264, 2193, 9236, 3233, 8609, 9249, 8618, 6062, 7342, 432, 8369, 8115, 6075, 11076, 1349, 10570, 5709, 5840, 4564, 4567, 8554, 11370, 5743, 1776, 11123, 8700 ]
Test
6,234
2
Susan_Kare:susan kare susan kare born february 5 1954 artist graphic designer created many interface elements typefaces apple macintosh 1980s also creative director one original employees next company formed steve jobs left apple 1985 worked microsoft ibm pinterest facebook kare born ithaca new york sister aerospace engineer jordin kare.in high school worked museum designer harry loucks introduced typography graphic design graduated harriton high school 1971 graduated summa cum laude b.a art mount holyoke college 1975 received ph.d. new york university 1978 next moved san francisco worked fine arts museums kare joined apple computer receiving call high school friend andy hertzfeld early 1980s member original apple macintosh design team worked apple starting 1982 badge 3978 kare originally hired macintosh software group design user interface graphics fonts business cards read hi macintosh artist later creative director apple creative services working director organization tom suiter designer many typefaces icons original marketing material original macintosh operating system descendants groundbreaking work still seen many computer graphics tools accessories especially icons lasso grabber paint bucket designs created first visual language apple new point-and-click computing presentation layers design conference san francisco revealed command icon apple keyboards originally symbol used denote notable interesting features swedish campgrounds kare early pioneer pixel art recognizable works time apple chicago typeface prominent user-interface typeface seen classic mac os interfaces system 1 1984 mac os 9 1999 well typeface used first four generations apple ipod interface geneva typeface original monospace monaco typeface clarus dogcow happy mac icon smiling computer welcomed mac users starting machines command key symbol apple keyboards icons drew many sources art history wacky gadgets forgotten hieroglyphics mac concept command symbol taken saint hannes cross symbol place interest leaving apple kare joined next designer working clients microsoft ibm projects microsoft included card deck windows 3.0 solitaire game well numerous icons design elements windows 3.0 many icons notepad various control panels remained essentially unchanged microsoft windows xp ibm produced icons design elements os/2 eazel contributed iconography nautilus file manager 2003 became member advisory board glam media mode media 2006 2010 produced icons gifts feature facebook initially profits gift sales donated susan g. komen cure foundation valentine day 2007 gift selection modified include new limited edition gifts necessarily pertain valentine day one gift icons titled big kiss also featured versions mac os x user account picture 2007 designed identity icons website chumby industries inc. well interface internet-enabled alarm clock since 2008 museum modern art store new york city carried stationery notebooks featuring designs 2015 moma also acquired notebooks sketches led early mac icons august 2012 called expert witness apple company patent-infringement trial industry competitor samsung see apple inc. v. samsung electronics co. 2015 kare hired pinterest product design lead heads digital design practice san francisco sells limited-edition signed fine-art prints currently uses adobe photoshop adobe illustrator make designs logos recognition design work kare awarded american institute graphic arts medal april 2018 married three sons
[ 7307, 9999, 5520, 10386, 6554, 4251, 11420, 9123, 10406, 7983, 9778, 576, 10432, 9035, 7640, 350, 2282, 1389, 11118, 3323, 7806, 511 ]
Validation
6,235
1
Fabian_Pascal:fabian pascal fabian pascal consultant large software vendors ibm oracle corporation borland better known author seminar speaker born romania pascal lives san francisco ca area us works association christopher j date pascal known sharp criticisms data management industry trade press current state higher education western culture alleged media bias pascal advocates strict adherence principles relational model argues departing model name pragmatism responsible serious data management troubles criticism pascal advocacy often centers around polemical style perceive overly confrontational unprofessional political commentary postwest blog decline western education civilization middle east issues
[ 3323, 2901, 11327 ]
Validation
6,236
8
PoorMan:poorman poorman simple light-weight web server bundled beos haiku operating system poorman lets users create run websites also knows serve html pages graphics web-based information minimal set hassle ideal small personal servers prototyping web sites use poorman users must set website folder poorman serve pages html format 1 launch poorman desktop alert pop-up let specify folder want use choose default /boot/home/public_html 2 dismiss web site alert poorman main window appears menu bar status line tell web server running stopped 3.to toggle status use server command controls run server command notice poorman starts web server automatically default
[ 225, 3631, 3312, 7983, 2045, 1374 ]
None
6,237
8
Daylife:daylife daylife offers on-demand features media apps served cloud provides digital media management tools content feeds publishers brand marketers developers daylife founded 2006 raised 15m investment date recently strategic investor getty images company headquartered downtown new york city daylife products include daylife publisher suite range apis set hosted solutions including smart topics smart galleries smart sections hosted solutions launched partnership getty images allow publishers source manage compose sites media components pages complete sections content daylife technology analyzes 100,000 curated content feeds allows publishers curate automate media enhance proprietary content clients include usa today bloomberg businessweek npr mashable sky news forbes thomson reuters 80 others daylife publisher suite allows publishers marketers deploy on-demand media features apps cloud onto digital channel clicks features apps managed simple browser-based dashboard smartgalleries suite tools allow publishers create image galleries customizable widgets full-page formats publishers hand-select images automatically fill galleries based keywords daylife getty images launched smartgalleries september 2009 conjunction investment announcement smarttopics tools publishers create media-rich pages specific topics linking proprietary content related media videos images links tweets selected publisher smartsections tools allow publishers compose launch full content sections verticals like travel basketball featuring real-time media proprietary outside sources selected editor daylife developer apis programming platform media highly flexible scalable serving 1.5 billion calls per month july 2011 apis let developers source combine synthesize news media content applications apis ingest parse analyze media content exposing hundreds ways query deliver scale free paid access available example semantic web daylife analyzes continuous stream media content maps connections news topics enables dynamic news navigation topic country journalist medium timeline geography daylife founded 2006 chief executive officer upendra shardanand company released apis 2008 2009 daylife named one top 50 tech startups businessweek top 50 real-time web companies readwriteweb daylife funded balderton capital arts alliance new york times getty images angel investors include michael arrington john borthwick andrew rasiej dave winer jeff jarvis partner daylife 2012 daylife acquired newscred
[ 1664, 3971, 8584, 4490, 10126, 11418, 2076, 8735, 1834, 4013, 559, 9908, 7488, 10057, 5205, 4310, 5078, 6231, 10722, 5605, 8169, 9451, 8557, 11000, 5114 ]
Validation
6,238
4
Sha1sum:sha1sum computer program calculates verifies sha-1 hashes commonly used verify integrity files variant installed default unix-like operating systems variants include permits sha-1 sha-512 hash functions selected manually use specific sha-2 hash function permits sha-3 sha3-512 shake rawshake keccak functions selected manually versions microsoft windows also exist activeperl distribution includes perl implementation shasum freebsd openbsd utilities called md5 sha1 sha256 sha512 versions offer slightly different options features additionally freebsd offers skein family message digests sha-1 variants proven vulnerable collision attacks users use example sha-2 variant sha256sum instead prevent tampering adversary included gnu core utilities busybox toybox create file sha1 hash one provided distributing one file .sha1 may appended filename e.g output contains one line per file form codice_1 note well hash digest creation performed text mode instead binary mode two space characters instead single space character asterisk example verify file downloaded correctly sha1sum create checksums one multiple files inside directory directory tree i.e subdirectories sub-subdirectories etc files contain possible using sha1sum combination commands find xargs optionally sort files sorted checksum file sha1deep create checksums directory tree also use sha1sum exec
[ 3393, 516, 6954, 6797, 5397, 823, 5759 ]
Validation
6,239
9
Intuitionistic_type_theory:intuitionistic type theory intuitionistic type theory also known constructive type theory martin-löf type theory type theory alternative foundation mathematics intuitionistic type theory created per martin-löf swedish mathematician philosopher first published 1972 multiple versions type theory martin-löf proposed intensional extensional variants theory early impredicative versions shown inconsistent girard paradox gave way predicative versions however versions keep core design constructive logic using dependent types martin-löf designed type theory principles mathematical constructivism constructivism requires existence proof contain witness proof exists prime greater 1000 must identify specific number prime greater 1000 intuitionistic type theory accomplished design goal internalizing bhk interpretation interesting consequence proofs become mathematical objects examined compared manipulated intuitionistic type theory type constructors built follow one-to-one correspondence logical connectives example logical connective called implication formula_1 corresponds type function formula_2 correspondence called curry–howard isomorphism previous type theories also followed isomorphism martin-löf first extend predicate logic introducing dependent types intuitionistic type theory 3 finite types composed using 5 different type constructors unlike set theories type theories built top logic like frege feature type theory double duty feature math logic unfamiliar type theory know set theory quick summary types contain terms like sets contain elements terms belong one one type terms like formula_3 formula_4 compute reduce canonical terms like 4 see article type theory 3 finite types 0 type contains 0 terms 1 type contains 1 canonical term 2 type contains 2 canonical terms 0 type contains 0 terms also called empty type used represent anything exist also written formula_5 represents anything unprovable proof exist result negation defined function formula_6 likewise 1 type contains 1 canonical term represents existence also called unit type often represents propositions proven therefore sometimes written formula_7 finally 2 type contains 2 canonical terms represents definite choice two values used boolean values propositions propositions considered 1 type may proven never proof 0 type may proven either way law excluded middle hold propositions intuitionistic type theory σ-types contain ordered pairs typical ordered pair 2-tuple types σ-type describe cartesian product formula_8 two types formula_9 formula_10 logically ordered pair would hold proof formula_9 proof formula_10 one may see type written formula_13 σ-types powerful typical ordered pair types dependent typing ordered pair type second term depend value first term example first term pair might natural number second term type might vector length equal first term type would written using set-theory terminology similar indexed disjoint unions sets case usual ordered pairs type second term depend value first term thus type describing cartesian product formula_15 written important note value first term formula_17 depended type second term formula_18 obviously σ-types used build longer dependently-typed tuples used mathematics records structs used programming languages example dependently-typed 3-tuple two integers proof first integer smaller second integer described type dependent typing allows σ-types serve role existential quantifier statement exists formula_17 type formula_21 formula_22 proven becomes type ordered pairs first item value formula_17 type formula_21 second item proof formula_22 notice type second item proofs formula_22 depends value first part ordered pair formula_17 type would π-types contain functions typical function types consist input type output type powerful typical function types however return type depend input value functions type theory different set theory set theory look argument value set ordered pairs type theory argument substituted term computation reduction applied term example type function given natural number formula_17 returns vector containing formula_17 real numbers written output type depend input value function type often simply written formula_32 thus formula_33 type functions natural numbers real numbers π-types correspond logical implication logical proposition formula_1 corresponds type formula_2 containing functions take proofs-of-a return proofs-of-b type could written consistently π-types also used logic universal quantification statement every formula_17 type formula_21 formula_22 proven becomes function formula_17 type formula_21 proofs formula_22 thus given value formula_17 function generates proof formula_44 holds value type would =-types created two terms given two terms like formula_3 formula_47 create new type formula_48 terms new type represent proofs pair reduce canonical term thus since formula_3 formula_4 compute canonical term formula_51 term type formula_48 intuitionistic type theory single way make terms =-types reflexivity possible create =-types formula_54 terms reduce canonical term unable create terms new type fact able create term formula_54 could create term formula_5 putting function would generating function type formula_57 since formula_58 intuitionistic type theory defines negation would formula_59 finally formula_60 equality proofs area active research proof theory led development homotopy type theory type theories inductive types allow creation complex self-referential types example linked list natural numbers either empty list pair natural number another linked list inductive types used define unbounded mathematical structures like trees graphs etc.. fact natural numbers type may defined inductive type either formula_61 successor another natural number inductive types define new constants zero formula_62 successor function formula_63 since formula_64 definition evaluated using substitution terms like formula_65 formula_66 become canonical terms natural numbers proofs inductive types made possible induction new inductive type comes inductive rule prove predicate formula_44 every natural number use following rule inductive types intuitionistic type theory defined terms w-types type well-founded trees later work type theory generated coinductive types induction-recursion induction-induction working types obscure kinds self-referentiality higher inductive types allow equality defined terms universe types allow proofs written types created type constructors every term universe type formula_69 mapped type created combination formula_70 inductive type constructor however avoid paradoxes term formula_69 maps formula_69 write proofs small types formula_69 must use formula_74 contain term formula_69 formula_74 similarly formula_77 predicative hierarchy universes quantify proof fixed constant formula_78 universes use formula_79 universe types tricky feature type theories martin-löf original type theory changed account girard paradox later research covered topics super universes mahlo universes impredicative universes formal definition intuitionistic type theory written using judgements example statement formula_9 type formula_10 type formula_82 type judgements type ... ... expression formula_82 judgement type defined second level type theory confusing particularly comes equality judgement term equality might say formula_84 statement two terms reduce canonical term also judgement type equality say formula_85 means every element formula_9 element type formula_10 vice versa type level type formula_84 contains terms proof formula_51 formula_3 reduce value obviously terms type generated using term-equality judgement lastly english-language level equality use word four symbol formula_51 refer canonical term formula_92 synonyms like called definitionally equal martin-löf description judgements based discussion nordström petersson smith formal theory works types objects type declared object exists type objects equal types equal type depends object another type declared removed substitution object depends object another type done two ways object abstracted written removed substitution object-depending-on-object also declared constant part recursive type example recursive type formula_64 constant object-depending-on-object associated abstraction constants like formula_64 removed defining equality relationship addition defined using equality using pattern matching handle recursive aspect formula_64 formula_64 manipulated opaque constant internal structure substitution objects types relations used express formulae theory following styles judgements used create new objects types relations existing ones convention type represents types called formula_114 formula_115 since formula_114 type member objects dependent type formula_117 maps object corresponding type texts formula_117 never written context statement reader almost always tell whether formula_9 refers type whether refers object formula_114 corresponds type complete foundation theory everything else derived implement logic proposition given type objects types represent different possible ways prove proposition obviously proof proposition type objects operators like work propositions introduce new types new objects formula_121 type depends type formula_9 type formula_10 objects dependent type defined exist every pair objects formula_9 formula_10 obviously formula_9 formula_10 proof empty type new type representing formula_128 also empty done types booleans natural numbers etc operators using language category theory r. a. g. seely introduced notion locally cartesian closed category lccc basic model type theory refined hofmann dybjer categories families categories attributes based earlier work cartmell category families category c contexts objects contexts context morphisms substitutions together functor c → fam set fam set category families sets objects pairs index set function b x → morphisms pairs functions f → g x → x b g f b words f maps b b functor assigns context g set types set terms axioms functor require play harmoniously substitution substitution usually written form af af type term f substitution g category c must contain terminal object empty context final object form product called comprehension context extension right element type context left element g context object final among contexts mappings p → g q tm ap logical framework martin-löf takes form closure conditions context dependent sets types terms type called set set type types closed forms dependent sum product forth theory predicative set theory expresses closure conditions types sets elements closed operations reflect dependent sum product various forms inductive definition fundamental distinction extensional vs intensional type theory extensional type theory definitional i.e. computational equality distinguished propositional equality requires proof consequence type checking becomes undecidable extensional type theory programs theory might terminate example theory allows one give type y-combinator detailed example found nordstöm petersson programming martin-löf type theory however n't prevent extensional type theory basis practical tool example nuprl based extensional type theory practical standpoint difference program n't terminate program takes million years terminate contrast intensional type theory type checking decidable representation standard mathematical concepts somewhat cumbersome since intensional reasoning requires using setoids similar constructions many common mathematical objects hard work ca n't represented without example integer numbers rational numbers real numbers integers rational numbers represented without setoids representation n't easy work cauchy real numbers ca n't represented without homotopy type theory works resolving problem allows one define higher inductive types define first order constructors values points higher order constructors i.e equalities elements paths equalities equalities homotopies ad infinitum different forms type theory implemented formal systems underlying number proof assistants many based per martin-löf ideas many added features axioms different philosophical background instance nuprl system based computational type theory coq based calculus co inductive constructions dependent types also feature design programming languages ats cayenne epigram agda idris per martin-löf constructed several type theories published various times much later preprints description became accessible specialists among others jean-yves girard giovanni sambin list attempts list theories described printed form sketch key features distinguished theories dependent products dependent sums disjoint unions finite types natural numbers theories reduction rules include η-reduction either dependent products dependent sums except mltt79 η-reduction dependent products added mltt71 first type theories created per martin-löf appeared preprint 1971 one universe universe name i.e type theory called today type type jean-yves girard shown system inconsistent preprint never published mltt72 presented 1972 preprint published theory one universe v identity types universe predicative sense dependent product family objects v object v example v assumed v. universe à la russell i.e. one would write directly t∈v t∈t martin-löf uses sign ∈ instead modern without additional constructor el mltt73 first definition type theory per martin-löf published presented logic colloquium 73 published 1975 identity types calls propositions since real distinction propositions rest types introduced meaning unclear later acquires name j-eliminator yet without name see pp 94–95 theory infinite sequence universes v ... v ... universes predicative a-la russell non-cumulative fact corollary 3.10 p. 115 says a∈v b∈v b convertible m=n means example would difficult formulate univalence theory—there contractible types v unclear declare equal since identity types connecting v v i≠j mltt79 presented 1979 published 1982 paper martin-löf introduced four basic types judgement dependent type theory since became fundamental study meta-theory systems also introduced contexts separate concept see p. 161 identity types j-eliminator already appeared mltt73 name also rule makes theory extensional p. 169 w-types infinite sequence predicative universes cumulative bibliopolis discussion type theory bibliopolis book 1984 somewhat open-ended seem represent particular set choices specific type theory associated
[ 4101, 5783, 11674, 10145, 5796, 6188, 3762, 11574, 4791, 3767, 8251, 8511, 6087, 8788, 8924, 10460, 8926, 5365, 3702, 11125, 11641, 9466, 1019, 2556, 5885 ]
Test
6,240
2
SCSI_Pass-Through_Direct:scsi pass-through direct scsi pass direct sptd proprietary device driver application programming interface api developed duplex secure ltd. provides new method access scsi storage devices sptd api open public sptd used daemon tools alcohol 120 also utilized powerarchiver pro 2010 v11.60+ however configurable option available disable known incompatible kernel-mode debugging including windbg microsoft command line debuggers well softice certain versions freeware optical media burning software imgburn issue warning sptd detrimental effect drive performance application detects sptd active installed conexware inc. maker powerarchiver claims internal testing sptd improved optical drive performance 20 percent comparison old school scsi pass interface
[ 5380, 8262, 10027, 10155, 6797, 7983, 3860 ]
Test
6,241
4
Christopher_Boyd_(IT_security):christopher boyd security christopher boyd also known online pseudonym paperghost computer security researcher boyd director malware research security company facetime becoming senior threat researcher sunbelt software later known gfi software december 2013 malwarebytes announced boyd joined malware intelligence team research new threats july 2004 boyd launched vitalsecurity.org website bringing public attention issues privacy spyware november 2004 modular hacking technique employed compromise windows end-users hacking apache servers hacked servers would redirect user server websites leading set ever-changing infection pages pages employed recoded viruses trojans malware spyware technique used heavily today groups behind spyware coolwebsearch cws idea alternative browsers opera firefox could somehow enhance end-user security cut march 2005 discovery java applet agreed would install large varied adware bundle onto end-user pc found rogue site user blocklists security tools would nothing install bypassing tactics completely end-user clicked yes updated firefox .xpi installer infected internet explorer also deployed installs june 2005 discovered adware makers turning alternative sources installs end-users become aware common install tactics reliance crude social engineering p2p systems previously clean rise boyd discovered bittorrent forums file-sharing sites used major source distribution aurora program produced direct revenue number major adware programs wrapped bundles produced metrix marketing group mmg company lost control network potentially copyright infringing files illegal pornography incorrect absent disclosure exposed scale cause companies involved direct revenue 180solutions others publicly declare discontinuation methods story caused uproar numerous media pundits weighed cases made delicate situation worse article john c. dvorak pc magazine alleged boyd part grand microsoft conspiracy bad-mouth bittorrent benefit planned p2p tool avalanche furious p2p users familiar backstory investigation even went far say boyd league riaa create problems file-sharers bringing bundles light however dvorak piece caused something approaching outrage side fence leading fellow ziff davis media publication go head head dvorak dave methvin pc pitstop followed investigation findings alleges films distributed contained potentially illegal underage pornography long mmg went offline adware companies pulled particular distribution october 2005 boyd discovered fake google toolbar distributed via instant messaging toolbar allowed user store credit card details also opened fake google search page boyd also tracked toolbar back 2003 three different versions one exploiting vulnerabilities windows operating system october november 2005 boyd discovered considered first known instance rootkit distributed via instant messaging hidden inside large payload adware spyware period months group behind attacks distributed numerous inventive payloads forced install bittorrent spread movie files eventually traced back middle-east boyd notoriously fierce critic adware companies famously causing 180solutions label fanatic weblog bad feeling evidence sides day regularly referenced leading antispyware sites sunbelt blog suzi turner zdnet blog ben edelman home page 2006 boyd continued make significant discoveries field security including
[ 8582, 8584, 877, 4883, 5078, 10392, 11225, 7515, 2558, 9791 ]
None
6,242
9
XPL:xpl xpl programming language based pl/i portable one-pass compiler written language parser generator tool easily implementing similar compilers languages xpl designed 1967 way teach compiler design principles starting point students build compilers languages xpl designed implemented william m. mckeeman david b. wortman university california santa cruz james j. horning others stanford university xpl first announced 1968 fall joint computer conference methods compiler described detail 1971 textbook compiler generator called combined work 'compiler generator implies little language- target-specific programming required build compiler new language new target better label xpl translator writing system helps write compiler less new changed programming code xpl language simple small efficient dialect pl/i intended mainly task writing compilers xpl language also used purposes available xpl compiled easily modern machines simple compiler compiler internals written easily xpl code easy read pl/i language designed ibm committee 1964 comprehensive language replacing fortran cobol algol meeting customer internal needs ambitious goals made pl/i complex hard implement efficiently sometimes surprising used xpl small dialect full language xpl one added feature found pl/i string datatype dynamic lengths string values live separate text-only heap memory space automatic garbage collection stale values much simple compiler manipulating input text output byte streams feature helps simplify xpl-based compilers xpl compiler called xcom one-pass compiler using table-driven parser simple code generation techniques versions xcom exist different machine architectures using different hand-written code generation modules targets original target ibm system/360 proper subset ibm system/370 ibm system/390 ibm system z. xcom compiles xpl source code since xcom written xpl compile – self-compiling compiler reliant compilers several famous languages self-compiling compilers including burroughs b5000 algol pl/i c lisp java creating compilers chicken-and-egg conundrum language first implemented temporary compiler written language even interpreter often interpreter intermediate code bcpl intcode o-code xcom began algol program running burroughs machines translating xpl source code system/360 machine code xpl team manually turned algol source code xpl source code xpl version xcom compiled burroughs creating self-compiling xcom system/360 machines algol version thrown away improvements happened xpl version called bootstrapping compiler authors xpl invented tombstone diagram t-diagram document bootstrapping process retargeting compiler new machine architecture similar exercise except code generation modules need changed xcom one-pass compiler emitted code fix-up process forward branches loops defined situations emits machine code statement grammar rule within statement recognized rather waiting parsed entire procedure entire program parse trees required intermediate program forms loop-wide procedure-wide optimizations xcom however perform peephole optimization code generation response grammar rule attached rule immediate approach result inefficient code inefficient use machine registers offset efficiency implementation namely use dynamic strings mentioned earlier processing text compilation substring operations frequently performed fast assignment integer actual substring moved short quick easy teach short course fits modest-sized memories easy change different languages different target machines xcom compiler hand-written lexical scanner mechanically-generated parser syntax compiler input language case xpl described simplified bnf grammar xpl grammar analyzer tool analyzer xa turns set large data tables describing legal combinations syntax rules discern table generation step re-done language changed compiler runs data tables used small language-independent parsing algorithm parse respond input language style table-driven parser generally easier write entirely hand-written recursive descent parser xcom uses bottom-up parsing method compiler delay decision syntax rule encountered seen rightmost end phrase handles wider range programming languages top-down methods compiler must guess commit specific syntax rule early seen left end phrase xpl includes minimal runtime support library allocating garbage-collecting xpl string values source code library must included every program written xpl last piece xpl compiler writing system example compiler named skeleton xcom parse tables example toy grammar instead xpl full grammar starting point building compiler new language language differs much xpl xpl run control monitor xmon operating system-specific part system acts loader xcom programs developed using xcom also provides three auxiliary storage devices xcom use directly accessed block number originally published xmon optimized ibm 2311 disk drives ca 1964 efficient drives xmon 50 percent efficient ibm 2314 disk drives ca 1965 significantly less efficient subsequently introduced disk drives ibm 3330 ca 1970 3330-11 ca 1973 3350 ca 1975 dramatically less efficient devices much larger track capacities ibm 3390 ca 1989 converting xmon primitive use note point read/write disk operations precisely one block per track entire remainder track erased hence wasted space excp xdap n blocks per track n computed target device physical characteristics significantly greater 1 wasted space yields dramatic increase disk utilization efficiency corresponding reduction operating system overhead although originally developed os/360 xmon either original note point read/write implementation excp xdap enhancement run subsequently released ibm oses including os/370 xa os/390 z/os generally without changes xcom originally used now-obsolete bottom-up parse table method called mixed strategy precedence invented xpl team although officially released version retains msp parser include later-released peephole optimizations additional data types developed outside original implementation team msp generalization simple precedence parser method invented niklaus wirth pl360 simple precedence generalization trivially simple operator precedence methods work nicely expressions like a+b* c+d -e. msp tables include list expected triplets language symbols list grows larger cube grammar size becomes quite large typical full programming languages xpl-derived compilers difficult fit onto minicomputers 1970s limited memories msp also powerful enough handle likely grammars applicable language designer tweak language definition fit msp restrictions language widely used university toronto subsequently changed xcom xa instead use variant donald knuth lr parser bottom-up method xcom variant called simple lr slr handles grammars msp quite many grammars lalr full lr 1 differences lr 1 mostly table generator algorithms compile-time parser method xcom xa predate widespread availability unix yacc parser generator tool xa yacc similar purposes xpl open source system/360 version xpl distributed ibm share users organization groups ported xpl onto many larger machines 1970s various groups extended xpl used xpl implement moderate-sized languages xpl used develop number compilers various languages systems xpl continues ported current computers x86/freebsd port done 2000 x86/linux port 2015 xpl c translator 2017
[ 512, 2304, 5635, 4998, 4492, 8973, 10508, 1552, 3350, 5399, 2168, 7462, 5677, 8502, 823, 4409, 10560, 4548, 1349, 8262, 8140, 11599, 7421, 7775, 6502, 6248, 7272, 5484, 2798, 3960, 3323, 2172, 2045 ]
Test
6,243
6
Fsn_(file_manager):fsn file manager file system navigator fsn pronounced fusion experimental application view file system 3d made sgi irix systems even though never developed fully functional file manager gained fame appearing movie jurassic park 1993 scene film character lex murphy played ariana richards finds computer displaying interface exclaims unix system know proceeds restart building access control system locking control room doors release film perceived visualization example media misrepresentation computers citing computer game-like display unrealistic hollywood mockup
[ 5380, 5898, 7311, 5523, 5397, 5272, 9762, 7983, 3764, 823, 11447, 7234, 10051, 1860, 6858, 9932, 5076, 7001, 221, 5356, 1398, 1149 ]
Test
6,244
2
CLIP_OS:clip os clip os linux-based operating system created anssi national cybersecurity agency france aim produce hardened operating system secure sensitive information meets needs french administration clip os development since 2008 september 2018 anssi released two version clip os public stable version 4 in-development version 5 clip os based hardened gentoo variant gentoo linux developers noted whilst similar aims qubes os environment isolation mechanism different administrators clip os system able access user data unlike qubes-based system
[ 3082, 5139, 10780, 10785, 3618, 6180, 8242, 9266, 10817, 6213, 8268, 5222, 10856, 4734, 7812, 8326, 4238, 10382, 2195, 2711, 9882, 1694, 2723, 10933, 5815, 5822, 1736, 2762, 8909, 8410, 10971, 8928, 1761, 2278, 233, 4841, 10482, 2294, 8439,...
None
6,245
1
MySQL_Federated:mysql federated mysql federated storage engine mysql relational database management system storage engine allows user create table local representation foreign remote table utilizes mysql client library api data transport treating remote data source way storage engines treat local data sources whether myd files myisam memory cluster heap tablespace innodb federated table defined one .frm data definition file containing information url data source actual data exist local remote mysql instance create federated table one specify url connection string connection url format upon creation federated table user must ensure remote data source indeed exist error issued mysql federated storage engine authored patrick galbraith brian aker currently maintained patrick galbraith antony curtis introduced 2005 mysql 5.0
[ 11392, 8195, 6797, 10258, 7453, 1950, 9503, 7339, 7983, 9010, 823, 6721, 7234, 5964, 5198, 7506, 9687, 10459, 8295, 8683, 5356, 2413, 7022, 3188, 5492, 4598, 1399, 10873, 2810, 8700 ]
Test
6,246
4
MailChannels:mailchannels mailchannels privately held anti-spam technology company based vancouver british columbia mailchannels specializes software services detect block sending spam phishing abusive email unlike anti-spam technology providers mailchannels positions leader blocking abusive email source installing software services within sending networks services isps web hosting providers combat outgoing spam mailchannels offers customers either cloud-based smtp relay service software installed customer within network mailchannels software derives open-source web proxy software nginx company makes claim software extremely scalable robust mailchannels customers include large web hosting companies internet service providers mailbox providers email service providers endurance international group sendgrid sherweb locaweb company founded 2004 former engineers activestate acquired sophos created one first commercial spam filters company first product smtp proxy provides tar-pitting transparent smtp proxy functionality inbound email filtering 2007 mit spam conference company founder ken simpson awarded best paper award 2007 mailchannels joined maawg closed series round led current former microsoft employees 2010 company launched outbound email filtering software claims capable filtering 30 millions messages per hour transparently network outbound email filtering involves scanning email traffic exits network identifying compromised accounts reducing risk ip addresses blocked receiving networks 2013 company launched outbound spam filtering service 2016 company launched reseller program 2018 company launch inbound spam filtering service
[ 9824, 4194, 3237, 10696, 6762, 4272, 467, 9053, 2558, 9055 ]
Test
6,247
3
R10000:r10000 r10000 code-named t5 risc microprocessor implementation mips iv instruction set architecture isa developed mips technologies inc. mti division silicon graphics inc. sgi chief designers chris rowen kenneth c. yeager r10000 microarchitecture known andes abbreviation architecture non-sequential dynamic execution scheduling r10000 largely replaces r8000 high-end r4400 elsewhere mti fabless semiconductor company r10000 fabricated nec toshiba previous fabricators mips microprocessors integrated device technology idt three others fabricate r10000 expensive r4000 r4400 r10000 introduced january 1996 clock frequencies 175 mhz 195 mhz 150 mhz version introduced o2 product line 1997 discontinued shortly due customer preference 175 mhz version r10000 available large volumes later year due fabrication problems mips foundries 195 mhz version short supply throughout 1996 priced us 3,000 result 25 september 1996 sgi announced r10000s fabricated nec march end july year faulty drawing much current causing systems shut operation sgi recalled 10,000 r10000s shipped systems result impacted company earnings 1997 version r10000 fabricated 0.25 µm process enabled microprocessor reach 250 mhz users r10000 include r10000 four-way superscalar design implements register renaming executes instructions out-of-order design departure previous mti microprocessors r4000 much simpler scalar in-order design relies largely high clock rates performance r10000 fetches four instructions every cycle instruction cache instructions decoded placed integer floating-point load/store instruction queues depending type instruction decode unit assisted pre-decoded instructions instruction cache append five bits every instruction enable unit quickly identify execution unit instruction executed rearrange format instruction optimize decode process instruction queues accept four instructions decoder avoiding bottlenecks instruction queues issue instructions execution units dynamically depending availability operands resources queues except load/store queue issue two instructions every cycle execution units load/store queue issue one instruction r10000 thus issue five instructions every cycle integer unit consists integer register file three pipelines two integer one load store integer register file 64 bits wide contains 64 entries 32 architectural registers 32 rename registers implement register renaming register file seven read ports three write ports integer pipelines adder logic unit however first pipeline barrel shifter hardware confirming prediction conditional branches second pipeline used access multiplier divider multiplies pipelined six-cycle latency 32-bit integers ten 64-bit integers division pipelined divider uses non-restoring algorithm produces one bit per cycle latencies 32-bit 64-bit divides 35 67 cycles respectively floating-point unit fpu consists four functional units adder multiplier divide unit square root unit adder multiplier pipelined divide square root units adds multiplies latency three cycles adder multiplier accept new instruction every cycle divide unit 12- 19-cycle latency depending whether divide single precision double precision respectively square root unit executes square root reciprocal square root instructions square root instructions 18- 33-cycle latency single precision double precision respectively new square root instruction issued divide unit every 20 35 cycles single precision double precision respectively reciprocal square roots longer latencies 30 52 cycles single precision 32-bit double precision 64-bit respectively floating-point register file contains sixty-four 64-bit registers thirty-two architectural remaining rename registers adder dedicated read write ports whereas multiplier shares divider square root unit divide square root units use srt algorithm mips iv isa multiply–add instruction instruction implemented r10000 bypass — result multiply bypass register file delivered add pipeline operand thus fused multiply–add four-cycle latency r10000 two comparatively large on-chip caches 32 kb instruction cache 32 kb data cache instruction cache two-way set-associative 128-byte line size instructions partially decoded appending four bits instruction length 32 bits placed cache 32 kb data cache dual-ported two-way interleaving consists two 16 kb banks bank two-way set-associative cache 64-byte lines uses write-back protocol virtually indexed physically tagged enable cache indexed clock cycle maintain coherency secondary cache external secondary unified cache supported capacities 512 kb 16 mb implemented commodity synchronous static random access memorys ssrams cache accessed via 128-bit bus protected 9-bits error correcting code ecc cache bus operate clock rate r10000 whose maximum frequency 200 mhz 200 mhz bus yielded peak bandwidth 3.2 gb/s cache two-way set associative avoid high pin count r10000 predicts way accessed mips iv 64-bit architecture reduce cost r10000 implement entire physical virtual address instead 40-bit physical address 44-bit virtual address thus capable addressing 1 tb physical memory 16 tb virtual memory r10000 uses avalanche bus 64-bit bus operates frequencies 100 mhz avalanche multiplexed address data bus 100 mhz yields maximum theoretical bandwidth 800 mb/s peak bandwidth 640 mb/s requires cycles transmit addresses system interface controller supports glue-less symmetrical multiprocessing smp four microprocessors systems using r10000 external logic scale hundreds processors example system origin 2000 r10000 consists approximately 6.8 million transistors approximately 4.4 million contained primary caches die measures 16.640 17.934 mm die area 298.422 mm fabricated 0.35 µm process packaged 599-pad ceramic land grid array lga r10000 introduced microprocessor report covering 1994 microprocessor forum reported packaged 527-pin ceramic pin grid array cpga vendors also investigated possibility using 339-pin multi-chip module mcm containing microprocessor die 1 mb cache r10000 extended multiple successive derivatives derivatives r12000 clock frequency kept low possible maintain power dissipation 15 20 w range densely packaged sgi high performance computing hpc systems r12000 derivative r10000 started mips completed sgi fabricated nec toshiba version fabricated nec called vr12000 microprocessor introduced november 1998 available 270 300 360 mhz r12000 developed stop-gap solution following cancellation beast project intended deliver successor r10000 r12000 users include nec siemens-nixdorf sgi tandem computers later compaq acquisition tandem r12000 improves upon r10000 microarchitecture inserting extra pipeline stage improve clock frequency resolving critical path increasing number entries branch history table improving prediction modifying instruction queues take account age queued instruction enabling older instructions executed newer ones possible r12000 fabricated nec toshiba 0.25 µm cmos process four levels aluminum interconnect new use new process mean r12000 simple die shrink tweaked microarchitecture layout die optimized take advantage 0.25 µm process nec fabricated vr12000 contained 7.15 million transistors measured 15.7 14.6 mm 229.22 mm r12000a derivative r12000 developed sgi introduced july 2000 operates 400 mhz fabricated nec 0.18 µm process aluminum interconnects r14000 development r12000 announced july 2001 r14000 operates 500 mhz enabled 0.13 µm cmos process five levels copper interconnect fabricated features improvements microarchitecture r12000 supporting double data rate ddr ssrams secondary cache 200 mhz system bus r14000a development r14000 announced february 2002 operates 600 mhz dissipates approximately 17 w fabricated nec corporation 0.13 µm cmos process seven levels copper interconnect r16000 code-named n0 last derivative r10000 developed sgi fabricated nec 0.11 µm process eight levels copper interconnect microprocessor introduced 9 january 2003 debuting 700 mhz fuel also used onyx4 ultimate vision april 2003 600 mhz version introduced origin 350 improvements 64 kb instruction data caches r16000a refers r16000 microprocessors clock rates higher 700 mhz first r16000a 800 mhz version introduced 4 february 2004 later 900 mhz version introduced version time fastest publicly known r16000a—sgi later revealed 1.0 ghz r16000s shipped selected customers r16000 users include hp sgi sgi uses microprocessor fuel tezro workstations origin 3000 servers supercomputers hp uses r16000a nonstop himalaya s-series fault-tolerant servers inherited tandem via compaq r18000 canceled development r10000 microarchitecture featured major improvements silicon graphics inc. described hot chips symposium 2001 r18000 designed specifically sgi ccnuma servers supercomputers node would two r18000s connected via multiplexed bus system controller would interface microprocessors local memory rest system via hypercube network r18000 improved floating-point instruction queues revised floating-point unit feature two multiply–add units quadrupling peak flops count division square-root would performed separate non-pipelined units parallel multiply–add units system interface memory hierarchy also significantly reworked would 52-bit virtual address 48-bit physical address bidirectional multiplexed address data system bus earlier models would replaced two unidirectional ddr links 64-bit multiplexed address write path 128-bit read path paths could shared another r18000 multiplexing bus could also configured sysad avalanche configuration backwards compatibility r10000 systems r18000 would 1 mb four-way set-associative secondary cache included on-die supplemented optional tertiary cache built single data rate sdr double data rate ddr ssram ddr sdram capacities 2 64 mb l3 cache would cache tags equivalent 400 kb located on-die reduce latency l3 cache would accessed via 144-bit bus 128 bits data 16 bits ecc l3 cache clock rate would programmable r18000 fabricated nec ux5 process 0.13 µm cmos process nine levels copper interconnect would used 1.2 v power supply dissipated less heat contemporary server microprocessors order densely packed systems
[ 4098, 8327, 8711, 398, 783, 3470, 6926, 11539, 7445, 9851, 4124, 6815, 8481, 8355, 5028, 8229, 6057, 426, 938, 8237, 2994, 1461, 7093, 7234, 10051, 1606, 1480, 10316, 8143, 5076, 221, 3175, 6247, 7911, 6250, 6252, 6253, 5358, 4079, 6256, ...
Test
6,248
2
Michigan_Terminal_System:michigan terminal system michigan terminal system mts one first time-sharing computer operating systems developed 1967 university michigan use ibm s/360-67 s/370 compatible mainframe computers developed used consortium eight universities united states canada united kingdom period 33 years 1967 1999 university michigan multiprogramming supervisor ummps developed staff academic computing center university michigan operation ibm s/360-67 s/370 compatible computers software may described multiprogramming multiprocessing virtual memory time-sharing supervisor runs multiple resident reentrant programs among programs michigan terminal system mts command interpretation execution control file management accounting end-users interact computing resources mts using terminal batch server oriented facilities name mts refers mts used production basis 13 sites united states canada united kingdom brazil possibly yugoslavia several sites trial benchmarking basis mts developed maintained core group eight universities included mts consortium university michigan announced 1988 reliable mts service provided long users requiring ... mts may phased alternatives able meet users computing requirements ceased operating mts end-users june 30 1996 time services moved client/server-based computing systems typically unix servers various mac pc unix flavors clients university michigan shut mts system last time may 30 1997 rensselaer polytechnic institute rpi believed last site use mts production environment rpi retired mts june 1999 today mts still runs using ibm s/370 emulators hercules sim390 flex-es mid-1960s university michigan providing batch processing services ibm 7090 hardware control university michigan executive system umes interested offering interactive services using time-sharing time work computers could perform limited small real memory capacity ibm introduced system/360 family computers mid-1960s provide solution limitation within ibm conflicting views importance need support time-sharing paper titled program addressing structure time-sharing environment bruce arden bernard galler frank westervelt associate directors um academic computing center tom o'brian building upon basic ideas developed massachusetts institute technology mit published january 1966 paper outlined virtual memory architecture using dynamic address translation dat could used implement time-sharing year negotiations design studies ibm agreed make one-of-a-kind version s/360-65 mainframe computer dynamic address translation dat features would support virtual memory accommodate um desire support time-sharing computer dubbed model s/360-65m stood michigan ibm initially decided supply time-sharing operating system machine meanwhile number institutions heard project including general motors massachusetts institute technology mit lincoln laboratory princeton university carnegie institute technology later carnegie mellon university intrigued time-sharing idea expressed interest ordering modified ibm s/360 series machines demonstrated interest ibm changed computer model number s/360-67 made supported product requests 100 new model s/360-67s ibm realized market time-sharing agreed develop new time-sharing operating system called tss/360 tss stood time-sharing system delivery roughly time first model s/360-67 waiting model 65m arrive um computing center personnel able perform early time-sharing experiments using ibm system/360 model 50 funded arpa concomp conversational use computers project time-sharing experiment began half-page code written kitchen table combined small multi-programming system llmps mit lincoln laboratory modified became um multi-programming supervisor ummps turn ran mts job program earliest incarnation mts intended throw-away system used gain experience new ibm s/360 hardware would discarded ibm tss/360 operating system became available development tss took longer anticipated delivery date delayed yet available s/360-67 serial number 2 arrived computing center january 1967 time um decide whether return model 67 select another mainframe develop mts interim system use tss ready decision continue development mts staff moved initial development work model 50 model 67 tss development eventually canceled ibm reinstated canceled time um liked system developed longer considered interim mts would used um sites 33 years mts developed maintained used consortium eight universities us canada united kingdom several sites ran one mts system numac ran two first newcastle later durham michigan ran three mid-1980s um maize ub blue hg human genetics ubc ran three four different times mts-g mts-l mts-a mts-i general library administration instruction mts sites made contributions development mts sometimes taking lead design implementation new feature times refining enhancing critiquing work done elsewhere many mts components work multiple people multiple sites early days collaboration mts sites accomplished combination face-to-face site visits phone calls exchange documents magnetic tapes snail mail informal get-togethers share meetings later e-mail computer conferencing using confer *forum network file transfer e-mail attachments supplemented eventually largely replaced earlier methods members mts consortium produced series 82 mts newsletters 1971 1982 help coordinate mts development starting ubc 1974 mts consortium held annual mts workshops one member sites workshops informal included papers submitted advance proceedings published after-the-fact included session summaries mid-1980s several western workshops held participation subset mts sites ubc sfu uqv um possibly rpi annual workshops continued even mts development work began taper called simply community workshop continued mid-1990s share expertise common experiences providing computing services even though mts longer primary source computing campuses stopped running mts entirely addition eight mts consortium sites involved development mts run number sites including copy mts also sent university sarajevo yugoslavia though whether ever installed known inria french national institute research computer science control grenoble france ran mts trial basis university waterloo ontario canada southern illinois university naval postgraduate school amdahl corporation st systems mcgill university hospitals stanford university university illinois united states sites theory mts run ibm s/360-67 ibm s/370 series successors mts run following computers production benchmarking trial configurations university michigan installed ran mts first ibm s/360-67 outside ibm serial number 2 1967 second amdahl 470v/6 serial number 2 1975 first amdahl 5860 serial number 1 1982 first factory shipped ibm 3090-400 1986 numac ran mts first s/360-67 uk likely first europe university british columbia ubc took lead converting mts run ibm s/370 series ibm s/370-168 1974 university alberta installed first amdahl 470v/6 canada serial number p5 1975 1978 numac university newcastle upon tyne university durham moved main mts activity ibm s/370 series ibm s/370-168 mts designed support four processors ibm s/360-67 although ibm produced one simplex half-duplex two duplex processor configurations model 67 1984 rpi updated mts support 32 processors ibm s/370-xa extended addressing hardware series although 6 processors likely largest configuration actually used mts supports ibm vector facility available option ibm 3090 es/9000 systems early 1967 running single processor ibm s/360-67 um without virtual memory support mts typically supporting 5 simultaneous terminal sessions one batch job november 1967 virtual memory support added mts running ibm s/360-67 simultaneously supporting 50 terminal sessions 5 batch jobs august 1968 dual processor ibm s/360-67 replaced single processor system supporting roughly 70 terminal 8 batch jobs late 1991 mts um running ibm es/9000-720 supporting 600 simultaneous terminal sessions 3 8 batch jobs mts ipl-ed vm/370 mts sites ran mts native hardware without using virtual machine notable features mts include following notable programs developed mts following notable programs ported mts systems mts supports rich set programming languages developed mts others ported systems ummps supervisor complete control hardware manages collection job programs one job programs mts job program users interact mts operates collection command language subsystems clss one clss allows execution user programs mts provides collection system subroutines available clss user programs mts among things system subroutines provide standard access device support routines dsrs components perform device dependent input/output lists follow quite university michigan centric mts sites used material also produced manuals memos reports newsletters tailored needs site manual series mts michigan terminal system published 1967 1991 volumes 1 23 updated reissued irregularly initial releases volumes always occur numeric order volumes occasionally changed names updated republished general higher number specialized volume earliest versions mts volume ii different organization content mts volumes followed included internal well end user documentation second edition december 1967 covered following mts volumes published university michigan computing center available pdfs various aspects mts university michigan documented series computing center memos ccmemos published irregularly 1967 1987 numbered 2 924 though necessarily chronological order numbers 2 599 general memos various software hardware 600 series consultant notes series—short memos beginning intermediate users 800 series covers issues relating xerox 9700 printer text processing typesetting 900 series covers microcomputers 700 series 1989 series continued reference memos less focus mts long run newsletters targeted end-users university michigan titles computing center news computing center newsletter u-m computing news information technology digest published starting 1971 also introductory material presented user guide mts user guide tutorial series including following materials widely distributed included mts distributions university michigan released mts magnetic tape irregular basis full partial distributions full distributions d1.0 d2.0 ... included mts components partial distributions d1.1 d1.2 d2.1 d2.2 ... included components changed since last full partial distribution distributions 1.0 3.1 supported ibm s/360 model 67 distribution 3.2 supported ibm s/360-67 ibm s/370 architecture distributions d4.0 d6.0 supported ibm s/370 architecture extensions mts distributions included updates needed run licensed program products proprietary software mts base proprietary software obtained separately owners except ibm assembler h none licensed programs required run mts last mts distribution d6.0 released april 1988 consisted 10,003 files six 6250 bpi magnetic tapes 1988 distribution mts components done ad hoc fashion using network file transfer allow new sites get started scratch two additional magnetic tapes made available iplable boot tape contained minimalist version mts plus dasdi diskcopy utilities could used initialize restore one disk pack starter version mts second magnetic tape earliest days mts standalone tss dasdi dump/restore utilities rather mts used create one-disk starter system also less formal redistributions individual sites would send magnetic tapes containing new updated work coordinating site site would copy material common magnetic tape rd1 rd2 ... send copies tape sites contents redistribution tapes seem lost today complete materials six full ten partial mts distributions well two redistributions created 1968 1988 available bitsavers software archive university michigan deep blue digital archive working d6.0 distribution materials possible create iplable version mts new d6.0a distribution mts makes easier d6.0a based d6.0 version mts 1988 various fixes updates make operation hercules 2012 smoother future iplable version mts made available based upon version mts use university michigan 1996 shortly mts shut december 22 2011 mts distribution materials freely available terms creative commons attribution 3.0 unported license cc 3.0 earliest days mts made available free without need license sites interested running mts seemed knowledgeable staff required support mid-1980s licensing arrangements formalized university michigan acting agent granting licenses behalf mts consortium mts licenses available academic organizations annual fee 5,000 non-profit organizations 10,000 commercial organizations 25,000 license restricted mts used provide commercial computing services licensees received copy full set mts distribution tapes incremental distributions prepared year written installation instructions two copies current user documentation limited amount assistance organizations licensed mts several licensed mts order run single program confer fees collected used offset common expenses mts consortium
[ 6529, 2179, 4996, 10883, 5384, 10508, 7053, 8077, 9361, 7186, 6675, 7187, 789, 5397, 9468, 11539, 11673, 9370, 6557, 3359, 9762, 421, 9126, 7848, 11075, 1323, 7983, 8879, 7217, 10803, 7477, 7733, 8502, 10040, 5562, 573, 1219, 8388, 1349, ...
Test
6,249
9
Modelling_of_General_Systems:modelling general systems mgs general model simulation domain-specific language used specification simulation dynamical systems dynamical structure developed ibisc computer science integrative biology complex systems université d'évry val-d'essonne university évry mgs particularly aimed modelling biological systems mgs computational model generalisation cellular automata lindenmayer systems paun systems computational formalisms inspired chemistry biology manipulates collections sets positions filled values lattice user-defined topology
[ 9926, 8262 ]
Test
6,250
3
R3000:r3000 r3000 32-bit risc microprocessor chipset developed mips computer systems implemented mips instruction set architecture isa introduced june 1988 second mips implementation succeeding r2000 flagship mips microprocessor operated 20 25 33.33 mhz mips 1 instruction set small compared contemporary 80x86 680x0 architectures encoding commonly-used operations supporting addressing modes combined fixed instruction length three different types instruction formats simplified instruction decoding processing employed 5-stage instruction pipeline enabling execution rate approaching one instruction per cycle unusual time mips generation supports four co-processors addition cpu core r3000 microprocessor includes control processor cp contains translation lookaside buffer memory management unit cp works coprocessor besides cp r3000 also support external r3010 numeric coprocessor two external coprocessors r3000 cpu include level 1 cache instead on-chip cache controller operates external data instruction caches 256 kb access caches clock cycle r3000 found much success used many companies workstations servers users included r3000 also used embedded microprocessor advances technology rendered obsolete high-performance systems found continued use lower-cost designs companies lsi logic developed derivatives r3000 specifically embedded systems r3000 development r2000 minor improvements including larger tlb faster bus external caches r3000 die contained 115,000 transistors measured 75,000 square mils 48 mm mips fabless semiconductor company r3000 fabricated mips partners including integrated device technology idt lsi logic nec corporation performance semiconductor others fabricated 1.2 µm complementary metal–oxide–semiconductor cmos process two levels aluminium interconnect derivatives r3000 non-embedded applications include derivatives r3000 embedded applications include
[ 9857, 4098, 8327, 8711, 7561, 3597, 783, 6415, 8976, 7954, 7445, 921, 9851, 4124, 8481, 8355, 5028, 6821, 8231, 6057, 426, 938, 9003, 8237, 9391, 7234, 10051, 1606, 2503, 1480, 6854, 9932, 10316, 2525, 1376, 6247, 2155, 6252, 6253, 5358, ...
Validation
6,251
2
Talking_Moose:talking moose talking moose animated talking utility apple macintosh created 1986 canadian programmer steven halls first animated talking agent personal computer featured moose would appear periodic intervals joke witticism moose would also comment system events user actions could speak user typed using moose proof desk accessory according halls original purpose moose make use mac macintalk text-to-speech engine novel manner doonesbury strip characters commented talking computer provided inspiration halls found moose head antlers recognizable even low-resolution computer screens moose first facially animated talking agent lip synchronization became seed idea future talking agents clippy paperclip microsoft windows bonzi buddy prody parrot creative soundblaster talking moose used apple macintalk software first version famously made original never trust computer ca n't lift speech macintosh launch 1984 apple development macintalk petered granted halls permission use continue refining software free halls improve fluidity speech reliability interpretation gave moose library comedic observations wisecracks gave distinctive character around 1990 version talking moose software commercially published baseline publishing commercial release talking moose included color graphics additional software allowed users create edit phrases spoken stripped-down version baseline release talking moose distributed bob levitus book stupid mac tricks 1989 1990s moose rewritten uli kusterer name uli moose later obtained steve halls blessing moose included bob levitus imac ibook book n't know could version 1.0 talking moose released 1986 steve halls version 2.0 released 1987 ran macintosh systems 6.0.4 7.1 macintalk voice used moose 'fred around 1990 baseline publishing commercially published talking moose released version 4 introducing new characters cartoon carnival supposedly run titular ungulate uli kusterer next author moose got rid cartoon carnival worked spirit original moose releasing new versions starting 1.0 supported mac os 7.1 9.2 released initially compuserve later internet also developed first os x native version v 3.0 latest macintosh version moose v3.5.7 works versions os x 10.3 10.7 includes universal binaries january 8 2009 talking moose posting periodic comments twitter account
[ 3533, 7983 ]
Test
6,252
3
R4000:r4000 r4000 microprocessor developed mips computer systems implements mips iii instruction set architecture isa officially announced 1 october 1991 one first 64-bit microprocessors first mips iii implementation early 1990s risc microprocessors expected replace cisc microprocessors intel i486 r4000 selected microprocessor advanced computing environment ace industry standard intended define common risc platform ace ultimately failed number reasons r4000 found success workstation server markets three configurations r4000 r4000pc entry-level model support secondary cache r4000sc model secondary cache multiprocessor capability r4000mc model secondary cache support cache coherency protocols required multiprocessor systems r4000 scalar superpipelined microprocessor eight-stage integer pipeline first stage virtual address instruction generated instruction translation lookaside buffer tlb begins translation address physical address second stage translation completed instruction fetched internal 8 kb instruction cache instruction cache direct-mapped virtually indexed physically tagged 16- 32-byte line size architecturally could expanded 32 kb third stage rf instruction decoded register file read mips iii defines two register files one integer unit floating-point register file 64 bits wide contained 32 entries integer register file two read ports one write port floating-point register file two read ports two write ports execution begins stage four ex integer floating-point instructions written back register files completed stage eight wb results may bypassed possible r4000 arithmetic logic unit alu shifter multiplier divider load aligner executing integer instructions alu consists 64-bit carry-select adder logic unit pipelined shifter 32-bit barrel shifter performs 64-bit shifts two cycles stalling pipeline result design chosen save die area multiplier divider pipelined significant latencies multiplies 10- 20-cycle latency 32-bit 64-bit integers respectively whereas divides 69- 133-cycle latency 32-bit 64-bit integers respectively instructions single cycle latency alu adder also used calculating virtual addresses loads stores branches load store instructions executed integer pipeline access on-chip 8 kb data cache r4000 on-die ieee 754-1985-compliant floating-point unit fpu referred r4010 fpu coprocessor designated cp1 mips isa defined four coprocessors designated cp0 cp3 fpu operate two modes 32- 64-bit selected setting bit fr bit cpu status register 32-bit mode 32 floating-point registers become 32 bits wide used hold single-precision floating-point numbers used hold double-precision numbers 16 floating-point registers registers paired fpu operate parallel alu unless data resource dependency causes stall contains three sub-units adder multiplier divider multiplier divider execute instruction parallel adder use adder final stages execution thus imposing limits overlapping execution thus certain conditions execute three instructions time one unit fpu capable retiring one instruction per cycle adder multiplier pipelined multiplier four-stage multiplier pipeline clocked twice clock frequency microprocessor adequate performance uses dynamic logic achieve high clock frequency division 23- 36-cycle latency single- double-precision operations square-root 54- 112-cycle latency division square-root uses srt algorithm memory management unit mmu uses 48-entry translation lookaside buffer translate virtual addresses r4000 uses 64-bit virtual address implements 40 64-bits 1 tb virtual memory remaining bits checked ensure contain zero r4000 uses 36-bit physical address thus able address 64 gb physical memory r4000 sc mc configurations supports external secondary cache capacity 128 kb 4 mb cache accessed via dedicated 128-bit data bus secondary cache configured either unified cache split instruction data cache latter configuration cache capacity 128 kb 2 mb secondary cache physically indexed physically tagged programmable line size 128 256 512 1,024 bytes cache controller on-die cache built standard static random access memory sram data tag buses ecc-protected r4000 uses 64-bit system bus called sysad bus sysad bus address data multiplexed bus used set wires transfer data addresses reduces bandwidth also less expensive providing separate address bus requires pins increases complexity system sysad bus configured operate half third quarter internal clock frequency sysad bus generates clock signal dividing operating frequency r4000 contains 1.2 million transistors designed 1.0 µm two-layer metal complementary metal–oxide–semiconductor cmos process mips fabless company r4000 fabricated partners processes 0.8 µm minimum feature size r4000 generates various clock signals master clock signal generated externally operating frequency r4000 multiplies master clock signal two use on-die phase-locked loop pll r4000pc packaged 179-pin ceramic pin grid array cpga r4000sc r4000mc packaged 447-pin ceramic staggered pin grid array spga pin r4000mc different r4000sc pins unused r4000sc used signals implement cache coherency r4000mc pin-out r4000pc similar pga-packaged r4200 r4600 microprocessors characteristic enables properly designed system use three microprocessors r4400 development r4000 announced early november 1992 samples microprocessor shipped selected customers general availability january 1993 r4400 operates higher clock frequencies 100 133 150 200 250 mhz major improvement r4000 larger primary caches doubled capacity 16 kb 8 kb contained 2.3 million transistors r4400 licensed integrated device technology idt lsi logic nec performance semiconductor siemens ag toshiba idt nec siemens toshiba fabricated marketed microprocessor lsi logic used r4400 custom products performance semiconductor sold logic division cypress semiconductor mips microprocessor products discontinued nec marketed version vr4400 first version 150 mhz part announced november 1992 early versions fabricated 0.6 µm process mid-1995 250 mhz part began sampling fabricated 0.35 µm four-layer-metal process nec also produced mr4401 ceramic multi-chip module mcm contained vr4400sc ten 1 mbit sram chips implemented 1 mb secondary cache mcm pin-compatible r4x00pc first version 150 mhz part announced 1994 1995 200 mhz part announced toshiba marketed version tc86r4400 200 mhz part containing 2.3 million transistors measuring 134 mm fabricated 0.3 µm process introduced mid-1994 r4400pc priced 1,600 r4400sc 1,950 r4400mc 2,150 quantities 10,000 r4400 used r4000 r4400 require external core logic interface system commercially available proprietary core logic developed microprocessors proprietary designs developed system vendors sgi use systems commercial chipsets developed acer mips microprocessors fabricators nec toshiba acer developed pica chipset toshiba developed tiger shark chipset adapted sysad bus i486-compatible system bus
[ 4098, 6791, 8327, 8711, 783, 8976, 11539, 2452, 7445, 2071, 9851, 4124, 8481, 8355, 4516, 5028, 8229, 8231, 6057, 426, 938, 8237, 7215, 11058, 1461, 7093, 7234, 10051, 1606, 6854, 1480, 10316, 6879, 3175, 6247, 7911, 3818, 6250, 6252, 625...
Train
6,253
3
R5000:r5000 r5000 microprocessor implements mips iv instruction set architecture isa developed quantum effect design qed project funded mips technologies inc mti also licensor mti licensed design integrated device technology idt nec nkk toshiba r5000 succeeded qed r4600 r4700 flagship high-end embedded microprocessor idt marketed version r5000 79rv5000 nec vr5000 nkk nr5000 toshiba tx5000 r5000 sold pmc-sierra company acquired qed derivatives r5000 still production today embedded systems users r5000 workstation server computers silicon graphics inc. sgi siemens-nixdorf sgi used r5000 o2 indy low-end workstations r5000 also used embedded systems network routers high-end printers r5000 found way arcade gaming industry r5000 powered mainboards used atari midway initially cobalt qube cobalt raq used derivative model rm5230 rm5231 qube 2700 used rm5230 microprocessor whereas qube 2 used rm5231 original raq systems equipped rm5230 rm5231 cpus later models used amd k6-2 chips eventually intel pentium iii cpus final models original roadmap called 200 mhz operation early 1996 250 mhz late 1996 succeeded 1997 r5000a r5000 introduced january 1996 failed achieve 200 mhz topping 180 mhz positioned low-end workstation microprocessor competition included ibm motorola powerpc 604 hp pa-7300lc intel pentium pro r5000 two-way superscalar design executes instructions in-order r5000 could simultaneously issue integer floating-point instruction one simple pipeline integer instructions another floating-point save transistors die area reduce cost r5000 perform dynamic branch prediction cost reasons instead uses static approach utilizing hints encoded compiler branch-likely instructions first introduced mips ii architecture determine likely branch taken r5000 large l1 caches distinct characteristic qed whose designers favored simple designs large caches r5000 two l1 caches one instructions data capacity 32 kb caches two-way set-associative 32-byte line size virtually indexed physically tagged instructions predecoded enter instruction cache appending four bits instruction four bits specify whether issued together execution unit executed assisted superscalar instruction issue moving dependency conflict checking critical path integer unit executes instructions one cycle latency throughput except multiply divide 32-bit multiplies five-cycle latency four-cycle throughput 64-bit multiplies extra four cycles latency half throughput divides 36-cycle latency throughput 32-bit integers 64-bit integers increased 68 cycles floating-point unit fpu fast single-precision 32-bit design reduced cost benefit sgi whose mid-range 3d graphics workstations relied mostly single-precision math 3d graphics applications fully pipelined made significantly better r4700 r5000 implements multiply-add instruction mips iv isa single-precision adds multiplies multiply-adds four-cycle latency one cycle throughput single-precision divides 21-cycle latency 19-cycle throughput square roots 26-cycle latency 38-cycle throughput division square-root pipelined instructions operate double precision numbers significantly higher latency lower throughput except add identical latency throughput single-precision add multiply multiply-add five-cycle latency two-cycle throughput divide 36-cycle latency 34-cycle throughput square root 68-cycle latency 66-cycle throughput r5000 integrated l2 cache controller supported capacities 512 kb 1 mb 2 mb l2 cache shares sysad bus external interface cache built custom synchronous srams ssrams microprocessor uses sysad bus also used several mips microprocessors bus multiplexed address data share set wires operate clock frequencies 100 mhz initial r5000 support multiprocessing package reserved eight pins future addition feature qed fabless company fabricate designs r5000 fabricated idt nec nkk three companies fabricated r5000 0.35 µm complementary metal–oxide–semiconductor cmos process different process features idt fabricated r5000 process two levels polysilicon three levels aluminium interconnect two levels polysilicon enabled idt use four-transistor sram cell resulting transistor count 3.6 million die measured 8.7 mm 9.7 mm 84.39 mm nec nkk fabricated r5000 process one level polysilicon three levels aluminium interconnect without extra level polysilicon companies use six-transistor sram cell resulting transistor count 5.0 million larger die area around 87 mm die sizes range 80 90 mm claimed mti 0.8 million transistors versions logic remainder contained caches packaged 272-ball plastic ball grid array bga 272-pin plastic pin grid array pga pin-compatible previous mips microprocessor late 1990s quantum effect design acquired license manufacture sell mips microprocessors mti became microprocessor vendor changing name quantum effect devices reflect new business model company first products members rm52xx family initially consisted two models rm5230 rm5260 announced 24 march 1997 rm5230 initially available 100 133 mhz rm5260 133 150 mhz 29 september 1997 new 150 175 mhz rm5230s introduced 175 200 mhz rm5260s rm5230 rm5260 derivatives r5000 differ size primary caches 16 kb instead 32 kb width system interfaces rm5230 32-bit 67 mhz sysad bus rm5260 64-bit 75 mhz sysad bus addition multiply-add three-operand multiply instructions digital signal processing applications microprocessors fabricated taiwan semiconductor manufacturing company tsmc 0.35 μm process three levels interconnect packaged amkor technology power-quad 4 packages rm5230 128-pin version rm5260 208-pin version rm52xx family later joined rm5270 announced embedded systems conference 29 september 1997 intended high-end embedded applications rm5270 available 150 200 mhz improvements addition on-chip secondary cache controller supported 2 mb cache sysad bus 64 bits wide operate 100 mhz packaged 304-pin super-bga sbga pin-compatible rm7000 offered migration path rm7000 20 july 1998 rm52x1 family announced family consisted rm5231 rm5261 rm5271 microprocessors derivatives corresponding devices rm52x0 family fabricated 0.25 μm process four levels metal rm5231 initially available 150 200 250 mhz whereas rm5261 rm5271 available 250 266 mhz 6 july 1999 300 mhz rm5271 introduced priced us 140 quantities 10,000 rm52x1 improved upon previous family larger 32 kb primary caches faster sysad bus supported clock rates 125 mhz qed acquired pmc-sierra rm52xx rm52x1 families continued pmc-sierra products pmc-sierra introduced two rm52x1 derivatives rm5231a rm5261a 4 april 2001 microprocessors fabricated tsmc 0.18 μm process differ previous devices featuring higher clock rates lower power consumption rm5231a available clock rates 250 350 mhz rm5261a 250 400 mhz r5900 used sony playstation 2 modified version r5000 cpu dubbed emotion engine customized instruction/data cache arrangement sony proprietary 107 vector simd multimedia extensions mmi custom fpu n't ieee 754 compliant unlike fpus used r5000 also second mips core acted sync controller specialized vector coprocessors important 3d math time principally computed cpu
[ 4098, 8327, 8711, 6926, 783, 7445, 2071, 9851, 4124, 6815, 1952, 8481, 8355, 5028, 8231, 6057, 938, 426, 8237, 2994, 1461, 7234, 10051, 1480, 10316, 6247, 6250, 6252, 5358, 10734, 6256, 5237, 760, 3451 ]
None
6,254
4
Blue_Pill_(software):blue pill software blue pill codename rootkit based x86 virtualization blue pill originally required amd-v pacifica virtualization support later ported support intel vt-x vanderpool well designed joanna rutkowska originally demonstrated black hat briefings august 3 2006 reference implementation microsoft windows vista kernel name reference red pill blue pill concept 1999 film matrix blue pill concept trap running instance operating system starting thin hypervisor virtualizing rest machine previous operating system would still maintain existing references devices files nearly anything including hardware interrupts requests data even system time could intercepted fake response sent hypervisor original concept blue pill published another researcher ieee oakland may 2006 name vmbr virtual-machine based rootkit joanna rutkowska claims since detection program could fooled hypervisor system could 100 undetectable since amd virtualization seamless design virtualized guest supposed able query whether guest therefore way blue pill could detected virtualization implementation functioning specified assessment repeated numerous press articles disputed amd issued statement dismissing claim full undetectability security researchers journalists also dismissed concept implausible virtualization could detected timing attack relying external sources time 2007 group researchers led thomas ptacek matasano security challenged rutkowska put blue pill rootkit detector software year black hat conference deal deemed no-go following rutkowska request 384,000 funding prerequisite entering competition rutkowska alexander tereshkin countered detractors claims subsequent black hat speech arguing proposed detection methods inaccurate source code blue pill since made public following license unauthorized use including publishing distribution software requires valid license copyright holder software provided educational use black hat training conference red pill technique detect presence virtual machine also developed joanna rutkowska
[ 2275, 8273, 8978, 1143, 4695, 4956, 9791 ]
Test
6,255
7
VEXXHOST:vexxhost vexxhost privately-owned leading canadian openstack cloud infrastructure-as-a-service provider corporate headquarter montreal quebec founded 2006 vexxhost offers cloud computing solutions public cloud private cloud hybrid cloud solutions along kubernetes enablement openstack consulting services company data centres located montreal quebec santa clara california established 2006 vexxhost initially web hosting provider offering services shared hosting vps however advancement cloud technologies vexxhost made decision move innovative options cloud hosting leap cloud-based hosting garnered positive response encouraging vexxhost invest cloud-based solutions 2011 vexxhost adopted openstack software infrastructure since vexxhost active contributor avid user openstack transition resulted vexxhost adopting openstack software infrastructure beginnings vexxhost ’ profound relationship openstack foundation today vexxhost global provider infrastructure-as-a-service openstack public cloud private cloud hybrid cloud consulting solutions customers ranging small businesses enterprises across world vexxhost currently running stein latest release openstack able implement update clouds day release vexxhost contributing openstack community since second release bexar 2011 company also corporate sponsor infrastructure donor openstack infrastructure teamwhile maintaining presence community regularly attending openstack summits vexxhost also part interop challenge boston summit 2017 vexxhost sponsored openstack summits held berlin 2018 vancouver denver 2019 co-founder mohammed naser acting ptl openstack ’ ansible project sits chair openstack technical committee given talks montreal ottawa toronto openstack meet-ups summits well several keynotes across north america europe vexxhost plays part community actively contributing upstream code sharing feedback ptls developers along operation experience running canada ’ biggest openstack public cloud vexxhost recently awarded openstack superuser award open infrastructure summit held april 29th 2019 denver vexxhost offers fully certified openstack powered cloud solutions validated testing provide api compatibility openstack core services additionally accelerate bugfixes reporting diagnosing working community addition participation openstack ’ ironic bare metal program december 10th 2018 vexxhost announced become silver member linux foundation subsidiary cloud native computing foundation vexxhost unveiled certified kubernetes-as-a-service offering runs openstack ’ magnum month vexxhost also sponsored kubecon north america 2018 seattle located montreal canada private data centre uses green hydroelectric power ssae-16 soc type 2 compliant high level physical security every aspect infrastructure secured advanced firewalls protect users ’ data cloud platforms designed implement full isolation reduce security issues maximize reliability newly announced santa clara california data centre bring standards data security storage united states including secure ssae-16 facility undergone soc type 2 audit silicon valley region also equipped nested virtualization 40gbit internal networking high throughput low latency optimal processing big data 10gbit public internet connection region currently running latest release openstack stein vexxhost runs exclusively openstack managed services across entire infrastructure work users help architect configure optimize cloud infrastructure order reduce expenses increase productivity vexxhost also delivers high level expertise clients enabling focus core competencies vexxhost manages largest openstack public cloud canada montreal data centres addition vexxhost ’ santa clara data centre public cloud offering available globally vexxhost recently revamped billing model public cloud offers minutely billing clients following openstack projects supported readily available within vexxhost public cloud offering above-mentioned projects vexxhost offers on-demand seamless integration openstack projects vexxhost ’ private cloud offering available hosted deployment on-premise deployment anywhere world regardless data centre ownership openstack projects supported vexxhost openstack certification private cloud solution offers services available public cloud vexxhost ’ updated private cloud offering available different deployment models on-premise heavy lifting gathering requirements architecting cloud deploying testing managing openstack done vexxhost team users provide data centre hardware hosted leverage vexxhost ’ multiple ssae-16 data centres certified tested hardware bring private cloud quickly users access use cloud via encrypted vpns public internet private fibre access also option deploy private cloud anywhere world regardless data centre ownership moreover comes unique feature access virtual machines bare metal kubernetes one environment another noteworthy feature provide users access multiple architecture options intel arm well access enterprise-grade gpus customizable hardware specifications following openstack projects supported readily available within vexxhost private cloud offering above-mentioned projects vexxhost offers on-demand seamless integration openstack projects vexxhost flexible hybrid solutions offer mix public cloud private cloud on-premise solutions traditionally mixed matched meet needs user users get access dedicated single-tenant resources vexxhost ’ public cloud carve private cloud cost savings option getting access dedicated hardware vexxhost ’ dedicated load balancer distributes traffic among dedicated public private servers every load balancer platform runs within dedicated instance dedicated ip vexxhost offers consultation various cloud computing openstack troubleshooting development cloud strategy roadmap upgrades new releases launching public openstack services openstack project implementations openstack consultants help companies upgrade latest openstack release implement openstack project give guidance openstack strategy vexxhost kubernetes enablement offering developed make certified kubernetes service accessible fully managed service provides quick on-demand access certified kubernetes compatible virtual machines bare metal provides users secure container clusters enhanced isolation upgraded performance due faster deployment times simplified extensive service integrations vexxhost team currently running openstack stein openstack ’ latest 19th release since day one release result vexxhost team first production-ready private cloud running stein vexxhost offered service users past consultation offering however make easier users take advantage company broken openstack upgrades simplified solution
[ 4194, 4011 ]
None
6,256
3
R8000:r8000 r8000 microprocessor chipset developed mips technologies inc. mti toshiba weitek first implementation mips iv instruction set architecture r8000 also known tfp tremendous floating-point name development development r8000 started early 1990s silicon graphics inc. sgi r8000 specifically designed provide performance circa 1990s supercomputers microprocessor instead central processing unit cpu built many discrete components gate arrays time performance traditional supercomputers advancing rapidly reduced instruction set computer risc microprocessors predicted risc microprocessors would eventually match performance expensive larger supercomputers fraction cost size making computers level performance accessible enabling deskside workstations servers replace supercomputers many situations first details r8000 emerged april 1992 announcement mips computer systems detailing future mips microprocessors march 1992 sgi announced acquiring mips computer systems became subsidiary sgi called mips technologies inc. mti mid-1992 development r8000 transferred mti continued r8000 expected introduced 1993 delayed mid-1994 first r8000 75 mhz part introduced 7 june 1994 priced us 2,500 time mid-1995 90 mhz part appeared systems sgi r8000 high cost narrow market technical scientific computing restricted market share although popular intended market largely replaced cheaper generally better performing r10000 introduced january 1996 users r8000 sgi used power indigo2 workstation power challenge server power challengearray cluster power onyx visualization system november 1994 top500 list 50 systems 500 used r8000 highest ranked r8000-based systems four power challenges positions 154 157 18 r8000s chip set consisted r8000 microprocessor r8010 floating-point unit two tag rams streaming cache r8000 superscalar capable issuing four instructions per cycle executes instructions program order five-stage integer pipeline r8000 controlled chip set executed integer instructions contained integer execution units integer register file primary caches hardware instruction fetch branch prediction translation lookaside buffers tlbs stage one four instructions fetched instruction cache instruction cache 16 kb large direct-mapped virtually tagged virtually indexed 32-byte line size instruction decoding register reads occur stage two branch instructions resolved well leading one-cycle branch mispredict penalty load store instructions begin execution stage three integer instructions stage four integer execution delayed stage four integer instructions use result load operand may issued cycle load results written integer register file stage five integer register file nine read ports four write ports four read ports supply operands two integer execution units branch unit considered part integer unit another four read ports supply operands two address generators four ports needed rather two base register index register address style added mips iv isa r8000 issues one integer store per cycle one final read port delivers integer store data two register file write ports used write results two integer functional units r8000 issues two integer loads per cycle two write ports used write results integer loads register file level 1 data cache organized two redundant arrays one read port one write port integer stores written arrays two loads could processed parallel one array integer functional units consisted two integer units shift unit multiply-divide unit two address generator units multiply divide instructions executed multiply-divide unit pipelined result latency multiply instruction four cycles 32-bit operands six cycles 64-bit latency divide instruction depends number significant digits result thus varies 21 73 cycles loads stores begin execution stage three r8000 two address generation units agus calculate virtual address loads stores stage four virtual addresses translated physical addresses dual-ported tlb contains 384 entries three-way set associative 16 kb data cache accessed cycle dual-ported accessed via two 64-bit buses service two loads one load one store per cycle cache protected parity error correcting code ecc event cache miss data must loaded streaming cache eight-cycle penalty cache virtually indexed physically tagged direct mapped 32-byte line size uses write-through allocate protocol loads hit data cache result written integer register file stage five r8010 executed floating-point instructions provided instruction queue r8000 queue decoupled floating-point pipeline integer pipeline implementing limited form out-of-order execution allowing floating-point instructions execute possible integer instructions group issued pipelines decoupled help mitigate streaming cache latency contained floating-point register file load queue store queue two identical floating-point units instructions except divide square-root pipelined r8010 implements iterative division square-root algorithm uses multiplier key part requiring pipeline stalled unit duration operation arithmetic instructions except compares four-cycle latency single double precision divides latencies 14 20 cycles respectively single double precision square-roots latencies 14 23 cycles respectively streaming cache external 1 16 mb cache serves r8000 l2 unified cache r8010 l1 data cache operates clock rate r8000 built commodity synchronous static rams scheme used attain sustained floating point performance requires frequent access data small low-latency primary cache would contain enough data frequently miss necessitating long latency refiles reduce performance streaming cache two-way interleaved two independent banks containing data even odd addresses therefore perform two reads two writes read write every cycle provided two accesses separate banks bank accessed via two 64-bit unidirectional buses one reads writes scheme used avoid bus turnover required bidirectional buses avoiding bus turnover cache read one cycle written next cycle without intervening cycle turnover resulting improved performance streaming cache tags contained two tag ram chips one bank chips contain identical data chip contains 1.189 mbit cache tags implemented four-transistor sram cells chips implemented 0.7 μm bicmos process two levels polysilicon two levels aluminium interconnect bicmos circuitry used decoders combined sense amplifier comparator portions chip reduce cycle time tag ram 14.8 mm 14.8 mm large packaged 155-pin cpga dissipates 3 w 75 mhz addition providing cache tags tag rams responsible streaming cache four-way set associative avoid high pin count cache tags four-way set associative logic selects set access lookup instead usual way implementing set-associative caches access streaming cache pipelined mitigate latency pipeline five stages stage one addresses sent tag rams accessed stage two stage three signals tag rams propagate ssrams stage four ssrams accessed data returned r8000 r8010 stage five r8000 contained 2.6 million transistors measured 17.34 mm 17.30 mm 299.98 mm² r8010 contained 830,000 transistors total two chips contained 3.43 million transistors fabricated toshiba vhmosiii process 0.7 µm triple-layer metal complementary metal–oxide–semiconductor cmos process packaged 591-pin ceramic pin grid array cpga packages chips used 3.3 v power supply r8000 dissipated 13 w 75 mhz
[ 4098, 8327, 8711, 6926, 783, 7445, 9851, 4124, 6815, 8481, 5028, 8231, 6057, 938, 426, 8237, 9391, 7093, 1463, 7234, 10051, 4804, 1480, 10316, 2525, 3175, 6247, 6250, 6252, 6253, 5358, 10734, 5237, 6006, 760, 3451 ]
Test
6,257
2
KPackage:kpackage kpackage kde package manager frontend supported bsd debian gentoo rpm slackware packages provided gui management upgrade existing packages installation acquirement new packages additionally provided functionality help manage package caches kpackage part kdeadmin developed kde.org
[ 11525, 2310, 10760, 2955, 7947, 7181, 2448, 5397, 6680, 8476, 5670, 4775, 6694, 8621, 6446, 7983, 1842, 6583, 2872, 3131, 10172, 3649, 10817, 5067, 3407, 6991, 6227, 4309, 4951, 7384, 7140, 5096, 9324, 7920, 10096, 1138, 1522, 3828, 6389 ]
None
6,258
3
Macintosh_IIcx:macintosh iicx macintosh iicx personal computer designed manufactured sold apple computer inc. march 1989 march 1991 introduced half year macintosh iix iicx resembles iix great extent provides performance seven inches narrower ten pounds lighter somewhat quieter due smaller internal fan relative compactness results three nubus slots available compared six iix new case apple first designed operate either horizontal vertical orientation remained use successors macintosh iici quadra 700 idea vertical orientation one first minitower cases suggested apple ceo john sculley running space desk despite fact new layout actually took space monitor taken account model designated iicx compact echoing earlier apple iic compact model apple ii series x apple designation 68030 processor users liked mac iicx part components parts ram nubus slots power supply snapped place inside case without need screws one central safety screw tied assembly together though often reinstalled ever removed iicx introduction jean-louis gassée demonstrated iicx modular design assembling one parts front audience made less expensive build easier repair earned heavy praise warm reception amongst mac community machine also lightest apple lineup time however unlike ii iix cpu soldered logic board therefore upgraded case also unable accommodate 5 1/4 full-height hard disk drives model superseded macintosh iici used case
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 576, 1090, 4180, 10838, 10840, 9312, 8806, 10357, 4220, 10365, 10878, 6783, 7299, 4741, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 7869, 8893, 8896, 4807, ...
Test
6,259
7
Moovly:moovly moovly company provides cloud-based platform saas enables users create generate multimedia content animated videos video presentations animated info graphics video content includes mix animation motion graphics moovly founded belgium november 2012 brendon grunewald geert coppens vision becoming number one platform engaging customisable multimedia content creation company mission enable everyone create engaging multimedia content making affordable intuitive simple company seen steady subscriber growth multinational corporations small medium business well educational institutions.. company initially secured several rounds external investment fund growth july 2016 listed toronto venture stock exchange moovly media inc symbol mvy tsx.v mvy october 9 2018 moovly announced launch new dropbox integration allows moovly users easily access upload photo video content dropbox within moovly studio editor moovly cloud based digital media content creation software platform content created via various interfaces including editor well simple custom-made video generation interfaces using combination uploaded images videos sounds well pre-defined library objects users able quickly assemble new animated content final videos presentations downloaded mp4 example published variety video platforms moovly provides feature-rich free license allowing users create animated videos exported facebook youtube well premium licenses advanced professional use free videos include moovly branding educational tool educational purposes moovly offers specific licenses companies brands use library animated graphics fonts standard color set february 4 2019 certificate site expired one able come site
[ 467, 4623 ]
None
6,260
9
Collaborative_human_interpreter:collaborative human interpreter collaborative human interpreter chi proposed software interface human-based computation first proposed programming language blog google blogoscoped implementable via api virtually programming language specially designed collecting making use human intelligence computer program one typical usage implementing impossible-to-automate functions example currently difficult computer differentiate images men women non-humans however easy people programmer using chi could write code fragment along lines code function codice_1 currently approximate result task easily solved person function codice_2 called system send request someone person received request process task input result person task processor inputs value codice_3 'll get value variable result program querying process highly automated november 6 2005 amazon.com launched chi business platform amazon mechanical turk first business application using chi chi originally mentioned philipp lenssen blog
[ 1001 ]
None
6,261
4
Bounce_message:bounce message bounce message bounce automated message mail system informing sender previous message message delivered delivery problem occurred original message said bounced formal terms bounce message include non-delivery report non-delivery receipt ndr failed delivery status notification dsn message non-delivery notification ndn errors may occur multiple places mail delivery sender may sometimes receive bounce message mail server reporting unable send message alternatively recipient mail server reporting although accepted message unable deliver specified user server accepts message delivery also accepting responsibility deliver bounce message event delivery fails e-mail arrives destination server address mymail.example sending alice mymail.example may mail daemon unable deposit message specified user mailbox underlying hard drive server insufficient space sending e-mail service e-mail sent may unable reach destination address case sender would receive bounce message mail server common causes mail servers unable reach destination users may receive erroneous bounce messages messages never actually sent happen particular context email spam email viruses spammer sender may forge message another user intended recipient spam forges message appear yet another user third party message delivered intended recipient bounce message would returned third party instead spammer called backscatter library.example mail server known message would undeliverable instance jill user account would accepted message first place therefore would sent bounce instead would rejected message smtp error code would leave jack mail server store.example obligation create deliver bounce bounces special form autoresponder autoresponses automatic replies mails sent program—as opposed human user—in reply received mail sent bounce address examples auto replies vacation mails challenges challenge-response spam filtering replies list servers feedback reports auto replies discussed rfc 3834 auto replies sent codice_1 stated received mail triggered auto reply response typically sent empty return-path otherwise auto responders could trapped sending auto replies back forth codice_1 visible delivered mail header field codice_1 inserted smtp mail delivery agent mda usually combined mail transfer agent mta mda simply copies reverse path smtp codice_4 command codice_1 mda also removes bogus codice_1 header fields inserted mtas header field generally guaranteed reflect last reverse path seen codice_4 command today paths normally reduced ordinary email addresses old smtp 'source routing deprecated 1989 historical background info see sender rewriting scheme one special form path still exists empty path codice_8 used many auto replies especially bounces strict sense bounces sent non-empty codice_1 incorrect rfc 3834 offers heuristics identify incorrect bounces based local part left hand side address non-empty codice_1 even defines mail header field codice_11 identify auto replies mail header part mail data smtp command codice_12 mtas typically n't look mail deal envelope includes codice_4 address a.k.a codice_1 codice_15 reverse path e.g. rfc 2822-codice_16 mail header field codice_16 details important schemes like batv remaining bounces empty codice_1 non-delivery reports ndrs delivery status notifications dsns dsns explicitly solicited smtp service extension esmtp however widely used explicit requests delivery failure details much commonly implemented variable envelope return path verp explicit requests rarely implemented ndrs basic smtp function soon mta accepted mail forwarding delivery silently delete drop create send bounce message originator forwarding delivery failed excluding mdas mtas forward mails another mta next mta free reject mail smtp error message like user unknown quota etc point sending mta bounce message i.e inform originator bounce may arise also without rejecting mta rfc 5321 puts smtp server accepted task relaying mail later finds destination incorrect mail delivered reason must construct undeliverable mail notification message send originator undeliverable mail indicated reverse-path rule essential smtp name says 'simple protocol reliably work mail silently vanishes black holes bounces required spot fix problems today however common receive mostly spam emails usually uses forged codice_1s often impossible mta inform originator sending bounce forged codice_1 would hit innocent third party addition specific reasons preferable silently drop message rather reject let alone bounce quoting rfc 5321 section 6.2 discussed section 7.8 section 7.9 dropping mail without notification sender permitted practice however extremely dangerous violates long tradition community expectations mail either delivered returned silent message-dropping misused could easily undermine confidence reliability internet mail systems silent dropping messages considered cases high confidence messages seriously fraudulent otherwise inappropriate validating sender inherent flaw today smtp without deprecated source routes mentioned earlier addressed various proposals directly batv spf many reasons email may bounce one reason recipient address misspelled simply exist receiving system user unknown condition reasons include resource exhaustion — full disk — rejection message due spam filters addition muas allow users bounce message demand user-initiated bounces bogus bounces definition real bounce automated emitted mta mda bounce messages smtp sent envelope sender address codice_21 known null sender address frequently sent codice_22 header address codice_23 recipient site typically bounce message contain several pieces information help original sender understanding reason message delivered rfc 3463 describes codes used indicate bounce reason common codes 5.1.1 unknown user 5.2.2 mailbox full 5.7.1 rejected security policy/mail filter format reporting administrative messages defined rfc 6522 dsn may mime multipart/report message composed three parts second part dsn also quite readable essential understand mta played role reporting-mta responsible composing sending dsn remote-mta rejects message smtp transaction field diagnostic-code type smtp may used report value note beside numerical 3-digit value smtp response contains human readable part information
[ 5472, 4163, 6762, 9451, 7949, 8093, 4272, 8337, 914, 9588, 9909, 2041, 7739, 6492, 3549 ]
None
6,262
4
Screened_subnet:screened subnet network security screened subnet refers use one logical screening routers firewall define three separate subnets external router sometimes called access router separates external network perimeter network internal router sometimes called choke router separates perimeter network internal network perimeter network also called border network demilitarized zone dmz intended hosting servers sometimes called bastion hosts accessible access internal external networks purpose screened subnet dmz establish network heightened security situated external presumed hostile network internet extranet internal network screened subnet essential concept e-commerce entity presence world wide web using electronic payment systems network services prevalence hackers advanced persistent threats computer worms botnets threats networked information systems separating firewall system two separate component routers achieves greater potential throughput reducing computational load router component router screened subnet firewall needs implement one general task router less complex configuration screened subnet dmz also achieved single firewall device three network interfaces term demilitarized zone military context refers area treaties agreements contending groups forbid military installations activities often along established frontier boundary two military powers alliances similarity network security screened network dmz reduced fortifications intended points ingress external network presumed hostile appears term demilitarized zone dmz popularized sales marketing term sometime development screened routers firewalls often used synonym may different meaning whereas screened subnet firewall employs two screened routers create three subnets screened host firewall employs one screened router define two subnets external network internal network screened subnet firewall secure intruder must traverse two filtered routes reach internal network bastion dmz host compromised intruder must still bypass second filtered route reach internal network hosts
[ 8998, 7175, 5608, 6024, 939, 11502, 4883, 9715, 3381, 119, 2041, 4830, 4895 ]
Validation
6,263
6
YAFFS:yaffs yaffs yet another flash file system designed written charles manning whitecliffs new zealand company aleph one yaffs1 first version file system designed then-current nand chips 512 byte page size 16 byte spare oob out-of-band area work started 2002 first released later year initial work sponsored toby churchill ltd brightstar engineering older chips also generally allow 2 3 write cycles per page yaffs takes advantage dirty pages marked writing specific spare area byte newer nand flash chips larger pages first 2k pages 64 bytes oob later 4k stricter write requirements page within erase block 128 kilobytes must written sequential order page must written designing storage system enforces write rule write property several advantages yaffs2 designed accommodate newer chips based yaffs1 source code major difference internal structures fixed assume 512 byte sizing block sequence number placed written page way older pages logically overwritten without violating write rule released late 2003 yaffs robust log-structured file system holds data integrity high priority secondary yaffs goal high performance yaffs typically outperform alternatives also designed portable used linux wince psos rtems ecos threadx various special-purpose oses variant 'yaffs/direct used situations os embedded oses bootloaders core filesystem simpler interfacing higher lower level code nand flash hardware yaffs codebase licensed gpl per-product licenses available aleph one special procedure initialize yaffs filesystem beyond simply erasing flash memory bad block encountered yaffs follows smart media scheme marking fifth byte block spare area blocks marked remain unallocated write file data yaffs initially writes whole page chunk yaffs terminology describes file metadata timestamps name path etc new file assigned unique object id number every data chunk within file contain unique object id within spare area yaffs maintains tree structure ram physical location chunks chunk longer valid file deleted parts file overwritten yaffs marks particular byte spare area chunk ‘ dirty ’ entire block 32 pages marked dirty yaffs erase block reclaim space filesystem free space low yaffs consolidates group good pages onto new block yaffs reclaims space used dirty pages within original blocks yaffs system mounts nand flash device must visit block check valid data scanning spare area information reconstitutes memory-resident tree data structure yaffs2 similar concept yaffs1 shares much code yaffs2 code base supports yaffs1 data formats backward compatibility main difference yaffs2 needs jump significant hoops meet write requirement modern nand flash yaffs2 marks every newly written block sequence number monotonically increasing sequence chunks inferred block sequence number chunk offset within block thereby yaffs2 scans flash detects multiple chunks identical objectids chunknumbers choose use taking greatest sequence number efficiency reasons yaffs2 also introduces concept shrink headers example file resized smaller size yaffs1 mark affected chunks dirty yaffs2 due write rule yaffs2 instead writes shrink header indicates certain number pages point invalid lets yaffs2 reconstruct final state filesystem system reboots yaffs2 uses abstract definition nand flash allowing used wider variety flash parts different geometries bad block handling rules etc yaffs2 later added support checkpointing bypasses normal mount scanning allowing fast mount times performance vary mount times 3 seconds 2 gb reported
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 4634, 3611, 5661, 9249, 9762, 5158, 7225, 11323, 8772, 1109, 8285, 10851, 4708, 9836, 7789, 9333, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 7319, 11419, 6309, 1190, 5286, 10405, ...
Test
6,264
2
Apple_Developer:apple developer apple developer formerly apple developer connection adc apple inc. developer network designed make available resources help software developers write software macos tvos watchos ios platforms applications created xcode programs created apple inc.. ios applications uploaded app store ios watchos applications attached ios applications tvos applications uploaded app store tvos mac applications ’ common find world wide web download app store macos several leaks secret apple software prerelease program notably mac os x 10.4 tiger leaks apple sued three men allegedly leaked mac os x 10.4 prerelease builds bittorrent os x lion os x mountain lion os x mavericks leaked several times well however combat issue apple installed alert system preview builds alerting uploaded tester bittorrent system july 18 2013 intruder attempted access sensitive personal information apple developer servers information encrypted apple could guarantee information developers may accessed developer website taken maintenance thursday said undergoing maintenance sunday apple posted notice site notifying users attempted hack stated re-building servers developer system prevent happening future
[ 10755, 9732, 1549, 7697, 11289, 6186, 6700, 1074, 9784, 8253, 576, 8783, 4180, 10838, 9826, 5733, 8806, 3691, 2676, 119, 7292, 7806, 2686, 6783, 10878, 8842, 5784, 1177, 4251, 2207, 10406, 11430, 171, 2735, 3248, 4283, 7869, 708, 713, 379...
Validation
6,265
2
Windows_10_version_history:windows 10 version history windows 10 operating system developed microsoft microsoft described windows 10 operating system service would receive ongoing updates features functionality augmented ability enterprise environments receive non-critical updates slower pace use long-term support milestones receive critical updates security patches five-year lifespan mainstream support terry myerson executive vice president microsoft windows devices group said goal model reduce fragmentation across windows platform windows 10 insider preview builds delivered insiders three different rings insiders fast ring receive updates prior slow ring might experience bugs issues insiders release preview ring receive updates version almost available public comparatively stable mainstream builds windows 10 labeled yymm yy representing two-digit year mm representing month planned release example version 1507 refers builds initially released july 2015 original version windows 10 codenamed threshold 1 retroactively named version 1507 released july 2015 carries build number 10.0.10240 microsoft stated designated release manufacturing rtm build windows 10 build 10240 described rtm build various media outlets retroactively named version 1507 microsoft per naming conventions future stable releases operating system notable changes version include final release made available windows insiders july 15 2015 followed public release july 29 2015 support version 1507 ended may 9 2017 devices current branch current branch business however devices configured receive updates current branch current branch business continued receive updates june 27 2018 windows 10 november update also known version 1511 codenamed threshold 2 first major update windows 10 second version operating system carries build number 10.0.10586 new features version windows 10 include first preview released august 18 2015 final release made available windows insiders november 3 2015 followed public release november 12 2015 unlike initial release windows branch also made available existing windows phone 8.1 devices xbox one preview release windows server 2016 pre-installed new windows 10 mobile devices support version users current branch cb current branch business cbb ended october 10 2017 last public update released april 10 2018 enterprise education versions windows 10 anniversary update also known version 1607 codenamed redstone 1 second major update windows 10 first series updates redstone codenames carries build number 10.0.14393 first preview released december 16 2015 final release made available windows insiders july 18 2016 followed public release august 2 release windows 10 supported users current branch cb current branch business cbb long-term support branch ltsb windows 10 creators update also known version 1703 codenamed redstone 2 third major update windows 10 second series updates redstone codenames carries build number 10.0.15063 first preview released insiders august 11 2016 final release made available windows insiders march 20 2017 followed public release april 5 via update assistant began roll april 11 windows 10 fall creators update also known version 1709 codenamed redstone 3 fourth major update windows 10 third series updates redstone codenames carries build number 10.0.16299 first preview released insiders april 7 2017 final release made available windows insiders september 26 2017 released public october 17 windows 10 april 2018 update also known version 1803 codenamed redstone 4 fifth major update windows 10 fourth series updates redstone codenames carries build number 10.0.17134 first preview released insiders august 31 2017 final release made available windows insiders april 16 2018 followed public release april 30 began roll may 8 windows 10 october 2018 update also known version 1809 codenamed redstone 5 sixth major update windows 10 fifth series updates redstone codenames carries build number 10.0.17763 first preview released insiders february 14 2018 update originally made available public consumers october 2 2018 rollout halted october 6 2018 due serious bug deletes users personal files updating october 9 2018 microsoft re-released update insiders stating known issues update including file deletion bug identified fixed october 25 2018 microsoft confirmed existence another bug overwrites files without confirmation extracting zip file zip bug fixed insiders october 30 2018 public rollout update resumed november 13 2018 windows 10 may 2019 update also known version 1903 codenamed 19h1 seventh major update windows 10 first use descriptive codename including year order released instead redstone threshold codename first preview released insiders opted exclusive skip ahead ring july 25 2018 update began rolling may 21 2019. notable changes may 2019 update include next feature release windows 10 codenamed 19h2 eighth major update windows 10 second use descriptive codename update intended delivered cumulative update may 2019 update first preview released insiders opted slow ring july 1 2019 next feature release windows 10 codenamed 20h1 ninth major update windows 10 third use descriptive codename first preview released insiders opted exclusive skip ahead ring february 14 2019
[ 2568, 5643, 4624, 11283, 537, 540, 3100, 3102, 8735, 9244, 9762, 8227, 8740, 11301, 6697, 10281, 1581, 2101, 5173, 8757, 10812, 7229, 64, 3648, 582, 1098, 7754, 10828, 4173, 4174, 9808, 10839, 603, 9819, 8798, 3170, 10338, 10341, 8296, 61...
Validation
6,266
2
Samsung_Wave_S8500:samsung wave s8500 samsung wave samsung wave gt-s8500 smartphone developed produced samsung electronics first smartphone run bada operating system developed samsung electronics commercially released june 1 2010 wave touchscreen phone powered samsung hummingbird cpu s5pc110 includes 1 ghz arm cortex-a8 cpu built-in powervr sgx 540 graphics engine also super amoled screen 720p high-definition video capture capabilities due shortage super amoled screens samsung released successor device called wave ii ceased production original s8500 model screen capacitive touchscreen super amoled anti-smudge oleophobic coating top scratch-resistant tempered-glass gorilla glass display screen resolution 800x480 wvga 283 ppi phone features 1 ghz soc internally contains arm cortex a8 cpu core model apple a4 processor graphics engine device powervr sgx 540 gpu said capable generating 90 million triangles per second soc used samsung galaxy phone features 5 megapixel edof camera supports 2560 x 1920 pixels along autofocus led flash geo-tagging face blink detection image stabilization touch focus etc shooting modes include beauty shot smile shot continuous panorama vintage shot camcorder able shoot hd recording 1280x720 30 fps flash well also able record slow motion video 320x240 120 fps flash wave first phone samsung linux based operating system bada meaning ocean samsung worked later versions bada 1.2 later 2.0 bada 1.2 released world phased manner designed improve stability january 2012 samsung declared planning merge bada linux-based tizen operating system developed collaboration intel despite collaboration supported wave unofficial ports android made due restrictions eventual cease development bada versions ported include android froyo gingerbread ice cream sandwich jellybean kitkat lollipop marshmallow features include a-gps 2 gb/8 gb internal storage microsdhc slot additional 32 gb also magnetometer compass proximity sensor accelerometer 5.1-channel surround sound mobile theater music recognition fake call service smart search social hub first phone support bluetooth version 3.0 radio connectivity includes bluetooth 3.0 wi-fi 802.11 b/g/n hsdpa 3.6 mbit/s phone available european/asian 3g bandings north american 3g bandings north american 3g bandings version phone limited availability available us phone first smartphone feature samsung bada operating system platform ui samsung touch-wiz 3.0 touch-wiz 3.0 like two predecessors touch-wiz 2.0 touch-wiz utilizes widgets three notable widgets pre-installed touch-wiz 3.0 daily briefing includes essential information weather finance ap mobile news schedule feeds updates buddies allows users call send texts read facebook/twitter feeds favorite contacts users allowed 10 home screens add widgets internet browsing samsung wave dolphin browser v2.0 based webkit 3.0 depends firmware version browser supports flash disabled default improve page loading speed default phone comes picsel viewer capable reading .pdf microsoft office file formats users selected countries buy download picsel office editor samsung apps samsung apps users also download applications games widgets application store software includes gps software comes phone lbs route 66 facebook twitter social hub mini diary daily briefing memo video player fm radio media browser voice recorder e-mail pre-installed asphalt 5 samsung wave supports mp3 aac aac+ e-aac+ wma amr wav mp4 mpeg4 h.263 h.264 wmv flv divx xvid mkv flac file formats also supports subtitles many countries end december 2011 operating system gradually updated bada 2.0 first official bada 2.0 version la1 bada 2.0 touchwiz ui reached version 4.0 gui completely redone included many new features full multitasking wac voice commands text-to-speech speech-to-text chaton caster new version dlna social apps new dolphin 3.0 browser download manager reviews forums
[ 10080, 10658, 6883, 196, 2852, 487, 9163, 9964, 2383, 1776, 7983, 2259, 2707, 6391, 10393, 8794, 1083 ]
None
6,267
7
Optical_mesh_network:optical mesh network optical mesh network type optical telecommunications network employing wired fiber-optic communication wireless free-space optical communication mesh network architecture optical mesh networks use fiber-optic communication operated internet service providers metropolitan regional also national international scenarios faster less error prone network architectures support backup recovery plans established networks case disaster damage failure currently planned satellite constellations aim establish optical mesh networks space using wireless laser communication transport networks underlying optical fiber-based layer telecommunications networks evolved digital cross connect system dcs -based mesh architectures 1980s sonet/sdh synchronous optical networking/synchronous digital hierarchy ring architectures 1990s dcs-based mesh architectures telecommunications carriers deployed restoration systems ds3 circuits fastar fast automatic restoration mci real time restoration rtr restoring circuits minutes network failure sonet/sdh rings carriers implemented ring protection sonet unidirectional path switched ring upsr also called sub-network connection protection scnp sdh networks sonet bidirectional line switched ring blsr also called multiplex section shared protection ring ms-spring sdh networks protecting recovering network failure 50 ms less significant improvement recovery time supported dcs-based mesh restoration key driver deployment sonet/sdh ring-based protection attempts improving and/or evolving traditional ring architectures overcome limitations trans-oceanic ring architecture defined itu-t rec g.841 p-cycles protection next-generation sonet/sdh equipment handle multiple rings ability close working protection ring side share protection capacity among rings e.g. virtual line switched ring vlsr technological advancements optical transport switches first decade 21st century along continuous deployment dense wavelength-division multiplexing dwdm systems led telecommunications service providers replace sonet ring architectures mesh-based architectures new traffic new optical mesh networks support fast recovery previously available ring networks achieving better capacity efficiency resulting lower capital cost fast recovery tens hundreds milliseconds case failures e.g. network link node failure achieved intelligence embedded new optical transport equipment allows recovery automatic handled within network part network control plane without relying external network management system optical mesh networks refer transport networks built directly mesh-like fiber infrastructure deployed metropolitan regional national international e.g. trans-oceanic areas deploying optical transport equipment capable switching traffic wavelength sub-wavelength level incoming fiber outgoing fiber addition switching wavelengths equipment typically also able multiplex lower speed traffic wavelengths transport groom traffic long equipment so-called opaque see subsection transparency finally equipment also provide recovery traffic case network failure transport networks evolve toward mesh topologies utilizing intelligent network elements optical cross-connects optical switches provisioning recovery services new approaches developed design deployment operations management mesh optical networks optical switches build companies sycamore ciena sts-1 granularity switching tellium sts-48 granularity switching deployed operational mesh networks calient built all-optical switches based 3d mems technology optical mesh networks today provide trunking capacity higher-layer networks inter-router inter-switch connectivity ip mpls ethernet-centric packet infrastructure also support efficient routing fast failure recovery high-bandwidth point-to-point ethernet sonet/sdh services several planned satellite constellations spacex starlink intended global internet provisioning aim establish optical mesh networks space constellations consisting several hundred thousand satellites use laser communication high-throughput optical inter-satellite links interconnected network architecture allows direct routing user data satellite satellite enables seamless network management continuity service optical mesh networks support establishment circuit-mode connection-oriented services multiple recovery mechanisms provide different levels protection restoration different failure modes available mesh networks channel- link- segment- path- protection common protection schemes p-cycles another type protection leverages extends ring-based protection restorationis another recovery method work complement faster protection schemes case multiple failures path-protected mesh networks connections unprotected others protected single multiple failures various ways connection protected single failure defining backup path diverse primary path taken connection mesh network backup path associated resources dedicated connection dedicated backup path protection aka dedicated 1+1 path protection subnetwork connection protection sncp sdh networks upsr sonet ring networks shared among multiple connections shared backup path protection typically ones whose primary paths likely fail time thereby avoiding contention shared resources case single link node failure number protection schemes use pre-emptible paths partially diverse backup paths implemented finally multiple diverse routes designed connection multiple recovery routes recover even multiple failures examples mesh networks across atlantic pacific oceans traditional transport networks made optical fiber-based links telecommunications offices multiple wavelengths multiplexed increase capacity fiber wavelengths terminated electronic devices called transponders undergoing optical-to-electrical conversion signal reamplification reshaping retiming 3r inside telecommunications office signals handled switched transport switch aka optical cross-connect optical switch either dropped office directed outgoing fiber link carried wavelengths multiplexed fiber link towards next telecommunications office act going optical-electrical-optical o-e-o conversion telecommunications office causes network considered opaque incoming wavelengths undergo optical-to-electrical conversion switched telecommunications office optical domain using all-optical switches also called photonic cross-connect optical add-drop multiplexer reconfigurable optical add-drop multiplexer roadm systems network considered transparent hybrid schemes leverage optical bypasses provide limited o-e-o conversions key locations across network referred translucent networks roadm-based transparent optical mesh networks deployed metropolitan regional networks since mid-2000s early 2010s operational long distance networks still tend remain opaque transmission limitations impairments prevent extension transparency beyond certain point routing key control operational aspect optical mesh networks transparent all-optical networks routing connections tightly linked wavelength selection assignment process so-called routing wavelength assignment rwa due fact connection remains wavelength end-to-end throughout network sometimes referred wavelength continuity constraint absence devices translate wavelengths optical domain opaque network routing problem one finding primary path connection protection needed backup path diverse primary path wavelengths used link independently several algorithms used combined determine primary path diverse backup path without sharing resource along backup path connection service shortest path including dijkstra algorithm k-shortest path yen algorithm edge node-diverse disjoint routing including suurballe algorithm numerous heuristics general however problems optimal routing dedicated backup path protection arbitrary shared risk link groups srlgs shared backup path protection np-complete deployment optical mesh networks enabling new services applications service providers offer customers also supports new network paradigms mesh networking general wireless mesh networking particular telecommunications networking telecommunications equipment packet networking connection-oriented networking availability
[ 5472, 2466, 10021, 5321, 9098, 2701, 2607, 10799, 2994, 2802 ]
Test
6,268
3
Heterogeneous_computing:heterogeneous computing heterogeneous computing refers systems use one kind processor cores systems gain performance energy efficiency adding type processors adding dissimilar coprocessors usually incorporating specialized processing capabilities handle particular tasks usually heterogeneity context computing referred different instruction-set architectures isa main processor one processors another usually different architecture maybe one different microarchitecture floating point number processing special case usually referred heterogeneous example arm big.little exception isas cores heterogeneity refers speed different microarchitectures isa thus making like symmetric multiprocessor smp past heterogeneous computing meant different isas handled differently modern example heterogeneous system architecture hsa systems eliminate difference user using multiple processor types typically cpus gpus usually integrated circuit provide best worlds general gpu processing apart gpu well-known 3d graphics rendering capabilities also perform mathematically intensive computations large data-sets cpus run operating system perform traditional serial tasks level heterogeneity modern computing systems gradually increasing scaling fabrication technologies allows formerly discrete components become integrated parts system-on-chip soc example many new processors include built-in logic interfacing devices sata pci ethernet usb rfid radios uarts memory controllers well programmable functional units hardware accelerators gpus cryptography co-processors programmable network processors a/v encoders/decoders etc. recent findings show heterogeneous-isa chip multiprocessor exploits diversity offered multiple isas outperform best same-isa homogeneous architecture much 21 23 energy savings reduction 32 energy delay product edp amd 2014 announcement pin-compatible arm x86 socs codename project skybridge suggested heterogeneous-isa arm+x86 chip multiprocessor making heterogeneous computing systems present new challenges found typical homogeneous systems presence multiple processing elements raises issues involved homogeneous parallel processing systems level heterogeneity system introduce non-uniformity system development programming practices overall system capability areas heterogeneity include heterogeneous computing platforms found every domain computing—from high-end servers high-performance computing machines way low-power embedded devices including mobile phones tablets
[ 4098, 7173, 9739, 2066, 7699, 11282, 5655, 10781, 8231, 1578, 8237, 6705, 7218, 4156, 63, 2623, 2113, 7234, 3142, 2635, 10316, 2638, 6738, 1122, 3175, 8815, 630, 8822, 643, 644, 9863, 7820, 7313, 154, 2719, 6815, 5793, 6818, 8352, 6821, ...
None
6,269
4
Session_poisoning:session poisoning session poisoning also referred session data pollution session modification method exploit insufficient input validation within server application typically server application vulnerable type exploit copy user input session variables underlying vulnerability state management problem shared state race condition ambiguity use plain unprotected modifications state values session poisoning demonstrated server environments different non-malicious applications scripts share session states usage differ causing ambiguity race conditions session poisoning demonstrated scenarios attacker able introduce malicious scripts server environment possible attacker victim share web host session poisoning first discussed potentially new vulnerability class full disclosure mailing list alla bezroutchko inquired session data pollution vulnerabilities web applications new problem january 2006 however old vulnerability previously noted others classic state management issue yvan boily new /someone earlier examples vulnerabilities found major security resources/archives bugtraq e.g session pollution also covered articles php session security przemek sobstel 2007 example code vulnerable problem subject trivial attacks problem could exist software problem codice_5 designed assumption page accessed non-malicious way anyone realizes script designed able craft http request sets logon user arbitrarily alla bezroutchko discusses scenario codice_6 used two different purposes race condition demonstrated reset scripts could exploited change logged user arbitrarily alla bezroutchko discusses examples observed development forums allows writing arbitrary session variables first example _get something probably selection box similar attack becomes codice_7 known enable security vulnerabilities several applications php server administrators recommended disable feature note real-world examples session poisoning enabled register_globals publicly demonstrated back july 2001 article serious security hole mambo site server version 3.0.x second example /someone vulnerable attack becomes 'unknown uw-team.org discusses scenario attacker victim shares php server attack fairly easy attack requires victim attacker share php server attack dependent victim attacker virtual hostname trivial attacker move session identifier cookie one cookie domain another
[ 6184, 3473, 10466, 8644 ]
None
6,270
6
TeraCopy:teracopy teracopy freemium file transfer utility designed alternative built-in windows explorer file transfer feature focus data integrity file transfer reliability ability pause resume file transfers teracopy uses dynamically adjusted buffers reduce seek times asynchronous copy speeds file transfer two physical hard drives processes paused resumed case transfer errors teracopy try several times skips faulty file proceeds rest operation teracopy also shows failed file transfers allows user fix problem recopy problematic files teracopy offers explanation skipped files simply reports skipped may skip copying numerous reasons user could correct known too-long file name teracopy replace windows explorer copy move functions author asserts full unicode support teracopy example freemium licensing model basic edition offered freeware may used non-commercial environments teracopy pro shareware version utility adds additional features list favorite folders used copy destination ability modify copy queue 2007 ionut ilascu softpedia.com commended utility ability error recovery functionality concluded teracopy lot faster windows explorer xp proper defragmentation vista moves tad slower even defragmentation disk performed 2009 jason fitzpatrick lifehacker praised usability stating n't overwhelm plethora settings options also called advanced enough subsequently lifehacker visitors voted teracopy large margin best windows file copier four contestants 2010 review cnet called nifty piece freeware recommended windows users
[ 9121, 5380, 106, 5356, 7983, 10101 ]
Test
6,271
2
List_of_BlackBerry_products:list blackberry products following partial list blackberry products blackberry line wireless handheld devices first introduced 1996 manufactured canadian company blackberry formerly known research motion rim two-way pager models thumb keyboards thumbwheel scrolling monochrome text display first model inter ctive pager announced september 18 1996 within year yankee group estimating devices like inter ctive pager use fewer 400,000 people expected two-way wireless messaging services attract 51 million users 2002 provided e-mail wap services limited html access provided via third party software wolfetech pocketgenie goamerica browser built use two 1g data-only packet switched networks mobitex datatac support java without use java virtual machine add-on models first blackberry models built-in mobile phone first models natively ran java transmitted data normal 2g cellular network rim began advertise devices email-capable mobile phones rather two-way pagers time primary market still businesses rather consumers 5810 released march 4 2002 aberration list 5790 released much later date niche model 2004 many color blackberry models non-phone blackberry made available due demand java-based model could run mobitex data-only network 5810/5820 shared physical casing keyboard layout earlier 957 device 6000 series launched 2003 6210 entering influential time time 100 gadgets list 2003 monochrome models revised include color screen retaining form factor casing early color models 7230 typically used dim electroluminescent backlight leading initial reputation poor image quality later color models 7290 typically used led backlight yielding much better screen quality color lcd screens used series either reflective transflective screens yielded better image quality direct sunlight even backlight turned nearly models list 16 mb models bluetooth model 32 mb bluetooth 7290 last model released early blackberry form factor first blackberry model bluetooth 7290 also first quad-band blackberry aberration list 7270 first wi-fi blackberry released later built old form factor vein 7200 series rim expanded market introducing first blackberry models without discrete qwerty keyboard candybar form factor developed predictive text technology called suretype qwerty-like layout using two keys per button using two letters per button rather three letters per button t9 using ten-digit keypads predictive text accuracy could improved dramatically use qwerty-like layout took advantage people memory computer keyboard since button roughly relative key time size blackberry could dramatically reduced keyboards needed 5-buttons wide rather 10-buttons wide blackberries became popular mass market became similarly sized competing consumer-market cellphones models among first blackberry models aggressively marketed consumers rather businesses rim continued manufacture qwerty models give market choice traditional qwerty thumb keyboard compressed suretype keyboard beginning 8700-series models 2006 rim began aggressively add consumer features blackberry models aim capture consumer market competitors treo motorola q progression models additions include better quality screens memory built-in chat software first cameraphone microsd memory card slot built-in mapping software consumer-specific features blackberry pearl 8100 first blackberry without trackwheel replaced miniature trackball enable full 4-way mouse-style navigation blackberry look new trackball gave pearl name 9000 series launched 2008
[ 2208, 9408, 2892, 3949, 5677, 9101, 3152, 5875, 410, 10619, 9341 ]
Test
6,272
4
The_Project_Formerly_Known_As_Kindle_Forkbomb:project formerly known kindle forkbomb project project formerly known kindle forkbomb work done swiss-austrian-american duo known ubermorgen artists known creative use digital media combined means performance various offline medium convey ideas project showcased ubermorgen website www.uuuuuuuntitled.com project name project formerly known kindle forkbomb broken better understand meaning behind work forkbomb term used computing describing attack computer process continuously self-replicates machine resources depleted system crashes art project depicts machine process strips comments youtube uses algorithm compile comments finally titling work video title respective uploader make book book uploaded kindle publishing service placed kindle store machine monitors books making sure enough sales made keep alive store n't thriving store machine directed purchase copies thus prolonging shelf-life using process artists message intent show easily could clog store rapidly multiplying number books hence kindle forkbomb example critique digital world problems poses merely demonstration makes easier visualize world live ubermorgen describes media created human-machine combination creation new genre decentralized fiction writing artist group says books compressed form contemporary world describe snapshot frozen time type work form art sometimes referred uncreative spurred famous writer kenneth goldsmith efforts uncreative writing examples works produced project one thing note cover books feature uploader video title underneath everything text string bash shell version computer forkbomb following reference link takes website aloud read full pdf version books one project similar stephanie barber american artist uses many forms media art project relates kindle forkbomb book titled night moves book grouping youtube comments bob seger song night moves
[ 11351 ]
Validation
6,273
5
Syslog:syslog computing syslog standard message logging allows separation software generates messages system stores software reports analyzes message labeled facility code indicating software type generating message assigned severity level computer system designers may use syslog system management security auditing well general informational analysis debugging messages wide variety devices printers routers message receivers across many platforms use syslog standard permits consolidation logging data different types systems central repository implementations syslog exist many operating systems syslog developed 1980s eric allman part sendmail project readily adopted applications since become standard logging solution unix-like systems variety implementations also exist operating systems commonly found network devices routers syslog originally functioned de facto standard without authoritative published specification many implementations existed incompatible internet engineering task force documented status quo rfc 3164 standardized rfc 5424 various companies attempted claim patents syslog implementations little effect use standardization protocol information provided originator syslog message includes facility code severity level syslog software adds information information header passing entry syslog receiver components include originator process id timestamp hostname ip address device facility code used specify type program logging message messages different facilities may handled differently list facilities available defined standard mapping facility code keyword uniform different operating systems syslog implementations list severities also defined standard meaning severity levels emergency debug relative application example purpose system process transactions update customer account balance information error final step assigned alert level however error occurring attempt display zip code customer may assigned error even warning level server process handles display messages usually includes lower severe levels display less severe levels requested messages separated individual severity warning level entry also included filtering notice info debug messages rfc 3164 message component known msg specified fields tag name program process generated message content contains details message described rfc 5424 msg called content rfc 3164 tag part header single field tag split app-name procid msgid totally resemble usage tag provides functionality cases popular syslog tools rsyslog conform new standard content field encoded utf-8 character set octet values traditional ascii control character range avoided generated log messages may directed various destinations including console files remote syslog servers relays implementations provide command line utility often called logger well software library send messages log display monitor collected logs one needs use client application access log file directly system basic command line tools tail grep log servers configured send logs network addition local files implementations include reporting programs filtering displaying syslog messages operating network syslog uses client-server architecture server listens well-known registered port protocol requests clients historically common transport layer protocol network logging user datagram protocol udp server listening port 514 udp lacks congestion control mechanisms support transport layer security required implementations recommended general use transmission control protocol tcp port 6514 since process application operating system written independently little uniformity payload log message reason assumption made formatting contents syslog message formatted rfc 5424 gives augmented backus–naur form abnf definition msg field network protocol simplex communication means acknowledging delivery originator various groups working draft standards detailing use syslog network security event logging proposed application within healthcare environment regulations sarbanes-oxley act pci dss hipaa many others require organizations implement comprehensive security measures often include collecting analyzing logs many different sources syslog format proven effective consolidating logs many open-source proprietary tools reporting analysis logs utilities exist conversion windows event log log formats syslog managed security service providers attempt apply analytical techniques artificial intelligence algorithms detect patterns alert customers problems syslog protocol defined request comments rfc documents published internet engineering task force internet standards following list rfcs define syslog protocol
[ 516, 2312, 11147, 142, 5397, 11413, 1561, 9625, 7967, 4640, 8487, 10924, 5045, 3133, 2878, 8637, 961, 4033, 6213, 10437, 6990, 6993, 8533, 2390, 472, 2656, 8933, 8295, 10604, 2801, 5874, 6650 ]
Test
6,274
0
Grammar_induction:grammar induction grammar induction grammatical inference process machine learning learning formal grammar usually collection re-write rules productions alternatively finite state machine automaton kind set observations thus constructing model accounts characteristics observed objects generally grammatical inference branch machine learning instance space consists discrete combinatorial objects strings trees graphs grammatical inference often focused problem learning finite state machines various types see article induction regular languages details approaches since efficient algorithms problem since 1980s since beginning century approaches extended problem inference context-free grammars richer formalisms multiple context-free grammars parallel multiple context-free grammars classes grammars grammatical inference studied contextual grammars pattern languages simplest form learning learning algorithm merely receives set examples drawn language question aim learn language examples rarely counter-examples example belong language however learning models studied one frequently studied alternative case learner ask membership queries exact query learning model minimally adequate teacher model introduced angluin wide variety methods grammatical inference two classic sources also devote brief section problem cite number references basic trial-and-error method present discussed approaches infer subclasses regular languages particular see induction regular languages recent textbook de la higuera 2010 covers theory grammatical inference regular languages finite state automata d'ulizia ferri grifoni provide survey explores grammatical inference methods natural languages method proposed section 8.7 suggests successively guessing grammar rules productions testing positive negative observations rule set expanded able generate positive example given rule set also generates negative example must discarded particular approach characterized hypothesis testing bears similarity mitchel version space algorithm text provide simple example nicely illustrates process feasibility unguided trial-and-error approach substantial problems dubious grammatical induction using evolutionary algorithms process evolving representation grammar target language evolutionary process formal grammars easily represented tree structures production rules subjected evolutionary operators algorithms sort stem genetic programming paradigm pioneered john koza early work simple formal languages used binary string representation genetic algorithms inherently hierarchical structure grammars couched ebnf language made trees flexible approach koza represented lisp programs trees able find analogues genetic operators within standard set tree operators example swapping sub-trees equivalent corresponding process genetic crossover sub-strings genetic code transplanted individual next generation fitness measured scoring output functions lisp code similar analogues tree structured lisp representation representation grammars trees made application genetic programming techniques possible grammar induction case grammar induction transplantation sub-trees corresponds swapping production rules enable parsing phrases language fitness operator grammar based upon measure well performed parsing group sentences target language tree representation grammar terminal symbol production rule corresponds leaf node tree parent nodes corresponds non-terminal symbol e.g noun phrase verb phrase rule set ultimately root node might correspond sentence non-terminal like greedy algorithms greedy grammar inference algorithms make iterative manner decisions seem best stage decisions made usually deal things like creation new rules removal existing rules choice rule applied merging existing rules several ways define 'the stage 'the best also several greedy grammar inference algorithms context-free grammar generating algorithms make decision every read symbol context-free grammar generating algorithms first read whole given symbol-sequence start make decisions recent approach based distributional learning algorithms using approaches applied learning context-free grammars mildly context-sensitive languages proven correct efficient large subclasses grammars angluin defines pattern string constant symbols σ variable symbols disjoint set language pattern set nonempty ground instances i.e strings resulting consistent replacement variable symbols nonempty strings constant symbols pattern called descriptive finite input set strings language minimal respect set inclusion among pattern languages subsuming input set angluin gives polynomial algorithm compute given input string set descriptive patterns one variable x end builds automaton representing possibly relevant patterns using sophisticated arguments word lengths rely x variable state count drastically reduced erlebach et al give efficient version angluin pattern learning algorithm well parallelized version arimura et al show language class obtained limited unions patterns learned polynomial time pattern theory formulated ulf grenander mathematical formalism describe knowledge world patterns differs approaches artificial intelligence begin prescribing algorithms machinery recognize classify patterns rather prescribes vocabulary articulate recast pattern concepts precise language addition new algebraic vocabulary statistical approach novel aim broad mathematical coverage pattern theory spans algebra statistics well local topological global entropic properties principle grammar induction applied aspects natural language processing applied among many problems semantic parsing natural language understanding example-based translation morpheme analysis place name derivations grammar induction also used lossless data compression statistical inference via minimum message length mml minimum description length mdl principles grammar induction also used probabilistic models language acquisition
[ 1890, 10114, 1956, 7780, 6502, 9796, 1896, 11330, 8747, 2316, 8843, 4468, 2262, 7577 ]
None
6,275
5
Signaling_Compression:signaling compression signaling compression sigcomp compression method designed especially compression text-based communication data sip rtsp sigcomp originally defined rfc 3320 later updated rfc 4896 negative acknowledgement mechanism signaling compression defined rfc 4077 sigcomp work performed rohc working group transport area ietf sigcomp specifications describe compression schema located application layer transport layer e.g sip udp implemented upon virtual machine configuration executes specific set commands optimized decompression purposes namely udvm universal decompressor virtual machine one strong point sigcomp bytecode decode messages sent sigcomp allows use kind compression schema given expressed bytecode udvm thus sigcomp compatible device may use compression mechanisms exist released without firmware change additionally decoders may already standardised sigcomp may recall code needed sent connection assure message decodable requirement udvm code available compression messages executed virtual machine native code used independent system mechanism signal application conversation e.g given sip session compartment mechanism used given application may given number different independent conversations persisting session status needed/specified per compression schema udvm code
[ 10271 ]
Train
6,276
2
Symbian_Foundation:symbian foundation symbian foundation non-profit organisation stewarded symbian operating system mobile phones previously owned licensed symbian ltd.. symbian foundation never directly developed platform evangelised co-ordinated ensured compatibility also provided key services members community collecting building distributing symbian source code time competed open handset alliance limo foundation foundation founded nokia sony ericsson ntt docomo motorola texas instruments vodafone lg electronics samsung electronics stmicroelectronics due change device strategy lg motorola left foundation board soon creation later replaced fujitsu qualcomm innovation center operational phase 2009 2010 also provided symbian foundation invited companies join members attracted 200 large number categories following change focus funding board members symbian foundation announced november 2010 would transition legal entity responsible licensing software intellectual property operational responsibilities staff transition result changes global economic market conditions widely attributed stiff competition os ios android along announcement nokia announced would take governance symbian platform nokia major contributor code maintaining code repository platform development ever since purchase symbian ltd. regularly releasing development public repository 17 december 2010 symbian foundation public web sites wiki code repositories shut nokia launched new symbian site however year samsung sony ericsson left foundation favor google open handset alliance android operating system leaving japan ntt docomo major nokia partner announcement nokia partnership microsoft february 2011 transition windows phone os primary platform development symbian stopped outsourced accenture nokia closed service end 2012 transition completed april 2011 symbian foundation remain trademark holder licensing entity non-executive directors involved
[ 10754, 11271, 546, 4132, 3626, 9262, 7727, 10802, 6207, 1101, 7246, 5201, 7253, 3162, 6748, 607, 10851, 5220, 1126, 9320, 6763, 11383, 8315, 8316, 8829, 11391, 10883, 9863, 11405, 9366, 1687, 7319, 2201, 6301, 5290, 3248, 7857, 2235, 1216, ...
None
6,277
2
Ehcache:ehcache ehcache open source java distributed cache general purpose caching java ee ehcache available apache open source license ehcache developed greg luck starting 2003 2009 project purchased terracotta provides paid support software still open source new major functionalities fast restartability consistency available commercial products like enterprise ehcache bigmemory open source march 2011 wikimedia foundation announced would use ehcache improve performance wiki projects however quickly abandoned testing revealed problems approach name ehcache palindrome
[ 2339, 3560, 5612, 4781, 5677, 7983, 10573, 9144, 2234 ]
Test
6,278
2
Peter_van_der_Linden:peter van der linden peter van der linden born 1963 dutch technologist author worked companies sun microsystems apple computer written books java c linux practical jokes currently 2010 android technology evangelist motorola mobility
[ 9665, 8773, 5677, 823, 2045 ]
None
6,279
0
Zeta_distribution:zeta distribution probability theory statistics zeta distribution discrete probability distribution x zeta-distributed random variable parameter probability x takes integer value k given probability mass function ζ riemann zeta function undefined 1 multiplicities distinct prime factors x independent random variables riemann zeta function sum terms formula_8 positive integer k appears thus normalization zipf distribution terms zipf distribution zeta distribution often used interchangeably note zeta distribution probability distribution associated zipf law exponent see also yule–simon distribution zeta distribution defined positive integers formula_9 probability mass function given formula_11 parameter formula_12 riemann zeta function cumulative distribution function given formula_14 generalized harmonic number n th raw moment defined expected value x series right series representation riemann zeta function converges values s-n greater unity thus note ratio zeta functions well defined even n − 1 series representation zeta function analytically continued change fact moments specified series therefore undefined large n moment generating function defined series definition polylogarithm valid formula_19 taylor series expansion function necessarily yield moments distribution taylor series using moments usually occur moment generating function yields obviously well defined finite value since moments become infinite large n use analytically continued terms instead moments obtain series representation polylogarithm formula_23 formula_24 given h harmonic number ζ 1 infinite harmonic series case 1 meaningful however set positive integers density i.e exists n n number members less equal n equal density latter limit also exist cases density example set positive integers whose first digit density nonetheless second limit given exists proportional benford law zeta distribution constructed sequence independent random variables geometric distribution let formula_31 prime number formula_32 random variable geometric distribution parameter formula_33 namely formula_34 random variables formula_35 independent random variable formula_36 defined formula_37 zeta distribution formula_38 stated differently random variable formula_39 infinitely divisible lévy measure given following sum dirac masses formula_40 power-law distributions
[ 10621, 3694, 10527 ]
Test
6,280
4
Comparison_of_backup_software:comparison backup software feature comparison backup software general comparison see list backup software
[ 2693, 7685, 10503, 9484, 1293, 11157, 2970, 10276, 6565, 7718, 10405, 3629, 1844, 4154, 5313, 9925, 1358, 3794, 3428, 11492, 5737, 5482, 9842, 10101, 2940, 8446 ]
Validation
6,281
3
Uptime:uptime uptime measure system reliability expressed percentage time machine typically computer working available uptime opposite downtime often used measure computer operating system reliability stability time represents time computer left unattended without crashing needing rebooted administrative maintenance purposes conversely long uptime may indicate negligence critical updates require reboots platforms 2005 novell reported server 6-year uptime although might sound unusual actually common servers maintained industrial context host critical applications banking systems netcraft maintains uptime records many thousands web hosting computers server running novell netware reported shut 16 years uptime due failing hard disk versions microsoft windows include uptime field windows task manager performance tab format hh mm ss days hours minutes seconds output codice_1 command includes system time system boot time field exact text format dependent language locale time given codice_1 reliable take account time spent sleep hibernation thus boot time drifts forward every time computer sleeps hibernates codice_3 command codice_4 sub-command provides date time computer started codice_5 codice_6 variants command codice_7 shorthand codice_6 exact text date format dependent configured language locale uptime determined via windows management instrumentation wmi querying codice_9 property codice_10 class command prompt done using codice_11 command timestamp uses format codice_12 example computer last booted 8 may 2011 16:17:51.822 text lastbootuptime timestamp format vary language locale wmi also queried using variety application programming interfaces including vbscript powershell microsoft formerly provided downloadable utility called codice_13 reports elapsed time days hours minutes seconds time given codice_13 reliable take account time spent sleep hibernation thus boot time drifts forward every time computer sleeps hibernates codice_15 command also available freedos version developed m. aitchison users linux systems use bsd uptime utility also displays system load averages past 1 5 15 minute intervals shows long system since last restarted first number total number seconds system second number much time machine spent idle seconds multi core systems linux versions second number sum idle time accumulated cpu bsd-based operating systems freebsd mac os x sysvr4 uptime command see also method using sysctl call system last boot time openvms systems codice_16 command used dcl command prompt obtain system uptime first line resulting display includes system uptime displayed days followed hours minutes seconds following example command qualifier codice_17 suppresses display per-process detail lines information
[ 515, 516, 9733, 9735, 2568, 6674, 8729, 3109, 8229, 8233, 9780, 1606, 3659, 4174, 1647, 9839, 5759, 8834, 6797, 4750, 2198, 4248, 6812, 11423, 4771, 7847, 10924, 2222, 7356, 1741, 1750, 9946, 4850, 7411, 2811, 6396, 3856, 292, 296, 808, ...
Test
6,282
4
Trusted_Network_Connect:trusted network connect trusted network connect tnc open architecture network access control promulgated trusted network connect work group tnc-wg trusted computing group tcg tnc architecture first introduced rsa conference 2005 tnc originally network access control standard goal multi-vendor endpoint policy enforcement 2009 tcg announced expanded specifications extended specifications systems outside enterprise network additional uses tnc reported include industrial control system ics scada security physical security specifications introduced tnc work group partial list vendors adopted tnc standards also networking u.s. army planned use technology enhance security computer networks south carolina department probation parole pardon services tested tnc-scap integration combination pilot program
[ 704, 9569, 5384, 3851, 3323, 2416, 9137, 5490, 6419, 635, 7899 ]
Test
6,283
3
Macintosh_Quadra_650:macintosh quadra 650 macintosh quadra 650 originally called macintosh centris 650 personal computer designed manufactured sold apple computer february 1993 september 1994 centris 650 introduced alongside smaller centris 610 replacement macintosh iici iivi quadra 700 intended start new midrange centris line computers later 1993 apple decided follow emerging industry trend naming product families target customers – quadra business lc education performa home – folded centris 650 quadra family quadra 650 discontinued without direct replacement september 1994 although recently introduced power macintosh 7100 iivx form factor 650 similar target audience sold price range standard equipment centris 650 models includes onboard video vga support via adapter 3 nubus slots processor direct slot two adb two serial ports external scsi connector four simm slots support 4 8 16 32 mb simms allowing maximum 132 136 mb ram depending configuration ethernet-capable models aaui port system 7.1 included standard minimum required version introduced february 10 1993 introduced october 21 1993
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 1090, 4180, 10838, 10840, 3167, 9312, 8806, 6258, 10357, 4220, 10365, 10878, 6783, 4741, 7305, 8842, 7824, 147, 7830, 6807, 4258, 7842, 7844, 3241, 7869, 8893, 8896, ...
Train
6,284
8
WS-Addressing:ws-addressing web services addressing ws-addressing specification transport-neutral mechanism allows web services communicate addressing information essentially consists two parts structure communicating reference web service endpoint set message addressing properties associate addressing information particular message ws-addressing standardized way including message routing data within soap headers instead relying network-level transport convey routing information message utilizing ws-addressing may contain dispatch metadata standardized soap header network-level transport responsible delivering message dispatcher capable reading ws-addressing metadata message arrives dispatcher specified uri job network-level transport done ws-addressing supports use asynchronous interactions specifying common soap header wsa replyto contains endpoint reference epr response sent service provider transmits response message separate connection wsa replyto endpoint decouples lifetime soap request/response interaction lifetime http request/response protocol thus enabling long-running interactions span arbitrary periods time endpoint reference epr xml structure encapsulating information useful addressing message web service includes destination address message additional parameters called reference parameters necessary route message destination optional metadata wsdl ws-policy service message addressing properties communicate addressing information relating delivery message web service ws-addressing originally authored microsoft ibm bea sun microsystems sap submitted w3c standardization w3c ws-addressing working group refined augmented specification process standardization ws-addressing currently specified three parts web services policy attachment endpoint reference ws-paepr specifies mechanism meaning including ws-policy expressions endpoint references ws-paepr w3c member submission
[ 9665, 10020, 10949, 7878, 8070, 8766, 8425, 10829, 4974, 3323, 6357, 10486, 5210, 1851, 10396, 3966, 479 ]
None
6,285
2
Open_source_in_Kosovo:open source kosovo first project open source kosovo adjustment open office packet december 2003 28 july 2004 albanian team users linux ggsl one first public organizations purpose getting information field open source conference called software freedom day software freedom day known first initiative foss kosovo level conference purpose conference promote free open software issues discussed linux free software open sources general another issue discussed conference operative system linux benefits kde gnome last issues discussed conference ati-kos made surveys five municipal assemblies kosovo may 2005 according survey 98.6 wanted software box mother tongue albanian another survey majority participants believed software box like open office would help increasing productivity different fields interface albanian free libre open source software kosova flossk floss kosova non-governmental organization established march 2009 promotes free open-source software initiative undertaken james michael dupont association volunteers kosovo first results organization seen august year faculty electrical computer engineering held first conference organization conference became tradition held every year conference resulted biggest conference region called “ software freedom kosova 2009 ” promoted free open-source software growth knowledge maps active members members around kosovo abroad february 2009 first person started teaching lessons operative system linux kosovo james micheal dupont courses held idi mainly concerned basic elements using linux benefits systems june year students continued teach lessons linux open street map one projects contributes mostly open source kosovo many members open street map community worked project companies like 'logisticplus companies well beginnings seen map made brod town brod town endangered environmental damages mountains sharri project introduced joachim bergerhoff told flossk un-habitat project flossk helped development project map created community included cities towns brod gjilan gjakovë ferizaj prizren pejë prishtinë interesting project also project shkodra 2010 community helped survivors flooding find streets project 'kumevotu.info project youngsters flossk less two weeks duty project help people find place vote project held 12 december 2010 dedicated especially elections year 2010 project based open street map user gives personal data interesting map find place vote project useful even youngsters participated creating olpc one attractive projects open source kosovo dedicated children olpc project dedicated poor places basic thing laptop used children learn system linux laptop based version fedora basic applications also equipped wifi people could browse internet learn new things project supported since first steps flossk different conferences project welcomed kosovo albanian community open source kosovo active field wikipedia wikimedia community dealing mainly promoting open knowledge wikipedia translating albanian made easier community informed everything initiative made flossk resulted 31,458 articles albanian language 2013 conference held called 'wikiacademykosovo direct way adding articles wikipedia project 'fedora one open source projects also active kosovo promoted distributed two ambassadors kosovo ardian haxha gent thaqi flossk association ambassadors fedras kosovo always organizes parties announce new versions mozilla firefox community active kosovo one projects flossk also promoting mozilla project ambassadors kosovo altin ukshini gent thaqi heroid shehu active promoting mozilla project kosovo also projects platform drupal flossk association unicef lab managed organize training project 6 may dave hall member free software counselor administrator systems australia participants trained knowledge drupal ways using developing cms 29 30 august 2009 first annual conference “ software freedom kosova 2009 ” held premises faculty engineering organized free libre open source software kosova flossk university pristina conference presented public figures world free open source software presented kosovo also james michael dupont – co-founder flossk conference promoted free open-source software also aim exchange experiences speakers audiences 40 topics lectures various fields ranging issues related wikipedia free encyclopedia linux intellectual property licenses building communities programming languages php python given features mentioned conference freely called one extensive southeast europe “ software freedom kosova 2010 ” held second time 25-26 september capital city kosovo prishtina sfk10 organized floss kosovo faculty electrical engineering computer fiek university pristina conference time last time focused 24 lectures kosovo region world main lecturers also guests honor conference renowned hacker fk10 prepared thanks job almost year organizing committee also topics also offered conference held premises faculty electrical computer engineering time spending tradition continued almost middle november exactly 12th 2011 organized next conference “ software freedom kosova 2011 ” one largest activities field 300 participants conference one successful held till local regional speakers full intensive day much topics touched world free software one held day focused topic “ business open source ” introductory remarks made public curious topics presented first half day second part day presentations finally long-awaited final presentation held omer keser google executive spoke google mobile applications detailing number users mobile devices numbers territories world development mobile phone use across different states conference focused aim meeting point network individuals companies sponsoring also initiating projects benefit people kosovo establishing one european centers floss soon possible result commercial benefits country aim could achieve kosovo businesses public introduce low cost alternatives rather expensive proprietary software promote respect legal licenses introduce public best methods localization software knowledge kind activity present lecturers business world use floss commercial development projects also present examples companies region using floss competitive leg outsourcing european market moreover presenting free code build helps entry level professionals companies build skills work leader towards value added projects open source software conference related developments knowledge culture mapping held prishtina kosovo largest conference kind region conference organized free libre open source kosova flossk kosovo association information oommunication technology ipko foundation faculty electrical engineering university pristina conference focused web technologies standards-based vendor html5 javascript like especially important consider recent developments global scene related touch-optimized applications mobile web fact software development kosovo centers web technologies conference held 8-9 september faculty electrical computer engineering prishtina software freedom kosova 2013 nonprofit conference 5th time edition organized flossk new details released regarding agenda speakers presented 7 september 2013 first day conference topics discussed include mobile open web hacker spaces data protection freelancing code sharing scaling cloud one first time changed traditional location organizing faculty education university pristina 170 participants many speakers welcome note done arianit dobroshi altin ukshini ardian haxha thankful anyone presented speakers donators lecture presented alex lakatos java script developer mozilla representative based cluj-napoca redon skikuli mozilla representative one co-founders design everview tirana arianit dobroshi one main member since beginning flossk arbnor hasani currently involved innovations lab kosovo design center ana risteska contributor gnome project burim shala wordpress theme developer two next days conference held place focused practical things participants like tuning postagre sql bert desmet awesome html5/css3 vleran dushi wordpress template development burim shala wmkit arduino workshop redon sikuli november 2004 klina municipality started project change computer network linux openoffice.org first part project charged firefox openoffice.org second part charged linux 3rd 6 november year 70 municipality computer network english language openoffice.org firefox albanian proliferation open source software products benefits many companies government kosovo costs significantly lower security higher undp foss club also trained municipal employees survey conducted end training 100 employees stated prefer software albanian language project translation openoffice.org albanian language started year undp foss team consisted members bulgaria kosovo 4 june 2010 richard stallman activist programmer free software visited kosovo lectured topic free digital society national library kosovo lecture freedom digital society threats welcomed large number participants lecture richard stallman mentioned many countries digital freedom directly violated denmark australia countries many webpages closed unclear reasons emphasized presence free software freedom educational institutions really necessary countries want advance societies use free software want dependent software pay also emphasized today meeting minister education kosovo offered help implementation free software schools kosovo help country develop free independent weak working project powerful give others also opportunity get knowledge freedom software richard stallman end richard stallman answered many questions put forth participants room 22-24 february faculty education near university pristina held first academy called wikiacademykosovo idea conference promote kosovo digital world emphasize good things new qualitative articles pictures wikimedia propaganda present kosovo threat idea kosovo country academy revealed articles cultural heritage social issue geography institutions economy tourism also starting point improve actual image kosovo number mentors wikipedia present event advised writers writings result writings became qualitative winners academy writings academy supported ministry internal affairs republic kosovo great britain ambassy royal ambassy norway british council ipko foundation kosovar organization flossk
[ 9665, 8644, 3462, 9579, 10413, 9455, 5078, 823 ]
Test