node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
6,386
4
City_identification_card:city identification card united states city municipal identification card form identification card issued municipality city rather state federal government federal law cities may issue identification cards see fit consider immigration criminal status applicant new connecticut issued first municipal identification cards united states elm city resident card 2007 january 15 2009 city/county san francisco launched sf city id card municipal identification card program modeled new cities issue identification cards include asbury park new jersey washington d.c. dc one card mercer county new jersey community id card issued local non profit organization endorsement various law enforcement agencies august 31 2016 city council phoenix arizona voted 5 4 create city identification card would available undocumented immigrants cards available february 2017 program cancelled february 2018 november 8 2012 los angeles city council voted 12 1 solicit proposals municipal identification card modeled oakland city id system city oakland california debated proposed municipal identification system would include debit card function city residents regardless immigration status move backed oakland city id card coalition september 13 2011 oakland city council decided wait cost feasibility study completed late october proceeding hoping begin issuing id cards 2012 barring unforeseen circumstances however extended 2012 city council voting favor final portion program october 16 2012 first cards program slated issued february 1 july 5 2011 richmond city council voted unanimously issue municipal identification cards richmond residents regardless immigration status letter council urging passage measure city council member mayor argued many richmond residents lack necessary forms official identification required access financial institutions jobs housing protections home workplace residents include immigrants children students homeless transgender people indigent disabled elderly runaway youth adult survivors domestic violence program administered third-party vendor cost city november 2007 board supervisors san francisco voted issue municipal id cards residents city regardless immigration status cards officially launched january 15 2009 proof identity city residence required elm city resident card id card used new connecticut united states card originally designed protect estimated 10,000 15,000 illegal immigrants new robbed assaulted city residents receive card serves form identification debit card capacity 150 library card way pay parking meters cards first issued july 2007 first municipal identification cards issued united states card costs 5 children 10 adults hartford connecticut 2017 first issued may 22 2017 hartford city id government-issued identification card available hartford residents verify identification residency status hartford aventura florida issues optional aventura id card residents delray beach florida issues optional residency identification card sunny isles beach florida offers free optional sunny isles beach resident id card residents october 12 2016 chicago mayor rahm emanuel city clerk susana mendoza announced launch chicago municipal id program april 26 2018 city officials launched chicago citykey optional valid government-issued id card offered chicago residents citykey serves three-in-one card valid government issued id ventra card chicago transit authority chicago public library services first 100,000 id cards free cost initial response chicago citykey extremely high successful city wards residents waited hours line receive card may 17 2016 city council detroit michigan voted favor creation municipal identification program city residents struggle otherwise obtain government-issued id december 5 2017 city council northfield minnesota unanimously approved ordinance establishing city identification card program implemented march 2018 county clerk hudson county new jersey barbara a. netchert issues identification cards resident county cards available residents county fee ten dollars adults five dollars minors specified county teenagers aged fourteen sixteen starting april 2011 mercer county area community id card issued endorsement offices mercer county sheriff mercer county prosecutor police departments several municipalities including trenton princeton borough princeton township west windsor ewing township plainsboro card issued non profit latin american legal defense education fund laldef accepted law enforcement agencies municipal agencies clinics hospitals libraries social service agencies many stores banks although official government id card facilitates access basic community services unable obtain documents immigrants youth homeless persons recovery re-entry programs card replaces trenton princeton community id cards issued 2009 2010 county clerk monmouth county new jersey m. clark french issues identity cards residents county cards available u.s. citizens legal permanent residents asbury park issues identification card city residents cards became available august 1 2015 dover new jersey offers municipal id card elizabeth new jersey offers municipal id card highland park new jersey offers municipal id card new brunswick new jersey offers new brunswick city id card city newark introduced municipal identification program august 2015 residents newark cards cost 15 new applicants however new applicants senior citizens children cost 8 financial hardship application filed city fees unable met applicant jersey city city council announced municipal identification program april 2017 morristown new jersey offers municipal id card paterson new jersey offers municipal id card perth amboy new jersey offers municipal id card starting november 2013 plainfield community id cards issued support plainfield police department card issued non-profit group angels action inc trained mentored latin american legal defense education fund laldef mercer county identification local identity cards grant legal residency right work approved plainfied city cooperation card also accepted law enforcement agencies municipal agencies clinics hospitals libraries social service agencies many stores banks angels action local organizations also process trying encourage plainfield city council approve municipal identity id card system supply cards larger scale growing population plainfield angels actions also helped mentor encourage id cards newark roselle city council roselle new jersey unanimously passed ordinance allow borough launch community-wide identification card program october 21 2015 began issuing cards december 14 2015 union city nj board commissioners decided enact municipal identification program starting march 1 2017 program open resident city older 14 system part set allow residents city gain identification securing financial services e.g bank checking account july 2007 new york city councilman hiram monserrate proposed setting municipal identity system new york city residents similar new plan however shortly thereafter monserrate left council new york state senate proposal shelved february 10 2014 first state city address new york city mayor bill de blasio announced new plan create new york city municipal identification card named idnyc would available new yorkers regardless immigration status city resident could obtain card mayor announced way allow city residents lack legal immigration status united states access municipal private services facilities require photo identification cards also provide additional benefits discounts movie tickets broadway shows sporting events ymca memberships additionally cardholders able open bank account several financial institutions new york city cards first made available january 12 2015 philadelphia issues optional identification card city residents phl city id cards became available april 2019 providence rhode island issues optional identification card city residents idpvd cards became available june 2018 may 1 2014 washington d.c. issues dc one card legal residents visitors u.s. though services may available residents district undocumented immigrants may get card issued state driver license state non-driver id card one states issues credentials illegal immigrants new mexico utah washington school id card dc one card consolidated credential designed give adults children access dc government facilities programs designed help district consolidate printing id cards save money dc one card also building access card dc government employees public school secondary students request card includes immediate metro smartrip® capability help travel milwaukee issues optional municipal identification card residents
[ 9555, 5932 ]
Train
6,387
3
10-Yard_Fight:10-yard fight 10-yard fight viewed top-down perspective vertical scrolling player select plays either offense defense offense player simply receives ball upon snap either attempts run quarterback toss ball running back throw ball one long distance receiver – basically option offense defense player chooses one two players control computer manipulates others ball also punted field goal attempted game five levels increasing difficulty high school college professional playoff super bowl player wins halves accelerated real time 30-minute half easier level player advances next level difficulty like career mode arcade game later ported famicom irem first japan later published north america europe nintendo 1985 nintendo entertainment system nes arcade game also ported msx home computer also irem exclusively japan graphically similar fundamental differences arcade nes versions game arcade version seeks simulate offense team attempting score touchdown ultimately leads player next level nes version developed allow defense offense well simultaneous 2-player mode may 2 2018 port nintendo switch released hamster part arcade archives series pittsburgh post-gazette called patriarch football games adam duerson sports illustrated stated one remembered could say makes great worth recognition fact brought football games atari era setting simple precedent future football games adam swiderski ugo networks called downright advanced compared earlier football titles added looked neat quality soundtrack n't play like real football nick chordas columbus dispatch said realistic time commenting players looked like real people n-sider called like racing game football game due objective racing first increase players time author bj klein however called less realistic tecmo bowl journal news called immortal classic
[ 1776, 10931, 11557, 9006 ]
Test
6,388
5
SCVP:scvp server-based certificate validation protocol scvp internet protocol determining path x.509 digital certificate trusted root delegated path discovery validation path delegated path validation according particular validation policy relying party receives digital certificate needs decide whether trust certificate first needs determine whether certificate linked trusted certificate process may involve chaining certificate back several issuers following case currently creation chain certificates performed application receiving signed message process termed path discovery resulting chain called certification path many windows applications outlook use cryptographic application programming interface capi path discovery capi capable building certification paths using certificates installed windows certificate stores provided relying party application equifax ca certificate example comes installed windows trusted certificate capi knows acme co ca certificate included signed email made available capi outlook capi create certification path however capi find acme co ca certificate way verify joe user trusted scvp provides us standards-based client-server protocol solving problem using delegated path discovery dpd using dpd relying party asks server certification path meets needs scvp client request contains certificate attempting trust set trusted certificates scvp server response contains set certificates making valid path certificate question one trusted certificates response may also contain proof revocation status ocsp responses certificates path certification path constructed needs validated algorithm validating certification paths defined rfc 5280 section 6 signatures expiration name constraints policy constraints basic constraints etc. could done locally client scvp server delegated path validation scvp facilitates federated pkis one bridge certificate authority
[]
None
6,389
6
Ark_(software):ark software ark file archiver compressor developed kde included kde applications software bundle supports various common archive compression formats including zip 7z rar lha tar uncompressed compressed e.g gzip bzip2 lzip xz
[ 6022, 10121, 1420, 7181, 1940, 3222, 9880, 543, 6694, 3114, 10027, 8621, 950, 6713, 2755, 11076, 1352, 4296, 10317, 3407, 6991, 4561, 722, 10575, 7384, 11614, 1631, 3296, 9953, 5858, 6759, 7529, 4459, 237, 1646, 6257, 7667, 3828, 4089, 89...
Train
6,390
3
Operation_Wolf:operation wolf assuming role special forces operative roy adams player attempts rescue five hostages held captive enemy territory game divided six stages advances story completed example jungle stage completed adams interrogates enemy soldier learns location concentration camp hostages held one first shooter games feature storyline game utilized optical controller housed inside gun assembly scaled bore strong resemblance uzi submachine gun turn mounted top square base covering pivot shaft allowed players swivel elevate gun geared motor inside casing simulated recoil felt player fired weapon in-game targets pulling trigger allowed fully automatic fire pressing button near muzzle launched grenade wide blast radius could hit multiple targets order complete stage player must shoot required number soldiers vehicles trucks boats helicopters armored transports indicated on-screen counter player begins limited supply ammunition grenades find throughout game either openly displayed revealed shooting crates/barrels coconuts trees animals pigs chickens dynamite bombs cause heavy damage every target screen enemy friendly special machine gun power-up allows unlimited ammunition increased rate fire 10 seconds enemies attack gunfire knives grenades mortar/bazooka rounds missiles first shot air player damage bar slowly fills hits taken addition shooting friendly targets nurses boys adds bar damage recovered picking health power-ups completing stages six stages objectives effects gameplay completion follows completing airport stage least one hostage rescued awards bonus based number stages played number hostages boarded plane new operation begins higher difficulty level fully healed damage bar fresh supply ammunition game ends following events occur outcome showing different game screen continuing game allows player restart last stage played language game set english six stages always played order result effects communication setup jungle obvious number enemies particular stage remains constant one operation next language set japanese first four stages initially available player may choose order play allowing strategic planning ported version nintendo entertainment system allowed multiple endings depending many hostages rescued player would awarded points form combat pay greeted president united states number surviving hostages corresponded president tone player game ported amstrad cpc dos nes master system fm towns commodore 64 pc engine ports lack kind light gun support exceptions nes master system zx spectrum featured magnum light phaser support must played keyboard controller box master system version features promotional art operation thunderbolt 2005 operation wolf released xbox playstation 2 microsoft windows part taito legends however light gun support unavailable february 4 2008 nes version operation wolf released north american wii virtual console whereas nes version allowed nes zapper support vc re-release feature kind light gun support including wii remote pointer functions making game playable standard controller mode game commercially successful coinslot dedicated arcade game chart number four behind street fighter continental circus wec le mans spectrum sales charts number two behind robocop number one every month year game also critically acclaimed several awards 1989 golden joystick awards 1988 including overall game year 8-bit well best coin-op conversion 8-bit best coin-op conversion 16-bit sinclair user gave top game 1988 award shooting game likely push edge 1988 later voted number 26 sinclair readers top 100 games time poll
[ 8709, 8199, 11015, 6797, 3348, 5400, 5275, 1693, 4894, 9501, 11690, 8492, 9006, 5820, 4422, 4043, 10316, 9166, 4690, 9303, 7269, 8300, 2159, 1776 ]
None
6,391
3
Exynos:exynos exynos greek words exypnos meaning smart prasinos meaning green series arm-based reduced instruction set system-on-chips socs developed manufactured samsung electronics continuation samsung earlier s3c s5l s5p line socs 2010 samsung launched hummingbird s5pc110 exynos 3 single samsung galaxy smartphone featured licensed arm cortex-a8 cpu arm cortex-a8 code-named hummingbird developed partnership intrinsity using fastcore fast14 technology early 2011 samsung first launched exynos 4210 soc samsung galaxy ii mobile smartphone driver code exynos 4210 made available linux kernel support added version 3.2 november 2011 29 september 2011 samsung introduced exynos 4212 successor 4210 features higher clock frequency 50 percent higher 3d graphics performance previous processor generation built 32 nm high-κ metal gate hkmg low-power process promises 30 percent lower power-level previous process generation 30 november 2011 samsung released information upcoming soc dual-core arm cortex-a15 cpu initially named exynos 5250 later renamed exynos 5 dual soc memory interface providing 12.8 gb/s memory bandwidth support usb 3.0 sata 3 decode full 1080p video 60 fps along simultaneously displaying wqxga-resolution 2560 × 1600 mobile display well 1080p hdmi samsung exynos 5 dual used 2015 prototype supercomputer end-product use chip meant servers another vendor 26 april 2012 samsung released exynos 4 quad powers samsung galaxy iii samsung galaxy note ii exynos 4 quad soc uses 20 less power soc samsung galaxy ii samsung also changed name several socs exynos 3110 exynos 3 single exynos 4210 4212 exynos 4 dual 45 nm exynos 4 dual 32 nm exynos 5250 exynos 5 dual 2010 samsung founded design center austin called samsung ’ austin r center sarc samsung hired many ex-amd ex-intel ex-arm various industry veterans sarc develop high-performance low-power complex cpu system ip coherent interconnect memory controller architectures designs 2017 san jose advanced computing lab acl opened continue development mediatek unreleased custom gpu microarchitecture acquired 3 year design cycle sarc first custom core released exynos 8890 2016 exynos modem 303 exynos modem 333 exynos modem 5100 exynos t200 exynos s111 exynos auto v9
[ 11282, 9235, 11289, 11294, 1057, 38, 8231, 4139, 8237, 9774, 2097, 8250, 1083, 8253, 7745, 7747, 69, 2635, 99, 8812, 10361, 6266, 6268, 638, 644, 9863, 8842, 146, 659, 2707, 9368, 7833, 666, 5786, 7835, 10393, 4258, 4773, 9913, 8383, 10...
None
6,392
4
Control_reconfiguration:control reconfiguration control reconfiguration active approach control theory achieve fault-tolerant control dynamic systems used severe faults actuator sensor outages cause break-up control loop must restructured prevent failure system level addition loop restructuring controller parameters must adjusted accommodate changed plant dynamics control reconfiguration building block toward increasing dependability systems feedback control figure right shows plant controlled controller standard control loop nominal linear model plant formula_1 plant subject fault indicated red arrow figure modelled general formula_2 subscript formula_3 indicates system faulty approach models multiplicative faults modified system matrices specifically actuator faults represented new input matrix formula_4 sensor faults represented output map formula_5 internal plant faults represented system matrix formula_6 upper part figure shows supervisory loop consisting fault detection isolation fdi reconfiguration changes loop end vectors inputs outputs contain available signals used controller fault-free operation alternative scenarios model faults additive external signal formula_9 influencing state derivatives outputs follows formula_10 goal reconfiguration keep reconfigured control-loop performance sufficient preventing plant shutdown following goals distinguished internal stability reconfigured closed loop usually minimum requirement equilibrium recovery goal also referred weak goal refers steady-state output equilibrium reconfigured loop reaches given constant input equilibrium must equal nominal equilibrium input time tends infinity goal ensures steady-state reference tracking reconfiguration output trajectory recovery goal also referred strong goal even stricter requires dynamic response input must equal nominal response times restrictions imposed state trajectory recovery goal requires state trajectory restored nominal case reconfiguration input usually combination goals pursued practice equilibrium-recovery goal stability question whether similar goals reached specific faults addressed reconfigurability analysis paradigm aims keeping nominal controller loop end reconfiguration block placed faulty plant nominal controller together faulty plant forms reconfigured plant reconfiguration block fulfill requirement behaviour reconfigured plant matches behaviour nominal fault-free plant linear model following formal feature nominal closed loop attempted recovered classical pseudo-inverse method closed loop system matrix formula_11 state-feedback control structure used new controller formula_12 found approximate formula_13 sense induced matrix norm perfect model following dynamic compensator introduced allow exact recovery complete loop behaviour certain conditions eigenstructure assignment nominal closed loop eigenvalues eigenvectors eigenstructure recovered nominal case fault optimisation control schemes include linear-quadratic regulator design lqr model predictive control mpc eigenstructure assignment methods probabilistic approaches developed learning automata neural networks etc methods reconfiguration achieved differ considerably following list gives overview mathematical approaches commonly used prior control reconfiguration must least determined whether fault occurred fault detection components affected fault isolation preferably model faulty plant provided fault identification questions addressed fault diagnosis methods fault accommodation another common approach achieve fault tolerance contrast control reconfiguration accommodation limited internal controller changes sets signals manipulated measured controller fixed means loop restructured
[ 11533, 9677 ]
Test
6,393
2
Puppy_Linux:puppy linux puppy linux operating system family light-weight linux distributions focus ease use minimal memory footprint entire system run random-access memory current versions generally taking 210 mb allowing boot medium removed operating system started applications abiword gnumeric mplayer included along choice lightweight web browsers utility downloading packages distribution originally developed barry kauler members community kauler retired 2013 tool woof build puppy linux distribution binary packages linux distributions barry kauler started puppy linux response trend distributions becoming stricter system requirements time distribution emphasis speed efficiency lightweight started boot disk howto gradually included components file-by-file puppy linux completed puppy linux started vector linux based became fully independent distribution puppy 0 initial release puppy linux unionfs extreme minimal persistence support package manager ability install applications puppy 1 series run comfortably dated hardware pentium computer least 32 mb ram newer systems usb keydrive version might better although usb device booting directly supported bios puppy floppy boot disk used kick-start possible run puppy linux windows 9x/windows also possible bios support booting usb drive boot cd keep user state usb keydrive saved shutdown read usb device bootup puppy 2 uses mozilla-based seamonkey internet suite primarily web browser e-mail client puppy 3 features slackware 12 compatibility accomplished inclusion almost dependencies needed installation slackware packages however puppy linux slackware-based distribution puppy 4 built scratch using t2 sde longer features native slackware 12 compatibility order reduce size include newer package versions found 3 compensate optional compatibility collection packages created restores lost compatibility puppy 4.2 features changes user interface backend upgraded packages language character support new in-house software optimizations still keeping iso image size 100 mb puppy 5 based project called woof designed assemble puppy linux distribution packages linux distributions woof includes binaries software derived ubuntu debian slackware t2 sde arch repositories puppy 5 came stripped version midori browser used reading help files choice web browsers installed including chromium firefox seamonkey internet suite iron opera puppy 6 built ubuntu 14.04 trusty tahr packages binary compatibility ubuntu 14.04 access ubuntu package repositories tahrpup built woof-ce build system forked barry kauler woof late last year announced retirement puppy development built latest testing branch incorporates latest woof-ce features released pae nopae isos option switch kernels puppy 7 built ubuntu 16.04 xenial xerus packages binary compatibility ubuntu 16.04 access ubuntu package repositories tahrpup built woof-ce build system forked barry kauler woof built latest testing branch incorporates latest woof-ce features released pae nopae isos option switch kernels new ui new kernel update greater hardware compatibility redesign puppy package manager bugfixes base packages inclusion woof structure puppy 8 built ubuntu bionic beaver 18.04.2 packages binary compatibility ubuntu 18.04.2 access ubuntu package repositories bionicpup built woof-ce build system forked barry kauler woof built latest testing branch incorporates latest woof-ce features puppy linux complete operating system bundled collection applications suited general use tasks used rescue disk demonstration system leaves previous installation unaltered accommodation system blank missing hard drive using modern software legacy computers puppy compact size allows boot media computer support function live usb flash devices usb mediums cd internal hard disk drive sd card zip drive ls-120/240 superdisk pxe floppy boot disk chainloads data storage media also ported arm run single board computer raspberry pi puppy linux features built-in tools used create bootable usb drives create new puppy cds remaster new live cd different packages also uses sophisticated write-caching system purpose extending life live usb flash drives puppy linux includes ability use normal persistent updating environment write-once multisession cd/dvd require rewritable disc unique feature sets apart linux distributions distributions offer live cd versions operating systems none offer similar feature puppy bootloader mount hard drives connect network automatically ensures bug even unknowingly incompatible software wo n't corrupt contents devices puppy linux offers session save shutdown since puppy linux fundamentally runs ram files configurations made changed session would disappear otherwise feature enables user either save contents writable storage medium write file system cd containing puppy multisession used create booted cd disc drive supports burning applies cd-rs well cd-rws dvds also possible save files external hard drive usb stick even floppy disk instead root file system puppy also installed hard disk default window manager puppy releases jwm packages icewm desktop fluxbox enlightenment also available via puppy petget package application management system see derivative distributions called puplets come default window managers jwm operating system boots everything puppy package uncompresses ram area ramdisk pc needs least 128 mb ram 8 mb shared video puppy load ramdisk however possible run pc 48 mb ram part system kept hard drive less effectively left cd puppy fairly full-featured system runs entirely ramdisk booted live system 'frugal installation however puppy also supports 'full installation mode enables puppy run hard drive partition without ramdisk applications chosen met various constraints size particular one aims distribution extremely easy set many wizards guide user wide variety common tasks puppy linux package manager puppy package manager installs packages pet puppy enhanced tarball format default also accepts packages distros .deb .rpm .txz .tgz packages using third-party tools convert packages distros pet packages puppy package manager also trim software bloat package reduce disk space used earlier releases puppy linux puppy unleashed used create puppy iso images consists 500 packages put together according user needs however later versions starting puppy linux version 5.0 replaced woof advanced tool creating puppy installations requires internet connection knowledge linux use able download binary source packages another linux distribution process puppy linux packages defining name linux distro equipped simpler version control named bones earlier releases later versions woof fossil version control used puppy also comes remastering tool takes snapshot current system lets user create live cd additional remastering tool able remove installed components puppy linux uses t2 sde build scripts build base binary packages relative ease woof tool remaster tool used build variants puppy linux many variants available variants puppy linux known puplets barry kauler reduced involvement puppy project designed two new distributions within puppy linux family quirky wary quirky – embedded less-stable distro files contained initramfs built kernel simple module loading management fewer drivers included used experimental purposes racy – variant puppy optimized newer pcs wary – puppy variant targeted users old hardware uses older linux kernel long-term support newest applications easy – puppy variant init script completely rewritten uses originally developed application containers aside conventional package management distrowatch reviewer rober storey concluded puppy 5.2.5 april 2011 lot people like puppy — top 10 distrowatch page-hit ranking enjoy puppy run exclusively netbook maybe thing wrong puppy users expectations tend exceed developer intentions detailed review puppy linux may 2011 howard fosdick os news addressed root user issue theory could problem — practice presents downside 've never heard single puppy user suffering problem due fosdick concluded like puppy lightest linux distro 've found still suitable end users install old p-iii p-iv computer family friends use effectively common tasks expensive new machine december 2011 jesse smith writing distrowatch reviewed puppy 5.3.0 slacko puppy praised simplicity flexibility clear explanations noting limitations running root concluded would also like see option added boot process would give user choice running unprivileged mode opposed running root always administrator advantages convenience means user always one careless click away deleting files one exploit away compromised operating system live cd hard beat puppy linux performance functional software minimal hardware requirements flexible great distro long n't push far niche december 2011 howard fosdick reviewed versions puppy linux available concluded puppy diversity flexibility make great community-driven system computer enthusiasts hobbyists tinkerers also make somewhat disorderly world might read bit figure puppy release puplet puppy online documentation extensive confusing always clear docs pertain releases users rely active friendly forum support also noted us enjoy computers sometimes forget many view disdain wrong buy new one every four years earth change interface every release ca n't work puppy great solution folks up-to-date free easy use supports free applications ubuntu slackware puppy repositories user-friendly
[ 4611, 3079, 10760, 7689, 7181, 6158, 3089, 4113, 8209, 8213, 8214, 8727, 6680, 4637, 543, 11297, 7204, 9253, 5670, 11305, 56, 4153, 3129, 59, 3131, 8248, 9276, 3649, 4673, 10817, 3654, 5190, 3147, 5707, 2125, 1107, 3667, 6227, 1110, 6231,...
None
6,394
4
PUSH_and_ACK_floods:push ack floods push floods ack floods denial service attacks based psh ack flags since flags require additional processing may possible overwhelm service setting flags numerous requests proxy filters may drop appropriate packets flags set system considered attack
[ 2299, 10924 ]
None
6,395
1
Hierarchical_database_model:hierarchical database model hierarchical database model data model data organized tree-like structure data stored records connected one another links record collection fields field containing one value type record defines fields record contains hierarchical database model mandates child record one parent whereas parent record one child records order retrieve data hierarchical database whole tree needs traversed starting root node model recognized first database model created ibm 1960s hierarchical structure developed ibm 1960s used early mainframe dbms records relationships form treelike model structure simple inflexible relationship confined one-to-many relationship ibm information management system ims rdm mobile examples hierarchical database system multiple hierarchies data rdm mobile newly designed embedded database mobile computer system hierarchical data model lost traction codd relational model became de facto standard used virtually mainstream database management systems relational-database implementation hierarchical model first discussed published form 1992 see also nested set model hierarchical data organization schemes resurfaced advent xml late 1990s see also xml database hierarchical structure used primarily today storing geographic information file systems currently hierarchical databases still widely used especially applications require high performance availability banking telecommunications one widely used commercial hierarchical databases ims another example use hierarchical databases windows registry microsoft windows operating systems organization could store employee information table contains attributes/columns employee number first name last name department number organization provides employee computer hardware needed computer equipment may used employee assigned organization could store computer hardware information separate table includes part serial number type employee uses tables might look like model codice_1 data table represents parent part hierarchy codice_2 table represents child part hierarchy contrast tree structures usually found computer software algorithms model children point parents shown employee may possess several pieces computer equipment individual piece computer equipment may one employee owner consider following structure child type parent hierarchy stating empno 10 boss 20 30 40 report 20 represented reportsto column relational database terms reportsto column foreign key referencing empno column child data type different would different table would still foreign key referencing empno column employees table simple model commonly known adjacency list model introduced dr. edgar f. codd initial criticisms surfaced relational model could model hierarchical data however model special case general adjacency list graph
[ 2688, 5632, 10632, 8201, 6797, 11024, 9631, 1697, 7076, 6831, 9397, 4155, 7868, 9147, 11324, 2369, 11457, 6085, 9286, 974, 2512, 2901, 7767, 11098, 479, 7650, 8291, 9828, 10471, 7537, 1146, 6651, 3196 ]
Validation
6,396
4
WBAdmin:wbadmin computing codice_1 command-line utility built windows vista windows server 2008 windows 7 windows server 2008 r2 windows 8 windows server 2012 windows 10 operating systems command used perform backups restores operating systems drive volumes computer files folders applications command-line interface codice_1 disk-based backup system create bare metal backup used restore windows operating system similar dissimilar hardware backup file created primarily form microsoft virtual hard disk .vhd files accompanying .xml configuration files backup .vhd file mounted windows disk manager view content however .vhd backup file direct disk clone utility replaces previous microsoft windows backup command-line tool ntbackup came built-into windows nt 4.0 windows 2000 windows xp windows server 2003 command-line version backup restore codice_1 also graphical user interface gui option available simplify creation computer backup restore workstation editions windows 7 use backup wizard located control panel server version done easily installed windows feature using windows management console wbadmin.msc wbadmin management console simplifies restoration whether single file multiple folders using command-line graphical user interface codice_1 creates backup quickly restored using windows media install dvd backup files located removable usb disk without need re-install scratch codice_1 uses differencing engine update backup files original backup file created volume shadow copy service updates changes subsequent full backups take matter moments rather many minutes taken create original backup file automatic backups scheduled regular basis using wizard two kinds restore operations supported
[ 2432, 3970, 8834, 10631, 2568, 6281, 6797, 3856, 6674, 4248, 8729, 4001, 9505, 4771, 7847, 808, 7983, 7088, 10033, 3250, 5300, 9780, 1978, 7356, 5437, 7486, 10428, 960, 9025, 8517, 7244, 1741, 4174, 1750, 9946, 7905, 10727, 4074, 6506, 97...
Test
6,397
2
Stuart_Langridge:stuart langridge stuart langridge also known 'aq 'zippy podcaster developer author member web standards project dom scripting task force invited expert w3c html working group acknowledged commentator dom scripting javascript techniques langridge best known presenter defunct lugradio free software podcast uk along jono bacon longest-serving member team often served incite discussion issues directly related software freedom lugradio frequently advocated freedom yet despite often attracted criticism using proprietary software langridge involved shot jaq podcast collaboration former lugradio co-host jono bacon part bad voltage podcast together jono bacon jeremy garcia founder linuxquestions.org bryan lunduke founder jupiter broadcasting also founder member bad voltage podcast since moved due commitments podcast first aired october 2013 current projects include jokosher multi-track audio editor gnome jackfield program run mac os x dashboard widgets gnome january 2009 langridge joined canonical developer left company 2013 work freelancer kryogenix consulting canonical worked desktop couch ubuntu role canonical ltd. staffer langridge written two books technical publisher sitepoint dhtml utopia run web server using linux apache tony steidler-dennison well writing stylish scripting weblog 2005
[ 9561, 5755, 1396 ]
Validation
6,398
9
TScript:tscript tscript object-oriented embeddable scripting language c++ supports hierarchical transient typed variables tvariable main design criterion create scripting language interface c++ transforming data returning result enables c++ applications change functionality installation basic hello world tscript example standard variable formed fixed data boolean integer decimal variable length variable ascii string wide character string binary string type data used define variable type explicitly declared example code create variable called myinteger assign value zero integer type also declared default value set zero tvariable hierarchical nature similar xml javascript php variables tvariable type also transient integer changed astring assigning string value casting variable astring example integer variable created used reassigned equating astring tvariables also used hold array tvariables valid variable created array index subscripting notation used transform array example code create array four elements tvariable type list.type structure element integer class tscript similar array tvariable handle use strings array scriptures example code create structured variable list monday true list.tuesday false native c++ code structured tvariable elements accessible c++ either native code supporting hierarchical variables tscript able store primitive complex variables within variable structure removes requirement unique difference primitives structured data therefore making class structure logical grouping functionality rather data storage type tscript implements concepts inheritance code encapsulation defined variables example following code snippet show defined variables supports constructor another striking feature tscript function declarations use output parameters rather return values provide syntactic support standard function many procedural languages following algol form tscript pattern changed form change done two things first allows multiple output variables secondly changed return statement error handling function allowing functions list input output variables separated semi column changed normal flow function called used removes need using reference pointers return multiple variables common c/c++ use references scripting languages actually prevented forcing use structure array return multiple values second noticeable thing calling conventions functions integrated error handling purpose similar c++ java tscript since functions return error return statement operates similar throw statement example statement return error error message terminate function return error message alternatively blank statement return terminate function return error convenience tscript offers shorthand function calling situation one returned variable notation substitute case short notation prevents calling code catching errors automatically return parental calling code error handling many languages done use exceptions tscript uses similar process error handling although slightly different tscript global error variable similar traditional errno c although error variable tscript capable holding error code detailed error message many languages use syntax error returned via catch statement make operational flow code awkward situations errors recoverable tscript uses notation allows calling code filter error potentially recovering error returning normal operation returning error calling function c++ supports function overloading enables functions name differentiated input parameters causes tscript issue supporting loose type variables way tell type variable software executed counter problem tscript written run-time linking particular function called dependent type variables function called unusual tactic additional benefits first means need declare functions used example c++ two functions may call one another like situation needs prototyped order call tscript run-time linking means functions declared order without need prototype make writing code much easier less experienced programmers allowing focus logic software requirements language run-time linking also enables language support run-time coding methods like enables tscript programs write example using soap interface remote wsdl encoded script library allowing functions within called coded design time additionally also possible write code learn writing new functions needs tscript among small group scripting languages provide functionality dynamically load link existing shared libraries java jni vb6 two scripting languages enable code written would load third party library execute native interface gives tscript ability use wealth pre-existing functionality code written different languages done without need change shared library ’ interface compiled source code tscript uses standard c++ class encapsulation allocate de-allocate memory resources means allocated memory released variable containing destroyed operated differently garbage collection model java reference counting model .net languages operation system resources files sockets encryption keys managed via reference counting mechanism similar .net released soon variables containing values ability load existing shared libraries script access privileges granted user executes guard malicious code resources beyond basic memory allocation required granted script also includes ability use message boxes prompt user read and/or write access file directory using internet connection security architecture designed allow running scripts similar way javascript enabling usefulness powerful scripting languages like perl
[ 8644, 9828, 3462, 847, 7983, 8559, 9780, 3573, 10486, 823, 10555, 479 ]
None
6,399
7
Chaser_(company):chaser company chaser cloud-based credit control software founded ceo david tuck former finance director wayn idio financial controller fever-tree ltd 2015 future 50 named chaser one britain disruptive businesses well awarding friend business award 2016 chaser named xero add-on partner year
[]
Test
6,400
3
Space_Manbow:space manbow space manbow shoot 'em video game developed published konami msx2 msx2+ home computers 1989 later re-released mobile phones september 1 2006 nintendo wii virtual console service november 24 2009 february 19 2014 wii u july 28 2015 windows store project egg never released outside japan game player pilots starship shaped like mambo fish two weapon types available throughout game powered standard pickups weapons gradually lose power unless player makes additional pickups however ship helped two stationary options similar found gradius series options able shift alternatively fire three directions forward backward towards top/bottom screen
[ 10931, 11564 ]
None
6,401
2
ZyNOS:zynos zynos proprietary operating system used network devices made zyxel communications name contraction zyxel network operating system nos zyxel first introduced zynos 1998 zyxel released zynos version 4.0 gs2200 series 24 48 port ethernet switches april 2012 appears versions differ zyxel products web and/or command line interface cli depending device web access accomplished connecting ethernet cable pc open port device entering ip address device web browser rs-232 serial console port provided devices cli access accomplished using ssh telnet listed categories cli commands grouped web configurator divided following categories january 2014 zynos rom-0 vulnerability identified vulnerability allowed attacker download router configuration rom-0 file without type authentication required configuration file later decompressed expose router administrator password isp password wireless password etc danish computer security company secunia reports unpatched advisories vulnerabilities zynos version 4.x secunia reports seven advisories six vulnerabilities zynos version 3.x five advisories unpatched secunia rates severe unpatched advisory less critical dns vulnerability found certain zynos firmware versions versions affected narrowed attack done remote location regardless user interface accessible outside lan
[ 5472, 8998, 11112, 10058, 8432, 3007 ]
Test
6,402
4
WinNuke:winnuke computer security winnuke example nuke remote denial-of-service attack dos affected microsoft windows 95 microsoft windows nt microsoft windows 3.1x computer operating systems exploit sent string out-of-band data oob data target computer tcp port 139 netbios causing lock display blue screen death damage change data computer hard disk unsaved data would lost so-called oob simply means malicious tcp packet contained urgent pointer urg urgent pointer rarely used field tcp header used indicate data tcp stream processed quickly recipient affected operating systems handle urgent pointer field correctly person screen-name _eci published c source code exploit may 9 1997 source code widely used distributed microsoft forced create security patches released weeks later time numerous flavors exploit appeared going names fedup gimp killme killwin knewkem liquidnuke mnuke netnuke muerte nuke nukeattack nuker102 pnewq project1 pstlince simportnuke sprite sprite32 vconnect vzmnuker wingenocide winnukeit winnuker02 winnukev95 wnuke3269 wnuke4 wnuke95 company called semisoft solutions new zealand created small program called antinuke blocks winnuke without install official patch years later second incarnation winnuke uses another similar exploit found
[ 2409, 10924, 6735, 7983, 3473, 8976, 2045, 2558 ]
Test
6,403
3
Abstraction_layer:abstraction layer computing abstraction layer abstraction level way hiding working details subsystem allowing separation concerns facilitate interoperability platform independence examples software models use layers abstraction include osi model network protocols opengl graphics libraries computer science abstraction layer generalization conceptual model algorithm away specific implementation generalizations arise broad similarities best encapsulated models express similarities present various specific implementations simplification provided good abstraction layer allows easy reuse distilling useful concept design pattern situations may accurately applied quickly recognized layer considered top another depends every layer exist without layers requires layers function frequently abstraction layers composed hierarchy abstraction levels osi model comprises seven abstraction layers layer model encapsulates addresses different part needs digital communications thereby reducing complexity associated engineering solutions famous aphorism david wheeler problems computer science solved another level indirection often deliberately misquoted abstraction substituted indirection also sometimes misattributed butler lampson kevlin henney corollary ... except problem many layers indirection computer architecture computer system usually represented consisting several abstraction levels programmable logic often considered part hardware logical definitions also sometimes seen part device software firmware firmware may include low-level software also include software including operating system applications software layers divided hardware abstraction layers physical logical device drivers repositories filesystems operating system kernels middleware applications others distinction also made low-level programming languages like vhdl machine language assembly language compiled language interpreter script language unix operating system types input output operations considered streams bytes read device written device stream bytes model used file i/o socket i/o terminal i/o order provide device independence order read write device application level program calls function open device may real device terminal virtual device network port file file system device physical characteristics mediated operating system turn presents abstract interface allows programmer read write bytes from/to device operating system performs actual transformation needed read write stream bytes device graphics libraries opengl provide abstract graphical device model interface library responsible translating commands provided programmer specific device commands needed draw graphical elements objects specific device commands plotter different device commands crt monitor graphics library hides implementation device dependent details providing abstract interface provides set primitives generally useful drawing graphical objects
[ 2948, 6021, 9860, 3847, 7175, 521, 9224, 8461, 5774, 1297, 5395, 10005, 4634, 5531, 3613, 2206, 2339, 3491, 2730, 3371, 2476, 6061, 2222, 3762, 9780, 4919, 9272, 7865, 8252, 9921, 11332, 9286, 3529, 4042, 9420, 9932, 3793, 8401, 10835, 29...
Test
6,404
3
B.C._II:_Grog's_Revenge:b.c ii grog revenge b.c ii grog revenge 1984 video game sierra on-line commodore 64 colecovision msx sequel b.c quest tires based b.c newspaper comic strip johnny hart player controls thor caveman rides stone unicycle thor searching meaning life within several mountains player must navigate mountains collecting clams like comic strip used money case pay toll another caveman peter access next mountain two modes play first along mountainside user move four directions must avoid falling cliff slamming wall hitting rock hole encountering creature grog yell grog knock player mountain also green dinosaur eat player tire contact player may enter caves enter second mode caves dark except beam light emanating player clams must collected without running stalagmites end mountain bridge new mountain player enough clams game continues otherwise necessary return find clams zzap 64 gave game 91 rating describing stunningly impressive programme
[ 2633, 10931, 6405, 9006 ]
Validation
6,405
3
B.C.'s_Quest_for_Tires:b.c quest tires b.c quest tires home video game designed rick banks michael bate published sierra on-line 1983 versions released commodore 64 atari 8-bit family colecovision zx spectrum msx apple ii based comic strip b.c johnny hart bc quest tires scrolling game similar irem moon patrol previous year title play title contemporaneous film quest fire sequel released 1984 player takes role caveman thor rescue girlfriend cute chick kidnapped dinosaur must travel stone unicycle actually impossible wheel several levels level thor moving left right avoiding various dangers b.c quest tires action game taking place several consecutive levels levels start simple thor jump potholes duck tree branches later levels become complex example requiring thor jump turtles order cross lake carried lava pit dooky bird b.c characters fat broad also appear levels softline stated given conventional gameplay get-from-point-a-to-point-b kind game use familiar comic characters made player feel like finishing game worthwhile ... otherwise magazine concluded b.c quest tires n't much computer game interactive cartoon cartoon limits provide challenge antic approved game another 'shoot aliens save world scenario first rate animation predicted players would enjoy game day two relegate shelf compute praised game excellent graphics animation approach cartoon standards
[ 10178, 6404, 2633, 9166, 9006 ]
Test
6,406
3
Failure_detector:failure detector distributed computing system failure detector computer application subsystem responsible detection node failures crashes failure detectors first introduced 1996 chandra toueg book unreliable failure detectors reliable distributed systems book depicts failure detector tool improve consensus achievement reliability atomic broadcast sequence messages distributed system word failure detectors seek errors process system maintain level reliability practice failure detectors spot crashes system ban processes making mistakes prevent serious crashes errors 21st century failure detectors widely used distributed computing systems detect application errors software application stops functioning properly distributed computing projects see list distributed computing projects become popular usage failure detects also becomes important critical chandra toueg co-authors book unreliable failure detectors reliable distributed system 1996 approached concept detecting failure nodes introducing unreliable failure detector describe behavior unreliable failure detector distributed computing system process system entered local failure detector component local component examine portion processes within system addition process must also contain programs currently suspected failure detectors chandra toueg claimed unreliable failure detector still reliable detecting errors made system generalize unreliable failure detectors forms failure detectors unreliable failure detectors failure detectors share properties furthermore chandra toueg point important fact failure detector prevent crashes system even crashed program suspected previously construction failure detector essential difficult problem occurred development fault-tolerant component distributed computer system result failure detector invented need detecting errors massive information transaction distributed computing systems classes failure detectors distinguished two important properties completeness accuracy completeness means failure detectors would find programs finally crashed process whereas accuracy means correct decisions failure detectors made process degrees completeness depend number crashed process suspected failure detector certain period degrees accuracy depend number mistakes failure detector made certain period failure detectors categorized following eight types properties failure detectors described nutshell properties failure detectors depend fast failure detector detects actual failures well avoids false detection perfect failure detector find errors without mistakes whereas weak failure detector find errors make numerous mistakes different types failure detectors obtained changing properties failure detectors first examples show increase completeness failure detector second example shows change one type failure detector another following example abstracted department computer science yale university functions boosting completeness failure detector initially suspects ∅ forever upon receiving p process q example p crashes weak-detector eventually suspect failure detectors system eventually suspect p infinite loop created failure detectors example also shows weak completeness failure detector also suspect crashes eventually inspection crashed programs depend completeness following correctness arguments satisfy algorithm changing failure detector w failure detector failure detector w weak completeness failure detector strong completeness weak accuracy arguments satisfied reduction weak failure detector w strong failure detector agree algorithm within distributed computing system
[ 9345, 9224, 1801, 5774, 5245, 5404, 10909, 10658, 939, 7983, 8122, 8262, 4423, 9926, 9932, 9677, 5585, 11474, 2901, 9688, 731, 11612, 11487, 7780, 9714, 2804, 2294, 119, 10102, 5373, 2558 ]
Test
6,407
3
Fahrenheit_451_(video_game):fahrenheit 451 video game fahrenheit 451 computer strategy game released 1984 based novel name ray bradbury originally released software company trillium re-released 1985 company ’ new name telarium player goal help guy montag main character novel evade authorities make contact underground movement bradbury contributed game writing prologue responses game intelligent computer ray plot text game written len neufeld known previous authorship books interplanetary spy interactive novel series working aegis byron preiss visual publications game released apple ii atari st commodore 64 ms-dos macintosh msx tandy computers ending fahrenheit 451 former fireman guy montag fugitive wanted murder killing supervisor stealing contraband books game takes place five years later pointless war swept across country leading martial law firemen agent literary underground montag makes way new york mission break heavily guarded new york library 42nd street books burned contents transferred microcassette microcassettes need retrieved uploaded underground information network along way discovers clarisse young woman inspired rebellion still alive challenges player involve finding ways alter one appearance fingerprints chemindex body chemistry order evade detection issues arise finding food eat safe places rest player must also make contact members underground hiding city use lighter literary quotations end montag able break central library meet clarisse microcassettes found transmitted information network resistance cells world montag clarisse achieve victory saving extensive collection literature costs lives firemen storm office last cassette transmitted immolating 1980s reviewer praised gripping prose unique approach obtaining using literary quotations german reviewers maintained complexity plot nice graphics large number scenes non-fictional characters 1993 german study history interactive fiction recognized fahrenheit 451 highly complex interactive computer fairy tale hochkomplexes interaktives computermärchen adventure play classic literature quotations time game narrator player gleichsam literaturliteratur ein spiel mit klassikern und zugleich mit dem erzähler dem spieler selbst
[ 1183, 1351, 9006, 1326, 9166, 1311 ]
Train
6,408
9
Computable_Document_Format:computable document format computable document format cdf electronic document format designed allow easy authoring dynamically generated interactive content cdf published public format created wolfram research computable document format supports gui elements sliders menus buttons content updated using embedded computation response gui interaction contents include formatted text tables images sounds animations cdf supports mathematica typesetting technical notation paginated layout structured drill layout slideshow mode supported styles controlled using cascading style sheet cdf files read using proprietary cdf player restrictive license downloaded free charge wolfram research cdf files created using mathematica online authoring tools available wolfram cloud computable document format used electronic books pearson education specifically mymathlab provide content wolfram demonstrations project add client-side interactivity wolfram alpha
[ 1162, 6539, 9100, 7069, 1443, 11555, 8627, 8628, 1083, 1347, 5830, 5319, 3921, 8923, 8413, 3567, 3828, 4855, 7422 ]
Test
6,409
3
Cabbage_Patch_Kids:_Adventures_in_the_Park:cabbage patch kids adventures park cabbage patch kids adventures park 1984 action/platform game based cabbage patch kids franchise first game cabbage patch kids adventures series mobygames described gameplay thus player cabbage patch kid pigtails day park day includes jumping onto vines leaping holes bouncing onto correct platforms misplaced jump lose life additionally creatures bees end player turn touched several screens challenge different combinations obstacles atariprotos wrote according colecovision version manual anna lee decided go exercise local park soon caught wild adventure hence subtitle adventures park game separated several different screens referred game scenes different obstacle kid overcome obstacles include bouncing balls water filled pits floating platforms bees even fires level consists ten scenes must overcome time limit runs along way anna may also collect various objects hidden trees using well placed trampolines points objects necessary win wake video game crash 1983 game served coleco attempt use one properties way cabbage patch kids give boost-through-association one properties way colecovision unreleased atari 2600 version developed individeo seen light day thanks discovery alex handy flea market california 2008 game known exist time thanks interview conducted former coleco programmer ed english many years prior atariage wrote atari 2600 version luck would cabbage patch kids adventures park impressive game comparable quality many modern homebrew games atariprotos said may able compare graphically colecovision version atari 2600 version cpk amazing feat programming gameplay retained conversion even included cute little background tune rarity 2600 games appears cpk simply victim collapsing game market time final version ready september 1984 coleco stopped 2600 operations
[ 9006 ]
Test
6,410
4
Panama_Papers:_South_America_allegations,_reactions,_and_investigations:panama papers south america allegations reactions investigations panama papers 11.5 million leaked documents detail financial attorney–client information 214,488 offshore entities documents dating back 1970s created taken panamanian law firm corporate service provider mossack fonseca leaked 2015 anonymous source page details related allegations reactions investigations south america argentine president mauricio macri listed head trading company based bahamas disclose tenure mayor buenos aires clear whether disclosure non-equity directorships required argentine law april 7 2016 federal prosecutor federico delgado began formal investigation macri involvement fleg trading ltd. company registered panama president macri listed director judge sebastián casanello asked start file inquiry initial petition made neuquén representative darío martínez martínez claims macri could guilty perjury due omissions sworn statement martínez also referenced another offshore company kagemusha sa named akira kurosawa 1980 film established 1981 president macri also connections investigation news outlets el destape infoeconomico end april found however macri involved least eight holding companies least seven founded run friends relatives mossack fonseca active least one year old daniel muñoz private secretary confidant former argentinian president néstor kirchner later also served two years aide néstor kirchner wife cristina fernández de kirchner president argentina 2007 2015 muñoz wife linked gold black limited company incorporated british virgin islands 2010 invest us real estate origin company funds listed personal savings 2010 beginning 2015 company ownership bearer shares financial instrument used hide owner identity one directors sergio tadisco told icij partner canal trece figurehead said agreed name used 2011 friendship muñoz wife january 2015 muñoz wife became named shareholders owning 50 percent time mossack fonseca become registered agent gold black however three weeks later compliance department proposed resigning muñoz identified connection governments kirchners resignation became effective june 2015 2009 muñoz investigated illicit enrichment charge later dropped 2013 argentinian media reported muñoz helped transfer bags money belonging president néstor kirchner buenos aires argentine capital santa cruz kirchner home state charges relation matter dismissed july 2015 lack evidence may 25 2016 died cancer last four years family argentine barcelona football player lionel messi said would file complaint reports said mossack fonseca set company 2012 named mega star enterprises inc family denied messi involved called accusations slanderous said company referred panama papers inactive messi declared income image rights proceedings argentine tax agency messi alongside father jorge stood trial three counts tax evasion may 2016 spanish prosecutors say tried evade €4.1m taxes income image rights assigning front companies belize uruguay 6 july 2016 messi father found guilty tax fraud handed suspended 21-month prison sentences respectively ordered pay €1.7 million €1.4 million fines five billionaires brazil sons two brazilian billionaires four former billionaire brazilian families appear panama papers leak according forbes brazilian news website uol access leaked documents published article list like many panama paper reports story cautions people mentioned documents may nothing wrong general nothing illegal per se offshore company fact common international business set one transactions joint ventures 're business world said brazil-based marcello hallake brazil-based partner law firm jones day however six ten members congress face one criminal investigation another high-profile construction executives senator among 84 people arrested petrobras scandal number reflects job protections 1988 constitution judges prosecutors three men marcel herrmann telles carlos alberto sicupira jorge felipe lemann son long-time business partner jorge paulo lemann brazil richest man controlling shareholder anheuser-busch inbev set three offshore companies british virgin islands bahamas tied private equity firm 3g beer firm ambev unit anheuser-busch inbev according uol two companies longer active men longer tied third told uol companies publicly disclosed registered documents described lemann advisor brazilian firm sao carlos father father business partners controlling stake panama papers reveal former supreme court judge joaquim barbosa bought apartment downtown miami police raided são paulo offices mossack fonseca january 2016 seeking records offshore companies firm opened two former executives petróleo brasileiro s.a. petrobras convicted 2015 corruption money laundering police say companies used hide illegally diverted funds january 2016 even panama papers published brazilian federal police part corruption investigation known operation car wash already accused mossack fonseca law firm helping suspects create offshore entities hide corrupt money alleged firm used real estate company help hide criminal proceeds scheme involving petrobras leak complicated already volatile political situation brazil tanking economy led calls impeachment president dilma rousseff amid many revelations political corruption impeachment proceedings began became clear next two people order succession implicated petrobras scandal according estado de são paulo company belonging eduardo cunha speaker lower house legislature leader impeachment drive surfaced panama papers rousseff mentioned papers politicians seven different political parties brazil named clients mossack fonseca leaked files mention politicians brazil largest party pmdb broke away president dilma rousseff coalition 2016 political figures psdb prominent opposition party country also mentioned leaks well others pdt pp psb psd ptb parties politicians rousseff party mentioned leaks group dutch journalists daily newspaper trouw found evidence panama papers showing tv globo cited many times money laundering investigation de nederlandsche bank revealed years media outlet conducted irregular financial transactions tax havens order pay broadcast rights copa libertadores head chilean branch transparency international campaigns corporate secrecy resigned name linked five firms tax havens leaked documents national directorate taxes customs launched investigation 850 clients mossack fonseca colombia subsidiary mossack fonseca established 2009 2014 colombia placed panama onto blacklist tax havens leaked documents also led panama move forward ongoing negotiations colombia tax information-sharing ecuadorian journalists published names three current government officials panama papers also reveal 2012 panamanian government believed mossack fonseca company anti-corruption prosecutor investigating embezzlement orlion s.a. sold president rafael correa delgado brother fabricio correa 2006 mossack fonseca asked shareholder information contacted legalsa asociados law firm guayaquil ecuador set offshore client shortly afterwards firm dropped offshore due lack information correa cousin pedro delgado campana convicted absentia ecuador embezzlement bought home north miami beach mossack fonseca company wife consul ecuador miami time arturo torres investigative editor el comercio told knight center newspaper published two stories connected panama papers rest six journalists ecuador report received summonses subpoenas little-known anticorruption agency council citizen participation social control cpccs demanding documents scheduled hearing postponed due earthquake april 16 national assembly commission justice also opened investigation mónica almeida el universo said government taken coverage panama papers attack stories ecuadorian media mentioned attorney general galo chiriboga pedro delgado campaña former president central bank ecuador correa cousin javier molina former adviser ministry intelligence one founders mossack fonseca quito two supporters leading candidate keiko fujimori undeclared interests mossack fonseca companies according icij partner ojopúblico said well three renowned chefs peru largest timber company also implicated mario vargas llosa also spanish nationality wife bought offshore company buffer mossack fonseca couple appears linked september 1 2010 october 6 year shortly vargas llosa nobel prize literature appearing linked denied using tax havens five people arrested april 22 suspicion laundering funds mexican drug cartel uruguayan investigation underway authorities decided move reports icij partner weekly búsqueda gerardo gonzález valencia used mossack fonseca companies buy real estate uruguay head los cuinos cartel brother abigael gonzález valencia imprisoned mexico united states designated drug kingpin well brother-in-law nemesio oseguera cervantes leads jalisco new generation cartel cjng many boliburguesía individuals became wealthy hugo chávez nicolás maduro administrations included scandal josmel velásquez brother security official late hugo chávez arrested april 15 trying catch flight country due offshore company revealed panama papers mother amelis figueroa also arrested allowed return home due health venezuelan news site armando.info reported josmel brother adrian former aide late president hugo chávez opened shell company though mossack fonseca republic seychelles 50,000 deposit report based documents leaked panamanian law firm mossack fonseca velásquez indicted april 20 franklin durán notorious venezuela argentina part el maletinazo suitcase scandal involving alleged illicit contribution venezuelan president hugo chavez christina fernandez de kirchner 800,000 venezuelan state-run oil company pdvsa able open shell company jail cell united states serving sentence operating unregistered foreign agent
[ 10867, 1251 ]
Test
6,411
2
Code_Access_Security:code access security code access security cas microsoft .net framework microsoft solution prevent untrusted code performing privileged actions clr loads assembly obtain evidence assembly use identify code group assembly belongs code group contains permission set one permissions code performs privileged action perform code access demand cause clr walk call stack examine permission set granted assembly method call stack code groups permission sets determined administrator machine defines security policy evidence information associated assembly default evidences used .net code access security developer use custom evidence so-called assembly evidence requires writing security assembly version 1.1 .net facility work evidence based hash assembly easily obtained code example c evidence may obtained following code clause this.gettype .assembly.evidence policy set expressions uses evidence determine code group membership code group gives permission set assemblies within group four policies .net first three policies stored xml files administered .net configuration tool 1.1 mscorcfg.msc final policy administered code current application domain code access security present assembly evidence policy take intersection permissions common generated permission set permissions granted assembly default enterprise user appdomain policies give full trust allow assemblies permissions machine policy restrictive since intersection taken means final permission set determined machine policy note policy system eliminated .net framework 4.0 code groups associate piece evidence named permission set administrator uses .net configuration tool specify particular type evidence example site particular value evidence example www.mysite.com identifies permission set code group granted code performs privileged action make demand one permissions demand makes clr walk call stack method clr ensure demanded permissions method assembly granted permissions permission granted security exception thrown prevents downloaded code performing privileged actions example assembly downloaded untrusted site assembly file io permissions assembly attempts access file code access security throw exception preventing call
[ 5952, 929, 10624, 11584, 11617, 1509, 11559, 4972, 11212, 5040, 3573, 3736, 3705, 10684, 479 ]
Test
6,412
2
List_of_Unix_systems:list unix systems version unix time-sharing system evolved version version one evolving prototypal unix variants descendants displayed release version 10 unix research team bell labs turned focus plan 9 bell labs distinct operating system first released public 1993 systems list evolved version unix system iii evolving unix time-sharing system v7 descendants unix time-sharing system v6
[ 640, 2560, 5506, 2179, 132, 6787, 7682, 11013, 11145, 7566, 787, 5397, 8725, 1304, 1561, 414, 671, 3487, 3488, 6049, 8991, 7460, 7848, 3241, 5036, 6445, 10156, 7983, 3248, 1971, 2995, 9141, 823, 7224, 9784, 9151, 9027, 10436, 2120, 6218, ...
Test
6,413
6
GNOME_Disks:gnome disks gnome disks graphical front-end udisks included gnome-disk-utility package used partition management s.m.a.r.t monitoring benchmarking software raid v. 3.12 introduction included gnome documentation project disks used known gnome disk utility palimpsest disk utility udisks named devicekit-disks earlier releases devicekit-disks part devicekit planned replace certain aspects hal hal devicekit deprecated gnome disks included default several linux distributions including debian ubuntu linux mint trisquel fedora red hat enterprise linux 6 centos
[ 11394, 2955, 10255, 8848, 9872, 3859, 7450, 4506, 1822, 6691, 6694, 8621, 7983, 9908, 823, 3649, 708, 3015, 4177, 1112, 5095, 4459, 9455, 3189, 2045 ]
None
6,414
9
Comparison_of_Pascal_and_Delphi:comparison pascal delphi devised niklaus wirth late 1960s early 1970s pascal programming language originally produced borland software corporation embarcadero delphi composed ide set standard libraries pascal-based language commonly called either object pascal delphi pascal simply 'delphi embarcadero current documentation refers 'the delphi language object pascal since first released become popular commercial pascal implementation developing pascal wirth employed bootstrapping procedure newer version pascal compiler written compiled predecessor thus 'p2 compiler written dialect compilable 'p1 'p3 turn written 'p2 way till 'p5 'p5 compiler implemented pascal final state defined wirth subsequently became standardised 'iso 7185 pascal borland dialect like popular ucsd pascal took 'p4 version language basis rather wirth final revision much evolution independent standard pascal borland variant became basis delphi page goes differences delphi standard pascal go delphi-specific extensions language numerous still increasing 1 way procedures functions passed parameters differs delphi requires explicit procedural types declared standard pascal 2 delphi support called 'extraprocedural gotos goto statements may reference targets outside current procedure/function body 3 standard pascal file 'buffer variables together 'get 'put standard procedures operate neither supported delphi 4 given variant record standard pascal size particular variant specified delphi support form 'sized dynamic variable allocation 5 functions 'pack 'unpack implemented delphi 6 delphi compiler treat synonyms like standard pascal requires words valid delphi instead delphi uses scheme allowing different comment types indicate nested comments 7 delphi replace eoln space pascal standard requires reading end line eoln character supposed replaced space iso 7185 instead reading eoln delphi gives character code carriage return 13 followed line feed 10 8 numbers booleans printed 'default field widths delphi version write writeln standard procedures instead printed minimum amount space example delphi equivalent however standard pascal requires equivalent following totalwidth implementation-defined similarly booleans equivalent delphi iso 7185 9 temporary files supported delphi using traditional pascal i/o executing reset rewrite results error standard pascal opens temporary file exists duration program automatically deleted 10 notwithstanding fact delphi still allows using much traditional pascal rtl delphi-specific library functionality generally implemented ordinary delphi code uses rather adds compiler-provided intrinsics philosophy contrasts standard pascal whose rtl must provided compiler example standard pascal 'file type intrinsic type sort like record another compiler-defined type alongside records contrast tfilestream class delphi ordinary delphi class written ordinary delphi code similarly read readln write writeln standard procedures signatures legal pascal signatures delphi still implements vary rarely delphi-specific rtl routines require similarly special handling rather language evolved include features 'open arrays default parameters procedural overloading used user-written routines
[ 512, 1145, 1931, 8973, 10510, 6160, 5521, 8082, 11411, 3736, 155, 6558, 5663, 5796, 428, 5806, 9008, 3765, 7479, 10043, 10684, 8510, 963, 8262, 5961, 1610, 1611, 8524, 8397, 9804, 11212, 11219, 5588, 7894, 4057, 10586, 7775, 4069, 7274, 6...
None
6,415
3
Coprocessor:coprocessor coprocessor computer processor used supplement functions primary processor cpu operations performed coprocessor may floating point arithmetic graphics signal processing string processing cryptography i/o interfacing peripheral devices offloading processor-intensive tasks main processor coprocessors accelerate system performance coprocessors allow line computers customized customers need extra performance need pay coprocessors vary degree autonomy fpus rely direct control via coprocessor instructions embedded cpu instruction stream others independent processors right capable working asynchronously still optimized general-purpose code incapable due limited instruction set focused accelerating specific tasks common driven direct memory access dma host processor building command list playstation 2 emotion engine contained unusual dsp-like simd vector unit capable modes operation make best use mainframe computer processor time input/output tasks delegated separate systems called channel i/o mainframe would require i/o processing instead would set parameters input output operation signal channel processor carry whole operation dedicating relatively simple sub-processors handle time-consuming i/o formatting processing overall system performance improved coprocessors floating-point arithmetic first appeared desktop computers 1970s became common throughout 1980s early 1990s early 8-bit 16-bit processors used software carry floating-point arithmetic operations coprocessor supported floating-point calculations could carried many times faster math coprocessors popular purchases users computer-aided design cad software scientific engineering calculations floating-point units amd 9511 intel 8231/8232 weitek fpus treated peripheral devices others intel 8087 motorola 68881 national 32081 closely integrated cpu another form coprocessor video display coprocessor used atari 8-bit family texas instruments ti-99/4a msx home-computers called video display controllers commodore amiga custom chipset included unit known copper well blitter accelerating bitmap manipulation memory microprocessors developed cost integrating floating point arithmetic functions processor declined high processor speeds also made closely integrated coprocessor difficult implement separately packaged mathematics coprocessors uncommon desktop computers demand dedicated graphics coprocessor grown however particularly due increasing demand realistic 3d graphics computer games original ibm pc included socket intel 8087 floating-point coprocessor aka fpu popular option people using pc computer-aided design mathematics-intensive calculations architecture coprocessor speeds floating-point arithmetic order fiftyfold users used pc word processing example saved high cost coprocessor would accelerated performance text manipulation operations 8087 tightly integrated 8086/8088 responded floating-point machine code operation codes inserted 8088 instruction stream 8088 processor without 8087 could interpret instructions requiring separate versions programs fpu non-fpu systems least test run time detect fpu select appropriate mathematical library functions another coprocessor 8086/8088 central processor 8089 input/output coprocessor used programming technique 8087 input/output operations transfer data memory peripheral device reducing load cpu ibm n't use ibm pc design intel stopped development type coprocessor intel 80386 microprocessor used optional math coprocessor 80387 perform floating point operations directly hardware intel 80486dx processor included floating-point hardware chip intel released cost-reduced processor 80486sx floating point hardware also sold 80487sx coprocessor essentially disabled main processor installed since 80487sx complete 80486dx different set pin connections intel processors later 80486 integrated floating-point hardware main processor chip advances integration eliminated cost advantage selling floating point processor optional element would difficult adapt circuit-board techniques adequate 75 mhz processor speed meet time-delay power consumption radio-frequency interference standards required gigahertz-range clock speeds on-chip floating point processors still referred coprocessors operate parallel main cpu era 8- 16-bit desktop computers another common source floating-point coprocessors weitek coprocessors different instruction set intel coprocessors used different socket motherboards supported weitek processors provide transcendental mathematics functions example trigonometric functions like intel x87 family required specific software libraries support functions motorola 68000 family 68881/68882 coprocessors provided similar floating-point speed acceleration intel processors computers using 68000 family equipped hardware floating point processor could trap emulate floating-point instructions software although slower allowed one binary version program distributed cases 68451 memory-management coprocessor designed work 68020 processor dedicated graphics processing units gpus form graphics cards commonplace certain models sound cards fitted dedicated processors providing digital multichannel mixing real-time dsp effects early 1990 1994 gravis ultrasound sound blaster awe32 typical examples sound blaster audigy sound blaster x-fi recent examples 2006 ageia announced add-in card computers called physx ppu physx designed perform complex physics computations cpu gpu perform time consuming calculations designed video games although mathematical uses could theoretically developed 2008 nvidia purchased company phased physx card line functionality added software allowing gpus render physx cores normally used graphics processing using nvidia physx engine software 2006 bigfoot systems unveiled pci add-in card christened killernic ran special linux kernel freescale powerquicc running 400 mhz calling freescale chip network processing unit npu spursengine media-oriented add-in card coprocessor based cell microarchitecture spus vector coprocessors 2008 khronos group released opencl aim support general-purpose cpus ati/amd nvidia gpus accelerators single common language compute kernels 2010s mobile computation devices implemented sensor hub coprocessor examples coprocessors used handling sensor integration mobile devices include apple m7 m8 motion coprocessors qualcomm snapdragon sensor core qualcomm hexagon holographic processing unit microsoft hololens 2012 intel announced intel xeon phi coprocessor various companies developing coprocessors aimed accelerating artificial neural networks vision cognitive tasks e.g vision processing units truenorth zeroth 2018 ai chips smartphones apple several android phone vendors time cpus tended grow absorb functionality popular coprocessors fpus considered integral part processors main pipeline simd units gave multimedia acceleration taking role various dsp accelerator cards even gpus become integrated cpu dies nonetheless specialized units remain popular away desktop machines additional power allow continued evolution independently main processor product lines
[ 7173, 9224, 9739, 1548, 2066, 7699, 5655, 2073, 10779, 10781, 6181, 8231, 3630, 6705, 7218, 11314, 58, 6715, 4156, 10813, 2623, 2113, 7234, 3142, 9799, 10316, 2638, 5711, 3157, 4188, 1122, 7269, 3175, 6250, 8301, 8815, 3185, 630, 7286, 88...
Test
6,416
6
F2FS:f2fs f2fs flash-friendly file system flash file system initially developed samsung electronics linux kernel motive f2fs build file system start takes account characteristics nand flash memory-based storage devices solid-state disks emmc sd cards widely used computer systems ranging mobile devices servers f2fs designed basis log-structured file system approach adapted newer forms storage jaegeuk kim principal f2fs author stated remedies known issues older log-structured file systems snowball effect wandering trees high cleaning overhead addition since nand-based storage device shows different characteristics according internal geometry flash memory management scheme flash translation layer ftl supports various parameters configuring on-disk layout also selecting allocation cleaning algorithms f2fs divides whole volume number segments fixed 2 mb section composed consecutive segments zone consists set sections default section zone sizes set size users easily modify size codice_1 f2fs splits entire volume six areas except superblock area consist multiple segments described order avoid misalignment file system flash storage f2fs aligns start block address cp segment size also aligns main area start block address zone size reserving segments ssa area f2fs uses checkpoint scheme maintain file system integrity mount time f2fs first tries find last valid checkpoint data scanning cp area order reduce scanning time f2fs uses two copies cp one always indicates last valid data called shadow copy mechanism addition cp nat sit also use shadow copy mechanism file system consistency cp points nat sit copies valid key data structure node similar traditional file structures f2fs three types nodes inode direct node indirect node f2fs assigns 4 kb inode block contains 923 data block indices two direct node pointers two indirect node pointers one double indirect node pointer described direct node block contains 1018 data block indices indirect node block contains 1018 node block indices thus one inode block i.e. file covers note node blocks mapped nat means location node translated nat mitigate wandering tree problem f2fs able cut propagation node updates caused leaf data writes directory entry dentry occupies 11 bytes consists following attributes dentry block consists 214 dentry slots file names bitmap used represent whether dentry valid dentry block occupies 4 kb following composition f2fs implements multi-level hash tables directory structure level hash table dedicated number hash buckets shown note 2b means bucket includes 2 data blocks f2fs finds file name directory first hash value file name calculated f2fs scans hash table level 0 find dentry consisting file name inode number found f2fs scans next hash table level 1 way f2fs scans hash tables level incrementally 1 n level f2fs needs scan one bucket determined following equation shows log files complexity case file creation f2fs finds empty consecutive slots cover file name f2fs searches empty slots hash tables whole levels 1 n way lookup operation runtime f2fs manages six active logs inside main area hot/warm/cold node hot/warm/cold data lfs two schemes free space management threaded log copy-and-compaction copy-and-compaction scheme known cleaning well-suited devices showing good sequential write performance since free segments served time writing new data however suffers cleaning overhead high utilization conversely threaded log scheme suffers random writes cleaning process needed f2fs adopts hybrid scheme copy-and-compaction scheme adopted default policy dynamically changed threaded log scheme according file system status order align f2fs underlying flash-based storage f2fs allocates segment unit section f2fs expects section size garbage collection unit size ftl respect mapping granularity ftl f2fs allocates section active logs many different zones possible ftl write active log data one allocation unit according mapping granularity f2fs cleaning demand background on-demand cleaning triggered enough free segments serve vfs calls background cleaner executed kernel thread triggers cleaning job system idle f2fs supports two victim selection policies greedy cost-benefit algorithms greedy algorithm f2fs selects victim segment smallest number valid blocks cost-benefit algorithm f2fs selects victim segment according segment age number valid blocks order address log block thrashing problem present greedy algorithm f2fs uses greedy algorithm on-demand cleaning background cleaner uses cost-benefit algorithm order identify whether data victim segment valid f2fs manages bitmap bit represents validity block bitmap composed bit stream covering whole blocks main area motorola mobility used f2fs moto g/e/x droid phones since 2012 google first used f2fs nexus 9 2014 however google products n't adopt f2fs pixel 3 f2fs updated inline crypto hardware support huawei used f2fs since huawei p9 2016 oneplus used f2fs since oneplus 3t 2016 zte used f2fs since zte axon 10 pro 2019
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 4637, 9249, 9762, 5158, 7225, 11323, 10303, 8772, 1109, 4708, 8298, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 5293, ...
Test
6,417
1
Connection_string:connection string computing connection string string specifies information data source means connecting passed code underlying driver provider order initiate connection whilst commonly used database connection data source could also spreadsheet text file connection string may include attributes name driver server database well security information user name password example shows postgres connection string connecting wikipedia.com ssl connection timeout 180 seconds driver= postgresql unicode server=www.wikipedia.com ssl=true sslmode=require database=wiki uid=wikiuser connect timeout=180 pwd=ashiknoor users oracle databases specify connection strings
[ 7847, 2901, 853, 9527, 3388 ]
None
6,418
1
Range_query_(database):range query database range query common database operation retrieves records value upper lower boundary example list employees 3 5 years experience range queries unusual generally known advance many entries range query return return many queries top ten senior employees newest employee done efficiently upper bound number results return query returns exactly one result sometimes called singleton match least one requested keys
[ 9075, 2901, 7767 ]
Train
6,419
3
Open_architecture:open architecture open architecture type computer architecture software architecture intended make adding upgrading swapping components easy example ibm pc amiga 500 apple iie open architecture supporting plug-in cards whereas apple iic computer closed architecture open architecture systems may use standardized system bus s-100 pci isa may incorporate proprietary bus standard used apple ii dozen slots allow multiple hardware manufacturers produce add-ons user freely install contrast closed architectures expandable one two expansion ports using proprietary connector design may require license fee manufacturer enhancements may installable technicians specialized tools training computer platforms may include systems open closed architectures mac mini compact macintosh closed macintosh ii power macintosh g5 open desktop pcs open architecture nettops typically closed similarly open software architecture one additional software modules added basic framework provided architecture open apis application programming interfaces major software products way basic functionality products modified extended google apis examples second type open software architecture consists messages flow computer systems messages standard structure modified extended per agreements computer systems example ibm distributed data management architecture open architecture allows potential users see inside parts architecture without proprietary constraints typically open architecture publishes parts architecture developer integrator wants share open business processes involved open architecture may require license agreements entities sharing architecture information open architectures successfully implemented many diverse fields including us navy
[ 4228, 4741, 9094, 6282, 3851, 9098, 9363, 9621, 5531, 10524, 2861, 10030, 10553, 11068, 5058, 968, 7112, 9932, 2259, 2652, 10460, 8164, 4199, 2282, 362, 8044, 6129, 1141, 10102, 5368, 7802 ]
Test
6,420
9
Kathleen_Booth:kathleen booth kathleen booth born 1922 wrote first assembly language designed assembler autocode first computer systems birkbeck college university london helped design three different machines including arc automatic relay calculator sec simple electronic computer ape x c. kathleen britten born stourbridge worcestershire england obtained bsc mathematics university london 1944 went get phd applied mathematics 1950 married colleague andrew donald booth 1950 two children kathleen booth worked birkbeck college 1946–62 travelled united states andrew booth research assistant 1947 visiting john von neumann princeton upon returning uk co-authored general considerations design purpose electronic digital computer describing modifications original arc redesign arc2 using von neumann architecture part contribution arc assembly language also built maintained arc components kathleen andrew booth team birkbeck considered smallest early british computer groups 1947 1953 produced three machines arc automatic relay computer sec simple electronic computer ape x c all-purpose electronic rayon computer mr. booth worked team built computers programmed considered remarkable achievement due size group limited funds disposal although ape x c eventually led hec series manufactured british tabulating machine company small scale birkbeck group place front rank british computer activity booth regularly published papers concerning work arc ape x c systems co-wrote automatic digital calculators 1953 illustrated 'planning coding programming style co-founded school computer science information systems 1957 birkbeck college along andrew booth j.c. jennings 1958 taught programming course 1958 booth wrote one first books describing program ape x c computers 1944 1946 junior scientific officer royal aircraft establishment farnborough 1946 1962 booth research scientist british rubber producer research association ten years 1952 1962 research fellow lecturer birbeck college university london later became research fellow lecturer associate professor university saskatchewan canada 1962 1972 lakehead university canada became professor mathematics 1972 1978 booth research neural networks led successful programs simulating ways animals recognise patterns characters husband resigned suddenly birkbeck college 1961 chair conferred husband despite massive contributions i.c.t type 1400 computer donated department numerical automation fact installed london school hygiene tropical medicine
[ 2374, 6950, 8262, 6032, 10672, 3159, 8057, 987, 477 ]
Train
6,421
7
Volunteer_computing:volunteer computing volunteer computing type distributed computing arrangement people so-called volunteers provide computing resources projects use resources distributed computing and/or storage thus computer owners users donate computing resources processing power storage one projects volunteers frequently members general public possession personal computers internet connection also organizations act volunteers provide computing resources projects context mostly science-related projects executed universities academia general first volunteer computing project great internet mersenne prime search started january 1996 followed 1997 distributed.net 1997 1998 several academic research projects developed java-based systems volunteer computing examples include bayanihan popcorn superweb charlotte term volunteer computing coined luis f. g. sarmenta developer bayanihan also appealing global efforts social responsibility corporate social responsibility reported harvard business review used responsible forum 1999 seti home folding home projects launched projects received considerable media coverage one attracted several hundred thousand volunteers 1998 2002 several companies formed business models involving volunteer computing examples include popular power porivo entropia united devices 2002 berkeley open infrastructure network computing boinc project founded university california berkeley space sciences laboratory funded national science foundation boinc provides complete middleware system volunteer computing including client client gui application runtime system server software software implementing project web site first project based boinc predictor home based scripps research institute began operation 2004 soon thereafter seti home climateprediction.net began using boinc number new boinc-based projects created next years including rosetta home einstein home aqua home 2007 ibm world community grid switched united devices platform boinc client software early volunteer computing projects consisted single program combined scientific computation distributed computing infrastructure monolithic architecture inflexible example difficult deploy new application versions recently volunteer computing moved middleware systems provide distributed computing infrastructure independent scientific computation examples include systems basic structure client program runs volunteer computer periodically contacts project-operated servers internet requesting jobs reporting results completed jobs pull model necessary many volunteer computers behind firewalls allow incoming connections system keeps track user credit numerical measure much work user computers done project volunteer computing systems must deal several issues involving volunteered computers heterogeneity churn tendency individual computers join leave network time sporadic availability need interfere performance regular use addition volunteer computing systems must deal problems related correctness one common approach problems replicated computing job performed least two computers results corresponding credit accepted agree sufficiently effects may may noticeable even noticeable volunteer might choose continue participating however increased power consumption remedied extent setting option limit percentage processor used client available client software although issues lack accountability trust participants researchers implementing projects volunteer computing crucially important especially projects limited funding
[ 8640, 1185, 4194, 5956, 1480, 6856, 1806, 3282, 915, 11027, 7318, 2394, 8029, 3678 ]
Test
6,422
2
House_(operating_system):house operating system house acronym haskell user operating system environment experimental open source operating system written haskell written explore system programming functional programming language includes graphical user interface several demos network protocol stack provides basic support ethernet ipv4 arp dhcp icmp ping udp tftp tcp
[ 2179, 3876, 10851, 8262, 10924, 7983, 2996, 11413, 5402, 5469, 5437 ]
Test
6,423
4
Common_Weakness_Enumeration:common weakness enumeration common weakness enumeration cwe category system software weaknesses vulnerabilities sustained community project goals understanding flaws software creating automated tools used identify fix prevent flaws project sponsored national cybersecurity ffrdc owned mitre corporation support us-cert national cyber security division u.s. department homeland security version 3.2 cwe standard released january 2019 cwe 600 categories including classes buffer overflows path/directory tree traversal errors race conditions cross-site scripting hard-coded passwords insecure random numbers common weakness enumeration cwe compatibility program allows service product reviewed registered officially cwe-compatible cwe-effective program assists organizations selecting right software tools learning possible weaknesses possible impact order obtain cwe compatible status product service must meet 4 6 requirements shown 48 organizations january 2018 develop maintain products services achieved cwe compatible status researchers think ambiguities cwe avoided reduced
[ 6497, 4198, 8042, 3021, 11213, 2878, 4081, 2709, 5404, 4062, 575 ]
Train
6,424
1
Database_dump:database dump database dump also sql dump contains record table structure and/or data database usually form list sql statements database dump often used backing database contents restored event data loss corrupted databases often recovered analysis dump database dumps often published free software free content projects allow reuse forking database
[ 10340, 3366, 4041, 3692, 5964, 10413, 10737, 2901, 7189, 8539, 2686 ]
None
6,425
4
Meredith_Gardner:meredith gardner meredith knox gardner october 20 1912 – august 9 2002 american linguist codebreaker gardner worked counter-intelligence decoding soviet intelligence traffic regarding espionage united states came known venona project gardner born okolona mississippi grew austin texas graduating university texas austin earned master degree german university wisconsin–madison teaching assistant 1938 1940 linguist professor german university akron united states army signals intelligence service recruited work breaking german codes soon started working japanese codes instead mastering japanese language months 1946 gardner began work highly secret project later codenamed venona break soviet cryptosystems soviet encryption system involved use one-time pads thus thought unbreakable however soviets made mistake reusing certain pages pads later year gardner made first breakthrough venona identifying ciphers used spelling english words may 1947 gardner read decrypt implied soviets ran agent access sensitive information war department general staff u.s. army air corps major william ludwig ullmann became apparent gardner reading kgb messages showing massive soviet espionage united states 1949 meredith gardner made big breakthrough able decipher enough soviet message identify text 1945 telegram winston churchill harry s. truman checking message complete copy telegram provided british embassy cryptanalysts confirmed beyond doubt war soviets spy access secret communication president united states prime minister britain peter wright met meredith gardner london arrests atom spies quiet scholarly man entirely unaware awe held cryptanalysts used tell worked matches office young pipe-smoking englishman named philby used regularly visit peer shoulder admire progress making gardner rather sad figure late 1960s felt keenly cryptanalytical break made possible thing mathematical beauty depressed use put wright revealed gardner upset research resulted mccarthyism executions julius rosenberg ethel rosenberg wright quotes gardner saying never wanted get anyone trouble wright added gardner appalled fact discovery led almost inevitably electric chair felt rosenbergs guilty ought given clemency gardner mind venona almost art form want sullied crude mccarthyism gardner retired 1972 yet work remained mostly secret 1996 nsa cia center democracy honored gardner colleagues formal ceremony result campaigning u.s senator daniel patrick moynihan gardner died august 9 2002 chevy chase maryland age 89
[ 1941, 7887 ]
Test
6,426
3
Phantasie_III:phantasie iii phantasie iii third video game phantasie series final installment phantasie trilogy based around fighting evil nikademus finishing good released 1987 time nikademus attempting take entire world party stop phantasie iii maintained style original two improved upon graphics platforms except dos version combat engine also saw upgrades adding specific wound locations characters able head torso limb specifically injured broken removed also possible tactical battle line-up ability move characters front middle rear party game also improved upon spell list added larger variety weapons equipment game also two possible endings depending whether characters chose fight nikademus join phantasie iii sold 46,113 copies scorpia pleased improving trading interface combat grand ending game trilogy called game far weakest series criticized short length phantasie iii reviewed 1988 dragon 130 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars phantasie phantasie iii questron ii later re-released together reviewed 1994 dragon 203 sandy petersen eye monitor column petersen gave compilation 2 5 stars
[ 8062, 6030 ]
Test
6,427
9
Java_Virtual_Machine_Tools_Interface:java virtual machine tools interface java virtual machine tool interface jvmti properly jvm ti introduced j2se 5.0 tiger interface allows program inspect state control execution applications running java virtual machine jvm jvmti designed provide application programming interface api development tools need access state jvm examples tools debuggers profilers jvmti native interface jvm library written c c++ loaded initialization jvm library access jvm state calling jvmti jni java native interface functions register receive jvmti events using event handler functions called jvm event occurs jvmti defined java community process jsr-163 specification java platform profiling architecture jvmti replaces jvmpi java virtual machine profiling interface jvmdi java virtual machine debug interface jvmpi jvmdi declared deprecated j2se 5.0 removed java se6 jvmti lowest level java platform debugger architecture
[ 4960, 3562, 2045 ]
Test
6,428
9
JSR_53:jsr 53 jsr 53 java specification request developed java community process specifies java servlet 2.3 specification javaserver pages 1.2 specification
[ 4960 ]
Test
6,429
8
Timable:timable timable online event listing platform hong kong consisting websites mobile apps co-founded sam yuen mike ko 2010 covers events happening town ranging concerts dramas exhibitions festivals events family etc timable original word means able time according explanation website letter e omitted word based common english grammar like scalable writable timable represents vision platform – search time users search events matching spare time however name often mistaken timeable timetable moment corresponding chinese name timable contents contributed event organizers web 2.0 approach published timable editors end 2013 23,000 events recorded
[ 7802, 9732, 735 ]
Test
6,430
4
Macro_and_security:macro security macro computer science rule pattern specifies certain input sequence often sequence characters mapped replacement input sequence also often sequence characters according defined procedure macro used define variables procedures allow code reuse design domain-specific languages macros separated several types macros useful software users simplify regularly used actions repetitive code programmer sequence actions program productivity user increased however many problems exist tackled subsequently dangers text substitution macros like c macros c preprocessor powerful tool bring clarity code contrary obscure first n't form macros error checking c assembly language possible make macros work.indeed c language syntax macro replaced declared preprocessor compiler check code example //file example.c int main example compiles macro somestring n't used macro used would compilation error //file example.c int main gcc -o example example.c example.c function 'main example.c:6:26 erreur 'foo undeclared first use function example.c:6:26 note undeclared identifier reported function appears simple example applications count code lines begins huge really important macro n't compile may change syntax previous example quotation marks added foo others whole syntax false may change macro calls case type flaw minimal affect maintenance application second point 'll see repetitive code found macros lead wasted computing time let illustrate following code // file example2.c int main int whatmax int getnumber call macro called max 2 values variable foo return value function getnumber basic macro calling function calculate maximum 2 values code executed obtain ./example2 called max 5 moment nothing wrong let replace value getnumber 6 example result ./example2 called called max 6 function getnumber called two times yet need call one time macro replace call macro max syntax return whatmax return foo getnumber foo getnumber value getnumber greater value foo called two times one comparison one return see slow execution program function example need take time calculate return value last point section see macros potentially dangerous programs critical data operations needed order make operations legible macros used double-edged.let take example code execution // file example3.c define cube x x*x*x int main ./example3 10 z 18 normally result expected equal 64 z 30 preprocessor replace calls macros obtain // x 1*x 1*x 1 // equivalent x 1 x 1 x 1 // 3 1 3 1 3 1 // equal 10 // z 5 x+x // equivalent 5 x x // 18 macros c others languages like smx sam76 assembly language etc text substitution n't anything responsibility programmer careful case put parentheses others cases effects instantly predicted like one // file example4.c int main 8 expected value result execution ./example4 10 let see happens decompose execution stack ++x ++x stack first '+ unstacked first '++x evaluated unstacked x 4 second '++x'is evaluated unstacked x 5 '+ give x+x 5+5 10*/ result logical look execution stack obvious instinctively users macros careful without attention errors easily appear addition instructions like '++x imbricated instructions recommended either flaws completely different previous ones main problem vba-type macros viruses macro viruses relatively recent first one named concept created june 1995 main reason high-level languages used write macro code powerful easy use considerably increasing pool potential virus writers documents containing macros disseminated rapidly widely e-mail spread quickly destructive system macro means macros interact basic operators word document like often-used functionalities like filesave filesaveas macros strength weakness word document types macros redefinied users allow great flexibility user flaw hackers exploit take control document computer word document opened type viruses use automatic semi-automatic macros launched action events without user ’ knowledge consent example word document following macros autoexec autonew autoclose autoopen autoexit easy hacker replace basic functionalities macro virus name original functionality also combination shortcut keys associated system command like ctrl+b set bold font user change replacing customs macros hacker modify create macros user activate using shortcut key macros also activated macro button like button click information seems common safely type macro virus cut paste text document macro macro could invoked auto-open macro text would re-created document empty opened user notice document empty macro could also convert parts text order less noticeable removing macros document manually using anti-virus program would lead loss content document polymorphic viruses change code fundamental ways replication order avoid detection anti-virus scanners wordbasic first name language visual basic polymorphic viruses difficult indeed macro polymorphism relies encryption document however hackers control encryption key furthermore encryption n't really efficient encrypted macros document encryption key polymorphic macro replicates key n't change replication affects macro encryption addition difficulties macro ca n't modify another macro wordbasic really powerful language allows operations macros order implement macros viruses change contents hackers another macro fulfill task modify content virus however type macros viruses n't really widespread indeed hackers choose macros viruses easy quick implement make polymorphic macro need lot knowledge language wordbasic needs advanced functionalities time classic macro virus even hacker make polymorphic macro polymorphism needs done document needs update update visible user replication macro create do-nothing macros idea combined polymorphic macros macros necessarily do-nothing macro invokes next one arranged chain case removed disinfection destructive payload activated attack crash winword processor internal error since winword 6.0 number macros per template limited 150 attack limited still annoying macro viruses cases interact two viruses executed time modify source code results new virus ca n't recognize anti-viruses software result totally random macro virus infectious less infectious depends part virus changed however 'mating unintentional macro virus result chances less infectious indeed order replicate know commands source code changed random scheme macro ca n't replicate nevertheless possible macros intentionally different polymorphic macros viruses use another macro change contents order increase infectivity two viruses example article macro virus colors infected document another infected user system macro virus concept viruses use command autoopen first macro virus colors detected command autoopen command macro virus concept moreover concept duplicate unencrypted command virus colors encrypted colors encrypt commands replicate macro virus concept result hybridation macro virus infected user system first colors hybrid could replicate autoopen n't executed indeed command comes concept body hybrid colors create conflicts example shows potential mating macro viruses couple mating macro viruses created make difficult detect macro virus hypothesis two mate virus-specificscanners may reinforce virility viruses fortunately type macro virus rare polymorphic macro viruses may exist one indeed create two interact reduce virlity rather reinforce complicated one worst scenarios world viruses would tool allowing create new virus modifying existing one executable files hard create kind tool simple macro viruses since sources macros always available based idea polymorphic macros macro perform modifications macros present document considering modifications make macro order convert macro virus mutator quite easy create macro virus generators possible create quickly several thousands known viruses macros viruses stand-alone ’ depend macros infectious part virus replication viruses macros viruses called parasitic macros launched check macros viruses append contents way macros became viruses type macro ’ spread quickly stand-alone macros indeed depends macros without virus ’ spread parasitic macros often hybrid stand alone infect macros kind macro virus poses real problems virus-specific anti-virus fact change content viruses accurate detection n't possible different types anti-virus scanner one heuristic analysis anti-virus interpretes emulates macros indeed examine branches macros require np-complete complexity using backtracking case analysis one document contains macros would take much time interpreting emulating macro would lead either false positives errors macro viruses detected another type anti-virus integrety checker anti-virus cases n't work checks documents extensions dot doc indeed anti-virus producers suggest users word documents reside others extensions two content document tends change often like heuristic analysis lead false positives errors due fact type anti-virus checks whole document last type anti-virus seen virus-specific scanner searches signature viruses type anti-virus weakest previous ones indeed viruses detected virus-specific scanners ones knew producers software updates needed others types scanners moreover type anti-virus really weak morphing viruses cf.section macro virus change content signature detected virus-specific scanners even virus actions signature n't match one declare virus scanner additional responsibility anti-virus responsibility users potential macro virus detected user choose ignore quarantine destroy last option dangerous anti-virus activate destructives macro viruses destroy data deleted anti virus virus scanners users responsible security integrity documents/computer furthermore even anti-virus n't optimal virus detection macro viruses detected progression virus detection improve creation new macro viruses text-substitutions macros separated compiler like c securised integrated compiler limit utilisation marco solution allowing macros advantage improving productivity programmer particular multi-languages applications indeed independent language requirement compiler target language produce descriptive error messages location cause errors marco also needs module plug-in understand language plug-in must contain three oracles one check syntactic well-formedness one determine fragment free names last one test whether fragment captures given name moment prototype support c++ sql marco proves safe code using macros well-encapsulated language-scalable time example macro language allowing type-safe macros macroml expressive typed language supports generative macros macros translated target language metaml gives well-type program without runtime errors always faults world viruses fortunately lot macro viruses countered good anti-virus section presents characteristics anti-virus protect macro-viruses first specific anti-virus products really affect kind virus anti-virus analyzing content efficient also something notice modification process relatively slow noticeable user order protect macros viruses scanner detect elements chain remove properly anti-virus detect macros virus also remnants example colors anti-virus must detect microsoft scanprot macro virus protection tool contains remnants virus problem scanprot contain parts virus another problem virus b created modifying macros virus consists set macros virus b could detected remnant anti-virus would identify remove non-modified macros cases replication virus contain original macros could successful fact anti-virus would created new virus anti-virus updated easily fast counter viruses lot informations added every day performance anti-virus must drop updates problem easily identifiable set macros anti-virus parse body macro identify cut parts added macro viruses fortunately task difficult achieve
[ 11299, 2213, 7851, 4684, 3629, 10413, 847, 655, 9364, 1244, 477 ]
None
6,431
4
Kaspersky_Internet_Security:kaspersky internet security kaspersky internet security often abbreviated kis internet security suite developed kaspersky lab compatible microsoft windows mac os x. kis offers protection malware well email spam phishing hacking attempts data leaks kaspersky lab diagnostics results distributed relevant developers version 6.0 first release kis pc world magazine praised version 6.0 detection malware kis detected 100 percent threats subset january 2006 wild-list list prevalent threats suite detected almost 100 99.57 percent adware samples kis ability scan within compressed packed files detecting 83.3 percent hidden malware however version 6.0 criticized completely removing malware leaving registry entries files pc world also highlighted suite false positives — eight 20,000 clean files incorrectly flagged malicious — noticeable impact computer performance however data cached scan making subsequent scan faster firewall blocked attacks inside outside computer tested magazine found graphical user interface awkward navigate features parental controls instant messaging protection found competing suites symantec mcafee part version 6.0 cnet pc world criticized suite relatively high retail price us 79.95 kis 6.0 supports windows 98 se nt workstation 4.0 2000 professional xp home edition xp professional xp professional x64 vista 50 megabytes free space internet explorer 5.5 windows installer 2.0 required ram cpu requirements dependent operating system version 7.0 introduced redesigned gui components renamed reorganized anti-hacker module renamed firewall anti-spy module integrated privacy control module pc world described new interface intuitive great-looking parental controls introduced specific settings different age categories child parent within age categories content categories drugs violence users manually configure profiles filtering profiles associated users since content filtered network level feature work internet browser filter relies database known urls analyse websites real-time attempts access forbidden urls logged sites visited tracked well raising privacy issues limits internet access may set based time chat rooms along webmail sites manually blocked spam filtering integrates microsoft outlook outlook express windows mail bat e-mail content analysed scored e-mail scores two specified thresholds either marked spam probably spam mail dispatcher feature shows subject sender information messages allows users avoid downloading blatant spam selecting messages download filter self-trains analyzing incoming outgoing e-mail marked spam analyzing folders containing spam valid e-mail senders verified valid e-mail whitelisted e-mail also whitelisted blacklisted based phrases present text e-mail non-ascii characters invisible text also blocked however version 7.0 relatively poor showing misidentifying 30 percent valid messages pc magazine testing 30 percent spam also made inbox protection data leaks incorporated release suite warns users programs attempt access send data certain areas internet explorer stores webform information malware protection mostly positive detection disinfection tests av-test.org version 7.0 detected 100 percent wildlist threats using one-month-old signatures set new malware however detection fell 14 percent files scanned 5.24 megabytes per second version 7.0 successfully identified six actively running rootkits four six inactive rootkits able remove two six rootkits firewall correctly blocked attempted outside connections reasonable level security left default settings version drops support windows 98 2000 nt windows xp service pack 2 required except case xp professional x64 edition vista supported well ram cpu requirements dependent operating system 75 megabytes free space internet explorer 5.5 windows installer 2.0 version introduces revised user interface application filtering module updated anti-virus engine vulnerability scanner main window separates settings four categories compared eight predecessor status bar changes colour green yellow red reflect overall program status flashes divert attention needed pc magazine also noted pop-up notifications kept minimum kaspersky claims core anti-virus engine revised increase scan speed pc magazine found initial scan took two hours however subsequent scans took two minutes complete however malware detection relatively low comparison anti-virus applications tested 650 thousand samples version 8.0 detected 95.6 percent top score around 99 percent using two-week-old signatures version 8.0 detected 52 percent viruses different set samples kaspersky also blocked 60 percent malware based solely behaviour top performers scored 55.3 percent 80 percent respectively version 2009 detected 98.1 percent adware however pc world noted achieve kind performance users modify program settings default settings kis allowed zango install block installation users must enable kis scan malware security analyzer looks operating system program patches also looks vulnerable system settings presenting users list recommended actions prevent malware gaining access system however pc world criticized amount computer jargon used lack information adjust settings appropriately hand pc magazine found feature straightforward often solution involved downloading installing update kis uses whitelist carbon black classify trusted malicious programs malicious programs allowed run unknown programs falling two categories restricted actions perform firewall blocked attacks pc magazine testing phishing protection introduced release testing pc magazine found feature blocked 44 percent phishing urls internet explorer 7 blocked 67 percent urls mozilla firefox blocked 81 percent spam filtering integrates mozilla thunderbird scans nntp traffic spam automatically diverted folder using unsupported e-mail client download pop3 imap nntp mail kaspersky still generate report messages however unsupported client toolbar program classify messages spam client version 2010 kaspersky internet security introduced overhauled user interface sandbox running applications virtualized environment 9.0.0.736 build kis 2010 fully supported windows 7 operating system beta version released windows users 8 june 2010 version included new interface well gadget available windows vista windows 7 users pc mag rated version good 4/5 stars firewall noted good made adequate malware detection rates two critical fixes released kaspersky lab making current version 11.0.2.556 1 march 2011 kaspersky released first build version 2012 came beta version english french russian version versions due later 7 june 2011 kaspersky lab announced commercial release kaspersky internet security 2012 france germany switzerland current version 12.0.0.374 beta version released windows users 3 march 2012 version includes interface looks currently least much like internet security 2012 safe run option proactive defense instead behavioural monitoring system watcher seems taking greater responsibility detecting malware safe banking feature added release candidate build 13.0.1.4088 rc released windows users 20 july 2012 final version released 28 august 2012 build 13.0.1.4190 beta testing started 12 march 2013 version introduced windows 8 like gui design final version released 3 august 2013 build 14.0.0.4651 india russia august 13 usa august 27 uk 2014 release frequently characterized inferior user expectations largely due removal range granular fine-tuning options 2013 earlier used experienced users number added back 2015 beta time technical release build 463 february 13 2014 build 14.0.0.4651 e released build 14.0.0.4651 latest current version april 2014 beta version 2015 product build 463 released followed technical release preview near-complete 2015 product first official release product bangladesh june 2014 march 2015 bloomberg accused kaspersky close ties russian military intelligence officials kaspersky slammed claims blog calling coverage sensationalist guilty exploiting paranoia increase readership result alleged russian involvement 2016 presidential election ongoing investigations department homeland security officially banned use kaspersky internet security united states federal government september 2017 december 12 2017 use kaspersky software banned use american federal government law
[ 2049, 2563, 1052, 2084, 550, 10790, 2601, 6699, 8753, 569, 5178, 9279, 9791, 10308, 2118, 4174, 2654, 8816, 4722, 10872, 8315, 9341, 127, 7809, 131, 6797, 3218, 10898, 1172, 11418, 156, 2721, 2213, 6823, 3243, 1708, 3250, 6834, 5305, 704,...
Test
6,432
5
SC-FDE:sc-fde single-carrier frequency domain equalization sc-fde single-carrier sc modulation combined frequency-domain equalization fde alternative approach inter symbol interference isi mitigation
[]
Validation
6,433
1
Oracle_NoSQL_Database:oracle nosql database oracle nosql database ond nosql-type distributed key-value database oracle corporation provides transactional semantics data manipulation horizontal scalability simple administration monitoring oracle released oracle autonomous nosql database cloud oandc august 10 2018 oandc managed cloud service applications require low latency flexible data models elastic scaling dynamic workloads oracle bought company developed berkeley db sleepycat software developers focus application development data store requirements rather managing back-end servers storage expansion cluster deployments topology software installation/patches/upgrades backup operating systems availability oandc scales meet dynamic application workloads throughput requirements users create tables store application data perform database operations oandc table similar relational table additional properties including provisioned write units read units storage capacity users provision throughput storage capacity table based anticipated workloads oandc resources allocated scaled accordingly meet workload requirements users billed hourly based capacity provisioned oandc provides simple data model row identified unique key value arbitrary length interpreted application application manipulate insert delete update read single row transaction application also perform iterative non-transactional scan rows database oracle corporation distributes ond two editions ond licensed using freemium model open-source versions oracle nosql community edition available end-users purchase additional features support via oracle store integrating oracle products oracle enterprise manager oracle coherence oracle nosql enterprise edition purchased ond drivers licensed pursuant apache 2.0 license used community enterprise editions ond built upon oracle berkeley db java edition high-availability storage engine adds services provide distributed highly available key/value store suited large-volume latency-sensitive applications ond client-server sharded shared-nothing system data shard replicated nodes comprise shard provides simple key-value paradigm application developer major key record hashed identify shard record belongs ond designed support changing number shards dynamically response availability additional hardware number shards changes key-value pairs redistributed across new set shards dynamically without requiring system shutdown restart shard made single electable master node serve read write requests several replicas usually two serve read requests replicas kept date using streaming replication change master node committed locally disk also propagated replicas ond provides single-master multi-replica database replication transactional data delivered replica nodes flexible durability policies per transaction event master replica node fails consensus-based paxos-based automated fail-over election process minimizes downtime soon failed node repaired rejoins shard updated becomes available processing read requests thus ond applications tolerate failures nodes within shard also multiple failures nodes distinct shards proper placement masters replicas server hardware racks interconnect switches ond intended increase availability commodity servers ond driver partitions data real time evenly distributes across storage nodes network topology latency-aware routing read write operations appropriate storage node order optimize load distribution performance ond administration service accessed web console command-line interface service supports functionality ability configure start stop monitor storage node without requiring configuration files shell scripts explicit database operations allows java management extensions jmx simple network management protocol snmp agents available monitoring allows management clients poll information status performance metrics operational parameters storage node managed services elasticity refers dynamic online expansion deployed cluster adding storage nodes increases capacity performance reliability ond includes topology planning feature administrator modify configuration nosql database database online administrator administrators move replication nodes and/or partitions over-utilized nodes onto underutilized storage nodes vice versa ond supports multiple zones intelligently allocate replication processes data order improve reliability hardware network power-related failure modes two types zones primary zones contain nodes serve masters replicas typically connected fast interconnects secondary zones contain nodes serve replicas secondary zones used provide low latency read access data distant location offload read-only workloads analytics report generation data exchange improved workload management ond supports avro data serialization provides compact schema-based binary data format schemas defined using json ond supports schema evolution configurable smart topology system administrators indicate much capacity available given storage node allowing capable nodes host multiple replication nodes system knows capacity storage nodes configuration automatically allocates replication nodes intelligently intended better load balancing better use system resources minimizing system impact event storage node failure smart topology supports data centers ensuring full set replicas initially allocated data center ond provides facilities perform rolling upgrade allowing system administrator upgrade cluster nodes database remains available ond configurable either c/p a/p cap particular writes configured performed synchronously replicas c/p cap i.e partition node failure causes system unavailable writes replication performed asynchronously reads configured served replica a/p cap i.e system always available guarantee consistency release 3.0 introduced tabular data structure simplifies application data modeling leveraging existing schema design concepts table model layered top distributed key-value structure inheriting advantages simplifying application design enabling seamless integration familiar sql-based applications primary key based indexing limits number low latency access paths sometimes applications need non-primary-key based paths support specific application requirements ond supports secondary index value field ond ee stream based apis allow reading writing large objects lobs audio video files without materialize entire file memory intended decrease latency operations across mixed workloads objects varying sizes ond provides acid compliant transactions full create read update delete crud operations adjustable durability consistency transaction guarantees sequence operations operate single atomic unit long affected records share major key path ond includes support java c python c rest apis allow application developer perform crud operations libraries include avro support developers serialize key-value records de-serialize key-value records interchangeably c java applications ond supports oracle rest data services ords allows customers build rest-based application access data either oracle database ond supports spatial queries rfc7946 compliant geojson data spatial functions indexing geojson data supported kvavroinputformat kvinputformat classes available read data ond natively hadoop mapreduce jobs one use class read nosql database records oracle loader hadoop oracle big data sql common sql access layer data stored hadoop hdfs hive ond allows customers query oracle nosql data hive oracle database users run mapreduce jobs data stored ond configured secure access latest release also supports primitive complex data types ond ee supports external table allows fetching oracle nosql data oracle database using sql statements select select count etc nosql data exposed external tables one access data via standard jdbc drivers and/or visualize enterprise business intelligence tools oracle event processing oep provides read access ond via nosql database cartridge cartridge configured cql queries used oracle semantic graph includes jena adapter oracle nosql database store large volumes rdf data triplets/quadruplets adapter enables fast access graph data stored ond via sparql queries integration oracle coherence allows ond used cache oracle coherence applications allowing applications directly access cached data ond ond ee supports os-independent cluster-wide password-based user authentication oracle wallet integration enables greater protection unauthorized access sensitive data additionally session-level secure sockets layer ssl encryption network port restrictions improve protection network intrusion ond version 4.0 – new features ond team worked several key oracle partners including intel cisco performing yahoo cloud serving benchmarks ycsb various hardware configurations published results example 2012 oracle reported ond exceeded 1 million mixed ycsb ops/sec
[ 11136, 9867, 19, 1049, 11161, 5677, 6834, 6067, 9782, 1594, 3133, 10048, 10565, 7499, 11343, 4817, 3927, 10340, 6629, 8554, 1142, 2045 ]
None
6,434
6
Extent_(file_systems):extent file systems extent contiguous area storage reserved file file system represented range block numbers tracks count key data devices file consist zero extents one file fragment requires one extent direct benefit storing range compactly two numbers instead canonically storing every block number range also extent allocation results less file fragmentation extent-based file systems also eliminate metadata overhead large files would traditionally taken block-allocation tree savings small compared amount stored data file sizes general make large portion metadata large files overall benefits storage efficiency performance slight order resist fragmentation several extent-based file systems allocate-on-flush many modern fault-tolerant file systems also copy-on-write although increases fragmentation similar design cp/m file system uses extents well correspond definition given cp/m extents appear contiguously single block combined directory/allocation table necessarily correspond contiguous data area disk ibm os/360 successors allocates files multiples disk tracks cylinders files could originally 16 extents restriction since lifted initial allocation size size additional extents allocated required specified user via job control language system attempts allocate initial size contiguous area although may split contiguous space available systems supporting filesystem extents include following
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 3640, 7225, 11323, 8772, 1109, 4708, 10340, 8298, 9836, 7789, 9333, 6263, 9335, 2687, 9343, 5256, 7818, 654, 10382, 2193, 2194, 2197, 2199, 11419, 6309, 1190, ...
Test
6,435
7
Comparison_of_video_hosting_services:comparison video hosting services following tables compare general technical information number current notable video hosting services please see individual products articles information basic general information hosts creator/company license/price etc
[ 10368, 8833, 4194, 6565, 235, 11097, 10522, 4219, 10270, 735 ]
Test
6,436
2
Damn_Small_Linux:damn small linux damn small linux commonly abbreviated dsl computer operating system x86 family personal computers free open source software terms gnu gpl free open source licenses designed run graphical applications older pc hardware—for example machines 486/early pentium processors little memory dsl live cd size 50 mb originally started experiment see much software could fit 50 mb eventually became full-fledged linux distribution installed storage media small capacities like bootable business cards usb flash drives various memory cards zip drives dsl originally conceived maintained john andrews five years community included robert shingledecker created mydsl system dsl control panel features issues main developers robert according exiled project currently continues work tiny core linux created april 2008 dsl originally based model-k 22 mb stripped version knoppix soon based knoppix proper allowing much easier remastering improvements dsl supports x86 pcs minimum system requirements 486 processor 8 mb ram dsl demonstrated browsing web dillo running simple games playing music systems 486 processor 16 mb ram system requirements higher running mozilla firefox optional add-ons openoffice.org office suite version 4.4.10 dsl released november 18 2008 current includes following software dsl built-in scripts download install advanced packaging tool apt apt enabled user install packages debian repositories additionally dsl hosts software ranging large applications like openoffice.org gcc smaller ones amsn means mydsl system allows convenient one-click download installation software files hosted mydsl called extensions june 2008 mydsl servers hosting 900 applications plugins extensions boot options also called cheat codes dsl automatic hardware detection may fail user may want use something default settings language keyboard vga fail safe graphics text mode ... dsl allows user enter one cheat codes boot prompt nothing entered dsl boot default options cheat codes affect many auto-detection hardware options many cheat codes also affect gui list cheat codes seen boot time also dsl wiki also run partydisk dsl mydsl handled maintained mostly robert shingledecker hosted many organizations ibiblio belgium belnet 2 areas mydsl regular testing regular area contains extensions proven stable enough everyday use broken different areas apps net system uci universal compressed iso extensions .uci format mounted separate filesystem minimize ram usage testing area newly submitted extensions theoretically work 'as advertised may number bugs standard flavour dsl live cd also versions available one also boot dsl using boot-floppy created one available floppy images 'bootfloppy.img 'bootfloppy-grub.img 'bootfloppy-usb.img 'pcmciabootfloppy.img old computers bios support el torito bootable cd specification dsl kernel loaded floppy disk ram kernel runs dsl cd usb drive dsl ported xbox video game console x-dsl x-dsl requires modified xbox run live cd installed xbox hard drive users also run x-dsl usb flash drive using usb adaptor included phantasy star online plugs memory card slot includes one usb 1.1 port x-dsl boots x11-based gui xbox controller used control mouse pointer enter text using virtual keyboard x-dsl fluxbox desktop programs e-mail web browsing word processing playing music x-dsl customized downloading extensions mydsl servers dsl live usb damn small linux created manually application like unetbootin see list tools create live usb systems full list due infighting among project originators main developers dsl development seemed standstill long time future project uncertain much dismay many users july 8 2012 john andrews original developer announced new release developed dsl website including forums inaccessible back well first rc new 4.11 released august 3 2012 followed second one september 26 damnsmalllinux.org site inaccessible sometime 2015 february 2016 march 27 2016 damnsmalllinux.org accessible time february 10 2019 inaccessible yet may 21 2019 accessible linux distributions derived damn small linux
[ 3101, 4637, 9762, 9253, 11305, 56, 8248, 59, 4673, 5190, 2125, 9807, 1618, 1110, 89, 4186, 3685, 10341, 10860, 2671, 10352, 11388, 1150, 8837, 10394, 7840, 673, 3745, 7854, 2738, 4790, 7364, 8907, 6371, 4841, 6890, 7913, 7914, 7920, 8432,...
Test
6,437
9
Ciao_(programming_language):ciao programming language ciao general-purpose programming language supports logic constraint functional higher-order object-oriented programming styles main design objectives high expressive power extensibility safety reliability efficient execution ciao provides full prolog system supporting iso-prolog declarative subsets extensions prolog functional programming including lazy evaluation higher-order predicate abstractions constraint programming objects well feature terms records persistence several control rules breadth-first search iterative deepening ... concurrency threads/engines distributed execution agents parallel execution libraries also support www programming sockets external interfaces c java tcltk relational databases etc etc ciao built kernel extensible modular design allows restricting extending language — seen language building language restrictions extensions activated separately program module several extensions coexist application different modules programming large ciao supported via ciao also support programming small compiler capable producing small executables including builtins used program interpreter supports scripting environment includes classical top-level evolved emacs interface embeddable source-level debugger number execution visualization tools ciao preprocessor supports static debugging verification assertion checking optimization via source source program transformation tasks performed ciaopp distributed separately ciao includes lpdoc automatic documentation generator processes programs adorned ciao assertions machine-readable comments generates manuals many formats including html pdf texinfo info man etc. well on-line help ascii readme files entries indices manuals info www ... maintains www distribution sites ciao compiler run outside top level shell generates several forms architecture-independent stand-alone executables run speed efficiency executable size competitive high-level languages general particular commercial academic prolog/clp systems modules compiled compact bytecode c source files linked statically dynamically autoloaded
[ 9345, 8421, 8262, 6536, 5612, 5677, 6797, 7983, 8973, 5492, 5880, 2045 ]
Test
6,438
2
OS-level_virtualisation:os-level virtualisation os-level virtualization refers operating system paradigm kernel allows existence multiple isolated user-space instances instances called containers solaris docker zones solaris virtual private servers openvz partitions virtual environments ves virtual kernel dragonfly bsd jails freebsd jail chroot jail may look like real computers point view programs running computer program running ordinary operating system see resources connected devices files folders network shares cpu power quantifiable hardware capabilities computer however programs running inside container see container contents devices assigned container unix-like operating systems feature seen advanced implementation standard chroot mechanism changes apparent root folder current running process children addition isolation mechanisms kernel often provides resource-management features limit impact one container activities containers term container popularly referring os-level virtualization systems sometimes ambiguously used refer fuller virtual machine environments operating varying degrees concert host os e.g microsoft hyper-v containers ordinary operating systems personal computers computer program see even though might able access system resources include operating system may able allow deny access resources based program requests user account context runs operating system may also hide resources computer program enumerates appear enumeration results nevertheless programming point view computer program interacted resources operating system managed act interaction operating-system-virtualization containerization possible run programs within containers parts resources allocated program expecting see whole computer run inside container see allocated resources believes available several containers created operating system subset computer resources allocated container may contain number computer programs programs may run concurrently separately may even interact one another containerization similarities application virtualization latter one computer program placed isolated container isolation applies file system operating-system-level virtualization commonly used virtual hosting environments useful securely allocating finite hardware resources among large number mutually-distrusting users system administrators may also use consolidating server hardware moving services separate hosts containers one server typical scenarios include separating several programs separate containers improved security hardware independence added resource management features improved security provided use chroot mechanism however nowhere near ironclad operating-system-level virtualization implementations capable live migration also used dynamic load balancing containers nodes cluster operating-system-level virtualization usually imposes less overhead full virtualization programs virtual partitions use operating system normal system call interface need subjected emulation run intermediate virtual machine case full virtualization vmware esxi qemu hyper-v paravirtualization xen uml form virtualization also require hardware support efficient performance operating-system-level virtualization flexible virtualization approaches since host guest operating system different host one different guest kernel example linux different distributions fine operating systems windows hosted solaris partially overcomes limitation described branded zones feature provides ability run environment within container emulates older solaris 8 9 version solaris 10 host linux branded zones referred lx branded zones also available x86-based solaris systems providing complete linux userspace support execution linux applications additionally solaris provides utilities needed install red hat enterprise linux 3.x centos 3.x linux distributions inside lx zones however 2010 linux branded zones removed solaris 2014 reintroduced illumos open source solaris fork supporting 32-bit linux kernels implementations provide file-level copy-on-write cow mechanisms commonly standard file system shared partitions partitions change files automatically create copies easier back space-efficient simpler cache block-level copy-on-write schemes common whole-system virtualizers whole-system virtualizers however work non-native file systems create roll back snapshots entire system state
[ 5120, 6150, 2058, 3082, 10776, 4636, 5660, 7733, 5177, 5697, 8772, 5702, 8266, 7248, 7249, 9306, 11363, 1637, 9839, 9844, 4734, 9343, 5247, 6797, 4238, 2212, 5805, 7349, 1718, 5819, 2236, 11459, 8395, 7889, 10455, 6361, 10977, 8439, 1273, ...
Test
6,439
4
FinalCode:finalcode finalcode inc. multi-national software company provides data-centric security information rights management irm help enterprises mitigate data leakage meet compliance requirements finalcode allows users securely collaborate share files using communication channel including existing enterprise content management ecm cloud storage collaboration applications finalcode privately held headquartered san jose california additional offices singapore japan australia united kingdom finalcode inc founded 2014 part international expansion finalcode opened regional headquarters singapore may 2016 september 2016 additional regional headquarter opened london uk cover emea region finalcode also additional offices presence japan australia finalcode provides aes-256 encryption granular permission sets corporate user policy templates file lifecycle activity analytics dynamic policy modification ability remotely delete files shared nowiki finalcode ’ patented cryptoease™ technology adds layer file protection remains persistent whether file circulates internally outside organization offering comprehensive file-based information rights management irm allows organizations file owner retains comprehensive file control auditing capability means recipients usage permissions delete files remotely. /ref official website
[ 7899, 420 ]
None
6,440
3
Higemaru_Makaijima_-_Nanatsu_no_Shima_Daibōken:higemaru makaijima nanatsu shima daibōken higemaru makaijima hero pirate ship higemaru named momotaru must pilot sailing vessel around ocean surrounding seven islands goal find greatest treasure must collect keys open dock gates islands invading several pirate ships defeating captain board combat gameplay pirate ships taken directly arcade predecessor small modifications momotaru collected key pirate ship must sail around islands search correct dock gate key corresponds player embarks exploration island find items defeat boss collect treasures heading search another island key island exploration sections extremely reminiscent dungeon exploration aspects legend zelda game often compared
[ 9006 ]
Test
6,441
2
Fluent_Design_System:fluent design system fluent design system codenamed project neon officially unveiled microsoft fluent design system design language developed 2017 microsoft fluent design revamp microsoft design language 2 includes guidelines designs interactions used within software designed windows 10 devices platforms system based five key components light depth motion material scale new design language includes prominent use motion depth translucency effects transition fluent long-term project preliminary aspects design particularly acrylic translucency effects reveal effects buttons incorporated windows 10 particularly within fall creators update released october 2017 well update xbox one system software released alongside aspects fluent introduced windows time purpose light draw attention illuminate information upon hovering reveal highlight illuminates nearby hidden borders objects hamburger navigation menu lists buttons upon selection clicking tapping white circular illumination effect quickly appears additionally windows holographic environment rounded white pointer exists 6 november 2017 microsoft employee david haz stated plans apply reveal highlight taskbar exist—but occurred focusable items border glow via focus visual addition depth utilizes z-axis allows content differentiation via layering depth presented via drop shadows z-depth layering motion establishes relationship ui elements provides continuity experience list animations inserting removing items collection connected animations item transitions content change element appears continue flying across app used portion content page change fade-in fade-out bring dismiss items view parallax moves objects different rates background moves slower content example list scroll faster background image creating depth effect addition motion item pressed momentarily recedes background restores original position examples press feedback include start menu live tiles action center quick actions microsoft edge address bar buttons acrylic material creates translucent blurred effect slight noise effect visual hierarchy created using different opacities example app primary content surfaces often opaque exception widgets lightweight apps calculator secondary pane 80 background acrylic tertiary pane 60 background acrylic background acrylic blurs items behind active acrylic material in-app acrylic blurs content within app acrylic disabled specific window app longer selected types acrylic disabled system-wide transparency disabled battery saver mode enabled low-end hardware background acrylic disabled window de-selected windows 10 mobile hololens tablet mode apps scale across different form factors display sizes 0d 3d elements adapt screen size available across multiple dimensions conscious controls also categorized within scale e.g scrollbars inputs adapt different methods invocation fluent key principles blocks light depth motion material scale turn away flat concept metro defined preserving clean look feel metro introduced fluent renews visuals aero design approach introduced windows vista windows 7 including blurred translucency parallax animated patterns drop shadow highlight effects following mouse pointer input gesture movements faux materials metro dumped
[ 8576, 641, 4356, 11524, 3463, 651, 6797, 782, 1935, 8080, 3857, 8976, 11283, 2196, 10388, 10900, 4505, 11546, 11549, 7970, 4515, 8740, 11301, 1832, 3496, 3881, 6697, 6827, 1581, 430, 3250, 3890, 8757, 9910, 6972, 6462, 7615, 321, 4289, 71...
Test
6,442
2
Special_Real_Time_Operating_System:special real time operating system special real time operating system srtos discontinued ibm real time operating system originally designed use electricity industry later also applied areas industrial process control formed part realtime plant management system rpms advanced control system acs rather standalone operating system designed extension os/vs1 os/vs2 later mvs operating systems also used paper industry srtos originally released 1976 continued used 1980s
[ 10883, 4996, 6148, 7053, 9619, 9366, 11673, 6557, 3359, 10273, 7983, 9139, 6325, 10040, 573, 1219, 964, 6342, 8272, 863, 3938, 5603, 868, 3429, 5220, 9829, 375, 2168, 3323, 2172, 2813 ]
None
6,443
4
Digital_Forensics_Framework:digital forensics framework digital forensics framework dff computer forensics open-source software used professionals non-experts collect preserve reveal digital evidence without compromising systems data digital forensics framework offers graphical user interface gui developed pyqt classical tree view features recursive view tagging live search bookmarking available command line interface allows user remotely perform digital investigation comes common shell functions completion task management globing keyboard shortcuts dff run batch scripts startup automate repetitive tasks advanced users developers use dff directly python interpreter script investigation addition source code package binary installers gnu/linux windows digital forensics framework available operating system distributions typical free open-source software foss including debian fedora ubuntu digital forensics framework methods available digital forensics oriented distribution live cd published books mention digital forensics framework dff used solve 2010 digital forensic research workshop dfrws challenge consisting reconstructing physical dump nand flash memory
[ 5284, 9319, 8554, 6797, 7983, 5397, 823 ]
Test
6,444
7
Alpha7:alpha7 alpha7 cloud technology company headquartered singapore business cloud enabler clients including listed companies enterprises small medium-sized enterprises spanning various industries asia-pacific region founded january 2014 singapore january 2015 alpha7 launched “ cooaas ” chief operating officer service concept intended provide services chief operating officer coo outsourced retainer project basis alpha7 currently works 25 companies whose applications offered cooaas platform may 2015 alpha7 launched imap system recommending right tools business owners help day-to-day operations imap recommends technology tools solutions services based businesses available budget across marketing sales business operations finance human resources business owners receive advice five areas need focus imap targets small medium enterprises fewer 1,000 employees.in month alpha7 received private funding 3.1 million us 2.3 million september 2015 launched a7 appsconnect a7 bizconnect a7 appsconnect offers companies access applications focused key business functions marketing sales operations finance human resources applications offered include sugarcrm vtiger dolibarr drupal quickbooks eventbrite a7 bizconnect advisory tool reviews businesses front back-end business processes recommending business outcomes aimed delivering productivity growth based available budgets alpha7 also provides cloud advisory consultancy services small medium-sized enterprises smes startups
[ 6018, 1539, 8451, 6027, 4236, 10893, 526, 911, 272, 1935, 4623, 8592, 405, 2965, 2328, 4377, 8986, 10265, 5662, 11038, 5666, 6307, 9766, 39, 5159, 2217, 8495, 3121, 5681, 9906, 7352, 10681, 11070, 448, 2496, 4289, 8515, 10820, 3269, 11201...
None
6,445
2
Nexenta_OS:nexenta os nexenta os officially known nexenta core platform discontinued computer operating system based opensolaris ubuntu runs ia-32- x86-64-based systems emerged fall 2005 sun microsystems started opensolaris project june year nexenta systems inc. initiated project sponsored development nexenta os version 1.0 released february 2008 late 2011 nexenta os brand terminated replaced illumian derived community development illumos openindiana distinguished use debian packaging illumian version 1.0 released february 2012 following initial release illumian 2012 illumian project discontinued initially two official apt repositories testing unstable totalling 9000 packages third stable added first official release nexenta os available installcd vmware images live cd also available releases alpha 5 nexenta repositories follow general debian structure main contrib non-free stable releases use subset structure packages originate debian gnu/linux nexenta.org website retired early 2012 since nexenta os use linux kernel sun recently began releasing code solaris operating system free open source software supports less diverse hardware debian variants nexenta os team decided focus minimal opensolaris effort called nexenta core platform ncp forms basis nexentastor nas storage solution version 1.0 nexenta core platform released february 10 2008 nexenta core platform first operating system combine opensolaris kernel gnu userland tools aimed bring technologies zfs zones gnu/debian community additional purpose os provide kernel allowing proprietary closed source hardware drivers produced inclusion open source operating system nexentastor proprietary operating system built nexenta systems top nexenta core platform optimized use virtualized server environments including nas iscsi fibre channel applications built around zfs file system features iscsi support unlimited incremental backups 'snapshots snapshot mirroring replication block level mirroring cdp integrated search within zfs snapshots custom api focus zfs carries potential benefits virtualized server farms terms performance thin provisioning operating system currently distributed iso vmware disk images pricing determined per-terabyte per-server licensing basis community edition available free charge users less 18 terabytes raw disk space pre-redundancy volume creation free tier model changed release version 5.0 community edition 10 terabyte limit assigned usable post-redundancy volume creation disk space enterprise version except lack paid plugins commercial support install many free open source plugins developed hosted community edition website community edition though intended hobbyist use production use community edition forbidden nexentastor eula therefore use term community edition remains disputable readydataos firmware embedded network-attached storage nas distribution based nexenta os zfs support nexenta os runs netgear readydata hardware
[ 2179, 2180, 5369, 5380, 6787, 6153, 6412, 8077, 10257, 5397, 3478, 2967, 1304, 5755, 8476, 3487, 5280, 6049, 5410, 10016, 11506, 5413, 3241, 7983, 3248, 8112, 2995, 9141, 823, 439, 7863, 9784, 7483, 9151, 10687, 3649, 9665, 10436, 3654, 5...
None
6,446
2
Autopackage:autopackage autopackage free computer package management system aimed making simple create package installed linux distributions created mike hearn around 2002 august 2010 listaller autopackage announced projects merge projects amsn inkscape offered autopackage installer freecode offered content submitters field put url autopackages list available packages limited program versions obsolete example recent autopackage gimp 2.2.6 even though gimp version 2.8.2 august 2012 autopackage designed installing binary pre-compiled versions non-core applications word processors web browsers personal computer games rather core libraries applications operating system shells concept autopackage improve linux desktop platform stable binary interfaces comparable windows macos autopackage intended provide installation core applications libraries compatibility reasons using autopackage distribute non-core libraries something thorny issue one hand distributing via autopackage allows installation greater range systems hand conflicts native package dependencies autopackage intended complementary system distribution usual packaging system rpm deb unlike formats autopackage verifies dependencies checking presence deployed files rather querying database installed packages simplifies design requirements autopackage relying available resources rather necessitating tracking package choices targeted distributions programs use autopackage must also relocatable meaning must installable varying directories single binary enables autopackage installed non-root user user home directory autopackage packages indicated .package extension executable bash scripts installed running files autopackage archive easily extracted anything autopackage internal format must parsed order determine file layout issues autopackage programs installed hard-coded system paths may conflict existing packages installed means thus leading corruption usually remedied uninstalling older version package installed autopackage autopackage files also installed removed using listaller toolset listaller simply includes autopackage packages package container format handles autopackage like listaller package file
[ 11525, 2310, 10760, 2955, 7435, 7181, 7947, 9487, 2448, 788, 1813, 8213, 10900, 6680, 8476, 5670, 4775, 7847, 6828, 7983, 1842, 823, 2872, 6583, 3131, 5819, 10172, 190, 3649, 10817, 9671, 5067, 3918, 463, 3667, 6227, 2901, 7293, 4951, 636...
None
6,447
3
Compaq_Presario_R3000:compaq presario r3000 compaq presario r3000 line series laptops designed built hewlett-packard corporation could shipped microsoft windows 98 2000 xp series used intel amd processors could 256 mb 256 mib 512 mb ram reserved graphics card ati mobility radeon 9000/9100 igp integrated graphics processor board sound card made analog devices also board connected jbl pro speakers ports computer usb ieee 1394 firewire headphone microphone s-video monitor parallel also rj45 connector network cable phone line jack one special series expansion port hp expansion dock type port found hp notebooks models series broadcom wifi adapters computer disk reader writer capable playing dvds burning cds downloading software disk computer encased black silver plastic shell weighs ten pounds two cooling fans mounted keyboard
[ 5384, 6765, 6797 ]
Test
6,448
2
4K_Disk_Monitor_System:4k disk monitor system pdp-8 disk monitor discontinued operating system released digital equipment corporation pdp-8 line mini-computers minimum hardware requirements consisted teleprinter 3 cycle data break option pdp-8/s model mass storage option df32 disk sub-system tc01 dectape unit later releases additional option using rf08 disk drive distribution media paper tape common means data storage computers era included user programs consisted mainly modified versions paper tape software library distributed dec pdp-8 family small computers much exported tss-8 ms/8 operating systems
[ 3650, 7076, 1253, 8262, 2507, 1804, 6155, 8876, 7983, 10475, 273, 6837, 8503, 8732, 10590, 9759 ]
None
6,449
3
Adventure_Island_(video_game):adventure island video game hudson adventure island side-scrolling platform game produced hudson soft released japan famicom msx september 12 1986 released north america nintendo entertainment system september 1988 pal region 1992 title adventure island classic adventure island adaptation arcade game wonder boy developed escape sega adventure island followed series sequels connection wonder boy series player controls master higgins known master wigins united kingdom takahashi meijin japanese versions young man ventured adventure island south pacific hearing evil witch doctor kidnapped princess tina rescue higgins must survive series 32 stages eight worlds called areas divided four stages rounds divided four checkpoints player reaches fourth round area must confront boss end continue next area game completed player saves girl defeating eighth final form evil lord master higgins player character loses life whenever touches enemy enemy attack fire roast falls pitfall body water moreover player also health gauge starts 11 points gradually depletes time whenever higgins trips rock path higgins health gauge reaches zero lose life well higgins still extra lives left revive last checkpoint passed game ends higgins lives runs replenish health higgins pick numerous fruits milk bottle path maximum health reaches 16 points player score reaches 50,000 points 100,000 points 200,000 points higgins receive extra life finding bee-like fairy known honey girl grant higgins invincibility ten seconds allow kill enemies single touch also hidden somewhere stage special pot doubles player end-of-stage bonus collected higgins starts life without ability attack gain ability attack picking stone axe found specific spots stage higgins wielding stone axe trade magical fireballs longer range capable destroying rocks rolling stones invulnerable stone axe break egg player must touch hit weapon twice addition weapons numerous bonus items stuck inside also negative item eggplant drains higgins life meter eggs immediately visible plain sight locations hidden eggs usually indicated weapon thrown player disappears falling ground uncovered jumping indicated spot hidden spots n't contain hidden eggs instead cloud warp player bonus stage instead uncovered standing still short period time bonus stages player collect series fruits worth 500 points regardless type higgins falls pitfall however instead losing life return regular stage next checkpoint fourth round area higgins confront different form evil witch doctor game boss character ability change head eight different types higgins must defeat striking head specific number times weapon number hits required defeat increases area first form requires eight hits every subsequent form requires two additional hits eighth final form requires 22 hits evil witch doctor defeated change head escape next area uses attack form thing changes besides durability mobility speed speed fireball attacks higgins defeats final form evil witch doctor fall pit girl rescued adventure island began development direct port sega arcade game wonder boy rights hudson soft obtained developer escape known westone bit entertainment development port decision made change character design protagonist modeling naming hudson soft spokesman takahashi meijin western version adventure island takahashi meijin character renamed master higgins wonder boy series adopted action rpg system sequels beginning wonder boy monster land adventure island sequels stuck game system original wonder boy moreover hudson soft also obtained rights port wonder boy sequels turbografx-16 changing title character designs game exception incidentally japanese version dragon curse turbografx-16 adaptation titled adventure island rights adventure island series currently owned konami absorbed hudson soft 2012 nes version adventure island re-released japan game boy advance famicom mini title may 21 2004 later re-released internationally virtual console service 2008 wii 2014 wii u remake also developed playstation 2 gamecube titled hudson selection volume 4 takahashi meijin bōken jima released exclusively japan december 18 2003 two sequels produced nes adventure island ii adventure island 3 well fourth game famicom released exclusively japan titled takahashi meijin bōken jima iv addition standalone famicom mini re-release first game four games re-released compilation game boy advance titled hudson best collection vol 6 bōken jima collection released japan january 19 2006 sequels also released platforms adventure island adventure island ii game boy based second third nes games respectively super adventure island super adventure island ii super nes new adventure island turbografx-16 wii gacha wa shi meijin bōken jima 2007 mobile adventure island quest takahashi meijin 2010 mobile takahashi meijin appears playable character crossover fighting game dreammix tv world fighters released japan gamecube december 13 2003 takahasia meijin also appears sport mobile game gachapin mukku supōtsugēmuapuri 2008 adventure island received positive mixed reviews critics gamespot awarded game 6.5 10 calling fast-paced challenging platformer gamesradar+ ranked 23rd best nes game ever made staff praised fact challenge comes quality level design low quality
[ 4357, 9957, 10695, 4524, 2156, 9006, 10316, 10576, 8887 ]
Test
6,450
9
Simcenter_Amesim:simcenter amesim simcenter amesim commercial simulation software modeling analysis multi-domain systems part systems engineering domain falls mechatronic engineering field software package suite tools used model analyze predict performance mechatronics systems models described using nonlinear time-dependent analytical equations represent system ’ hydraulic pneumatic thermal electric mechanical behavior compared 3d cae modeling approach gives capability simulate behavior systems detailed cad geometry available hence used earlier system design cycle v-model create simulation model system set libraries used contain pre-defined components different physical domains icons system connected purpose icon ports several inputs outputs causality enforced linking inputs one icon outputs another icon vice versa simcenter amesim libraries written c language also support modelica non-proprietary object-oriented equation based language model complex physical systems containing e.g. mechanical electrical electronic hydraulic thermal control electric power process-oriented subcomponents software runs linux windows platforms simcenter amesim part siemens plm software simcenter portfolio combines 1d simulation 3d cae physical testing intelligent reporting data analytics portfolio intended provide engineers analysts comprehensive solution development complex products include smart systems implementing predictive engineering analytics approach simcenter amesim software developed imagine s.a. company acquired june 2007 lms international acquired november 2012 siemens ag imagine s.a. company created 1987 dr michel lebrun university claude bernard france control complex dynamic systems coupling hydraulic servo-actuators finite-elements mechanical structures initial engineering project involved deck elevation sinking ekofisk north sea petroleum platforms early 1990s association pr c. w. richards coming university bath england led first commercial release simcenter amesim 1995 dedicated fluid control systems simcenter amesim used companies automotive aerospace advanced manufacturing industries simcenter amesim multi-domain software allows link different physics domains hydraulic pneumatic mechanic electrical thermal electromechanical based bond graph theory modelling system done four steps submodel parameter mode simcenter amesim model compiled windows platform simcenter amesim works free gcc compiler provided software also works microsoft visual c++ compiler free express edition since version 4.3.0 simcenter amesim uses intel compiler platforms simcenter amesim features create system simulation model simcenter amesim components different physical domains assembled physical libraries developed engineering services partnerships customers version 2019.1 simcenter amesim offered 48 libraries 6500 multi-physics models answer various application requirements simcenter amesim libraries simcenter amesim simcenter sysdm simcenter system architect simcenter webapp server simcenter amesim used engineering schools universities also reference framework various research projects europe free simcenter amesim student edition license downloaded
[ 1952, 9376, 8554, 5612, 1917, 6797, 847, 3567, 8079, 2804, 9780, 823, 3960, 2045, 7326 ]
Test
6,451
1
Mimer_SQL:mimer sql mimer sql sql-based relational database management system produced swedish company mimer information technology ab mimer ab formerly known upright database technology ab originally developed research project uppsala university uppsala sweden 1970s developed commercial product database deployed wide range application situations including nhs pulse blood transfusion service uk volvo cars production line sweden automotive dealers australia sometimes one limited options available realtime critical applications resource restricted situations mobile devices mimer sql originated project itc service center supporting uppsala university institutions leverage relational database capabilities proposed codd others initial release 1975 designated rapid written ibm assembler language name changed mimer 1977 avoid trademark issue universities interested project number machine architectures mimer re-written fortran achieve portability models developed mimer mimer/ql implementing quel query languages emergence sql 1980s standard query language resulted mimers developers choosing adopt product becoming mimer sql 1984 mimer transferred newly established company mimer information systems mimer sql database server currently supported main platforms windows macos linux openvms alpha integrity previous versions database engine supported operating systems including solaris aix hp-ux tru 64 sco versions mimer sql available download free development enterprise product standards based sql database server based upon mimer sql experience database server product highly configurable components added removed replacing foundation product achieve derived product suitable embedded real-time small footprint application mimer sql realtime database server replacement database engine specifically designed applications real-time aspects paramount sometimes marketed automotive approach resource limited environments mimer sql mobile database server replacement runtime environment without sql compiler used portable certain custom devices termed mobile approach custom embedded approaches applied multiple hardware operating system system combinations options enable mimer sql deployed wide variety additional target platforms real-time operating systems including android vxworks database available real-time embedded automotive specialist versions requiring maintenance intention make product suitable mission-critical automotive process automation telecommunication systems mimer sql provides support multiple database application programming interfaces apis odbc jdbc ado.net embedded sql c/c++ cobol fortran native api mimer sql real-time api mimer sql micro c api mimer provider manager ado.net provider dispatcher uses different plugins access different underlying ado.net providers mimer provider manager makes possible write database independent ado.net applications mimer sql mainly uses optimistic concurrency control occ manage concurrent transactions makes database locking free enables real-time predictability mimer sql assigned port 1360 internet assigned numbers authority iana registry name mimer taken norse mythology mimer giant guarding well wisdom also known mímisbrunnr metaphorically database system managing data
[ 6797, 9742, 10389, 9366, 10518, 1304, 2972, 10921, 10413, 10286, 9263, 823, 9286, 6993, 2901, 9177, 1383, 4598, 8188 ]
Test
6,452
3
Dragon_Buster:dragon buster game featured side-scrolling platform gameplay overworld map similar later super mario bros. series dragon buster also earliest game feature double jump mechanic one first use visual health meter beginning prince named clovis born son kingdom chief bodyguard royal lawrence family young child clovis mischievous undisciplined father thought might best place care monk lived woods far kingdom monk care clovis began learn various aspects knowledge including superior swordsman word reached monk king lawrence 16-year-old daughter celia abducted held fearsome dragon wished break kingdom spirit coerce kingdom bidding clovis felt sense duty chase dragon rescue celia name father order save princess trained daily monk learned withstand injury whether cut swords burned flame still capable fighter ever player must guide hero clovis round castle rescue beloved princess celia multiple princess celias game one every castles goal reach true celia end game final castle celia wears different outfit time rescued player progresses round must choose various paths take castle many paths choose number increases player gets higher rounds paths take player individual levels round multiple bosses level many less powerful enemies scattered throughout level player must find boss contains exit level proceed round finally reach castle clovis vitality restores 25 level completed game ends clovis vitality reaches zero five different types levels cave tower boneyard mountain ruins levels boasts particular type monster others example boneyard boasts lots boss skeleton cave mostly linear type level mostly descends horizontal movement boasts lots bats snakes tower notable many floors player must lot climbing type level boneyard probably hardest type level lot enemies paths choose player likely end defeating every boss level finds boss contains exit mountain player dropping time starts top mountain must work way ruins standard type level bit everything four types levels contain finally castle end round every castle starts long drop takes player dragon room must fight dragon game ported nec pc-8801 computer enix port featured introduction game entirely new ending featuring cinema screens depicting battle-torn clovis teary-eyed celia dragon buster also included hidden mini-game tales abyss playstation 2 nintendo 3ds included various namco museum compilations including namco museum volume 2 original playstation namco museum battle collection playstation portable namco museum virtual arcade xbox 360
[ 1060, 9093, 2540, 10316, 9006, 10287, 1776, 10931 ]
Test
6,453
3
Intel_8288:intel 8288 intel 8288 bus controller designed intel 8086/8087/8088/8089 chip supplied 20-pin dip package 8086 8088 operate maximum mode configured primarily multiprocessor operation working coprocessors necessary control signals generated 8288 used ibm pc xt clones ibm pc used successor intel 82288 intel 8288 i8288 industrial grade version available us 14.30 33.75 quantities 100 respectively
[ 548, 9861, 4203, 6415, 6129, 2874 ]
Validation
6,454
4
WDU_(software):wdu software westinghouse disk utility popularly called wdu copy/backup/restore program ibm dos dos/vs dos/vse environments 1978 reported wdu product westinghouse electric corporation use 3,000 sites originally designed ibm dos westinghouse continued developing subsequent generations including dos/vs dos/vse vm/cms product offered wide variety backup copy options data streaming alternating tape drives ability create archives steve o'donnell wrote original utility distributed free charge popularity made westinghouse realize wdu potential commercial product thus laying foundation westinghouse software group eventually called wems westinghouse management systems 1972 ibm released dos/vs ibm/370 westinghouse software group began rewrite new products several new team members assigned including john gaston took lead development following departure steve o'donnell latter 1970s steve o'donnell went found goal systems inc. westinghouse marketing suffered schism time result europe established independent subsidiary westinghouse electric management systems sa wemssa headquartered paris point westinghouse product line wdu westi bifurcated taking independent development paths original development team moved orlando florida eventually came management dr. ray ferguson focused integration vse later conjoining bifurcated products new development began initiated iii orlando florida guided dr. ferguson original plans called vm/cms new vse versions however part way development westinghouse began break division outsourcing thrust reaganomics era badly managed negotiations westinghouse ended neither developers outsourcing partners spelled end one industries foremost software groups north american marketing conducted wems marketing group based pittsburgh included first level tech support westinghouse electric management systems sa wemssa paris london geneva zürich munich amsterdam given world marketing rights initially europe africa far east
[ 3969, 9345, 4483, 10756, 4107, 10392, 11673, 2075, 2041, 9771, 1970, 11457, 3529, 10061, 467, 7515, 7775, 2283, 877, 3320, 10617, 511 ]
Validation
6,455
4
NOYB:noyb noyb – european center digital rights none business non-profit organization based vienna austria established 2017 co-founded austrian lawyer privacy activist max schrems noyb aims launch strategic court cases media initiatives support general data protection regulation proposed eprivacy regulation information privacy general many privacy organisations focus attention governments noyb puts focus privacy issues privacy violations private sector soon general data protection regulation rules went effect 25 may 2018 noyb filed complaints facebook subsidiaries whatsapp instagram well google llc targeting android allegedly violating article 7 4 attempting completely block use services users decline accept data processing consents bundled grant also includes consents deemed unnecessary use service
[ 2818, 3880, 1930, 9260, 9901, 3599, 1169, 3858, 10002, 1368 ]
None
6,456
5
Peg_DHCP:peg dhcp peg dhcp method defined rfc 2322 assign ip addresses context regular dhcp would n't work server hands wooden clothes-pegs numbered addresses allocate additional leaflet network information client typically user configures device accordingly even though rfc management ip numbers peg-dhcp published first april 1998 describes unlike april fools day rfcs regularly used protocol serious purpose preparation hacking progress 1997 organizers looking robust way assign ip addresses participants obvious first choice dhcp almost completely defenseless rogue servers retained considering traditionally creative use network instead every address allocate variable host part written wooden peg waterproof marker user would attach cable connecting device network peg accompanied leaflet information static net part ip address netmask default gateway dns servers often also mac addresses prevent arp spoofing different subnets lan wlan distinguished different colors used write pegs peg dhcp successfully used hacking progress '97 following events netherlands including 2009 event hacking random german chaos computer club used chaos communication camps still using editions chaos communication congress hacking random pegs distributed according network map event terrain every field distinct subnet per subnet division regular ip address distribution via dhcp fixed ip addresses distributed via peg dhcp obtain ip address via peg dhcp one note subnet number field datenklo dedicated rain-proof box networking equipment usually empty portable toilet subnet number correct routable ip address could handed
[ 3592, 3218, 11413, 3742, 10924, 6319, 562, 2996, 9524, 4797, 4158, 3006, 64, 7364, 2887, 5469, 5470, 10341, 10344, 11112, 5102, 8432, 7411, 6651, 6013 ]
Validation
6,457
2
Soft_Hard_Real-Time_Kernel:soft hard real-time kernel s.ha.r.k acronym stands soft hard real-time kernel completely configurable kernel architecture designed supporting hard soft non real-time applications interchangeable scheduling algorithms kernel architecture main benefit application developed independently particular system configuration allows new modules added replaced application specific scheduling policies evaluated predictability overhead performance s.ha.r.k developed retis lab research facility sant'anna school advanced studies university pavia tool teaching testing developing real-time software systems used teaching many universities including sant'anna school advanced studies malardalens university sweden unlike kernels traditional operating systems s.ha.r.k fully modular terms scheduling policies aperiodic servers concurrency control protocols modularity achieved partitioning system activities generic kernel set modules registered initialization configure kernel according specific application requirements s.ha.r.k evolution hartik kernel based oslib project
[ 7187, 5363, 5397, 9366, 6207 ]
Test
6,458
1
Elasticsearch:elasticsearch elasticsearch search engine based lucene library provides distributed multitenant-capable full-text search engine http web interface schema-free json documents elasticsearch developed java following open-core business model parts software licensed various open-source licenses mostly apache license parts fall proprietary source-available elastic license official clients available java .net c php python apache groovy ruby many languages according db-engines ranking elasticsearch popular enterprise search engine followed apache solr also based lucene shay banon created precursor elasticsearch called compass 2004 thinking third version compass realized would necessary rewrite big parts compass create scalable search solution created solution built ground distributed used common interface json http suitable programming languages java well shay banon released first version elasticsearch february 2010 elastic nv founded 2012 provide commercial services products around elasticsearch related software june 2014 company announced raising 70 million series c funding round 18 months forming company round led new enterprise associates nea additional funders include benchmark capital index ventures round brings total funding 104m march 2015 company elasticsearch changed name elastic june 2018 elastic filed initial public offering estimated valuation 1.5 3 billion dollars 5 october 2018 elastic listed new york stock exchange elasticsearch used search kinds documents provides scalable search near real-time search supports multitenancy elasticsearch distributed means indices divided shards shard zero replicas node hosts one shards acts coordinator delegate operations correct shard rebalancing routing done automatically related data often stored index consists one primary shards zero replica shards index created number primary shards changed elasticsearch developed alongside data collection log-parsing engine called logstash analytics visualisation platform called kibana beats collection lightweight data shippers four products designed use integrated solution referred elastic stack formerly elk stack elasticsearch uses lucene tries make features available json java api supports facetting percolating useful notifying new documents match registered queries another feature called gateway handles long-term persistence index example index recovered gateway event server crash elasticsearch supports real-time get requests makes suitable nosql datastore lacks distributed transactions 20 may 2019 elastic made core security features elastic stack free including tls encrypted communications file native realm creating managing users role-based access control controlling user access cluster apis indexes developed found acquisition elastic 2015 elastic cloud family elasticsearch-powered saas offerings include elasticsearch service well elastic app search service elastic site search service developed elastic ’ acquisition swiftype late 2017 elastic formed partnerships google offer elastic cloud gcp alibaba offer elasticsearch kibana alibaba cloud elasticsearch service elastic cloud official hosted managed elasticsearch kibana offering creators project since august 2018 elasticsearch service users create secure deployments partners google cloud platform gcp alibaba cloud aws offers elasticsearch managed service since 2015 managed services provide hosting deployment backup support managed services also include support kibana elasticsearch basis pangeanic contribution eu marie curie research project expert called activatm pangeanic built bilingual database compatible computer-assisted translation tools could offer real-time access via api variety tools project received funding eu national european central translation memory project connecting europe facility cef programme nec tm aims centralise national translation assets eu member states countries re-use bilingual translation data produced result public procurement contracts
[ 1306, 9245, 9631, 5677, 5295, 7983, 6074, 4797, 4031, 8644, 10565, 5066, 5835, 2765, 6359, 8408, 9179, 9828, 8554, 5612, 9455, 113, 3573, 1142, 7288 ]
Test
6,459
2
NewDos/80:newdos/80 newdos/80 third-party operating system radio shack trs-80 line microcomputers released 1980 newdos/80 developed apparat inc. denver colorado operating system additional commands features available trsdos native operating system trs-80 computers newdos/80 allowed trs-80 computers take advantage advances floppy disk storage went beyond initial 87.5kb 35-track single-density single-sided format system also corrected issues early versions trsdos arbitrarily losing data due errors communicated contemporary trs-80 disk drives 1771 disk controller newdos/80 many options specifying specific low-level disk configurations settings diskette formats disk drive types track geometry controllers could configured using pdrive command version 2.1 apparat added support hard disk drives via external bus adapter newdos/80 written cliff ive jason matthews ive primary author newdos incarnations matthews wrote patches various applications scripsit visicalc ive later retired matthews went projects software business typical newdos/80 commands criticizing newdos nearly incomprehensible documentation jerry pournelle wrote 1980 much better operating system needlessly complex trsdos stated tandy ought marketing newdos+
[ 2179, 10499, 10883, 394, 3978, 1804, 6797, 273, 7057, 6675, 7187, 5397, 2198, 9366, 6296, 25, 8729, 10776, 8092, 4637, 7325, 9887, 10016, 9762, 421, 5158, 10235, 2345, 7983, 3248, 7217, 11184, 6837, 823, 9784, 4409, 10809, 6075, 7483, 607...
None
6,460
9
Xavier_Leroy:xavier leroy xavier leroy born march 15 1968 french computer scientist programmer best known role primary developer ocaml system professor software science collège de france appointment collège de france 2018 senior scientist directeur de recherche french government research institution inria leroy admitted école normale supérieure paris 1987 studied mathematics computer science 1989 1992 phd computer science supervision gérard huet internationally recognized expert functional programming languages compilers recent years taken interest formal methods formal proofs certified compilation leader compcert project develops optimizing compiler c programming language formally verified coq leroy also original author linuxthreads widely used threading package linux versions prior 2.6 linux 2.6 introduced nptl much extensive support kernel replace linuxthreads 2015 named fellow association computing machinery contributions safe high-performance functional programming languages compilers compiler verification awarded 2016 milner award royal society
[ 1952, 6306, 9294, 1783, 8057, 8924, 2045 ]
Test
6,461
1
Croatian_Register_of_Shipping:croatian register shipping croatian register shipping also known crs independent classification society established 1949 non-profit organisation working marine market developing technical rules supervising implementation managing risk performing surveys ships society head office split croatian register shipping member international association classification societies iacs since may 2011 register officially recognized malta maritime authority
[ 5099 ]
Test
6,462
2
Windows_Vista_editions:windows vista editions windows vista—a major release microsoft windows operating system—was available six different product editions starter home basic home premium business enterprise ultimate september 5 2006 microsoft announced usd pricing editions available retail channels operating system later made available retail january 30 2007 microsoft also made windows vista available purchase download windows marketplace first version windows distributed digital distribution platform editions sold retail available full upgrade versions later included service pack 1 sp1 microsoft characterized retail packaging windows vista designed user-friendly … small hard plastic container designed protect software inside life-long use packaging opens sideways reveal windows vista dvd suspended clear plastic case windows vista disc uses holographic design similar discs microsoft produced since windows 98 exception windows vista starter editions support 32-bit x86 64-bit x64 processor architectures microsoft ceased retail copies windows vista october 2010 oem distribution windows vista ended 2011 notes support 64-bit platforms intel xeon intel core 2 amd opteron amd athlon 64 microsoft released 64-bit versions every edition windows vista except starter edition editions run 32-bit programs running within wow64 subsystem 32-bit programs run natively though applications rely device drivers run unless device drivers written 64-bit windows reviewers reported 64-bit editions windows vista outperform 32-bit counterparts synthetic benchmarks passmark 32-bit editions windows vista excluding starter edition support 4 gb ram 64-bit edition home basic supports 8 gb ram home premium supports 16 gb business enterprise ultimate editions support 128 gb ram 64-bit versions microsoft operating systems currently impose 16 tb limit address space processes created 64-bit editions windows vista 8 tb virtual memory user processes 8 tb kernel processes create virtual memory 16 tb march 2004 european commission fined microsoft €497 million us 603 million ordered company provide version windows without windows media player commission concluded microsoft broke european union competition law leveraging near monopoly market pc operating systems onto markets work group server operating systems media players microsoft reached agreement commission would release court-compliant version windows xp edition n include company windows media player instead encourages users download install preferred media player similarly december 2005 korean fair trade commission ordered microsoft make available editions windows xp windows server 2003 contain windows media player windows messenger similar european commission decision based grounds microsoft abused dominant position market push products onto consumers unlike decision however microsoft also forced withdraw non-compliant versions windows south korean market decision resulted microsoft releasing k kn variants home professional editions windows xp august 2006 continuance requirements microsoft released n kn variants editions windows vista exclude windows media player well k kn editions include links third-party media player instant messaging software n editions windows vista require third-party software separate installation windows media player play audio cds media formats mpeg-4 two additional editions windows vista released use developers embedded devices microsoft lists system requirements editions desktop variants editions licensed exclusively development embedded devices notes unlike previous versions windows windows vista support compliance checking installation compliance checking previously allowed users insert disc evidence operating system upgraded previous version would allow users enter upgrade license perform clean install result upgrade versions windows vista install unless previous version windows already installed machine upgraded workaround limitation reported paul thurrott stated users able perform full installation windows vista upgrade media bypassing prompt enter license setup installed reinstall operating system previous installation—this essentially allows users purchased upgrade version perform full retail installation workaround indeed possible microsoft cautioned users perform full installation operating system method without genuine license previous version would violation windows vista end-user license agreement users upgrade windows xp windows vista upgrade one edition windows vista another however upgrading 32-bit edition 64-bit edition downgrading 64-bit edition 32-bit edition requires clean install addition potential upgrade combinations supported following chart indicates possible upgrade paths notes
[ 6150, 11270, 5643, 11283, 540, 11301, 1577, 6697, 1581, 1077, 582, 1098, 8798, 10338, 8296, 617, 5225, 8299, 7796, 6265, 8315, 4731, 636, 10879, 639, 641, 651, 6797, 10896, 2196, 10900, 2221, 3250, 5300, 9910, 8391, 10957, 3283, 3289, 431...
None
6,463
3
Stepping_level:stepping level integrated circuits stepping level revision level version number refers introduction revision one photolithographic photomasks within set photomasks used pattern integrated circuit term originated name equipment steppers exposes photoresist light integrated circuits two primary classes mask sets 1. base layers used build structures make logic transistors 2 metal layers connect logic together typically integrated circuit manufacturer intel amd invests money stepping i.e revision masks found bugs logic made improvements design allow faster processing found way increase yield improve bin splits i.e. create faster transistors hence faster cpus improve maneuverability easily identify marginal circuits reduce test time reduce cost testing part many integrated circuits means interrogating order discover stepping level example x86 cpus executing cpuid eax register set 1 place values registers show cpu stepping level stepping identifiers commonly alphabetic letter followed numeric number example b2 usually letter indicates revision level chip base layers number indicates revision level metal layers change letter indicates change base layer mask revision metal layers change number indicates metal-layer–only mask revision analogy major/minor revision numbers used software versioning base layer revision changes time consuming expensive manufacturer fixes difficult impossible accomplish metal-only changes integrated circuit intel core microarchitecture uses number steppings unlike previous microarchitectures represent incremental improvements also different sets features like cache size low power modes steppings used across brands typically disabling features limiting clock frequencies low-end chips steppings reduced cache size use separate naming scheme means releases longer alphabetic order
[ 4217, 6924, 1005, 8301, 8590, 5073, 499, 4886, 3352, 2201, 2237, 11550 ]
Test
6,464
3
UltraSPARC_IV:ultrasparc iv ultrasparc iv jaguar follow-up ultrasparc iv+ panther microprocessors designed sun microsystems manufactured texas instruments fourth generation ultrasparc microprocessors implement 64-bit sparc v9 instruction set architecture isa ultrasparc iv originally succeeded ultrasparc v millennium canceled announcement niagara ultrasparc t1 microprocessor early 2004 instead succeeded fujitsu-designed sparc64 vi ultrasparc iv developed part sun throughput computing initiative included ultrasparc v millennium gemini ultrasparc t1 niagara microprocessors four original designs initiative two reached production ultrasparc iv ultrasparc t1 whereas millennium niagara implemented block multithreading also known coarse-grained multithreading ultrasparc iv implemented chip-multithreading cmp — multiple single-thread cores ultrasparc iv first multi-core sparc processor released march 2004 internally implements two modified ultrasparc iii cores physical packaging identical ultrasparc iii exception one pin ultrasparc iii cores improved variety ways instruction fetch store bandwidth data prefetching optimized floating-point adder implements additional hardware handle number nan underflow cases avoid exceptions cores share l2 cache capacity 16 mb l2 cache tags ultrasparc iv contains 66 million transistors measures 22.1 mm 16.1 mm 356 mm fabricated texas instruments 0.13 µm process ultrasparc iv+ released mid-2005 also dual-core design featuring enhanced processor cores on-chip l2 cache fabricated 90 nanometer manufacturing process initial speed ultrasparc iv+ 1.5 ghz 0.3 ghz less intended 1.8 ghz april 2007 increased 2.1 ghz contains 295 million transistors servers using ultrasparc iv released september 2004 ultrasparc iv+ released sun servers september 2005 sun fire v490 v890 e2900 e4900 e6900 e20k e25k systems use ultrasparc iv iv+ processors systems range 4 72 processor sockets 8 144 cores servers powered ultrasparc iv+ processor well received allowing sun regain revenue lead risc/unix server market 2006
[ 9090, 9731, 1801, 1675, 4235, 1809, 4241, 7702, 1818, 8863, 9637, 1707, 2731, 10926, 3247, 9391, 6322, 10675, 4664, 4285, 7104, 9665, 8266, 2895, 3919, 597, 9302, 731, 2269, 9955, 7270, 11626, 5358, 1776, 5492, 11636, 1399, 1788 ]
Validation
6,465
1
ADOdb_Lite:adodb lite adodb lite small fast adodb-compatible database abstraction library written php uses less 100 kb system ram http access compared 640 kb adodb benchmark adodb lite also 300 faster adodb library adodb lite library fully expandable use modules library contains pear module contains pear db-compatible commands library also contains transaction module giving full transaction support many supported databases library support number user created modules easily expand library module system also gives programmer/admin ability structure library usage based upon needs website library fast compared database abstraction libraries
[ 8644, 9481, 5546, 4106, 8781, 7022, 8539, 190 ]
Test
6,466
4
Wi-Fi_deauthentication_attack:wi-fi deauthentication attack wi-fi deauthentication attack type denial-of-service attack targets communication user wi-fi wireless access point unlike radio jammers deauthentication acts unique way ieee 802.11 wi-fi protocol contains provision deauthentication frame sending frame access point station called sanctioned technique inform rogue station disconnected network attacker send deauthentication frame time wireless access point spoofed address victim protocol require encryption frame even session established wired equivalent privacy wep data privacy attacker needs know victim mac address available clear wireless network sniffing one main purposes deauthentication used hacking community force clients connect evil twin access point used capture network packets transferred client rap attacker conducts deauthentication attack target client disconnecting current network thus allowing client automatically connect evil twin access point order mount brute-force dictionary based wpa password cracking attack wifi user wpa wpa2 enabled hacker must first sniff wpa 4-way handshake user elicited provide sequence first forcing offline deauthentication attack similar phishing style attack without password cracking wifiphisher starts deauthentication attack disconnect user legitimate base station mounts man-in-the-middle attack collect passwords supplied unwitting user federal communications commission fined hotels companies launching deauthentication attacks guests purpose drive personal hotspots force pay on-site wi-fi services aircrack-ng suite mdk3 void11 scapy zulu software mount wifi deauthentication attack aireplay-ng aircrack-ng suite tool run deauthentication attack executing one-line command pineapple rogue access point issue deauth attack wifijammer also automatically scan jam networks within range esp8266 used perform detect deauth attacks using wi-pwn android nexmon supports broadcom wlan chip deauth attacks
[ 4163, 4580, 4517, 7556, 7557, 2409, 1070, 9968, 10329, 10332, 4863 ]
Test
6,467
3
Solitaire_Royale:solitaire royale solitaire royale collection solitaire games published spectrum holobyte 1987 apple iigs ms-dos macintosh amiga eight games included 3 shuffles draw pyramid golf corners reno klondike canfield calculation also three children games pairs wish concentration solitaire royale computer solitaire card-game simulation game features colorful card-back designs digitized sounds cards shuffling eight solitaire games included game features tournament competition challenge accumulate highest total score upon playing eight games row two combatants receiving exactly deal solitaire game fireworks displayed game received 5 5 stars dragon 141 role computers column
[ 9166 ]
Test
6,468
2
Individual_Computers_Catweasel:individual computers catweasel catweasel family enhanced floppy disk controllers german company individual computers controllers designed allow recent computers pcs access wide variety older non-native disk formats using standard floppy drives floppy controller chip used ibm pcs compatibles nec 765a technology progressed descendants machines used essentially extensions chip many computers particularly ones commodore early ones apple write disks formats encoded decoded 765a even though drive mechanisms less identical ones used pcs catweasel therefore created emulate hardware necessary produce low-level formats catweasel provides custom floppy drive interface addition floppy interfaces computer already equipped industry standard floppy drives attached catweasel allowing host computer read many standard custom formats means custom software drivers supported formats initial version catweasel introduced 1996 since undergone several revisions catweasel mk1 mk2 commodore amiga 1200 amiga 4000 sold october 2001 mk3 added pci compatibility sold mid-2004 succeeded mk4 mk2 re-released 2006 special anniversary edition original version catweasel introduced 1996 amiga computer available two versions one commodore amiga 1200 one amiga 4000 amiga 1200 version connected machine clock port amiga 4000 version connected machine ide port pass-through provided amiga 4000 version ide port could still used mass storage devices version catweasel controller developed use standard pc isa slot means reading custom non-pc floppy formats ms-dos custom dos commands required use interface official software drivers also available windows mk2 catweasel redesign original catweasel merging amiga 1200 amiga 4000 versions single product could used computers providing new pcb layout allowed easily installed standard amiga 1200 case continued popularity catweasel mk2 led special anniversary edition model released 2006 pcb anniversary edition received minor updates however retained form factor functionality mk2 catweasel z-ii version amiga zorro-ii expansion combined catweasel mk2 controller another individual computers product buddha single board providing floppy ide interfaces host computer catweasel mk3 designed interface either pci slot amiga zorro ii slot clock port amiga 1200 addition low-level access granted floppy drives socket commodore 64 sid sound chip port amiga 2000 keyboard two 9-pin digital joysticks atari 2600 de facto standard mk3 succeeded mk4 catweasel mk4 officially announced 18 july 2004 wide array new features planned however due manufacturing delays production backlogs mk4 released early february 2005 version catweasel makes heavy use reconfigurable logic form altera acex ep1k30tc144-3n fpga chip well amd mach110 pld pci interface ic mk4/mk4+ driver uploads fpga microcode start makes easy updates possible without replace hardware official software drivers available windows unofficial drivers utilities available linux catweasel mk4plus appears longer available
[ 8355, 9477, 5736, 6797, 3886, 823 ]
None
6,469
8
Mobile_deep_linking:mobile deep linking context mobile apps deep linking consists using uniform resource identifier uri links specific location within mobile app rather simply launching app deferred deep linking allows users deep link content even app already installed depending mobile device platform uri required trigger app may different see list supported deep links unlike web underlying technology http urls allow deep linking default enabling deep linking mobile apps requires apps configured properly handle uniform resource identifier uri like url address website uri address app mobile device examples uris launch mobile app format uri used trigger deep link app often different depending mobile operating system android devices work intents blackberry 10 devices work bb10 invocation framework firefox os devices work web activities ios devices work openurl application method windows phone 8 devices work urimapper class greatest benefit mobile deep linking ability marketers app developers bring users directly specific location within app dedicated link deep links made web usable mobile deep links mobile apps unlike deep links web link format standardized based http guidelines mobile deep links follow consistent format causes confusion development different sets links required access app different mobile operating system google allows app developers ios android apps surface in-app content via mobile google searches developers need submit app deep linking apps ios android indexed google alternatively developers use google short links deep link mobile app users app installed direct others webpage one example better user experience made possible deep link data passing install solution one search information passed app bring user exact information drove app compared common web link implementation may reduce number steps required example search hotels boston user currently needs shortened
[ 1944, 6672, 2259, 6836 ]
Test
6,470
1
NitrosBase:nitrosbase nitrosbase russian high-performance multi-model database system database system supports relational graph document database models developer initially implemented database triplestore semantic web pioneer russia remodelling multi-model database supported skolkovo innovation center 2017 database used information systems support health-care reform modern russia nitrosbase data stored format internal graph model data models views representations similar sql views regardless model format data imported possible query using query language thereby uniformly addressing data imported different models moreover possible query data model using query language native model nitrosbase supports following languages internal graph model close rdf* used amazon neptune allows treat internal data graph rdf graph property graph performing queries sparql gremlin-style languages instead indexes based b+-trees traditionally used graph databases nitrosbase uses sparse link index devising another source performance gain storage optimization physical level order reduce number random access operations like memsql nitrosbase translates query c++ code nitrosbase-derived product ms sql server accelerator awarded first prize silicon valley open doors www.svod.org conference 2009 named startup day microsoft bizspark program
[ 5632, 9634, 3171, 8451, 6629, 7462, 9828, 5640, 10413, 7983, 10452, 9397, 823, 2456, 11098, 9631 ]
None
6,471
4
IP_access_controller:ip access controller ip access controller electronic security device designed identify users control entry exit protected areas typical ip access controller supports 2 4 basic access control readers may internal web server support configuration via browser via software installed host pc main features distinguish ip controllers older generation serial controllers 1 ip controllers connect directly lan/wan inputs outputs necessary controlling readers monitoring door inputs controlling locks 2 ip controllers on-board network interface require use terminal server examples ip access controllers gc01n simac/simacquadcore pac-512-ip pac/stanley security products directdoor ge security products vertx v2000 hid global advantages disadvantages considering fact solus developed controller options allow users choose ip serial
[ 5472, 2737, 3044 ]
None
6,472
4
Software_forensics:software forensics software forensics science analyzing software source code binary code determine whether intellectual property infringement theft occurred centerpiece lawsuits trials settlements companies dispute issues involving software patents copyrights trade secrets software forensics tools compare code determine correlation measure used guide software forensics expert past methods code comparison included hashing statistical analysis text matching tokenization methods compared software code produced single measure indicating whether copying occurred however measures accurate enough admissible court results accurate algorithms could easily fooled simple substitutions code methods take account fact code could similar reasons copying 2003 robert zeidman developed algorithms incorporated codesuite tool multidimensional software correlation divides software code basic elements determines elements similar “ correlated. ” also created procedure filtering interpreting correlations eliminate reasons correlation due copying common algorithms third-party code common identifier names common author automatic code generation combination algorithms procedures resulted reliable quantitative analysis available previously zeidman ’ book software ip detective handbook considered standard textbook software forensics codesuite tools methodology used many software ip litigations including connectu v. facebook symantec v. irs baker mckenzie sco group inc. v. international business machines corp following use software tools compare code determine amount correlation expert use iterative filtering process determine correlated code due third-party code code generation tools commonly used names common algorithms common programmers copying correlation due copying copier authority rights holder copyright infringement occurred software contain trade secrets provide competitive advantage business determine trade secret theft tools processes used detect copyright infringement code copied without authority code characteristics trade secret—it generally known business keeps secret secrecy maintains value business—then copied code constitutes trade secret theft trade secret theft also involve taking code functionality without literally copying code comparing code functionality difficult problem yet accomplished algorithm reasonable time reason finding theft code functionality still mostly manual process trade secret functionality currently possible scientifically detect software patent infringement software patents cover general implementation rather specific source code example program implements patented invention written many available programming languages using different function names variable names performing operations different sequences many combinations ways implement inventions software even powerful modern computers consider combinations code might infringe patent work still left human experts using knowledge experience problem many software forensics trying automate finding algorithm simplifying process one important rule forensic analysis objective facts must considered first reviewing comments code searching internet find information companies distribute code programmers wrote code useful objective facts regarding correlation considered analysis performed using forensic tools procedures analysts begin looking subjective evidence like comments code information subjective evidence conflicts objective analysis analysts need doubt subjective evidence fake copyright notices open source notifications programmer names added source code copying took place order disguise copying uncommon real-world cases code theft
[ 5635, 5284 ]
Validation
6,473
4
Malcon:malcon malcon premier international technology security conference focusing exclusively proactive malware research analysis malcon part information sharing analysis center support government india executed india uk based multinational media company ubm plc also owns infamous black hat briefings malcon aims bringing together malware information security researchers across globe share key research insights building containment next generation malwares unlike hacker conventions malcon opposed much debated ‘ zero day ’ ‘ full disclosure ’ first malcon conference took place december 2010 mumbai pune india many attendees malcon include security professionals government employees lawyers researchers journalists hackers interest malwares global impact economy event promotes “ proactive ” research malware coding openly invites malcoders come forward demonstrate creation malcon founded 2010 rajshekhar murthy known thebluegenius science graduate ex-employee microsoft corporation since inception malcon widely backed numerous government organizations ntro eventually malcon became part information sharing analysis center isac non-profit support government india 2011 event organizers issued faq outlines philosophy malcon explain objective “ aim help security industry well software industry understand fine ‘ art ’ malware development covers even exploits build better secure code well work towards mitigating potential new attack vectors. ” interview kerbsonsecurity quoted conference done inviting best well known security experts share statistics slides ‘ analysis ’ malwares benefit community today except awareness need malcon conference bridge ignored gap security companies malcoders get common platform talk like concept ‘ ethical hacking ’ helped organizations see hackers bad time accept ‘ ethical malcoding ’ required research identify mitigate newer malwares ‘ proactive ’ way rajshekhar murthy coined new security term “ ethical malcoding ” differentiate malcoders work background independently various security firms research financial gain another term guuware describe software ’ may similar attributes malware used defensive purposes malcon approach openly inviting ethical malcoders gained lot international attention faced criticism notable security sites bloggers part malcon faq maintains “ rapid analysis detection technology malcon conference new malwares constantly created even available handful security vendors team researchers analysis enough active open participation ‘ ethical malcoders ’ help advance research containment capability existing methods ” malcon convention following format malware comic announced malcon team day maha shivaratri 20 february 2012 stated planned release zero-days using comics comic expected two formats web printed version printed version specifically indian government officials intelligence agencies law enforcement groups regular attendees conference creation malware journal formally disclosed malcon 2011 quarterly journal collaboration various hacker groups objective helping coders understand art behind malcoding offensive defense security journal also seen remarkable significant point history evolution hackers cyber warfare capabilities india
[ 7809, 9089, 2275, 5891, 8805, 7228, 10894, 1938, 3796, 4117, 7449, 7515, 4956, 10110 ]
Test
6,474
4
Project_Zero:project zero project zero team security analysts employed google tasked finding zero-day vulnerabilities secret hackable bugs exploited criminals state-sponsored hackers intelligence agencies announced 15th july 2014 finding number flaws software used many end-users researching problems critical heartbleed vulnerability google decided form full-time team dedicated finding vulnerabilities google software software used users new project announced 15 july 2014 google security blog launched one principal innovations project zero provided strict 90-day disclosure deadline along publicly visible bugtracker vulnerability disclosure process documented idea project zero traced back 2010 establishment fits larger trend google counter-surveillance initiatives wake 2013 global surveillance disclosures edward snowden team formerly headed chris evans previously head google chrome security team subsequently joined tesla motors notable members include security researchers ben hawkes ian beer tavis ormandy hawkes eventually became team manager team focus finding bugs novel attacks also researching publicly documenting flaws could exploited practice done ensure defenders sufficient understanding attacks team keeps extensive research blog articles describe individual attacks detail bugs found project zero team reported manufacturer made publicly visible patch released 90 days passed without patch released 90-day-deadline google way implementing responsible disclosure giving software companies 90 days fix problem informing public users take necessary steps avoid attacks cases team discloses flaws even updates fixes could released leaving users compromised system vulnerable one first project zero reports attracted attention involved flaw allowed hackers take control software running safari browser efforts team specifically beer cited apple brief note thanks 30 september 2014 google detected security flaw within windows 8.1 system call ntapphelpcachecontrol allows normal user gain administrative access microsoft notified problem immediately fix problem within 90 days meant information bug made publicly available 29 december 2014 releasing bug public elicited response microsoft working problem 9th march 2015 google project zero blog posted guest post disclosed previously known hardware flaw commonly deployed dram called row hammer could exploited escalate privileges local users post spawned large quantity follow-up research academic hardware community 19 february 2017 google discovered flaw within cloudflare reverse proxies caused edge servers run past end buffer return memory contained private information http cookies authentication tokens http post bodies sensitive data data cached search engines member project zero team referred flaw cloudbleed 27 march 2017 tavis ormandy project zero discovered vulnerability popular password manager lastpass 31 march 2017 lastpass announced fixed problem project zero involved discovering meltdown spectre vulnerabilities affecting many modern cpus discovered mid-2017 disclosed early january 2018 issue discovered jann horn independently researchers reported security flaw scheduled published 9 january 2018 moving date growing speculation 18 april 2019 project zero discovered bug apple imessage wherein certain malformed message could cause springboard ... crash respawn repeatedly causing ui displayed phone stop responding input would completely crash iphone ui making inoperable.this bug would persist even hard reset flaw also affected imessage mac different results apple fixed bug within 90 day period project zero released
[ 9732, 4374, 7965, 3619, 5028, 3495, 8231, 297, 5547, 9518, 7601, 10110, 6074, 10190, 7893, 1623, 4318, 1776, 4853, 119, 1912, 8956, 7678 ]
Test
6,475
4
American_Society_of_Digital_Forensics_&_eDiscovery:american society digital forensics amp ediscovery american society digital forensics ediscovery asdfed national professional association organized 501c3 profit organization organisations stated aims promote field digital forensics ediscovery asdfed founded georgia not-for-profit corporation currently publishes technical bulletins newsletters online news announcements hold national meetings seminars conferences organisation composed professionals legal technology litigation support professions society regional chapters across united states including atlanta chicago san diego new york city washington d.c.. asdfed ’ first chapter launched atlanta georgia chapter ’ leadership team composed president senior vice president least one vice president secretary treasurer end chapter president term remains chapter board additional year national asdfed organization composed three separate distinctive entities first board directors responsible overall guidance direction organization fiscal oversight second chapter support center provides membership packets support chapter third national leadership assembly nla nla composed current president senior vice president chapter primary charge nla updating revising asdfed common body knowledge first years organisation appointed steering committee members included
[ 2437, 5010, 4500, 8469, 3099, 7968, 6177, 5284, 11182, 10290, 4789, 1975, 8635, 830, 2494, 7369, 10189, 4049, 4834, 5475, 7525, 9319, 7160, 11642 ]
Test
6,476
6
Program_Files:program files program files directory name standard folder microsoft windows operating systems applications part operating system conventionally installed typically application installed 'program files directory subdirectory application-specific resources shared resources example resources used multiple applications one company typically stored nowiki /nowiki common program files nowiki /nowiki directory standard windows installation 'program files directory codice_1 localized equivalent thereof 'common program files localized equivalent thereof subdirectory 'program files windows vista later paths 'program files 'common program files directories localized disk instead localized names ntfs junction points non-localized locations additionally windows shell localizes name program files folder depending system user interface display language 'program files 'common program files moved system startup actual paths 'program files 'common program files loaded windows registry stored codice_2 codice_3 values codice_4 made accessible rest system via volatile environment variables codice_5 codice_6 applications also obtain locations paths querying codice_7 using codice_8 windows management instrumentation querying shell using csidls codice_9 localization-independent methods x86-64 ia-64 versions windows two folders application files program files folder serves default installation target 64-bit programs program files x86 folder default installation target 32-bit programs need wow64 emulation layer 64-bit windows versions also codice_10 environment variable dirids csidls different 32-bit 64-bit environments apis merely return different results depending whether calling process emulated backwards compatible 8.3 limitations old file allocation table filenames names 'program files 'program files x86 'common program files shortened system codice_11 codice_12 n digit sequence number clean install 1 1 2 'program files 'program files x86 present windows installed ntfs volume default 'program files folder modified members 'administrators user groups issue programs created windows 9x operating systems file system security programs could therefore also store data 'program files programs store data 'program files usually run correctly windows nt systems normal user privileges unless security lowered affected subdirectories windows vista addressed issue introducing file registry virtualization
[ 1, 7173, 9739, 2066, 7699, 5655, 537, 10779, 10781, 10273, 9762, 6181, 8231, 3630, 6705, 7218, 8757, 2623, 2113, 7234, 2638, 10338, 3175, 617, 8815, 9840, 6268, 1148, 3197, 6787, 6797, 2193, 7313, 10900, 6815, 5793, 6818, 4771, 6821, 7847...
Validation
6,477
9
Tracing_just-in-time_compilation:tracing just-in-time compilation tracing just-in-time compilation technique used virtual machines optimize execution program runtime done recording linear sequence frequently executed operations compiling native machine code executing opposed traditional just-in-time jit compilers work per-method basis just-in-time compilation technique increase execution speed programs compiling parts program machine code runtime one way categorize different jit compilers compilation scope whereas method-based jit compilers translate one method time machine code tracing jits use frequently executed loops unit compilation tracing jits based assumptions programs spend time loops program hot loops subsequent loop iterations often take similar paths virtual machines tracing jit often mixed-mode execution environments meaning either interpreter method compiler addition tracing jit tracing jit compiler goes various phases runtime first profiling information loops collected hot loop identified special tracing mode entered records executed operations loop sequence operations called trace trace optimized compiled machine code trace loop executed compiled trace called instead program counterpart steps explained detail following goal profiling identify hot loops often done counting number iterations every loop count loop exceeds certain threshold loop considered hot tracing mode entered tracing phase execution loop proceeds normally addition every executed operation recorded trace recorded operations often stored form intermediate representation tracing follows function calls leads inlined trace tracing continues loop reaches end jumps back start since trace recorded following one concrete execution path loop later executions trace diverge path identify places happen special guard instructions inserted trace one example place statements guard quick check determine whether original condition still true guard fails execution trace aborted since tracing done execution trace made contain runtime information e.g type information information later used optimization phase increase code efficiency traces easy optimize since represent one execution path means control flow exists needs handling typical optimizations include constant-subexpression elimination dead-code elimination register allocation invariant-code motion constant folding escape analysis optimization trace turned machine code similarly optimization easy due linear nature traces trace compiled machine code executed subsequent iterations loop trace execution continues guard fails whereas idea jits reaches back 1960s tracing jits become used often recently first mention idea similar today idea tracing jits 1970 observed compiled code could derived interpreter run-time simply storing actions performed interpretation first implementation tracing dynamo software dynamic optimization system capable transparently improving performance native instruction stream executes processor native instruction stream interpreted hot instruction sequence found sequence optimized version generated cached executed dynamo later extended dynamorio one dynamorio-based project framework interpreter construction combines tracing partial evaluation used dynamically remove interpreter overhead language implementations 2006 hotpathvm first tracing jit compiler high-level language developed vm capable dynamically identifying frequently executed bytecode instructions traced compiled machine code using static single assignment ssa construction motivation hotpathvm efficient jvm resource constrained mobile devices another example tracing jit tracemonkey one mozilla ’ javascript implementations firefox 2009 tracemonkey compiles frequently executed loop traces dynamic language javascript run-time specialize generated code actual dynamic types occurring path another project utilizes tracing jits pypy enables use tracing jits language implementations written pypy translation toolchain thus improving performance program executed using interpreter possible tracing interpreter instead program executed interpreter tracing jits also explored microsoft spur project common intermediate language cil spur generic tracer cil also used trace javascript implementation consider following python program computes sum squares successive whole numbers sum exceeds 100000 def square x 0 0 true trace program could look something like note function call codice_1 inlined trace statement turned codice_2
[ 1409, 5892, 7173, 4112, 10013, 1952, 8609, 5154, 7462, 10537, 814, 2620, 9152, 6478, 10703, 3413, 5078, 8280, 9432, 3553, 8037, 10470, 5872, 9714, 2808, 11644, 7421 ]
Test
6,478
9
Extended_basic_block:extended basic block computing extended basic block collection basic blocks code within program certain properties make highly amenable optimizations many compiler optimizations operate extended basic blocks extended basic block maximal collection basic blocks many local optimizations operate basic blocks easily extended operate extended basic blocks example common subexpression elimination removes duplicate expressions simplest form local optimization operating basic blocks
[ 7940, 6477, 3854 ]
None
6,479
1
Vectorwise:vectorwise actian vector formerly known vectorwise sql relational database management system designed high performance analytical database applications published record breaking results transaction processing performance council tpc-h benchmark database sizes 100 gb 300 gb 1 tb 3 tb non-clustered hardware vectorwise originated x100 research project carried within centrum wiskunde informatica cwi dutch national research institute mathematics computer science 2003 2008 spun start-up company 2008 acquired ingres corporation 2011 released commercial product june 2010 initially 64-bit linux platform later also windows starting 3.5 release april 2014 product name shortened vector june 2014 actian vortex announced clustered mpp version vector working hadoop storage hdfs actian vortex later renamed actian vector hadoop basic architecture design principles x100 engine vectorwise database well described two phd theses vectorwise founders marcin żukowski balancing vectorized query execution bandwidth-optimized storage sandor héman updating compressed column stores supervision another founder professor peter boncz x100 engine integrated ingres sql front-end making database operatable using ingres sql syntax ingres set client dba tools query execution architecture makes use vectorized query execution processing chunks cache-fitting vectors data allows involve principles vector processing single instruction multiple data simd perform operation multiple data simultaneously exploit data level parallelism modern hardware also reduces overheads found traditional row-at-a-time processing found rdbmses database storage compressed column-oriented format scan-optimised buffer manager actian vortex hdfs proprietary format used loading big amounts data supported direct appends stable storage small transactional updates supported patent-pending positional delta trees pdts specialized b-tree-like structures indexed differences top stable storage seamlessly patched scans transparently propagated stable storage background process method storing differences patch-like structures rewriting stable storage bulk made possible work filesystem like hdfs files append-only comparative transaction processing performance council tpc-h performance test monetdb carried original creator centrum wiskunde informatica cwi 2003 showed room improvement performance analytical database result cwi researchers proposed new architecture using pipelined query processing vectorised processing improve performance analytical queries led creation x100 project intention designing new kernel monetdb called monetdb/x100 x100 project team 2007 damon best paper award paper vectorized data processing cell broadband engine well 2008 damon best paper award paper dsm vs. nsm cpu performance tradeoffs block-oriented query processing august 2009 originators x100 project ten year best paper award 35th international conference large data bases vldb 1999 paper database architecture optimized new bottleneck memory access recognised vldb project team made great progress implementing ideas contained paper previous 10 years central premise paper traditional relational database systems designed late 1970s early 1980s time database performance dictated time required read write data hard disk time available cpu relatively slow main memory relatively small little data could loaded memory time time hardware improved cpu speed memory size doubling roughly every two years accordance moore ’ law design traditional relational database systems adapted cwi research team described improvements database code data structures make best use modern hardware 2008 x100 project spun monetdb separate project right renamed vectorwise co-founders included peter a. boncz marcin żukowski june 2010 vectorwise technology officially announced ingres corporation release ingres vectorwise 1.0 march 2011 vectorwise 1.5 released publishing record breaking result tpc-h 100 gb benchmark new features included parallel query execution single query executed multiple cpu cores improved bulk loading enhanced sql support june 2011 vectorwise 1.6 released publishing record breaking results tpc-h 100 gb 300 gb 1 tb non-clustered benchmark december 2011 vectorwise 2.0 released new sql support analytical functions rank percentile enhanced date time timestamp datatypes support disk spilling hash joins aggregation june 2012 vectorwise 2.5 released release storage format reorganized allow storing database multiple location background update propagation mechanism pdts stable storage enhanced allow rewriting changed blocks instead full rewrites new patented predictive buffer manager pbm introduced march 2013 vectorwise 3.0 released new features included efficient storage engine support data types analytical sql functions enhanced ddl features improved monitoring profiling accessibility march 2014 actian vector 3.5 released new rebranded shortened name new features included support partitioned tables improved disk spilling online backup capabilities improved sql support e.g codice_1 dml operations codice_2 codice_3 window aggregation functions march 2015 actian vector 4 released june 2014 hadoop summit 2014 san jose actian announced actian vortex clustered mpp version vector level sql support working hadoop storage directly hdfs actian vortex since released later renamed actian vector hadoop non-clustered actian vector releases also updated match actian vector hadoop 4 released december 2015 april 2019 actian avalanche released cloud option high-performance actian vector following releases available supported actian may 2019
[ 3, 9893, 7767, 9126, 9286, 5612, 10413, 10286, 6383, 1776, 7983, 10734, 823, 6780 ]
Test
6,480
7
Oracle_Clusterware:oracle clusterware oracle clusterware cross-platform cluster software required run real application clusters rac option oracle database provides basic clustering services operating-system level enable oracle database software run clustering mode earlier versions oracle release 9i earlier rac required vendor-supplied clusterware like sun cluster veritas cluster server except running linux microsoft windows oracle clusterware software enables nodes communicate allowing form cluster nodes behaves single logical server oracle clusterware run cluster ready services crs consisting two key components oracle cluster registry ocr records maintains cluster node membership information voting disk polls consistent heartbeat information nodes cluster running acts tiebreaker communication failures crs service four components handling variety functions cluster ready services daemon crsd oracle cluster synchronization service daemon ocssd event volume manager daemon evmd oracle process clusterware daemon oprocd failure death crs daemon cause node failure triggers automatic reboots nodes avoid corruption data due possible failure communication nodes also known fencing crs daemon runs root super user unix platforms runs service windows platforms following functions provided oracle cluster ready services daemon crsd oracle cluster synchronization services daemon ocssd provides basic ‘ group services ’ support group services distributed group membership system allows applications coordinate activities achieve common result provides synchronization services nodes access node membership information well enabling basic cluster services including cluster group services cluster locking also run without integration vendor clusterware failure ocssd causes machine reboot avoid split-brain situation also required single instance configuration automatic storage management asm used asm new feature oracle 10g ocssd runs oracle user following functions provided oracle cluster synchronization services daemon ocssd third component ocs event volume management logger daemon evmd evmd spawns permanent child process called evmlogger generates events evmd child process ‘ evmlogger ’ spawns new children processes demand scans callout directory invoke callouts restart automatically failures death evmd process halt instance evmd runs oracle user oprocd provides server fencing solution oracle clusterware process monitor oracle clusterware uses hang check timer watchdog timer depending implementation cluster integrity oprocd locked memory runs real time process sleeps fixed time runs root user failure oprocd process causes node restart oprocd important even monitored process called oclsomon causes cluster node reboot oprocd hung references 1.http //docs.oracle.com/cd/b28359_01/rac.111/b28255/intro.htm babcheee
[ 11136, 10340, 5612, 6797, 7983, 10640, 4149, 823, 700 ]
Test
6,481
4
Altor_Networks:altor networks altor networks inc. juniper networks company provider security virtual data centers clouds company developed world ’ first firewall purpose-built virtual networks software security appliance runs virtualized environment enforces security policy per-virtual-machine basis data center administrators could pinpoint broad range virtual network security comprises create roles-based security policies security policies could continuously enforced individual virtual machines vm even moved throughout virtualized data center headquartered redwood shores california united states altor founded 2007 security networking experts check point software cisco oracle corporation received funding accel partners dag ventures foundation capital juniper networks december 6 2010 juniper networks announced acquired altor networks computer virtualization use mainframe computers since ibm vm/370 platform release early 1970s vm technology became widely available release vmware workstation 1999 vmware server line 2001 estimated 50 workloads would running inside virtualized environments 2012 whenever virtualization technology includes hypervisor virtual network created within hypervisor layer transparently network virtual machines operating single virtualized environment virtual network provides benefits administrative responsibilities physical network addition new challenges founders altor networks became aware early adoption virtualization technologies data centers accelerating many years several problems virtual network security particular became apparent decided way address challenges provide solution operated entirely within virtualized environment purpose-built appliance provide firewalling security services directly inside virtual network without recourse external hardware firewalls intrusion detection appliances associated vlan rerouting virtual network physical network back altor released virtual network security analyzer vnsa tool monitor analyze virtual network traffic march 2008 followed altor vf 1.0 included vnsa module october 2008 integrated signature-based network intrusion detection incorporated altor vf 3.0 release september 2009 release altor v4.0 leverages virtual machine introspection bring visibility internal virtual machine states compliance assessment automated security enforcement ator networks offers virtual security appliance use within vmware esx ongoing efforts add support xen/citrix microsoft hyperv/viridian platforms 40,000 firewalls help please sans intrusion detection faqs intrusion protection detection within virtual environment
[ 8998, 9927, 6985, 6153, 939, 7217, 10291, 9655, 8668 ]
Validation
6,482
2
Event_monitoring:event monitoring computer science event monitoring process collecting analyzing signaling event occurrences subscribers operating system processes active database rules well human operators event occurrences may stem arbitrary sources software hardware operating systems database management systems application software processors event monitoring may use time series database event monitoring makes use logical bus transport event occurrences sources subscribers event sources signal event occurrences event subscribers event subscribers receive event occurrences event bus distributed set physical nodes standalone computer systems typical examples event buses found graphical systems x window system microsoft windows well development tools sdt event collection process collecting event occurrences filtered event log analysis filtered event log logged event occurrences meaningful use future implies event occurrences removed filtered event log useless future event log analysis process analyzing filtered event log aggregate event occurrences decide whether event occurrence signalled event signalling process signalling event occurrences event bus something monitored denoted monitored object example application operating system database hardware etc monitored objects monitored object must properly conditioned event sensors enable event monitoring object must instrumented event sensors monitored object event sensors sensors signal event occurrences whenever event occurs whenever something monitored probe effect must managed discussed gait object monitored behavior changed particular concurrent system processes run parallel poses particular problem reason whenever sensors introduced system processes may execute different order cause problem example trying localize fault monitoring system change behavior way fault may result failure essence fault masked monitoring system probe effect difference behavior monitored object un-instrumented counterpart according schütz avoid compensate ignore probe effect critical real-time system timeliness i.e. ability system meet time constraints deadlines significant avoidance option example instrument system testing remove instrumentation delivery invalidates results testing based complete system less critical real-time system e.g. media-based systems compensation acceptable example performance testing non-concurrent systems ignorance acceptable since behavior respect order execution left unchanged event log analysis known event composition active databases chronicle recognition artificial intelligence real-time logic evaluation real-time systems essentially event log analysis used pattern matching filtering event occurrences aggregation event occurrences composite event occurrences commonly dynamic programming strategies algorithms employed save results previous analyses future use since example pattern may match event occurrences several consecutive analysis processing contrast general rule processing employed assert new facts facts cf inference engine usually based backtracking techniques event log analysis algorithms commonly greedy example composite said occurred fact never revoked may done backtracking based algorithm several mechanisms proposed event log analysis finite state automata petri nets procedural either based imperative programming language object-oriented programming languages modification boyer–moore string search algorithm simple temporal networks
[ 4033, 4423, 6797, 11533, 7983, 2901, 1211 ]
Validation
6,483
7
IBM_Integration_Bus:ibm integration bus ibm app connect enterprise abbreviated ibm ace formerly known ibm integration bus websphere message broker ibm integration broker websphere product family allows business information flow disparate applications across multiple hardware software platforms rules applied data flowing message broker route transform information product enterprise service bus supplying communication channel applications services service-oriented architecture ibm ace provides capabilities build solutions needed support diverse integration requirements set connectors range data sources including packaged applications files mobile devices messaging systems databases benefit using ibm ace tool enables existing applications web services without costly legacy application rewrites ace avoids point-to-point strain development resources connecting application service multiple protocols including soap http jms modern secure authentication mechanisms including ability perform actions behalf masquerading delegate users mq http soap nodes supported ldap x-auth o-auth two-way ssl major focus ibm ace latest release capability product runtime fully hosted cloud hosting runtime cloud provides certain advantages potential cost savings compared hosting runtime premises simplifies maintenance application os-level patches sometimes disruptive business continuity also cloud hosting ibm ace runtime allows easy expansion capacity adding horsepower cpu configuration cloud environment adding additional nodes active-active configuration another advantage maintaining ace runtimes cloud ability configure access ace functionality separate apart internal network using datapower api connect devices allows people services public internet access enterprise service bus without passing internal network secure configuration esb deployed internal premises network ibm ace embeds common language runtime invoke .net logic part integration also includes full support visual studio development environment including integrated debugger code templates ibm integration bus includes comprehensive set patterns samples demonstrate bi-directional connectivity microsoft dynamics crm msmq several improvements made current release among ability configure runtime parameters using property file part deployed artifacts contained bar file previously way configure runtime parameters run mqsi command command line new way configuration referred policy document created new policy editor policy documents stored source code control system different policy exist different environments dev int qa prod ibm ace compatible several virtualization platforms right out-of-the-box docker prime example ace download global docker repository runtime ibm ace run locally ace administrative console built right runtime docker image active local configuration administration commands needed fully activate message flow deploy bar file fact construct message flows microservices package microservices docker deployable object directly message flows bar files contain policy files node configuration automatic little human intervention needed complete application deployment ibm represents following features key differentiators ibm ace product compared industry products provide services enterprise service bus ibm delivers iib software either traditional software install local premises premise ibm cloud private ibm administered cloud environment integration bus cloud environment reduces capital expenditures increases application hardware availability offloads skills managing integration bus environment ibm cloud engineers promotes ability end users focus developing solutions rather installing configuring managing iib software offering intended compatible on-premises product within constraints cloud environment users use development tooling cloud on-premises software assets generated deployed either originally product developed neon new era networks inc. company acquired sybase 2001 product later re-branded ibm product called 'mqseries integrator 'mqsi short versions mqsi ran version 2.0 product added websphere family re-branded 'websphere mq integrator version 2.1 2.1 version numbers became synchronized rest websphere family jumped version 5.0 name changed 'websphere business integration message broker wbimb version development environment redesigned using eclipse support web services integrated product since version 6.0 product known 'websphere message broker websphere message broker version 7.0 announced october 2009 websphere message broker version 8.0 announced october 2011 april 2013 ibm announced websphere message broker product undergoing another rebranding name change ibm integration bus version 9 includes new nodes decision service node enables content based routing based rules engine requires ibm websphere operational decision management product ibm websphere enterprise service bus product discontinued release ibm integration bus ibm offering transitional licenses move ibm integration bus websphere message broker transfer license websphere enterprise service bus enables customers exchange websphere enterprise service bus license entitlements websphere message broker license entitlements following license transfer entitlement use websphere enterprise service bus reduced cease reflects websphere enterprise service bus license entitlements relinquished exchange ibm announced impact 2013 wesb end-of-life five years feature development wesb product occur ibm integration bus consists following components soa developer defines message flows ibm integration toolkit including number message flow nodes represents set actions define processing step way message flow nodes joined together determine processing steps carried order conditions message flow includes input node provides source messages processed processed one ways optionally deliver one output nodes message received bit stream without representational structure format converted parser tree structure used internally message flow message delivered final destination converted back bit stream ibm integration bus supports wide variety data formats including standards-based formats xml dfdl json industry formats hl7 edi swift custom formats comprehensive range operations performed data including routing filtering enrichment multicast publish-subscribe sequencing aggregation flexible integration capabilities able support customer choice solution architecture including service-oriented event-oriented data-driven file-based batch real-time ibm integration bus unifies business process management grid providing workhorse behind something taking directions bpm tooling tells ibm integration bus ibm integration bus includes set performance monitoring tools visually portray current server throughput rates showing various metrics elapsed cpu time ways immediately draw attention performance bottlenecks spikes demand drill granular details rates individual connectors tools enable correlate performance information configuration changes quickly determine performance impact specific configuration changes version 7 earlier primary way general text binary messages modeled parsed container called message set associated 'mrm parser version 8 onwards messages modeled parsed using new open technology called dfdl open grid forum ibm strategic technology modeling parsing general text binary data mrm parser message sets remain fully supported part product order use message sets developer must enable disabled default encourage adoption dfdl technology ibm integration bus supports policy-driven traffic shaping enables greater visibility system administrators operational control workload traffic shaping enables system administrators meet demands quantity new endpoints mobile cloud applications exponentially increases adjusting available system resources meet new demand delay redirect traffic cope load spikes traffic monitoring enables notifications system administrators business stakeholders increases business awareness enables trend discovery ibm integration bus reduces cost complexity systems unifying method company uses implement interfaces disparate systems integration node runtime forms enterprise service bus service-oriented architecture efficiently increasing flexibility connecting unlike systems unified homogeneous architecture key feature ibm integration bus ability abstract business logic away transport protocol specifics ibm integration bus toolkit enables developers graphically design mediations known message flows related artifacts developed resources packaged broker archive bar file deployed integration node runtime environment point integration node able continually process messages according logic described message flow wide variety data formats supported may modeled using standard xml schema dfdl schema modeling developer create transformations various formats using nodes supplied toolkit either graphically using mapping node programmatically using compute node using java esql .net ibm integration bus message flows used service-oriented architecture properly designed middleware analysts integrated event-driven soa schemas sometimes referred soa 2.0 businesses rely processing events might part business process issuing trade order purchasing insurance policy reading data using sensor monitoring information gathered infrastructure performance websphere message broker includes rich complex-event-processing capabilities enable analysis events perform validation enrichment transformation intelligent routing messages based set business rules developer creates message flows cyclical workflow probably agile software development developers create message flow generate bar file deploy message flow contained bar file test message flow repeat necessary achieve reliable functionality based earnings reported ibm 1q13 annualized revenue ibm middleware software unit increased 14 billion 7 billion 2011 license maintenance revenue ibm middleware products reached 7 billion 2011 2012 ibm expected increase market share total market increase ten percent worldwide application infrastructure middleware software market grew 9.9 percent 2011 19.4 billion according gartner gartner reported ibm continues number one growing key areas including enterprise service bus suites message oriented middleware market transaction processing monitor market integration appliances ibm publishes performance reports websphere message broker provide sample throughput figures performance varies depending message sizes message volumes processing complexity complexity message transformations system capacities cpu memory network etc software version patch levels configuration settings factors published tests demonstrate message rates excess 10,000 per second particular configurations version 8 onwards new global cache feature enhances overall performance capability throughput rates cache rides top ibm websphere extremescale bundled ibm integration bus dedicated message flow node available use message flows access cache achieved compute nodes languages like java esql .net developer choose many pre-designed message flow 'nodes used build message flow nodes different purposes nodes map data one format another instance cobol copybook canonical xml nodes evaluate content data route flow differently based certain criteria many types node used developing message flows following node transformation technology options available ibm integration bus distributed systems localized following cultures pattern captures commonly recurring solution problem example request-reply pattern specification pattern describes problem addressed problem important constraints solution patterns typically emerge common usage application particular product technology pattern used generate customized solutions recurring problem efficient way pattern recognition development process called service-oriented modeling version 7 introduced patterns patterns cover range categories including file processing application integration message based integration currently available platforms ibm integration bus
[ 4107, 6797, 5523, 1304, 10020, 10236, 5677, 7983, 1076, 823, 8122, 11339, 3927, 2910, 479, 863, 4194, 3558, 5356, 5612, 499, 8700, 10486, 1399, 2168, 6522, 3323, 8188 ]
Test
6,484
4
Rootpipe:rootpipe rootpipe security vulnerability found versions os x allows privilege escalation whereby user administrative rights program executed administrative user obtain superuser root access considered problematic first user account created os x furnished administrator rights default leveraging security vulnerabilities system unpatched web browser rootpipe could used attacker help gain complete control operating system emil kvarnhammar truesec security firm credited discovery says found vulnerability several days binary analysis recommends creating account without administrative privileges used normal everyday work using filevault older exploit issue later published exploit-db suggesting issue dates back june 2010 appears exploit used author presentation trusteer rapport 44con 2011 vulnerability reported apple inc. october 2014 reported present os x versions 10.7.5 10.8.2 10.9.5 10.10.2 os x 10.10.3 officially designated patched apple kvarnhammar crediting patrick wardle blogged vulnerability still present version 1 july 2015 kvarnhammer noted additional restrictions introduced os x 10.10.4 adding comment two days later believed then-current versions os x 10.9 security update 2015-005 10.10 safe exploit november 2017 similar vulnerability revealed allowed logging root password
[ 1024, 8320, 3843, 5636, 5764, 10502, 2187, 4240, 11152, 10003, 10132, 4117, 8726, 535, 1688, 2717, 9375, 1440, 5024, 9761, 4644, 4133, 5028, 11175, 297, 2857, 5547, 8489, 11052, 9518, 9904, 7601, 1970, 9395, 5172, 8886, 1337, 441, 1979, 7...
Test
6,485
3
Hudson_Soft_HuC6280:hudson soft huc6280 huc6280 8-bit microprocessor japanese company hudson soft improved version wdc 65c02 cpu upgraded cmos version popular nmos-based mos technology 6502 8-bit cpu manufactured hudson seiko epson notable product using huc6280 nec turbografx-16 video game console huc6280 contains 65c02 core several additional instructions internal peripheral functions interrupt controller memory management unit timer 8-bit parallel i/o port programmable sound generator psg processor operates two speeds 1.79 mhz 7.16 mhz huc6280 64 kb logical address space 2 mb physical address space access entire memory space huc6280 uses mmu memory management unit splits memory space segments 8 kb logical address space split follows logical 8 kb segment page associated 8-bit register mpr0-7 contains index 8 kb segment bank physical memory map page two special instructions used access registers tami transfer content accumulator mpr register 0-7 tmai transfer mpr register accumulator programmable sound generator psg provides 6 sound channels conveniently paired according functionality provide waveform playback common allows 32 byte 5 bit unsigned linear sample played back selected frequencies frequency modulation takes one step allowing playback frequency dynamically adjusted according specified pattern white noise used simulate percussion instruments effects explosions means pseudo-random square wave alternatively channel individually switched direct d/a mode programmer send data directly sound mixer allowing complex sound patterns generated speech inevitably requires programming effort cpu time
[ 11395, 10767, 5400, 664, 10784, 4385, 7589, 5933, 11054, 3010, 3157, 10969, 5862, 10351, 1776, 5617, 7281, 7282, 7284 ]
Test