node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
6,286 | 4 | Information_repository:information repository information technology repository central place aggregation data kept maintained organized way usually computer storage may aggregation data accessible place storage may also imply ability selectively extract data concept universal digital library described within reach 2012 la times article universal digital library within reach told google attempts mass-digitize termed orphan works out-of-print copyrighted works u.s copyright office european union working google reached agreements france lets publisher choose works scanned sold contrast google trying usa free digitize sell works unless copyright holders opted deal still unsuccessful attempts develop called information repository underway decades federated information repository easy way deploy secondary tier data storage comprise multiple networked data storage technologies running diverse operating systems data longer needs primary storage protected classified according captured metadata processed de-duplicated purged automatically based data service level objectives requirements federated information repositories data storage resources virtualized composite storage sets operate federated environment federated information repositories developed mitigate problems arising data proliferation eliminate need separately deployed data storage solutions concurrent deployment diverse storage technologies running diverse operating systems feature centralized management deployed data storage resources self-contained support heterogeneous storage resources support resource management add maintain recycle terminate media track off-line media operate autonomously since one main reasons implementation federated nformation repository reduce maintenance workload placed staff traditional data storage systems federated information repositories automated automation accomplished via policies process data based time events data age data content policies manage following data processed according media type storage pool storage technology federated information repositories intended reduce staff workload designed easy deploy offer configuration flexibility virtually limitless extensibility redundancy reliable failover federated information repositories feature robust client based data search recovery capabilities based permissions enable end users search information repository view information repository contents including data off-line media recover individual files multiple files either original network computer another network computer | [
1668,
3366,
1801,
4233,
3692,
7983,
531,
756,
10711,
3388
] | None |
6,287 | 4 | Centurion_guard:centurion guard centurion guard pc hardware software based security product developed centurion technologies released 1996 many different releases versions product many distributed bill melinda gates foundation computers donated libraries | [] | None |
6,288 | 4 | Detection_of_Intrusions_and_Malware,_and_Vulnerability_Assessment:detection intrusions malware vulnerability assessment detection intrusions malware vulnerability assessment dimva event annual conference designed serve general forum discussing malware vulnerability computing systems attacks advancing computer security exchange ideas one projects german informatics society gi according official dimva website 2017 event year dimva brings together international experts academia industry government present discuss novel research areas said conference held 6 july 7 july city bonn germany sponsored entities google rohde schwarz vmray conference report demonstrated externally manipulate alfa romeo giulietta networked safety systems essentially hack vehicle attracted notice publications fiat chrysler authority | [
5636,
7560,
1622,
7515,
2558
] | Validation |
6,289 | 2 | Atari_DOS:atari dos atari dos disk operating system used atari 8-bit family computers operating system extensions loaded memory required order atari computer manage files stored disk drive extensions operating system added disk handler file management features important extension disk handler atari dos 2.0 file management system fms implementation file system loaded floppy disk meant least additional ram needed run dos loaded several versions atari dos available first version released 1979 atari using cross assembler data general aos first version dos atari commands accessible menu bundled 810 disk drives version entirely memory resident made fast occupied memory space second popular version dos atari bundled 810 disk drives early 1050 disk drives considered lowest common denominator atari doses atari-compatible disk drive read disk formatted dos 2.0s dos 2.0s consisted codice_1 codice_2 codice_1 loaded memory codice_2 contained disk utilities loaded user exited dos addition bug fixes dos 2.0s featured improved codice_5 support ability automatically run atari executable file named codice_6 since user memory erased codice_2 loaded option create codice_8 file added stored user memory temporary file codice_8 restored codice_2 unloaded previous menu option dos 1.0 codice_11 replaced codice_12 dos 2.0s version 2.0s single-density disks 2.0d double-density disks 2.0d shipped 815 dual disk drive expensive incompatible standard 810 thus sold small number making dos version 2.0d rare unusual new version dos came originally bundled 5.25-inch atari 1050 disk drive made use new enhanced density ed capability referred atari dual density confused later extra-high density ed perpendicular recording floppy disks offered 1050 increased storage 88 kb 130 kb per disk single density 88 kb formatting option maintain compatibility older atari 810 disk drives organizing sectors blocks atari anticipating larger capacity floppy disks resulted incompatibility dos 2.0s files converted dos 3 could converted back dos 2.0 result dos 3 extremely unpopular gain widespread acceptance amongst atari user community dos 3 provided built-in help via atari help key and/or inverse key help files needed present system dos disk function properly dos 3 also used special xio commands control disc operations within basic programs version 2.5 upgrade 3.0 listening complaints customers atari released improved version previous dos allowed use enhanced density disks utility read dos 3 disks additional option added menu codice_13 format single-density disks dos 2.5 shipped 1050 disk drives early xf551 disk-drives included utilities codice_14 codice_15 codice_16 codice_17 dos 4.0 designed never-released 1450xld rights returned author michael barall placed public domain later published antic software dos 4.0 used blocks instead single sectors supported single enhanced double density well single- double-sided drives dos 4.0 compatible dos 2 3 disks could read files also automatically switch densities necessary go menu manually select correct density dos xe supported double-density double-sided capabilities atari xf551 drive well burst i/o dos xe used new disk format incompatible dos 2.0s dos 2.5 requiring separate utility reading older 2.0 files also required bank-switched ram run 400/800 machines supported date-stamping files sub-directories dos xe last dos made atari atari 8-bit family many doses released manufacturers third-party drives anyone made drive modifications anyone dissatisfied available doses often doses could read disks higher densities could set drive read disks faster using warp speed ultra-speed techniques doses except spartados dos 2.0 compatible someone atari hacker community modified dos 2.0 add features allow use dual density disk drives look feel dos 2.0 one new feature added radix one could use translate hexadecimal numbers base 10 base 10 hex menu driven dos compatible dos 2.0 among first third-party dos programs support double-density drives many enhancements including sector copying verifying speed checking turning on/off file verifying drive reconfiguration published rana systems written john chenoweth ron bieber last version 8.2d dos produced optimized systems software compatible dos 2.0 allowed use double density floppies unlike atari dosses used command line instead menu dos xl provided menu program addition command line dos could read ss/sd ss/ed ss/dd ds/dd disks made use known methods speeding disk-reads supported various third-party drive manufacturers published technical support written paul nicholls menu driven dos enhanced features sorts disk directory listings set display options file directory compressed display deleted files undelete advanced features required proprietary top-dos format published eclipse software written r. k. bennett dos supports turbo 1050 happy speedy xf551 us doubler highspeed drives xl/xe published martin reitershan computertechnik written herbert barth frank bruchhäuser dos adds ability use sub-directories supports hard-drives published wordmark systems includes complete source code dos used command-line interface compatible dos 2.0 could read dos 2.0 disks supports subdirectories hard drives capable handling filesystems sized 16 mb included capability create primitive batch files sophisticated version spartados strongly resembles ms-dos look feel shipped 64 kb rom cartridge spartados compatible dos fact renamed version spartados 3.x due legal reasons realdos shareware stephen j. carden ken ames spartados compatible dos last version 1.30 released december 1995 much lower memory footprint compared original spartados use ram rom xl/xe machines allowing used older atari 400/800 models bw-dos freeware jiří bernasek xdos freeware stefan dorndorf number different formats existed atari disks atari dos 2.0s single-sided single-density disk 720 sectors divided 40 tracks formatting 707 sectors free 128-byte sector used last 3 bytes housekeeping data bytes used file number next sector leaving 125 bytes data meant disk held 707 × 125 88,375 bytes user data single-density disk holding mere 88 kb per side remained popular atari 8-bit disk format throughout series lifetime almost commercial software continued sold format variants modified copy protection since compatible atari-made disk drives 1978 percom established double-density layout standard manufacturers atari-compatible disk drives indus amdek rana —except atari itself— followed configuration block 12 bytes defines disk layout | [
96,
3841,
3426,
2179,
9762,
5925,
10818,
2383,
5359,
6289,
2290,
3315,
532,
2933,
6675,
7983,
9840,
7870
] | None |
6,290 | 5 | Channel_bank:channel bank telecommunications channel bank device performs multiplexing demultiplexing demux group communications channels analog digital telephone lines one channel higher bandwidth higher digital bit rate ds-1 t1 circuit channels sent simultaneously single cable called trunkline channel bank may located telephone exchange enterprise telephone closet enclosure breaks individual telephone lines high-capacity telephone trunk line connected central telephone office enterprise pbx system | [
8192,
7490,
2787,
1967,
2994,
3156
] | Train |
6,291 | 6 | LizardFS:lizardfs lizardfs open source distributed file system posix-compliant licensed gplv3 released 2013 fork moosefs lizardfs distributed scalable fault-tolerant file system achieved spreading data several physical servers associated physical data storage storage presented end-user single logical name space file system designed possible add disks servers “ fly ” without need server reboots shut-downs lizardfs used underlying distributed file system product developed cloudweavers uses opennebula cloud management platform marketed hyper-converged infrastructure possible use cases include storage cloud hosting services render farms backups high availability native microsoft windows client licensed features available support contract alternatively time-limited trial version windows client available high availability achieved manually scripting | [
3909,
2314,
6797,
7983,
823,
728,
2395,
3582,
6591
] | Test |
6,292 | 3 | Hundra_(video_game):hundra video game hundra action game developed spanish studio zeus software published dinamic software amstrad cpc msx zx spectrum 1988 loosely inspired 1983 film hundra based hundra well received spanish press including review scores 44/50 amstrad accion 9/10 micromania game famous erotic cover art best title art 1988 award microhobby | [
9006
] | Test |
6,293 | 2 | Alsamixer:alsamixer alsamixer graphical mixer program advanced linux sound architecture alsa used configure sound settings adjust volume ncurses user interface require x window system supports multiple sound cards multiple devices top-left corner alsamixer area show basic information card name mixer chip name current view mode currently selected mixer item mixer item switched displayed name volume bars located basic information area scroll left/right controls put single screen name control shown bottom volume bars currently selected item drawn red and/or emphasized mixer control volume capability shows box current volume filled box volume percentages displayed volume bar left right channels mono control one value shown mixer control turned mute appears volume bar turned green appears instead toggle switch via key mixer control capture capability capture flag appears volume bar capture turned -- -- -- shown capture red appears capture switch turned addition l r letters appear left right side indicate left right channels turned controls enumeration list n't show boxes texts indicate currently active item change item via up/down keys alsamixer three view modes playback capture playback view controls related playback shown similarly controls capture recording shown capture view view mode shows controls current view mode displayed top-left position together mixer name etc default view mode playback view changed via -v option also view mode switched via keyboard commands alsamixer comes tui started different keys used configure sound cards tui recognizes following keyboard commands configure available soundcards commands shown upper case also given lower case reminded keystrokes hit key press open list available sound cards precise list cards advanced linux sound architecture alsa device driver successfully loaded either boot-up per codice_1 command command codice_2 print list currently loaded device drivers arrow keys used select channel device depending preferred terminology also use n next p previous keys control volume currently selected device also use purpose left right signals affected control independently use increase decrease volume left channel increases volume right channel decreases function keys used change view modes switch help mode proc info mode via f1 f2 keys respectively terminals ca n't use function keys like gnome terminal keys used alternatively help proc modes keys used switch playback capture view mode respectively tab key toggles current view mode circularly quit program alt+q hitting esc key please note might need hit esc twice terminals since regarded prefix key | [
11427,
7983,
7509,
823,
2045
] | None |
6,294 | 3 | Canon_T90:canon t90 canon t90 introduced 1986 top line canon series 35 mm single-lens reflex slr cameras last professional-level manual-focus camera canon last professional camera use canon fd lens mount although overtaken autofocus revolution canon new incompatible eos electro-optical system year production t90 pioneered many concepts seen high-end canon cameras present day particularly user interface industrial design high level automation due ruggedness t90 nicknamed tank japanese photojournalists many still rated highly even 20+ years introduction previous canon cameras wholly in-house design projects t90 canon brought german industrial designer luigi colani collaboration canon designers final design composed colani ideas kunihisa ito ods co. ltd. incorporating colani distinctive bio-form curvaceous shapes canon considered colani contribution important enough present first production t90 body engraved name computer-aided design techniques introduced canon t90 well use computer controlled cnc milling machines make molding dies shell much work went human factors engineering create ergonomic user interface camera form previous cameras largely dictated required locations mechanical controls body film advance lever rewind crank shutter speed dial shutter release etc t90 film transport control longer required others longer mechanically linked gave designers freedom shape camera make easier control hold place controls way suited user rather mechanical design t90 introduced features still used slr cameras today use lcd screen top camera right hand side new t90 – introduced t70 – t90 refined show even camera information control wheel located behind shutter release convenient right index finger used adjust camera settings conjunction buttons located right thumb left-hand side camera design still used canon digital slrs current production t90 includes integral motor driven film advance focal plane shutter mirror aperture cocking rewind functions canon broke new ground powered features camera previously cameras used one powerful electric motor geared functions instead t90 three coreless micromotors within body close functions drive maximum mechanical advantage one used wind film achieving rate 4.5 frames per second second prepares shutter mirror etc next shot third motor powers rewind function driven four aa batteries base camera control camera systems t90 uses dual cpu architecture main low-power cpu runs 32 khz sub-cpu runs 1 mhz powered needed main cpu handles lcd display overall state sub-cpu handles exposure calculations viewfinder display control camera motors architecture provides lower power usage cpus plus integrated circuits components mounted several flexible circuit boards fit around camera structure coin-type lithium battery main circuit board retains camera settings aa batteries removed user-serviceable part fails camera brought service center battery replaced canon technician expected battery life order five years although depends variety factors including duration periods without main battery 4xaa power t90 canon developed sophisticated light-metering system yet although introduced novel metering techniques assembled majority metering techniques developed one easy-to-use system first took metering options new f-1—center-weighted average metering partial area metering spot metering—and makes available press button turn command dial new f-1 requires focusing screen change switch metering patterns t90 partial area metering uses center 13 picture area spot metering uses center 2.7 canon copied metering options found olympus om-4 multi-spot metering allows photographer average eight spot meter readings different parts scene another feature borrowed olympus separate highlight shadow spot readings could taken adjust camera metering decisions ensure extremes tonal range muted grey final exposure two built-in sensors used implement metering options center-weighted partial area metering performed double-area silicon photocell spc canon standard location eyepiece spot metering performed another spc located bottom mirror box light reaches sensor via half-silvered area main mirror secondary mirror located beneath spot metering cell also allows automatic ttl off-the-film flash metering borrowed olympus notably lacking common metering mode slr cameras matrix metering nikon introduced fa 1983 canon follow suit 1987 eos 650 eight exposure modes available program ae auto-exposure mode puts exposure control completely hands camera variable shift program ae allows photographer bias camera towards narrow aperture three wide angle settings fast shutter speed three telephoto settings well standard mode manual control aperture priority ae shutter-speed priority ae allow photographer set one exposure variable manually camera chooses either latter two modes safety shift feature allows camera adjust fixed parameter obtain correct exposure otherwise example aperture priority mode photographer aperture fixed wide open photograph bright scene correct shutter speed expose correctly aperture might faster camera capable safety shift lets camera reduce aperture achieve correct exposure maximum shutter speed safety shift feature turned pressing two buttons back camera near base automation exposure desired manual mode available camera metering acts sophisticated light-meter decisions made photographer use older lenses automated aperture diaphragm stopped-down aperture priority ae stopped-down manual used instruct camera currently set aperture taking aperture therefore adjust metering calculations accordingly finally flash ae mode available flash photography t90 first canon camera support through-the-lens ttl flash metering measures actual light levels reaching film measuring reflected light film otf shutting flash unit film sufficiently exposed measurement calculated using average reflectivity color negative film system also used canon new eos system making t90 non-eos canon body compatible ttl canon flashes t90 x-sync speed 1/250 second fastest canon achieved better cameras available time production new dedicated flash unit speedlite 300tl launched alongside t90 support new flash modes zoomable head capable adjustment moving head cover fields view 24 35 50 85 mm lenses bounce flash head rotated 90° vertically 180° left 90° right well plain ttl mode 300tl supports a-ttl advanced ttl flash-to-subject distance calculated using infrared pulse detector mounted flash body bounce mode however uses 1/20th power pre-flash instead pre-flash also used fe lock mode flash exposure lock mode pre-flash used conjunction spot metering determine correct exposure advance taking picture thus camera moved reframe main subject off-center still expose correctly exposures slower x-sync speed previous slr flash systems triggered flash start exposure soon first shutter curtain finished travel however motion blurs light trails longer exposure method gives impression backwards movement since motion trails front moving object flash t90 became first mass-market camera support second-curtain flash flash fires end exposure second shutter curtain starts close although identical current 2009 canon speedlite 580 ex ii supports t90 well canon also produced dedicated macro ring flash camera ml-2 supports ttl manual models contains two flash tubes one either side fired separately together system consists flash ring fits onto end lens control unit screws hot shoe atop camera later ml-3 ring flash introduced eos system cameras also supports t90 t90 support vast range accessories available canon f-1 f-1n new f-1 number significant accessories available pentaprism interchangeable focusing screen eight different screens available different applications standard new split/microprism screen offers three common focusing aids simultaneously central circle split image prism surrounded microprism ring rest screen laser matte two optional data backs available t90 first command back 90 allows date data imprinting photographs also allowed various forms time-lapse photography second sold canon certain markets data memory back 90 stores 16 shot variables 156 exposures six variables 338 exposures computer interface data memory back 90 supports msx home computer standard third parties adapted connectors computer systems wired 60t3 remote control unit plugs socket fitted beneath right handgrip infrared remote control kit also available lc-2 unit also supports auto sensing mode completely unmanned photography trips shutter whenever something blocked path transmitter receiver—useful wildlife photography example number modifications t90 performed years canon third parties order add features missing camera as-built canon ceased supporting camera 1998 spare parts longer available subsequent difficulty obtaining repair services likely discourage remaining professional use cameras one issue lcd liquid crystal display life problem unique t90 lcd displays age wear varying rate dependent environmental conditions use factors commonly quoted lifespans five ten years thus many t90s displays nearing end lives even replaced spare part longer available third-party replacement emerged plastic battery holder t90 somewhat susceptible breakage cause camera become inoperative used cameras carefully checked broken/repaired battery holder compartments another common problem failure second internal battery retains frame number/iso settings replacement requires service person skilled soldering techniques camera disassembly another serious problem concerns shutter t90 shutter appears become sticky camera ages prone locking case camera lcd displays eee message help appears viewfinder display commonly called eee syndrome among users problem likely crop camera left unused time thus best way prevent regular use camera seem cause inaccurate shutter speeds failure problem corrected knowledgeable technician without replacing shutter mechanism reportedly caused dirt shutter magnets affecting performance left unused extended period time circuit need replaced expensive time-consuming proposition sticky shutter problem relates rubber washer involved operation shutter age atmospheric conditions tends deteriorate become sticky impedes operation shutter frequent use delay stickiness 'glueing shutter started long-term remedy shutter repaired rubber washer replaced another 10 years enjoyed camera working correctly good short term solution lightly clean shutter diaphragm cotton ball lighter fluid electronically controlled slr film cameras working canon t90 bargain used market prices used camera dealers providing warranties range approximately us 120–140 camera working condition approximately us 240–260 camera body mint condition accessories box manual canon fd lenses however remain quite affordable compared ef counterparts | [
1776,
7041,
9006
] | Test |
6,295 | 4 | ArpON:arpon arpon arp handler inspection computer software project improve network security attracted interest among network managers academic researchers frequently cited means protecting arp-based attacks address resolution protocol arp security issues include man middle mitm attack arp spoofing arp cache poisoning arp poison routing attacks arpon host-based solution make arp standardized protocol secure order avoid man middle mitm attack arp spoofing arp cache poisoning arp poison routing attack possible using three kinds anti arp spoofing techniques goal arpon therefore provide secure efficient network daemon provides sarpi darpi harpi anti arp spoofing technique thus making arp standardized protocol secure foreign intrusion | [
939,
6013,
7983,
4307,
4085,
87,
823,
5397,
5437,
2045,
2558
] | Validation |
6,296 | 2 | Bus_error:bus error computing bus error fault raised hardware notifying operating system os process trying access memory cpu physically address invalid address address bus hence name modern use architectures much rarer segmentation faults occur primarily due memory access violations problems logical address permissions posix-compliant platforms bus errors usually result sigbus signal sent process caused error sigbus also caused general device fault computer detects though bus error rarely means computer hardware physically broken—it normally caused bug software bus errors may also raised certain paging errors see least three main causes bus errors software instructs cpu read write specific physical memory address accordingly cpu sets physical address address bus requests hardware connected cpu respond results answer specific address hardware responds cpu raises exception stating requested physical address unrecognized whole computer system note covers physical memory addresses trying access undefined virtual memory address generally considered segmentation fault rather bus error though mmu separate processor tell difference cpus byte-addressable unique memory address refers 8-bit byte cpus access individual bytes memory address generally access larger units 16 bits 32 bits 64 bits without units aligned specific boundary x86 platform notable exception example multi-byte accesses must 16 bit-aligned addresses given bytes 0 2 4 6 would considered aligned therefore accessible addresses 1 3 5 would considered unaligned similarly multi-byte accesses must 32-bit aligned addresses 0 4 8 12 would considered aligned therefore accessible addresses would considered unaligned attempting access unit larger byte unaligned address cause bus error systems may hybrid depending architecture used example hardware based ibm system/360 mainframe including ibm system z fujitsu b8000 rca spectra univac series 90 instructions must 16-bit boundary execution addresses must start even byte attempts branch odd address results specification exception data however may retrieved address memory may one byte longer depending instruction cpus generally access data full width data bus times address bytes access memory full width data bus mask shift address individual byte systems tolerate inefficient algorithm essential feature software especially string processing unlike bytes larger units span two aligned addresses would thus require one fetch data bus possible cpus support functionality rarely required directly machine code level thus cpu designers normally avoid implementing instead issue bus errors unaligned memory access freebsd linux solaris signal bus error virtual memory pages paged e.g disappeared e.g accessing memory-mapped file executing binary image truncated program running just-created memory-mapped file physically allocated disk full x86 exists older memory management mechanism known segmentation application loads segment register selector non-present segment posix-compliant oses done assembly language exception generated oses used swapping linux generates sigbus example unaligned memory access written c programming language assembly syntax compiling running example posix compliant os x86 demonstrates error gdb debugger shows immediate value 0x2a stored location stored eax register using x86 assembly language example register indirect addressing printing low order bits address shows aligned word boundary dword using x86 terminology | [
2560,
6155,
6675,
7187,
10776,
25,
4637,
3615,
9762,
4643,
6180,
5158,
7728,
7217,
10803,
9784,
10809,
576,
2625,
6221,
3160,
2653,
10333,
97,
11363,
7269,
6760,
10856,
8298,
9835,
7285,
4727,
2168,
9335,
634,
1147,
3197,
1150,
5247,
1139... | Train |
6,297 | 4 | Ghost_(disk_utility):ghost disk utility ghost acronym general hardware-oriented system transfer disk cloning backup tool originally developed murray haszard 1995 binary research technology acquired 1998 symantec backup recovery functionality replaced symantec system recovery ssr although ghost imaging technology still actively developed available part symantec ghost solution suite binary research developed ghost auckland new zealand symantec acquisition functions translation languages moved elsewhere main development remained auckland october 2009 time much moved india technologies developed 20/20 software integrated ghost acquisition symantec april 2000 first versions ghost supported cloning entire disks however version 3.1 released 1997 supports cloning individual partitions ghost could clone disk partition another disk partition image file ghost allows writing clone image second disk machine another machine linked parallel network cable network drive tape drive version 4.0 ghost added multicast technology following lead competitor imagecast multicasting supports sending single backup image simultaneously machines without putting greater stress network sending image single machine version also introduced ghost explorer windows program supports browsing contents image file extract individual files explorer subsequently enhanced support adding deleting files image fat later ext2 ext3 ntfs file systems 2007 ghost explorer could edit ntfs images ghost explorer could work images older versions slowly version 4 images contain indexes find files rapidly version 4.0 also moved real-mode dos 286 protected mode additional memory available allows ghost provide several levels compression images provide file browser 1998 ghost 4.1 supports password-protected images version 5.0 moved 386 protected mode unlike text-based user interface earlier versions 5.0 uses graphical user interface gui binary research logo two stars revolving around plays main screen program idle 1998 gdisk script-based partition manager integrated ghost gdisk serves role similar fdisk greater capabilities norton ghost version novell netware called 2.0 released around 1999 supports nss partitions although runs dos like others ghost 6.0 released 2000 includes management console managing large numbers machines console communicates client software managed computers allows system administrator refresh disk machine remotely dos-based program ghost requires machines running windows reboot dos run ghost 6.0 requires separate dos partition used console released march 31 2001 norton ghost version 7.0 retail marketed norton ghost 2002 personal edition released december 14 2001 ghost 7.5 creates virtual partition dos partition actually exists file within normal windows file system significantly eased systems management user longer set partition tables ghost 7.5 write images cd-r discs later versions write dvds ghost 8.0 run directly windows well-suited placement bootable media bartpe′s bootable cd corporate edition supports unicast multicast peer-to-peer transfers via tcp/ip ghost 8.0 supports ntfs file system although ntfs accessible dos program off-line version ghost runs bootable media place installed operating system originally faced number driver support difficulties due limitations increasingly obsolete 16-bit dos environment driver selection configuration within dos non-trivial beginning limited space available floppy disks made disk cloning several different disk controllers difficult task different scsi usb cd-rom drives involved mouse support possible often left due limited space drivers floppy disk devices usb often work using newer features usb 2.0 instead operating 1.0 speeds taking hours taken minutes widespread support dos went decline became increasingly difficult get hardware drivers dos newer hardware disk imaging competitors ghost dealt decline dos moving recovery environments freebsd linux windows pe draw current driver development able image newer models disk controllers nevertheless dos version ghost compatible hardware configurations works much faster *nix based image backup tools ghost 8 later windows programs run windows pe bartpe hiren bootcd use plug play hardware drivers standard desktop computer making hardware support ghost much simpler norton ghost 2003 consumer edition ghost released september 6 2002 available independent product norton ghost 2003 also included component norton systemworks 2003 professional simpler non-corporate version ghost norton ghost 2003 include console windows front-end script ghost operations create bootable ghost diskette machine still needs reboot virtual partition user need interact dos symantec deprecated liveupdate support norton ghost 2003 early 2006 released november 15 2004 symantec renamed enterprise version ghost symantec ghost solution suite 1.0 helped clarify difference consumer business editions product defined february 2006 release norton save restore also known norton backup restore standalone backup application based ghost 10.0 ghost solution suite 1.1 bundle updated version ghost symantec client migration user data settings migration tool former powerquest equivalent deploycenter using pqi images ghost solution suite 1.1 released december 2005 create image file larger 2 gb ghost 8.2 earlier image files automatically split two segments segment maximum size 2 gb new features include comprehensive manufacturing tools ability create universal boot disk end 2003 symantec acquired largest competitor disk-cloning field powerquest august 2 2004 norton ghost 9.0 released new consumer version ghost based powerquest′s drive image version 7 provides live imaging windows system ghost 9 continues leverage powerquest file format meaning backward compatible previous versions ghost however version ghost 8.0 included ghost 9 recovery disk support existing ghost customers ghost 9.0 released august 2 2004 represents significant shift consumer product line ghost 2003 several ways since ghost 9 support older .gho format disk images separate cd containing ghost 2003 included retail packaging users needing access older images limitations ghost 9 compared ghost 2003 well-communicated symantec resulted many dissatisfied customers purchased ghost 9 expecting previous version′s features like making images bootable ghost environment installation required product activation supports creating images cds dvds iomega zip jaz disks well ieee 1394 firewire usb mass storage devices supports encrypting images maxtor external hard disk drives maxtor onetouch buttons ghost 10.0 compatible previous versions future versions norton save restore 1.0 released february 2006 renamed consumer version ghost used ghost 10.0′s engine addition features allow backup restoration individual files ghost solution suite 2.0 released november 2006 version provides significant improvements performance well ability edit ntfs images version also adds support windows vista x64 versions windows guid partition table gpt disks however software fully support systems extensible firmware interface efi firmware ghost 11.0 supports saving restoring native ghost image format .gho .ghs raw images .img .raw ghost 12.0 includes windows vista support updated thorough user interface supports full system backup individual files folders backup version provides lightsout restore feature restores system on-disk software recovery environment similar windows thereby allowing recovery without bootable cd upon system startup menu asks whether start operating system lightsout recovery environment lightsout restore would augment iso image comes ghost latter contains recovery environment recover system without working operating system nsr 2.0 fewer features comparison norton ghost 12 nsr 2.0 offers one-time backups file folder backup simplified schedule editor maxtor onetouch integration modifiable symantec recovery disc version supports 32-bit 64-bit versions windows xp vista version 14.0 uses volume snapshot service vss make backups store backups ftp site ghost connect threatcon symantec service monitors malware activity around world performs incremental backups specific threat level reached features include ability back network-attached storage devices support ntfs partitions 16tb ghost manage installations version 12.0 later across network version longer supports opening .gho image files stores images .v2i format incremental backup images created norton ghost saved .iv2i filename extensions alone original full backup .v2i filename extension regular basis older .gho image files restored using ghost explorer separate utility ghost software enterprise including ghost 11.5 released may 2008 new features include january 6 2010 latest build live update 11.5.1.2266 live update 5 lu5 updates ghost solution suite 2.5.1 provides support windows 7 windows server 2008 r2 furthermore ghost 11.5 compatible bartpe bootable cd using pe builder plug-in symantec ghost 11 according norton community symantec′s site following features available norton ghost 15 ghost software enterprise including ghost 12.0 deployment solution 6.9 announced march 2015 ghost software enterprise including ghost 12.0 deployment solution 6.9 released 7 march 2016 ghost software enterprise including ghost 12.0 deployment solution 6.9 released 18 may 2017 release update 3 released 22 september 2017 added support ext4 filesystem ghost software enterprise including ghost 12.0 deployment solution 6.9 released 31 october 2018 release added support ghost solution suite web console ipxe windows server 2016 smart raw imaging 4k native drive support ghost marketed os deployment solution capture deployment environment requires booting windows pe environment accomplished creating iso burn dvd usb bootable disk installed client automation folder delivered pxe server provides environment perform offline system recovery image creation ghost mount backup volume recover individual files ghost copy contents one volume another convert volume contents virtual disk vmdk vhd format initially ghost supported fat file system although could copy resize file systems performing sector-by-sector transfer ghost added support ntfs later 1996 also provided program ghostwalker change security id sid made windows nt systems distinguishable ghostwalker capable modifying name windows nt computer interface ghost added support ext2 file system 1999 ext3 subsequently support ext4 added september 2017 norton ghost discontinued april 30 2013 support via chat knowledge base available june 30 2014 removed symantec ghost web page invited ghost customers try symantec system recovery described software backup disaster recovery | [
5512,
6797,
8976,
2193,
10896,
7955,
2197,
5142,
2199,
10903,
6297,
9762,
5924,
3366,
1708,
7983,
8368,
11568,
9141,
2870,
823,
9655,
9910,
11065,
3520,
9025,
7364,
2378,
7244,
8398,
5080,
1247,
9569,
10476,
2545,
3315,
6643,
246,
10872,
... | Test |
6,298 | 4 | Public_Register_of_Travel_and_Identity_Documents_Online:public register travel identity documents online prado council european union public register authentic travel identity documents online prado contains technical descriptions including information important security features identity travel documents countries within european union schengen area countries neighbouring countries well many third countries worldwide council joint action 98/700/jha 3 december 1998 european image archiving system fado false authentic documents online set first part system expert fado went online end 2004 secure communication among document experts 2007 ifado prado released ifado intranet fado contains important information expert fado access restricted governmental use prado small subset information published general public prado hosted general secretariat council european union gsc directorate general justice home affairs dgd 1a prado contains basic technical descriptions including information security features authentic identity travel documents information selected provided document experts member states european union eu iceland norway switzerland part information contained classified restricted expert fado system made publicly available via prado pages steering committee council european union currently working party frontiers formation false documents experts travel identity documents categorised follows document categories document types document types civil status documents information practically important documents eu schengen countries present overall number described documents third countries however differs widely country country information added every week prado users also find links websites lists travel documents officially recognised eu member states schengen states information invalid document numbers provided eu member states well third countries information related identity checking document checking document fraud also present prado available 24 official languages european union documents introduced document experts currently 31 participating countries languages standardised descriptions translated automatically thus documents immediately available supported languages additional free text information contained translated online specialised linguists general secretariat council european union website published general secretariat council european union transparency reasons also provide important service many users europe especially non-governmental organisations need legal obligation check identities example | [
6882
] | None |
6,299 | 1 | MySQL_Connector/ODBC:mysql connector/odbc mysql connector/odbc known myodbc computer software oracle corporation odbc interface allows programming languages support odbc interface communicate mysql database mysql connector/odbc originally created mysql ab | [
8262,
7022
] | None |
6,300 | 3 | Nukernel:nukernel nukernel microkernel developed apple computer early 1990s written scratch apple designed using concepts mach 3.0 extensive additions soft real-time scheduling improve multimedia performance intended used basis copland operating system one version seen publicly copland alpha release proved extremely unstable development apparently ended cancellation copland 1996 ers external reference specification nukernel contained entirety object oriented message passing system method filed march 19 1996 granted december 31 1996 one-time technical lead nukernel jeff robbin one driving forces behind itunes ipod apple nukernel name confused nukernel name custom kernel beos | [
2761,
7561,
9931,
11180,
7983,
7187,
5363,
11123,
9176,
5976,
5049,
8700,
10813
] | Test |
6,301 | 3 | Ångström_distribution:ångström distribution ångström distribution linux distribution variety embedded devices distribution result work developers openzaurus openembedded opensimpad projects graphical user interfaces guis available opie gpe among options ångström distribution cooptition poky linux ångström based openembedded project specifically openembedded-core oe-core layer ångström poky linux based oe-core mostly utilize toolchain officially yocto compatible poky linux officially part yocto project ångström primarily differs poky linux binary distribution like e.g debian fedora opensuse ubuntu linux distributions using opkg package management hence essential part ångström builds binary package feed allowing simply install software distributed opkg packages without compile first one might install binary package aptitude dpkg according ångström wiki ångström developed least following devices | [
9732,
5637,
6,
11271,
3089,
10780,
3618,
9253,
11305,
3626,
7727,
56,
9784,
1083,
59,
4673,
1602,
10817,
7246,
7253,
1110,
3162,
607,
2658,
3685,
6763,
9324,
10860,
2671,
1138,
8315,
8316,
8829,
11388,
11391,
4225,
2179,
6276,
7812,
8326,... | Test |
6,302 | 2 | Gaël_Duval:gaël duval gaël duval born 1973 french entrepreneur july 1998 created mandrake linux mandriva linux linux distribution originally based red hat linux kde also co-founder mandrakesoft merged mandriva jacques le marois frédéric bastok gaël duval responsible communication mandriva management team laid company march 2006 round cost-cutting duval suspected part reason dismissal disagreement management company future strategy resulting lawsuit company duval chairman chief technology officer ulteo company bought aznetwork group 2015 2016 co-founded nfactory.io incubator-accelerator startups november 2017 gael duval created /e/ mobile operating system fork android-based lineageos accompanied set online services /e/ released first beta september 12th 2018 operating system emphasizes data privacy use proprietary google services 2018 duval founded e foundation maintains /e/ duval graduate university caen normandy france studied networks documentary applications | [
1026,
9353,
5644,
4367,
8848,
657,
10642,
1939,
2581,
3478,
6808,
7450,
7584,
673,
802,
5410,
6691,
6947,
8354,
5931,
8364,
1717,
823,
2109,
11069,
10687,
10822,
8263,
843,
589,
6352,
4177,
10192,
8787,
11602,
4437,
6489,
3802,
4831,
9696... | Test |
6,303 | 4 | NProtect_GameGuard_Personal_2007:nprotect gameguard personal 2007 nprotect gameguard personal 2007 often referred nprotect ggp2007 anti-virus security suite microsoft windows 2000 xp vista developed inca internet users playing online computer games includes real-time protection forms malware including viruses trojans spyware worms keyloggers rootkits well game optimization feature like many security products nprotect gameguard personal 2007 cause collisions executed security products simultaneously collisions mainly occur running on-access scanning real-time scanning simultaneously nprotect gameguard personal 2007 available free non-free edition former lacking treatment abilities malware | [
10756,
2213,
8526,
7983,
7515,
10392,
2041,
7739
] | Test |
6,304 | 2 | Mike_Lesk:mike lesk michael e. mike lesk born 1945 american computer scientist 1960s michael lesk worked smart information retrieval system project wrote much retrieval code many retrieval experiments well obtaining ba degree physics chemistry harvard college 1964 phd harvard university chemical physics 1969 1970 1984 lesk worked bell labs group built unix lesk wrote unix tools word processing tbl refer standard ms macro package troff compiling lex networking uucp also wrote portable i/o library predecessor stdio.h c contributed significantly development c language preprocessor 1984 left work bellcore managed computer science research group lesk worked specific information systems applications mostly geography system driving directions dictionaries system disambiguating words context 1990s lesk worked large chemical information system core project cornell online computer library center american chemical society chemical abstracts service 1998 2002 lesk headed national science foundation division information intelligent systems oversaw phase 2 nsf digital library initiative currently professor faculty library information science department school communication information rutgers university lesk received flame award lifetime achievement usenix 1994 fellow acm 1996 2005 elected national academy engineering authored number books selected books michael lesk | [
7872,
7780,
8262,
3468,
11023,
5492,
2488,
3385,
2045
] | Test |
6,305 | 2 | Christmas_Tree_EXEC:christmas tree exec christmas tree exec first widely disruptive computer worm paralyzed several international computer networks december 1987 written student clausthal university technology rexx scripting language drew crude christmas tree text graphics sent entry target email contacts file way spread onto european academic research network earn bitnet ibm worldwide vnet systems caused massive disruption core mechanism iloveyou worm 2000 essentially christmas tree although ran pcs rather mainframes spread different network scripted using vbscript rather rexx name actually christma exec ibm vm systems originally required file names formatted 8+space+8 characters additionally ibm required rexx script files file type exec name sometimes written christmas exec adding 9th character make name readable user prompted ... type christmas ... —and fact launched worm displays message program run forwards mailbox addresses contained user address file | [
3867,
9283,
10756,
11683,
2041,
7515,
10110
] | Test |
6,306 | 9 | Gordon_Plotkin:gordon plotkin gordon david plotkin born 9 september 1946 theoretical computer scientist school informatics university edinburgh plotkin probably best known introduction structural operational semantics sos work denotational semantics particular notes structural approach operational semantics influential contributed many areas computer science plotkin educated university glasgow university edinburgh gaining bachelor science degree 1967 phd 1972 supervised rod burstall plotkin remained edinburgh burstall robin milner co-founder laboratory foundations computer science lfcs former doctoral students include luca cardelli philippa gardner doug gurr eugenio moggi lǐ wèi plotkin elected fellow royal society frs 1992 fellow royal society edinburgh frse member academia europæa also winner royal society wolfson research merit award plotkin received milner award 2012 fundamental research programming semantics lasting impact principles design programming languages nomination royal society reads | [
10049,
1830,
11020,
10031,
5585,
4916,
1333,
3926,
1783,
6070,
3929,
10102,
10043,
6460,
9535
] | Validation |
6,307 | 7 | GoGrid:gogrid gogrid cloud infrastructure service hosting linux windows virtual machines managed multi-server control panel restful api july 2008 gogrid selected finalist linuxworld 2008 product excellence award idg world expo linuxworld.com may 2010 gogrid named lead411 list “ 2010 hottest san francisco companies ” june 2010 gogrid “ best channel incentives ” award 2010 ascii reseller success summit march 2012 gogrid selected winner cloud-infrastructure category ondemand 2012 alwayson 2011-2014 gogrid appeared gartner cloud infrastructure-as-a-service iaas magic quadrant | [
6018,
1539,
8451,
6027,
4236,
6797,
526,
911,
272,
1935,
4623,
8592,
10893,
405,
2965,
2328,
4377,
8986,
10265,
5662,
11038,
5666,
9766,
39,
5159,
2217,
6444,
8495,
3121,
5681,
9906,
823,
7352,
10681,
7357,
11070,
448,
2496,
4289,
8515,
... | None |
6,308 | 4 | James_Ryan_(cyber_security):james ryan cyber security james ryan born 1974 anchorage alaska american entrepreneur cyber security co-founder managing partner litmus logic security firm ryan contributions cyber security industry known economist history channel ryan born anchorage alaska 1974 holds bachelor master science electrical engineering virginia tech ryan currently resides northern virginia wife kidist three children motivational trainer ryan included book “ lifting curtain disgrace call urban high school education ” ryan founder managing partner since 2002 litmus logic llc boutique firm provides expertise security privacy cyber defense trust strategies internet technologies serves chief strategy officer cyber security summit minnesota innovation lab state-level economic development organization ryan one experts contributed economics digital identity 2015 technical report published economist intelligence unit 1993 1997 software engineer trw 1997 1998 system engineer lockheed martin 1998 1999 security network expert lucent technologies alcatel-lucent 1999 2002 principal consultant security network expert predictive systems ryan knowledge cyber security trust framework consults governments defense financial institutions software cloud providers united states department defense dod civil agencies spoke united states department defense cyber crime conference robotics alley cyber security summit security360 topics speeches included success cyber security public key infrastructure pki internet things cyber security robotics artificial intelligence national strategy trusted identities cyberspace ryan collaborated nasa electronic data systems eds creating identity credential access management icam segment architecture personal identity verification – interoperable piv-i trust framework new approach access control uses public key infrastructure pki featured together oliver north history channel program “ america ’ book secrets pentagon ” march 2012 | [
4194,
10831,
2737,
3026,
5531,
2558
] | None |
6,309 | 6 | Filesystem-level_encryption:filesystem-level encryption filesystem-level encryption often called file-based encryption fbe file/folder encryption form disk encryption individual files directories encrypted file system contrast full disk encryption entire partition disk file system resides encrypted types filesystem-level encryption include advantages filesystem-level encryption include unlike cryptographic file systems full disk encryption general-purpose file systems include filesystem-level encryption typically encrypt file system metadata directory structure file names sizes modification timestamps problematic metadata needs kept confidential words files stored identifying file names anyone access physical disk know documents stored disk although contents documents one exception encryption support added zfs filesystem filesystem metadata filenames ownership acls extended attributes stored encrypted disk zfs metadata relating storage pool stored plaintext possible determine many filesystems datasets available pool including ones encrypted content stored files directories remain encrypted another exception cryfs replacement encfs cryptographic file systems specialized general-purpose file systems specifically designed encryption security mind usually encrypt data contain – including metadata instead implementing on-disk format block allocation file systems often layered top existing file systems e.g residing directory host file system many file systems also offer advanced features deniable encryption cryptographically secure read-only file system permissions different views directory structure depending key user ... one use cryptographic file system part existing file system synchronized 'cloud storage cases cryptographic file system could 'stacked top help protect data confidentiality | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
3629,
4659,
7225,
11323,
8772,
1109,
4708,
9836,
7789,
7794,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
10405,
1190,
5286,
5293,
7344,
2... | Test |
6,310 | 2 | Nokia_E73_Mode:nokia e73 mode nokia e73 mode feature phone nokia e series range manufactured nokia company successor nokia e73 nokia e73 mode enterprise-based feature phone nokia eseries devices standard features including mobile email calendar instant messaging among many others like nokia e72 | [
1537,
8577,
3205,
11655,
9359,
1424,
529,
2449,
8083,
10770,
5143,
2072,
7063,
5274,
5019,
5659,
669,
8472,
11545,
4003,
4132,
167,
40,
3626,
5290,
10410,
10802,
7220,
821,
5175,
7866,
1083,
1728,
7617,
4291,
7877,
10053,
199,
967,
9292,
... | Test |
6,311 | 3 | Cell_(microprocessor):cell microprocessor cell multi-core microprocessor microarchitecture combines general-purpose powerpc core modest performance streamlined coprocessing elements greatly accelerate multimedia vector processing applications well many forms dedicated computation developed sony toshiba ibm alliance known sti architectural design first implementation carried sti design center austin texas four-year period beginning march 2001 budget reported sony approaching us 400 million cell shorthand cell broadband engine architecture commonly abbreviated cbea full cell part first major commercial application cell sony playstation 3 game console mercury computer systems dual cell server dual cell blade configuration rugged computer pci express accelerator board available different stages production toshiba announced plans incorporate cell high definition television sets seems abandoned idea exotic features xdr memory subsystem coherent element interconnect bus eib interconnect appear position cell future applications supercomputing space exploit cell processor prowess floating point kernels cell architecture includes memory coherence architecture emphasizes power efficiency prioritizes bandwidth low latency favors peak computational throughput simplicity program code reasons cell widely regarded challenging environment software development ibm provides linux-based development platform help developers program cell chips architecture widely used unless adopted software development community however cell strengths may make useful scientific computing regardless mainstream success mid-2000 sony computer entertainment toshiba corporation ibm formed alliance known sti design manufacture processor sti design center opened march 2001 cell designed period four years using enhanced versions design tools power4 processor 400 engineers three companies worked together austin critical support eleven ibm design centers period ibm filed many patents pertaining cell architecture manufacturing process software environment early patent version broadband engine shown chip package comprising four processing elements patent description known power processing element ppe processing element contained 8 apus referred spes current broadband engine chip chip package widely regarded run clock speed 4 ghz 32 apus providing 32 gigaflops fp8 quarter precision broadband engine shown 1 teraflops raw computing power design fabricated using 90 nm soi process march 2007 ibm announced 65 nm version cell production plant time globalfoundries east fishkill new york bandai namco entertainment used cell processor 357 arcade board well subsequent 369 february 2008 ibm announced begin fabricate cell processors 45 nm process may 2008 ibm introduced high-performance double-precision floating-point version cell processor powerxcell 8i 65 nm feature size may 2008 opteron- powerxcell 8i-based supercomputer ibm roadrunner system became world first system achieve one petaflops fastest computer world third quarter 2009 world three energy efficient supercomputers represented green500 list similarly based powerxcell 8i 45 nm cell processor introduced concert sony playstation 3 slim august 2009 november 2009 ibm discontinued development cell processor 32 apus still developing cell products may 17 2005 sony computer entertainment confirmed specifications cell processor would shipping then-forthcoming playstation 3 console cell configuration one ppe core eight physical spes silicon playstation 3 one spe locked-out test process practice helps improve manufacturing yields another one reserved os leaving 6 free spes used games code target clock-frequency introduction 3.2 ghz introductory design fabricated using 90 nm soi process initial volume production slated ibm facility east fishkill new york relationship cores threads common source confusion ppe core dual threaded manifests software two independent threads execution active spe manifests single thread playstation 3 configuration described sony cell processor provides nine independent threads execution june 28 2005 ibm mercury computer systems announced partnership agreement build cell-based computer systems embedded applications medical imaging industrial inspection aerospace defense seismic processing telecommunications mercury since released blades conventional rack servers pci express accelerator boards cell processors fall 2006 ibm released qs20 blade module using double cell processors tremendous performance certain applications reaching peak 410 gigaflops fp8 quarter precision per module qs22 based powerxcell 8i processor used ibm roadrunner supercomputer mercury ibm uses fully utilized cell processor eight active spes april 8 2008 fixstars corporation released pci express accelerator board based powerxcell 8i processor sony high performance media computing server zego uses 3.2 ghz cell/b.e processor cell broadband engine cell commonly known microprocessor intended hybrid conventional desktop processors athlon 64 core 2 families specialized high-performance processors nvidia ati graphics-processors gpus longer name indicates intended use namely component current future online distribution systems may utilized high-definition displays recording equipment well hdtv systems additionally processor may suited digital imaging systems medical scientific etc physical simulation e.g scientific structural engineering modeling simple analysis cell processor split four components external input output structures main processor called power processing element ppe two-way simultaneous-multithreaded powerpc 2.02 core eight fully functional co-processors called synergistic processing elements spes specialized high-bandwidth circular data bus connecting ppe input/output elements spes called element interconnect bus eib achieve high performance needed mathematically intensive tasks decoding/encoding mpeg streams generating transforming three-dimensional data undertaking fourier analysis data cell processor marries spes ppe via eib give access via fully cache coherent dma direct memory access main memory external data storage make best eib overlap computation data transfer nine processing elements ppe spes equipped dma engine since spe load/store instructions access local scratchpad memory spe entirely depends dmas transfer data main memory spes local memories dma operation transfer either single block area size 16kb list 2 2048 blocks one major design decisions architecture cell use dmas central means intra-chip data transfer view enabling maximal asynchrony concurrency data processing inside chip ppe capable running conventional operating system control spes start stop interrupt schedule processes running spes end ppe additional instructions relating control spes unlike spes ppe read write main memory local memories spes standard load/store instructions despite turing complete architectures spes fully autonomous require ppe prime useful work horsepower system comes synergistic processing elements use dma method data transfer limited local memory footprint spe pose major challenge software developers wish make horsepower demanding careful hand-tuning programs extract maximal performance cpu ppe bus architecture includes various modes operation giving different levels memory protection allowing areas memory protected access specific processes running spes ppe ppe spe risc architectures fixed-width 32-bit instruction format ppe contains 64-bit general purpose register set gpr 64-bit floating point register set fpr 128-bit altivec register set spe contains 128-bit registers used scalar data types ranging 8-bits 64-bits size simd computations variety integer floating point formats system memory addresses ppe spe expressed 64-bit values theoretic address range 2 bytes 16 exabytes 16,777,216 terabytes practice bits implemented hardware local store addresses internal spu synergistic processor unit processor expressed 32-bit word documentation relating cell word always taken mean 32 bits doubleword means 64 bits quadword means 128 bits 2008 ibm announced revised variant cell called powerxcell 8i available qs22 blade servers ibm powerxcell manufactured 65 nm process adds support 32 gb slotted ddr2 memory well dramatically improving double-precision floating-point performance spes peak 12.8 gflops 102.4 gflops total eight spes coincidentally peak performance nec sx-9 vector processor released around time ibm roadrunner supercomputer world fastest 2008-2009 consisted 12,240 powerxcell 8i processors along 6,562 amd opteron processors powerxcell 8i powered super computers also dominated top 6 greenest systems green500 list highest mflops/watt ratio supercomputers world beside qs22 supercomputers powerxcell processor also available accelerator pci express card used core processor qpace project since powerxcell 8i removed rambus memory interface added significantly larger ddr2 interfaces enhanced spes chip layout reworked resulted larger chip die packaging cell chip number different configurations basic configuration multi-core chip composed one power processor element ppe sometimes called processing element pe multiple synergistic processing elements spe ppe spes linked together internal high speed bus dubbed element interconnect bus eib ppe powerpc based dual-issue in-order two-way simultaneous-multithreaded core 23-stage pipeline acting controller eight spes handle computational workload ppe limited order execution capabilities perform loads order delayed execution pipelines ppe work conventional operating systems due similarity 64-bit powerpc processors spes designed vectorized floating point code execution ppe contains 64 kib level 1 cache 32 kib instruction 32 kib data 512 kib level 2 cache size cache line 128 bytes additionally ibm included altivec vmx unit fully pipelined single precision floating point altivec 1 support double precision floating-point vectors 32-bit fixed point unit fxu 64-bit register file per thread load store unit lsu 64-bit floating-point unit fpu branch unit bru branch execution unit bxu ppe consists three main units instruction unit iu execution unit xu vector/scalar execution unit vsu iu contains l1 instruction cache branch prediction hardware instruction buffers dependency checking login xu contains integer execution units fxu load-store unit lsu vsu contains execution resources fpu vmx ppe complete two double precision operations per clock cycle using scalar fused-multiply-add instruction translates 6.4 gflops 3.2 ghz eight single precision operations per clock cycle vector fused-multiply-add instruction translates 25.6 gflops 3.2 ghz ppe designed specifically cell processor development microsoft approached ibm wanting high performance processor core xbox 360 ibm complied made tri-core xenon processor based slightly modified version ppe added vmx128 extensions spe dual issue order processor composed synergistic processing unit spu memory flow controller mfc dma mmu bus interface spes n't branch prediction hardware hence heavy burden compiler spe 6 execution units divided among odd even pipelines spe spu runs specially developed instruction set isa 128-bit simd organization single double precision instructions current generation cell spe contains 256 kib embedded sram instruction data called local storage mistaken local memory sony documents refer vram visible ppe addressed directly software spe support 4 gib local store memory local store operate like conventional cpu cache since neither transparent software contain hardware structures predict data load spes contain 128-bit 128-entry register file measures 14.5 mm 90 nm process spe operate sixteen 8-bit integers eight 16-bit integers four 32-bit integers four single-precision floating-point numbers single clock cycle well memory operation note spu directly access system memory 64-bit virtual memory addresses formed spu must passed spu spe memory flow controller mfc set dma operation within system address space one typical usage scenario system load spes small programs similar threads chaining spes together handle step complex operation instance set-top box might load programs reading dvd video audio decoding display data would passed spe spe finally ending tv another possibility partition input data set several spes performing kind operation parallel 3.2 ghz spe gives theoretical 25.6 gflops single precision performance compared personal computer contemporaries relatively high overall floating point performance cell processor seemingly dwarfs abilities simd unit cpus like pentium 4 athlon 64 however comparing floating point abilities system one-dimensional application-specific metric unlike cell processor desktop cpus suited general purpose software usually run personal computers addition executing multiple instructions per clock processors intel amd feature branch predictors cell designed compensate compiler assistance prepare-to-branch instructions created double-precision floating point operations sometimes used personal computers often used scientific computing cell performance drops order magnitude still reaches 20.8 gflops 1.8 gflops per spe 6.4 gflops per ppe powerxcell 8i variant specifically designed double-precision reaches 102.4 gflops double-precision calculations tests ibm show spes reach 98 theoretical peak performance running optimized parallel matrix multiplication toshiba developed co-processor powered four spes ppe called spursengine designed accelerate 3d movie effects consumer electronics spe local memory 256 kb total spes 2 mb local memory eib communication bus internal cell processor connects various on-chip system elements ppe processor memory controller mic eight spe coprocessors two off-chip i/o interfaces total 12 participants ps3 number spu vary industrial applications eib also includes arbitration unit functions set traffic lights documents ibm refers eib participants 'units eib presently implemented circular ring consisting four 16 bytes wide unidirectional channels counter-rotate pairs traffic patterns permit channel convey three transactions concurrently eib runs half system clock rate effective channel rate 16 bytes every two system clocks maximum concurrency three active transactions four rings peak instantaneous eib bandwidth 96 bytes per clock 12 concurrent transactions 16 bytes wide 2 system clocks per transfer figure often quoted ibm literature unrealistic simply scale number processor clock speed arbitration unit imposes additional constraints discussed bandwidth assessment section ibm senior engineer david krolak eib lead designer explains concurrency model participant eib one 16 byte read port one 16 byte write port limit single participant read write rate 16 byte per eib clock simplicity often regarded 8 byte per system clock note spu processor contains dedicated dma management queue capable scheduling long sequences transactions various endpoints without interfering spu ongoing computations dma queues managed locally remotely well providing additional flexibility control model data flows eib channel stepwise around ring since twelve participants total number steps around channel back point origin twelve six steps longest distance pair participants eib channel permitted convey data requiring six steps data must take shorter route around circle direction number steps involved sending packet little impact transfer latency clock speed driving steps fast relative considerations however longer communication distances detrimental overall performance eib reduce available concurrency despite ibm original desire implement eib powerful cross-bar circular configuration adopted spare resources rarely represents limiting factor performance cell chip whole worst case programmer must take extra care schedule communication patterns eib able function high concurrency levels david krolak explained 3.2 ghz channel flows rate 25.6 gb/s viewing eib isolation system elements connects achieving twelve concurrent transactions flow rate works abstract eib bandwidth 307.2 gb/s based view many ibm publications depict available eib bandwidth greater 300 gb/s number reflects peak instantaneous eib bandwidth scaled processor frequency however technical restrictions involved arbitration mechanism packets accepted onto bus ibm systems performance group explained quote apparently represents full extent ibm public disclosure mechanism impact eib arbitration unit snooping mechanism interrupt generation segment page translation faults well described documentation set yet made public ibm practice effective eib bandwidth also limited ring participants involved nine processing cores sustain 25.6 gb/s read write concurrently memory interface controller mic tied pair xdr memory channels permitting maximum flow 25.6 gb/s reads writes combined two io controllers documented supporting peak combined input speed 25.6 gb/s peak combined output speed 35 gb/s add confusion older publications cite eib bandwidth assuming 4 ghz system clock reference frame results instantaneous eib bandwidth figure 384 gb/s arbitration-limited bandwidth figure 256 gb/s things considered theoretic 204.8 gb/s number often cited best one bear mind ibm systems performance group demonstrated spu-centric data flows achieving 197 gb/s cell processor running 3.2 ghz number fair reflection practice well cell contains dual channel rambus xio macro interfaces rambus xdr memory memory interface controller mic separate xio macro designed ibm xio-xdr link runs 3.2 gbit/s per pin two 32-bit channels provide theoretical maximum 25.6 gb/s i/o interface also rambus design known flexio flexio interface organized 12 lanes lane unidirectional 8-bit wide point-to-point path five 8-bit wide point-to-point paths inbound lanes cell remaining seven outbound provides theoretical peak bandwidth 62.4 gb/s 36.4 gb/s outbound 26 gb/s inbound 2.6 ghz flexio interface clocked independently typ 3.2 ghz 4 inbound 4 outbound lanes supporting memory coherency companies leadtek released pci-e cards based upon cell allow faster real time transcoding h.264 mpeg-2 mpeg-4 video august 29 2007 ibm announced bladecenter qs21 generating measured 1.05 giga–floating point operations per second gigaflops per watt peak performance approximately 460 gflops one power efficient computing platforms date single bladecenter chassis achieve 6.4 tera–floating point operations per second teraflops 25.8 teraflops standard 42u rack may 13 2008 ibm announced bladecenter qs22 qs22 introduces powerxcell 8i processor five times double-precision floating point performance qs21 capacity 32 gb ddr2 memory on-blade ibm discontinued blade server line based cell processors january 12 2012 several companies provide pci-e boards utilising ibm powerxcell 8i performance reported 179.2 gflops sp 89.6 gflops dp 2.8 ghz sony playstation 3 video game console first production application cell processor clocked 3.2 ghz containing seven eight operational spes allow sony increase yield processor manufacture six seven spes accessible developers one reserved os toshiba produced hdtvs using cell presented system decode 48 standard definition mpeg-2 streams simultaneously 1920×1080 screen enable viewer choose channel based dozens thumbnail videos displayed simultaneously screen ibm supercomputer ibm roadrunner hybrid general purpose x86-64 opteron well cell processors system assumed 1 spot june 2008 top 500 list first supercomputer run petaflops speeds gained sustained 1.026 petaflops speed using standard linpack benchmark ibm roadrunner used powerxcell 8i version cell processor manufactured using 65 nm technology enhanced spus handle double precision calculations 128-bit registers reaching double precision 102 gflops per chip clusters playstation 3 consoles attractive alternative high-end systems based cell blades innovative computing laboratory group led jack dongarra computer science department university tennessee investigated application depth terrasoft solutions selling 8-node 32-node ps3 clusters yellow dog linux pre-installed implementation dongarra research first reported wired october 17 2007 interesting application using playstation 3 cluster configuration implemented astrophysicist gaurav khanna physics department university massachusetts dartmouth replaced time used supercomputers cluster eight playstation 3s subsequently next generation machine called playstation 3 gravity grid uses network 16 machines exploits cell processor intended application binary black hole coalescence using perturbation theory particular cluster performs astrophysical simulations large supermassive black holes capturing smaller compact objects generated numerical data published multiple times relevant scientific research literature cell processor version used playstation 3 main cpu 6 spes available user giving gravity grid machine net 16 general-purpose processors 96 vector processors machine one-time cost 9,000 build adequate black-hole simulations would otherwise cost 6,000 per run conventional supercomputer black hole calculations memory-intensive highly localizable well-suited architecture khanna claims cluster performance exceeds 100+ intel xeon core based traditional linux cluster simulations ps3 gravity grid gathered significant media attention 2007 2008 2009 2010 computational biochemistry biophysics lab universitat pompeu fabra barcelona deployed 2007 boinc system called ps3grid collaborative computing based cellmd software first one designed specifically cell processor united states air force research laboratory deployed playstation 3 cluster 1700 units nicknamed condor cluster analyzing high-resolution satellite imagery air force claims condor cluster would 33rd largest supercomputer world terms capacity lab opened supercomputer use universities research help computing power half million playstation 3 consoles distributed computing project folding home recognized guinness world records powerful distributed network world first record achieved september 16 2007 project surpassed one petaflops never previously attained distributed computing network additionally collective efforts enabled ps3 alone reach petaflops mark september 23 2007 comparison world second-most powerful supercomputer time ibm bluegene/l performed around 478.2 teraflops means folding home computing power approximately twice bluegene/l although cpu interconnect bluegene/l one million times faster mean network speed folding home may 7 2011 folding home runs 9.3 x86 petaflops 1.6 petaflops generated 26,000 active ps3s alone late 2008 cluster 200 playstation 3 consoles used generate rogue ssl certificate effectively cracking encryption ibm announced april 25 2007 would begin integrating cell broadband engine architecture microprocessors company line mainframes led gameframe architecture processor makes better suited hardware-assisted cryptographic brute force attack applications conventional processors due flexible nature cell several possibilities utilization resources limited different computing paradigms ppe maintains job queue schedules jobs spes monitors progress spe runs mini kernel whose role fetch job execute synchronize ppe kernel scheduling distributed across spes tasks synchronized using mutexes semaphores conventional operating system ready-to-run tasks wait queue spe execute spes use shared memory tasks configuration spe runs distinct program data comes input stream sent spes spe terminated processing output data sent output stream provides flexible powerful architecture stream processing allows explicit scheduling spe separately processors also able perform streaming tasks limited kernel loaded 2005 patches enabling cell support linux kernel submitted inclusion ibm developers arnd bergmann one developers aforementioned patches also described linux-based cell architecture linuxtag 2005 release 2.6.16 march 20 2006 linux kernel officially supports cell processor ppe spes programmable c/c++ using common api provided libraries fixstars solutions provides yellow dog linux ibm mercury cell-based systems well playstation 3 terra soft strategically partnered mercury provide linux board support package cell support development software applications various cell platforms including ibm bladecenter js21 cell qs20 mercury cell-based solutions terra soft also maintains y-hpc high performance computing cluster construction management suite y-bio gene sequencing tools y-bio built upon rpm linux standard package management offers tools help bioinformatics researchers conduct work greater efficiency ibm developed pseudo-filesystem linux coined spufs simplifies access use spe resources ibm currently maintaining linux kernel gdb ports sony maintains gnu toolchain gcc binutils november 2005 ibm released cell broadband engine cbe software development kit version 1.0 consisting simulator assorted tools web site development versions latest kernel tools fedora core 4 maintained barcelona supercomputing center website august 2007 mercury computer systems released software development kit playstation r 3 high-performance computing november 2007 fixstars corporation released new cvcell module aiming accelerate several important opencv apis cell series software calculation tests recorded execution times 3.2 ghz cell processor 6x 27x faster compared software 2.4 ghz intel core 2 duo illustrations different generations cell/b.e processors powerxcell 8i images scale cell/b.e packages measures 42.5×42.5 mm powerxcell 8i measures 47.5×47.5 mm | [
3077,
10757,
6663,
10761,
5642,
1548,
6157,
4630,
1563,
8231,
4144,
7218,
1587,
5172,
6715,
7234,
1091,
3142,
6732,
10316,
6738,
9302,
8792,
1115,
3677,
607,
1635,
10851,
3175,
3185,
5746,
5235,
4211,
630,
7801,
6268,
6781,
8316,
10368,
6... | Test |
6,312 | 4 | National_Cyber_Security_Policy_2013:national cyber security policy 2013 national cyber security policy policy framework department electronics information technology deity ref name= http //meity.gov.in/content/national-cyber-security-policy-2013-1 /ref aims protecting public private infrastructure cyber attacks policy also intends safeguard information personal information web users financial banking information sovereign data particularly relevant wake us national security agency nsa leaks suggested us government agencies spying indian users legal technical safeguards ministry communications information technology india defines cyberspace complex environment consisting interactions people software services supported worldwide distribution information communication technology india cyber security policy 2013 2013 hindu newspaper citing documents leaked nsa whistleblower edward snowden alleged much nsa surveillance focused india domestic politics strategic commercial interests sparked furor among people pressure government unveiled national cyber security policy 2013 2 july 2013 build secure resilient cyberspace citizens business government also protect anyone intervening privacy protect information information infrastructure cyberspace build capabilities prevent respond cyber threat reduce vulnerabilities minimize damage cyber incidents combination institutional structures people processes technology cooperation ministry communications information technology india define objectives follows -to improve visibility integrity ict products services establishing infrastructure testing validation security product | [
9688,
7887,
2558,
3495
] | Test |
6,313 | 9 | Larry_Wall:larry wall larry wall born september 27 1954 american computer programmer author created perl programming language wall grew los angeles bremerton washington starting higher education seattle pacific university 1976 majoring chemistry music later pre-medicine hiatus several years working university computing center graduating bachelor degree natural artificial languages graduate school university california berkeley wall wife studying linguistics intention finding unwritten language perhaps africa creating writing system would use new writing system translate various texts language among bible due health reasons plans cancelled remained united states wall instead joined nasa jet propulsion laboratory finished graduate school wall active member church nazarene wall author codice_1 usenet client widely used codice_2 program international obfuscated c code contest twice recipient first free software foundation award advancement free software 1998 beyond technical skills wall reputation wit often sarcastic sense humour ref name='www.perl.com/pub/a/1999/03/pm.ht /ref displays comments source code usenet example agree necessity compromise ca n't agree necessary compromise wall developed perl interpreter language working system development corporation later became part unisys co-author programming perl often referred camel book published o'reilly definitive resource perl programmers edited perl cookbook became employed full-time o'reilly media develop perl write books subject wall training linguist apparent books interviews lectures often compares perl natural language explains decisions perl design linguistic rationale also often uses linguistic terms perl language constructs instead traditional terms variable function accessor sometimes says noun verb topicalizer wall christian faith influenced terminology perl name biblical reference pearl great price matthew 13:46 similar references function name bless organization perl 6 design documents categories apocalypse exegesis wall also alluded faith spoken conferences including rather straightforward statement beliefs august 1997 perl conference discussion pilgrim progress yapc yet another perl conference june 2000 wall continues oversee development perl serves benevolent dictator life perl project official perl documentation states | [
5249,
4483,
5253,
8582,
6160,
10387,
3988,
3350,
10276,
1837,
4398,
9780,
9014,
1591,
6335,
4294,
8262,
7764,
11610,
7518,
11492,
2281,
8301,
8941,
11632,
1394,
8057,
3837
] | None |
6,314 | 2 | Interleaved_memory:interleaved memory computing interleaved memory design made compensate relatively slow speed dynamic random-access memory dram core memory spreading memory addresses evenly across memory banks way contiguous memory reads writes using memory bank turn resulting higher memory throughputs due reduced waiting memory banks become ready desired operations different multi-channel memory architectures primarily interleaved memory adding channels main memory memory controller however channel interleaving also possible example freescale i.mx6 processors allow interleaving done two channels interleaved memory memory addresses allocated memory bank turn example interleaved system two memory banks assuming word-addressable memory logical address 32 belongs bank 0 logical address 33 would belong bank 1 logical address 34 would belong bank 0 interleaved memory said n-way interleaved banks memory location resides bank interleaved memory results contiguous reads common multimedia execution programs contiguous writes used frequently filling storage communication buffers actually using memory bank turn instead using one repeatedly results significantly higher memory throughput bank minimum waiting time reads writes main memory random-access memory ram usually composed collection dram memory chips number chips grouped together form memory bank possible memory controller supports interleaving lay memory banks memory banks interleaved traditional flat layouts memory banks allocated continuous block memory addresses simple memory controller gives equal performance completely random access scenarios compared performance levels achieved interleaving however reality memory reads rarely random due locality reference optimizing close together access gives far better performance interleaved layouts note way memory addressed effect access time memory locations already cached impact memory locations need retrieved dram early research interleaved memory performed ibm 60s 70s relation ibm 7030 stretch computer development went decades improving design flexibility performance produce modern implementations | [
9952,
2625,
10945,
2791,
10734,
2383,
10365,
8222
] | Test |
6,315 | 2 | Netgear_WGR614L:netgear wgr614l wgr614l also known wgr614v8 802.11b/g wireless network router created netgear officially launched june 30 2008 wgr614l runs open source linux firmware supports installation third party packages dd-wrt tomato openwrt wgr614l designed used home business environments often used connection third-party firmware solutions sputniknet titan hotspots router also used wireless client bridge utilizing openwrt firmware wireless repeater bridge using dd-wrt firmware | [
2945,
823
] | Test |
6,316 | 4 | Client_to_Authenticator_Protocol:client authenticator protocol client authenticator protocol ctap enables roaming user-controlled cryptographic authenticator smartphone hardware security key interoperate client platform laptop computer ctap complementary web authentication webauthn standard published world wide web consortium w3c webauthn ctap primary outputs fido2 project joint effort fido alliance w3c ctap based upon previous work done fido alliance particular universal 2nd factor u2f authentication standard specifically fido u2f 1.2 proposed standard july 11 2017 became starting point ctap proposed standard latest version published january 30 2019 ctap specification refers two protocol versions ctap1/u2f protocol ctap2 protocol authenticator implements ctap2 called fido2 authenticator also called webauthn authenticator authenticator implements ctap1/u2f well backward compatible u2f protocol uses cbor binary data serialization format | [
10566,
3271,
7212,
10801,
1054,
124,
5918
] | Test |
6,317 | 3 | North_&_South_(video_game):north amp south video game north south combined strategy action game released 1989 commodore amiga atari st ported later nes amstrad cpc msx dos zx spectrum developed published infogrames north south offshoot belgian comic series les tuniques bleues raoul cauvin louis salverius/willy lambillotte dupuis based american civil war player basically acts civil war choosing play either north south player may choose start game year 1861 year civil war erupted 1864 year different array armies states side starts north south contains lot humorous elements example features parodies national anthems accessible player selects one different languages supported game english french spanish german italian addition game filled numerous comical situations gags taking simplified board interface game features strategic map united states separated states territories army units moved around state owns railway station fort capture leads player overtaking whole state otherwise capturing state involves simple movement unless another army state armies reinforced two ways turning option main menu player controlling state north carolina get periodic reinforcements ship also railways generate money turn generates soldiers moving army units player may expand westwards unoccupied territory two antagonistic armies clash result battle option main menu player turn in-game missions battles make purely like board game whenever opposing armies meet board-game mode results battles left chance outcome weighted towards larger army either army may retreat battles whenever side attempts capture enemy fort rob train result also randomised battle screen one action elements game different strategic map player starts opposite sides screen controls army consisting infantry cavalry artillery standard army consists six infantry three cavalry one cannon armies increased three times standard size merging together team six infantry three cavalry three cannons battlefield one time human player control one class units one time although cavalry starts charge left moving automatically forward straight line player focuses either cannon infantry computer-controlled opponent move three classes units infantry cavalry aggressive units class move fire simultaneously infantry move direction including backwards short-range weapon cavalry melee units much faster infantry move backwards cavalry instead return battle field every time reach end seconds cavalry returns way stop moving returning start position left-right axis unhindered movement up-down axis note cavalry movement started stop moving forwards unless player actively pulls horse reigns pushing backwards control method choice cannons move vertically sideways cannon fired nine times battle automatically withdraw battle army wins cannons withdrawn battle cannons available next battle however rest army killed cannons withdrawn cannons also lost middle battle map may river chasm case bridge serves choke point fighters likely meet bridge destroyed cannons one hit leave hole bridge units fall die instantly two hits bridge destroy every battlefield either river canyon narrow indestructible passage across cannons long-range weapons aiming – rather determining exact range – always easy care taken firing cannons avoid friendly fire battle usually deathmatch although player may retreat attacking army retreats return state beginning turn defending army decides retreat move adjacent state still control surrendering state battle enemy defenders retreat adjacent states retreating result loss cannons army army computer-controlled opponent retreat cannons destroyed enemy three times units states train station player must short side-scrolling mission fort capture state player controls single soldier runs towards goal clock reaches end meeting obstacles enemy soldiers dynamite crates dogs help knives punches send enemies towards sky asterix style occasions player also gets opportunity capture enemy train similar manner attacker running along train long see leave successfully capturing enemy train gets gold option turned storm cloud sit one state turn cloud move adjacent state twice month player turn army state cloud able move turn option main menu turned two non-player sides pose threat player armies native american lives west territory might hurl giant tomahawk randomly one westernmost states destroying army unfortunate enough garrisoned similarly sombrero-clad mexican living southwest might suddenly wake siesta toss bomb texas result option turned side controls north carolina chance turn free reinforcements arrive state via ship computer gaming world gave north south one-plus stars five wargamers three five arcade gamers 2011 wirtualna polska ranked tenth best amiga game june 2012 microïds anuman interactive ’ adventure game label released bluecoats north vs south remake ios android compatible devices windows ios version received metascore 60 metacritic another remake titled north south game released ios november 6 2012 bitcomposer entertainment ag | [
9006
] | Test |
6,318 | 5 | Multipath_TCP:multipath tcp multipath tcp mptcp ongoing effort internet engineering task force ietf multipath tcp working group aims allowing transmission control protocol tcp connection use multiple paths maximize resource usage increase redundancy january 2013 ietf published multipath specification experimental standard rfc 6824 currently ietf works update version 1 mptcp protocol obsolete rfc 6824 approved 2019 redundancy offered multipath tcp enables inverse multiplexing resources thus increases tcp throughput sum available link-level channels instead using single one required plain tcp multipath tcp backward compatible plain tcp multipath tcp particularly useful context wireless networks using wi-fi mobile network typical use case addition gains throughput inverse multiplexing links may added dropped user moves coverage without disrupting end-to-end tcp connection problem link handover thus solved abstraction transport layer without special mechanisms network link level handover functionality implemented endpoints without requiring special functionality subnetworks accordance internet end-to-end principle multipath tcp also brings performance benefits datacenter environments contrast ethernet channel bonding using 802.3ad link aggregation multipath tcp balance single tcp connection across multiple interfaces reach high throughput order facilitate deployment multipath tcp presents socket interface tcp implies standard tcp application used multipath tcp fact spreading data across several subflows applications could benefit enhanced api control underlying multipath tcp stack two different apis proposed expose features multipath tcp stack applications api extends netlink linux enhanced socket api july 2013 mptcp working group reported five independent implementations multipath tcp including reference implementation linux kernel currently available implementations july 2014 oracle reported implementation solaris developed june 2015 work progress mptcp wg meeting ietf 93 sunghoon seo announced kt deployed since mid june commercial service allows smartphone users reach 1 gbit/s using mptcp proxy service multipath tcp designed backward compatible regular tcp support application however specific deployments leverage ability simultaneously using different paths apple uses multipath tcp support siri application iphone siri sends voice samples https session apple servers servers reply information requested users according apple engineers main benefits multipath tcp application deployment use multipath tcp aggregate bandwidth different networks example several types smartphones notably korea use multipath tcp bond wifi 4g socks proxies another example hybrid access networks deployed network operators willing combine xdsl lte networks deployment multipath tcp used efficiently balance traffic xdsl lte network multipath tcp uses options described detail rfc 6824 multipath tcp options encoded tcp options option kind 30 reserved iana multipath tcp option kind 30 length variable remainder content begins 4-bit subtype field iana created maintain sub-registry entitled mptcp option subtypes transmission control protocol tcp parameters registry subtype fields defined follows values 0x8 0xe currently unassigned core idea multipath tcp define way build connection two hosts two interfaces standard tcp instance alice smartphone 3g wifi interfaces ip addresses 10.11.12.13 10.11.12.14 bob computer ethernet interface ip address 20.21.22.23 standard tcp connection established two ip addresses tcp connection identified four-tuple source destination addresses ports given restriction application create one tcp connection single link multipath tcp allows connection use several paths simultaneously multipath tcp creates one tcp connection called subflow path needs used purpose different protocol operations defined rfc 6824 multipath tcp adds new mechanisms tcp transmissions detailed specification detailed protocol specification provided rfc 6824 several survey articles provide introduction protocol several congestion control mechanisms defined multipath tcp main difference classical tcp congestion control schemes need react congestion different paths without unfair single path tcp sources could compete one paths four multipath tcp congestion control schemes currently supported multipath tcp implementation linux kernel stream control transmission protocol sctp reliable in-order datagram stream transport protocol originally intended telecommunication signaling supports concurrent use multiple access links allows application influence access interface selections datagram stream basis also supports mobility via access renegotiation hence sctp also transport layer solution offers type 3 flow granularity concurrency flow scheduling control multipath tcp also fully supports mobility fashion similar multipath tcp within ip multimedia subsystem ims architecture session initiation protocol sip support concurrent use multiple contact ip addresses registration one ims user agents allows creation multiple ims signaling paths signaling paths signaling messages carry session description protocol sdp messaging negotiate media streams sdp allows re- negotiation streams one media session multiple paths turn enables application layer multipath transport point view ims therefore offer application layer multipath support flow granularity concurrent access multipath extension real-time transport protocol rtp currently discussion within ietf multipath rtp offer flow granularity concurrent access mobility via ims sdp signaling rtp control protocol ietf currently developing quic protocol integrates features traditionally found tcp tls http protocols thanks flexibility extensibility quic possible extend support multiple paths address use cases multipath tcp first design multipath quic proposed implemented evaluated session layer mobile access router project experimented 2003 aggregation multiple wireless accesses heterogeneous technologies transparently balancing traffic response perceived performance parallel access schemes used accelerate transfers taking advantage http range requests initiate connections multiple servers replicated content equivalent multipath tcp involve application layer limited content known size | [
10242,
10755,
9732,
3847,
649,
9868,
3218,
275,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
562,
2996,
9909,
6651,
1977,
5178,
10171,
3133,
3006,
4797,
5181,
5437,
7364,
2887,
8265,
2509,
4687,
5843,
... | Test |
6,319 | 5 | Hyper_Text_Coffee_Pot_Control_Protocol:hyper text coffee pot control protocol hyper text coffee pot control protocol htcpcp facetious communication protocol controlling monitoring diagnosing coffee pots specified rfc 2324 published 1 april 1998 april fools day rfc part april fools prank extension htcpcp-tea published rfc 7168 1 april 2014 support brewing teas also april fools day rfc rfc 2324 written larry masinter describes satire saying serious purpose – identifies many ways http extended inappropriately wording protocol made clear entirely serious example notes strong dark rich requirement protocol designed espressoly sic brewing coffee despite joking nature origins perhaps protocol remained minor presence online editor emacs includes fully functional client side implementation number bug reports exist complaining mozilla lack support protocol ten years publication htcpcp web-controlled coffee consortium wc3 published first draft htcpcp vocabulary rdf parody world wide web consortium w3c http vocabulary rdf april 1 2014 rfc 7168 extended htcpcp fully handle teapots htcpcp extension http htcpcp requests identified uniform resource identifier uri scheme codice_1 corresponding word 29 listed languages contain several additions http methods also defines two error responses 5 august 2017 mark nottingham chairman ietf httpbis working group called removal status code 418 'm teapot node.js platform code implemented reference original 418 'm teapot established hyper text coffee pot control protocol 6 august 2017 nottingham requested references 418 'm teapot removed programming language go subsequently python requests asp.net httpabstractions library well response 15 year old developer shane brunswick created website save418.com established save 418 movement asserting references 418 'm teapot different projects serve reminder underlying processes computers still made humans brunswick site went viral hours following publishing garnering thousands upvotes social platform reddit causing mass adoption save418 twitter hashtag introduced site heeding public outcry node.js go python requests asp.net httpabstractions library decided removing 418 'm teapot respective projects unanimous support aforementioned projects general public prompted mark nottingham begin process 418 marked reserved http status code ensuring 418 replaced official status code foreseeable future | [
10242,
5251,
3592,
2571,
5520,
3218,
3474,
8852,
11413,
1435,
10269,
3742,
1694,
35,
10924,
6319,
562,
11444,
6456,
6330,
4797,
3006,
4158,
64,
9919,
7364,
2887,
9167,
5469,
5470,
10333,
10341,
10727,
10344,
11112,
5482,
8554,
9834,
5102,
... | Test |
6,320 | 9 | Gul_Agha_(computer_scientist):gul agha computer scientist gul agha گُل آغا professor computer science university illinois urbana-champaign director open systems laboratory known work actor model concurrent computation also editor-in-chief acm computing surveys 1999 2007 agha completed b.s honors california institute technology year 1977 received ph.d. computer communication science university michigan 1986 supervision john holland however much doctoral research carried carl hewitt message-passing semantics group massachusetts institute technology mit agha dissertation published mit press actors model concurrent computation distributed systems book according acm guide computing literature cited 3000 times agha born completed early schooling sindh pakistan received b.s honors california institute technology 1977 agha enjoys blues music vegan pacifist three daughters lives wife jennifer s. cole illinois agha became fellow institute electrical electronics engineers ieee 2002 also golden core member ieee computer society recipient ieee computer society meritorious service award international lecturer acm 1992 1997 agha elected acm fellow 2018 research concurrent programming formal methods specifically actor model | [
9224,
10102,
679
] | Test |
6,321 | 2 | Helix_Netroom:helix netroom netroom dos memory manager produced helix software company 1990s introduced august 1990 netroom originally titled lan memory manager version 1.0 netroom re-packaged version helix headroom headroom network extensions bundled together targeted network users netroom loaded network drivers virtual machine created using expanded memory page frame netroom allowed virtual machine run multitasked background process netroom included support novell netware banyan vines lan manager networks netroom originally available multi-user packs starting four user license helix introduced version 1.10 netroom january 1991 single-user license version included support microsoft windows 3.0 added integrated 286 386 expanded memory manager netroom 286/386 memory manager provided access expanded memory extended memory intel 80386 newer systems well intel 80286 systems based chips technologies neat chipset june 1991 netroom v2.0 added ms-dos 5 compatibility automatic setup configuration tool named customize netroom 2.0 continued focus virtual machine task-switching primary memory management technology january 1992 netroom v2.1 added quantum memory management feature could relocate system video bios high memory area 1992 helix licensed technology netroom 2.1 microsoft technology incorporated emm386 memmaker programs ms-dos 6 released march 1993 concurrently release ms-dos 6 helix released netroom v3.0 included helix cloaking technology netroom 3 contained variety cloaked utilities including system video bios licensed award software animated screen saver disk cache ram drive final version netroom v3.04 released late 1994 included compatibility windows 95 cloaking driver continued basis multimedia cloaking multimedia stacker products released 1994 1995 | [
548,
1515,
6797,
8301,
9166,
8241,
8115,
3477,
11101
] | Test |
6,322 | 3 | JavaStation:javastation javastation network computer nc developed sun microsystems 1996 2000 intended run java applications hardware based design sun sparcstation series successful line unix workstations javastation nc lacks hard drive floppy cd-rom drive also differs sun systems ps/2 keyboard mouse interfaces vga monitor connector several models javastation produced pre-production variants produced small numbers production models comprised models produced prototypes limited numbers included addition sun envisioned third-generation super javastation krups javachip co-processor native java bytecode execution n't appear produced javastation concept superseded sun ray series thin client terminals javastation comes javaos flash memory also possible install linux netbsd javastation | [
3328,
9090,
9731,
1801,
4235,
1809,
4241,
2710,
1818,
8863,
7072,
9343,
8994,
5375,
1316,
10789,
1707,
2731,
5677,
3247,
2871,
823,
4664,
9657,
4285,
6464,
7104,
6338,
9665,
10436,
8007,
1480,
2895,
3919,
597,
3285,
10327,
10200,
2269,
54... | Test |
6,323 | 4 | Canadian_Cyber_Incident_Response_Centre:canadian cyber incident response centre canadian cyber incident response centre ccirc ccric government canada program responsible monitoring threats coordinating national response cyber security incident focus protection national critical infrastructure cyber incidents housed within ministry public safety ccirc works within public safety canada partnership municipalities territories provinces private sector organizations international counterparts also coordinates national response serious cyber security incident | [
9833,
4435,
612,
2558
] | Test |
6,324 | 4 | Copy-evident_document:copy-evident document copy-evident documents features make detectable copy original security printing various methods void pantograph used create patterns hard copy exactly copied inexactly produces easily detectable image include halftone screens affected copying process fine line patterns different directions differently affected copying hence produce mark metallic inks causing diffraction reflection copy-evident computer image files also possible example embedding high-frequency pattern jpeg image imperceptible produces obvious message re-compressed different quality factor forms paper watermarking digital watermarking regarded copy-evidence although detecting document file copied typically requires special inspection tools software example 3d printed objects equipped marks genuinity identified using measurement device hard deduce sample objects copies lack marks | [
4617,
4882,
10163
] | Validation |
6,325 | 2 | System_Generation_(OS):system generation os system generation sysgen two-stage process installing updating os/360 os/vs1 os/vs2 svs os/vs2 mvs chargeable systems derived similar processes e.g. dos/360 article cover also details changed releases os/360 many details carry later systems several reasons ibm provided system generation process rather simply providing mechanism restore system tape disk system/360 self-identifying i/o devices customer could request installation i/o devices arbitrary addresses result ibm provide mechanism customer define i/o configuration os/360 also os/360 supported several different options ibm needed way customer select code appropriate options needed particular installation sysgen process runs series jobs control operating system new installations ibm provides complete pre-configured driver system intended preparing running sysgen production use prior running sysgen customer must initialize set distribution volumes restore set distribution libraries tape volumes libraries include data sysgen process copy target libraries input utilities used sysgen process macro definitions used sysgen process load modules sysgen process include linking load modules target libraries stage 1 compilation sequence assembler macro instructions describing configuration installed updated assembler actually compile object code instead compiles series punch pseudo-ops order generate job stream stage 2 ibm changed nomenclature os/360 options also changed sysgen macro definitions use newer names options type keyword ctrlprog macro stage 1 input specifies type control program release 13 old terms sss mss mps replaced pcp mft mvt later m65mp type variation mvt scheduler macro stage 1 input specifies type scheduler release 13 still used values sequential priority subsequently replaced values used type keyword ctrlprog macro types generate macro sysgen input several types mvt either type=mvt type=m65mp tso tsogen macro plays role generate either macros analyzes options specified previous macro calls punches stage 2 job stream stage 2 jobstream uses variety utilities including assembler linkage editor process obsolete initially replaced use smp/e iocp mvscp later smp/e hardware configuration definition hcd | [
10883,
6148,
9355,
10508,
7053,
9619,
8213,
11673,
6557,
3359,
10273,
6442,
7983,
9139,
573,
1219,
964,
6342,
8136,
477,
863,
3938,
5603,
868,
3429,
5220,
9829,
5363,
375,
2168,
3323,
2172,
2813
] | Test |
6,326 | 4 | Vupen:vupen vupen security french information security company founded 2004 based montpellier u.s. branch based annapolis maryland specialty discovering zero-day vulnerabilities software major vendors order sell law enforcement intelligence agencies use achieve defensive offensive cyber-operations vupen ceased trading 2015 founders created new company zerodium 2011 2012 2013 2014 vupen first prize hacking contest pwn2own notably 2012 exploiting bug google chrome decision reveal details vulnerability google rather sell controversial unlike 2012 pwn2own 2014 vupen decided reveal affected vendors including google exploits technical details regarding discovered vulnerabilities led release various security updates adobe microsoft apple mozilla google address reported flaws according french registrar companies vupen earned net profit €1,283,000 2014 years ago vupen still providing information vulnerabilities software free decided earn money services software companies chance said vupen-founder chaouki bekrar according article late 15 september 2013 revealed nsa client vupen subscription exploit service 9 november 2014 german magazine der spiegel reported german information security agency bsi tasked protection federal government networks also client vupen 22 july 2015 revealed vupen provided exploits hacking team 2010 2011 5 may 2015 vupen headquarters filed documents ceasing operations 23 july 2015 vupen founders launched new us cybersecurity company named zerodium different business model acquires exclusive zero-day discoveries independent researchers reports along protective measures security recommendations corporate government clients | [
5024,
5636,
3944,
4813,
9424,
9082,
4956,
5373
] | None |
6,327 | 7 | Green_House_Data:green house data green house data data center managed services provider headquartered cheyenne wyoming united states cheyenne home campus 45,000 square feet data center space well administrative technical support offices company additional data center locations washington colorado oregon georgia texas new jersey new york sales marketing offices laramie denver colorado 2019 company also operates consulting focused office toronto ontario 2007 three friends hatched idea data center powered exclusively renewable energy coffee soon began process retrofitting former office building provision 3000 square feet colocation space march 2012 green house data doubled footprint cheyenne location added cloud hosting products expanded footprint west coast december 2013 east coast expansion announced august 2013 company broken ground new facility cheyenne second cheyenne location officially opened july 30 2014 september 2014 1547 critical systems realty green house data announced company would anchor tenant redevelopment 1 ramland road orangeburg new york april 2015 company acquired fibercloud seattle washington based provider colocation cloud hosting data center services acquisition green house data added three data centers washington state well nearly 20 employees several hundred customers april 2017 company acquired cirracore cloud-focused infrastructure provider based atlanta georgia november 2017 company acquired ajubeo cloud hosting service provider based denver green house data announced merger via acquisition infront consulting group may 2018 expanding operations toronto las vegas well satellite sites adding 30 consulting staff focusing microsoft azure cloud automation consulting company part new surge data center construction cheyenne region across rocky mountains cheyenne ranked top 5 location data centers microsoft echostar national center atmospheric research operating facilities city addition green house data facility orangeburg represents entry rockland county market beginning emerge new data center cluster home facilities operated bloomberg l.p. verizon everett bellingham washington represent markets i-5 corridor historically underserved whole data center industry highly criticized heavy electrical use recent years actively tried reduce power consumption improving facility design increasing server virtualization key element business model green house data purchases renewable energy credits recs wind power documents purchases epa green power partnership 2013 green house data part epa leadership club sustainable power purchases common measure data center power consumption power usage effectiveness often abbreviated pue beginning 2014 green house data first company participate wyorecs first renewable energy credit program based wyoming april 2015 green house data joined epa top 30 tech telecom list largest green power users retiring 8 million kilowatt-hours kwh green power annually 2017 company moved 5 places list retiring 20,270,000 kwhs npr things considered called green house data energy efficiency obsession july 2011 company cloud colocation facilities achieved ssae 16 type ii compliance additionally 2012 green house data achieved hipaa compliance green house data operates total seven data center facilities five geographic regions cloud colocation data centers atlanta ga cheyenne wy seattle wa bellingham wa cloud data centers dallas tx denver co orangeburg ny location carrier neutral fully compliant hipaa ssae 16 type ii standards comes guaranteed uptime service level agreements march 2016 company announced hear human technical support service guarantee fortune called characteristic boutique cloud seattle facility located within westin building 3rd largest carrier hotel united states westin building data center consists 18th 19th 32nd floors participation seattle internet exchange green house data became one select group azure expert msps independently certified audit demonstrates exceptional proficiency abilities within microsoft azure ecosystem april 2019 late 2017 green house data acquired assuritive disaster recovery service provider november 2017 green house data acquired ajubeo denver-based cloud hosting service provider bringing company total cloud node locations ten earlier year green house data acquired cirracore atlanta-based provider enterprise cloud services expanding company reach southeast united states green house data acquired fibercloud west coast data center company april 2015 gaining three washington facilities seattle everett bellingham february 2015 green house data recognized top 500 msp crn magazine second consecutive year october 2014 green house data recognized top 100 cloud services provider talkin cloud making list second consecutive time february 2014 green house data recognized top 500 managed service provider crn magazine 2014 green house data became first b corp wyoming green house data cto cortney thompson interviewed part marketplace radio piece wyoming public media covering government departments moving cloud services data centers august 2014 state wyoming announced first anchor tenant green house data second cheyenne facility | [
4194,
8471,
1935
] | None |
6,328 | 8 | Java_Web_Services_Development_Pack:java web services development pack java web services development pack jwsdp free software development kit sdk developing web services web applications java applications newest technologies java oracle replaced jwsdp glassfish components jwsdp part glassfish wsit several java se 6 mustang source available open source initiative-approved cddl license components apis available jwsdp 1.6 starting jwsdp 1.6 jax-rpc jax-ws implementations support fast infoset standard binary encoding xml infoset earlier versions jwsdp also included many java implementations web services xml processors support java standards support standards non-standard features related technologies include | [
11105,
4740,
10020,
10526,
1128,
5677,
4688,
3954,
1851,
7261,
6334,
4959
] | Validation |
6,329 | 2 | VERSAdos:versados versados operating system dating back early 1980s use motorola 68000 development system called exormacs featured versabus array option cards typically connected cdc phoenix disk drives running one four 14-inch platters exormacs used emulate 680xx processor in-circuit speeding development 680xx based systems also hosted several compilers assemblers versados exormacs produced motorola microsystems division versados real-time multi-user operating system follow product single user mdos ran 6800 development system called exorciser systems features harness cpu socket compatible connector modula 2 compiler ported versados following list commands utilities supported versados | [
2179,
10499,
10883,
394,
1147,
1804,
3978,
6797,
273,
7057,
6675,
7187,
11539,
9366,
11667,
6296,
25,
8729,
10776,
8092,
4637,
6558,
7325,
9887,
10016,
9762,
421,
5158,
10235,
2345,
6187,
7983,
3248,
7217,
11184,
6837,
823,
9784,
4409,
10... | Test |
6,330 | 5 | Acct_(protocol):acct protocol acct uri scheme proposed internet standard published internet engineering task force defined purpose scheme identify rather interact user accounts hosted service provider scheme differs dns name specifies service provider acct uri intended single uri scheme would return information person possibly thing holds account given domain | [
10242,
5251,
3218,
11674,
10269,
35,
6319,
53,
10938,
4797,
7364,
2887,
9167,
10452,
2901,
119,
479,
6629,
10341,
10727,
11112,
5482,
9834,
3052,
11509,
3191,
6651
] | None |
6,331 | 7 | LOCKSS:lockss lockss lots copies keep stuff safe project auspices stanford university peer-to-peer network develops supports open source system allowing libraries collect preserve provide readers access material published web main goal digital preservation system attempts replicate way libraries material published paper originally designed scholarly journals also used range materials examples include solinet project preserve theses dissertations eight universities us government documents metaarchive cooperative program preserving at-risk digital archival collections including electronic theses dissertations etds newspapers photograph collections audio-visual collections similar project called clockss controlled lockss tax-exempt 501 c 3 not-for-profit organization governed board directors made librarians publishers clockss runs lockss technology rutgers university libraries webpage comparing lockss clockss portico traditionally academic libraries retained issues scholarly journals either individually collaboratively providing readers access content received even publisher ceased subscription canceled digital age libraries often subscribe journals available digitally internet although convenient patron access model digital subscriptions allow libraries retain copy journal publisher ceases publish library cancels subscription publisher website day content paid longer available lockss system allows library permission publisher collect preserve disseminate patrons copy materials subscribed well open access material perhaps published creative commons license library system collects copy using specialized web crawler verifies publisher granted suitable permission system format-agnostic collecting whatever formats publisher delivers via http libraries collected material cooperate peer-to-peer network ensure preservation peers network vote cryptographic hash functions preserved content nonce peer outvoted regards copy damaged repairs publisher peers lockss license used publishers allows library readers access copy allow similar access libraries unaffiliated readers system support file sharing request library may supply another library content effect repair requesting library proved past good copy voting majority reader browser longer supports format copy collected format migration process convert current format limits use may made preserved copies copyright material effective persuading copyright owners grant necessary permission lockss approach selective collection permission publisher distributed storage restricted dissemination contrasts example internet archive approach omnivorous collection without permission publisher centralized storage unrestricted dissemination lockss system far smaller preserve subscription materials internet archive access since library administers lockss peer maintains copy preserved material since libraries worldwide see list participating libraries system provides much higher degree replication usual fault-tolerant system voting process makes use high degree replication eliminate need backups off-line media provide robust defenses attacks aimed corrupting preserved content addition preserving access libraries traditionally made difficult rewrite suppress printed material existence indeterminate large number identical copies somewhat tamper-resistant medium many independent administrations meant attempts alter remove copies published work would likely fail detected web publishing based single copy single administration provides none safeguards subversion web publishing therefore amenable tool rewriting history preserving many copies diverse administration automatically auditing copies intervals future publisher copy alerting libraries changes detected lockss system attempts restore many safeguards digital world publication prior implementing lockss system questions need considered carefully order make sure content verified evaluated auditable users user must ask questions procedures methods system evaluated disaster preparedness program questions enable user evaluate system create successful maintenance plan materials enable system reinforced carefully evaluated support structure source code entire lockss system carries bsd-style open-source licenses available github lockss trademark stanford university | [
8640,
3366,
9079,
113,
11221,
7575,
1049,
8671
] | Validation |
6,332 | 9 | Type_variable:type variable type theory programming languages type variable mathematical variable ranging types even programming languages allow mutable variables type variable remains abstraction sense correspond memory locations programming languages support parametric polymorphism make use universally quantified type variables languages support existential types make use existentially quantified type variables example following ocaml code defines polymorphic identity function universally quantified type printed interpreter second line mathematical notation type function codice_1 formula_1 formula_2 type variable | [
5585,
5885,
8262
] | None |
6,333 | 2 | MirOS_BSD:miros bsd miros bsd originally called mirbsd discontinued free open source operating system started fork openbsd 3.1 august 2002 intended maintain security openbsd better support european localisation since also incorporated code free bsd descendants including netbsd microbsd freebsd code miros bsd also incorporated ekkobsd ekkobsd ceased exist artwork code developers ended working miros bsd unlike three major bsd distributions miros bsd supports x86 sparc architectures one project goals able port miros userland run linux kernel hence deprecation mirbsd name favour miros web page os project active 2019 last update os years ago e.g font released miros bsd originated openbsd-current-mirabilos openbsd patchkit soon grew differences opinion openbsd project leader theo de raadt thorsten glaser despite forking miros bsd synchronised ongoing development openbsd thus inheriting good security history well netbsd bsd flavours one goal provide faster integration cycle new features software openbsd according developers controversial decisions often made differently openbsd instance wo n't support smp miros also tolerant software inclusion policy end result hopefully refined bsd experience another goal miros bsd create modular base bsd system similar debian miros linux linux kernel bsd userland discussed developers sometime 2004 materialised important differences openbsd aside cooperating bsds submitting patches upstream software authors synergy effects freewrt active cooperation grml inclusion technical areas projects debian also fed mirsoftware mirports derivative openbsd ports tree developed benny siegert mirports use package tools openbsd written perl continues maintain previous c-based tools new features in-place package upgrades installing mirports instance non-root user unlike openbsd ports mirports tied specific os versions even stable releases using newest version recommended mirlibtool modified version gnu libtool 1.5 installed mirports build shared libraries portable way multiple platforms supported box following miros bsd policy faster software availability user many ports removed political reasons openbsd e.g djb software flash plugin kept mirports continue used mirports intended place unofficial rejected openbsd ports | [
7552,
8582,
5397,
8725,
2861,
11565,
7983,
11442,
823,
7483,
6333,
10817,
9671,
5067,
11481,
5596,
9320,
499,
5363,
1399,
11129,
2811,
2045,
1150
] | None |
6,334 | 9 | Java_Architecture_for_XML_Binding:java architecture xml binding java architecture xml binding jaxb software framework allows java developers map java classes xml representations jaxb provides two main features ability marshal java objects xml inverse i.e unmarshal xml back java objects words jaxb allows storing retrieving data memory xml format without need implement specific set xml loading saving routines program class structure similar codice_1 codice_2 .net framework jaxb particularly useful specification complex changing case regularly changing xml schema definitions keep synchronised java definitions time consuming error-prone jaxb part java se platform one apis java ee platform part java web services development pack jwsdp also one foundations wsit java 11 jaxb removed java se platform moved jakarta ee project details see jep 320 jaxb 1.0 developed java community process jsr 31 2006 jaxb 2.0 released jsr 222 maintenance release 2 released december 2009 reference implementations specifications available cddl open source license java.net tool xjc used convert xml schema schema file types java 1.6 relax ng xml dtd wsdl supported experimentally class representations classes marked using annotations javax.xml.bind.annotation namespace example xmlrootelement xmlelement xml list sequences represented attributes type java.util.list marshallers unmarshallers created instance jaxbcontext addition jaxb includes schemagen tool essentially perform inverse xjc creating xml schema set annotated classes table lists mappings xml schema xsd data types java data types jaxb | [
9988,
8070,
3341,
3853,
10526,
10020,
5677,
6067,
6328,
2106,
3517,
3518,
11582,
3008,
1095,
3278,
3920,
10193,
4959,
479,
4960,
3558,
1128,
3560,
9834,
3954,
3966,
3573,
2556,
3710
] | None |
6,335 | 9 | Sigil_(computer_programming):sigil computer programming computer programming sigil symbol affixed variable name showing variable datatype scope usually prefix codice_1 codice_2 sigil sigil latin sigillum meaning little sign means sign image supposedly magical power 1999 philip gwyn adopted term mean funny character front perl variable use sigils popularized basic programming language best known example sigil basic dollar sign codice_2 appended names strings many basic dialects use sigils like codice_4 denote integers floating point numbers precision sometimes types well larry wall adopted shell scripting use sigils perl programming language perl sigils specify fine-grained data-types like strings integers general categories scalars using prefixed codice_2 arrays using codice_6 hashes using codice_4 subroutines using codice_8 perl 6 introduces secondary sigils twigils indicate scope variables prominent examples twigils perl 6 include codice_9 used self-declared formal parameters placeholder variables codice_10 used object attribute accessors i.e. instance variables clips scalar variables prefixed codice_11 sigil multifield i.e 1-level list variables prefixed codice_12 common lisp special variables dynamic scope typically surrounded codice_13 dubbed “ earmuff convention ” convention enforced language adopts practice e.g. *standard-output* similarly programmers surround constants codice_14 cycl variables prefixed codice_11 sigil similarly constant names prefixed codice_16 pronounced hash-dollar elixir string sigils provided via codice_17 symbol mapper aka bis named variables prefixed suffixed strings character values require quotes mirc script identifiers codice_2 sigil variables codice_4 prefixed regardless local global variables data type binary variables prefixed codice_8 mumps programming language codice_2 precedes intrinsic function names 'special variable names built-in variables accessing execution state codice_22 precedes non-standard intrinsic function names codice_23 precedes extrinsic function names routines used procedures subroutines functions global variables database storage prefixed caret last global variable subtree may referenced indirectly caret last subscript referred naked reference system-wide routines global variables stored certain shared database prefixed referred percent routines percent globals objective-c string literals preceded codice_6 instances object type codice_25 since clang v3.1 llvm v4.0 codice_26 codice_27 codice_28 prefix-codice_6 also used keywords codice_30 codice_31 codice_32 express structure class definitions within class declarations definitions well prefix codice_33 used indicate member methods variables prefix codice_14 indicates class elements php language largely inspired perl codice_2 precedes variable name names prefixed considered constants functions class names interface trait names share namespace classes pilot uses codice_2 buffers string variables codice_37 integer variables codice_13 program labels python uses codice_6 prefix denote decorator ruby ordinary variables lack sigils codice_2 prefixed global variables codice_6 prefixed instance variables codice_42 prefixed class variables ruby also uses strictly conventional suffix sigils codice_11 indicates predicate method returning usually boolean value codice_44 indicates method may potentially unexpected effect needs handled care scheme convention names procedures always return boolean value usually end codice_11 likewise names procedures store values parts previously allocated scheme objects pairs vectors strings usually end codice_44 standard ml uses prefix sigil codice_47 variable refers type sigil doubled refers type equality defined codice_47 character may also appear within end variable case special meaning transact-sql codice_6 precedes local variable parameter name system variables known global variables distinguished codice_42 prefix windows powershell partly inspired unix shells perl variable names prefixed codice_2 sigil xslt variables parameters leading codice_2 sigil use although defined codice_53 codice_54 codice_55 attribute sigil included related xslt xquery uses codice_2 sigil form definition use mel variable names prefixed codice_2 distinguish functions commands identifiers unix shell scripting utilities makefiles codice_2 unary operator translates name variable contents may seem similar sigil properly unary operator lexical indirection similar codice_13 dereference operator pointers c noticeable fact dollar sign omitted assigning variable fortran sigils used variables starting letters j k l n integers default fortran documentation refers implicit typing though explicit typing always available allow variable declared type choice range i–n conforms traditional mathematical naming conventions various programming languages including prolog haskell ruby go treat identifiers beginning capital letter differently identifiers beginning small letter practice related use sigils actually form stropping use many languages microsoft ’ .net common language infrastructure cli requires way use variables different language may keywords calling language sometimes done prefixes c variable names may prefixed codice_6 mainly used allow use variable names would otherwise conflict keywords achieved vb.net enclosing name square brackets codice_61 codice_6 prefix also applied string literals see literal affixes related sigils hungarian notation convention variable-naming specifies variable type attaching certain alphabetic prefixes variable name unlike sigils however hungarian notation provides information compiler explicit types must redundantly specified variables unless using language type inference standard compilers enforce use prefixes permits omission also makes code prone confusion due accidental erroneous use sigils applied names identifiers similar prefixes suffixes applied literals notably integer literals string literals specifying either literal evaluated data type example codice_63 evaluates value 16 unsigned long long integer c++ codice_64 prefix indicates hexadecimal suffix codice_65 indicates unsigned long long similarly prefixes often used indicate raw string codice_66 python represents string value codice_67 escaped string would written codice_68 affects semantics value literal rather syntax semantics identifier name neither stropping identifier syntax sigil identifier semantics syntactically similar compare java annotations override deprecated cases syntax used distinct purposes cause confusion example c codice_6 prefix used either stropping allow reserved words used identifiers prefix literal indicate raw string case neither use sigil affects syntax identifiers semantics literals semantics identifiers | [
1152,
5760,
5635,
8582,
2062,
655,
9103,
5521,
10510,
10387,
1435,
9245,
8990,
3876,
7076,
6313,
11442,
1973,
6847,
6596,
8644,
5961,
11610,
10075,
10083,
8421,
10470,
8554,
8556,
2029,
3573,
502,
6775,
2936,
2556,
2045
] | Test |
6,336 | 0 | Katz's_back-off_model:katz back-off model katz back-off generative n -gram language model estimates conditional probability word given history n -gram accomplishes estimation backing progressively shorter history models certain conditions model reliable information given history used provide better results model introduced 1987 slava m. katz prior n-gram language models constructed training individual models different n-gram orders using maximum likelihood estimation interpolating together equation katz back-off model essentially means n -gram seen k times training conditional probability word given history proportional maximum likelihood estimate n -gram otherwise conditional probability equal back-off conditional probability n − 1 -gram difficult part determining values k α formula_2 least important parameters usually chosen 0 however empirical testing may find better values k. formula_3 typically amount discounting found good–turing estimation words good–turing estimates formula_4 formula_5 formula_6 compute formula_7 useful first define quantity β left-over probability mass n − 1 -gram back-off weight α computed follows formula applies data n − 1 -gram algorithm skips n-1 entirely uses katz estimate n-2 n-gram data found model generally works well practice fails circumstances example suppose bigram b unigram c common trigram b c never seen since b c common may significant due chance b c never seen perhaps allowed rules grammar instead assigning appropriate value 0 method back bigram estimate p c b may high | [
1044,
10557,
3998
] | Train |
6,337 | 4 | High_Assurance_Guard:high assurance guard high assurance guard hag multilevel security computer device used communicate different security domains niprnet siprnet hag one example controlled interface security levels hags approved common criteria process hag runs multiple virtual machines physical machines one subsystems lower classification one subsystems higher classification hardware runs type knowledge management software examines data coming higher classification subsystem rejects data classified higher lower classification general hag allows lower classified data resides higher classified system moved another lower classified system example us would allow unclassified information residing secret classified system moved another unclassified system various rules filters hag ensures data lower classification allows transfer application layer hag runs evaluated mandatory integrity policy provides sensitive files data applications protection inadvertent disclosure operating system level hag must multi-level kernel ensures sensitive information processes devices stored running system different sensitivity levels intermingle violation system mandatory security model systems certified via common criteria depending classification system may require common criteria evaluated assurance level eal 3 higher examples us evaluation eal 5 eal 5+ eal 5 augmented higher required export secret domain unclassified domain manufacturers may use trusted computer system trusted applications high assurance equivalent term hag hag mostly used email dms environments certain organizations may unclassified network access need send message organization secret network access hag provides ability | [
10170,
8904,
11470,
2426,
3930,
6110
] | None |
6,338 | 8 | NetBeans:netbeans netbeans integrated development environment ide java netbeans allows applications developed set modular software components called modules netbeans runs windows macos linux solaris addition java development extensions languages like php c c++ html5 javascript applications based netbeans including netbeans ide extended third party developers netbeans began 1996 xelfi word play delphi java ide student project guidance faculty mathematics physics charles university prague 1997 roman staněk formed company around project produced commercial versions netbeans ide bought sun microsystems 1999 sun open-sourced netbeans ide june following year since netbeans community continued grow 2010 sun thus netbeans acquired oracle corporation oracle netbeans competed jdeveloper freeware ide historically product company september 2016 oracle submitted proposal donate netbeans project apache software foundation stating opening netbeans governance model give netbeans constituents greater voice project direction future success upcoming release java 9 netbeans 9 beyond move endorsed java creator james gosling project entered apache incubator october 2016 netbeans ide releases netbeans ide 6.0 introduced support developing ide modules rich client applications based netbeans platform java swing gui builder formerly known project matisse improved cvs support weblogic 9 jboss 4 support many editor enhancements netbeans 6 available official repositories major linux distributions netbeans ide 6.5 released november 2008 extended existing java ee features including java persistence support ejb 3 jax-ws additionally netbeans enterprise pack supports development java ee 5 enterprise applications including soa visual design tools xml schema tools web services orchestration bpel uml modeling netbeans ide bundle c/c++ supports c/c++ fortran development netbeans ide 6.8 first ide provide complete support java ee 6 glassfish enterprise server v3 developers hosting open-source projects kenai.com additionally benefit instant messaging issue tracking integration navigation right ide support web application development php 5.3 symfony framework improved code completion layouts hints navigation javafx projects netbeans ide 6.9 released june 2010 added support osgi spring framework 3.0 java ee dependency injection jsr-299 zend framework php easier code navigation overridden/implemented annotations formatting hints refactoring across several languages netbeans ide 7.0 released april 2011 august 1 2011 netbeans team released netbeans ide 7.0.1 full support official release java se 7 platform netbeans ide 7.3 released february 2013 added support html5 web technologies netbeans ide 7.4 released 15 october 2013 netbeans ide 8.0 released 18 march 2014 netbeans ide 8.1 released 4 november 2015 netbeans ide 8.2 released 3 october 2016 netbeans 9.0 adds support java 9 10 released 29 july 2018 apache incubator project netbeans 10.0 released 27 december 2018 brings support java 11 improved support php 7.0–7.3 netbeans 11.0 released 4 april 2019 netbeans 11.1 released 22 july 2019 netbeans platform framework simplifying development java swing desktop applications netbeans ide bundle java se contains needed start developing netbeans plugins netbeans platform based applications additional sdk required applications install modules dynamically application include update center module allow users application download digitally signed upgrades new features directly running application reinstalling upgrade new release force users download entire application platform offers reusable services common desktop applications allowing developers focus logic specific application among features platform showcase applications developed top netbeans platform available https //netbeans.org/features/platform/showcase.html netbeans ide open-source integrated development environment netbeans ide supports development java application types java se including javafx java web ejb mobile applications box among features ant-based project system maven support refactorings version control supporting cvs subversion git mercurial clearcase modularity functions ide provided modules module provides well-defined function support java language editing support cvs versioning system svn netbeans contains modules needed java development single download allowing user start working immediately modules also allow netbeans extended new features support programming languages added installing additional modules instance sun studio sun java studio enterprise sun java studio creator sun microsystems based netbeans ide license ide licensed apache license 2.0 previously july 2006 2007 netbeans ide licensed sun common development distribution license cddl license based mozilla public license mpl october 2007 sun announced netbeans would henceforth offered dual license cddl gpl version 2 licenses gpl linking exception gnu classpath oracle donated netbeans platform ide apache foundation underwent incubation graduated top level project april 2019 october 2016 interview gabriela motroc oracle vice president bill pataky stated oracle number products depend netbeans 2018 netbeans still apache incubator alternative netbeans distribution called coolbeans independently launched coolbeans offered installer windows native application macos included java development kit native modules system notifications well java enterprise modules modules part netbeans ide netbeans profiler tool monitoring java applications helps developers find memory leaks optimize speed formerly downloaded separately integrated core ide since version 6.0 profiler based sun laboratories research project named jfluid research uncovered specific techniques used lower overhead profiling java application one techniques dynamic bytecode instrumentation particularly useful profiling large java applications using dynamic bytecode instrumentation additional algorithms netbeans profiler able obtain runtime information applications large complex profilers netbeans also support profiling points let profile precise points execution measure execution time formerly known project matisse gui design-tool enables developers prototype design swing guis dragging positioning gui components gui builder built-in support jsr 295 beans binding technology support jsr 296 swing application framework removed 7.1 netbeans javascript editor provides extended support javascript ajax css javascript editor features comprise syntax highlighting refactoring code completion native objects functions generation javascript class skeletons generation ajax callbacks template automatic browser compatibility checks css editor features comprise code completion styles names quick navigation navigator panel displaying css rule declaration list view file structure tree view sorting outline view name type declaration order list tree creating rule declarations tree refactoring part rule name tree netbeans 7.4 later uses new nashorn javascript engine developed oracle users choose download netbeans ide bundles tailored specific development needs users also download install features later date directly netbeans ide netbeans ide bundle web java ee provides complete tools latest java ee 6 standards including new java ee 6 web profile enterprise java beans ejbs servlets java persistence api web services annotations netbeans also supports jsf 2.0 facelets javaserver pages jsp hibernate spring struts frameworks java ee 5 j2ee 1.4 platforms includes glassfish apache tomcat features javaee includes netbeans supports php since version 6.5 bundle php includes oracle also releases version netbeans includes features bundles bundle includes official ruby support removed release 7.0 netbeans ide translated following languages community translations ide also available following languages | [
1539,
9731,
11271,
6154,
4107,
9738,
9229,
7695,
6161,
10771,
1047,
8217,
9245,
5663,
546,
10789,
11303,
2605,
5165,
5677,
564,
1594,
9789,
7742,
7233,
7750,
4171,
1101,
597,
6231,
10327,
7261,
11357,
8799,
2658,
10851,
10340,
11363,
8294,
... | None |
6,339 | 3 | Nehalem_(microarchitecture):nehalem microarchitecture nehalem codename intel processor microarchitecture released november 2008 nehalem used first generation intel core processors core i7 i5 core i3 based subsequent westmere sandy bridge designs nehalem successor older core microarchitecture intel core 2 processors intel codename nehalem taken nehalem river architecture differs radically netburst retaining latter minor features nehalem-based microprocessors use 45 nm process run higher clock speeds energy-efficient penryn microprocessors hyper-threading reintroduced along reduction l2 cache size well enlarged l3 cache shared among cores nehalem replaced sandy bridge microarchitecture released january 2011 reported nehalem focus performance thus increased core size compared penryn nehalem overclocking possible bloomfield processors x58 chipset lynnfield processors use pch removing need northbridge nehalem processors incorporate sse 4.2 simd instructions adding seven new instructions sse 4.1 set core 2 series nehalem architecture reduces atomic operation latency 50 attempt eliminate overhead atomic operations codice_1 compare-and-swap instruction successor nehalem westmere sandy bridge | [
4108,
9741,
5649,
27,
6175,
6181,
8231,
2088,
7218,
2638,
4695,
1119,
3175,
7783,
4204,
4717,
8820,
630,
4217,
1660,
8325,
7313,
8851,
6804,
11417,
9391,
4276,
2237,
5309,
6339,
5844,
3294,
1260,
5356,
5871,
3317,
5883,
5380,
5386,
5901,
... | None |
6,340 | 2 | MBRwizard:mbrwizard mbrwizard master boot record mbr management application x86 x86-64 based computers use disk imaging applications backup operating system deployment began increase well many users beginning experiment dual-booting linux existing windows machines key entries mbr often changed corrupted rendering machine unbootable mbrwizard designed allow user reverse repair unwanted destructive changes mbr effectively enabling computer boot properly originally developed 1999 internal use continually updated eventually released freeware public march 2003 initial functionality designed sort partition table entries caused effects disk imaging quickly evolved include backup recovery entire mbr repair corrupt windows mbr record well direct modification disk signature additional functionality added allow partitions activated hidden deleted later options added include disk wipe functionality shutdown/reboot machine mount/dismount windows volumes staging byte utilized maintain status reboots designed cross-platform application beginning mbrwizard noted flexible implemented natively pc operating systems addition freeware mbrwizard cli version mbrwizard suite 3.0 released 2010 commercial product featuring new graphical interface ability create custom winpe boot environments offline repair recovery | [
5356,
5612,
3250,
499,
9910,
823,
2811,
6494
] | None |
6,341 | 7 | RightNow_Technologies:rightnow technologies oracle rightnow customer relationship management crm software service enterprise organizations originally developed rightnow technologies inc. acquired oracle corporation 2011 company founded 1997 greg gianforte bozeman montana additional offices opened california new york new jersey massachusetts texas illinois washington dc colorado canada europe australia asia company employed 1000 people 2011 rightnow business model software service using cloud computing gianforte started company 1997 without external capital created software product initially focused customer service integrated knowledge base company grew added marketing sales functionality voice automation customer feedback management analytics social platform product creating full customer experience suite 2004 rightnow technologies raised 44.1m million successful ipo nasdaq exchange 2006 rightnow technologies acquired sfa company salesnet 2009 rightnow technologies acquired social networking company hivelive 2011 company acquired q-go 34 million q-go founded 1999 specialized semantic search service based natural language processing technology providing relevant answers queries company ’ internet website corporate intranet formulated natural sentences keyword input alike integrated automatic statistical reporting user query behavior businesses want monitor kinds questions customers asking adjust content provide appropriate information customers reduce load traditional customer service ports call call centers answers email technology implemented deployed range industries including banking insurance pension telecommunications logistics well several government agencies october 2011 oracle corporation announced intention acquire rightnow 1.5 billion deal completed january 2012 main product offered rightnow technologies rightnow cx customer experience suite rightnow cx divided rightnow web experience rightnow social experience rightnow contact center experience rightnow engage | [
1539,
8353,
8994,
8871,
1707,
5677,
9010,
9012,
10553,
1594,
9665,
6338,
467,
597,
6107,
1755,
2269,
1250,
4194,
7780,
10340,
7022,
8046,
8434,
1399
] | Test |
6,342 | 2 | OS/VS1:os/vs1 operating system/virtual storage 1 os/vs1 discontinued ibm mainframe computer operating system designed run ibm system/370 hardware successor multiprogramming fixed number tasks mft option system/360 operating system os/360 os/vs1 comparison predecessor supported virtual memory called virtual storage os/vs1 generally available 1970s 1980s longer supported ibm os/vs1 os/360 mft ii single virtual address space comparison os/vs2 svs os/360 mvt single virtual address space os/vs1 often installed mid-range ibm mainframe systems system/370 model 145 later system/370 model 148 os/vs1 intended manage medium-sized work load 1970s consisting batch processing applications running within fixed number operating system partitions via batch job management system job entry subsystem 1 jes1 contrast os/vs2 intended handle larger work loads consisting batch applications online interactive users using time sharing option tso combination however os/vs1 could often support interactive applications users running ibm cics transaction processing monitor job within one partitions installation modification os/vs1 accomplished via ibm cumbersome system generation sysgen process os/vs1 included replacement os/360 rje allowed submission retrieval jobs 2770 2780 3780 terminals workstation programs included os/vs1 e.g. 1130 res included remote terminal access method closer integration job management rje os/vs1 went seven product releases os/vs1 release 7 enhanced fourth release ibm os/vs1 basic programming extensions bpe product bpe provided support new 1980s hardware 3380 dasd disk last os/vs1 product release os/vs1 basic programming extensions bpe release 4 announced ibm 1983 general availability march 1984 product 5662-257 announcement letter 283-266 15 september 1983 ibm announced end functional enhancements os/vs1 1984 ibm recommended os/vs1 installations migrate mvs/370 mvs/xa assist migration mvs/xa ibm made vm/xa migration aid allowed installations run os/vs1 mvs/xa simultaneously machine guests third systemvm/xa way new mvs/xa system could tested old production os/vs1 system still use although ibm time sharing option tso required vs2 customers 370/145 370/148 time-sharing options. br one combination vm/cms time sharing guest machine running os/360 mft ii batch optional component os/360 mft ii os/360 mvt os/vs1 crje allowed user line-mode terminal edit text datasets submit jobs access job output non-ibm time-sharing product named tone tso-like vs1 vs one marketed tone software co | [
2179,
4996,
6148,
10883,
10508,
7053,
8077,
9361,
6675,
9468,
789,
5397,
9619,
11539,
11673,
9370,
6557,
3359,
10273,
421,
7848,
6442,
1323,
7983,
5936,
7217,
8879,
9139,
10803,
6325,
7477,
4535,
7733,
8502,
5562,
10040,
573,
1219,
964,
8... | Test |
6,343 | 4 | Bobby_Ray_Inman:bobby ray inman bobby ray inman born april 4 1931 retired united states navy admiral held several influential positions united states intelligence community inman born raised community rhonesboro upshur county texas eastern portion state father owner operator gas station inman attended graduated mineola high school inman recalled 1986 5 4 tall weighed upon graduation tutored athletes admired high school keep bullied inman graduated mineola high school mineola texas age 15 1946 rode bus mineola tyler junior college member phi theta kappa national honor society graduated university texas degree history age 19 according budiansky joining naval reserve korean war inman rocketed ranks naval intelligence inman served director naval intelligence september 1974 july 1976 moved defense intelligence agency served vice director 1977 next became director national security agency inman held post 1981 last major position deputy director central intelligence post held february 12 1981 june 10 1982 simultaneously acting nsa director cia deputy director early 1981 modernized collection process setting joint facility college park maryland according budiansky inman sending memos back forth approving solutions 1976 martin hellman whitfield diffie published paper new directions cryptography introducing radically new method distributing cryptographic keys went far toward solving one fundamental problems cryptography key distribution become known diffie–hellman key exchange however hellman two graduate students attempted present work october 10 1977 international symposium information theory national security agency warned would legally equivalent exporting nuclear weapons hostile foreign power inman led nsa time feared encryption – far used military purposes – would used hostile foreign powers reducing ability nsa collect signals intelligence however hellman – anticipated increasing use electronic communications private sector transactions would require encryption – proceeded give talk defied nsa threat prosecution inman eventually realised hellman point prosecution hellman inman even became friends public key cryptography forms essential component internet security inman chaired commission improving security u.s. foreign installations marine barracks bombing april 1983 us embassy bombing beirut lebanon commission report influential setting security design standards u.s. embassies retirement navy chairman chief executive officer microelectronics computer technology corporation mcc austin texas four years chairman president chief executive officer westmark systems inc. privately owned electronics industry holding company three years admiral inman also served chairman federal reserve bank dallas 1987 1990 admiral inman ’ primary activity since 1990 investing start-up technology companies managing director limestone ventures member board directors several privately held companies serves trustee american assembly california institute technology elected fellow national academy public administration president clinton nominated secretary defense withdrew nomination see inman also board saic since 2001 inman held lbj centennial chair national policy university texas austin lyndon b. johnson school public affairs 2005 2009 school interim dean inman graduated texas bachelor history 1950 inman also served board directors council foreign relations dell computer sbc corporation massey energy 2011 became head board directors xe services formerly erik prince blackwater known academi 2013 sits board directors academi inman announced president bill clinton choice succeed les aspin secretary defense december 16 1993 initially receiving broad bipartisan support accepted post first withdrew nomination press conference january 18 1994 press conference inman made angry remarks comments new york times columnist william safire safire wrote paragraphs inman anti-israel bias shown ended four-point list negative qualifications reply inman suggested safire recruited senator bob dole kansas engage vitriolic attack inman also claimed dole senator trent lott planning turn heat nomination dole reaction state idea gotten bobby inman ... admiral inman letter n't make sense lott appeared even surprised saying floored inman bizarre press conference unnamed white house aide added us glued tube mouths open shock 1994 bobby ray inman requested withdrawn consideration defense secretary critics speculated decision motivated desire conceal links international signal control isc inman member board directors company allegedly either negligent approved illegal exports originally called esi electronic systems international company manufactured sub-assemblies agm-45 shrike rim-7 sea sparrow missiles 1974 vietnam war part standard arms contract us defense administration dcas company also commercial repair facility two meter portable amateur ham radios company new jersey called clegg manufactured communications helmet radios firemen electronic outdoor bug zappers isc involved two major indiscretions ceo james guerin received 15-year prison sentence 1984 1988 isc sent south africa 30 million military-related equipment including telemetry tracking antennae collect data missiles flight gyroscopes guidance systems photo-imaging film readers would form backbone medium-range missile system technology reportedly transferred iraq another link iraq supply specifications mk 20 rockeye ii cluster bomb chilean defense company cardoen industries able build almost identical weapon subsequently used coalition forces persian gulf war january–february 1991 2006 inman criticized bush administration use warrantless domestic wiretaps making one highest-ranking former intelligence officials criticize program public | [
6017,
1400,
8726,
2712,
1189,
3629,
1838,
9517,
5308,
1986,
11335,
6344,
588,
7119,
7759,
2897,
3154,
7887,
8276,
7893,
991,
7137,
3941,
3305,
7145,
4719,
2419,
6005,
6136,
766
] | Validation |
6,344 | 4 | PRISM_(surveillance_program):prism surveillance program prism code name program united states national security agency nsa collects internet communications various u.s. internet companies program also known sigad prism collects stored internet communications based demands made internet companies google llc section 702 fisa amendments act 2008 turn data match court-approved search terms nsa use prism requests target communications encrypted traveled across internet backbone focus stored data telecommunication filtering systems discarded earlier get data easier handle among things prism began 2007 wake passage protect america act bush administration program operated supervision u.s. foreign intelligence surveillance court fisa court fisc pursuant foreign intelligence surveillance act fisa existence leaked six years later nsa contractor edward snowden warned extent mass data collection far greater public knew included characterized dangerous criminal activities disclosures published guardian washington post june 6 2013 subsequent documents demonstrated financial arrangement nsa special source operations division sso prism partners millions dollars documents indicate prism number one source raw intelligence used nsa analytic reports accounts 91 nsa internet traffic acquired fisa section 702 authority leaked information came light one day revelation fisa court ordering subsidiary telecommunications company verizon communications turn nsa logs tracking customers telephone calls u.s. government officials disputed aspects guardian washington post stories defended program asserting used domestic targets without warrant helped prevent acts terrorism receives independent oversight federal government executive judicial legislative branches june 19 2013 u.s. president barack obama visit germany stated nsa data gathering practices constitute circumscribed narrow system directed us able protect people prism publicly revealed classified documents program leaked journalists washington post guardian edward snowden time nsa contractor visit hong kong leaked documents included 41 powerpoint slides four published news articles documents identified several technology companies participants prism program including microsoft 2007 yahoo 2008 google 2009 facebook 2009 paltalk 2009 youtube 2010 aol 2011 skype 2011 apple 2012 speaker notes briefing document reviewed washington post indicated 98 percent prism production based yahoo google microsoft slide presentation stated much world electronic communications pass u.s. electronic communications data tend follow least expensive route rather physically direct route bulk world internet infrastructure based united states presentation noted facts provide united states intelligence analysts opportunities intercepting communications foreign targets electronic data pass united states snowden subsequent disclosures included statements government agencies united kingdom gchq also undertook mass interception tracking internet communications data described germany nightmarish true allegations nsa engaged dangerous criminal activity hacking civilian infrastructure networks countries universities hospitals private businesses alleged compliance offered limited restrictive effect mass data collection practices including americans since restrictions policy-based technically based change time adding additionally audits cursory incomplete easily fooled fake justifications numerous self-granted exceptions nsa policies encourage staff assume benefit doubt cases uncertainty number slides released edward snowden showing operation processes behind prism program faa referred section 702 fisa amendments act faa federal aviation administration widely known faa initialism french newspaper le monde disclosed new prism slides see page 4 7 8 coming prism/us-984xn overview presentation october 21 2013 british newspaper guardian disclosed new prism slides see pages 3 6 november 2013 one hand compares prism upstream program hand deals collaboration nsa threat operations center fbi wikimedia commons keeps copies leaked powerpoint slides along associated documents prism program special source operations sso division nsa tradition nsa intelligence alliances cooperates many 100 trusted u.s. companies since 1970s prior program terrorist surveillance program implemented wake september 11 attacks george w. bush administration widely criticized challenged illegal include warrants obtained foreign intelligence surveillance court prism authorized foreign intelligence surveillance court prism enabled president bush protect america act 2007 fisa amendments act 2008 immunizes private companies legal action cooperate u.s. government agencies intelligence collection 2012 act renewed congress president obama additional five years december 2017 according register fisa amendments act 2008 specifically authorizes intelligence agencies monitor phone email communications u.s. citizens week without obtaining warrant one parties outside u.s detailed description prism program found report nsa collection efforts section 702 faa released privacy civil liberties oversight board pclob july 2 2014 according report prism used collect internet communications telephone conversations internet communications collected bulk targeted way communications specific selectors like e-mail addresses gathered prism collection based upon keywords names actual collection process done data intercept technology unit ditu fbi behalf nsa sends selectors u.s. internet service providers previously served section 702 directive directive provider legally obliged hand ditu communications selectors provided government ditu sends communications nsa stored various databases depending type data content metadata already collected prism program may searched us non-us person identifiers kinds queries became known back-door searches conducted nsa fbi cia agencies slightly different protocols safeguards protect searches us person identifier internal nsa presentation slides included various media disclosures show nsa could unilaterally access data perform extensive in-depth surveillance live communications stored information examples including email video voice chat videos photos voice-over-ip chats skype file transfers social networking details snowden summarized general reality nsa fbi cia dia etc analyst access query raw sigint signals intelligence databases enter get results anything want according washington post intelligence analysts search prism data using terms intended identify suspicious communications targets analysts suspect least 51 percent confidence u.s. citizens process communication data u.s. citizens also collected unintentionally training materials analysts tell periodically report accidental collection non-foreign u.s. data nothing worry according guardian nsa access chats emails hotmail.com skype microsoft developed surveillance capability deal interception chats prism collection microsoft email services unaffected prism collects data prior encryption also according guardian glenn greenwald even low-level nsa analysts allowed search listen communications americans people without court approval supervision greenwald said low level analysts via systems like prism listen whatever emails want whatever telephone calls browsing histories microsoft word documents done need go court need even get supervisor approval part analyst added nsa databank years collected communications allows analysts search database listen calls read emails everything nsa stored look browsing histories google search terms 've entered also alerts activity people connected email address ip address future greenwald referring context foregoing quotes nsa program x-keyscore shortly publication reports guardian washington post united states director national intelligence james clapper june 7 2013 released statement confirming nearly six years government united states using large internet services companies facebook collect information foreigners outside united states defense national security threats statement read part guardian washington post articles refer collection communications pursuant section 702 foreign intelligence surveillance act contain numerous inaccuracies went say section 702 provision fisa designed facilitate acquisition foreign intelligence information concerning non-u.s. persons located outside united states used intentionally target u.s. citizen u.s. person anyone located within united states clapper concluded statement stating unauthorized disclosure information important entirely legal program reprehensible risks important protections security americans march 12 2013 clapper told united states senate select committee intelligence nsa wittingly collect type data millions hundreds millions americans clapper later admitted statement made march 12 2013 lie words responded thought truthful least untruthful manner saying june 7 2013 u.s. president barack obama referring prism program nsa telephone calls logging program said 've got two programs originally authorized congress repeatedly authorized congress bipartisan majorities approved congress continually briefed conducted whole range safeguards involved federal judges overseeing entire program throughout also said ca n't 100 percent security also 100 percent privacy zero inconvenience know 're going make choices society separate statements senior obama administration officials mentioned name source said congress briefed 13 times programs since 2009 june 8 2013 director national intelligence clapper made additional public statement prism released fact sheet providing information program described internal government computer system used facilitate government statutorily authorized collection foreign intelligence information electronic communication service providers court supervision authorized section 702 foreign intelligence surveillance act fisa 50 u.s.c § 1881a fact sheet stated surveillance activities published guardian washington post lawful conducted authorities widely known discussed fully debated authorized congress fact sheet also stated united states government unilaterally obtain information servers u.s. electronic communication service providers information obtained fisa court approval knowledge provider based upon written directive attorney general director national intelligence said attorney general provides fisa court rulings semi-annual reports prism activities congress provid ing unprecedented degree accountability transparency democratic senators udall wyden serve u.s. senate select committee intelligence subsequently criticized fact sheet inaccurate nsa director general keith alexander acknowledged errors stating fact sheet could precisely described requirements governing collection e-mail internet content us companies fact sheet withdrawn nsa website around june 26 closed-doors senate hearing around june 11 fbi director robert mueller said snowden leaks caused significant harm nation safety senate nsa director alexander defended program alexander defense immediately criticized senators udall wyden said saw evidence nsa programs produced uniquely valuable intelligence joint statement wrote gen alexander testimony yesterday suggested nsa bulk phone records collection program helped thwart 'dozens terrorist attacks plots mentioned appear identified using collection methods june 18 nsa director alexander said open hearing house intelligence committee congress communications surveillance helped prevent 50 potential terrorist attacks worldwide least 10 involving terrorism suspects targets united states 2001 2013 prism web traffic surveillance program contributed 90 percent cases according court records one example alexander gave regarding thwarted attack al qaeda new york stock exchange fact foiled surveillance several senators wrote director national intelligence clapper asking provide examples u.s. intelligence officials speaking condition anonymity told various news outlets june 24 already seeing said evidence suspected terrorists begun changing communication practices order evade detection surveillance tools disclosed snowden contrast swift forceful reactions previous day allegations government conducting surveillance united states citizens telephone records congressional leaders initially little say prism program day leaked information program published several lawmakers declined discuss prism citing top-secret classification others said aware program statements released president director national intelligence lawmakers began comment senator john mccain r-az senator dianne feinstein d-ca chair senate intelligence committee senator rand paul r-ky senator susan collins r-me member senate intelligence committee past member homeland security committee representative jim sensenbrenner r-wi principal sponsor patriot act representative mike rogers r-mi chairman permanent select committee intelligence senator mark udall d-co representative todd rokita r-in representative luis gutierrez d-il senator ron wyden d-or following statements lawmakers parties warned national security officials hearing house judiciary committee must change use sweeping national security agency surveillance programs face losing provisions foreign intelligence surveillance act allowed agency mass collection telephone metadata section 215 expires end 2015 unless realize 've got problem going renewed rep. jim sensenbrenner r-wis. author usa patriot act threatened hearing got changed 've got change operate section 215 otherwise two half years 're going anymore leaks classified documents pointed role special court enabling government secret surveillance programs members court maintained collaborating executive branch new york times however reported july 2013 dozen classified rulings nation surveillance court created secret body law giving national security agency power amass vast collections data americans pursuing terrorism suspects also people possibly involved nuclear proliferation espionage cyberattacks members u.s. congress pressed foreign intelligence surveillance court release declassified versions secret ruling court dismissed requests arguing decisions ca n't declassified contain classified information reggie walton current fisa presiding judge said statement perception court rubber stamp absolutely false rigorous review process applications submitted executive branch spearheaded initially five judicial branch lawyers national security experts judges ensure court authorizations comport applicable statutes authorize accusation rubber stamp rejected walton wrote letter senator patrick j. leahy annual statistics provided congress attorney general ... —frequently cited press reports suggestion court approval rate application 99 —reflect number final applications submitted acted court statistics reflect fact many applications altered prior final submission even withheld final submission entirely often indication judge would approve u.s. military acknowledged blocking access parts guardian website thousands defense personnel across country blocking entire guardian website personnel stationed throughout afghanistan middle east south asia spokesman said military filtering reports content relating government surveillance programs preserve network hygiene prevent classified material appearing unclassified parts computer systems access washington post also published information classified nsa surveillance programs disclosed edward snowden blocked time blocking access guardian reported former head austrian federal office protection constitution counterterrorism gert-rené polli stated knew prism program different name stated surveillance activities occurred austria well polli publicly stated 2009 received requests us intelligence agencies things would violation austrian law polli refused allow australian government said investigate impact prism program use pine gap surveillance facility privacy australian citizens australia former foreign minister bob carr said australians n't concerned prism cybersecurity high government list concerns australian foreign minister julie bishop stated acts edward snowden treachery offered staunch defence nation intelligence co-operation united states brazil president time dilma rousseff responded snowden reports nsa spied phone calls emails cancelling planned october 2013 state visit united states demanding official apology october 20 2013 n't come also rousseff classified spying unacceptable harsh words speech un general assembly september 24 2013 result boeing lost us 4.5 billion contract fighter jets sweden saab group canada national cryptologic agency communications security establishment cse said commenting prism would undermine cse ability carry mandate privacy commissioner jennifer stoddart lamented canada standards comes protecting personal online privacy stating fallen far behind report nations data protection authorities legal power make binding orders levy hefty fines take meaningful action event serious data breaches restricted 'soft approach persuasion encouragement potential publish names transgressors public interest push comes shove stoddart wrote short costly time-consuming court battle power enforce recommendations 20 october 2013 committee european parliament backed measure enacted would require american companies seek clearance european officials complying united states warrants seeking private data legislation consideration two years vote part efforts europe shield citizens online surveillance wake revelations far-reaching spying program u.s. national security agency germany france also ongoing mutual talks keep european email traffic going across american servers october 21 2013 french foreign minister laurent fabius summoned u.s ambassador charles rivkin quai d'orsay paris protest large-scale spying french citizens u.s. national security agency nsa paris prosecutors opened preliminary inquiries nsa program july fabius said ... obviously need go must quickly assure practices n't repeated germany receive raw prism data according reuters report german chancellor angela merkel said internet new us explain nature program matthew schofield mcclatchy washington bureau said roundly mocked statement gert-rené polli former austrian counter-terrorism official said 2013 absurd unnatural german authorities pretend known anything german army using prism support operations afghanistan early 2011 october 2013 reported nsa monitored merkel cell phone united states denied report following allegations merkel called president obama told spying friends never acceptable matter situation israeli newspaper calcalist discussed business insider article possible involvement technologies two secretive israeli companies prism program—verint systems narus finding prism program mexican government started constructing spying program spy citizens according jenaro villamil writer proceso cisen mexico intelligence agency started work ibm hewlett packard develop data gathering software facebook twitter emails social network sites going priority new zealand university otago information science associate professor hank wolfe said unofficially known five eyes alliance new zealand governments including united states australia canada britain dealt internal spying saying n't partners share information edward snowden live streamed google hangout kim dotcom julian assange alleged received intelligence new zealand nsa listening posts new zealand meeting european union leaders held week 21 october 2013 mariano rajoy spain prime minister said spying activities n't proper among partner countries allies 28 october 2013 spanish government summoned american ambassador james costos address allegations u.s. collected data 60 million telephone calls spain separately íñigo méndez de vigo spanish secretary state referred need maintain necessary balance security privacy concerns said recent allegations spying proven true improper unacceptable partners friendly countries united kingdom government communications headquarters gchq also surveillance program tempora access prism program june 2010 wrote 197 reports 2012 alone intelligence security committee uk parliament reviewed reports gchq produced basis intelligence sought us found case warrant interception place accordance legal safeguards contained uk law august 2013 guardian newspaper offices visited agents gchq ordered supervised destruction hard drives containing information acquired snowden original washington post guardian articles reporting prism noted one leaked briefing documents said prism involves collection data directly servers several major internet services providers corporate executives several companies identified leaked documents told guardian knowledge prism program particular also denied making information available government scale alleged news reports statements several companies named leaked documents reported techcrunch washington post follows response technology companies confirmation nsa able directly access companies servers new york times reported sources stated nsa gathering surveillance data companies using technical means response court orders specific sets data washington post suggested possible conflict prism slides company spokesmen result imprecision part nsa author another classified report obtained post arrangement described allowing 'collection managers send content tasking instructions directly equipment installed company-controlled locations rather directly company servers n context 'direct likely mean nsa receiving data sent deliberately tech companies opposed intercepting communications 're transmitted destination companies received order fisa amendments act forbidden law disclosing received order disclosing information order mark rumold staff attorney electronic frontier foundation told abc news may 28 2013 google ordered united states district court judge susan illston comply national security letter issued fbi provide user data without warrant kurt opsahl senior staff attorney electronic frontier foundation interview venturebeat said certainly appreciate google put transparency report appears transparency n't include would n't surprised subject gag order new york times reported june 7 2013 twitter declined make easier government companies compliant according people briefed negotiations companies held discussions national security personnel make data available efficiently securely cases companies made modifications systems support intelligence collection effort dialogues continued recent months general martin dempsey chairman joint chiefs staff met executives including facebook microsoft google intel details discussions provide insight disparity initial descriptions government program including training slide states collection directly servers companies denials providing data response legitimate fisa request approved fisa court legal requirement modifying systems make easier government collect data twitter could legally decline provide enhanced mechanism data transmission twitter companies effectively asked construct locked mailbox provide key government people briefed negotiations said facebook instance built system requesting sharing information google provide lockbox system instead transmits required data hand delivery ssh response publicity surrounding media reports data-sharing several companies requested permission reveal public information nature scope information provided response national security requests june 14 2013 facebook reported u.s. government authorized communication numbers aggregate range press release posted web site company reported six months ending december 31 2012 total number user-data requests facebook received government entities u.s. including local state federal including criminal national security-related requests – 9,000 10,000 company reported requests impacted 18,000 19,000 user accounts tiny fraction one percent 1.1 billion active user accounts day microsoft reported period received 6,000 7,000 criminal national security warrants subpoenas orders affecting 31,000 32,000 consumer accounts u.s. governmental entities including local state federal impacted tiny fraction microsoft global customer base google issued statement criticizing requirement data reported aggregated form stating lumping national security requests criminal request data would step backwards previous detailed practices website transparency report company said would continue seek government permission publish number extent fisa requests cisco systems saw huge drop export sales fears national security agency could using backdoors products september 12 2014 yahoo reported u.s. government threatened imposition 250,000 fines per day yahoo n't hand user data part nsa prism program known companies threatened fined providing data response legitimate fisa requests new york times editorial board charged obama administration lost credibility issue lamented years members congress ignored evidence domestic intelligence-gathering grown beyond control even seem disturbed learn every detail public calling texting habits reside n.s.a database wrote respect fisa-court context prism perversion american justice system judicial secrecy coupled one-sided presentation issues according new york times result court whose reach expanding far beyond original mandate without substantive check james robertson former federal district judge based washington served secret foreign intelligence surveillance act court three years 2002 2005 ruled bush administration landmark hamdan v. rumsfeld case said fisa court independent flawed government side represented effectively deliberations anyone judge tell judge needs hear sides case said james robertson without judges benefit adversarial debate suggested creating advocate security clearance would argue government filings robertson questioned whether secret fisa court provide overall legal approval surveillance programs saying court turned something like administrative agency changes brought foreign intelligence surveillance act 1978 amendments act 2008 expanded us government authority forcing court approve entire surveillance systems surveillance warrants previously handled court approving programmatic surveillance n't think judicial function robertson also said frankly stunned new york times report fisa court rulings created new body law broadening ability nsa use surveillance programs target terrorists suspects cases involving espionage cyberattacks weapons mass destruction former cia analyst valerie plame wilson former u.s. diplomat joseph wilson writing op-ed article published guardian said prism nsa data-mining programs might indeed effective hunting capturing actual terrorists n't enough information society make decision electronic frontier foundation eff international non-profit digital-rights group based u.s. hosting tool american resident write government representatives regarding opposition mass spying obama administration argument nsa surveillance programs prism boundless informant necessary prevent acts terrorism challenged several parties ed pilkington nicholas watt guardian said case najibullah zazi planned bomb new york city subway interviews involved parties u.s. british court documents indicated investigation case actually initiated response conventional surveillance methods old-fashioned tip-offs british intelligence services rather leads produced nsa surveillance michael daly daily beast stated even though tamerlan tsarnaev conducted boston marathon bombing brother dzhokhar tsarnaev visited al qaeda-affiliated inspire magazine website even though russian intelligence officials raised concerns u.s. intelligence officials tamerlan tsarnaev prism prevent carrying boston attacks daly observed problem national security agency gathering risk privacy apparently unable monitor risk safety ron paul former republican member congress prominent libertarian thanked snowden greenwald denounced mass surveillance unhelpful damaging urging instead transparency u.s. government actions called congress derelict giving much power government said elected president would ordered searches probable cause crime committed said prism program operated new york times columnist thomas l. friedman defended limited government surveillance programs intended protect american people terrorist acts yes worry potential government abuse privacy program designed prevent another 9/11—abuse far appear happened worry even another 9/11 ... another 9/11 fear 99 percent americans would tell members congress whatever need privacy damned make sure happen fear 'll reluctantly reluctantly trade government using data mining look suspicious patterns phone numbers called e-mail addresses—and go judge get warrant actually look content guidelines set congress—to prevent day fear give government license look anyone e-mail phone call anywhere anytime political commentator david brooks similarly cautioned government data surveillance programs necessary evil n't mass data sweeps well agencies going want go back old-fashioned eavesdropping lot intrusive conservative commentator charles krauthammer worried less legality prism nsa surveillance tools potential abuse without stringent oversight problem constitutionality ... need toughening congressional oversight judicial review perhaps even independent outside scrutiny plus periodic legislative revision—say reauthorization every couple years—in light efficacy safeguards nature external threat object abolish vital programs fix blog post david simon creator wire compared nsa programs including prism 1980s effort city baltimore add dialed number recorders pay phones know individuals called callers city believed drug traffickers using pay phones pagers municipal judge allowed city place recorders placement dialers formed basis show first season simon argued media attention regarding nsa programs faux scandal simon stated many classes people american society already faced constant government surveillance political activist frequent critic u.s. government policies noam chomsky argued governments capacity governments use whatever technology available combat primary enemy – population cnn/opinion research corporation poll conducted june 11 13 found 66 americans generally supported program however quinnipiac university poll conducted june 28 july 8 found 45 registered voters think surveillance programs gone far 40 saying go far enough compared 25 saying gone far 63 saying far enough 2010 polls shown similar shifts public opinion revelations programs leaked terms economic impact study released august information technology innovation foundation found disclosure prism could cost u.s. economy 21.5 35 billion lost cloud computing business three years sentiment around world general displeasure upon learning extent world communication data mining national leaders spoke nsa spoke national surveillance one national minister scathing comments national security agency data-mining program citing benjamin franklin society monitors controls observes citizens less free question costs hunting terrorists overshadows loss citizen privacy nick xenophon australian independent senator asked bob carr australian minister foreign affairs e-mail addresses australian parliamentarians exempt prism mainway marina and/or nucleon carr replied legal framework protect australians government would comment intelligence matters xenophon argued specific answer question taliban spokesperson zabiullah mujahid said knew past efforts trace system used technical resources foil efforts able stop succeeding far however cnn reported terrorist groups changed communications behaviors response leaks 2013 cloud security alliance surveyed cloud computing stakeholders reactions us prism spying scandal 10 non-us residents indicated cancelled project us-based cloud computing provider wake prism 56 said would less likely use us-based cloud computing service alliance predicted us cloud computing providers might lose much €26 billion 20 share cloud services foreign markets prism spying scandal reactions internet users china mixed viewing loss freedom worldwide seeing state surveillance coming secrecy story broke u.s. president barack obama chinese president xi jinping met california asked nsa hacking china spokeswoman ministry foreign affairs people republic china said china strongly advocates cybersecurity party-owned newspaper liberation daily described surveillance like nineteen eighty-four -style hong kong legislators gary fan claudia mo wrote letter obama stating revelations blanket surveillance global communications world leading democracy damaged image u.s. among freedom-loving peoples around world ai weiwei chinese dissident said even though know governments kinds things shocked information us surveillance operation prism abusively using government powers interfere individuals privacy important moment international society reconsider protect individual rights sophie 't veld dutch member european parliament called prism violation eu laws german federal commissioner data protection freedom information peter schaar condemned program monstrous added white house claims reassure given large number german users google facebook apple microsoft services expect german government ... committed clarification limitation surveillance steffen seibert press secretary chancellor office announced angela merkel put issues agenda talks barack obama pending visit berlin wolfgang schmidt former lieutenant colonel stasi said stasi would seen program dream come true since stasi lacked technology made prism possible schmidt expressed opposition saying height naivete think collected information wo n't used nature secret government organizations way protect people privacy allow government collect information first place many germans organized protests including one checkpoint charlie obama went berlin speak matthew schofield mcclatchy washington bureau said germans dismayed obama role allowing collection much information italian president guarantor protection personal data antonello soro said surveillance dragnet would legal italy would contrary principles legislation would represent serious violation cnil french data protection watchdog intimates google change privacy policies within three months 'll risk fines 150,000 euros spanish agency data protection aepd planning fine google 40k 300k euros fails clear past usage massive data spanish users william hague foreign secretary united kingdom dismissed accusations british security agencies circumventing british law using information gathered british citizens prism saying data obtained us united states involving uk nationals subject proper uk statutory controls safeguards david cameron said britain spy agencies received data collected prism acted within law 'm satisfied intelligence agencies fantastically important job country keep us safe operate within law malcolm rifkind chairman parliament intelligence security committee said british intelligence agencies seeking know content emails people living uk actually get lawful authority uk information commissioner office cautious saying would investigate prism alongside european data agencies real issues extent u.s. law agencies access personal data uk european citizens aspects u.s. law companies compelled provide information u.s. agencies potentially conflict european data protection law including uk data protection act ico raised european counterparts issue considered european commission discussions u.s government tim berners-lee inventor world wide web accused western governments practicing hypocrisy conducted spying internet criticized countries spying internet berners-lee stated internet spying make people feel reluctant access intimate details use internet certain way paraphrased steve robson daily mail said internet protected controlled governments large corporations minister external affairs salman khurshid defended prism program saying scrutiny access actual messages computer analysis patterns calls emails sent actually snooping specifically content anybody message conversation information got scrutiny able use prevent serious terrorist attacks several countries comments contradicted foreign ministry characterization violations privacy unacceptable minister communications information technology kapil sibal asked khurshid comments refused comment directly said know nature data information sought part prism even external ministry idea media felt khurshid defence prism india government rolling central monitoring system cms similar prism program khurshid comments criticized indian media well opposition party cpi stated upa government strongly protested surveillance bugging instead shocking khurshid sought justify shameful remark come time even close allies us like germany france protested snooping countries rajya sabha mp p. rajeev told times india act usa clear violation vienna convention diplomatic relations khurshid trying justify speed government india reject asylum application edward snowden shameful june 8 2013 director national intelligence issued fact sheet stating prism undisclosed collection data mining program rather internal government computer system used facilitate collection foreign intelligence information court supervision authorized section 702 foreign intelligence surveillance act fisa 50 u.s.c § 1881a section 702 provides attorney general director national intelligence may authorize jointly period 1 year effective date authorization targeting persons reasonably believed located outside united states acquire foreign intelligence information order authorize targeting attorney general director national intelligence need obtain order foreign intelligence surveillance court fisa court pursuant section 702 certify intelligence important national security united states may lost timely acquired time permit issuance order requesting order attorney general director national intelligence must certify fisa court significant purpose acquisition obtain foreign intelligence information need specify facilities property targeted receiving fisa court order determining emergency circumstances attorney general director national intelligence direct electronic communication service provider give access information facilities carry targeting keep targeting secret provider option 1 comply directive 2 reject 3 challenge fisa court provider complies directive released liability users providing information reimbursed cost providing provider rejects directive attorney general may request order fisa court enforce provider fails comply fisa court order punished contempt court finally provider petition fisa court reject directive case fisa court denies petition orders provider comply directive provider risks contempt court refuses comply fisa court order provider appeal fisa court denial foreign intelligence surveillance court review appeal court review decision supreme court writ certiorari review seal senate select committee intelligence fisa courts put place oversee intelligence operations period death j. edgar hoover beverly gage slate said created new mechanisms supposed stop kinds abuses men like hoover engineered instead looks come function rubber stamps expansive ambitions intelligence community j. edgar hoover longer rules washington turns n't need anyway laura donohue law professor georgetown university law center center national security law called prism nsa mass surveillance programs unconstitutional woodrow hartzog affiliate stanford law school center internet society commented aclu likely demonstrate legitimate first amendment harms chilling effects fourth amendment harms perhaps violation reasonable expectation privacy ... harm merely know certainty monitored government certainly argument people surveillance act differently experience loss autonomy less likely engage self exploration reflection less willing engage core expressive political activities dissenting speech government criticism interests first fourth amendment seek protect fisa amendments act faa section 702 referenced prism documents detailing electronic interception capture analysis metadata many reports letters concern written members congress suggest section faa particular legally constitutionally problematic targeting u.s. persons insofar collections occur u.s. published documents indicate aclu asserted following regarding faa regardless abuses problem faa fundamental statute unconstitutional senator rand paul introducing new legislation called fourth amendment restoration act 2013 stop nsa agencies united states government violating fourth amendment u.s. constitution using technology big data information systems like prism boundless informant besides information collection program started 2007 two programs sharing name prism parallel programs known collectively sigads gather data metadata sources sigad set defined sources targets types data collected legal authorities software associated sigads name umbrella sit blarney sigad summary set slides alongside cartoon insignia shamrock leprechaun hat describes ongoing collection program leverages ic intelligence community commercial partnerships gain access exploit foreign intelligence obtained global networks sigads like prism collect data isp level others take top-level infrastructure type collection known upstream upstream collection includes programs known blanket terms blarney fairview oakstar stormbrew individual sigads data integrated sigad gathered ways besides upstream service providers instance collected passive sensors around embassies even stolen individual computer network hacking attack sigads involve upstream collection instance data could taken directly service provider either agreement case prism means hacking ways according washington post much less known muscular program directly taps unencrypted data inside google yahoo private clouds collects twice many data points compared prism google yahoo clouds span globe tap done outside united states unlike prism muscular program requires fisa type warrants | [
7424,
6017,
10631,
5384,
1930,
7178,
5133,
4623,
3088,
1169,
9233,
10002,
4118,
8726,
6136,
9246,
8735,
8356,
1189,
11302,
3495,
8104,
10154,
299,
9900,
9517,
1838,
8750,
7857,
6834,
10935,
5308,
7741,
1986,
11078,
3703,
6343,
4937,
6344,
... | None |
6,345 | 4 | Pcap:pcap field computer network administration pcap application programming interface api capturing network traffic name abbreviation technical term art jargon packet capture api proper name unix-like systems implement pcap libpcap library windows port libpcap named winpcap longer supported developed port named npcap windows 7 later still supported monitoring software may use libpcap winpcap npcap capture network packets travelling computer network newer versions transmit packets network link layer get list network interfaces possible use libpcap winpcap npcap pcap api written c languages java .net languages scripting languages generally use wrapper wrappers provided libpcap winpcap c++ programs may link directly c api use object-oriented wrapper libpcap winpcap npcap provide packet-capture filtering engines many open-source commercial network tools including protocol analyzers packet sniffers network monitors network intrusion detection systems traffic-generators network-testers libpcap winpcap npcap also support saving captured packets file reading files containing saved packets applications written using libpcap winpcap npcap able capture network traffic analyze read saved capture analyze using analysis code capture file saved format libpcap winpcap npcap use read applications understand format tcpdump wireshark ca netmaster microsoft network monitor 3.x mime type file format created read libpcap winpcap npcap application/vnd.tcpdump.pcap typical file extension .pcap although .cap .dmp also common use libpcap originally developed tcpdump developers network research group lawrence berkeley laboratory low-level packet capture capture file reading capture file writing code tcpdump extracted made library tcpdump linked developed tcpdump.org group develops tcpdump libpcap originally developed unix-like operating systems successful port windows made called winpcap unmaintained since 2013 several competing forks released new features support newer versions windows winpcap consists programmers politecnico di torino wrote original code 2008 cace technologies company set winpcap developers developed maintained product cace acquired riverbed technology october 21 2010 winpcap uses older ndis 5.x apis work builds windows 10 deprecated removed apis favor newer ndis 6.x apis also forces limitations unable capture 802.1q vlan tags ethernet headers npcap nmap project packet sniffing library windows based winpcap libpcap libraries improved speed portability security efficiency npcap offers win10pcap implementation also based ndis 6 driver model works stably windows 10 | [
7426,
6916,
7813,
8582,
6797,
2062,
8976,
5245,
5397,
10005,
537,
5657,
1435,
1820,
9245,
3486,
6177,
418,
3876,
1580,
5677,
7983,
3250,
2739,
692,
9780,
823,
2105,
9146,
704,
8641,
8770,
5702,
842,
5066,
7502,
7889,
10705,
9939,
6997,
... | None |
6,346 | 1 | TokuMX:tokumx tokumx open-source distribution mongodb among things replaces default b-tree data structure found basic mongodb distribution fractal tree index drop-in replacement mongodb applications run offers scalability performance improvements associated fractal tree indexing also adds support document-level locking transaction support acid mvcc replication optimization support full-text search tokumx specifically designed high performance write-intensive workloads achieves using fractal tree index replaces 40-year-old b-tree indexing based cache-oblivious algorithms approach building memory-efficient systems originally jointly developed researchers massachusetts institute technology rutgers university state university new york stony brook suny tokumx scalable acid mvcc compliant distribution mongodb provides indexing-based query improvements offers online schema modifications reduces slave lag hard disk drives flash memory also adds transactions mvcc acid reliability mongodb application making mongodb suitable much wider range solutions tokumx source files made available terms gnu affero general public license agpl tokukv fractal tree indexing library made available terms gnu general public license gpl version 2 additional grant patent license relational databases use indexes increase query performance databases leverage indexes significantly reduce amount data examine responding queries indexes commonly implemented b-trees data structure first described 1970 b-tree data structure allows operations like inserting data sorted order iteration primary operation used index depending workload implementation b-tree performance limited random i/o characteristics disks addition freshly loaded databases tend good sequential behavior behavior becomes increasingly difficult maintain database grows resulting random i/o performance challenges advent big data ever-increasing database needs 21st century many niche databases created get around limitations 50-year-old b-tree indexing include optimized reads optimized writes series special-purpose databases designed narrow problem set fractal tree indexing technology new approach indexing replaces b-trees fractal tree indexes implement operations b-tree thus drop-in replacement b-trees fractal tree indexes effectively replaces small frequent writes larger less frequent ones enables better compression insertion performance fractal trees also allow messages injected tree fashion schema changes adding dropping column adding index done online background result indexes maintained without drop performance adding data indexes tends stress performance b-trees performs well fractal tree indexes fractal tree index modifications cause database files fragment periodic maintenance compactify files needed fractal tree indexes applied number applications characterized near-real time analysis streaming data used storage layer database storage layer file system used database used setting b-tree used improved performance examples include network event management online advertising networks web 2.0 clickstream analytics air traffic control management uses include accelerated crawler performance search engines social media sites also used create indexes columns online enabling query flexibility ecommerce personalization also suited improving performance reducing existing loads transactional websites general performs well applications must simultaneously store log file data execute ad hoc queries | [
10048,
9828,
3512,
113,
2901,
4598,
2456,
1049,
7802,
7453
] | Validation |
6,347 | 4 | High_Orbit_Ion_Cannon:high orbit ion cannon high orbit ion cannon hoic open-source network stress testing denial-of-service attack application designed attack many 256 urls time designed replace low orbit ion cannon developed praetox technologies later released public domain security advisory hoic released prolexic technologies february 2012 hoic developed conclusion operation payback hacktivist collective anonymous operation payback concluded massive pressure group law enforcement agencies captured prosecuted 13 individuals connected group forced many members group rethink strategies subsequently part group launched operation leakspin however large part anonymous remained focused launching opt-in ddos attacks however low orbit ion cannon powerful enough launch attacks limited number users therefore hoic designed remedy ability cause http flood low number user agents 50 users required successfully launch attack co-ordination multiple users leading exponential increase damage hoic first tool kind support so-called booster files configurable vbscript modules randomize http headers attacking computers allowing thousands upon thousands highly randomized combinations user agents apart allowing user agents implement form randomization countermeasures booster files used increase magnitude attack hoic predecessor loic named ion cannon fictional directed-energy weapon described firing beams ions space-based platform onto earth-based targets although ion cannons appear many movies television shows video games science fiction-based setting ones depicted command conquer series video games considered inspiration graphics software gui website simply described hoic program sending http post get requests computer attack uses lulz-inspired graphical interface hoic primarily performs denial-of-service dos attack ddos attack co-ordinated multiple individuals denial-of-service dos attack target url accomplished sending excessive traffic attempt overload site bring basic version attack customized using booster files follow vb 6 mixed vb .net syntax addition hoic simultaneously attack 256 domains making one versatile tools hackers attempting co-ordinate ddos attacks group minimalist gui tool makes user friendly easy control basic routine attack input url website attacked set power option low medium high power option sets request velocity low two requests per second medium four high eight requests per second booster file added uses .hoic extension define dynamic request attributes launch attacks multiple pages within website help evade defense filters attack launched pressing red button gui labelled fire teh lazer basic limitation hoic requires coordinated group users ensure attacks successful even though allowed attacks launched far fewer users older low orbit ion cannon hoic still requires minimum 50 users launch effective attack required sustain target website protection another limiting factor lack anonymizing randomizing capability even though hoic theory offer anonymizing use booster files actual protection provided enough furthermore anonymizing networks tor capable handling bandwidth attacks generated hoic attempt launch attack using tor network actually harm network however anonymous members routinely use proxy servers based sweden launch attacks speculated due notion sweden may stricter internet privacy laws rest world primarily hoic designed stress testing tool lawfully used stress test local networks servers provided person initiating test authorization test long networks servers clients networking equipment urls disrupted hoic also used perform distributed denial-of-service attacks illegal various statutes police justice act 2006 united kingdom amended computer misuse act 1990 specifically outlawed denial-of-service attacks set maximum penalty 10 years prison united states denial-of-service attacks may considered federal crime computer fraud abuse act penalties include ten years imprisonment 2013 criminal charges brought 13 members anonymous participating ddos attack various websites organizations including recording industry association america motion picture association america united states copyright office library congress visa mastercard bank america charged one count conspiracy intentionally cause damage protected computer events occurred september 16 2010 january 2 2011 ddos attacks federal offenses united states prosecuted department justice usc title 18 section 1030 2013 anonymous petitioned united states government via people demanding ddos attacks recognized form virtual protest similar occupy protests ddos mitigation usually works principle distribution basically intelligent routing traffic avoid congestion prevent overload single url methods counter ddos include installation intrusion prevention system ips intrusion detection system ids anonymous first group utilize high orbit ion cannon publicly megaupload file-sharing website shut federal agents raided premises anonymous launched attack website us department justice doj website went offline anonymous claimed success via twitter saying one thing certain expect us megaupload course next hours several websites knocked offline kept offline included websites belonging recording industry association america riaa motion picture association america mpaa bmi finally day drew close website belonging fbi hit repeatedly ultimately succumbed attacks acquired “ tango ” status anonymous claimed single largest internet attack history reported many 27,000 user agents taking part attack | [
2945,
4488,
6667,
2060,
6797,
4498,
4133,
939,
1965,
7983,
823,
953,
4797,
1088,
6080,
2754,
9282,
4558,
847,
11351,
7899,
9181,
3581,
2018,
10852,
2409,
5245,
9727
] | None |
6,348 | 7 | Tableau_Software:tableau software tableau software american interactive data visualization software company founded january 2003 christian chabot pat hanrahan chris stolte mountain view california company currently headquartered seattle washington united states focused business intelligence august 1 2019 salesforce.com acquired tableau chabot hanrahan stolte researchers department computer science stanford university specialized visualization techniques exploring analyzing relational databases data cubes company started commercial outlet research produced stanford 1999-2002 tableau products query relational databases online analytical processing cubes cloud databases spreadsheets generate graph-type data visualizations products also extract store retrieve data in-memory data engine tableau products include tableau mapping functionality able plot latitude longitude coordinates connect spatial files like esri shapefiles kml geojson display custom geography built-in geo-coding allows administrative places country state/province county/district postal codes us congressional districts us cbsa/msa area codes airports european union statistical areas nuts codes mapped automatically group geographies create custom territories use custom geocoding extend existing geographic roles product tableau founded 2003 pat hanrahan christian chabot chris stolte moved headquarters fremont neighborhood seattle washington following year company since expanded fremont headquarters announced plans 2016 auxiliary campus suburban kirkland washington new headquarters building opened near gas works park wallingford march 2017 followed new building fremont opened 2018 august 2016 tableau announced appointment adam selipsky president ceo effective september 16 2016 replacing co-founder christian chabot ceo june 2018 tableau acquired empirical systems cambridge massachusetts based artificial intelligence startup plans integrate company technology tableau platform tableau also announced plans establish office cambridge result deal june 10 2019 tableau acquired salesforce stock deal worth 15 billion may 17 2013 tableau launched initial public offering new york stock exchange raising 250 million prior ipo tableau raised 45 million venture capital investment investors nea meritech company 2013 revenue reached 232.44 million 82 growth 2012 128 million 2010 tableau reported revenue 34.2 million figure grew 62.4 million 2011 127.7 million 2012 profit periods came 2.7 million 3.4 million 1.6 million respectively june 10 2019 salesforce.com announced would acquiring tableau 15.7 billion dollar deal december 2 2010 tableau deleted wikileaks visualizations united states diplomatic cables leak stating due directly political pressure us senator joe lieberman february 21 2011 tableau posted updated data policy accompanying blog post cited two main changes 1 creating formal complaint process 2 using freedom speech guiding principle addition post announced creation advisory board help company navigate future situations push boundaries policy tableau likened new policy model set forth digital millennium copyright act opined new policy wikileaks visuals would removed underlying data statistics cables cables 2008 tableau named codie award winner best business intelligence solution software information industry association company recognized leader gartner magic quadrant seven consecutive years 2012 2019 | [
9286,
5960,
11016,
10090,
83
] | Test |
6,349 | 9 | External_variable:external variable c programming language external variable variable defined outside function block hand local automatic variable variable defined inside function block understand external variables relate codice_1 keyword necessary know difference defining declaring variable variable defined compiler allocates memory variable possibly also initializes contents value variable declared compiler requires variable defined elsewhere declaration informs compiler variable name type exists compiler need allocate memory since allocated elsewhere codice_1 keyword means declare without defining words way explicitly declare variable force declaration without definition also possible explicitly define variable i.e force definition done assigning initialization value variable neither codice_1 keyword initialization value present statement either declaration definition compiler analyse modules program decide variable must defined exactly one modules program definition one error produced possibly linking stage variable may declared many times long declarations consistent definition something header files facilitate greatly may declared many modules including module defined even many times module usually pointless declare module external variable may also declared inside function case codice_1 keyword must used otherwise compiler consider definition local automatic variable different scope lifetime initial value declaration visible inside function instead throughout function module codice_1 keyword applied function prototype absolutely nothing codice_1 keyword applied function definition course non-sensical function prototype always declaration never definition also standard c function always external compiler extensions allow function defined inside function external variable accessed functions modules program global variable function able use variable declaration definition external variable must lie function definition source code must declaration variable keyword codice_1 inside function codice_8 keyword codice_8 codice_1 mutually exclusive applied definition external variable changes bit variable accessed functions module defined possible function module pass reference pointer variable another function another module case even though function another module read modify contents variable—it refer name also possible use codice_8 keyword definition local variable without codice_8 keyword variable automatically allocated function called released function exits thus name automatic variable value retained function calls codice_8 keyword variable allocated program starts released program ends value lost function calls variable still local since accessed name inside function defined reference pointer passed another function allowing read modify contents variable without referring name external variables allocated initialized program starts memory released program ends lifetime program initialization done explicitly external static local static variables initialized zero local automatic variables uninitialized i.e contain trash values codice_8 keyword applied function definition changes linkage function visible translation unit definition located prevents function called name outside module remains possible pass function pointer module use invoke function declaring function using codice_8 keyword also good way keep name short avoiding name clashes file 1 file 2 example variable global_variable defined file 1 order utilize variable file 2 must declared regardless number files global variable defined however must declared file outside one containing definition normal methodology allocation actual definitions go .c files mere declarations prototypes allocate describe types parameters compiler work correctly information belongs .h header file others safely include without possible conflict | [
1152,
5059,
8524,
6349,
10510,
6640,
3960,
2045,
1343
] | Test |
6,350 | 4 | E-commerce_identification_and_identification_types:e-commerce identification identification types whole new range techniques developed identify people since 1960s measurement analysis parts bodies dna profiles forms identification used ensure citizens eligible rights benefits vote without fear impersonation private individuals used seals signatures centuries lay claim real personal estate. “ generally amount proof identity required gain access something proportionate value sought estimated 4 online transactions use methods simple passwords security systems resources generally follows three-step process ” identification authentication authorization today high level trust critical ecommerce transactions traditional face-to-face transactions scheme established maintained whereby users properly consistently effectively efficiently identified systems accessed identity verification service often employed ensure users customers provide information associated identity real person authentication verification identity entity requesting access system process determining whether someone something fact declared private public computer networks including internet authentication commonly done use logon passwords knowledge password assumed guarantee user authentic user registers initially registered someone else using assigned self-declared password subsequent use user must know use previously declared password weakness system transactions significant exchange money passwords often stolen accidentally revealed forgotten reason internet business many transactions require stringent authentication process use digital certificates issued verified certificate authority ca part public key infrastructure considered likely become standard way perform authentication internet logically authentication precedes authorization although may often seem combined authorization process giving someone permission something multi-user computer systems system administrator defines system users allowed access system privileges use access file directories hours access amount allocated storage space forth assuming someone logged computer operating system application system application may want identify resources user given session thus authorization sometimes seen preliminary setting permissions system administrator actual checking permission values set user getting access logically authorization preceded authentication | [
7368,
11244,
2737,
9745,
5433,
10207
] | Test |
6,351 | 7 | Marabunta_(software):marabunta software marabunta fully distributed software application anonymous p2p main goal fight internet censorship assuring freedom speech peer-to-peer platform information exchange among nodes anonymous way based several communication algorithms called order chaos found massive social organizations ant colonies project founded university zaragoza spain developed promoted students computing engineering although development teams users many different places shown interest perhaps attracted ideological aims project software available spanish english website also available english marabunta uses qt graphical widget toolkit allowing used linux microsoft windows released gnu general public license marabunta free software marabunta implementation ideas explained free nets project developed ideas mind many potential services run top marabunta text message interchange first service could taken platform telegram distribution computer net works host server four message distribution lists receivers receive messages sent list interested general technology philosophy politics content filters allowed messages certain patterns displayed specially useful searching specific information marabunta selects potentially interesting messages generated traffic uses udp/ip protocols avoiding setting connections nodes lets traffic flow network operational redundancy every node used moreover udp protocol could seen increasing anonymity net need validate source hosts receive datagram marabunta support udp hole punching users behind nats establish port forwarding route let router know port node internal net forward arriving datagrams | [
4229,
4490,
1164,
6797,
11029,
11413,
10522,
3366,
7983,
823,
3770,
8640,
3792,
3676,
5085,
5472,
3428,
3813,
7921,
5749
] | Test |
6,352 | 2 | Linus_Torvalds:linus torvalds linus benedict torvalds born december 28 1969 finnish-american software engineer creator historically principal developer linux kernel kernel linux operating systems distributions operating systems android chrome os also created distributed version control system git scuba dive logging planning software subsurface honored along shinya yamanaka 2012 millennium technology prize technology academy finland recognition creation new open source operating system computers leading widely used linux kernel also recipient 2014 ieee computer society computer pioneer award 2018 ieee masaru ibuka consumer electronics award torvalds born helsinki finland 1969 son journalists anna nils torvalds grandson statistician leo törnqvist poet ole torvalds parents campus radicals university helsinki 1960s family belongs swedish-speaking minority torvalds named linus pauling nobel prize-winning american chemist although book rebel code linux open source revolution torvalds quoted saying think named equally linus peanuts cartoon character noting makes half nobel prize-winning chemist half blanket-carrying cartoon character torvalds attended university helsinki 1988 1996 graduating master degree computer science nodes research group academic career interrupted first year study joined finnish army uusimaa brigade summer 1989 selecting 11-month officer training program fulfill mandatory military service finland army held rank second lieutenant role ballistic calculation officer torvalds bought computer science professor andrew tanenbaum book tanenbaum describes minix educational stripped-down version unix 1990 resumed university studies exposed unix first time form dec microvax running ultrix m.sc thesis titled linux portable operating system interest computers began commodore vic-20 age 11 1981 initially programming basic later directly accessing 6502 cpu machine code make use assembly language vic-20 purchased sinclair ql modified extensively especially operating system hard get software finland linus wrote assembler editor addition pac-man graphics libraries ql well games wrote pac-man clone named cool man january 5 1991 purchased intel 80386-based clone ibm pc receiving minix copy turn enabled begin work linux first prototypes linux publicly released later year 1991 version 1.0 released march 14 1994 torvalds first encountered gnu project 1991 another swedish-speaking computer science student lars wirzenius took university technology listen free software guru richard stallman speech torvalds used stallman gnu general public license version 2 gplv2 linux kernel visit transmeta late 1996 torvalds accepted position company california would work february 1997 june 2003 moved open source development labs since merged free standards group become linux foundation whose auspices continues work june 2004 torvalds family moved dunthorpe oregon closer osdl beaverton oregon-based headquarters 1997 1999 involved 86open helping choose standard binary format linux unix 1999 named mit technology review tr100 one world top 100 innovators age 35 1999 red hat va linux leading developers linux-based software presented torvalds stock options gratitude creation year companies went public torvalds share value temporarily shot roughly us 20 million personal mascot penguin nicknamed tux widely adopted linux community mascot linux kernel although torvalds believes open source right way software also said uses best tool job even includes proprietary software criticized use alleged advocacy proprietary bitkeeper software version control linux kernel torvalds subsequently wrote free-software replacement bitkeeper called git 2008 torvalds stated used fedora distribution linux fairly good support powerpc processor architecture favored time usage fedora confirmed later 2012 interview also posted updates choice desktop environment often response perceived feature regressions currently linux foundation sponsors torvalds work full-time improving linux linus torvalds known disagreeing developers linux kernel mailing list calling really unpleasant person later explained 'd like nice person curse less encourage people grow rather telling idiots 'm sorry – tried attitude torvalds considers necessary making point clear drawn criticism intel programmer sage sharp systemd developer lennart poettering among others sunday september 16 2018 linux kernel code conflict suddenly replaced new code conduct based contributor covenant shortly thereafter release notes linux 4.19-rc4 linus apologized behavior calling personal attacks past unprofessional uncalled announced period time get assistance understand people ’ emotions respond appropriately soon transpired events followed new yorker approaching linus series questions critical conduct following release linux 4.19 october 22 linus went back maintaining kernel initially torvalds wanted call kernel developed freax combination free freak letter x indicate unix-like system friend ari lemmke administered ftp server kernel first hosted download named torvalds directory linux 2006 approximately two percent linux kernel written torvalds thousands contributed linux kernel percentage one largest contributions however stated 2012 personal contribution mostly merging code written others little programming torvalds retains highest authority decide new code incorporated standard linux kernel torvalds holds linux trademark monitors use chiefly linux mark institute linus torvalds married tove torvalds née monni —a six-time finnish national karate champion—whom first met late 1993 linus running introductory computer laboratory exercises students instructed course attendees send e-mail test tove responded e-mail asking date tove linus later married three daughters patricia miranda born 1996 daniela yolanda born 1998 celeste amanda born 2000 two born united states linux kernel reboot system call accepts dates birth written hexadecimal magic values torvalds described completely a-religious—atheist adding find people seem think religion brings morals appreciation nature actually think detracts gives people excuse say 'oh nature created act creation seen something miraculous appreciate fact 'wow incredible something like could happened first place later added europe religion mostly personal issue united states become politicized discussing issue church state separation torvalds also said yeah kind ironic many european countries actually kind legal binding state state religion however story march linuxworld conference titled linus liberator torvalds quoted saying like two golden rules life one 'do unto others would want unto reason people associate christianity 'm christian 'm agnostic rule 'be proud 2010 torvalds became united states citizen registered vote united states unaffiliated u.s. political party saying way much personal pride want associated quite frankly linus developed interest scuba diving early 2000s went achieve numerous certifications later led creating subsurface project time magazine recognized torvalds multiple times infoworld presented 2000 award industry achievement 2005 torvalds appeared one best managers survey businessweek 2006 business 2.0 magazine named one 10 people n't matter growth linux shrunk torvalds individual impact summer 2004 viewers yle finnish broadcasting company placed torvalds 16th network 100 greatest finns 2010 part series called britannica guide world influential people torvalds listed among 100 influential inventors time october 11 2017 linux company suse made song titled linus said | [
1026,
7689,
3082,
5644,
9742,
5139,
2581,
8214,
10780,
10785,
3618,
6691,
6180,
2597,
9253,
9257,
11305,
8242,
9266,
56,
59,
2109,
4673,
10817,
6213,
10822,
8263,
7241,
8268,
589,
4177,
9810,
8787,
1110,
3685,
5222,
9320,
10856,
10860,
83... | Test |
6,353 | 8 | WS-ReliableMessaging:ws-reliablemessaging ws-reliablemessaging describes protocol allows soap messages reliably delivered distributed applications presence software component system network failures original specification written bea systems microsoft ibm tibco march 2003 subsequently refined next two years february 2005 version submitted oasis web services reliable exchange ws-rx technical committee june year resulting ws-reliablemessaging 1.1 approved oasis standard june 14 2007 v1.2 approved february 2 2009 prior ws-reliablemessaging oasis produced competing standard ws-reliability supported coalition vendors namely fujitsu hitachi nec oracle corporation progress software sun microsystems vendors also support ws-reliablemessaging specification application source wishes reliably send messages application destination ad unreliable infrastructure accomplish make use reliable messaging source rms reliable messaging destination rmd sends message rms rms uses ws-reliablemessaging ws-rm protocol transmit message rmd rmd delivers message ad rms transmit message rmd reason must raise exception otherwise indicate message transmitted rms may implemented within process space may separate components similarly ad rmd may exist within process space may separate components important thing keep mind ws-rm specification deals contents behavior messages appear wire messages sent rms delivered rmd ad whether messages persisted on-disk held memory etc none considerations part ws-rm specification ws-rm protocol defines supports number delivery assurances ws-reliablemessaging uses extensibility model soap wsdl ws-reliablemessaging define features required complete messaging solution ws-reliablemessaging building block used conjunction web services specifications application-specific protocols build complete messaging solution article attempts make case reliability needed message level required business level | [
9665,
8355,
10020,
7878,
8070,
8425,
4397,
4974,
3323,
9137,
4979,
10229,
10486,
1851
] | Test |
6,354 | 7 | International_Middleware_Conference:international middleware conference international middleware conference brings together academic industrial delegates interest development optimisation evaluation evolution middleware first instance middleware conference held 1998 since 2003 conference run annually many recent conference events acm/ifip/usenix supported events middleware uses single-track conference program although includes growing number submission categories 2013 include conference also includes number six 2012 workshops typically co-located main conference | [
8122,
7983
] | None |
6,355 | 2 | What_(ITS_utility):utility typed prompt small information utility available incompatible timesharing system could provide information incoming email bus schedule mit campus executable source files answer user humorous manner written midas assembly language still used instances maintained across web last traceable edit source code ken l. harrenstien 16 may 1988 without arguments would print information inbox status argument bus would print information next buses leaving mit campus asked source name responded paths source files corresponding name knowing answer would often resort humor finally displayed amount introspection | [
3216,
5361,
1147
] | None |
6,356 | 1 | UnixODBC:unixodbc unixodbc open-source project implements odbc api code provided gnu gpl/lgpl built used many different operating systems including versions unix linux mac os x ibm os/2 microsoft interix goals project include unixodbc project first started early months 1999 peter harvey created time developers iodbc another open source odbc implementation willing lgpl code expand api include current odbc 3 api specification consider addition gui based configuration tools worthwhile iodbc parts added applications use odbc interface may use iodbc unixodbc without change cases result projects adhering single odbc specification original driver manager basic driver manager rewritten easysoft nick gorham soon project started nick assumed leadership project july 1999 peter harvey continuing work supporting code development unixodbc progressed since origin contributions many developers open source community also commercial database companies including ibm oracle corporation sap included part standard installation many linux distributions unixodbc project split several projects hosted sourceforge split done allow faster releases supporting work maintaining focus stability consistency core code | [
5612,
6797,
7983,
5492,
823,
5210,
3323
] | Test |
6,357 | 8 | WS-Policy:ws-policy ws-policy specification allows web services use xml advertise policies security quality service etc web service consumers specify policy requirements ws-policy w3c recommendation september 2007 ws-policy represents set specifications describe capabilities constraints security business policies intermediaries end points example required security tokens supported encryption algorithms privacy rules associate policies services end points assertions either requirements put upon web service advertisement policies web service two operators xml tags used make statements policy combinations logically empty wsp tag makes assertions provider consumer specify policy effective policy computed usually consists intersection policies new policy contains assertions made sides contradict however synonymous assertions considered incompatible policy intersection easily explained fact policy intersection syntactic approach incorporate semantics assertions furthermore ignores assertion parameters opposed name might suggest policy intersection although quite similar set-intersection | [
1476,
10949,
7878,
8425,
6284,
10829,
4974,
8597,
10396
] | None |
6,358 | 6 | Directory_structure:directory structure computing directory structure way operating system file system files displayed user files typically displayed hierarchical tree structure filename string used uniquely identify file stored file system computer advent 32-bit operating systems file names typically limited short names 6 14 characters size modern operating systems typically allow much longer filenames 250 characters per pathname element dos windows os/2 root directory drive example root directory usually c directory separator usually operating system also internally recognizes physical virtual drives named drive letter opposed combined one means formal root directory rather independent root directories drive however possible combine two drives one virtual drive letter setting hard drive raid setting 0 following folders may appear root boot partition unix unix-like operating systems use filesystem hierarchy standard common form directory structures files directories appear root directory even stored different physical devices | [
2432,
3330,
5514,
6797,
5397,
8988,
6813,
9762,
2213,
5158,
7847,
1193,
2095,
7983,
52,
1844,
5819,
9533,
960,
3522,
5969,
5975,
9946,
5598,
1632,
1509,
6126,
7663,
9840,
3571,
5492,
7540,
5754
] | Test |
6,359 | 1 | DB-Engines_ranking:db-engines ranking db-engines ranking ranks database management systems popularity covering 340 systems ranking criteria include number search engine results searching system names google trends stack overflow discussions job offers mentions systems number profiles professional networks linkedin mentions social networks twitter ranking updated monthly described cited various database-related articles grouping specific database features like database model type license regularly published statistics reveal historical trends used strategic statements db-engines dbms portal created 2012 maintained austrian consulting company solid based ranking db-engines grants yearly award system gained popularity within year award winners ranking might measure actual usage number installations systems may may correspond number users furthermore quality features systems direct impact ranking | [
10340,
9286,
10471,
4200,
8201,
974,
7347,
10518,
5047,
11030,
6458,
8539
] | Validation |
6,360 | 4 | Cyber_security_standards:cyber security standards information storage transit applications services systems connected directly indirectly networks principal objective reduce risks including prevention mitigation cyber-attacks published materials consist collections tools policies security concepts security safeguards guidelines risk management approaches actions training best practices assurance technologies cybersecurity standards existed several decades users providers collaborated many domestic international forums effect necessary capabilities policies practices generally emerging work stanford consortium research information security policy 1990s 2016 us security framework adoption study reported 70 surveyed organizations nist cybersecurity framework popular best practice information technology computer security many note requires significant investment iso/iec 27001 part growing iso/iec 27000 family standards information security management system isms standard last revision published october 2013 international organization standardization iso international electrotechnical commission iec full name iso/iec 27001:2013 – information technology – security techniques – information security management systems – requirements iso/iec 27001 formally specifies management system intended bring information security explicit management control iso/iec 27002 incorporates mainly part 1 bs 7799 good security management practice standard latest versions bs 7799 bs 7799-3 sometimes iso/iec 27002 therefore referred iso 17799 bs 7799 part 1 sometimes refers part 1 part 7 bs 7799 part 1 provides outline good practice guide cybersecurity management whereas bs 7799 part 2 iso/iec 27001 normative therefore provide framework certification iso/iec 27002 high level guide cybersecurity beneficial explanatory guidance management organisation obtain certification iso/iec 27001 standard certification obtained lasts three years depending auditing organisation intermediate audits may carried three years iso/iec 27001 isms replaces bs 7799 part 2 since backward compatible organization working toward bs 7799 part 2 easily transition iso/iec 27001 certification process also transitional audit available make easier organization bs 7799 part 2-certified organization become iso/iec 27001-certified iso/iec 27002 provides best practice recommendations information security management use responsible initiating implementing maintaining information security management systems isms states information security systems required implement iso/iec 27002 control objectives without iso/iec 27001 iso/iec 27002 control objectives ineffective iso/iec 27002 controls objectives incorporated iso 27001 annex a. iso/iec 21827 sse-cmm – iso/iec 21827 international standard based systems security engineering capability maturity model sse-cmm measure maturity iso controls objectives north american electric reliability corporation nerc addresses patching nerc cip 007-6 requirement 2 summarily requires bulk power system bps operators/owners identify source sources utilized provide entiter security related patches cyber assets utilized operation registered entities required check new patches every thirty five calendar days upon identification new patch entities required evaluate applicability patch complete mitigation installation activities within 35 calendar days completion assessment applicability.e bps.y initial attempt create information security standards electrical power industry created nerc 2003 known nerc css cyber security standards subsequent css guidelines nerc evolved enhanced requirements widely recognized modern nerc security standard nerc 1300 modification/update nerc 1200 newest version nerc 1300 called cip-002-3 cip-009-3 cip=critical infrastructure protection standards used secure bulk electric systems although nerc created standards within areas bulk electric system standards also provide network security administration still supporting best-practice industry processes standard develops called “ common criteria ” allows many different software hardware products integrated tested secure way iasme governance uk-based standard information assurance small-to-medium enterprises smes provides criteria certification small-to-medium business cybersecurity readiness also allows small medium business provide potential existing customers clients accredited measurement cybersecurity posture enterprise protection personal/business data iasme governance standard developed enable businesses achieve accreditation similar iso 27001 reduced complexity cost administrative overhead specifically focused sme recognition difficult small cap businesses achieve maintain iso 27001 certifications iasme governance standard include free basic cyber security insurance uk-based sme applicants cost certification progressively graduated based upon employee population sme e.g. 10 fewer 11 25 26 100 101 250 employees certification based upon self-assessment iasme questionnaire third-party professional assessor insurance companies reduce premiums cybersecurity related coverage based upon iasme certification october 2016 federal reserve board office comptroller currency federal deposit insurance corporation jointly issued advance notice proposed rulemaking anpr regarding cyber risk management standards regulated entities anpr aims enhance ability large interconnected financial services entities prevent recover cyber attacks goes beyond existing requirements proposal requires entities total assets 50 billion third party service providers take steps strengthen incident response programs enhance cyber risk governance management practices may 2017 us based federal financial institutions examination council issued cyber security assessment tool tool includes completing inherent risk profile organization covers five areas european telecommunications standards institute etsi established new cyber security committee tc cyber 2014 meet growing demand ev guidance protect internet communications business carries tc cyber working closely relevant stakeholders develop appropriate standards increase privacy security organisations citizens across europe committee looking particular security infrastructures devices services protocols well security tools techniques ensure security offers security advice guidance users manufacturers network infrastructure operators standards freely available on-line principal work item effort production cyber security ecosystem standardization activities 1990s information security forum isf published comprehensive list best practices information security published standard good practice sogp isf continues update sogp every two years latest version published 2018 among programs isf offers member organizations comprehensive benchmarking program based sogp furthermore important charge security management understand adhere nerc cip compliance requirements ansi/isa 62443 series standards technical reports related information define procedures implementing secure industrial automation control systems iacs guidance applies stakeholders implementing managing iacs documents originally referred ansi/isa-99 isa99 standards created international society automation isa publicly released american national standards institute ansi documents 2010 renumbered ansi/isa-62443 series change intended align isa ansi document numbering corresponding international electrotechnical commission iec standards isa99 remains name industrial automation control system security committee isa since 2002 committee developing multi-part series standards technical reports subject iacs security work products submitted isa approval publishing ansi also submitted iec input iec 62443 series international standards following iec standards development process established 2007 international security compliance institute isci created first conformity assessment scheme commonly known certification scheme ansi/isa 62443 standards program certifies commercial off-the-shelf cots automation control systems iot devices addressing securing control systems supply chain isci development processes include maintenance policies ensure isasecure certifications remain alignment iec 62443 standards evolve ansi/isa 62443 standards designed horizontally address technical cybersecurity requirements cross-section industries isasecure working groups included subject matter experts traditional process industries building management system suppliers asset owners isasecure scheme requires products properly tested supplier development process conformance ansi/isa 62443-4-1. exida united states first certification body accredited isasecure scheme american national standards institute ansi followed control systems security center – certification laboratory cssc-cl accredited japan accreditation board jab tüv rheinland accredited deutsche akkreditierungsstelle dakks five additional certification bodies accredited 2019 including tuv sud two cots product certifications available isasecure® brand isasecure-csa component security assurance certifying automation products iec 62443-4-1 iec 62443-4-2 cybersecurity standards isasecure-ssa system security assurance certifying systems iec 62443-3-3 standard third certification sdla secure development lifecycle assurance available isci certifies automation systems development organizations iec 62443-4-1 cybersecurity standard isasecure 62443 conformity assessment scheme iso 17065 program whose labs certification bodies cb independently accredited ansi/anab jab dakks singapore accreditation council global iso 17011 accreditation bodies ab certification labs must also meet iso 17025 lab accreditation requirements ensure consistent application certification requirements recognized tools mutual recognition arrangements mra iaf ilac others accreditation isasecure labs isa 17011 accreditation bodies ensures certificates issued isasecure labs globally recognized iec-62443 cybersecurity standards multi-industry standards listing cybersecurity protection methods techniques documents result iec standards creation process ansi/isa-62443 proposals inputs submitted country committees review done comments regarding changes submitted comments reviewed various iec 62443 committees comments discussed changes made agreed upon many members iec committees persons isa s99 committees date fundamental concepts original ansi/isa 62443 documents utilized iec 62443 certification schemes also established several global certification bodies defined scheme based upon referenced standards procedures describes test methods surveillance audit policy public documentation policies specific aspects program cybersecurity certification programs iec 62443 standards offered globally several recognized cbs including exida sgs-tüv saar tüv nord tüv rheinland tüv sud ul certx automation system market space cybersecurity certifications done exida global infrastructure established ensure consistent evaluation per standards impartial third party organizations called certification bodies cb accredited operate iso/iec 17065 iso/iec 17025 certification bodies accredited perform auditing assessment testing work accreditation body ab often one national ab country abs operate per requirements iso/iec 17011 standard contains requirements competence consistency impartiality accreditation bodies accrediting conformity assessment bodies abs members international accreditation forum iaf work management systems products services personnel accreditation international laboratory accreditation cooperation ilac laboratory accreditation multilateral recognition arrangement mla abs ensure global recognition accredited cbs ... | [
7553,
3843,
5636,
5764,
10756,
5002,
9356,
8206,
399,
9102,
3473,
6162,
7441,
7828,
8978,
11409,
10392,
5373,
5246,
9242,
4892,
5404,
2975,
2213,
8998,
939,
7979,
3629,
9646,
1711,
7855,
433,
1970,
5433,
10938,
7739,
3262,
9791,
4672,
111... | Test |
6,361 | 2 | TrueOS:trueos trueos formerly pc-bsd pcbsd unix-like server-oriented operating system built upon recent releases freebsd-current 2018 aimed easy install using graphical installation program easy ready-to-use immediately providing kde sc lumina lxde mate xfce desktop environment june 2018 developers announced trueos core os provides basis projects thus n't include graphical installer anymore graphical end-user-orientated oses based trueos ghostbsd trident trueos provides official binary nvidia intel drivers hardware acceleration optional 3d desktop interface kwin wine ready-to-use running microsoft windows software trueos able run linux software addition freebsd ports collection .txz package manager trueos supports openzfs installer offers disk encryption geli trueos founded freebsd professional kris moore early 2005 pc-bsd august 2006 voted beginner-friendly operating system osweekly.com first beta pc-bsd consisted gui installer get user running freebsd 6 system kde3 pre-configured major innovation time anyone wishing install freebsd would manually tweak run text installer kris moore goal make freebsd easy everyone use desktop since diverged even direction usability including additional gui administration tools .pbi application installers pc-bsd application installer management involved different approach installing software many unix-like operating systems including version 8.2 means pbidir website instead using freebsd ports tree directly although remained available pc-bsd used files .pbi filename extension push button installer double-clicked brought installation wizard program autobuild system tracked freebsd ports collection generated new .pbi files daily software packages dependencies installed inside .pbi files self-contained directories /programs convention aimed decrease confusion binary programs reside remove possibility package breaking system libraries upgraded changed prevent dependency hell october 10 2006 pc-bsd acquired enterprise-class hardware solution provider ixsystems ixsystems employs kris moore full-time developer leader project november 2007 ixsystems entered distribution agreement fry electronics whereby fry electronics stores nationwide carry boxed copies pc-bsd version 1.4 da vinci edition january 2008 ixsystems entered similar agreement micro center september 1 2016 pc-bsd team announced name operating system change trueos along rebranding project also became rolling release distribution based freebsd-current branch november 15 2016 trueos began transition freebsd rc.d openrc default init system apart gentoo/alt openrc initially developed major bsd based operating system using openrc july 2018 trueos announced would spin desktop edition separate project named project trident since version 7 pc-bsd began following numbering system freebsd since version 9.0 kde sc customized support tighter application integration .txz package management system longer desktop environment supported pc-bsd manual installation desktops xfce gnome technically possible earlier releases none supported earlier versions major functionality lost using pc-bsd special build kde sc starting version 9.0 pc-bsd added desktop environments including gnome xfce lxde mate pc-bsd used support amd64 i686 architectures support i686 dropped version 9.2 starting september 2016 rebranding pc-bsd trueos became rolling release distribution based freebsd current branch trueos package manager takes similar approach installing software many unix-like operating systems instead using freebsd ports tree directly although remains available trueos uses files .txz filename extension packages contain compiled ports autobuild system tracks freebsd ports collection generates new .txz files daily trueos package management system aims visually similar major operating systems microsoft windows apple macos applications installed single download link graphical prompts maintaining internally traditional .txz package management systems many unix-like systems use trueos package manager also takes care creating categorized links kde menu kde sc desktop 2014 pc-bsd project announced development new desktop environment scratch named lumina ken moore main developer lumina based qt toolkit july 2016 lumina web site desktop environment application development toolkit aims graphical interface uses plugins customization trueos originally licensed gnu general public license gpl developers impression applications using qt trueos uses interface development must licensed gpl q public license upon discovering fact restriction trueos developers later relicensed code bsd-like 3-clause license trueos trueos logo registered trademarks ixsystems inc new york city *bsd user group runs service named dmesgd provides user-submitted dmesg information different computer hardware laptops workstations single-board computers embedded systems virtual machines etc capable running trueos according trueos wiki trueos following hardware requirements uefi support amd64 added installer boot manager since version 10.1 default efi boot manager refind includes acpi detection setup root system description pointer rsdp extended system descriptor table xsdt root system description table rsdt pass-through values kernel new installation needed order install uefi support requires creation small fat partition current uefi support secure boot | [
10760,
10761,
2061,
9743,
7698,
8213,
8725,
6680,
4636,
9245,
9762,
5155,
5670,
7722,
5677,
1071,
1080,
5177,
9784,
10817,
3651,
7748,
8266,
5710,
7249,
3667,
6227,
9306,
6747,
607,
1632,
9320,
9324,
8816,
1138,
7794,
9844,
2168,
633,
831... | Test |
6,362 | 0 | Acoustic_model:acoustic model acoustic model used automatic speech recognition represent relationship audio signal phonemes linguistic units make speech model learned set audio recordings corresponding transcripts created taking audio recordings speech text transcriptions using software create statistical representations sounds make word modern speech recognition systems use acoustic model language model represent statistical properties speech acoustic model models relationship audio signal phonetic units language language model responsible modeling word sequences language two models combined get top-ranked word sequences corresponding given audio segment modern speech recognition systems operate audio small chunks known frames approximate duration 10ms per frame raw audio signal frame transformed applying mel-frequency cepstrum coefficients transformation commonly known mel frequency cepstral coefficients mfcc used input acoustic model along features recently use convolutional neural networks led big improvements acoustic modeling audio encoded different sampling rates i.e samples per second – common 8 16 32 44.1 48 96 khz different bits per sample common 8-bits 16-bits 24-bits 32-bits speech recognition engines work best acoustic model use trained speech audio recorded sampling rate/bits per sample speech recognized limiting factor telephony based speech recognition bandwidth speech transmitted example standard land-line telephone bandwidth 64 kbit/s sampling rate 8 khz 8-bits per sample 8000 samples per second 8-bits per sample 64000 bit/s therefore telephony based speech recognition acoustic models trained 8 khz/8-bit speech audio files case voice ip codec determines sampling rate/bits per sample speech transmission codecs higher sampling rate/bits per sample speech transmission improve sound quality necessitate acoustic models trained audio data matches sampling rate/bits per sample speech recognition standard desktop pc limiting factor sound card sound cards today record sampling rates 16 khz-48 khz audio bit rates 8 16-bits per sample playback 96 khz general rule speech recognition engine works better acoustic models trained speech audio data recorded higher sampling rates/bits per sample using audio high sampling rate/bits per sample slow recognition engine compromise needed thus desktop speech recognition current standard acoustic models trained speech audio data recorded sampling rates 16 khz/16bits per sample | [
9798,
9898,
10557,
3998
] | Validation |
6,363 | 4 | Stockade_(software):stockade software stockade tcp-layer blocking tool written c++ denies tcp/ip access registered ip addresses using ipfw packet filter targets spam prevention may also used attackers e.g brute force password crackers approach leverages superior determination exhibited legitimate senders respect may considered similar greylisting originally authors conceived mt proxy rate-limit smtp connections messages believed spam worked adding dummynet rule frequent senders sending messages triggered unreliable statistical analysis key limitation original scheme consumption local resources smtp proxy stockade approach introduces notion inbound tcp connection may rejected random probability proportional level spam already seen connection ’ originator configurable period time probability subject decay configured halving time period ip address eventually rehabilitated way stockade provides fully automatic spam mitigation | [
9824,
6916,
4772,
3717,
10341,
7983,
9909,
1273,
10906,
2045
] | Test |
6,364 | 4 | Stateful_firewall:stateful firewall computing stateful firewall network firewall tracks operating state characteristics network connections traversing firewall configured distinguish legitimate packets different types connections packets matching known active connection allowed pass firewall stateful packet inspection spi also referred dynamic packet filtering security feature often included business networks stateful firewall technology introduced check point software firewall-1 product 1994 development stateful firewalls firewalls stateless stateless firewall treats network frame packet individually packet filters operate osi network layer layer 3 function efficiently look header part packet keep track packet context nature traffic firewall way knowing given packet part existing connection trying establish new connection rogue packet modern firewalls connection-aware state-aware offering network administrators finer-grained control network traffic classic example network operation may fail stateless firewall file transfer protocol ftp design protocols need able open connections arbitrary high ports function properly since stateless firewall way knowing packet destined protected network host destination port 4970 example part legitimate ftp session drop packet stateful firewalls application inspection solve problem maintaining table open connections inspecting payload packets intelligently associating new connection requests existing legitimate connections early attempts producing firewalls operated application layer top seven-layer osi model method required exorbitant amounts computing power commonly used modern implementations stateful firewall keeps track state network connections tcp streams udp communication able hold significant attributes connection memory attributes collectively known state connection may include details ip addresses ports involved connection sequence numbers packets traversing connection stateful inspection monitors incoming outgoing packets time well state connection stores data dynamic state tables cumulative data evaluated filtering decisions would based administrator-defined rules also context built previous connections well previous packets belonging connection cpu intensive checking performed time setup connection entries created tcp connections udp streams satisfy defined security policy packets session processed rapidly simple fast determine whether belongs existing pre-screened session packets associated sessions permitted pass firewall sessions match policy denied packets match existing table entry order prevent state table filling sessions time traffic passed certain period stale connections removed state table many applications therefore send keepalive messages periodically order stop firewall dropping connection periods user-activity though firewalls instructed send messages applications depending connection protocol maintaining connection state less complex firewall example tcp inherently stateful protocol connections established three-way handshake syn syn-ack ack ended fin fin-ack ack exchange means packets syn header received firewall interpreted open new connections service requested client available server respond syn-ack packet firewall also track firewall receives client ack response transfers connection established state connection authenticated bidirectionally allows tracking future packets established connection simultaneously firewall drops packets associated existing connection recorded state table syn packets preventing unsolicited connections protected machine black hat hacking connection protocols namely udp icmp based bidirectional connections like tcp making stateful firewall somewhat less secure order track connection state cases firewall must transfer sessions established state seeing first valid packet track connection addresses ports following packets source destination unlike tcp connections closed fin ack exchange connectionless protocols allow session end time-out example enables udp hole punching keeping track connection state stateful firewalls provide added efficiency terms packet inspection existing connections firewall need check state table instead checking packet firewall rule set extensive additionally case match state table firewall need perform deep packet inspection packet filtering alone regarded providing enough protection order effectively block peer-to-peer-related network traffic needed firewall application filtering regarded extension stateful packet inspection stateful packet inspection determine type protocol sent port application-level filters look protocol used example application-level filter might able tell difference http traffic used access web page http traffic used file sharing whereas firewall performing packet filtering would treat http traffic equally application layer firewalls generally slower stateful inspection application-layer firewalls sometimes implemented using application proxies two tcp connections established one packet source firewall another firewall packet destination application proxies intercept arriving packets behalf destination examine application payload relay permitted packets destination suspicious data dropped client server never communicate directly proxies necessarily involve protocol stack overhead inspecting packets network layer furthermore unique proxy required application proxy firewalls less flexible slower upgrade stateful inspection firewalls nevertheless application-level proxies application-aware proxies easily handle complex protocols like h.323 sip used videoconferencing voip voice ip risk vulnerabilities individual protocol decoders could allow attacker gain control firewall concern highlights need keep firewall software updated stateful firewalls also raise possibility individual hosts tricked soliciting outside connections possibility completely eliminated auditing host software firewalls defeated way simply viewing web page either javascript enabled clicking button | [
2049,
2563,
521,
8211,
10271,
9764,
550,
10790,
8753,
569,
5178,
9279,
2118,
8265,
2136,
9318,
8816,
4725,
5749,
10872,
10889,
6797,
1172,
11413,
3742,
3243,
1708,
4268,
10924,
10417,
7859,
2228,
3770,
10433,
7364,
11468,
4814,
9423,
7376,
... | None |
6,365 | 6 | OrangeFS:orangefs orangefs open-source parallel file system next generation parallel virtual file system parallel file system type distributed file system distributes file data across multiple servers provides concurrent access multiple tasks parallel application orangefs designed use large-scale cluster computing used companies universities national laboratories similar sites worldwide orangefs emerged development branch pvfs2 much history shared history pvfs spanning twenty years extensive history behind orangefs summarized time line development branch new direction development orangefs branch begun 2007 leaders pvfs2 user community determined orangefs often described next generation pvfs2 | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
2555,
7225,
1594,
11323,
8772,
7248,
1109,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7... | Test |
6,366 | 8 | Web_Services_for_Remote_Portlets:web services remote portlets web services remote portlets wsrp oasis-approved network protocol standard designed communications remote portlets wsrp specification defines web service interface interacting presentation-oriented web services initial work produced joint efforts web services interactive applications wsia web services remote portlets wsrp oasis technical committees approval wsrp v1 oasis standard september 2003 two technical committees merged continued work web services remote portlets wsrp oasis technical committee scenarios motivate wsrp functionality include wsrp specification make statements implementation java portlet specification jsr 168 wsrp competing technologies jsr 168 may used define portlet wsrp may used define portlet operations remote containers jsr 168 portlets wsrp may used together define portlet provide remote operations similarly .net portlets may created use wsrp interoperability jsr 168 .net wsrp implementations demonstrated several wsrp implementations assist developers first release wsrp v1 provided limited interoperability platform versions wsrp v1 abandoned effort could concentrated wsrp v2 wsrp v2 augments initial standard cross-portlet coordination access management features major update standard permits useful integration multiple content sources regardless whether local remote new web application addition wsrp v2 supports web 2.0 technologies ajax rest without requiring wsrp v2 approved oasis april 1 2008 | [
1802,
10506,
9229,
11154,
1556,
10020,
10026,
7212,
10284,
4658,
9012,
2485,
1468,
4797,
8644,
7878,
11466,
3920,
5849,
5593,
865,
1250,
7784,
9834,
8689,
9841,
4979,
3573,
3323,
124,
9726
] | Validation |
6,367 | 7 | G_Suite:g suite g suite formerly google apps work google apps domain brand cloud computing productivity collaboration tools software products developed google first launched august 28 2006 google apps domain g suite comprises gmail hangouts calendar google+ communication drive storage docs sheets slides forms sites collaboration depending plan admin panel vault managing users services also includes digital interactive whiteboard jamboard app development platform app maker services free use consumers g suite adds enterprise features custom email addresses domain yourcompany.com option unlimited cloud storage depending plan number members additional administrative tools advanced settings well 24/7 phone email support based google data centers data information saved instantly synchronized data centers backup purposes unlike free consumer-facing services g suite users see advertisements using services information data g suite accounts get used advertisement purposes furthermore g suite administrators fine-tune security privacy settings g suite 4 million paying businesses 70 million g suite education users february 10 2006 google started testing gmail domain san jose city college hosting gmail accounts sjcc domain addresses admin tools account management august 28 2006 google launched google apps domain set apps organizations available free beta service included gmail google talk google calendar google page creator later replaced google sites dave girouard google vice president general manager enterprise outlined benefits business customers organizations let google experts delivering high quality email messaging web-based services focus needs users day-to-day business google announced edition schools known google apps education october 10 2006 february 22 2007 google introduced google apps premier edition differed free version offering storage 10 gb per user apis business integration 99.9 uptime gmail 24/7 phone support cost 50 per user account per year according google early adopters google apps premier edition included procter gamble san francisco bay pediatrics salesforce.com additionally editions google apps able use google documents spreadsheets users could access gmail blackberry mobile devices administrators gained application control enhancements came june 25 2007 google added number features google apps including mail migration external imap servers shared address books visual overhaul google docs google sheets increased gmail attachment size zdnet article noted google apps offered tool switching popular exchange server lotus notes positioning google alternative microsoft ibm october 3 2007 month acquiring postini google announced startup email security compliance options added google apps premier edition customers ability better configure spam virus filtering implement retention policies restore deleted messages give administrators access emails google introduced google sites february 28 2008 google sites provided simple new google apps tool creating intranets team websites june 9 2009 google launched google apps sync microsoft outlook plugin allows customers synchronize email calendar contacts data outlook google apps less month later july 7 2009 google announced services included google apps—gmail google calendar google docs google talk—were beta google opened google apps marketplace march 9 2010 online store third-party business applications integrate google apps make easier users software business cloud participating vendors included intuit appirio atlassian july 26 2010 google introduced edition governments then-known google apps government designed meet public sector unique policy security needs also announced google apps become first suite cloud applications receive federal information security management act fisma certification accreditation nearly five years launch google apps april 26 2011 google announced organizations 10 users longer eligible free edition google apps would sign paid version known google apps business flexible billing plan also introduced giving customers option paying 5 per user per month contractual commitment march 28 2012 google launched google vault optional electronic discovery archiving service google apps business customers april 24 2012 google introduced google drive platform storing sharing files google apps business user given 5gb drive storage option purchase later year google announced free version google apps would longer available new customers google unified storage drive gmail may 13 2013 giving google apps customers 30gb total shared across apps march 10 2014 google launched google apps referral program offers participating individuals 15 referral bonus new google apps user refer google june 25 2014 announced drive work new google apps offering featuring unlimited file storage advanced audit reporting new security controls 10 per user per month google enterprise company business product division officially renamed google work september 2 2014 eric schmidt google executive chairman said never set create traditional 'enterprise business—we wanted create new way work ... time come name catch ambition google announced google apps would rebranded g suite september 29 2016 october 25 2016 google launched first hardware product g suite jamboard 55-inch digital whiteboard connected cloud g suite comprises gmail hangouts calendar drive storage docs sheets slides forms sites collaboration admin panel vault managing users services basic plan includes email addresses custom domains yourcompany.com video voice calls calendars 30gb storage collaborative documents spreadsheets presentations sites controls security privacy 24/7 phone email support business plan adds vault ediscovery enables many additional custom features including advanced admin controls drive unlimited storage 1tb per user fewer 5 users drive audit reporting insights drive content sharing custom message retention policies us 50 per account per year us 5 per account per month official prices affiliates give discount codes 20 first year gmail web-based email service launched limited beta release april 2004 1 billion active consumer users worldwide february 2016 become popular giving users large amounts storage space threaded conversations robust search capabilities part g suite gmail comes additional features designed business use including google drive file storage synchronization service launched april 24 2012 official announcement described drive place create share collaborate keep stuff google drive users upload type file cloud share others access computer tablet smartphone users sync files device cloud apps microsoft windows apple macos computers android ios smartphones tablets part g suite google drive comes additional features designed business use including google docs google sheets google slides respectively word processor spreadsheet presentation program three programs originate company acquisitions 2006 today integrated google drive serve collaborative software allow users view edit documents spreadsheets presentations together real-time web browser mobile device changes saved automatically revision history keeping track changes also capability set user permission levels designate view comment edit document well permissions download specific document google forms meanwhile tool allows collecting information users via personalized survey quiz information collected automatically connected spreadsheet spreadsheet populated survey quiz responses june 2014 google introduced office support google docs sheets slides without need file conversion writing techcrunch frederic lardinois wrote google clearly positioning apps affordable solutions companies need occasionally edit office files part g suite google docs slides come additional features designed business use including unlimited revision history g suite also garnered strong following education 70 million users 2017 google forms survey application forms features collaboration sharing features found docs sheets slides also used create quizzes including specialized functions use educational settings google sites creation tool allows multiple people create edit websites without requiring coding knowledge web design skills introduced february 2008 effort help customers quickly gather variety information one place – including videos calendars presentations attachments text – easily share viewing editing small group entire organization world google calendar online calendar intended help keep track time schedules launched april 2006 integrates gmail users easily add events email messages directly calendar part g suite google calendar comes additional features designed business use including google apps domain launched 2006 google talk used communication later replaced may 2013 google hangouts messaging service incorporates technology different communication services google developed hangouts supports text voice video conversations video 25 participants cross-platform web android ios july 2014 google announced hangouts would covered 99.9 uptime guarauntee gmail google drive well 24/7 phone email support part g suite google hangouts comes additional features designed business use including invite-only quietly releasing ios app february 2017 google formally launched hangouts meet march 2017 service unveiled video conferencing app 30 participants described enterprise-friendly version hangouts launch featured web app android app ios app features g suite users include google hangouts meet standards-based video conferencing application using proprietary protocols video audio data transcoding google partnered pexip provide interoperability google protocol standards-based sip/h.323 protocols enable communications hangouts meet video conferencing equipment software google+ used let team members engage communicate deeper level stream featuring posts comments communities based common goals makes easy anyone discuss share ideas matter team level location features collections make easy group posts topic order users show know follow matters part g suite google+ comes additional features designed business use including google+ g suite continues available even consumer version google+ shut april 2 2019 google keep note-taking service variety tools notes including text lists voice images google keep became part g suite february 2017 part g suite google keep comes additional features designed business use including google vault archiving electronic discovery service exclusively available g suite customers announced march 28 2012 vault gives users easy-to-use cost-effective solution managing information critical business preserving important data google stating reduce costs litigation regulatory investigation compliance actions saving managing gmail messages chat logs ability search manage data based filters terms dates senders recipients labels update june 2014 let vault customers search preview copy export files google drive october 2016 google announced jamboard first hardware product designed g suite jamboard digital interactive whiteboard enables collaborative meetings brainstorming jamboard connected cloud enables people different locations work together real-time multiple jamboards connected remotely smartphone companion app jamboard recognizes different touch inputs using stylus sketch eraser start require batteries pairing jamboard 55-inch 4k display built-in hd camera speakers wi-fi g suite marketplace formerly google apps marketplace launched 2010 online store business-oriented cloud applications augment g suite functionality marketplace lets administrators browse purchase deploy integrated cloud applications comprises business tools productivity education communication utilities categories september 2014 google released blog post saying employees would able install third-party apps marketplace without involving administrators introduced february 2017 google cloud search enables unified search experience g suite cloud search lets users search information across entire g suite product lineup users also search contacts results including person contact details well events files common cloud search mobile app features assist cards described google new way help find right information right time using google machine intelligence technology cards help prepare upcoming meeting even suggest files need attention google states cloud search respects file-sharing permissions meaning users see results files access initial global roll-out cloud search introduced functionality g suite business enterprise customers google stating functionality added time including support third-party applications introduced july 2017 hire job applications management tool developed google used combination g suite tool lets employers track job candidates contact information well résumés calendar invitations allows business partners share feedback candidates job applicants choose information share potential employers tool designed businesses based united states fewer 1,000 employees integrates google services gmail sending messages google calendar tracking schedules google sheets overview candidates google hangouts initial conversations google introduced work insights september 2018 administrators see departments using google products google states collect scan use g suite data advertising purposes display ads g suite education government core services furthermore states data companies schools government agencies put g suite services belong google whether corporate intellectual property personal information homework assignment google data google sell data third parties data stored google data centers built custom-designed servers run operating system security performance 550 full-time security privacy professionals blog post google stated benefits using g suite included disaster recovery data information simultaneously replicated two data centers one data center fails nearly instantly transfer data one also reflecting actions though acknowledging backup solution us anyone else absolutely perfect google states invested lot effort help make second none encryption specifically aes 128-bit stronger applied data stored data centers transit data centers users data centers introduction june 2014 techcrunch reported google drive part g suite offers enterprise-grade security compliance including ssae 16 isae 3402 type ii soc 2-audit certification adherence safe harbor privacy principles support industry-specific requirements like health insurance portability accountability act hipaa google 3 million businesses paying g suite 70 million g suite education users september 2014 amit singh then-president then-named google work stated 60 percent fortune 500 companies paying service 1,800 customers signing week notable companies using g suite include uber allsaints buzzfeed design within reach pwc march 2014 google announced google apps referral program united states canada program lets users receive money coupons incentives referring customers g suite december 2014 google introduced google work education partner program program combined existing individual programs apps chrome cloud platform maps search one overall program allows partners better sell service innovate across google work education suite products platforms august 2011 review pc world tony bradley wrote value rival platform google apps hinges compatible microsoft office formatting conventions file types praising google gone great lengths improve fidelity microsoft office n't gone far enough criticizing many features reformatted including tables contents footnotes inserted images bradley praised google collaborative apps writing besting microsoft offers office 365 regarding price wrote google package best value annual pricing 50 per user per year makes third less per user per year office 365 yet boasts equivalent functionality sufficient small medium organizations gary marshall techradar commented 2016 office tries everything imaginable google suite much basic said much powerful package debuted 2006 emphasis simplicity speed remains marshall wrote would n't want craft massive complicated manuscript google docs n't docs designed fast user-friendly way create everyday documents share colleagues clients fellow service google sheets covers common excel functions ... n't power microsoft offering marshall praised collaboration effortless praised importing external file formats making editable collaborative big selling point pc magazine eric grevstad wrote online get adding configuring work offline rigmarole stated package illustration software version 80/20 rule ... 80 percent users never need 20 percent features stated comparing g suite office 2016 like bringing handgun cannon fight ... microsoft pc-based suite designed almost every feature anyone might ever need google online suite designed features people use daily tom hardware james gaskin wrote like google products claim cleanest minimal interface market suite except office 365 get close ease collaboration google provides even microsoft product trails wide margin changes appear real-time word 2016 apps conclusively wrote progress made first google app release considerable world moves mobile computing google distinct advantage tradition dies hard build basic documents spreadsheets presentations remain tied desktops laptops time google+ launched many articles published emphasized presence google+ helped business google search result rankings particularly public-facing pages +1 buttons pushed effective marketing strategies however writing new york times quentin hardy said sour grapes version google plus ’ getting anything like buzz traffic facebook google figuring ways make service relevant however hardy note integration google+ popular google services including hangouts meant ’ still early ’ easy see could efficient way bring workers virtual meeting collaborate embed calendar future work commitments follow-up result key competitor google suite microsoft office 365 microsoft cloud-based offering businesses includes similar products key differences pricing plans storage space number features noted techrepublic 2013 pricing plans differ google apps quick easy pricing plan standard google apps business package 5 per user per month 50 per user per year ... contrast office 365 multitude plans six september 2013 good bad since provides flexibility also involves complexity figure best choice storage space varies office 365 gives users 50 gb space outlook 1 tb onedrive google apps provides 30 gb space spread among gmail drive picasa regarding features states office 365 advantage plenty users familiar word excel rest gang years less learning curve google apps latter represents brand new experience ... however also true office notorious loaded complex unused features cause confusion familiarity many embrace also comes something price especially companies paying advanced packages employees use contrast google apps programs fairly easy learn intuitive may feel awkward hard-coded work office stephen shankland cnet wrote 2014 hard compare google apps success microsoft office since google n't release revenue user figures microsoft 60 million commercial customers signed office 365 product offering 50,000 small business customers added office 365 month | [
4096,
1539,
4621,
526,
4623,
3600,
8719,
7700,
10265,
9244,
5662,
5666,
9766,
39,
5159,
10284,
3629,
3121,
3633,
5681,
10820,
4683,
590,
79,
1102,
3664,
5202,
7248,
11343,
8285,
2658,
4194,
5732,
8821,
2679,
4728,
2170,
9347,
7816,
4236,
... | None |
6,368 | 4 | Charlie_Miller_(security_researcher):charlie miller security researcher charles alfred miller american computer security researcher cruise automation prior current employment spent five years working national security agency worked uber miller holds bachelors mathematics minor philosophy northeast missouri state truman state university ph.d. mathematics university notre dame 2000 currently lives wildwood missouri miller publicly demonstrated many security exploits apple products 2008 10,000 cash prize hacker conference pwn2own vancouver british columbia canada first find critical bug macbook air following year 5,000 cracking safari 2009 collin mulliner demonstrated sms processing vulnerability allowed complete compromise apple iphone denial-of-service attacks phones 2011 found security hole iphone ipad whereby application contact remote computer download new unapproved software execute command could steal personal data otherwise using ios applications functions malicious purposes proof concept miller created application called instastock approved apple app store informed apple security hole promptly expelled app store miller participated research discovering security vulnerabilities nfc near field communication also published three books miller along chris valasek widely known remotely hacking 2014 jeep cherokee controlling braking steering acceleration vehicle | [
9732,
9063,
2409,
2508,
7887,
9424,
918,
3643,
2558
] | Validation |
6,369 | 2 | Research_Unix:research unix research unix refers early versions unix operating system dec pdp-7 pdp-11 vax interdata 7/32 8/32 computers developed bell labs computing sciences research center term research unix first appeared bell system technical journal vol 57 6 pt 2 jul/aug 1978 distinguish versions internal bell labs pwb/unix mert whose code-base diverged primary csrc version however term little-used version 8 unix retroactively applied earlier versions well prior v8 operating system commonly called simply unix caps unix time-sharing system licensed version 5 educational institutions version 6 also commercial sites schools paid 200 others 20,000 discouraging commercial use version 6 widely used version 1980s research unix versions often referred edition manual describes early versions last never officially released outside bell labs grew organically first research unix would first edition last tenth edition another common way referring version x v x unix x manual edition modern editions unix—excepting unix-like implementations coherent minix linux—derive 7th edition starting 8th edition versions research unix close relationship bsd began using 4.1cbsd basis 8th edition usenet post 2000 dennis ritchie described later versions research unix closer bsd unix system v also included bsd code 2002 caldera international released unix v1 v2 v3 v4 v5 v6 v7 pdp-11 unix 32v vax foss permissive bsd-like software license 2017 unix heritage society alcatel-lucent usa inc. behalf nokia bell laboratories released v8 v9 v10 condition assert copyright rights respect non-commercial copying distribution performance display creation derivative works research unix®1 editions 8 9 10 | [
2560,
7682,
9735,
8725,
1561,
7224,
9784,
1594,
2120,
6218,
3659,
9298,
2132,
1109,
11363,
6760,
9320,
8306,
633,
5759,
640,
2179,
132,
6787,
3206,
2198,
3222,
6812,
671,
7848,
3241,
3248,
2233,
7356,
10436,
2253,
9946,
9444,
9452,
4333,
... | Test |
6,370 | 2 | Composite_UI_Application_Block:composite ui application block composite ui application block cab addition microsoft .net framework creating complex user interfaces made loosely coupled components developed microsoft patterns practices team cab used exclusively developing windows forms derivative version cab exists web client mobile client software factories well encourages developer use either model-view-controller model-view-presenter architectural pattern encourage reuse individual user controls referred cab smartparts coupling underlying data elements presentation code part foundation smart client software factory another patterns practices deliverable also part mobile client software factory version smart client software factory use .net compact framework 2.0 | [
10243,
10769,
9234,
1043,
1055,
2083,
8227,
1577,
2603,
4143,
9263,
11316,
1077,
8246,
4174,
4178,
9813,
603,
2145,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
5259,
653,
3224,
4771,
7846,
10414,
8391,
214,
9943,
9434,
2783,
736,
432... | Test |
6,371 | 2 | List_of_live_CDs:list live cds list live cds live cd live dvd cd-rom dvd-rom containing bootable computer operating system live cds unique ability run complete modern operating system computer lacking mutable secondary storage hard disk drive directly based debian large number live cds based knoppix list derivatives section knoppix article based least partially ubuntu based debian microsoft representatives described third-party efforts producing windows-based live cds improperly licensed uses windows unless used solely rescue properly licensed installation however nu2 productions believes use bartpe legal provided one windows license purchased bartpe cd windows license used nothing else systems based former open source os/net nevada onnv open source project sun microsystems illumos fork former opensolaris onnv aiming develop onnv replacing closed source parts remaining binary compatible following products based upon illumos | [
11648,
516,
2180,
8837,
3079,
5895,
1802,
2064,
10896,
11410,
2967,
8727,
3097,
8857,
10394,
4637,
7840,
3745,
6049,
9377,
292,
6436,
8998,
6055,
10920,
6445,
7983,
9910,
823,
8119,
5177,
8248,
3643,
8124,
9407,
576,
8005,
3147,
1485,
980... | None |
6,372 | 4 | File_integrity_monitoring:file integrity monitoring file integrity monitoring fim internal control process performs act validating integrity operating system application software files using verification method current file state known good baseline comparison method often involves calculating known cryptographic checksum file original baseline comparing calculated checksum current state file file attributes also used monitor integrity generally act performing file integrity monitoring automated using internal controls application process monitoring performed randomly defined polling interval real-time changes configurations files file attributes across infrastructure common hidden within large volume daily changes impact file configuration integrity changes also reduce security posture cases may leading indicators breach progress values monitored unexpected changes files configuration items include multiple compliance objectives indicate file integrity monitoring requirement several examples compliance objectives requirement file integrity monitoring include examples include | [
2432,
2656,
7809,
11429,
4423,
9420,
687,
7983,
11664,
9650,
1907,
5780,
4471,
7192,
3353,
186,
8471,
127
] | Test |
6,373 | 4 | Secure_coding:secure coding secure coding practice developing computer software way guards accidental introduction security vulnerabilities defects bugs logic flaws consistently primary cause commonly exploited software vulnerabilities analysis thousands reported vulnerabilities security professionals discovered vulnerabilities stem relatively small number common software programming errors identifying insecure coding practices lead errors educating developers secure alternatives organizations take proactive steps help significantly reduce eliminate vulnerabilities software deployment buffer overflows common software security vulnerability happen process tries store data beyond fixed-length buffer example 8 slots store items problem attempt store 9 items computer memory overflowed data may overwrite data next location result security vulnerability stack smashing program termination segmentation fault example c program prone buffer overflow int vulnerable_function char large_user_input user input larger destination buffer buffer overflow occur fix unsafe program use strncpy prevent possible buffer overflow int secure_function char user_input another secure alternative dynamically allocate memory heap using malloc char secure_copy char src code snippet program attempts copy contents src dst also checking return value malloc ensure enough memory able allocated destination buffer format string attack malicious user supplies specific inputs eventually entered argument function performs formatting printf attack involves adversary reading writing stack c printf function writes output stdout parameter printf function properly formatted several security bugs introduced program vulnerable format string attack int vulnerable_print char malicious_input malicious argument passed program could “ ” crash program improper memory reads integer overflow occurs arithmetic operation results integer large represented within available space program properly check integer overflow introduces potential software bugs exploits function c++ attempts confirm sum x less equal defined value max bool sumisvalid_flawed unsigned int x unsigned int problem code check integer overflow addition operation sum x greater maximum possible value codice_1 addition operation overflow perhaps result value less equal max even though sum x greater max function checks overflow confirming sum greater equal x sum overflow sum would less x less y. bool sumisvalid_secure unsigned int x unsigned int | [
899,
5636,
10756,
9607,
9356,
9488,
3473,
8978,
5245,
10392,
1689,
5246,
5373,
4892,
5404,
2975,
2084,
2213,
8998,
939,
3629,
9646,
3887,
5040,
7855,
1970,
11567,
7734,
5433,
7739,
3262,
9791,
1474,
3525,
7368,
9160,
5325,
4435,
2262,
636... | None |
6,374 | 0 | Language_Computer_Corporation:language computer corporation language computer corporation lcc natural language processing research company based richardson texas company develops variety natural language processing products including software question answering information extraction automatic summarization since founding 1995 low-profile company landed significant united states government contracts 8,353,476 contracts 2006-2008 company focused primarily government software market lcc also used technology spin three start-up companies first spin known lymba corporation markets poweranswer question answering product originally developed lcc 2010 lcc ceo andrew hickl co-founded two start-ups made use company technology included swingly automatic question answering start-up extractiv information extraction service founded partnership houston texas-based 80legs | [
1890,
7780,
5197,
11538,
2459
] | Validation |
6,375 | 4 | InSSIDer:inssider inssider wi-fi network scanner application microsoft windows os x developed metageek llc received awards 2008 infoworld bossie award best open source software networking inssider 3 longer open-source inssider began replacement netstumbler popular windows wi-fi scanner actively developed several years reputedly work modern 64-bit operating systems versions windows higher windows xp project inspired charles putney code project | [
231,
6797,
4174,
7983,
61,
7411,
3573,
7222,
2045,
2430
] | Test |
6,376 | 8 | Baynote:baynote baynote san jose california-based software company offering web search recommendation software service products based concept wisdom crowd also known collective intelligence search results ranked based analysis links pages visited users past september 2016 kibo software inc. announced purchased baynote undisclosed amount | [
467,
119
] | Test |
6,377 | 3 | System_7:system 7 system 7 codenamed big bang sometimes retrospectively called mac os 7 graphical user interface-based operating system macintosh computers part classic mac os series operating systems introduced may 13 1991 apple computer inc succeeded system 6 main macintosh operating system succeeded mac os 8 1997 features added system 7 release included virtual memory personal file sharing quicktime quickdraw 3d improved user interface release version 7.6 1997 apple officially renamed operating system mac os name first appeared system 7.5.1 boot screen system 7 developed macs used motorola 680x0 line processors ported powerpc apple adopted new processor 1994 introduction power macintosh development macintosh system software system 6 followed fairly smooth progression addition new features relatively small changes upgrades time major additions fairly limited notably adding color quickdraw system 6 perspective scope changes seen examining official system documentation inside macintosh initially shipped three volumes adding another describe changes introduced mac plus another mac ii mac se limited changes meant original macintosh system remained largely initially introduced machine geared towards single user task running floppy disk based machine extremely limited ram however many assumptions model longer appropriate notable among single-tasking model replacement first examined 1986 switcher replaced outright multifinder system 5 running multifinder normally required larger amount ram hard drive became common late 1980s additions relatively limited fixes underlying oddities system architecture instance support limited form multitasking original mac os supported small co-resident programs known desk accessories installed system using special tools system able support multiple tasks one-off solution would longer needed — desk accessories could simply small programs placed anywhere yet multifinder still optional step taken numerous examples sort problem could found throughout system finally widespread adoption hard drives local area networks led number new features requested users developers late 1980s list new upgrades suggested changes existing model considerable march 1988 shortly release system 6 technical middle managers apple held offsite meeting plan future course mac os development ideas written index cards features seemed simple enough implement short term like adding color user interface written blue cards longer-term goals like true multitasking pink cards far ideas like object-oriented file system red cards development ideas contained blue pink cards proceed parallel first two projects known simply blue pink including taligent apple intended blue team came call blue meanies characters yellow submarine release updated version existing macintosh operating system 1990–1991 time-frame pink team release entirely new os around 1993 blue aimed relatively simple upgrades feature list reads degree sort system 6 corrected underlying os number formerly optional components made mandatory furthermore number oddities original system typically included due limited resources finally changed use basic underlying os features system also offered wide variety new features system 7 first apple operating system available compact disc although shipped set 15 floppy disks initially unlike earlier systems system 7 come bundled major software packages newly purchased macintosh computers system 7 installed often bundled software hypercard ease mouse practice later macintosh performa family added various software bundles including clarisworks new grolier multimedia encyclopedia microsoft bookshelf spectre vr power pete since system 7 introduced internet came popular attention software mactcp freeppp netscape included first later available disk internet service providers bundled books adam c. engst internet starter kit macintosh power macintosh machines also included nucalc graphing calculator system 7 also includes appletalk networking file sharing software form system extensions control panels basic utilities installed default system 7 include teachtext replaced simpletext later versions basic text editing tasks reading readme documents also available additional disk tools floppy disk disk first aid disk repair apple hd sc setup initializing partitioning disks later versions system 7 specifically system 7.5 mac os 7.6 come dedicated utilities folder apple extras folder including applescript disk copy quickdraw gx extras quicktime movie player optional extras utilities could manually installed system cd system 7.1.2 first version macintosh system software support apple new powerpc-based computers 68k applications yet updated run natively systems emulated transparently without user intervene built-in 68k processor emulator fat binaries contained code necessary run natively powerpc 68k systems became common time process similar distribution universal binaries apple transition intel processors 2006 system 7.0 7.1 offered utility called apple file exchange could access contents fat- apple ii — formatted floppy disks system 7 pro system 7.5 shipped pc exchange previously separate product allowed system mount fat-formatted floppy disks desktop manner regular macintosh disks os/2 disks read pc dos disks due fact os/2 used fat file system time macs could also read write unix file systems help extra software system 7 allowed users access pc networks allowed communication via tcp/ip compatible networking stacks actual pc software compatibility however required third party software softpc allowed ms-dos early microsoft windows programs run connectix virtual pc allowed mac run windows via full pc emulation pc compatibility solutions took native approach running windows ms-dos using x86 expansion cards x86 chip card apple offered systems configured way marketed dos compatible —a card dedicated x86 cpu ram used mac hard drive sound subsystem networking input provided services pc pc could run simultaneously mac user could switch two fashion similar kvm switch earliest systems 680x0 based systems running system 7 system 7 provided support accessing pc volume mac pc exchange software actual control pc hardware accomplished way control panels time release many users noticed performance suffered result upgrading system 6 system 7 though newer hardware soon made speed difference another problem system 7 large memory footprint system 6 could boot system single 800k floppy disk took ram whereas system 7 used well megabyte time average mac shipped enough ram built system 7 truly comfortable system 7 first system release could longer usefully run floppy-only systems although macintosh models sold time included hard disk standard equipment owners older models required upgrade buying either new mac external scsi hard disk drive wished run system 7 order take advantage system 7 virtual memory feature macintosh equipped paged memory management unit pmmu required motorola 68030 cpu one built-in one added motherboard motorola 68020-equipped macintosh ii macintosh model using 68020 macintosh lc use virtual memory apple introduced 68030-equipped macintosh lc ii shortly system 7 introduction despite newer processor lcii retained earlier model 16-bit bus perform faster lc replaced despite setbacks system 7.0 adopted quite rapidly mac users quickly became one base requirements new software engineering group within apple responsible system 7 came known blue meanies named blue index cards written features could implemented relatively short time part apple operating system strategy comparison pink index card features handled pink group later becoming ill-fated taligent project system 7.0 last version macintosh operating system available charge could freely redistributed although system 7 could purchased apple cost nominal considered cover duplication media common macintosh dealers allow customers use store demo machines copy system 7 install disks cost box floppies cd-rom magazines nautilus included system 7 disks mac users downloaded thousands copies system 7 online services aol compuserve genie apple surveyed services based popularity started selling mac os retail product system 7.1 apple continued charging major operating system upgrades release os x mavericks 2013 soon initial release system 7 7.0.1 minor update released october 1991 patch called system 7 tune-up also followed fixed disappearing files bug system would lose files added minimum preferred memory allotments application get info box august 1992 7.1 update released first version system software apple charged money change david pogue wrote new 7.1 fonts folder replaced often time-consuming method dragging fonts system file introduced system 7.0 also replaced font/da mover application system 6 could also used 7.0 system 7.1 also included lot internal changes support internationalization dates time numbers also first version support enablers removed requirement release new version system software every time new hardware released set specialized versions 7.1 ranging 7.1p1 7.1p6 excluding 7.1p4 created included various performa models already available released 7.1 specialized versions included ease launcher changes integrated later versions system software first major upgrade system 7.1.1 also known system 7 pro release bundle 7.1 applescript tools quicktime apple open collaboration environment aoce system 7 trouble running slightly older machines due memory footprint system 7 pro barely fit macintosh computers time commonly used minor bug fixes rather new functionality apple joined aim alliance apple ibm motorola shortly release system 7 1991 started work powerpc-based machines later became power macintosh family support machines resulted system 7.1.2 system 7.1.2 never offered retail sale shipped first batches powerpc macs 68k version shipped small number quadra 600 series systems later shipments shipped system 7.5 instead system 7.1.2p 7.1.2 shipped performa 630 lc 630 quadra 630 models released july november 1994 next major release system 7.5 included bug fixes previous updates added several new features including system 7.5 codenamed capone reference al capone chicago code name microsoft windows 95 also name default system font used mac os version 8 system 7.5.1 primarily bug fix 7.5 also introduced new mac os startup screen preparation mac clones system 7.5.2 released first pci-based power macs notable introducing apple new networking architecture open transport system 7.5.3 major bug-fix update also included open transport powerpc-based machines well 68k-based machines 7.5.3 also made several improvements 68k emulator added translucent dragging support drag manager also included first version control strip compatible macs also first version mac os support smp 9500/mp system 7.5.3 revision 2 included performance enhancements better reliability powerbooks using third-party ram doubler program improved reliability powerbook 500 2300 5300 series computers powerpc upgrade card improved reliability using startup disk control panel improved reliability copying files 1 gb hard disks system 7.5.3 revision 2.1 shipped performa 6400/180 6400/200 particular release specific machines stability problems system 7.5.3 release 2 new hardware especially video card transferring files localtalk system 7.5.4 pulled due mistake apple components included installer system 7.5.5 included significant performance improvements virtual memory memory management powerpc-based macs including elimination one type 11 error also included number reliability improvements fixes macs using floppy disks equipped dos compatibility card improved hard disk access powerpc powerbooks performa 5400 9500 computers fixes macs included apple tv tuner macintosh tv remote control improvements localtalk networking especially performa 5400 6400 fixes system startup faster 180 mhz macs included powerpc 604 604e processors improved reliability using sound-intensive applications quadra centris computers contained powerpc upgrade card improved stability using multiple background applications shared printers network system 7.5.5 also last system 7 release run 68000-based macs macintosh plus macs roms lack support 32-bit addressing macintosh iicx 7.6 later required 68030 processor 32-bit-addressing-capable rom automatically turn 32-bit addressing boot mac os 7.6 codenamed harmony last major update released 1997 7.6 operating system officially called mac os instead system new features include revamped extensions manager native powerpc code power macs bundled internet tools utilities stable finder increased memory allocation version powertalk feature added 7.5 removed due poor application support support large number older macintosh models dropped minor update mac os 7.6.1 finally ported 68k exception handling routines powerpc turning type 11 errors less harmful errors type 1 2 3 usually crashing applications would often terminate safely instead crashing operating system period apple attempting release completely new modern operating system named copland copland project abandoned 1996 apple announced plans release os update every six months rhapsody would 2001 evolve released mac os x shipped two releases shipped officially branded mac os — mac os 7.6 minor bug fix 7.6.1 future versions released mac os 8–8.6 mac os 9–9.2 | [
10755,
9732,
1542,
6150,
2058,
1549,
3598,
4114,
6675,
6165,
8222,
9762,
1534,
6183,
1576,
6186,
8754,
9780,
1592,
9784,
10808,
8767,
576,
1090,
8774,
1623,
10840,
9308,
3167,
9312,
3681,
2149,
3691,
6258,
10357,
7292,
4220,
1150,
10365,
... | Test |
6,378 | 3 | AT&T_Unix_PC:amp unix pc 3b1 also known pc7300 unix pc unix workstation computer originally developed convergent technologies later acquired unisys marketed mid- late-1980s despite name 3b1 little common 3b-series computers initial pc7300 model offered modest 512 kib memory small low performance 10 mb hard drive model although progressive offering unix system desktop office operation underpowered produced considerable fan drive bearing noise even idling modern-looking wedge design innovative fact machine gained notoriety appearing many movies token computer later enhanced model renamed 3b1 cover redesigned accommodate full-height 67 mb hard drive cover change added 'hump case expanded onboard memory 1 2 mb well added better power supply operating system based unix system v release 2 extensions 4.1 4.2 bsd system v release 3 convergent technologies last release 3.51 store public domain software repository available 3b1 users | [
4614,
787,
2073,
9633,
10668,
7983,
563,
8502,
9151,
6850,
8524,
9166,
3039,
1121,
6502,
10855,
1776,
5492,
3960,
2045
] | Test |
6,379 | 8 | Xitami:xitami xitami web ftp server originally developed imatix corporation free open-source product 1996 2000 ran single process small footprint fast fastest servers scaled well supported several web application protocols portable also web interface configure web/ftp server 2009 imatix launched new version xitami called x5 xitami/5 imatix started original xitami server 1996 demonstration smt multithreading technology building protocol servers name chosen last minute developers realized original choice cosmos already taken another web server longer exists xitami imatix spelled backwards xitami featured april 1997 article dr. dobb journal web server attracted people looking fast simple web/ftp server mainly microsoft windows xitami designed portable ported windows linux unices openvms beos os/2 non-portable functionality encapsulated library layer called sfl standard function library sfl free open source project used fairly widely projects 1999 apache web server adopted similar approach portability apache2 building apache portable runtime apr xitami team continued add features mid-2000 development server stopped except security updates 2008 multiple codice_1 vulnerabilities reported final release xitami/2.5 january 2009 imatix announced start new xitami project version 5 called x5 uses latest generation imatix multithreading technology base2 making xitami scalable multiple cores remaining small simple imatix stated designed handle thousands connections without difficulty makes ready long polling client connections remain open extended durations windows binaries x5 released february 2009 x5 used first time run imatix live zyre website x5 shares technical framework imatix openamq message service x5 written ansi c99 using meta-programming approach called model oriented programming x5 presented fosdem 2009 consisting 3,457 lines meta-meta code x5 uses apr place sfl run windows linux aix solaris openvms | [
1920,
4485,
7430,
6797,
9229,
7567,
7695,
1937,
7443,
5397,
8350,
7457,
3746,
8994,
2596,
3237,
9125,
11682,
7338,
9387,
44,
7983,
10800,
11439,
823,
6714,
10622,
7364,
1991,
11134,
595,
1363,
4439,
3545,
225,
865,
1250,
2404,
4837,
5612,... | None |
6,380 | 2 | MythDora:mythdora mythdora specialized operating system based fedora mythtv since 2009 version number comes version fedora used followed version mythtv used example current version 12.23 uses fedora 12 mythtv 0.23 like linhes mythdora designed simplify installation mythtv home theatre pc mythdora since version 10.21 live cd support addition mythtv plugins mythdora includes extra linux packages necessary mythtv run drivers hardware commonly encountered machines intended run mythtv also included mythdora several video game emulators extra tools scripts aid initial configuration system allow user perform tasks rebooting machine backing program data directly mythtv interface development discontinued 2011 august 3 2011 project maintainers indicated longer time keep project going | [
8837,
7435,
6797,
10127,
2321,
5397,
4887,
10394,
673,
3745,
10530,
1700,
9253,
10149,
6055,
11305,
6058,
7854,
7983,
561,
2738,
4147,
7602,
4790,
823,
439,
56,
59,
8124,
3903,
4673,
2375,
4039,
8907,
3664,
1107,
1110,
2134,
9693,
2914,
... | Test |
6,381 | 4 | PERMIS:permis permis privilege role management infrastructure standards sophisticated policy-based authorization system implements enhanced version u.s. national institute standards technology nist standard role-based access control rbac model permis supports distributed assignment roles attributes users multiple distributed attribute authorities unlike nist model assumes centralised assignment roles users permis provides cryptographically secure privilege management infrastructure pmi using public key encryption technologies x.509 attribute certificates maintain users attributes permis provide authentication mechanism leaves application determine use permis strength comes ability integrated virtually application authentication scheme like shibboleth internet2 kerberos username/passwords grid proxy certificates public key infrastructure pki standard rbac system permis main entities permis policy extensible markup language xml -based rules user-role assignments role-privilege assignments latter containing optional obligations returned application user granted access resource permis policy stored either simple text xml file attribute within signed x.509 attribute certificate provide integrity protection tampering detection user roles attributes may held secure signed x.509 attributes certificates stored lightweight directory access protocol ldap directories web-based distributed authoring versioning webdav repositories may created demand security assertion markup language saml attribute assertions permis authorisation engine comprises two components credential validation service validates users roles according user-role assignment rules policy decision point pdp evaluates users access requests according role-permission assignment rules access control rules access resource depends upon roles/attributes assigned user role-permission assignments contain constraints based user access request e.g print less 10 pages environment e.g time day permis work either push mode user attribute assignments sent permis application pull mode permis fetches attribute assignments ldap/webdav repositories saml attribute authorities permis open source project java source code downloaded http //www.openpermis.info alternatively precompiled java libraries downloaded http //sec.cs.kent.ac.uk/permis/ permis unique support cryptographically protecting user attributes/roles policy guarantees integrity protects tampered new features continually added like standard extensible access control markup language xacml interface allows permis xacml pdps seamlessly interchanged ability accept saml attribute assertions support dynamic delegation authority separation duty policies recent addition controlled natural language interface english writing simple permis policies | [
160,
3521,
8674,
5956,
5573,
7368,
10831,
210,
6098,
6651,
2013,
479
] | None |
6,382 | 4 | Lavasoft:lavasoft adaware formerly known lavasoft software development company produces spyware malware detection software including adaware operates subsidiary avanquest division company offers adaware three editions one free two pro total commercial adaware products include adaware ad block adaware web companion lavasoft digital lock lavasoft file shredder lavasoft privacy toolbox lavasoft registry tuner adaware headquarters montreal canada previously located gothenburg sweden since 2002 nicolas stark ann-christine åkerlund established company germany 1999 flagship adaware antivirus product 2011 lavasoft acquired solaria fund private equity fund front entrepreneurs daniel assouline michael dadoun accused selling software available free including adaware antivirus prior acquiring company anti-spyware anti-virus software program adaware antivirus according developer detects removes malware spyware adware computer viruses dialers trojans bots rootkits data miners parasites browser hijackers tracking components adaware antivirus originally developed ad-aware 1999 highlight web beacons inside internet explorer many websites users would see tiny pixelated square next web beacon warning user computer ip address non-essential information tracked website time ad-aware added ability block beacons ads 2008 edition lavasoft bundled ad-aware pro plus first time antivirus scanner used avira engine arrangement continued years starting ad-aware version 10 bitdefender antivirus engine used instead according pc world magazine older version ad-aware anniversary edition could locate 83.6 malware comparative test carried security firm av-test however stated tests run newest version neil j. rubenking pcmag performed lab test version 8.3 ad-aware scored 9.2 points beating previous top score 9.1 july 2013 adaware antivirus free listed downloaded total 450 million times lavasoft site including 387 million times download.com according opswat january 2015 ad-aware less 1 market share globally paid versions product competed low-cost free products microsoft security essentials company acquired january 2011 lavasoft solaria fund private equity fund front daniel assouline michael dadoun key people upclick interactive brands sc magazine reported lavasoft acquired entrepreneurs accused selling software available free unwitting users guise premium support including free version lavasoft security program prior acquiring company security consultant dancho danchev documented controversy additionally danchev reported 2013 lavasoft used hide hard-to-uninstall programs third-party software trick users installing like k-lite codec pack lavasoft web companion changed browser without given permission although company shields behind complete legality bundled software claims software used fight malware users branded products malware february 2015 reported cert coordination center new security feature ad-aware web companion implemented komodia ssl digestor one komodia public sdks company behind superfish security incident lenovo machines | [
4480,
2049,
7809,
131,
10756,
1417,
7948,
6797,
1046,
4374,
10392,
1052,
156,
2721,
5281,
2213,
550,
1318,
6823,
2601,
7337,
2859,
3243,
6699,
8493,
5935,
7983,
9771,
6834,
4403,
10166,
7739,
9791,
704,
9537,
7362,
1475,
10308,
4421,
202,... | Test |
6,383 | 1 | Database_administration:database administration database administration function managing maintaining database management systems dbms software mainstream dbms software oracle ibm db2 microsoft sql server need ongoing management corporations use dbms software often hire specialized information technology personnel called database administrators dbas three types dbas individuals usually specialize one type database administration smaller organizations uncommon find single individual group performing one type database administration degree administration database automated dictates skills personnel required manage databases one end spectrum system minimal automation require significant experienced resources manage perhaps 5-10 databases per dba alternatively organization might choose automate significant amount work could done manually therefore reducing skills required perform tasks automation increases personnel needs organization splits highly skilled workers create manage automation group lower skilled line dbas simply execute automation database administration work complex repetitive time-consuming requires significant training since databases hold valuable mission-critical data companies usually look candidates multiple years experience database administration often requires dbas put work off-hours example planned hours downtime event database-related outage performance severely degraded dbas commonly well compensated long hours one key skill required often overlooked selecting dba database recovery part disaster recovery case “ ” case “ ” database suffers failure ranging simple failure full catastrophic failure failure may data corruption media failure user induced errors either situation dba must skills recover database given point time prevent loss data often dbms software comes certain tools help dbas manage dbms tools called native tools example microsoft sql server comes sql server management studio oracle tools sql*plus oracle enterprise manager/grid control addition 3rd parties bmc quest software embarcadero technologies sql maestro group offer gui tools monitor dbms help dbas carry certain functions inside database easily another kind database software exists manage provisioning new databases management existing databases related resources process creating new database consist hundreds thousands unique steps satisfying prerequisites configuring backups step must successful next start human expected complete procedure exact way time time exactly goal multiple databases exist number dbas grows without automation number unique configurations frequently grows costly/difficult support complicated procedures modeled best dbas database automation software executed standard dbas software created specifically improve reliability repeatability procedures stratavia data palette gridapp systems clarity automated database operations grown since 2009 following amazon web services introduction aws rds providing automated managed database service microsoft azure launched similar automated database service 2010 sql azure providing automated backups geo-replication high availability introduction docker software containers enhanced support fast delivery containerized database instances amazon web serices microsoft azure enhanced automated support containers respective services third party support database container images grown including mongodb postgres mysql oracle microsoft sql server microsoft independent port docker software windocks newer technologies stratavia data palette suite gridapp systems clarity begun increase automation databases causing reduction database related tasks however best reduces amount mundane repetitive activities eliminate need dbas intention dba automation enable dbas focus proactive activities around database architecture deployment performance service level management every database requires database owner account perform schema management operations account specific database log data director add database owner accounts database creation data director users must log database-specific credentials view database entities data perform database management tasks database administrators application developers manage databases appropriate permissions roles granted organization administrator permissions roles must granted database group database apply within organization granted several education institutes offer professional courses including late-night programs allow candidates learn database administration also dbms vendors oracle microsoft ibm offer certification programs help companies hire qualified dba practitioners college degree computer science related field helpful necessarily prerequisite | [
8201,
2068,
1049,
5658,
9248,
8742,
10793,
10286,
4155,
11324,
9286,
72,
2632,
9290,
7248,
8788,
10326,
7767,
11362,
9828,
10340,
8808,
2669,
2681,
1146,
3196,
2688,
10389,
4255,
4263,
10413,
5808,
10418,
9397,
3768,
7868,
11457,
6850,
2246... | Validation |
6,384 | 4 | Svalbard_Global_Seed_Vault:svalbard global seed vault svalbard global seed vault secure seed bank norwegian island spitsbergen near longyearbyen remote arctic svalbard archipelago approximately north pole conservationist cary fowler association consultative group international agricultural research cgiar started vault preserve wide variety plant seeds duplicate samples spare copies seeds held gene banks worldwide seed vault attempt ensure loss seeds genebanks large-scale regional global crises seed vault managed terms spelled tripartite agreement among norwegian government crop trust nordic genetic resource center nordgen norwegian government entirely funded vault approximately 2008 construction storing seeds vault free end users norway crop trust pay operational costs primary funding trust comes organisations bill melinda gates foundation various governments worldwide nordic gene bank ngb since 1984 stored backup nordic plant germplasm via frozen seeds abandoned coal mine svalbard january 2008 nordic gene bank merged two nordic conservation groups form nordgen svalbard global seed vault officially opened 26 february 2008 although first seeds arrived january 2008 five percent seeds vault 18,000 samples 500 seeds came centre genetic resources netherlands cgn part wageningen university netherlands part vault first anniversary 90,000 food crop seed samples placed storage bringing total number seed samples 400,000 among new seeds included 32 varieties potatoes ireland national gene banks 20,000 new samples u.s agricultural research service seed samples came canada switzerland well international seed researchers colombia mexico syria shipment brought total number seeds stored vault 20 million anniversary vault contained samples approximately one-third world important food crop varieties also part anniversary experts food production climate change met three-day conference longyearbyen japanese sculptor mitsuaki tanabe presented work vault named seed 2009 momi in-situ conservation 2010 delegation seven u.s. congressmen handed number different varieties chili pepper 2013 approximately one-third genera diversity stored gene banks globally represented seed vault october 2016 seed vault experienced unusually large degree water intrusion due higher average temperatures heavy rainfall common water seep vault entrance tunnel warmer spring months case water encroached tunnel freezing vault designed water intrusion seeds risk result however norwegian public works agency statsbygg plans make improvements tunnel prevent intrusion future including waterproofing tunnel walls removing heat sources tunnel digging exterior drainage ditches seed vault 10th anniversary 26 february 2018 shipment 70,000 samples delivered facility bringing number samples received one million counting withdrawals time total number samples held vault 967,216 representing 13,000 years agricultural history norway sweden finland denmark iceland prime ministers ceremonially laid first stone 19 june 2006 seedbank inside sandstone mountain spitsbergen island employs robust security systems seeds packaged special three-ply foil packets heat sealed exclude moisture facility managed nordic genetic resource center though permanent staff on-site spitsbergen considered ideal lacked tectonic activity permafrost aids preservation sea level keep site dry even ice caps melt locally mined coal provides power refrigeration units cool seeds internationally recommended standard equipment fails least several weeks elapse facility rises surrounding sandstone bedrock temperature estimated take two centuries warm feasibility study prior construction determined vault could preserve major food crops seeds hundreds years including important grains could potentially remain viable thousands years running length facility roof front face entryway illuminated artwork named perpetual repercussion norwegian artist dyveke sanne marks location vault distance norway government-funded construction projects exceeding certain cost must include artwork norwegian state agency overseeing art public spaces engaged artist install lighting highlights importance qualities arctic light roof vault entrance filled highly reflective stainless steel mirrors prisms installation reflects polar light summer months winter network 200 fibre-optic cables gives piece muted greenish-turquoise white light svalbard global seed vault mission provide safety net accidental loss diversity traditional genebanks popular press emphasized possible utility event major regional global catastrophe frequently accessed genebanks lose samples due mismanagement accident equipment failures funding cuts natural disasters events occur regularity war civil strife history destroying genebanks national seed bank philippines damaged flooding later destroyed fire seed banks afghanistan syria iraq lost completely according economist svalbard vault backup world 1,750 seed banks storehouses agricultural biodiversity norwegian law prohibited storing genetically modified seeds vault adjacent arctic world archive provides similar service data etched code reels film project lead piql norway states film properly preserved last 1,000 years vault seed samples copies samples stored depositing genebanks researchers plant breeders groups wishing access seed samples seed vault must instead request samples depositing genebanks samples stored genebanks cases accessible accordance terms conditions international treaty plant genetic resources food agriculture approved 118 countries parties seed vault functions like safe deposit box bank bank owns building depositor owns contents box government norway owns facility depositing genebanks seeds send deposit samples svalbard constitute legal transfer genetic resources genebank terminology called black box arrangement depositor signs deposit agreement nordgen acting behalf norway agreement makes clear norway claim ownership deposited samples ownership remains depositor sole right access materials seed vault one access anyone else seeds seed vault database samples depositors maintained nordgen syrian civil war caused another seed bank international center agricultural research dry areas icarda move headquarters aleppo beirut due difficulties icarda transferring collection 2015 svalbard vault authorized first withdrawal seeds history seeds stored sealed three-ply foil packages placed plastic tote containers metal shelving racks storage rooms kept low temperature limited access oxygen ensure low metabolic activity delay seed aging permafrost surrounding facility help maintain low temperature seeds electricity supply fails years since opening vault saw minor water intrusion entrance annual spring permafrost thawing warmer temperatures heavy rainfall october 2016 caused significantly greater amounts water inundate entrance facility design ensured water froze several meters seeds endangered crop trust officially known global crop diversity trust plays key role planning seed vault coordinating shipments seed samples vault conjunction nordic genetic resource center trust provides annual operating costs facility set aside endowment funds norwegian government finances upkeep structure support bill melinda gates foundation donors crop trust assists selected genebanks developing countries well international agricultural research centres packaging shipping seeds seed vault international advisory council provides guidance advice includes representatives fao cgiar international treaty plant genetic resources institutions svalbard global seed vault ranked 6 time best inventions 2008 awarded norwegian lighting prize 2009 seed sample consists approximately 500 seeds sealed airtight aluminum bag facility storage capacity 4.5 million seed samples | [] | Test |
6,385 | 2 | Visifire:visifire visifire set data visualization components currently supports charts gauges visifire available microsoft silverlight wpf windows phone windows 8 one use api create charts gauges mobile web desktop environments visifire also embedded webpage standalone silverlight app independent server side technology used hence visifire used asp asp.net php jsp coldfusion ruby rails simple html javascript visifire also wizard-driven solution create charts sharepoint visifire development started early release silverlight 1.1 alpha microsoft next release silverlight directly silverlight 2.0 beta ported silverlight 2.0 beta release silverlight 2.0 final opened slew possibilities exploit full power silverlight 2.0 major architectural changes done new visifire 2.0 released later came visifire 3.0 improved looks major performance improvements gauges introduced visifire 4.0 later visifire sharepoint introduced wizard driven solution create stunning sharepoint charts next major update visifire support windows phone windows 8 applications recently released version visifire 5.0 major performance improvements current version visifire 5.1.5 visifire runs various platforms silverlight wpf windows phone windows 8 visifire licensed commercially one buy royalty free license based number developers distributed gpl discontinued due confusion prevailing around windows phone marketplace priority support provided enterprise customers ticket system users supported visifire community forum | [
8644,
1348,
3462,
7983,
5048
] | None |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.