node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
6,486 | 2 | Wii_U_system_software:wii u system software wii u system software official firmware version operating system nintendo wii u home video game console nintendo maintains wii u systemwide features applications offering system software updates via internet updates optional console owner may required order retain interoperability nintendo online services update cumulative including changes previous updates system official integrated development environment named multi published embedded software engineering vendor green hills software intended use nintendo licensed developers programming wii u details operating system internal architecture officially publicized wii u menu main dashboard system acting application organizer launcher graphical shell similar wii wii menu nintendo 3ds home menu allows launching software stored wii u optical discs applications installed internal memory external storage device wii titles system wii mode warawara plaza displayed tv screen wii u gamepad screen displays application icons available launch two screens display roles swapped press button like original wii discs also hot-swapped menu wii u menu may also used launch applications entirely beyond gaming miiverse social network integrated games applications internet browser world wide web play media netflix amazon video hulu youtube download wii u software content nintendo eshop receive official notifications nintendo system settings parental controls activity log also launched menu wii u menu directly integrated miiverse nintendo network wii u powers television screen shows warawara plaza user status comments miiverse shown user represented respective mii associated miiverse community users could save mii warawara plaza personal library like posts yeah write comment send friend request since miiverse discontinued warawara plaza shows built-in tips nintendo home menu stylized home menu accessed game application user pressing home button wii u gamepad wii u pro controller wii remote home menu allows user launch certain multitasking applications miiverse nintendo tvii nintendo eshop internet browser game application running also displays various information date time wireless signal status controller battery life controller settings current downloads also managed download manager downloads installs games applications respective updates well downloading system updates background nintendo eshop nintendo online digital distribution service serving wii u nintendo switch nintendo 3ds handheld console eshop provides downloadable wii u software titles retail download wii games virtual console games trial versions demos various applications also allows users purchase downloadable content dlc automatically download patches physical downloadable games content obtained nintendo eshop attached nintendo network id used one system wii u allows background downloading via spotpass either playing game application sleep mode ten downloads queued time status checked download manager application pop-up notification appear home menu section notify user download finished unlike past nintendo digital stores wii shop channel nintendo dsi shop used nintendo points currency nintendo eshop uses user local currency using digital wallet system whereby funds added debited wallet user add funds wallet number ways either credit debit card purchasing nintendo eshop cards also possible purchase download codes select retailers later redeem eshop july 22 2014 japanese nintendo eshop updated support digital money cards add funds user account digital wallet via near field communication nfc wii u gamepad cards embedded ic chips typically used buy train bus tickets well make purchases convenience stores nintendo eshop supports user software reviews users submit review stars ranging one five representing quality crescent order also possible categorize software whether suitable hardcore casual players reviews submitted software review used least one hour miiverse portmanteau mii universe integrated social networking service allowed players interact share experiences mii characters miiverse allowed users seamlessly share accomplishments comments hand written game screenshots notes users select games integrated miiverse social interactions could also occur within game miiverse moderated software filtering well human resource team order ensure content shared users appropriate spoilers shared order facilitate stated comments posted could take 30 minutes appear miiverse april 25 2013 miiverse also became available web browsers internet-enabled smartphone tablet pc devices later became available nintendo 3ds december 2013 discontinued november 8 2017 internet browser allows users browse web wii u gamepad and/or television screen functions multitasking application wii u used another game application suspended background browser primarily controlled using wii u gamepad touchscreen analog stick scroll web pages d-pad cycle links page similar using keyboard play html 5 video audio websites youtube various social media user choose hide browser view tv screen privacy contains presentation effects opening stage curtains user also choose google yahoo search engines text wrap option automatically wrap text width screen different zoom levels users also create bookmarks user set personal bookmarks browser supports six tabs simultaneously 32 pages stored browser history older items start replaced nintendo tvii free television-based service allowed users find programs netflix hulu plus amazon video cable network nintendo tvii also allowed users control tivo dvr wii u users able select source program wanted watch watch television wii u gamepad default gamepad screen showed information show currently watched information included reviews screenshots cast lists trailers general information show provided english wikipedia imdb rotten tomatoes well individual source services nintendo tvii also dedicated sports section user could view player positions highlights match updated real-time user personalized settings nintendo tvii favorite shows sports teams personal mii social network account integration users could interact friends community sharing commenting reactions live moments current show social networks miiverse facebook twitter gamepad show played television screen nintendo tvii made available wii u release japan december 8 2012 released north america december 20 2012 scheduled released europe sometime 2013 never fulfilled nintendo uk later issued apology stated expect announcements near future however february 14 2015 nintendo europe officially confirmed cancelled plans service release european countries due extremely complex nature localising multiple television services across diverse range countries varied licensing systems nintendo worked youtube lovefilm nico nico douga ynn bring streaming movie television content wii u. nintendo initially delayed deployment media capabilities wii u delayed online infrastructure late launch day firmware update deployed netflix app access hulu plus amazon video youtube apps gradually became active later launch week december 25 2014 without prior notice crunchyroll launched eponymous app north american wii u eshop later released pal systems january 8 2015 initially despite free download content crunchyroll app accessible premium account users since fixed allow access crunchyroll members long delay without prior notice may 28 2015 users access nintendo eshop united kingdom download bbc iplayer app december 17 2015 also without prior notice music streaming app napster released wii u eligible european countries app later released united states march 11 2016 rhapsody name wii u chat nintendo online video chat solution powered nintendo network service allows users use wii u gamepad front-facing camera video chat registered friends video chatting wii u gamepad essentially needed since application compatible off-tv play users could draw pictures gamepad top video chat display game another application already running gamepad home button ring flash indicating incoming call wii street u built-in map application developed nintendo google wii u nintendo direct satoru iwata revealed google maps integrated panorama feature wii u player could choose place around globe look use street view feature use wii u gamepad application available wii u eshop free download october 31 2013 became paid app nintendo discontinued app march 31 2016 wii karaoke u built-in karaoke app developed nintendo joysound wii u licenses joysound online song library japanese karaoke service provider xing game use wii u gamepad microphone universal usb microphone connected wii u console game requires internet connection players access new songs download buying tickets songs nintendo eshop players rent songs want sing limited period 24 hours 90 days joysounds song library choosing stage perform players able select mii characters represent players also able adjust options echo key speed song players use wii remotes accompany singer playing instruments cymbals maracas game includes lesson mode trains quizzes players tone rhythm released free app titled wii karaoke u joysound nintendo eshop europe october 4 2013 wii u wii mode fully virtualized wii system limitations privileges thereof wii game disc inserted wii u appropriate launchable icon appears wii u menu alternatively wii u may powered holding b button either method effectively relaunch wii u entirely become virtual wii system relaunched wii u mode native wii system wii mode internal storage memory limited 512 mb sd card menu utilize card 32 gb size slight differences wii u wii mode native wii system data management settings accessible wii system settings wii shop channel fully available purchase wii software however netflix hulu plus youtube applications used system must relaunched wii u mode order utilize native versions applications addition running one primary game application wii u capable simultaneously opening select system applications primary application launched wii u menu user push home button temporarily suspend application one following applications may launched may possibly interoperate primary application screenshots game scores wii u launched system software either version 1.0.1 1.0.2 update released day added web browser miiverse method transferring data wii sandboxed way owners play wii games gamecube games although play gamecube games using homebrew april 25 2013 major new update version 3.0 improved system loading times added automatic installation downloaded software version 4.0 released september 30 2013 added features ability plug headset directly gamepad wii u chat ability take screenshots upload web browser gameplay supports usb keyboards surround sound wii games june 2 2014 another major update version number 5.0 released added abilities display quick start menu wii u gamepad alerts addition changes version immediately followed 5.1.0 added support wii u wii u system transfer gaming platforms nintendo gaming platforms generation gaming platforms seventh generation | [
10761,
4364,
1148,
7325,
1067,
684,
4908,
7983,
1083,
2761,
9033,
6486,
9691,
1501,
7519,
607,
4972,
8316,
119,
1916,
8829
] | None |
6,487 | 2 | LINX_(IPC):linx ipc linx new generation ose link handler inter-process communications ipc provides high performance robust functionality developed enea ab sweden linx released free open-source software subject requirements gnu general public license gpl version 2 linx ported later linux works success ose linux kernels possible interconnect linux machine ose one direct communication path processes run different kernels utilizing direct message passing linx scales dsps microcontrollers 64-bit cpus linx independent underlying processor operating system interconnect supports control data plane applications reliable unreliable media linx also supports distributed system topology single processor single blade large networks complex cluster topologies deployed hundreds processors multi-rack system linx enable application processes distributed across multiple operating systems cpus interconnects communicate running cpu operating system linx provides services application regardless hardware operating system physical interconnect network topology linx utilizes innovative address map connections greatly enhances flexibility scalability unlike ipc models must maintain entire system address map every node system linx nodes store addresses needed active connections | [
2432,
5029,
6694,
4589,
2222,
7983,
1586,
8499,
2804,
10486,
6555,
5471
] | None |
6,488 | 4 | Direct_kernel_object_manipulation:direct kernel object manipulation direct kernel object manipulation dkom common rootkit technique microsoft windows hide potentially damaging third-party processes drivers files intermediate connections task manager event scheduler core rootkit employs dkom hides object manager task manager modifying linked list containing list active threads processes type rootkit essentially hide traces object manager wrapping pointer away rootkit possible due fact kernel modules loadable drivers direct access kernel memory privileged access system kernel pings find list processes running system relies eprocess find however windows kernel thread based process based pointers freely modified without unintended effects modifying linked list pointers wrap around rootkit process rootkit becomes invisible windows event viewer system integrity applications rely list allows dkom rootkits free rein targeted system dkom uses process represented object interconnected one another operating system within process pre-allocated set space contains address current next mutex_locked thread vital information listed eprocess memory section object manager contains double linked list known processes running also known eprocess however dkom take advantage structure modifying front link flink point previous node processor want hide pointing back link blink hidden processor previous structure modifying subsection eprocess block list currently active processes points around hidden process essentially hides paper trail given process injector scrutiny scheduler process hidden yet runs indefinitely thread active due round-robin policy main issue type rootkit hidden processes still able run despite various context switches windows scheduler threads segregated perform tasks processes rather thread calls multiple processes given time frame process controlled round-robin nature scheduler threads put idle allow threads active even though process becomes invisible task manager process still runs concurrently system threads active makes detecting hidden processes created rootkit extremely difficult detecting rootkits separated many complex layers include integrity checking behavioral detection checking cpu usage ongoing outgoing network traffic signatures drivers simple anti-virus tools detect common rootkits however case kernel type rootkit types rootkits hide system table event viewer detecting requires looking hooked functions difficult implement also requires iterating every node eprocess however even though presence malicious processes physically present handler calls made background processes point threads network connections points processes drivers point threads dkom rootkit viable hide presence every single reference eprocess means rootkit routinely update linkers point away iterating every entity scheduler threads object headers etc detecting dkom rootkit possible certain memory patterns behaviors may appear scheduler one found actual rootkit eventually found well | [
11584,
9791,
6797,
4423
] | Test |
6,489 | 2 | Dave_Sifry:dave sifry dave sifry american software entrepreneur blogosphere icon known founding technorati 2004 formerly leading blog search engine also lectures widely wireless technology policy weblogs open source software sifry grew long island learned program commodore pet teens decided someday would move silicon valley start company studying computer science johns hopkins university worked mitsubishi sifry cofounded sputnik wi-fi gateway company linuxcare offbeat guides founding member board linux international technical advisor national cybercrime training partnership law enforcement dave worked business developer mozilla/mozillamessaging trying bring partners mozilla thunderbird david married noriko two kids melody noah | [
1026,
5644,
4367,
8848,
657,
10642,
1939,
2581,
3478,
6808,
7450,
11418,
6302,
7584,
802,
5410,
6691,
6947,
8354,
3369,
5931,
8364,
1717,
823,
2109,
11069,
10687,
10822,
8263,
843,
589,
6352,
4177,
11602,
8787,
4437,
3802,
4831,
9696,
112... | None |
6,490 | 4 | UT-VPN:ut-vpn university tsukuba virtual private network ut-vpn free open source software application implements virtual private network vpn techniques creating secure point-to-point site-to-site connections routed bridged configurations remote access facilities uses ssl/tls security encryption capable traversing network address translators nats firewalls written daiyuu nobori softether corporation published gnu general public license gpl university tsukuba ut-vpn compatible packetix vpn product softether corporation ut-vpn developed based packetix vpn functions deleted example radius client supported packetix vpn server supported ut-vpn server ut-vpn uses openssl library provide encryption packets ut-vpn offers username/password-based authentication ut-vpn software consist ut-vpn server ut-vpn client ut-vpn functions l2-vpn ssl/tls 'virtual nic virtual network interface card installed os ut-vpn client installed virtual nic recognized physical nic os ut-vpn encapsulation tcp ssl/tls packets l2 frames virtual nic ut-vpn client connects ut-vpn server authorization ut-vpn server succeeded ut-vpn client establishes connection virtual hub ut-vpn server 'virtual hub function virtual l2 switch virtual hub handle frames received ut-vpn client necessary ut-vpn server forwards encapuslated l2 frames ut-vpn client virtual hub ut-vpn server function cascading connection virtual hub ut-vpn server site-to-site connection come true cascading connection ut-vpn server bridging function arbitrary nic os virtual hub ut-vpn server virtual l3 switch function virtual l3 switch l3-switching virtual hub ut-vpn server primary method community support softether mailing lists | [
6797,
9722,
8211,
11162,
3742,
9764,
8998,
4268,
3629,
7983,
10417,
7859,
2228,
3777,
2884,
8265,
11468,
7376,
2136,
6364,
5084,
10210,
9318,
8039,
5612,
11248,
5749,
3322
] | None |
6,491 | 2 | DesktopBSD:desktopbsd desktopbsd unix-derivative desktop-oriented operating system based freebsd goal combine stability freebsd ease-of-use k desktop environment 3 default graphical user interface desktopbsd essentially customized installation freebsd fork freebsd desktopbsd always based freebsd latest stable branch incorporates certain customized pre-installed software kde desktopbsd utilities configuration files common misconception desktopbsd intended rival trueos bsd-based desktop distribution since similar structure goals however desktopbsd project started approximately one year pc-bsd project despite fact first pc-bsd release came desktopbsd neither desktopbsd pc-bsd projects intend rival completely independent projects distinctive features intended outcomes example desktopbsd uses ports packages additional software installation whereas pc-bsd introduced pbis current release 1.7 made available september 7 2009 release announcement stated last final release desktopbsd project lead developer could longer contribute time required maintain may 2010 development desktopbsd restarted new leadership development announcements stopped soon afterwards leading speculation project dropped however 10 march 2013 forum post appeared announcing project process revived roadmap desktopbsd 2.0 announced september 2015 desktopbsd site along posted screenshots gnome3-based desktop 1.7 release includes 7 september 2009 desktopbsd 1.7 made available project site | [
7552,
7425,
2180,
1927,
1801,
10761,
274,
5397,
8725,
9625,
1946,
4636,
2212,
6438,
10535,
684,
4908,
1071,
3248,
7983,
9009,
11698,
11573,
1718,
9784,
1465,
5177,
5819,
7483,
3006,
11459,
9927,
8266,
5067,
8395,
8909,
5710,
6864,
7249,
8... | Validation |
6,492 | 4 | Sender_Rewriting_Scheme:sender rewriting scheme mail transfer agent mta sender rewriting scheme srs scheme rewriting envelope sender address email message view remailing context remailing kind email forwarding srs devised order forward email without breaking sender policy framework spf 2003 number cases including change email address mailing lists mta accepts email message destined local mailbox needs forwarded cases question arises deserves receive related bounce message general either author person entity administers forwarding sending bounces author administratively simpler used accomplished keeping original envelope sender however author address subject strict spf policy target mta happens enforce forwarding transaction rejected workaround possible synthesize fly temporary bounce address direct bounce back current mta scheme provides recovering original envelope address bounce arrive forwarded along reverse path—with empty envelope sender time workarounds srs fairly general one notion reversing path resembles original routing dispositions email see srs form variable envelope return path verp inasmuch encodes original envelope sender local part rewritten address consider forwarding message originally destined new address example adapted shevek respect verp local part moved domain name adding prefix hash timestamp reflects operational difference eventual bounces back verp address handled within rewriting domain forged messages unsubscribe users kind abuse n't seen significant exploits last decades instead srs aims remailing possible bounce back alice forged bounces become alluring technique injecting spam apparently originating rewriting sender srs provides another prefix used rewriting already rewritten address multi-hop scenario forward message turn spare adding another timestamp repeating original local part new forwarder adds hash domain name preceding forwarder using database definitely control growth rewritten addresses since sufficient put unique key rewritten local part also allows certain amount anonymity resending process desired however database requires centralization single point failure another possibility store long rewritten address somewhere message header var|i tag dkim-signature may good place choice considerably improves security technique observed unless backup mechanism work bounce message standard format historically mail transfer agents mtas added host name reverse path simple mail transfer protocol smtp reverse path also known paths also used outside smtp e.g bang paths uucp usenet netnews news articles still contain header example information rfc 5321 e-mail envelope smtp info like would 1st step reflects sender 2nd step next mta etc example let assume 2nd mta forwards mail 3rd mta finally delivered final mta also known mail delivery agent mda putting mail mailbox recipient mda transforms reverse path known header field smtp uses mx records forward routing explicit source routes ... ... route mail via mta mda cumbersome make things worse sometimes new 1982 style addresses mixed old uucp bang paths constructs like ... ... various kludges smtp mx records made essentially useless therefore source routing deprecated 1989 rfc 1123 one special case rfc 1123 gateways networks like uucp netnews first sending mta reach final receiver directly tcp solved mx records necessary rewriting foreign addresses gateway mx acronym mail exchanger another special case mailing lists list server rewrites reverse paths error handling address bounces error messages recipients list server could automatically unsubscribe bouncing recipients type address rewriting known since rfc 821 still used today rfc 5321 well rfc 2821 updated smtp chapter rfc 1123 last least forwarding another address always worked rewriting address forward path also known forwarding mta accepted responsibility forwarding mail returning potential bounce messages sender rfc 821 later smtp specifications offer two result codes situation privacy reasons result codes today rarely used include meaning effect forwarding third parties identical respectively noted rfc 1123 deprecated source routing implicitly also deprecated reverse routing bounces relatively small internet back 1989 mail admins postmasters often knew fixed problems fly routing bounce messages back via forwarders waste time bandwidth mta noting problem e.g rejection 5xx error code could send error message directly back mx sender since rfc 1123 forwarders third parties still rewrote address kept side effect mtas wishing accept mail forwarders generally accept address decade later spammers started abuse flaw post-1123 smtp today mails spam reverse paths forged note spammers typically forge working reverse paths many mtas reject mail callback verification plausibility checks fail reverse path rfc 5321 well rfc 2821 states non-delivery reports bounces must sent originator indicated reverse path mta accepted responsibility delivery however bounce message may suppressed original content hostile cf spam virus mail message forged rfc 5321 section 6 note current forgery detection methods require mailbox owner supply information work failing supply criteria make bounce message classifiable backscatter although people mistakenly think open relays forwarders unlucky position regards issue generally ca n't guarantee address indicates originator also ca n't guarantee final delivery succeed smtp problem caused side effect rfc 1123 addressed spf executive summary spf breaks forwarding actually case asks receivers check spf border mta later receivers arrange forwarding way works spf essence three strategies sender rewriting scheme srs one way third strategy | [
3549,
8260,
10924,
8337,
7764,
6261,
3350,
9909,
10906,
3645
] | None |
6,493 | 8 | CL-HTTP:cl-http cl-http web server client proxy written common lisp based web application framework written john c. mallery 10 days starting 1994 symbolics lisp machine year port macintosh common lisp done 1996 cl-http became first web server support http 1.1 protocol runs unix linux bsd variants mac os x solaris symbolics genera microsoft windows cl-http makes extensive use common lisp object system macro capabilities lisp cl-http used several applications elm-art tutoring system written common lisp using cl-http later commercialized netcoach interbook early adaptive electronic textbook also written top cl-http cl-http used early tool create web interfaces applications 1994 cl-http used w3c members ietf http working group develop reference clients servers http 1.1 prominently cl-http used presidency bill clinton web server white house publications web site distributed daily press releases official publications clinton administration cl-http used example non-trivial lisp application | [
1920,
4865,
2438,
3462,
8582,
9865,
6797,
2062,
9614,
2576,
148,
1812,
9877,
4122,
6941,
9245,
10526,
8739,
3876,
1448,
4777,
9128,
4779,
5165,
7983,
4529,
7987,
692,
8883,
823,
5048,
6201,
6074,
6969,
7867,
4797,
190,
8258,
8771,
8644,
... | Test |
6,494 | 4 | Data_remanence:data remanence data remanence residual representation digital data remains even attempts made remove erase data residue may result data left intact nominal file deletion operation reformatting storage media remove data previously written media physical properties storage media allow previously written data recovered data remanence may make inadvertent disclosure sensitive information possible storage media released uncontrolled environment e.g thrown trash lost various techniques developed counter data remanence techniques classified clearing purging/sanitizing destruction specific methods include overwriting degaussing encryption media destruction effective application countermeasures complicated several factors including media inaccessible media effectively erased advanced storage systems maintain histories data throughout data life cycle persistence data memory typically considered volatile several standards exist secure removal data elimination data remanence many operating systems file managers software provide facility file immediately deleted user requests action instead file moved holding area making easy user undo mistake similarly many software products automatically create backup copies files edited allow user restore original version recover possible crash autosave feature even explicit deleted file retention facility provided user use operating systems actually remove contents file deleted unless aware explicit erasure commands required like solid-state drive cases operating system issue serial ata trim command scsi unmap command let drive know longer maintain deleted data instead simply remove file entry file system directory requires less work therefore faster contents file—the actual data—remain storage medium data remain operating system reuses space new data systems enough filesystem metadata also left behind enable easy undeletion commonly available utility software even undelete become impossible data overwritten read software reads disk sectors directly computer forensics often employs software likewise reformatting repartitioning reimaging system unlikely write every area disk though cause disk appear empty case reimaging empty except files present image software finally even storage media overwritten physical properties media may permit recovery previous contents cases however recovery possible reading storage device usual way requires using laboratory techniques disassembling device directly accessing/reading components section complications gives explanations causes data remanence three levels commonly recognized eliminating remnant data clearing removal sensitive data storage devices way assurance data may reconstructed using normal system functions software file/data recovery utilities data may still recoverable without special laboratory techniques clearing typically administrative protection accidental disclosure within organization example hard drive re-used within organization contents may cleared prevent accidental disclosure next user purging sanitizing removal sensitive data system storage device intent data reconstructed known technique purging proportional sensitivity data generally done releasing media beyond control discarding old media moving media computer different security requirements storage media made unusable conventional equipment effectiveness destroying media varies medium method depending recording density media and/or destruction technique may leave data recoverable laboratory methods conversely destruction using appropriate techniques secure method preventing retrieval common method used counter data remanence overwrite storage media new data often called wiping shredding file disk analogy common methods destroying print media although mechanism bears similarity method often implemented software alone may able selectively target part media popular low-cost option applications overwriting generally acceptable method clearing long media writable damaged simplest overwrite technique writes data everywhere—often pattern zeros minimum prevent data retrieved simply reading media using standard system functions attempt counter advanced data recovery techniques specific overwrite patterns multiple passes often prescribed may generic patterns intended eradicate trace signatures example seven-pass pattern 0xf6 0x00 0xff random 0x00 0xff random sometimes erroneously attributed us standard dod 5220.22-m. one challenge overwrite areas disk may inaccessible due media degradation errors software overwrite may also problematic high-security environments require stronger controls data commingling provided software use use advanced storage technologies may also make file-based overwrite ineffective see discussion complications specialized machines software capable overwriting software sometimes standalone operating system specifically designed data destruction also machines specifically designed wipe hard drives department defense specifications dod 5220.22-m. peter gutmann investigated data recovery nominally overwritten media mid-1990s suggested magnetic force microscopy may able recover data developed specific patterns specific drive technologies designed counter patterns come known gutmann method daniel feenberg economist private national bureau economic research claims chances overwritten data recovered modern hard drive amount urban legend also points -minute gap rose mary woods created tape richard nixon discussing watergate break-in erased information gap recovered feenberg claims would easy task compared recovery modern high density digital signal november 2007 united states department defense considers overwriting acceptable clearing magnetic media within security area/zone sanitization method degaussing physical destruction acceptable latter hand according 2014 nist special publication 800-88 rev 1 p. 7 storage devices containing magnetic media single overwrite pass fixed pattern binary zeros typically hinders recovery data even state art laboratory techniques applied attempt retrieve data analysis wright et al recovery techniques including magnetic force microscopy also concludes single wipe required modern drives point long time required multiple wipes created situation many organisations ignore issue together – resulting data leaks loss degaussing removal reduction magnetic field disk drive using device called degausser designed media erased applied magnetic media degaussing may purge entire media element quickly effectively degaussing often renders hard disks inoperable erases low-level formatting done factory manufacturing cases possible return drive functional state serviced manufacturer however modern degaussers use strong magnetic pulse motor spins platters may destroyed degaussing process servicing may cost-effective degaussed computer tape dlt generally reformatted reused standard consumer hardware high-security environments one may required use degausser approved task example us government military jurisdictions one may required use degausser nsa evaluated products list encrypting data stored media may mitigate concerns data remanence decryption key strong carefully controlled may effectively make data media unrecoverable even key stored media may prove easier quicker overwrite key vs entire disk process called crypto-shredding encryption may done file-by-file basis whole disk cold boot attacks one possible methods subverting full-disk encryption method possibility storing plain text key unencrypted section medium see section complications data ram discussion side-channel attacks keyloggers acquisition written note containing decryption key rubber-hose cryptanalysis may offer greater chance success rely weaknesses cryptographic method employed relevance article minor thorough destruction underlying storage media certain way counter data remanence however process generally time-consuming cumbersome may require extremely thorough methods even small fragment media may contain large amounts data specific destruction techniques include storage media may areas become inaccessible normal means example magnetic disks may develop new bad sectors data written tapes require inter-record gaps modern hard disks often feature reallocation marginal sectors tracks automated way operating system would need work problem especially significant solid state drives ssds rely relatively large relocated bad block tables attempts counter data remanence overwriting may successful situations data remnants may persist nominally inaccessible areas data storage systems sophisticated features may make overwrite ineffective especially per-file basis example journaling file systems increase integrity data recording write operations multiple locations applying transaction-like semantics systems data remnants may exist locations outside nominal file storage location file systems also implement copy-on-write built-in revision control intent writing file never overwrites data in-place furthermore technologies raid anti-fragmentation techniques may result file data written multiple locations either design fault tolerance data remnants wear leveling also defeat data erasure relocating blocks time originally written time overwritten reason security protocols tailored operating systems software featuring automatic wear leveling recommend conducting free-space wipe given drive copying many small easily identifiable junk files files containing nonsensitive data fill much drive possible leaving amount free space necessary satisfactory operation system hardware software storage and/or system demands grow junk data files deleted necessary free space even deletion junk data files secure initial nonsensitivity reduces near zero consequences recovery data remanent optical media magnetic erased conventional degaussing write-once optical media cd-r dvd-r etc also purged overwriting rewritable optical media cd-rw dvd-rw may receptive overwriting methods successfully sanitizing optical discs include delaminating abrading metallic data layer shredding incinerating destructive electrical arcing exposure microwave energy submersion polycarbonate solvent e.g. acetone research center magnetic recording research university california san diego uncovered problems inherent erasing data stored solid-state drives ssds researchers discovered three problems file storage ssds solid-state drives flash-based differ hard-disk drives two ways first way data stored second way algorithms used manage access data differences exploited recover previously erased data ssds maintain layer indirection logical addresses used computer systems access data internal addresses identify physical storage layer indirection hides idiosyncratic media interfaces enhances ssd performance reliability lifespan see wear leveling also produce copies data invisible user sophisticated attacker could recover sanitizing entire disks sanitize commands built ssd hardware found effective implemented correctly software-only techniques sanitizing entire disks found work time testing none software techniques effective sanitizing individual files included well-known algorithms gutmann method us dod 5220.22-m rcmp tssit ops-ii schneier 7 pass mac os x secure erase trash trim feature many ssd devices properly implemented eventually erase data deleted process take time typically several minutes many older operating systems support feature combinations drives operating systems work data remanence observed static random-access memory sram typically considered volatile i.e contents degrade loss external power one study data retention observed even room temperature data remanence also observed dynamic random-access memory dram modern dram chips built-in self-refresh module require power supply retain data must also periodically refreshed prevent data contents fading away capacitors integrated circuits study found data remanence dram data retention seconds minutes room temperature full week without refresh cooled liquid nitrogen study authors able use cold boot attack recover cryptographic keys several popular full disk encryption systems including microsoft bitlocker apple filevault dm-crypt linux truecrypt despite memory degradation authors described study able take advantage redundancy way keys stored expanded efficient use key scheduling authors recommend computers powered rather left sleep state physical control owner cases certain modes software program bitlocker authors recommend boot password key removable usb device used tresor kernel patch linux specifically intended prevent cold boot attacks ram ensuring encryption keys neither user accessible stored ram | [
2432,
3841,
5120,
3972,
5256,
5142,
5658,
7579,
9499,
5661,
9762,
4389,
6309,
8997,
9129,
3629,
7983,
11695,
7090,
7229,
2110,
831,
1475,
6340,
7369,
4303,
7887,
10195,
2779,
2534,
8678,
9319,
11368,
3314,
3315,
3572,
7794,
11251,
9335,
9... | Test |
6,495 | 3 | Apple-designed_processors:apple-designed processors apple inc. developed range system chip soc well system package sip processors powering mobile consumer devices tasks meet stringent power space constraints common mobile devices chips combine central processing unit cpu components single compact physical package johny srouji executive charge apple silicon design prior introduction apple series socs apple used several socs early revisions iphone ipod touch specified apple manufactured samsung integrate single arm-based processing core cpu graphics processing unit gpu electronics necessary provide mobile computing functions within single physical package apl0098 also 8900b s5l8900 package package pop system chip soc introduced june 29 2007 launch original iphone includes 412 mhz single-core arm11 cpu powervr mbx lite gpu manufactured samsung 90 nm process first generation ipod touch also used apl0278 also s5l8720 package package pop system chip soc introduced september 9 2008 launch second generation ipod touch includes 533 mhz single-core arm11 cpu powervr mbx lite gpu manufactured samsung 65 nm process apl0298 also s5l8920 package package pop system chip soc introduced june 8 2009 launch iphone 3gs includes 600 mhz single-core cortex-a8 cpu powervr sgx535 gpu manufactured samsung 65 nm process apl2298 also s5l8922 45 nm die shrunk version iphone 3gs soc introduced september 9 2009 launch third generation ipod touch family systems chip soc used multiple devices including apple portable devices certain models iphone ipad ipod touch apple tv digital media player integrate one arm-based processing cores cpu graphics processing unit gpu cache memory electronics necessary provide mobile computing functions within single physical package designed apple manufactured samsung tsmc apple a4 package package pop system chip soc designed apple inc. manufactured samsung combines arm cortex-a8 cpu powervr gpu emphasizes power efficiency chip commercially debuted release apple ipad tablet followed shortly iphone 4 smartphone 4th generation ipod touch 2nd generation apple tv superseded ipad 2 released following year apple a5 processor apple a4 based arm processor architecture first version released ran 1 ghz ipad contains arm cortex-a8 cpu core paired powervr sgx 535 graphics processor gpu built samsung 45-nanometer nm silicon chip fabrication process clock speed units used iphone 4 ipod touch 4th generation 800 mhz clock speed unit used apple tv revealed cortex-a8 core used a4 thought use performance enhancements developed chip designer intrinsity subsequently acquired apple collaboration samsung resulting core dubbed hummingbird able run far higher clock rates implementations remaining fully compatible cortex-a8 design provided arm performance improvements include additional l2 cache cortex-a8 cpu core used a4 also used samsung s5pc110a01 soc sgx535 a4 could theoretically push 35 million polygons per second 500 million pixels per second although real world performance may considerably less a4 processor package contain ram supports pop installation hence package two low-power 128 mb ddr sdram chips totaling 256 mb mounted top a4 used first-generation ipad fourth-generation ipod touch second-generation apple tv iphone 4 two 256 mb packages total 512 mb ram connected processor using arm 64-bit-wide amba 3 axi bus support ipad demand high graphics bandwidth width ram data bus double used previous arm11 arm9 based apple devices apple a5 system chip soc designed apple inc. manufactured samsung replaced a4 chip commercially debuted release apple ipad 2 tablet march 2011 followed release iphone 4s smartphone later year apple claims compared predecessor a4 a5 cpu twice work gpu nine times graphics performance a5 contains dual-core arm cortex-a9 cpu arm advanced simd extension marketed neon dual core powervr sgx543mp2 gpu gpu push 70 80 million polygons/second pixel fill rate 2 billion pixels/second apple lists a5 clocked 1 ghz ipad 2 technical specifications page though dynamically adjust frequency save battery life clock speed unit used iphone 4s 800 mhz like a4 a5 process size 45 nm updated 32 nm version a5 processor used third generation apple tv ipod touch 5th generation ipad mini new version ipad 2 version ipad2,4 chip apple tv one core locked markings square package indicates named apl2498 software chip called s5l8942 32 nm variant a5 provides around 15 better battery life web browsing 30 better playing 3d games approximately 20 better battery life video playback march 2013 apple released updated version third generation apple tv appletv3,2 containing smaller single-core version a5 processor unlike a5 variants version a5 package-on-package pop stacked ram chip small 6.1×6.2 mm decrease size due decrease feature size still 32 nm fabrication process indicates a5 revision new design markings tell named apl7498 software chip called s5l8947 apple a5x system-on-a-chip soc designed apple inc. announced march 7 2012 launch third generation ipad high performance variant apple a5 apple claims twice graphics performance a5 superseded fourth generation ipad apple a6x processor soc quad-core graphics unit powervr sgx543mp4 instead previous dual-core well quad-channel memory controller provides memory bandwidth 12.8 gb/s roughly three times a5 added graphics cores extra memory channels add large die size 165 mm² example twice size nvidia tegra 3 mainly due large powervr sgx543mp4 gpu clock frequency dual arm cortex-a9 cores shown operate 1 ghz frequency a5 ram a5x separate main cpu package apple a6 package package pop system chip soc designed apple introduced september 12 2012 launch iphone 5 year later inherited minor successor iphone 5c apple states twice fast twice graphics power compared predecessor apple a5 22 smaller draws less power 45 nm a5 a6 said use 1.3 ghz custom apple-designed armv7 based dual-core cpu called swift rather licensed cpu arm like previous designs integrated 266 mhz triple-core powervr sgx 543mp3 graphics processing unit gpu swift core a6 uses new tweaked instruction set armv7s featuring elements arm cortex-a15 support advanced simd v2 vfpv4 a6 manufactured samsung high-κ metal gate hkmg 32 nm process apple a6x system-on-a-chip soc designed apple inc. introduced launch fourth generation ipad october 23 2012 high performance variant apple a6 apple claims a6x twice cpu performance twice graphics performance predecessor apple a5x like a6 soc continues use dual-core swift cpu new quad core gpu quad channel memory slightly higher 1.4 ghz cpu clock rate uses integrated quad-core powervr sgx 554mp4 graphics processing unit gpu running 300 mhz quad-channel memory subsystem compared a6 a6x 30 larger continues manufactured samsung high-κ metal gate hkmg 32 nm process apple a7 package package pop 64-bit system-on-a-chip soc designed apple first appearance iphone 5s introduced september 10 2013 chip would also used ipad air ipad mini 2 ipad mini 3 apple states twice fast twice graphics power compared predecessor apple a6 a7 features apple-designed 1.3–1.4 ghz 64-bit armv8-a dual-core cpu called cyclone integrated powervr g6430 gpu four cluster configuration armv8-a architecture doubles number registers a7 compared a6 31 general purpose registers 64-bits wide 32 floating-point/neon registers 128-bits wide a7 manufactured samsung high-κ metal gate hkmg 28 nm process chip includes 1 billion transistors die 102 mm size apple a8 package package pop 64-bit system-on-a-chip soc designed apple manufactured tsmc first appearance iphone 6 iphone 6 plus introduced september 9 2014 year later would drive ipad mini 4 apple states 25 cpu performance 50 graphics performance drawing 50 power compared predecessor apple a7 february 9 2018 apple released homepod powered apple a8 1 gb ram a8 features apple-designed 1.4 ghz 64-bit armv8-a dual-core cpu integrated powervr gx6450 gpu four cluster configuration a8 manufactured 20 nm process tsmc replaced samsung manufacturer apple mobile device processors contains 2 billion transistors despite double number transistors compared a7 physical size reduced 13 89 mm consistent shrink known new microarchitecture apple a8x 64-bit system chip soc designed apple introduced launch ipad air 2 october 16 2014 high performance variant apple a8 apple states 40 cpu performance 2.5 times graphics performance predecessor apple a7 unlike a8 soc uses triple-core cpu new octa-core gpu dual channel memory slightly higher 1.5 ghz cpu clock rate uses integrated octa-core powervr gxa6850 graphics processing unit gpu running 450 mhz dual-channel memory subsystem manufactured tsmc 20 nm fabrication process consists 3 billion transistors apple a9 64-bit arm based system chip soc designed apple inc first appeared iphone 6s 6s plus introduced september 9 2015 apple states 70 cpu performance 90 graphics performance compared predecessor apple a8 dual sourced first apple soc manufactured samsung 14 nm finfet lpe process tsmc 16 nm finfet process subsequently included iphone se ipad 2017 apple a9x 64-bit system chip soc designed apple inc announced september 9 2015 released november 11 2015 first appeared ipad pro offers 80 cpu performance two times gpu performance predecessor apple a8x manufactured tsmc using 16 nm finfet process apple a10 fusion 64-bit arm based system chip soc designed apple inc first appeared iphone 7 7 plus introduced september 7 2016 a10 also featured ipad 2018 ipod touch 7th generation new quad core design two high performance cores two smaller highly efficient cores 40 faster a9 50 faster graphics made tsmc 16 nm finfet process apple a10x fusion 64-bit arm based system chip soc designed apple inc first appeared 10.5 ipad pro second generation 12.9 ipad pro announced june 5 2017 variant a10 apple claims 30 percent faster cpu performance 40 percent faster gpu performance predecessor a9x september 12 2017 apple announced apple tv 4k would powered a10x chip made tsmc 10 nm finfet process apple a11 bionic 64-bit arm-based system chip soc designed apple inc first appeared iphone 8 iphone 8 plus iphone x introduced september 12 2017 two high-performance cores 25 faster a10 fusion four high-efficiency cores 70 faster energy-efficient cores a10 apple a12 bionic 64-bit arm-based system chip soc designed apple inc first appeared iphone xs xs max xr introduced september 12 2018 also within 2019 models ipad air ipad mini two high-performance cores 15 faster a11 bionic four high-efficiency cores 50 lower power usage energy-efficient cores a11 bionic a12 manufactured tsmc using 7 nm finfet process first ship smartphone apple a12x bionic 64-bit arm-based system chip soc designed apple inc first appeared 11.0 ipad pro third generation 12.9 ipad pro announced october 30 2018 offers 35 faster single-core 90 faster multi-core cpu performance predecessor a10x four high-performance cores four high-efficiency cores a12x manufactured tsmc using 7 nm finfet process first ship tablet apple series family systems package sip used apple watch uses customized application processor together memory storage support processors wireless connectivity sensors i/o comprise complete computer single package designed apple manufactured contract manufacturers samsung apple s1 integrated computer designed apple includes memory storage support circuits like wireless modems i/o controllers sealed integrated package announced september 9 2014 part wish could say event first appearance original apple watch used apple watch series 1 dual-core processor almost identical s2 exception built-in gps receiver used apple watch series 2 dual-core processor built-in gps receiver used apple watch series 3 dual-core processor 70 faster apple s2 built-in gps receiver also option cellular modem internal esim module also includes w2 chip used apple watch series 4 apple designed custom 64-bit dual-core processor 2x faster performance also contains w3 wireless chip supports bluetooth 5 apple t1 chip armv7 soc apple driving system management controller smc touch id sensor 2016 2017 macbook pro touch bar addition traditional tasks smc chip operates secure enclave processing encryption fingerprints well acting gatekeeper microphone facetime hd camera protecting possible targets potential hacking attempts t1 runs bridgeos variant watchos separate intel cpu running macos apple t2 chip soc apple first released imac pro 2017 64-bit armv8 chip variant a10 t8010 runs separate operating system called bridgeos 2.0 watchos derivative provides secure enclave encrypted keys gives users ability lock computer boot process handles system functions like camera audio control handles on-the-fly encryption decryption solid-state drive t2 also delivers enhanced imaging processing imac pro facetime hd camera july 12 2018 apple released updated macbook pro includes t2 chip among things enables hey siri feature november 7 2018 apple released updated mac mini macbook air t2 chip apple w series family system chip soc wireless chips focus bluetooth wi-fi connectivity apple w1 soc apple used 2016 airpods select beats headphones maintains bluetooth class 1 connection computer device decodes audio stream sent apple w2 wireless chip apple used apple watch series 3 integrated apple s3 sip apple released implementation chip makes wi-fi 85 faster bluetooth wi-fi 50 power efficient previous model chip design apple w3 wireless chip apple used apple watch series 4 integrated apple s4 sip supports bluetooth 5.0 apple h1 chip first used 2019 version airpods specifically designed headphones bluetooth 5.0 offers 30 lower latency compared w1 chip prior version airpods | [
7170,
10755,
9732,
1549,
9741,
5647,
8720,
7697,
4114,
9235,
11282,
6165,
11289,
7706,
1563,
8222,
1057,
38,
6183,
1576,
6186,
4139,
6700,
7211,
8237,
9774,
2097,
1074,
8754,
9784,
8250,
1083,
8253,
10813,
576,
7745,
1090,
3575,
7235,
774... | Test |
6,496 | 4 | AOL_Active_Virus_Shield:aol active virus shield aol active virus shield commonly referred avs free antivirus utility made available aol engine based one used kaspersky anti-virus program longer available active virus shield includes numerous features found kaspersky anti-virus software main feature malware scanning uses kaspersky underlying engine detects variety malware viruses spyware even joke programs also offers real-time file e-mail scanning protection latest version active virus shield version 6.0.2.621 supports windows vista active virus shield light compared commercial anti-virus products also consume much memory startup program also benefits kaspersky regular definition updates typically around every two hours enable new viruses effectively detected programs update less regularly addition active virus shield better detection rates free programs avg free avast home edition active virus shield lack features kaspersky 6.0 proactive protection http protection license provided valid one year although email address used initially easily used renew 10 times also support mail scanning using tls ssl users also reported compatibility problems certain applications mcafee personal firewall plus zonealarm logitech products active virus shield longer available download august 1 2007 replaced mcafee virus scan plus special edition aol available free users free aol account even though active virus shield longer available officially latest version program still obtained mirror server hosted help also still offered already using application | [
2049,
7809,
2213,
488,
6797,
7983,
2005,
10392,
7739,
7515
] | Validation |
6,497 | 4 | Improper_input_validation:improper input validation improper input validation unchecked user input type vulnerability computer software may used security exploits examples include | [
1474,
899,
5636,
4198,
8990,
10959,
6423,
3708,
2878
] | None |
6,498 | 2 | Redirection_(computing):redirection computing computing redirection form interprocess communication function common command-line interpreters including various unix shells redirect standard streams user-specified locations unix-like operating systems programs redirection dup2 2 system call less-flexible higher-level stdio analogues freopen 3 popen 3 redirection usually implemented placing certain characters commands typically syntax characters follows using codice_1 redirect input codice_2 redirect output command1 file1 executes command1 placing output file1 opposed displaying terminal usual destination standard output clobber existing data file1 using command1 file1 executes command1 file1 source input opposed keyboard usual source standard input command1 infile outfile combines two capabilities command1 reads infile writes outfile append output end file rather clobbering codice_3 operator used command1 » file1 read stream literal inline file passed standard input one use document using codice_4 operator tr a-z a-z « end_text one two three uno dos tres end_text read string one use string using codice_5 operator tr a-z a-z « one two three numbers= one two three tr a-z a-z « numbers programs run together one program reads output another need explicit intermediate file command1 command2 executes command1 using output input command2 commonly called piping character known pipe two programs performing commands may run parallel storage space working buffers linux allows 64k buffer plus whatever work space command processing requires example sort command unable produce output input records read last record received might turn first sorted order dr. alexia massalin experimental operating system synthesis would adjust priority task ran according fullness input output buffers produces end result using two redirects temporary file command1 tempfile command2 tempfile rm tempfile command2 start executing command1 finished sufficiently large scratch file required hold intermediate results well whatever work space task required example although dos allows pipe syntax employs second approach thus suppose long-running program worker produces various messages works second program timestamp copies record stdin stdout prefixed system date time record received sequence worker timestamp logfile.txt would produce timestamps worker finished merely showing swiftly output file could read written good example command piping combining codice_6 another command achieve something interactive non-interactive shell e.g echo -e 'user\npass ftp localhost runs ftp client input user press return pass casual use initial step pipeline often codice_7 codice_6 reading file string often replaced input indirection string use cat piping rather input redirection known useless use cat example following commands cat infile cmd echo string cmd echo -e 'user\npass ftp localhost replaced cmd infile cmd « string ftp localhost « 'user\npass' codice_6 often shell-internal command use criticized cat external command unix shells derived original bourne shell first two actions modified placing number file descriptor immediately character affect stream used redirection unix standard i/o streams example command1 2 file1 executes command1 directing standard error stream file1 shells derived csh c shell syntax instead appends ampersand character redirect characters thus achieving similar result reason distinguish file named 1 stdout i.e 'cat file 2 1 vs 'cat file 2 1 first case stderr redirected file named 1 second stderr redirected stdout another useful capability redirect one standard file handle another popular variation merge standard error standard output error messages processed together alternately usual output example find -name .profile results 2 1 try find files named .profile executed without redirection output hits stdout errors e.g lack privilege traverse protected directories stderr standard output directed file results error messages appear console see hits error messages file results merge stderr handle 2 stdout handle 1 using 2 1 merged output piped another program file merge sequence 2 1 must precede pipe symbol thus find -name .profile 2 1 less simplified non-posix conforming form command command file 2 1 available bourne shell prior version 4 final release standard shell debian almquist shell used debian/ubuntu command file command file possible use codice_10 codice_2 result commonly misunderstood rule redirection sets handle output stream independently codice_10 sets handle codice_13 whatever handle codice_14 points point usually stdout codice_2 redirects handle codice_14 something else e.g file change handle codice_13 still points stdout following example standard output written file errors redirected stderr stdout i.e sent screen command 2 1 file write errors standard output file order reversed standard output would first redirected file stderr would additionally redirected stdout handle already changed point file command file 2 1 redirection piping tokens chained together create complex commands example sort infile uniq -c sort -n outfile sorts lines infile lexicographical order writes unique lines prefixed number occurrences sorts resultant output numerically places final output outfile type construction used commonly shell scripts batch files standard command tee redirect output command several destinations ls -lrt tee xyz directs file list output standard output file xyz | [
5888,
4870,
8975,
4369,
10387,
532,
5012,
5397,
6813,
10407,
8369,
11442,
8499,
4409,
5698,
7364,
2120,
213,
8414,
2786,
10083,
742,
4968,
6377,
8301,
1277
] | Test |
6,499 | 2 | Sideways_address_space:sideways address space sideways address space acorn bbc microcomputer electron master-series microcomputer acorn bank switching implementation providing permanent system expansion days hard disk drives even floppy disk drives commonplace filing systems application utility software drivers made available sideways roms extra ram could fitted via sideways address space advanced user guide bbc micro refers sideways address space paged roms predated use address space ram expansion bbc b+ b+ 128 bbc master featured sideways ram standard machines used 8-bit 6502 65c102 processors 16-bit address space address space split 32 kib ram 0x0000 0x7fff 16 kib sideways address space 0x8000 0xbfff 16 kib operating system space 0xc000 0xffff sideways address space bank-switched referred acorn paged address space allows access one 16 kib bank time bank rom ram bbc micro bbc master rom sockets motherboard four bbc micro take sideways roms bbc micro shipped single rom containing bbc basic roms added computer add software remain available times electron sideways address space exposed addition plus 1 add-on third-party equivalent plus 1 also introduced cartridge slots carried bbc master design alternative way package roms sideways roms permitted addition new filing systems os disc filing system application utility software software supplied roms two main benefits loads instantaneously requires little ram operate may use dedicated paged rom area ram normal software keeps clear allowed application software working space would normally possible utility software debuggers operate software held ram first bytes sideways roms contain details inform os handle include language service entry points rom type code version number pointer copyright information reset os validates sideways bank checking copyright string operation os talks valid roms jumping two entry points specific value accumulator set provides clean api expanding operating system negotiating bank switching ram sharing roms two entry points service entry point provides api access rom language entry point starting point application software contained rom service roms need language entry point exist extend os language roms roms provide application software gain name fact bbc basic language supplied default rom bank 15 roms often contain entry points user software must service entry point allow os call pure service roms typically extend features os without providing application software bbc micro electron require one language rom present post provide computer user interface else os report language halt version acorn mos bbc master built-in command line present default language rom configured addition rom banks ram could added computer via sideways address space could either used load use rom-images disk extra workspace machine code programs bbc model b hardwired deny writing sideways area write signal needs collected somewhere methods vary two common methods removing chips board placing expansion board occupies chips original sockets fitting ram module rom socket flying lead connected write signal elsewhere motherboard 64kb model b+ 12kb special sideways ram used sideways address selected high bit rom select register could used load rom images 128kb model b+ expansion board 64kb regular sideways ram addition 12kb special sideways ram main board bbc master came 64kb regular sideways ram could configured motherboard links banks rom ram addition 4kb special sideways ram 8kb ram paged operating system unlike b+ special sideways ram available user applications memory areas master used operating system filing system workspace electron cartridge ports wired assumption 'd used roms much bbc micro master slots replace ready signal r/w signal ram also plugged external cartridge ports acorn mos supports 16 sideways banks due limited motherboard space extra sideways sockets made available third-party expansion boards certain boards watford electronics sidewise board also provided option permanent battery backed-up ram allows developer testing new sideways rom software without burning eprom attempt write-protect switch could used prevent contents sideways ram modified | [
6210,
9762,
1029,
3722,
8429,
7983,
7281,
10130,
11033,
9563,
5598
] | Validation |
6,500 | 2 | IDispatch:idispatch idispatch interface exposes ole automation protocol extending iunknown one standard interfaces exposed com objects com distinguishes three interface types custom vtable-based iunknown interfaces dispatch idispatch interfaces supporting introspection dual interfaces supporting types automation idispatch interface allows client application find properties methods supported object run-time i.e implements concept rtti also provides information necessary invoke properties methods client applications need aware object members compiled allows com activex objects called scripting programs platforms asp server javascript internet explorer calling conventions known time iis ie built contrast simple object library compiled linked program e.g dll call needs know function name parameters compile time script writer ask com object method property already knows documentation client execute function invoke provided idispatch interface form late-binding sort capability also supported dynamic data exchange dde never became popular due low-level dispatch interfaces flexible suffer additional introspection invocation overhead compared custom interfaces therefore often good idea support interface types dual interfaces way clients supporting vtable-based invocation use custom interface instead dispatch counterpart property method implemented object supports idispatch interface called dispatch id often abbreviated dispid dispid primary means identifying property method must supplied invoke function property method invoked along array variants containing parameters getidsofnames function used get appropriate dispid property method name string format idispatch derives iunknown extends four additional methods idispatch interface id defined guid value 00020400-0000-0000-c000-000000000046 | [
11361,
2146,
3462,
9813,
4439,
8473
] | Test |
6,501 | 4 | Cyrix_coma_bug:cyrix coma bug cyrix coma bug design flaw cyrix 6x86 6x86l early 6x86mx processors allows non-privileged program hang computer according andrew balsa around time discovery f00f bug intel pentium serguei shtyliov moscow found flaw cyrix processor developing ide disk driver assembly language alexandr konosevich omsk researched bug coauthored article uwe post german technology magazine c't calling hidden cli bug cli instruction disables interrupts x86 architecture balsa member linux-kernel mailing list confirmed following c program uses inline x86-specific assembly language could compiled run unprivileged user execution program renders processor completely useless rebooted enters infinite loop interrupted allows user access cyrix system bug perform denial-of-service attack similar execution halt catch fire instruction although coma bug one particular instruction causes bug interrupt mask interrupts explicitly disabled instead anomaly cyrix instruction pipeline prevents interrupts serviced duration loop since loop never ends interrupts never serviced xchg instruction atomic meaning instructions allowed change state system executed order ensure atomicity designers cyrix made xchg uninterruptible due pipelining branch predicting however another xchg enters pipeline previous one completes causing deadlock fix unintentional instances bug insert another instruction loop nop instruction good candidate cyrix suggested serializing xchg opcode thus bypassing pipeline however techniques serve prevent deliberate attacks one way prevent bug enable bit 0x10 configuration register ccr1 disables implicit bus locking normally done xchg instruction since cpus affected bug designed work multi-processor systems loss xchg atomicity harmless | [
10786,
8231,
2409,
1776,
2045,
5457,
499,
5744,
8501,
823,
1915,
477
] | Test |
6,502 | 9 | Lisp_(programming_language):lisp programming language lisp historically lisp family computer programming languages long history distinctive fully parenthesized prefix notation originally specified 1958 lisp second-oldest high-level programming language widespread use today fortran older one year lisp changed since early days many dialects existed history today best-known general-purpose lisp dialects clojure common lisp scheme lisp originally created practical mathematical notation computer programs influenced notation alonzo church lambda calculus quickly became favored programming language artificial intelligence ai research one earliest programming languages lisp pioneered many ideas computer science including tree data structures automatic storage management dynamic typing conditionals higher-order functions recursion self-hosting compiler read–eval–print loop name lisp derives list processor linked lists one lisp major data structures lisp source code made lists thus lisp programs manipulate source code data structure giving rise macro systems allow programmers create new syntax new domain-specific languages embedded lisp interchangeability code data gives lisp instantly recognizable syntax program code written s-expressions parenthesized lists function call syntactic form written list function operator name first arguments following instance function takes three arguments would called john mccarthy developed lisp 1958 massachusetts institute technology mit mccarthy published design paper communications acm 1960 entitled recursive functions symbolic expressions computation machine part showed simple operators notation functions one build turing-complete language algorithms information processing language first ai language 1955 1956 already included many concepts list-processing recursion came used lisp mccarthy original notation used bracketed m-expressions would translated s-expressions example m-expression equivalent s-expression lisp implemented programmers rapidly chose use s-expressions m-expressions abandoned m-expressions surfaced short-lived attempts mlisp horace enea cgol vaughan pratt lisp first implemented steve russell ibm 704 computer russell read mccarthy paper realized mccarthy surprise lisp eval function could implemented machine code result working lisp interpreter could used run lisp programs properly evaluate lisp expressions two assembly language macros ibm 704 became primitive operations decomposing lists contents address part register number contents decrement part register number register used refer registers computer central processing unit cpu lisp dialects still use operations return first item list rest list respectively first complete lisp compiler written lisp implemented 1962 tim hart mike levin mit compiler introduced lisp model incremental compilation compiled interpreted functions intermix freely language used hart levin memo much closer modern lisp style mccarthy earlier code lisp difficult system implement compiler techniques stock hardware 1970s garbage collection routines developed mit graduate student daniel edwards made practical run lisp general-purpose computing systems efficiency still problem led creation lisp machines dedicated hardware running lisp environments programs 1980s 1990s great effort made unify work new lisp dialects mostly successors maclisp zetalisp nil new implementation lisp single language new language common lisp somewhat compatible dialects replaced book common lisp language notes compatibility various constructs 1994 ansi published common lisp standard ansi x3.226-1994 information technology programming language common lisp since inception lisp closely connected artificial intelligence research community especially pdp-10 systems lisp used implementation programming language micro planner used famous ai system shrdlu 1970s ai research spawned commercial offshoots performance existing lisp systems became growing issue sixty-year history lisp spawned many variations core theme s-expression language moreover given dialect may several implementations—for instance dozen implementations common lisp differences dialects may quite visible—for instance common lisp uses keyword codice_1 name function scheme uses codice_2 within dialect standardized however conforming implementations support core language different extensions libraries declined somewhat 1990s lisp experienced resurgence interest 2000 new activity focused around implementations common lisp scheme emacs lisp clojure racket includes development new portable libraries applications many new lisp programmers inspired writers paul graham eric s. raymond pursue language others considered antiquated new lisp programmers often describe language eye-opening experience claim substantially productive languages increase awareness may contrasted ai winter lisp brief gain mid-1990s dan weinreb lists survey common lisp implementations eleven actively maintained common lisp implementations scieneer common lisp new commercial implementation forked cmucl first release 2002 open source community created new supporting infrastructure cliki wiki collects common lisp related information common lisp directory lists resources lisp popular irc channel allows sharing commenting code snippets support lisppaste irc bot written lisp planet lisp collects contents various lisp-related blogs lispforum users discuss lisp topics lispjobs service announcing job offers weekly news service weekly lisp news common-lisp.net hosting site open source common lisp projects quicklisp library manager common lisp fifty years lisp 1958–2008 celebrated lisp50 oopsla regular local user meetings boston vancouver hamburg events include european common lisp meeting european lisp symposium international lisp conference scheme community actively maintains twenty implementations several significant new implementations chicken gambit gauche ikarus larceny ypsilon developed 2000s decade revised report algorithmic language scheme standard scheme widely accepted scheme community scheme requests implementation process created lot quasi standard libraries extensions scheme user communities individual scheme implementations continue grow new language standardization process started 2003 led rrs scheme standard 2007 academic use scheme teaching computer science seems declined somewhat universities longer using scheme computer science introductory courses mit uses python instead scheme undergraduate computer science program mitx massive open online course several new dialects lisp arc hy nu liskell lfe lisp flavored erlang parser julia implemented femtolisp dialect scheme julia inspired scheme often considered lisp common lisp scheme represent two major streams lisp development languages embody significantly different design choices common lisp successor maclisp primary influences lisp machine lisp maclisp nil s-1 lisp spice lisp scheme many features lisp machine lisp large lisp dialect used program lisp machines designed efficiently implementable personal computer workstation common lisp general-purpose programming language thus large language standard including many built-in data types functions macros language elements object system common lisp object system common lisp also borrowed certain features scheme lexical scoping lexical closures common lisp implementations available targeting different platforms llvm java virtual machine x86-64 powerpc alpha arm motorola 68000 mips operating systems windows macos linux solaris freebsd netbsd openbsd dragonfly bsd heroku scheme statically scoped properly tail-recursive dialect lisp programming language invented guy l. steele jr. gerald jay sussman designed exceptionally clear simple semantics different ways form expressions designed decade earlier common lisp scheme minimalist design much smaller set standard features certain implementation features tail-call optimization full continuations specified common lisp wide variety programming paradigms including imperative functional message passing styles find convenient expression scheme scheme continues evolve series standards revised report algorithmic language scheme series scheme requests implementation clojure recent dialect lisp targets mainly java virtual machine common language runtime clr python vm ruby vm yarv compiling javascript designed pragmatic general-purpose language clojure draws considerable influences haskell places strong emphasis immutability clojure provides access java frameworks libraries optional type hints type inference calls java avoid reflection enable fast primitive operations lisp dialects used scripting languages many applications best-known emacs lisp emacs editor autolisp later visual lisp autocad nyquist audacity scheme lilypond potential small size useful scheme interpreter makes particularly popular embedded scripting examples include siod tinyscheme successfully embedded gimp image processor generic name script-fu librep lisp interpreter john harper originally based emacs lisp language embedded sawfish window manager lisp first language structure program code represented faithfully directly standard data structure—a quality much later dubbed homoiconicity thus lisp functions manipulated altered even created within lisp program without lower-level manipulations generally considered one main advantages language regard expressive power makes language suitable syntactic macros metacircular evaluation conditional using if–then–else syntax invented mccarthy fortran context proposed inclusion algol made part algol 58 specification lisp mccarthy used general cond -structure algol 60 took if–then–else popularized lisp deeply influenced alan kay leader research team developed smalltalk xerox parc turn lisp influenced smalltalk later dialects adopting object-oriented programming features inheritance classes encapsulating instances message passing etc 1970s flavors object system introduced concept multiple inheritance mixin common lisp object system provides multiple inheritance multimethods multiple dispatch first-class generic functions yielding flexible powerful form dynamic dispatch served template many subsequent lisp including scheme object systems often implemented via metaobject protocol reflective metacircular design object system defined terms lisp second language smalltalk still one languages possess metaobject system many years later alan kay suggested result confluence features smalltalk lisp could regarded properly conceived object-oriented programming systems lisp introduced concept automatic garbage collection system walks heap looking unused memory progress modern sophisticated garbage collection algorithms generational garbage collection stimulated use lisp edsger w. dijkstra 1972 turing award lecture said largely resource requirements respect early computing hardware including early microprocessors lisp become popular outside ai community fortran algol-descended c language suitability complex dynamic applications lisp enjoying resurgence popular interest 2010s lisp expression oriented language unlike languages distinction made expressions statements code data written expressions expression evaluated produces value common lisp possibly multiple values embedded expressions value data type mccarthy 1958 paper introduced two types syntax symbolic expressions s-expressions sexps mirror internal representation code data meta expressions m-expressions express functions s-expressions m-expressions never found favor almost lisps today use s-expressions manipulate code data use parentheses lisp immediately obvious difference programming language families result students long given lisp nicknames lost stupid parentheses lots irritating superfluous parentheses however s-expression syntax also responsible much lisp power syntax extremely regular facilitates manipulation computer however syntax lisp limited traditional parentheses notation extended include alternative notations example xmlisp common lisp extension employs metaobject protocol integrate s-expressions extensible markup language xml reliance expressions gives language great flexibility lisp functions written lists processed exactly like data allows easy writing programs manipulate programs metaprogramming many lisp dialects exploit feature using macro systems enables extension language almost without limit lisp list written elements separated whitespace surrounded parentheses example list whose elements three atoms values implicitly typed respectively two integers lisp-specific data type called symbol declared empty list also represented special atom entity lisp atom list expressions written lists using prefix notation first element list name function name macro lambda expression name special operator see remainder list arguments example function returns arguments list expression evaluates list quote preceding example special operator returns argument without evaluating unquoted expressions recursively evaluated enclosing expression evaluated example evaluates list note third argument list lists nested arithmetic operators treated similarly expression evaluates 10 equivalent infix notation would lisp notion operators implemented algol-derived languages arithmetic operators lisp variadic functions n-ary able take number arguments c-style '++ increment operator sometimes implemented name incf giving syntax equivalent setq x x 1 returning new value x special operators sometimes called special forms provide lisp control structure example special operator takes three arguments first argument non-nil evaluates second argument otherwise evaluates third argument thus expression evaluates course would useful non-trivial expression substituted place lisp also provides logical operators operators short circuit evaluation return first nil non-nil argument respectively evaluate james another special operator used bind variables values evaluated within expression operator also used create functions arguments list arguments expression expressions function evaluates returned value value last expression evaluated expression evaluates function applied takes one argument binds returns number one greater argument lambda expressions treated differently named functions invoked way therefore expression evaluates 're function application execute anonymous function passing value 5 named functions created storing lambda expression symbol using defun macro original lisp two fundamental data types atoms lists list finite ordered sequence elements element either atom list atom number symbol symbol essentially unique named item written alphanumeric string source code used either variable name data item symbolic processing example list contains three elements symbol list number 2 essential difference atoms lists atoms immutable unique two atoms appeared different places source code written exactly way represented object whereas list separate object could altered independently lists could distinguished lists comparison operators data types introduced later lisp dialects programming styles evolved concept atom lost importance many dialects still retained predicate atom legacy compatibility defining true object cons lisp list implemented singly linked list cell list called cons scheme pair composed two pointers called car cdr respectively equivalent fields discussed article linked list many data structures built cons cells one basic called proper list proper list either special empty list symbol cons points datum may another cons structure list points another proper list given cons taken head linked list car points first element list cdr points rest list reason functions also called referring conses part linked list rather say tree thus lisp list atomic object instance container class c++ java would list nothing aggregate linked conses variable refers given list simply pointer first cons list traversal list done cdring list taking successive cdrs visit cons list using several higher-order functions map function list conses lists universal lisp systems common misconception lisp data structures fact simplistic lisps data structures vectors arrays hash tables structures forth parenthesized s-expressions represent linked list structures several ways represent list s-expression cons written dotted-pair notation car cdr longer proper list might written dotted-pair notation conventionally abbreviated list notation improper list may written combination two – list three conses whose last cdr i.e. list fully specified form lisp provides many built-in procedures accessing controlling lists lists created directly procedure takes number arguments returns list arguments way lists constructed cons pairs procedure used add element front list note procedure asymmetric handles list arguments lists constructed procedure appends two lists one another lisp lists linked lists appending two lists asymptotic time complexity formula_1 lisp lists simple linked lists share structure one another say two lists tail final sequence conses instance execution following common lisp code lists respectively however tail structure lists copy cons cells pointing memory locations lists sharing structure rather copying give dramatic performance improvement however technique interact undesired ways functions alter lists passed arguments altering one list replacing affect changes thereby also changes – possibly unexpected result source bugs functions alter arguments documented destructive reason aficionados functional programming avoid destructive functions scheme dialect favors functional style names destructive functions marked cautionary exclamation point bang —such read set car bang replaces car cons common lisp dialect destructive functions commonplace equivalent named replace car function rarely seen however common lisp includes special facility make easier define use destructive functions frequent style common lisp write code functionally without destructive calls prototyping add destructive calls optimization safe lisp evaluates expressions entered user symbols lists evaluate usually simpler expression – instance symbol evaluates value variable names evaluates however forms evaluate entering lisp returns expression also marked prevent evaluated necessary symbols lists role special operator abbreviation one quotation mark instance usually entering symbol returns value corresponding variable error variable refer literal symbol enter usually common lisp scheme also support backquote operator termed quasiquote scheme entered character grave accent almost plain quote except allows expressions evaluated values interpolated quoted list comma unquote comma-at splice operators variable value evaluates evaluates backquote often used defining macro expansions self-evaluating forms quoted forms lisp equivalent literals may possible modify values mutable literals program code instance function returns quoted form code calls function modifies form may alter behavior function subsequent iterations modifying quoted form like generally considered bad style defined ansi common lisp erroneous resulting undefined behavior compiled files file-compiler coalesce similar constants put write-protected memory etc. lisp formalization quotation noted douglas hofstadter gödel escher bach others example philosophical idea self-reference lisp family splits use dynamic static a.k.a lexical scope clojure common lisp scheme make use static scoping default newlisp picolisp embedded languages emacs autocad use dynamic scoping since version 24.1 emacs uses dynamic lexical scoping fundamental distinction lisp languages lisp textual representation program simply human-readable description internal data structures linked lists symbols number characters etc would used underlying lisp system lisp uses implement powerful macro system like macro languages c macro returns code compiled however unlike c macros macros lisp functions exploit full power lisp lisp code structure lists macros built list-processing functions language short anything lisp data structure lisp macros code contrast languages parser output purely internal language implementation manipulated programmer feature makes easy develop efficient languages within languages example common lisp object system implemented cleanly language extension using macros means application needs different inheritance mechanism use different object system stark contrast languages example java support multiple inheritance reasonable way add simplistic lisp implementations list structure directly interpreted run program function literally piece list structure traversed interpreter executing however substantial lisp systems also include compiler compiler translates list structure machine code bytecode execution code run fast code compiled conventional languages c. macros expand compilation step thus offer interesting options program needs precomputed table macro might create table compile time compiler need output table need call code create table run time lisp implementations even mechanism codice_3 allows code present compile time macro would need present emitted module lisp languages often used interactive command line may combined integrated development environment ide user types expressions command line directs ide transmit lisp system lisp reads entered expressions evaluates prints result reason lisp command line called read–eval–print loop repl basic operation repl follows simplistic description omits many elements real lisp quoting macros function accepts textual s-expressions input parses internal data structure instance type text prompt translates linked list three elements symbol number 1 number 2 happens list also valid piece lisp code evaluated car list names function—the addition operation note read single symbol read number one hundred twenty-three read string 123 function evaluates data returning zero lisp data result evaluation mean interpretation lisp systems compile every expression native machine code simple however describe evaluation interpretation evaluate list whose car names function first evaluates arguments given cdr applies function arguments case function addition applying argument list yields answer result evaluation symbol evaluates value symbol foo data like string 123 evaluates string list evaluates list 1 2 3 job function represent output user simple result trivial expression evaluated piece list structure would require traverse list print s-expression implement lisp repl necessary implement three functions infinite-loop function naturally implementation complex since must also implement special operators like done basic repl one line code lisp repl typically also provides input editing input history error handling interface debugger lisp usually evaluated eagerly common lisp arguments evaluated applicative order 'leftmost innermost scheme order arguments undefined leaving room optimization compiler lisp originally control structures many added language evolution lisp original conditional operator precursor later structures programmers scheme dialect often express loops using tail recursion scheme commonality academic computer science led students believe tail recursion common way write iterations lisp incorrect oft-seen lisp dialects imperative-style iteration constructs scheme loop common lisp complex expressions moreover key issue makes objective rather subjective matter scheme makes specific requirements handling tail calls thus reason use tail recursion generally encouraged scheme practice expressly supported language definition contrast ansi common lisp require optimization commonly termed tail call elimination thus fact tail recursive style casual replacement use traditional iteration constructs discouraged common lisp matter stylistic preference potentially one efficiency since apparent tail call common lisp may compile simple jump program correctness since tail recursion may increase stack use common lisp risking stack overflow lisp control structures special operators equivalent languages syntactic keywords expressions using operators surface appearance function calls differ arguments necessarily evaluated—or case iteration expression may evaluated contrast major programming languages lisp allows implementing control structures using language several control structures implemented lisp macros even macro-expanded programmer wants know work common lisp scheme operators non-local control flow differences operators deepest differences two dialects scheme supports re-entrant continuations using procedure allows program save later restore particular place execution common lisp support re-entrant continuations support several ways handling escape continuations often algorithm expressed lisp either imperative functional style noted scheme tends favor functional style using tail recursion continuations express control flow however imperative style still quite possible style preferred many common lisp programmers may seem familiar programmers used structured languages c preferred schemers closely resembles pure-functional languages haskell lisp early heritage list processing wide array higher-order functions relating iteration sequences many cases explicit loop would needed languages like loop c lisp task accomplished higher-order function true many functional programming languages good example function scheme called common lisp called given function one lists applies function successively lists elements order collecting results new list applies function corresponding pair list elements yielding result examples common lisp code basic hello world program lisp syntax lends naturally recursion mathematical problems enumeration recursively defined sets simple express notation evaluate number factorial alternative implementation takes less stack space previous version underlying lisp system optimizes tail recursion contrast iterative version uses common lisp macro following function reverses list lisp built-in reverse function thing various object systems models built top alongside lisp including | [
4097,
4101,
2056,
8201,
2062,
6160,
2069,
4122,
8221,
8226,
50,
2102,
2105,
58,
8258,
8262,
6228,
10324,
6242,
8291,
8293,
6248,
8303,
6274,
2179,
10387,
10406,
2225,
10435,
205,
219,
10463,
6369,
228,
8421,
10470,
6378,
8430,
242,
8435,
... | Test |
6,503 | 9 | IBM_PL/S:ibm pl/s pl/s short programming language/systems machine-oriented programming language based pl/i developed ibm late 1960s name basic systems language bsl replacement assembly language internal software projects included support inline assembly explicit control register usage early projects using pl/s batch utility iehmove time sharing option mvt tso 1970s ibm rewriting flagship operating system pl/s although users frequently asked ibm release pl/s use ibm refused saying product proprietary concern open pl/s would give competitors amdahl itel national advanced systems storage technology corporation trilogy systems magnuson computer systems fujitsu hitachi pcm vendors competitive advantage however even though refused make available compiler shipped pl/s source code large parts os customers many thus became familiar reading closed pl/s meant ibm could easily modify enhance operating system pl/s succeeded pl/s ii pl/as programming language/advanced systems pl/x programming language/cross systems pl/ds programming language/distributed systems closely related language used develop dppx operating system pl/ds ii port s/370 architecture dppx/370 port market computers software shifted away ibm mainframes mvs ibm recanted offered current versions pl/s selected customers isvs developer partner program fully compliant pl/s compiler developed fujitsu ltd late-1970s using ibm pl/i optimizer compiler source code starting point pl/s compiler used internally fujitsu also external affiliates whether ibm aware improper use licensed intellectual property known phase names pl/s compiler corresponding phase names ibm pl/i optimizer compiler initial ibm phase name replaced initial j japan ibm copyright notices within modules deleted hide true origin ownership | [
477,
868,
4998,
8262,
9911,
7053,
9137,
7507,
9139,
9331,
8502,
9619,
2168,
9977,
5562,
3323,
9820,
2813
] | Test |
6,504 | 4 | BGP_hijacking:bgp hijacking bgp hijacking sometimes referred prefix hijacking route hijacking ip hijacking illegitimate takeover groups ip addresses corrupting internet routing tables maintained using border gateway protocol bgp internet global network enabling connected host identified unique ip address talk anywhere world achieved passing data one router another repeatedly moving packet closer destination hopefully delivered router must regularly supplied up-to-date routing tables global level individual ip addresses grouped together prefixes prefixes originated owned autonomous system routing tables ases maintained using border gateway protocol bgp group networks operate single external routing policy known autonomous system example sprint verizon unique identifier number bgp standard routing protocol used exchange information ip routing autonomous systems uses bgp advertise prefixes deliver traffic example network prefix 192.0.2.0/24 inside 64496 advertise provider and/or peer deliver traffic destined 192.0.2.0/24 although security extensions available bgp third-party route db resources exist validating routes default bgp protocol designed trust route announcements sent peers isps rigorously enforce checks bgp sessions ip hijacking occur deliberately accident one several ways common ways disruption normal routing network packets end forwarded towards wrong part network either enter endless loop discarded found mercy offending typically isps filter bgp traffic allowing bgp advertisements downstream networks contain valid ip space however history hijacking incidents shows always case resource public key infrastructure rpki designed authenticate route origins via cryptographic certificate chains demonstrating address block range ownership widely deployed yet deployed ip hijacking errant issues origin via accident intent detectable filterable ip hijacking sometimes used malicious users obtain ip addresses use spamming distributed denial-of-service ddos attack like tcp reset attack session hijacking involves intrusion ongoing bgp session i.e. attacker successfully masquerades one peers bgp session requires information needed accomplish reset attack difference session hijacking attack may designed achieve simply bringing session bgp peers example objective may change routes used peer order facilitate eavesdropping black holing traffic analysis default ebgp peers attempt add routes received another peer device routing table attempt advertise nearly routes ebgp peers problem multi-homed organizations inadvertently advertise prefixes learned one another causing end customer become new best-path prefixes question example customer cisco router peering say verizon using filtering automatically attempt link two major carriers could cause providers prefer sending traffic customer perhaps t1 instead using high-speed dedicated links problem affect others peer two providers also cause ass prefer misconfigured link reality problem hardly ever occurs large isps isps tend restrict end customer advertise however isp filtering customer advertisements allow errant information advertised global routing table affect even large tier-1 providers concept bgp hijacking revolves around locating isp filtering advertisements intentionally otherwise locating isp whose internal isp-to-isp bgp session susceptible man-in-the-middle attack located attacker potentially advertise prefix want causing traffic diverted real source towards attacker done either overload isp attacker infiltrated perform dos impersonation attack entity whose prefix advertised uncommon attacker cause serious outages including complete loss connectivity early 2008 least eight us universities traffic diverted indonesia 90 minutes one morning attack kept mostly quiet involved also february 2008 large portion youtube address space redirected pakistan pta decided block access site inside country accidentally blackholed route global bgp table filtering md5/ttl protection already available bgp implementations thus preventing source attacks problem stems concept isps rarely ever filter advertisements isps common efficient way determine list permissible prefixes originate penalty allowing errant information advertised range simple filtering other/larger isps complete shutdown bgp session neighboring isp causing two isps cease peering repeated problems often end permanent termination peering agreements also noteworthy even causing major provider block shutdown smaller problematic provider global bgp table often reconfigure reroute traffic available routes peers take action errant isp fixes problem source one useful offshoot concept called bgp anycasting frequently used root dns servers allow multiple servers use ip address providing redundancy layer protection dos attacks without publishing hundreds server ip addresses difference situation point advertising prefix actually access real data dns case responds correctly end user requests | [
5024,
2085,
2409,
7248,
87,
4863
] | Test |
6,505 | 2 | Nokia_X6-00:nokia x6-00 nokia x6 music-oriented capacitive touchscreen smartphone portable entertainment device nokia announced early september 2009 nokia world 2009 germany x6 replaces nokia 5800 nokia flagship music-centred model still slot high-end touchscreen models like nokia n97 x6 nokia x3-00 first devices newly installed nokia xseries xseries nokia music-centred devices branded xpressmusic x6 x3 introduced day nokia launched new simpler naming strategy one number series letter original x6 includes comes music program licence unlimited free downloads nokia music store comes music version shipped late 2009 estimated retail price £529.99 €605 name later reused hmd global new android smartphone nokia x6 2018 version without comes music support €200 less released 23 february 2010 version 16 gb on-board storage another cheaper variation x6 also without comes music support released nokia mid-2010 version 8 gb on-board storage released asia north america 32 gb version released india instead 8 gb 16 gb versions provided ovi music unlimited offer x6 notable slimmer body 5800 13.8 mm 35 hours continuous music playback fast 3g network social networking supports easy access facebook myspace ovi yahoo im youtube vk windows live new software update released nokia x6-00 version 40.0.002 brings new version ovi maps ovi store improved browser improved chat ovi contacts however updates possible via phone require windows computer perform nokia willing update devices mail windows pc hobbyists provided unofficial symbian anna firmware releases | [
1537,
8577,
6276,
3205,
11271,
11655,
4365,
9359,
1424,
529,
2449,
8083,
10770,
5143,
2072,
7063,
5274,
5019,
5659,
669,
8472,
11545,
4003,
4132,
6310,
167,
40,
1833,
3626,
5290,
10410,
9137,
10802,
7220,
821,
5175,
7866,
1083,
1216,
1728... | Test |
6,506 | 2 | DriveSpace:drivespace drivespace initially known doublespace disk compression utility supplied ms-dos starting version 6.0 1993 purpose drivespace increase amount data user could store disks transparently compressing decompressing data on-the-fly primarily intended use hard drives use floppy disks also supported common usage scenario user would one hard drive computer space allocated one partition usually drive c software would compress entire drive contents one large file root partition booting system driver would allocate large file drive c enabling files accessed normal microsoft decision add disk compression ms-dos 6.0 influenced fact competing dr dos earlier started include disk compression software since version 6.0 1991 instead developing product scratch microsoft licensed technology doubledisk product developed vertisoft adapted become doublespace instance loading driver controlling compression/decompression dblspace.bin became deeply integrated operating system loaded undocumented pre-load api even config.sys file microsoft originally sought license technology stac electronics similar product called stacker negotiations failed microsoft later successfully sued patent infringement stac electronics violating compression patents court case stac electronics claimed microsoft refused pay money attempted license stacker offering possibility stac electronics develop enhancement products computer programs particularly games incompatible doublespace effectively bypassed doublespace driver doublespace also consumed significant amount conventional memory making difficult run memory-intensive programs shortly release reports data loss emerged company called blossom software claimed found bug could lead data corruption bug occurred writing files heavily fragmented disks demonstrated program called bust.exe company sold program called doublecheck could used check fragmentation condition could lead error microsoft position error occurred unlikely conditions fixed problem ms-dos 6.2 fragmentation condition related way doublespace compresses individual clusters size say 8k fits disk occupying fewer sectors size 512 bytes fixed number required without doublespace 16 sectors example created possibility kind internal fragmentation issue doublespace would unable find enough consecutive sectors storing compressed cluster even plenty space available potential causes data loss included corruption doublespace memory areas programs doublespace memory areas protected ms-dos ran real mode microsoft attempted remedy ms-dos 6.2 version doublespace via feature called doubleguard would check corruption fact compressed contents compressed drive stored single file implied possibility user accidentally deleting his/her data deleting file could happen user inadvertently got access host drive containing file host drive usually mapped letter h compression driver however compression driver failed load user might see drive c turning computer doublespace could finish updating data structures could also result data loss problem compounded microsoft making write caching enabled default smartdrv disk cache software came ms-dos 6.0 change exiting application ms-dos prompt might appear data written disk however due lack controlled shutdown procedure found modern operating systems many users saw appearance ms-dos prompt indication safe switch computer typically case prior ms-dos 6.0 microsoft addressed issue ms-dos 6.2 write caching still enabled default cache would flushed allowing command prompt reappear addstor inc. offered add-on product called double tools doublespace contained number tools enhance functions version doublespace came ms-dos 6.0 included various diagnostic features ability compressed removable media auto-mounted used well support background defragmentation doublespace compressed drives defragment files background possible let doubletools replace low-level doublespace driver dblspace.bin one supplied doubletools replacing driver also enabled enhanced functionality product use 32-bit code paths detected intel 80386 higher cpu caching capabilities addition supporting use upper memory area also permitted use extended memory buffers reducing driver total footprint conventional upper memory albeit cost somewhat reduced speed another function ability split compressed volume multiple floppy disks able see entire volume first disk inserted prompted change discs necessary also possible share compressed volume remote computer double tools also capability put special utility compressed floppy disks made possible access compressed data even computers n't doublespace double tools vertisoft company developed doubledisk program microsoft subsequently licensed turned doublespace developed sold doublespace add-on program called spacemanager contained number usability enhancements also offered improved compression ratios products like later versions stacker stac electronics capable converting existing doublespace compressed drives format ms-dos 6.2 featured new improved version doublespace ability remove doublespace added program scandisk introduced release able scan non-compressed compressed drives including checks internal doublespace structures security features known doubleguard added prevent memory corruption leading data loss memory footprint doublespace driver reduced compared version shipped ms-dos 6.0 fix made fragmentation issue discussed following successful lawsuit stac electronics regarding demonstrated patent infringement microsoft released ms-dos 6.21 without doublespace court injunction also prevented distribution previous versions ms-dos included doublespace ms-dos 6.22 contained reimplemented version disk compression software time released name drivespace software essentially identical ms-dos 6.2 version doublespace user point view compatible previous versions windows 95 full support doublespace/drivespace via native 32-bit driver accessing compressed drives along graphical version software tools ms-dos drivespace users could upgrade windows 95 without troubles furthermore microsoft plus windows 95 pack contained version 3 drivespace version introduced new compression formats hipack ultrapack different performance characteristics even greater compression ratios along tool could recompress files disk using different formats depending frequently files used one could upgrade drivespace 2 drivespace 3 downgrade path back drivespace 2 one could however decompress drivespace 3 drive dos device driver drivespace 3 memory footprint around 150 kb new features caused difficulty users rebooting ms-dos mode windows 95 running games reduced amount conventional memory available drivespace 3 also shipped windows 95 osr2 many features disabled unless plus also installed drivespace could also used fat32 making little use pcs large hard drives windows 98 shipped drivespace 3 part operating system functionality windows 95 plus removal real mode support fat32 going mainstream decreasing popularity drivespace drivespace windows limited support drivespace longer supported hard disk compression still supported reading writing compressed removable media although drivespace operation supported beside deleting reallocating compressed drives possible restore full function drivespace 3 unofficially windows copying executable file windows 98 installation using replace executable included windows one could compress new drives could windows 98 dmsdos linux kernel driver developed late 1990s support reading writing doublespace/drivespace disks however reading especially writing compressed filesystems reliable specific versions 2.0 2.1 2.2 versions kernel dr-dos supported disk compression technology originally based superstor later stacker novell dos 7 1993 higher introduced emulation undocumented pre-load api order provide seamless support doublespace well since dr-dos drivers dpms-enabled whereas ms-dos one offer advantages dr-dos users allowed easier coexistence migration due possibility shared use already existing compressed volumes multi-boot scenarios dr-dos 7.02 higher also added support drivespace 1998 | [
11270,
2568,
5643,
4624,
6674,
537,
8729,
540,
3102,
8227,
8740,
1577,
6697,
10281,
9780,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
8301,
622,
1647,
9839,
4210,
7796,
1656,
6265,
7290,
47... | Test |
6,507 | 7 | Abacus_Data_Systems:abacus data systems abacus data systems dba abacusnext american software private cloud services provider headquartered san diego california abacusnext offers following abacus private cloud private cloud sold desktop-as-a-service within windows server 2012 r2 environment service relies veeam software backup support built intel-based architecture private cloud service colocated across three carrier-neutral data centers interconnected via self-run optical network data centers scalematrix san diego california skybox houston one houston texas supernap switch las vegas nevada abacusnext offers four windows-based platforms rely relational database management system two law practice management software lawyers abacuslaw uses advantage database amicus attorney uses microsoft sql server.. abacusnext two platforms accounting firms rely microsoft sql server resultscrm customer relationship management quickbooks officetools practice management software december 2015 american private equity investment firm providence equity partners took strategic majority investment abacusnext abacus data systems time | [
9682,
4194,
8566,
11030
] | Test |
6,508 | 2 | Smeegol_Linux:smeegol linux smeegol linux new meego opensuse linux-based open source mobile operating system made available novell opensuse goblin team name smeegol linux linux distribution combines opensuse meego netbook oriented user interface get new linux distribution designed netbooks makes smeegol linux unique compared upstream meego opensuse distribution core based opensuse meego user experience well changes adding mono-based banshee media player networkmanager-powered network configuration newer version evolution express range social networking features facebook twitter myspace flickr digg plus firefox chromium web browsers already pre-installed end-users also build customized smeegol linux os using suse studio | [
7938,
5380,
7812,
8326,
11271,
4360,
4364,
4493,
6797,
2195,
11155,
1813,
10780,
6301,
1694,
4383,
3618,
3626,
4011,
9646,
7727,
3248,
5681,
7857,
823,
7483,
9660,
10817,
7492,
5067,
7246,
4305,
2259,
8147,
7253,
3542,
5078,
3162,
607,
10... | Train |
6,509 | 4 | Enhanced_privacy_ID:enhanced privacy id enhanced privacy id epid intel corporation ’ recommended algorithm attestation trusted system preserving privacy incorporated several intel chipsets since 2008 intel processors since 2011 rsac 2016 intel disclosed shipped 2.4b epid keys since 2008 epid complies international standards iso/iec 20008 20009 trusted computing group tcg tpm 2.0 authentication intel contributed epid intellectual property iso/iec rand-z terms intel recommending epid become standard across industry use authentication devices internet things iot december 2014 announced licensing technology third-party chip makers broadly enable use epid enhancement direct anonymous attestation daa algorithm daa digital signature algorithm supporting anonymity unlike traditional digital signature algorithms entity unique public verification key unique private signature key daa provides common group public verification key associated many typically millions unique private signature keys daa created device could prove external party kind device optionally software running device without needing provide device identity i.e. prove authentic member group without revealing member epid enhances daa providing additional utility able revoke private key given signature created key even key still unknown 1999 pentium iii added processor serial number psn way create identity security endpoints internet however privacy advocates especially concerned intel chose remove feature later versions building improving asymmetric cryptography time group keys intel labs researched standardized way get benefits psn preserving privacy three roles using epid issuer member verifier issuer entity issues unique epid private keys member group member entity trying prove membership group verifier entity checking epid signature establish whether signed entity device authentic member group current usage intel intel key generation facility issuer intel-based pc embedded epid key member server possibly running cloud verifier behalf party wishes know communicating trusted component device issuing epid key done directly issuer creating epid key delivering securely member blinded issuer know epid private key epid keys embedded devices ship advantage usages epid available inherently devices arrive field epid key issued using blinded protocol advantage usages since never question whether issuer knew epid key device option one epid key device time shipment use key prove another issuer valid device get issued different epid key using blinded issuing protocol recent years epid used attestation applications platforms used protected content streaming financial transactions also used attestation software guard extensions sgx released intel 2015 anticipated epid become prevalent iot inherent key distribution processor chip optional privacy benefits especially valued example usage epid prove device genuine device verifier wishing know part genuine would ask part sign cryptographic nonce epid key part would sign nonce also provide proof epid key revoked verifier checking validity signature proof would know part genuine epid proof anonymous unlinkable epid used attest platform securely stream digital rights management drm -protected content minimum level hardware security intel insider program uses epid platform attestation rights-holder data protection technology dpt transactions product 2-way authentication point sale pos terminal backend server based epid keys using hardware roots trust based epid authentication initial activation provisioning pos terminal securely performed remote server general epid used basis securely provision cryptographic key material air wire method securing iot epid used provide authentication also preserving privacy epid keys placed devices manufacturing ideal provisioning keys services device epid keys used devices services allowing users tracked iot devices using services yet required known transaction used application user choose require transaction unambiguously known e.g. financial transaction epid used persistent identity anonymity whereas alternative approaches exist persistent identity difficult convert persistent identity anonymous identity epid serve requirements enable anonymous identity mode operation enables persistence well thus epid ideal broad range anticipated iot uses security privacy foundational iot since iot security privacy extend beyond intel processors chipmaker processors sensors intel announced december 9 2014 intent license epid broadly chip manufacturers internet things applications august 18 2015 intel jointly announced licensing epid microchip atmel showed running microchip microcontroller intel developers forum internet things described network networks internal workings one network may appropriate disclose peer foreign network example use case involving redundant spare iot devices facilitates availability serviceability objectives network operations load balances replaces different devices need reflected peer foreign networks share device across network contexts peer expects particular type service data structure likely n't need know device failover replacement repair epid used share common public key certificate describes attests group similar devices used redundancy availability n't allow tracking specific device movements many cases peer networks want track movements would require potentially maintaining context involving multiple certificates device lifecycles privacy also consideration details device maintenance failover load balancing replacement inferred tracking authentication events epid privacy preserving properties ideal iot device identity allow device securely automatically onboard iot service immediately first power device essentially device performs secure boot anything else reaches across internet find iot service new owner chosen managing device epid attestation integral initial communication consequence epid attestation secure channel created device iot service epid attestation iot service knows talking real iot device using secure channel created reciprocal attestation iot device knows talking iot service new owner selected manage unlike pki key unchanging transaction transaction adversary lurking network see correlate traffic key used epid employed thus privacy onboarding preserved adversaries longer collect data create attack maps later use future iot device vulnerabilities discovered moreover additional keys securely provisioned air wire latest version software perhaps specific iot service downloaded default logins disabled secure iot device without operator intervention october 3rd 2017 intel announced intel® secure device onboard software solution help iot device manufacturers iot cloud services privately securely quickly onboard iot devices iot services objective onboard device iot platform superior onboarding experience ecosystem enablement roi | [
8674,
8302,
10831,
2416,
1941,
503,
1368,
7354
] | Test |
6,510 | 3 | Legacy_Plug_and_Play:legacy plug play term legacy plug play also shortened pnp describes series specifications microsoft windows features geared towards operating system configuration devices standards primarily aimed ibm pc standard bus later dubbed industry standard architecture isa related specifications also defined common external specialist busses commonly attached via isa time development including rs-232 parallel port devices windows feature plug play refers operating system functionality supports connectivity configuration management native plug play devices originally considered part feature set specifications plug play context refers primarily responsibilities interfaces associated windows driver development plug play allows detection devices without user intervention occasionally minor configuration device resources i/o ports device memory maps pnp specific set standards confused generic term plug play describes hardware specification alleviates need user configuration device resources plug play standard requires configuration devices handled system firmware provides details resources allocations operating system process invoked boot time computer first turned compatible devices identified assigned non-conflicting addresses interrupt request numbers term adopted microsoft reference windows 95 product operating systems amigaos autoconfig mac os nubus system already supported features time various names name even yggdrasil linux advertised plug play linux least 2 years windows 95 term plug play gradually became universal due worldwide acceptance windows typically non-pnp devices need identified computer bios setup pnp system reassign devices problems interactions legacy non-pnp devices pnp system cause fail leading technology historically referred plug pray legacy plug play defined microsoft intel specifications proposed changes legacy hardware well bios support operating system-bound discovery devices roles later assumed acpi standard also moves support power management configuration operating system opposed firmware previously required plug play bios apm specifications following standards compose microsoft describe legacy plug play opposed native plug-and-play specifications pci usb apart plug play bios specification standards still supported microsoft however support opposed advanced configuration power interface removed future version windows use plug play three requirements met plug-and-play hardware typically also requires sort id code supply order computer software correctly identify id code system integrated early industry standard architecture isa hardware common pcs plug play first introduced isa plug play caused greatest difficulties made pnp initially unreliable led derisive term plug pray since i/o addresses irq lines often set incorrectly early days later computer buses like mca eisa pci becoming industry standard time integrated functionality finally operating system computer needs able handle changes typically means looking interrupts bus saying configuration changed reading information bus locate happened older bus designs often required entire system read order locate changes time consuming lots devices modern designs use sort system either reduce eliminate hunt example usb uses hub system purpose change located os examines information device figure load appropriate device drivers order make work past all-or-nothing affair modern operating systems often include ability find proper driver internet install automatically | [
576,
11297,
10371,
3272,
6697,
1515,
780,
6797,
7983,
5457,
3250,
8561,
8625,
3445,
9686,
5368,
3548
] | Test |
6,511 | 2 | WQL:wql windows management instrumentation query language wql microsoft implementation cim query language cql query language common information model cim standard distributed management task force dmtf subset ansi standard sql minor semantic changes wql dedicated wmi designed perform queries cim repository retrieve information get event notifications example following wql query selects drives computer less 2 mb free space | [
4771,
10413,
11344,
1079,
6168
] | Test |
6,512 | 5 | Call_Admission_Control:call admission control call admission control cac prevents oversubscription voip networks used call set-up phase applies real-time media traffic opposed data traffic cac mechanisms complement distinct capabilities quality service tools protect voice traffic negative effects voice traffic keep excess voice traffic network since averts voice traffic congestion preventive congestion control procedure ensures enough bandwidth authorized flows integrated services rsvp reserve resources flow packets network using controlled-load service ensures call set supported cac rejects calls either insufficient cpu processing power upstream downstream traffic exceeds prespecified thresholds number calls handled exceeds specified limit connection admission control cac used prevent congestion connection-oriented protocols atm context several schemes available however voip differs uses rtp udp ip connectionless protocols | [
5472,
835,
9381,
2827,
5972,
11413,
10171
] | Test |
6,513 | 4 | AdGuard:adguard adguard line ad blocking privacy protection software comprises open-source shareware products protect microsoft windows linux os x android ios users unwanted ads pop-ups banners well tracking obscene content malware phishing cross-platform utility adguard also available extension widely used browsers mozilla firefox google chrome opera safari yandex.browser microsoft edge 5 million people reported using software 2018 adguard software limited founded 2009 based cyprus company products earned positive feedback several industry publications series policies google apple app stores occurred 2014 2018 impeded user access adguard mobile applications adguard products include several browser extensions server-side solutions including adguard developers taken non-commercial research order inform wider audiences user privacy cybersecurity data protection following issues notable cases involving developers | [
5536,
2818,
4326,
5254,
138,
5612,
6797,
2611,
823,
10392,
7515,
8413,
4830
] | None |
6,514 | 4 | Disaster_recovery:disaster recovery disaster recovery involves set policies tools procedures enable recovery continuation vital technology infrastructure systems following natural human-induced disaster disaster recovery focuses technology systems supporting critical business functions opposed business continuity involves keeping essential aspects business functioning despite significant disruptive events disaster recovery therefore considered subset business continuity service continuity itsc subset business continuity planning bcp encompasses disaster recovery planning wider resilience planning also incorporates elements infrastructure services relate communications voice telephony data communications itsc plan reflects recovery point objective rpo recent transactions recovery time objective rto time intervals planning includes arranging backup sites hot warm cold standby sites hardware needed continuity 2008 british standards institution launched specific standard connected supporting business continuity standard bs 25999 titled bs25777 specifically align computer continuity business continuity withdrawn following publication march 2011 iso/iec 27031 security techniques — guidelines information communication technology readiness business continuity itil defined terms recovery time objective rto targeted duration time service level within business process must restored disaster disruption order avoid unacceptable consequences associated break business continuity accepted business continuity planning methodology rto established business impact analysis bia owner process including identifying options time frames alternate manual workarounds good deal literature subject rto spoken complement recovery point objective rpo two metrics describing limits acceptable tolerable itsc performance terms time lost rto normal business process functioning terms data lost backed period time rpo respectively forbes overview noted recovery time actual rta critical metric business continuity disaster recovery rta established exercises actual events business continuity group times rehearsals actuals makes needed refinements recovery point objective rpo defined business continuity planning maximum targeted period data transactions might lost service due major incident rpo measured minutes even hours practice off-site mirrored backups must continuously maintained daily off-site backup tape suffice recovery instantaneous restore data/transactions period time goal without incurring significant risks significant losses rpo measures maximum time period recent data might permanently lost event major incident direct measure quantity loss instance bc plan restore last available backup rpo maximum interval backup safely vaulted offsite business impact analysis used determine rpo service rpo determined existent backup regime level preparation off-site data required period data might lost often starts near time beginning work prepare backups time backups taken off-site although data synchronization point point time timing performing physical backup must included one approach used halt processing update queue disk-to-disk copy made backup reflects earlier time copy operation data copied tape transmitted elsewhere rto rpo must take business risk account along major system design criteria rpo tied times backups sent offsite offsiting via synchronous copies offsite mirror allows unforeseen difficulty use physical transportation tapes transportable media comfortably covers backup needs relatively low cost recovery enacted predetermined site shared offsite space hardware completes package needed high volumes high value transaction data hardware split across two sites splitting across geographic areas adds resiliency planning disaster recovery information technology developed mid- late 1970s computer center managers began recognize dependence organizations computer systems time systems batch-oriented mainframes another offsite mainframe could loaded backup tapes pending recovery primary site downtime relatively less critical disaster recovery industry developed provide backup computer centers one earliest centers located sri lanka sungard availability services 1978 1980s 90s internal corporate timesharing online data entry real-time processing grew availability systems needed regulatory agencies became involved even rapid growth internet 2000s objectives 2 3 4 5 nines 99.999 often mandated high-availability solutions hot-site facilities sought service continuity essential many organizations implementation business continuity management bcm information security management icm part implementation operation information security management well business continuity management specified iso/iec 27001 iso 22301 respectively rise cloud computing since 2010 continues trend nowadays matters even less computing services physically served long network sufficiently reliable separate issue less concern since modern networks highly resilient design 'recovery service raas one security features benefits cloud computing promoted cloud security alliance disasters classified two broad categories first natural disasters floods hurricanes tornadoes earthquakes preventing natural disaster impossible risk management measures avoiding disaster-prone situations good planning help second category man-made disasters hazardous material spills infrastructure failure bio-terrorism disastrous bugs failed change implementations instances surveillance testing mitigation planning invaluable recent research supports idea implementing holistic pre-disaster planning approach cost-effective long run every 1 spent hazard mitigation disaster recovery plan saves society 4 response recovery costs 2015 disaster recovery statistics suggest downtime lasting one hour cost systems become increasingly critical smooth operation company arguably economy whole importance ensuring continued operation systems rapid recovery increased example companies major loss business data 43 never reopen 29 close within two years result preparation continuation recovery systems needs taken seriously involves significant investment time money aim ensuring minimal losses event disruptive event control measures steps mechanisms reduce eliminate various threats organizations different types measures included disaster recovery plan drp disaster recovery planning subset larger process known business continuity planning includes planning resumption applications data hardware electronic communications networking infrastructure business continuity plan bcp includes planning non-it related aspects key personnel facilities crisis communication reputation protection refer disaster recovery plan drp related infrastructure recovery continuity disaster recovery control measures classified following three types good disaster recovery plan measures dictate three types controls documented exercised regularly using so-called dr tests prior selecting disaster recovery strategy disaster recovery planner first refers organization business continuity plan indicate key metrics recovery point objective recovery time objective metrics business processes mapped systems infrastructure failure properly plan extend disaster impact metrics mapped organization reviews budget rto rpo metrics must fit available budget cost-benefit analysis often dictates disaster recovery measures implemented adding cloud-based backup benefits local offsite tape archiving new york times wrote adds layer data protection common strategies data protection include many cases organization may elect use outsourced disaster recovery provider provide stand-by site systems rather using remote facilities increasingly via cloud computing addition preparing need recover systems organizations also implement precautionary measures objective preventing disaster first place may include disaster recovery service draas arrangement third party although vendor lists published disaster recovery product even though several large hardware vendors developed mobile/modular offerings installed made operational short time | [
11393,
6019,
8195,
2693,
5384,
1801,
10120,
2965,
11157,
4505,
1314,
6692,
6565,
3366,
7979,
8875,
3757,
8239,
1840,
6834,
4154,
10303,
9665,
7874,
1990,
3450,
9678,
1362,
10711,
8792,
9184,
4194,
9828,
3692,
3181,
11250,
5491,
5370,
3323,
... | Test |
6,515 | 2 | History_of_IBM_CKD_Controllers:history ibm ckd controllers beginning 1964 system/360 announcement ibm mainframes initially accessed ckd count key data subsystems via channel connected separate storage control units scus attached direct access storage devices dasd typically hard disk drive practice continued ibm larger mainframes thru system/370 however low end systems generally used lower cost integrated attachments function scu combined channel typically called integrated file adapter system/360 selector channel followed system/370 block multiplexor channel could operate selector channel allow attachment legacy subsystems scu evolved director controller latter typically labelled a-unit a-box controller least one dasd physically a-unit integrated storage control isc director within cabinet ibm system director could attach one four a-units one conventional dasd labeled b-unit could attach a-unit following sections list order announcement ibm mainframe ckd storage controls categorized conventional storage controls director type storage controls integrated controls attaching a-unit storage control frequently called storage control unit attaches system/360 system/370 channel one logically separate devices control unit device comporting system/360 and/or system/370 input/output architecture since control unit attached devices logically distinct either busy i/o initiated either present ending status becomes free conventional dasd storage controls listed section different interfaces attached dasd unique dasd dasd family 1972 ibm introduced standard dasd control interface used director type storage controls ibm 2820 storage control unit scu connects one two selector channels attach one four 2301 drum storage units ibm 2841 storage control unit direct access storage device dasd control unit introduced system/360 first shipped 1965 offered least 1975 2841 microprogrammed control unit intended use controlling access disk strip file slow-speed drum storage unit connected one two standard system/360 channels could also attached ibm 1130 ibm 1800 data acquisition control system add support 2311 disks ibm 2841 storage control unit initially capable attaching combinations eight following dasd standard offering 2841 scu number 2311 dasd eight less eight units single type units intermixed example 2841 two 2303 drum storages supported six additional 2321 data cells features 2841 included two-channel switch file scan record overflow special features dasd devices introduced 2841 used different storage controls discussed following sections ibm 2314 family scus dasds scus connect one two selector channels attach one nine drives eight online plus one optional service drive accessible scu maintenance purposes model numbers reflect packaging differences otherwise versions 2314 family functionally models 2835 storage control connects one two block multiplexer channels attaches one two 2305 fixed head storage modules 3830 model 1 storage control unit connects one two four channels attach one eight 3330 dasd spindles 3380 model cj2 provides storage functions one 3380 dasd two devices storage control functions 3990 model two paths a-units single unit connects two four eight block multiplexor channels three 3380 b units models bj4 bk4 attached 3380 model cj2 providing head-of-storage-facility function 14 devices ibm storage control unit evolved director controller latter typically packaged labelled a-unit a-box controller least one dasd physically a-unit dasd unit without controller became known b-unit terms a-unit a-box b-unit initially used instead units containing controller dasds given product type numbers specifically 3333 a-unit containing 3330 dasd 3333-11 a-unit containing two double capacity 3330-11 dasds use suffixes b model number designate a-unit b-units began 3340 dasd 3340 model a2 3340 b2 respectively practice using digits suffix dasd model number represent type unit number dasd unit continued subsequent ckd dasd example 3380 model a4 one controller four access mechanisms one unit 3380 model aa4 two controllers four access mechanisms one unit 3380 model b4 four access mechanisms combination a-unit one optional b-units string string switch optional feature a-units allows controller a-unit switched two directors thereby providing additional paths string dasd 3830 model 2 storage control associated integrated storage controls announced august 1972 first instance storage control director a-units 3830-2 connects one two four block multiplexer channels attach combination four a-units i.e. combination 3333s 3340-a2s 3350-a2/a2fs maximum 32 physical drives 6 additional drives attached a-unit integrated storage control system/370 models 158 168 functions identically 3830-2 3830-3 attaches four 3333s 3350-a2/a2f/c2/c2fs additional functions support 3850 mass storage system 3350 drives used staging drives native mode integrated storage controller staging adapter functions identically 3830-3 ibm 3880 storage control models 1 2 3 two directors per cabinet director attach one two four eight block multiplexor channels model 4 one director attaches 3370 fba 3375 ckd strings storage director limited specific devices use diskettes storage director initialized attach exclusively one supported types strings first box string must a-unit remaining boxes must compatible b-units last 3350 3350 string 3350-c2 ibm allowed field upgrades among models 1 2 3 directors attach four intermixed 3330 3350 a-units four 3340 a-units two 3380 a-units 3380 storage control model 11 model 13 model 21 model 23 two directors director attach one two four block multiplexor channels large semiconductor buffers called subsystem storage added 3380 storage controls models 13 23 caching models 11 21 paging caching semiconductor buffers first introduced dasd ckd subsystems memorex 1978 storagetek 1981 3880 model 13 two caching storage directors access subsystem storage larger portion subsystem storage cache used store active data quick access smaller portion storage directory used locate data stored cache cache storage director attaches one two 3380 a-units turn attach three 3380 b-units total 16 devices 3380 dasd two actuators 3880 model 13 32 device addresses model 23 increased cache size somewhat improved performance otherwise performed functions paging well established computer dedicated ckd paging devices going back drums included s/360 announcement 1978 storagetek 4305 first ckd device using semiconductor memory paging 3880 model 11 two storage directors director 1 access subsystem storage paging director 2 nonpaging director 1 attaches one string eight 3350 dasds director 2 attaches combination one four 3330 a-units 3350 a-units a-unit attaching three additional b-units 32 dasds 3990 dual directors director attach four eight block multiplexor channels characteristics specific models include model 1 field upgraded model 2 3 model 6 improved reliability availability serviceability otherwise functionally model 3 january 4 1968 ibm announced system 360 model 25 included disk attachment control dac attaching four 2311 dasd integrated attachment simulates channel storage control unit cpu attached 2311 units merging functions dac eliminates need channel separate storage control differences 2311 connected 2841 scu one connected dac september 23 1970 ibm announced part system/370 model 145 new integrated file adapter along new 2319-a1 dasd march 8 1981 support 2319-a1 announced integrated file adapter part announcement system/370 model 135 2319-a1 contained three 2314 class disk drives plus piece storage control system unit conventional 2314 type dasd e.g. 2312 2313 and/or 2318 could attached 2319-a1 since could connect director type storage control 2319-a1 a-unit term came used ibm direct attachment 3333/3330 dasd subsystem 3340 dasf subsystem 3340/3344 das subsystem 3125-2 provided depending model features 16 spindles attached 3340 subsystem 3340 mdl a2 attached 3340 drives shared another s/370 except 3115-0 3125-0 via string switch capability 9315 direct attachment 3340 dasf subsystem 3340/3344 das subsystem 3115-2 provided depending model feature eight drives attached 3340 dasf subsystem via string switch feature 9315 3340 model a2 shared another s/370 except 3115-0 3125-0 one two 3330 3340 a-units attached integrated file adapter s/370 model 138 three appropriate b-units may attached a-unit 3344 b-units installed may installed first two possible strings three 3340 and/or 3344 b-units combination one two dasd adapters available depending upon model attachment one 3340 a-unit three additional 3340 3344 b-units providing eight devices string switch feature 3340 a-unit allows sharing 3340/3344 dasd another ibm processor director supports a-units string switching four 3340 a-units attached optional dasd adapter 3340 a-unit attached one three 3340 b-units 3344 b-units total 32 dasd four strings eight string switch feature 3340 a-unit allows sharing 3340/3344 dasd another ibm processor director supports a-units string switching | [
2339,
7173,
7881,
10508,
5840,
663
] | Test |
6,516 | 4 | International_Computer_Security_Association:international computer security association icsa labs international computer security association began ncsa national computer security association mission increase awareness need computer security provide education various security products technologies early days ncsa focused almost solely certification anti-virus software using consortia model ncsa worked together anti-virus software vendors develop one first anti-virus software certification schemes past decade organization added certification programs security-related products changed name icsa verizon business providing resources research intelligence certification testing products including anti-virus firewall ipsec vpn cryptography ssl vpn network ips anti-spyware pc firewall products | [
4421,
2213,
8998,
10278,
6985,
11021,
4464,
4435,
5749,
4247,
3962,
3742,
8703
] | Validation |
6,517 | 4 | Certified_Server_Validation:certified server validation certified server validation csv technical method email authentication intended fight spam focus smtp helo-identity mail transfer agents csv designed address problems marid asrg defined detail intent lightweight mta authentication protocol lmap expired asrg draft january 3 2007 internet drafts expired mailing list closed since traffic 6 months csv considers two questions start smtp session csv answers questions follows validate smtp session unknown sending smtp client using csv receiving smtp server level trust high enough process email session traditional manner delivering forwarding without need validation level trust low return error showing reason trusting sending smtp client level trust document result header email delivered forwarded and/or perform additional checks answers questions top article 'yes receivers expect email received email want mail sources motivated make answers yes easy unless email flow toxic reputable independent accreditation service vouch csv designed efficient elegant respect certainly beats spf coverage helo identities client smtp authorization csa proposed mechanism whereby domain admin advertise mail servers legitimate originators mail his/her domain done providing appropriate srv rrs dns infrastructure | [
8202,
10578,
9532,
9909
] | Test |
6,518 | 6 | OpenSFS:opensfs open scalable file systems inc. opensfs nonprofit organization promoting lustre file system opensfs founded 2010 ensure lustre remains vendor-neutral open free lustre high-performance parallel file system deployed computational data centers including many top500 systems first started development 1999 accelerated strategic computing initiative path forward project initially released 2003 september 2007 sun microsystems acquired assets cluster file systems inc acquired oracle corporation 2010 announcements oracle 2010 lustre user group ongoing development lustre open-source project question prompting lustre developers leave oracle opensfs founded october 2010 steward open source software lustre community founding members cray datadirect networks lawrence livermore national laboratory oak ridge national laboratory april 2013 norman morse ceo since founded resigned replaced galen shipman ornl 2015 charlie carrol cray replaced shipman chairman lustre bof supercomuting'16 stephen simms announced stewardship opensfs transferred remaining board members cray intel seagate become user-driven organization simms assumed role interim president board elections lug 2017 2011 lustre 2.1 first community release endorsed opensfs opensfs began direct funding community releases early 2012 focused introducing new features targeted every six months maintenance releases targeted every three months opensfs solicited proposals february 2013 lustre feature development parallel file system tools addressing lustre technical issues parallel file system incubators opensfs-funded releases included lustre 2.5 october 2013 containing lustre+hsm integration capability opensfs established lustre community portal support open source community since 2011 opensfs charge organizing annual lustre user group lug event traditionally held april discussion seminars lustre opensfs held first annual apac lustre users group events china japan 2013 | [
3328,
9665,
7432,
2135,
1823
] | Test |
6,519 | 6 | List_of_cryptographic_file_systems:list cryptographic file systems list filesystems support filesystem-level encryption confused full-disk encryption | [
5120,
2050,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
7225,
11323,
9281,
8772,
1109,
8283,
4708,
9836,
7789,
5749,
9333,
6263,
9335,
9343,
4746,
7818,
8331,
6797,
654,
2193,
2194,
2197,
2199,
11419,
6309,
11... | Test |
6,520 | 4 | Nimda:nimda nimda malicious file infecting computer worm quickly spread surpassing economic damage caused previous outbreaks code red first released advisory thread worm released september 18 2001 due release date exactly one week attacks world trade center pentagon media quickly began speculating link virus al qaeda though theory ended proving unfounded nimda affected user workstations clients running windows 95 98 nt 2000 xp servers running windows nt 2000 worm name origin comes reversed spelling admin f-secure found text concept virus cv v.5 copyright c 2001 r.p.china nimda code suggesting country origin nimda effective partially it—unlike infamous malware like code red—uses five different infection vectors | [
3072,
5636,
4490,
3852,
6797,
3473,
3867,
2461,
9630,
8363,
10872,
7983,
3250,
10297,
9537,
4439,
1113,
7515,
4830,
5087,
4063,
2147,
1381,
1254,
8045,
4462,
9591,
3704,
2041
] | None |
6,521 | 1 | Btrieve:btrieve btrieve transactional database navigational database software product based indexed sequential access method isam way storing data fast retrieval several versions product dos linux older versions microsoft windows 32-bit ibm os/2 novell netware originally record manager published softcraft btrieve written doug woodward nancy woodward initial funding provided part doug brother loyd woodward around time release first ibm pcs doug received 50 company wedding gift later purchased remainder brother gaining market share popularity acquired doug nancy woodward novell 1987 integration netware operating system addition continuing dos version product gained significant market share database embedded mid-market applications addition embedded every copy netware 2.x 3.x 4.x since available every netware network reorganization within novell decided 1994 spin product technology doug nancy woodward along ron harris developed new company known btrieve technologies inc. bti btrieve modularized starting version 6.15 became one two database front-ends plugged standard software interface called micro-kernel database engine btrieve front-end supported btrieve api front-end called scalable sql relational database product based upon mkde used variety structured query language otherwise known sql versions released btrieve 6.15 scalablesql v4 company renamed pervasive software prior ipo shortly thereafter btrieve scalablesql products combined products known sold pervasive.sql psql btrieve continued years scalablesql quickly dropped customers encouraged upgrade pervasive.sql supported sql btrieve applications btrieve relational database management system rdbms early descriptions btrieve referred record manager though pervasive initially used term navigational database later changed transactional database deals underlying record creation data retrieval record updating data deletion primitives uses isam underlying indexing storage mechanism key part pervasive architecture use microkernel database engine allows different database backends modularised integrated easily dbms package pervasive.sql enabled support btrieve navigational database engine sql-based engine scalable sql current versions btrieve support system transactions user transactions system transactions bundle non-transactional operations and/or user transactions whereas user transactions transactions work actual data database system transactions developed allow multiple transactions done batch make data recovery easier btrieve file format consists entirely pages data move memory storage engine performs i/o operation versions prior 6.0 merely used data pages index pages file control record fcr file index searching linked physical pages beginning version 6.0 logical pages used logical mapped physical pages pages fixed location file disk page allocation tables pats fcr record contains important information btrieve files number pages current use avoid database corruption btrieve uses two methods updating records pre-image paging btrieve versions 6.0 shadow paging subsequent versions primarily change-over pre-image paging shadow-paging necessitated radical file format changes caused compatibility issues version 6 previous versions btrieve owned developed four different companies softcraft novell btrieve technologies inc. later renamed pervasive software actian corporation committed loyal developer-base according company literature remain fully committed product pervasive software set btrieve society recognise existing developers dos btrieve version 5 terminate-and-stay-resident program functioned application programming interface api database engine supplying applications programs function calls implement multi-user database record locking network version worked similar way early years dos versions version 5 sold relatively high price order usd 1,000 executable terminate-and-stay-resident tsr database engine file could distributed applications without payment license fee product launched february 1982 softcraft firm located austin texas doug nancy woodward doug became vice-president handled software development nancy became president company released number versions next years february 1983 released btrieve 2.x series ms-dos 2.0 developed support file directory handles released btrieve 3.0 ms-dos 3.1 standardised internal interfaces march 1985 released btrieve 3.1 c/s one month later network client/server support february 1986 btrieve 4.0 released 4.1 upgrade released gained support extended key types supplemental indexes although btrieve fairly popular api database engine killer-app database manager pc dbase ii successors database management systems dbms could used either free-standing general-purpose application database programming language btrieve also expensive dbase although run-time licensing free charge btrieve grew developer base 5,000 users widely used financial area company took time create user-interface product however 1984 released xtrieve menu-driven program used new .ddf data dictionary enforce relational database rules 1987 novell started diversifying buying companies add netware operating system one companies purchased softcraft nancy woodward became vice-president general manager novell austin operations doug woodward became vice-president advanced database technologies early next year btrieve 5.0 released run native netware application vap value added process according jim kyle auto-increment key types brouter network process server data-only key-only files optional data compression version 5.1 released 1990 increased file-handling transaction capability logging roll-forward operations along several api enhancements several versions created dos os/2 microsoft windows version 6.0 released june 1992 however promoted extensively novell due enhancements change pre-imaging shadow-paging incompatible previous versions btrieve market increase much btrieve see wide adoption due issues company acquired novell softcraft working product called xql sql interpreter designed better deal industry standard sql xtrieve package fully compliant became basis netware sql initially released 1989 bare-bones sql interpreter implemented base ibm version sql 1994 novell largely given attempting make netware complete alternative operating system started selling many companies acquired years earlier minimally promoted btrieve largely due delay 24 months releasing version 6 negotiations woodward novell entered two years novell announced 26 jan 1994 going transfer ownership btrieve btrieve technologies incorporated also known bti 29 april 1994 transfer completed nancy woodward became chairman bti doug woodward made chief technical officer ceo position given ron harris former employee texas instruments one founding employees citrix systems inc. employed first director strategic planning vice-president marketing finally product group vice president btrieve totally rewritten 1 july 1994 btrieve 6.15 dos windows os/2 released novell sql renamed scalable sql reflecting change ownership company 1995 version 6.15 released novell netware windows nt server windows nt/95 thus became cross-platform database product concept micro kernel database engine mkde introduced version 1996 company renamed pervasive software product pervasive.sql 1997 company went public order allow greater penetration relational database market re-align sql vendor though still marketing developing btrieve pervasive completed ipo september company continued using mkde version 6.30 1997 pervasive released scalablesql 4.0 relational database product btrieve 7.0 2000 novell criticized ceased bundling pervasive.sql netware 5.1 first version affected instead shipped trial version shut 90 days latest version pervasive psql summit v11 released september 2010 2013 actian corporation acquired pervasive software february 2016 actian released btrieve 12 one dos client-based configuration btrieve created softcraft softcraft definition client-based version btrieve engine running particular workstation meant record-management engine connected directly files via operating system functions modified records accordingly whether files local network client-based engine allowed five concurrent users access database one time record processing done workstation engine installed btrieve dos used sefs mefs modes file sharing btrieve netware essentially btrieve dos extra features available netware time ran server process called codice_1 file-sharing server managed data i/o conjunction network file system server process first implemented netware value added process vap called codice_2 switched netware netware loadable module nlm soon codice_1 database engine dealt access records however also accepted requests transmission requested data another server via codice_4 process btrieve used requesters make database i/o requests client workstation requesters available dos os/2 microsoft windows unixware program codice_5 accepted i/o requests via btrieve api relayed codice_1 handled responses codice_1 relayed back appropriate application codice_4 process allowed incoming requests routed copy database another server loaded netware server dealt communication multiple server processes running file-server use two file server tables fsts according pervasive provide list server names addresses server routing table srt brouter also enabled communication requests routed correct server via spx looking codice_9 nlm coordinated locks mechanisms controlled access data btrieve database btrieve dos used sefs mefs modes file sharing able run network able use exclusive concurrent transactions btrieve windows created company rewrote codebase use mkde featured sefs mefs file sharing mechanisms used shadow-paging allowed exclusive concurrent locks handled version 6.x 6.1 files differently version 6.x files could handle operations part record rather locking entire record handled records larger 64kb implemented vats acss new data types allowed percentage operations record could located manipulated physical location file handled duplicate keys version 6.x capable dropping adding index fly version 6.0 could drop supplemental indexes version 6.1 files allowed concurrent system transactions optional renumbering keys case insensitive acs tables enhanced locking operations btrieve windows could run client database utilized sefs mefs modes could directly access btrieve server client-based version btrieve database files either directly local computer via mapped network drive set via dos codice_10 command applications make function call codice_11 loader requester interface loader requester module verify codice_12 configuration file correctly set load client-based btrieve engine turn loads local interface btrieve engine codice_13 necessary local interface loads btrieve engine codice_14 memory sends necessary database requests database engine calls various win32 system libraries perform file operations database files client-based version btrieve windows could access server-based versions btrieve via dos-based requester requestor required use dos protected mode interface dpmi allowed program access dos extended memory accessible via cpu protected mode client-based interface btrieve-based application makes call codice_11 loader requester interface library library checks codice_12 file see needs access data local system whether needs access data remote server needs access server uses windows version dpmi access dos-based requester named codice_5 requester establishes network connection server processes request passes back message requester database request completed btrieve windows nt windows 95 released 1995 along btrieve netware btrieve windows nt server reached version 6.15 started using mkde file sharing mechanisms remained still used sefs mefs file sharing modes shadow-paging allowed exclusive concurrent locks version btrieve allowed null values keys meant record could entered database information key available meant key would included index helped decrease unnecessary searching database via index also introduced concept system transaction user transaction see system user transactions mkde also allowed gaps auto-incremented keys variable-tail allocation tables introduced version 6.15 included windows nt/95 build btrieve two configurations btrieve windows nt/95 standalone workstation client/server using standalone workstation configuration btrieve processing records done local workstation workstation relies underlying mechanisms windows allow mkde codice_18 program gain direct access database files uses lock files deal concurrency issues configuration application makes calls btrieve api microkernel interface codice_19 call processed interface passed mkde codice_18 uses underlying operating system file system whether network local directly access database files leads peculiar issues btrieve uses windows file sharing database engine open files directly file share instance network instability e.g network cable disconnected update fields used link one btrieve file another become unsynchronized intents purposes data loses relationships links data database file get corrupted though chance reduced due pre-image paging using client/server server edition configuration btrieve processing records generally done windows file server via mapped drive way mapping file share virtual disk drive windows via codice_10 command utilises permissions assigned authenticating either log-on permissions permissions given codice_10 utilized windows 95 mkde interface windows dynamic link library dll called codice_19 determines database access method use via configuration file detects client/server workstation engines installed machine checks whether target set workstation server running windows nt server process codice_24 running along standalone workstation process codice_18 looks registry determine target server workstation cases mkde interface set workstation standalone workstation configuration uses mkde codice_18 access file directly set server mkde interface client uses communications module windows 95 codice_27 windows nt codice_28 talks server server matching communications module either codice_27 codice_28 resides mapped drive server dll communicates server mkde codice_24 updates records sends confirmation operation succeeded back communications module client advantage system network connection failure occurs mkde server able detect recover graceful manner workstation configuration able configuration utility included btrieve alter mkde settings settings could changed pervasive.sql 7 released march 1998 included scalable sql 4 btrieve 7.0 btrieve 7.0 ran platforms btrieve 6.x windows 95 windows nt 3.51 4 netware dos however company changed component-based architecture called smartcomponents resolve compatibility issues upgrades used component identification scheme embedded file encoded file name along dynamic binding glue files dlls loaded memory needed dynamic binding components done using new abstract os services dll looked latest version appropriate needed component via file name encoding glue module loaded memory used old log file format btrieve 6.x also replaced new centralised log called codice_32 unified enhanced log file format also improved error messages error message reporting mechanisms mkde retained pervasive.sql 7 however due new component architecture dynamic binding internal architecture modified application using btrieve calls services manager searches various configured directories specific encoded filename file name loaded btrieve files backus–naur form glue module dll loaded memory becomes interface mkde mkde determines whether configured workstation-based configuration server-based configuration passes requests via communications requester module onto database server directly modifies database files configured workstation mode pervasive.sql 2000 pervasive.sql 2000i uses essentially architecture pervasive.sql 7 though 2000i includes i*net server uses component model ability use btrieve scalable sql engines continues using mkde version included support red hat linux caldera openlinux suse solaris also better integration terminal services though one instance database engine may run terminal server platform run separate copies database engine within two terminal sessions introduced december 2002 pervasive.sql v8 improves performance btrieve sql applications using number new technologies v8 security feature pack mid-release product update designated 8.5 added important new security features designed lock pervasive.sql data files prior 8.5 access btrieve data controlled operating system security mechanism meant user needed read/write access database also needed read/write access underlying data files 8.5 introduced new security models allow administrators control access btrieve data using database security activated database security longer requires user access underlying files addition client/server configurations longer require use network shares mapped drives applications reference secure btrieve data using uri connection string pervasive psql v9 includes new java guis built eclipse framework guis available microsoft windows linux addition v9 included many sql performance syntax updates improving speed flexibility sql interfaces ado.net jdbc odbc ole db finally psql v9 expanded btrieve maximum file size 64gb 8.x earlier file formats 128 gb 9.0 format files 256gb files 9.5 file format conjunction psql v9 pervasive reintroduced ddf builder utility added support text searching full text search fts add-on later removed product line ddf builder provides mechanism btrieve users define meta data existing btrieve files thus allowing btrieve data accessible via sql tools utilities versions mkde retain full backward read-level compatibility earlier versions btrieve including pre-date introduction mkde change file version unless specifically requested btrieve files 5.x older file formats must rebuilt using gui command line rebuild utilities 6.x newer format support database writes 9.0 newer database engine pervasive psql v10 released september 2007 first version pervasive psql server client provide support 64-bit operating systems btrieve api distributing tuning interface dti enhanced support 64-bit pervasive psql workgroup components sdk enhanced 64-bit support release pervasive psql v10 timed offer support newly available windows vista soon arrive windows server 2008 operating systems pervasive psql v10 server workgroup client support windows vista pervasive psql v10 server certified windows server 2008 also included pervasive psql v10 xtreme i/o xio 32-bit windows database accelerator enabled access extended memory expand database cached past normal 2gb limit 32-bit windows systems xio also included update compression algorithms streamlined writing techniques improve database i/o performance digital license enforcement called product authorization introduced pervasive psql product line pervasive psql v10 product authorization initially implemented trial downloads e-commerce orders products sold pervasive distributor isv partners upgrade include product authorization release pervasive psql v10 sp3 november 2009 pervasive psql v10 sp3 also released windows 7 compatible application pervasive psql v10 retained backward compatibility using 9.5 file format increase maximum data file size 256gb increase maximum page size 16,384 bytes support netware windows nt windows 98 windows dos 6.22 16-bit applications dropped pervasive psql v10 although windows linux versions pervasive psql v9 products longer sold pervasive still sells supports pervasive psql v9 netware 2010 pervasive software released pervasive psql v11 allows users take full advantage multithreading faster database processing pervasive psql v11 released september 2010 one key drivers engineering effort behind pervasive psql v11 redesign database engine increase performance scalability multi-core cpu pervasive psql v11 optimizes parallel threads performing similar activities allowing database engage multiple cores task execution psql v11 also provides enhancements low-level synchronization mechanisms navigational interface multiple users read cached file pages simultaneously operations proceed independent cores non-user activity checkpoints log management run separate cores multiple users accessing independent files proceed different cores multi-core support available versions psql v11 32- 64-bit windows linux servers 32-bit workgroup internal testing pervasive documented performance increases 300 comparing psql v10 psql v11 8-core server running microsoft 2008 enterprise server sp2 64-bit ipv6 support windows included pervsive psql v11 continued support ipv4 environments pervasive psql v11 supports ipv6 btrieve dti distributed tuning interface access methods 64-bit server versions psql v11 include 64-bit relational/sql engine well 64-bit navigational/btrieve engine along 64-bit odbc driver driver installed 64-bit versions psql server psql client pervasive updated psql software development kit addition pervasive psql ado.net data provider 3.5 data provider 3.5 compliant .net framework versions 2.0 3.0 3.5 3.5 sp1 4.0 runs .net framework 4.0 support entity framework 1.0 features pervasive psql v11 also updated pdac pervasive direct access components access method support embardacero rad studio 2009 rad studio 2010 product authorization extended pervasive psql v11 include oem customers along introduction web-based portal oem generate keys manage licenses psql v11 telephone authorization method authorizing pervasive psql without requiring internet connection first introduced psql v11 made available pervasive customers pervasive psql v11 continues 9.5 file format maintaining backward compatibility previous releases support windows 2000 dropped pervasive psql v11 pervasive offers number add-on products extend basic features psql dbms latest versions products auditmaster v7 backup agent v3 dataexchange v4 released december 2010 february 2016 actian announced btrieve 12 actian say btrieve 12 new features compatible microsoft windows vista 10 windows server 2008 2012 file format api compatible btrieve 6.15 allowing read write btrieve 6.15 files earlier 16-bit dos applications | [
9353,
6797,
8976,
5401,
3487,
9762,
7204,
10413,
7983,
178,
823,
10560,
9286,
8393,
9166,
3791,
5470,
1247,
736,
5220,
5612,
4598,
5371
] | None |
6,522 | 7 | Message_broker:message broker message broker also known integration broker interface engine intermediary computer program module translates message formal messaging protocol sender formal messaging protocol receiver message brokers elements telecommunication computer networks software applications communicate exchanging formally-defined messages message brokers building block message-oriented middleware mom typically replacement traditional middleware like mom remote procedure call rpc message broker architectural pattern message validation transformation routing mediates communication among applications minimizing mutual awareness applications order able exchange messages effectively implementing decoupling primary purpose broker take incoming messages applications perform action message brokers decouple end-points meet specific non-functional requirements facilitate reuse intermediary functions example message broker may used manage workload queue message queue multiple receivers providing reliable storage guaranteed message delivery perhaps transaction management following represent examples actions might handled broker message brokers generally based one two fundamental architectures hub-and-spoke message bus first central server acts mechanism provides integration services whereas latter message broker communication backbone distributed service acts bus additionally scalable multi-hub approach used integrate multiple brokers | [
1280,
9225,
1935,
3983,
9365,
5403,
1435,
11038,
8100,
10020,
8751,
7347,
3894,
10565,
6483,
7256,
5210,
349,
9441,
9455,
10236
] | None |
6,523 | 4 | Shinken_(software):shinken software shinken open source computer system network monitoring software application compatible nagios watches hosts services gathers performance data alerts users error conditions occur conditions clear shinken architecture aims offer easier load balancing high availability administrator manages single configuration system automatically cuts parts dispatches worker nodes takes name functionality shinken japanese sword shinken written jean gabès proof concept new nagios architecture believing new implementation faster flexible old c code proposed new development branch nagios 4 proposal turned nagios authors shinken became independent network monitoring software application compatible nagios shinken designed run operating systems python runs development environment linux also runs well unix variants windows reactionner process responsible sending notifications also run android os free software licensed terms affero general public license published free software foundation shinken installation consists several processes optimized specific task multiple instances type process either single host spread many hosts adding processes automatically distributes load shinken webui builtin web interface provides near real time status information configuration interaction dashboard visualize trending data graphite databases visualization dependency tree graphs shinken skonfui independent web front-end used manage discovery process configuration tasks shinken-admin cli script used manage runtime process level aspects system changing logging levels getting health reports install.sh cli script main management script install remove update shinken associated software shinken open test-driven development approach contributors project providing new features code refactoring code quality bug fixing source code hosted github integration server runs tests commit depth tests regular intervals shinken documentation hosted wiki | [
8582,
6797,
3218,
5397,
5402,
6555,
9245,
4771,
3629,
7983,
9909,
823,
1211,
4797,
3007,
7364,
8644,
11221,
10462,
10341,
8554,
1776,
5492,
2045
] | Test |
6,524 | 5 | TCP_Vegas:tcp vegas tcp vegas tcp congestion avoidance algorithm emphasizes packet delay rather packet loss signal help determine rate send packets developed university arizona lawrence brakmo larry l. peterson introduced 1994 tcp vegas detects congestion incipient stage based increasing round-trip time rtt values packets connection unlike flavors reno new reno etc. detect congestion actually happened via packet loss algorithm depends heavily accurate calculation base rtt value small throughput connection less bandwidth available value large overrun connection lot research going regarding fairness provided linear increase/decrease mechanism congestion control vegas one interesting caveat vegas inter-operated versions like reno case performance vegas degrades vegas reduces sending rate reno detects congestion early hence gives greater bandwidth co-existing tcp reno flows tcp vegas one several flavors tcp congestion avoidance algorithms one series efforts tcp tuning adapt congestion control system behaviors new challenges faced increases available bandwidth internet components networks like internet2 tcp vegas implemented linux kernel freebsd possibly operating systems well | [
10242,
10115,
3847,
649,
9868,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
2079,
10271,
9380,
2085,
9381,
3751,
3752,
1835,
10924,
7983,
562,
2996,
9909,
10171,
3133,
3006,
4797,
5181,
5437,
9021,
7364,
2887,
8391,
8265,
2509,
4687,
5843,
... | Test |
6,525 | 2 | Frédéric_Lepied:frédéric lepied frédéric lepied born 1967 french computer engineer cto mandriva january 2006 born 1967 frédéric lepied took early interest computer science educated bréguet school noisy-le-grand france 1999 joined mandrakesoft research development team known author rpmlint rpm packages checker similar debian lintian program maintainer several core packages including xfree86 initscripts time wrote o'reilly book cvs 2000 maintained wacom tablet driver xfree86 x.org 2001 spent one year canada mandrakesoft montreal office became mandrakesoft cto came back france 2002 frédéric lepied left mandriva february 3 2006 joined intel corporation manage software manufacturers relationships late 2008 joined splitted desktop systems innovative hardware company chief strategy 2013 became vp software engineering enovance joining red hat 2015 | [
5096,
1668,
10192,
9455
] | Test |
6,526 | 7 | Toast,_Inc.:toast inc. toast inc. cloud-based restaurant software company based boston massachusetts company provides restaurant management point sale pos system built android operating system toast founded cambridge massachusetts 2012 steve fredette aman narang jonathan grimm 2016 toast received 30 million round series b funding bessemer venture partners gv formerly google ventures toast used thousands restaurants small cafes nationwide enterprises across u.s. toast founders steve fredette aman narang jonathan grimm met software company endeca graduating mit cambridge endeca acquired oracle 2011 left start toast grimm narang fredette initially created consumer app centered mobile payments customer loyalty promotions social aspects integrated restaurants ’ existing pos systems company started realize restaurants far needs able accept payments using phone tablet company pivoted full restaurant technology platform solutions pos online ordering gift cards analytics features two years later company signed 1,000 merchants across united states grew 120 employees requiring company upgrade space 7,000 square feet cambridge 40,000 square feet hatch fenway co-working space 2013 toast received investments several boston executives including former ceo endeca steve papa serves board member company early 2015 toast announced chris comparato chief executive officer comparato previously served senior vice president customer success acquia senior vice president worldwide customer solutions endeca august toast announced signed 1,000 customers two years revealing 550 year-over-year growth november toast released first restaurant report analyzed market restaurant technology well restaurant owners ’ challenges preferred technology features january 2016 toast received 30 million round series b funding bessemer venture partners gv previously known google ventures alphabet company funding led bvp partner kent bennett general partner android co-founder rich miner several undisclosed investors also participated round february 2018 needham-based tripadvisor partnered toast inc july 2018 company became one unicorn startup companies series round financing raising 115 million valuing company 1.4 billion first quarter 2019 company raised 250 million based valuation 2.7 billion equity raise led tcv tiger global management july 2019 toast acquired chicago-based human resources payroll software company stratex company also said would add additional 1,000 employees 2019 toast restaurant management system operates android operating system backend managed via mobile device via web browser real-time associated hardware includes receipt printer cash drawer kitchen display screen magstripe card reader 2015 merchant maverick named toast one best pos systems pizza parlors 2016 toast recognized notable player restaurant technology landscape pymnts.com may 2016 new england venture capital association nevca named toast winner hottest startup a+ 2016 nevy awards | [] | Test |
6,527 | 9 | Exception_safety:exception safety exception safety guarantees originally formalized david abrahams set contractual guidelines class library implementers clients use reasoning exception handling safety programming language uses exceptions particularly c++ several levels exception safety decreasing order safety usually least basic exception safety required write robust code languages higher levels safety sometimes difficult achieve might incur overhead due extra copying key mechanism exception safety codice_1 clause similar exception handling syntax ensure certain code always run block exited including exceptions several languages constructs simplify notably using dispose pattern named codice_2 codice_3 codice_4-with-resources consider smart vector type c++ java item added vector vector must actually add internal list objects update count field says many objects may also need allocate new memory existing capacity n't sufficient exception safety alternatives | [
7274,
716,
4592,
348,
8382
] | Test |
6,528 | 5 | Links_(web_browser):links web browser links open source text graphic web browser pull-down menu system renders complex pages partial html 4.0 support including tables frames support multiple character sets utf-8 supports color monochrome terminals allows horizontal scrolling intended users want retain many typical elements graphical user interfaces pop-up windows menus etc text-only environment original version links developed mikuláš patočka czech republic group twibright labs later developed version 2 links browser displays graphics renders fonts different sizes spatial anti-aliasing support javascript used version 2.1pre28 resulting browser fast display many pages intended graphical mode works even unix systems without x window system window environment using either svgalib framebuffer system graphics card graphics stack several peculiarities unusual web browser fonts displayed links derived system compiled binary grayscale bitmaps portable network graphics png format allows browser one executable file independent system libraries however increases size executable 5 mb fonts anti-aliased without hinting small line pitch artificial sharpening employed increase legibility subpixel sampling increases legibility lcd displays allowed links anti-aliased fonts time anti-aliased font libraries uncommon graphic elements images text first converted given gamma space according known assumed gamma information png jpeg etc known user gamma setting 48 bits per pixel photometrically linear space resampled bilinear resampling target size possibly taking aspect ratio correction account data passed high-performance restartable dithering engine used regardless monitor bit depth i.e. also 24 bits per pixel colour floyd-steinberg dithering engine takes account gamma characteristics monitor uses 768 kib dithering tables avoid time expensive calculations technique similar self-modifying code function templates used maximize speed dithering engine without using assembly language optimization non-portable images scaled also use subpixel sampling lcd increase level detail reason high quality processing provide proper realistic sampling images photorealistic display regardless monitor gamma without colour fringing caused 8-bit gamma correction built x server also increases perceived colour depth 24 bits per pixel links graphics drivers x server linux framebuffer svgalib os/2 pmshell atheos gui allows run graphics mode even platforms n't x server experimental/enhanced links elinks fork links led petr baudis based links 0.9 open development incorporates patches links versions additional extension scripting lua internet users hacked links another version links browser merged elinks features links 2 andrey mirtchovski ported plan 9 bell labs considered good browser operating system though users complained inability cut paste plan 9 snarf buffer last release hacked links july 9 2003 changes unreleased links also ported run sony psp platform pspradio rafael cabezas last version 2.1pre23_psp_r1261 released february 6 2007 beos port updated françois revol also added gui support also runs haiku | [
513,
6657,
9736,
2579,
6171,
9757,
7713,
10791,
9770,
559,
4661,
3639,
10808,
3643,
9275,
64,
5707,
10834,
6231,
8281,
6747,
1642,
9834,
9841,
115,
9843,
4728,
637,
1664,
2182,
10910,
8351,
4777,
7340,
9394,
9908,
185,
11449,
4797,
11466,... | Train |
6,529 | 2 | Time-sharing_system_evolution:time-sharing system evolution article covers evolution time-sharing systems providing links major early time-sharing operating systems showing subsequent evolution time-sharing developed late 1950s realization single expensive computer could efficiently utilized multitasking multiprogramming operating system allowed multiple users simultaneous interactive access typically individual user would enter bursts information followed long pauses group users working time pauses one user would filled activity others similarly small slices time spent waiting disk tape network input could granted users given optimal group size overall process could efficient user would use computer terminal initially electromechanical teleprinters teletype model 33 asr friden flexowriter 1970 progressively superseded crt-based units dec vt05 datapoint 2200 lear siegler adm-3a terminals initially linked nearby computer via current loop serial cables conventional telegraph circuits provided ptts specialist digital leased lines t1 modems bell 103 successors allowed remote higher-speed use analogue voice telephone network see details additional systems table relationships shown purpose grouping entries reflect influences e.g. os/2 influenced vax/vms ms-dos legacy x86 platform cambridge multiple-access system first time-sharing system developed outside united states | [
7939,
6148,
10883,
9991,
1147,
1804,
4492,
6797,
8976,
273,
4114,
6675,
7188,
789,
8977,
11539,
25,
5658,
8474,
8732,
6557,
2462,
3358,
4643,
421,
1702,
6056,
10668,
557,
2477,
8879,
7217,
6706,
10803,
6837,
7477,
823,
7733,
4409,
5562,
... | Train |
6,530 | 4 | Data_commingling:data commingling data commingling computer science occurs different items kinds data stored way become commonly accessible supposed remain separated cloud computing occur different customer data sits server data commingled present security vulnerability data commingling also occur due high speed data transmission mixing situation data one security level inadvertently purposely mixed data lower higher security level transmission portal portal vehicles wire fiber optics microwave various radio frequency transmission portals commingling cause breaches security become source legal issues entity corporation individual data commingling also occur personal computers personal software programs used business security government etc uses early formulation stages entities non-profit profit corporations llc llp etc. creation use stand-alone computers stand-alone networks absolutely unconnected involved individuals easiest safest way prevent data commingling | [
4194
] | Test |
6,531 | 5 | Reliable_Server_Pooling:reliable server pooling reliable server pooling rserpool computer protocol framework management access multiple coordinated pooled servers rserpool ietf standard developed ietf rserpool working group documented rfc 5351 rfc 5352 rfc 5353 rfc 5354 rfc 5355 rfc 5356 terminology rserpool server denoted pool element pe pool identified pool element identifier pe id 32-bit number pe id randomly chosen upon pe registration pool set pools denoted handlespace older literature may denoted namespace denomination dropped order avoid confusion domain name system dns pool handlespace identified unique pool handle ph represented arbitrary byte vector usually ascii unicode name pool e.g downloadpool webserverpool handlespace certain scope e.g organization company denoted operation scope explicitly goal rserpool manage global internet pools within single handlespace due localisation operation scopes possible keep handlespace flat phs hierarchy contrast domain name system top-level sub-domains constraint results significant simplification handlespace management within operation scope handlespace managed redundant pool registrars pr also denoted enrp servers name servers ns prs redundant order avoid pr become single point failure spof pr operation scope identified registrar id pr id 32-bit random number necessary ensure uniqueness pr ids pr contains complete copy operation scope handlespace prs operation scope synchronize view handlespace using endpoint handlespace redundancy protocol enrp older versions protocol use term endpoint namespace redundancy protocol naming replaced avoid confusion dns abbreviation kept due handlespace synchronization enrp prs operation scope functionally equal prs fails pr able seamlessly replace using aggregate server access protocol asap pe add pool remove requesting registration deregistration arbitrary pr operation scope case successful registration pr chosen registration becomes pe home-pr pr-h pr-h informs prs operation scope registration deregistration pes also monitors availability pes asap keep-alive messages keep-alive message pr-h acknowledged pe within certain time interval pe fails answer within certain timeout assumed dead immediately removed handlespace furthermore pe expected re-register regularly re-registration also possible pe change list transport addresses policy information use service pool client — called pool user pu rserpool terminology — first request resolution pool ph list pe identities arbitrary pr operation scope selection procedure denoted handle resolution case requested pool existing pr select list pe identities according pool pool member selection policy also simply denoted pool policy possible pool policies e.g random selection random least-loaded pe least used first case necessary selection information pes selected randomly required maintain up-to-date load information second case selecting least-loaded pe using appropriate selection policy e.g possible equally distribute request load onto pool pes reception list pe identities pr pu write pe information local cache cache denoted pu-side cache cache pu select exactly one pe — using pool selection policy — establish connection using application protocol e.g http sctp tcp case web server using connection service provided server used case establishment connection fails connection aborted service usage new pe selected repeating described selection procedure information pu-side cache outdated pe identity may directly selected cache skipping effort asking pr handle resolution re-establishing connection new pe state application session re-instantiated new pe procedure necessary session resumption denoted failover procedure course application-specific ftp download example failover procedure could mean tell new ftp server file name last received data position ftp server able resume download session since failover procedure highly application-dependent part rserpool though rserpool provides far reaching support implementation arbitrary failover schemes session layer mechanisms make possible rserpool components configure automatically prs announce via udp ip multicast announces received pes pus prs allowing learn list prs currently available operation scope advantage using ip multicast instead broadcast mechanism also work routers e.g lans inter-connected via vpn announces — case e.g switched ethernet — heard processed stations actually interested information case ip multicast available course possible statically configure pr addresses following implementations known | [
5472,
6723,
7364,
9285,
2887,
6733,
6740,
5749,
6746,
11413,
6682,
3006
] | Validation |
6,532 | 6 | IBM_SAN_File_System:ibm san file system ibm san file system distributed heterogeneous file system developed ibm used storage area networks many virtualization features included allowing heterogeneous operating systems access data file spaces write-in-place b-trees used db2 database later better known core btrfs ibm discontinued selling san file system april 2007 replaced ibm general parallel file system gpfs | [
8772,
1801,
6153,
6797,
7983,
6677,
823,
3323,
8671
] | Test |
6,533 | 8 | Matomo_(software):matomo software matomo formerly piwik pronounced free open source web analytics application developed team international developers runs php/mysql webserver tracks online visits one websites displays reports visits analysis matomo used 1,455,000 websites 1.3 websites known traffic analysis tools translated 54 languages new versions released regularly piwik released late 2007 replacement phpmyvisites full api support cleaner ui modern graphs better architecture better performance 21 november 2008 sourceforge.net announced availability piwik hosted application developers piwik selected sourceforge project month july 2009 august 2009 piwik named among best open source enterprise infoworld 2009 bossie awards december 2012 piwik started crowdfunding requested new features september 2013 matthieu aubry maciej zawadziński ceo clearcode founded piwik pro provided support features open source piwik clearcode bought matthieu aubry june 2016 become sole owner piwik pro january 2018 piwik officially renamed matomo | [
3969,
8644,
5612,
8941,
7022,
7983,
6576,
8914,
11221,
10262,
1943
] | Validation |
6,534 | 6 | The_Circle_(file_system):circle file system circle peer-to-peer distributed file system written mainly python based chord distributed hash table dht development circle ceased 2004 supports file sharing instant messaging buddy lists internet relay chat model sending message channel personalized trust-based news service unusually supports dht implementation vulnerable denial service attacks circle homepage circle currently runs linux bsd windows mac os x | [
8640,
9762,
5251,
4229,
2409,
8554,
6797,
4725,
823,
9151
] | Test |
6,535 | 3 | The_Hunt_for_Red_October_(1987_video_game):hunt red october 1987 video game hunt red october video game based book hunt red october released 1987 available atari st amiga apple ii apple macintosh zx spectrum msx commodore 64 ibm pc port apple iigs released 1989 player must navigate red october towards u.s. waters avoiding soviet navy game combination submarine simulator strategy game computer gaming world 1988 described excellent submarine simulator controlled entirely mouse replay value game also praised soviets change tactics game 1992 survey magazine wargames modern settings much negative giving game one half stars five stating probably turn purchasers wargame genre product | [
9166,
9006
] | Test |
6,536 | 9 | Lazy_evaluation:lazy evaluation programming language theory lazy evaluation call-by-need evaluation strategy delays evaluation expression value needed non-strict evaluation also avoids repeated evaluations sharing sharing reduce running time certain functions exponential factor non-strict evaluation strategies call-by-name however lengthy operations would appropriate perform time-sensitive operations handling user inputs video game benefits lazy evaluation include lazy evaluation often combined memoization described jon bentley writing efficient programs function value computed parameter set parameters result stored lookup table indexed values parameters next time function called table consulted determine whether result combination parameter values already available stored result simply returned function evaluated another entry added lookup table reuse lazy evaluation lead reduction memory footprint since values created needed however lazy evaluation difficult combine imperative features exception handling input/output order operations becomes indeterminate lazy evaluation introduce memory leaks opposite lazy evaluation eager evaluation sometimes known strict evaluation eager evaluation evaluation strategy employed programming languages lazy evaluation introduced lambda calculus christopher wadsworth programming languages independently introduced peter henderson james h. morris daniel p. friedman david s. wise delayed evaluation used particularly functional programming languages using delayed evaluation expression evaluated soon gets bound variable evaluator forced produce expression value statement codice_1 i.e assignment result expression variable clearly calls expression evaluated result placed codice_2 actually codice_2 irrelevant need value via reference codice_2 later expression whose evaluation could deferred though eventually rapidly growing tree dependencies would pruned produce symbol rather another outside world see delayed evaluation advantage able create calculable infinite lists without infinite loops size matters interfering computation example one could create function creates infinite list often called stream fibonacci numbers calculation n -th fibonacci number would merely extraction element infinite list forcing evaluation first n members list example haskell programming language list fibonacci numbers written haskell syntax codice_5 prepends element list codice_6 returns list without first element codice_7 uses specified function case addition combine corresponding elements two lists produce third provided programmer careful values required produce particular result evaluated however certain calculations may result program attempting evaluate infinite number elements example requesting length list trying sum elements list fold operation would result program either failing terminate running memory almost common eager languages statements evaluate lazy fashion evaluates evaluates true evaluate b otherwise evaluates c either b c evaluated conversely eager language expected behavior still evaluate e computing value f e even though e unused function f. however user-defined control structures depend exact syntax example j would evaluated eager language lazy language j would evaluated never lazy evaluation allows control structures defined normally primitives compile-time techniques j side effects introduce run time errors subtle differences l l complex usually possible introduce user-defined lazy control structures eager languages functions though may depart language syntax eager evaluation often involved code bodies like j need wrapped function value executed called short-circuit evaluation boolean control structures sometimes called lazy many languages offer notion infinite data-structures allow definitions data given terms infinite ranges unending recursion actual values computed needed take example trivial program haskell function numberfrominfinitelist value infinity infinite range actual value specifically specific value certain index needed list evaluated even evaluated needed desired index compound expression might form easilycomputed lotsofwork easy part gives true lot work could avoided instance suppose large number n checked determine prime number function isprime n available alas require lot computation evaluate perhaps n=2 mod n,2 ≠0 isprime n help many evaluations arbitrary values n. compound expression might form safetotry expression whereby safetotry false attempt evaluating expression lest run-time error signalled divide-by-zero index-out-of-bounds etc instance following pseudocode locates last non-zero element array elements array zero loop work l 0 case loop must terminated without attempting reference element zero array exist computer windowing systems painting information screen driven expose events drive display code last possible moment windowing systems avoid computing unnecessary display content updates another example laziness modern computer systems copy-on-write page allocation demand paging memory allocated value stored memory changed laziness useful high performance scenarios example unix mmap function provides demand driven loading pages disk pages actually touched loaded memory unneeded memory allocated matlab implements copy edit arrays copied actual memory storage replicated content changed possibly leading memory error updating element afterwards instead copy operation programming languages delay evaluation expressions default others provide functions special syntax delay evaluation miranda haskell evaluation function arguments delayed default many languages evaluation delayed explicitly suspending computation using special syntax scheme codice_8 codice_9 ocaml codice_10 codice_11 generally wrapping expression thunk object representing explicitly delayed evaluation called lazy future perl 6 uses lazy evaluation lists one assign infinite lists variables use arguments functions unlike haskell miranda perl 6 n't use lazy evaluation arithmetic operators functions default lazy programming languages haskell although default evaluate expressions demanded possible cases make code eager—or conversely make lazy made eager done explicitly coding something forces evaluation may make code eager avoiding code may make code lazy strict evaluation usually implies eagerness technically different concepts however optimisation implemented compilers called strictness analysis cases allows compiler infer value always used cases may render programmer choice whether force particular value irrelevant strictness analysis force strict evaluation haskell marking constructor fields strict means values always demanded immediately codice_12 function also used demand value immediately pass useful constructor field generally lazy however neither techniques implements recursive strictness—for function called codice_13 invented also pattern matching haskell 98 strict default codice_14 qualifier used make lazy python 2.x codice_15 function computes list integers entire list stored memory first assignment statement evaluated example eager immediate evaluation python 3.x codice_15 function returns special range object computes elements list demand elements range object generated needed e.g. codice_17 evaluated following example example lazy deferred evaluation python 2.x possible use function called codice_18 returns object generates numbers range demand advantage codice_19 generated object always take amount memory version 2.2 forward python manifests lazy evaluation implementing iterators lazy sequences unlike tuple list sequences instance python 2 .net framework possible lazy evaluation using class system.lazy class easily exploited f using lazy keyword force method force evaluation also specialized collections like microsoft.fsharp.collections.seq provide built-in support lazy evaluation let fibonacci seq.unfold fun x x x 0i,1i fibonacci seq.nth 1000 c vb.net class system.lazy directly used public int sum practical example // recursive calculation n'th fibonacci number public int fib int n public void main another way use yield keyword // eager evaluation public ienumerable int fibonacci int x // lazy evaluation public ienumerable int lazyfibonacci int x | [
5120,
10246,
9,
12,
4111,
8722,
2069,
1051,
9245,
8738,
4134,
5165,
5168,
5684,
2103,
2620,
10819,
8262,
86,
8799,
1124,
8293,
7273,
2666,
8810,
6767,
8815,
3705,
2682,
9871,
7326,
4769,
9893,
6828,
11444,
3263,
2754,
5833,
727,
7386,
2... | Test |
6,537 | 4 | JailbreakMe:jailbreakme jailbreakme series jailbreaks apple ios mobile operating system take advantage flaws safari browser device providing immediate one-step jailbreak unlike common jailbreaks blackra1n redsn0w require plugging device computer running jailbreaking software desktop jailbreaking allows users install software approved apple ipod touch iphone ipad jailbreakme automatically includes cydia package management interface serves alternative app store cydia allows installation packages jailbreakme first version 2007 worked iphone ipod touch firmware 1.1.1 second version released august 2010 firmware 4.0.1 earlier third version released july 2011 ios versions 4.3 4.3.3 first jailbreak ipad 2 jailbreakme 3.0 used jailbreak least two million devices jailbreakme started 2007 originally used jailbreak iphone ipod touch running 1.1.1 version ios named iphone os using tiff exploit safari installed installer.app vulnerability used exploit patched apple 1.1.2 firmware tool also called appsnapp created group nine developers jailbreakme 2.0 star released comex august 1 2010 exploits vulnerability freetype library used rendering pdf files first publicly available jailbreak iphone 4 able jailbreak ios 3.1.2 4.0.1 iphone ipod touch ipad models current jailbreak activated visiting jailbreakme.com web page device safari web browser vulnerability used jailbreakme 2.0 patched apple ios 4.0.2 jailbreakme 3.0 saffron released july 6 2011 jailbreak ios devices ios 4.3-4.3.3 ipad 2 4.3.3 first publicly available jailbreak ipad 2 jailbreakme 3.0 exploits freetype parser security flaw similar jailbreakme 2.0 using form pdf file rendered mobile safari uses kernel vulnerability complete untethered jailbreak comex also released patch freetype flaw called pdf patcher 2 available free package installable via cydia days initial release beta tester leaked jailbreakme 3.0 public comex said twitter put time limit release final version quickly jailbreakme website looks similar downloading app store app includes blue button saying free turns green button word install pressed much like application app store tapping install safari closes cydia loads new app device fully jailbroken reboot necessary july 15 2011 apple released ios 4.3.4 gsm 4.2.9 cdma patch flaws used jailbreakme comex received pwnie award black hat conference 2011 best client-side bug work comex hired apple intern august 2011 jailbreakme 4.0 released tihmstar december 12 2017 exploits three serious vulnerabilities cve-2016-4655 cve-2016-4656 cve-2016-4657 already exploited spyware named pegasus mainly based homedepot semi untethered jailbreak released jk9357 homedepot targets 32 bit devices ios 9.1 ios 9.3.4 vulnerabilities used homedepot jailbreakme 4.0 patched apple ios 7.12 jailbreak hosted chris wade creator corellium jailbreak.me whilst technically semi-untethered jailbreak made fully untethered use tihmstar untetherhomedepot package totallynotspyware team jakeblair420 released 7 september 2018 jailbreakme-style exploit works 64-bit device running ios 10 jailbreakme 4.0 web browser induced sideload cydia using payload either meridian doubleh3lix hosted spyware.lol semi-untethered october 7 2011 conceited apps allowing comex use domain name hosting sold domain name jailbreakme.com allegedly unknown party saurikit acquired domain next day jailbreakme.com redirects cydia.saurik.com incompatible device | [
4737,
5636,
9732,
6539,
7697,
5138,
6938,
161,
5927,
7983,
4283,
2492,
1346,
2502,
456,
8783,
464,
2259,
10838,
4957,
3293,
2397,
2275,
9063
] | None |
6,538 | 1 | Profit_impact_of_marketing_strategy:profit impact marketing strategy profit impact market strategy pims® project uses empirical data determine business strategies make difference success failure used develop strategies resource allocation marketing important strategic metrics market share product quality investment intensity service quality measured pims® strongly correlated financial performance one surprising findings factors work identically across different industries pims® yields solid evidence support common sense counter-intuitive principles gaining sustaining competitive advantage tom peters nancy austin pims project originally initiated senior managers general electric wanted know business units profitable others direction sidney schoeffler economics professor hired ge purpose pims project launched 1960s internal empirical study aim make ge different strategic business units sbus comparable since ge highly diversified time key factors sought would impact economic success regardless product particular return investment roi i.e profit per unit tied capital used measure success 1972 project transferred marketing sciences institute wing harvard business school extended companies 1976 american strategic planning institute cambridge massachusetts took charge project 1970 1983 roughly 2600 strategic business units sbus around 200 companies took part surveys provided key figures project today around 12,570 observations 4200 sbus pims associates london worldwide competence design centre pims® since 1990s part malik management fredmund malik st. gallen switzerland since 2005 pims project analysed data gathered identify options problems resources opportunities faced sbu based spread business across different industries hoped data could drawn upon provide business industry empirical evidence strategies lead increased profitability database continues updated drawn upon academics companies today pims® databases currently comprise 25,000 years business experience sbu level i.e customer interface takes place marketing investment decisions made sbu characterized hundreds factors period 3+ years including market share competitors customer preference relative prices service quality innovation rate vertical integration etc. well number market attractiveness factors fairly detailed income statement balance sheet employee data pims study 50 different core metrics regularly surveyed important presented characteristics business environment market attractiveness competitive strength supply chain fitness dynamics change economic success factors variables explained variables appear obvious pims® advantage providing empirical data defines quantitative relationships attributes would consider reasonable companies wishing use service provide detailed information main strategic business units including based data provided pims® provides four reports lancaster massingham ashford following factors correlate particularly strongly roi ros success factors investment intensity correlates negatively explains approx 15 one hand formal-analytical reason increasing investment intensity i.e investment volume relation sales depreciation volume relation sales depreciation intensity also increases thus profit decreases hand investment intensity high fixed assets increase urge also use capacities i.e increase output volume certain circumstances lower prices thus profit margin relative market share correlates positively explains approx 12 main reason positive influence relative market share economies scale higher market share larger production volume lower unit costs also explained experience curve moreover market share increases power vis-à-vis suppliers means better conditions achieved relative product quality correlates positively explains approx 10 important reasons positive correlation higher achievable prices premium products also higher willingness consumers buy high-quality services sales volume increases thus positively influences market share see another reason lower complaint costs overall factors surveyed explain 70 percent differences profitability successful unsuccessful business areas pims database measured variance clearly could argued database operating information gathered period 1970 1983 outdated however data continues collected participating companies pims argues provides unique source time-series data conclusions proven stable time also suggested pims heavily biased towards traditional metal-bashing industries car manufacturing perhaps surprising considering era majority surveys carried reality 2006 3,800+ businesses contained within database includes data consumer industrial service sectors also heavily weighted towards large companies expense small entrepreneurial firms resulted data collection method used generally larger firms prepared pay consulting fee provide survey data return access database compare business large businesses sbus mintzberg 1998 claims database dominated large established firms suitable technique assessing state rather getting page 99 criticism important one trying get average results across industries give us laws marketplace dubious enterprise sampling strategy important one wants obtain results representative → pims master database heart pims program includes 25,000 years business experience across broad spectrum industries worldwide 90 companies processed one-third manufacture consumer goods 15 manufacture capital goods remaining business units suppliers raw materials semi-finished products components accessories industry commerce trade services companies account less 10 total companies yet represent fairly large sample 250 strategic business units category half business units pims database market products services nationally united states canada 11 serve regional markets north america european companies also numerous today around 1,000 business units continental european countries 600 uk important criticism leveled pims fact causation implies correlation correlation imply causation one important findings pims program find statistically significant relationship profitability market share see buzzell gale 1987 empirical work conducted pims suggested high market share yielded high profitability correlation considered true causal relationship fact correlation imply causation multivariate correlation analysis high market share associated high profits high profits could associated high market share third factor common could caused correlation many analysts believe possible use statistical causality test determine causation whole problem correlation insufficient determine causation first place using another correlation used tests determine causation → connection market share already indicated frequent allegations correlations used pims investigations draw conclusions causal relationships i.e correlation equated causality however problem obvious examined detail development pims program backhaus et al formulate aptly primary field application regression analysis investigation causal relationships cause-effect relationships also refer relationships backhaus et al 2006 p. 46 emphasis original authors add following emphasized neither regression analysis statistical methods prove causalities beyond doubt rather regression analysis prove correlations variables necessary yet sufficient condition causality backhaus et al 2006 p.48 f. within framework pims studies thus possible determine causalities help time series analyses due availability data longer periods see example barilits 1994 p. 61 correlations sense including pims program initially give nothing reason investigate possible causalities substantiated intensively another important criticism pims take account heterogeneity data set presumption pims analysis laws marketplace apply industries however statistical assumptions employed econometric analysis make assumption cross-sectional observations come one statistical distribution cross-sectional observations tends achilles heel virtually cross-sectional analyses homogeneous assumption false cross-sectional observations drawn different populations one use estimation techniques fixed-effects control different population means co-variances also differ across populations meaning behavior differs across populations way one control aspect run regressions population separately means laws marketplace differ across populations directly contradicting one main presumptions using pims data base analysis tellis golder 1996 claim pims defines markets narrowly respondents described market narrowly give appearance high market share believe self reporting bias makes conclusions suspect also concerned defunct companies included leading survivor bias | [
444
] | Test |
6,539 | 2 | IPad:ipad ipad line tablet computers designed developed marketed apple inc. run ios ipados mobile operating systems first ipad released april 3 2010 recent ipad models sixth-generation ipad released march 27 2018 fifth-generation ipad mini released march 18 2019 third-generation ipad air released march 18 2019 third-generation ipad pro released november 7 2018. apple sold 360 million ipads though sales peaked 2013 popular tablet computer sales second quarter 2018 user interface built around device multi-touch screen including virtual keyboard ipads connect via wi-fi models also cellular connectivity ipads shoot video take photos play music perform internet functions web-browsing emailing functions games reference gps navigation social networking etc enabled downloading installing apps app store million apps ipad apple third parties nine versions ipad first generation established design precedents persisted models 2nd-generation ipad ipad 2 introduced new thinner design dual-core apple a5 processor vga front-facing 720p rear-facing cameras designed facetime video calling third generation added retina display new apple a5x processor quad-core graphics processor 5-megapixel camera hd 1080p video recording voice dictation 4g lte fourth generation added apple a6x processor replaced 30-pin connector all-digital lightning connector ipad air added apple a7 processor apple m7 motion coprocessor reduced thickness first time since ipad 2 ipad air 2 added apple a8x processor apple m8 motion coprocessor 8-megapixel camera touch id fingerprint sensor reduced thickness ipad introduced 2017 added apple a9 processor sacrificing improvements ipad air 2 introduced exchange lower launch price 2018 apple released 2018 model ipad apple a10 fusion processor apple pencil support year later 2019 ipad air released 10.5-inch display apple a12 chip five versions ipad mini screen size first generation similar internal specifications ipad 2 uses lightning connector instead ipad mini 2 added retina display apple a7 processor apple m7 motion coprocessor closely matching internal specifications ipad air ipad mini 3 added touch id fingerprint sensor ipad mini 4 features apple a8 apple m8 motion coprocessor 5th generation features apple a12 soc three generations ipad pro first generation came 9.7 12.9 screen sizes second came 10.5 12.9 sizes third 11 12.9 sizes ipad pros unique features smart connector exclusive series ipads apple co-founder steve jobs said 1983 speech company strategy simple want want put incredibly great computer book carry around learn use 20 minutes ... really want radio link n't hook anything 're communication larger databases computers apple first tablet computer newton messagepad 100 introduced 1993 powered arm6 processor core developed arm 1990 spinout acorn computers apple invested apple also developed prototype powerbook duo based tablet penlite decided sell order avoid hurting messagepad sales apple released several newton-based pdas final one messagepad 2100 discontinued 1998 apple re-entered mobile-computing markets 2007 iphone smaller ipad featuring camera mobile phone pioneered multi-touch finger-sensitive touchscreen interface apple ios mobile operating system late 2009 ipad release rumored several years speculation mostly talked apple tablet specific names included itablet islate ipad announced january 27 2010 steve jobs apple press conference yerba buena center arts san francisco jobs later said apple begun developing ipad iphone jonathan ive 1991 created industrial design stylus-based tablet macintosh folio first project apple 2004 studio company participating development large tablet prototype later described crude involving projectors ive stated seeking produce tablet first came agree jobs phone important tablet innovations would work well ipad internal codename k48 revealed court case surrounding leaking ipad information launch apple began taking pre-orders first-generation ipad march 12 2010 major change device announcement available pre-order change behavior side switch perform either sound muting screen rotation locking user selectable wi-fi version ipad went sale united states april 3 2010 wi-fi 3g version released april 30 3g service united states provided initially sold two prepaid contract-free data plan options one unlimited data 250 mb per month half price june 2 2010 announced effective june 7 unlimited plan would replaced new customers 2 gb plan slightly lower cost existing customers would option keep unlimited plan plans activated ipad cancelled time initially ipad available order apple store since become available purchase retailers including amazon walmart network operators ipad launched countries including australia canada france germany japan united kingdom may 28 online pre-orders countries began may 10 apple released ipad hong kong ireland mexico new zealand singapore july 23 2010 israel briefly prohibited importation ipad concerns wi-fi might interfere devices september 17 2010 ipad officially launched china jobs unveiled ipad 2 press conference march 2 2011 33 thinner predecessor 15 lighter ipad 2 better processor dual core apple a5 apple says twice fast predecessor cpu operations nine times fast gpu operations ipad 2 includes front back cameras support facetime videophone application well three-axis gyroscope retained original 10‑hour battery life similar pricing scheme successor ipad 2 unveiled march 7 2012 apple ceo tim cook yerba buena center arts new ipad contained new dual core a5x processor quad-core graphics retina display resolution 2,048 1,536 pixels 50 percent pixels standard high definition tv screen brief controversy erupted revealed lte advertised work countries october 23 2012 apple announced fourth generation ipad began shipping november 2 2012 new hardware includes a6x processor hd facetime camera improved lte compatibility all-digital lightning connector available storage increments pricing structure third generation following announcement fourth-generation ipad previous generation discontinued alongside launch fourth generation hardware apple announced ipad mini screen measuring 7.9 inches aimed emerging sector smaller tablets kindle fire nexus 7 hardware new ipad mini similar ipad 2 1,024 768 pixel resolution screen dual core a5 processor 53 lighter 7.2 mm thick released november 2 2012 16 gb 32 gb 64 gb capacities wi-fi wi‑fi cellular versions october 22 2013 apple introduced fifth generation ipad called ipad air second generation ipad mini called ipad mini 2 comes retina display ipad air went sale november 1 2013 starting 499 ipad mini 2 released november 12 2013 starting 399 first quarter 2014 apple reported sold 25 million ipads all-time quarterly record compared 22.9 million year-ago quarter october 2014 apple released ipad air 2 ipad mini 3 ipad air 2 first ios device feature triple core cpu 2gb ram well thinner faster predecessor ipad air features touch id available gold color option ipad mini 3 similar ipad mini 2 design hardware also includes touch id available gold color september 2015 ipad pro announced included 12.9-inch screen 9.7-inch version announced march 2016 addition 256 gb option ipad pro models march 21 2017 new ipad announced hardware includes a9 processor designed budget version ipad june 2017 ipad pro second generation hardware announced 12.9 10.5-inch screens march 28 2018 new ipad 9.7-inch 2018 model 6th generation announced new model uses a10 fusion processor fully supports apple pencil replaces 2017 model october 30 2018 third-generation ipad pro announced first generation support 1tb storage march 18 2019 apple announced ipad air 2019 ipad mini 2019 a12 bionic processors ipad first two generations touchscreen display 1,024 768 pixel liquid-crystal display diagonal fingerprint- scratch-resistant glass steve jobs said 7-inch screen would small express software 10 inches minimum tablet screen like iphone ipad designed controlled bare fingers normal non-conductive gloves styli work although special gloves capacitive styli designed use display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense ipad orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes four physical switches ipad including home button near display returns user main menu three plastic physical switches sides wake/sleep volume up/down plus software-controlled switch whose function changed software updates originally switch locked screen current orientation ios 4.2 changed mute switch rotation lock available onscreen menu ios 4.3 update released ipad 2 setting added allow user specify whether side switch used rotation lock mute first generation ipad camera ipad 2 front vga camera rear-facing 720p camera capable still images taken low quality 0.3 megapixels 30fps video rear-facing camera 5× digital zoom still images shoot photo video fullscreen aspect ratio unlike iphone 4 shoots widescreen aspect ratio unlike iphone ipad support tap focus allow tap set auto exposure cameras allow facetime video messaging iphone 4 fourth generation ipod touch snow leopard lion mountain lion macs ipad two internal speakers reproducing left right channel audio located bottom-right unit original ipad speakers push sound two small sealed channels leading three audio ports carved device ipad 2 speakers behind single grill volume switch right side unit 3.5-mm trrs connector audio-out jack top-left corner device provides stereo sound headphones without microphones and/or volume controls ipad also contains microphone used voice recording built-in bluetooth 2.1 edr interface allows wireless headphones keyboards used ipad however ios currently support file transfer via bluetooth ipad also features 1,024×768 vga video output limited applications screen capture connecting external display television accessory adapter ipad uses internal rechargeable lithium-ion polymer lipo battery batteries made taiwan simplo technology 60 dynapack international technology ipad designed charged high current 2 amperes using included 10 w usb power adapter usb cord usb connector one end 30-pin dock connector end charged standard usb port computer limited 500 milliamperes 0.5 amps result ipad running powered normal usb computer port may charge slowly high-power usb ports found newer apple computers accessories provide full charging capabilities apple claims battery generations ipad provide 10 hours video 140 hours audio playback one month standby like rechargeable battery technology ipad battery loses capacity time designed user-replaceable program similar battery-replacement program ipod original iphone apple replace ipad hold electrical charge refurbished ipad fee us 99 plus 6.95 shipping different unit supplied user data preserved refurbished unit new case warranty refurbished unit may vary jurisdictions independent companies also provide battery replacement service returning original unit new battery original case alternatively possible technically competent user buy install new battery task require soldering technically challenging ipad released three capacity options storage 16 32 64 gb internal flash memory january 29 2013 apple announced 128 gb model fourth generation ipad released february 5 data stored internal flash memory option expand storage apple sells camera connection kit sd card reader used transfer photos videos march 21 2016 apple announced 256 gb model ipad pro released march 31 2017 apple released 10.5-inch ipad pro revised 12.9-inch ipad pro 512 gb option first kind ios device 2018 apple released 11-inch 12.9-inch ipad pro 1tb option apple ios combination specific hardware uses crypto-shredding activating erase content settings obliterating keys 'effaceable storage renders user data device cryptographically inaccessible ipad models come two basic variants wi-fi wi-fi cellular support cellular variants however support circuit-switched voice calls texts data connectivity side wi-fi 3g ipad micro-sim slot mini-sim 3g ipad used compatible gsm carrier unlike iphone usually sold 'locked specific carriers first generations ipad u.s. data network access via t-mobile network limited slower edge cellular speeds t-mobile 3g network time used different frequencies second generation ipad introduced third tier models cdma support verizon wireless united states available separately capable version ipad 4th generation uses micro-sim first generation ipad mini uses nano-sim introduced iphone 5 ipad mini available two different frequency bands worldwide devices support quad-band gsm quad-band umts frequencies one variant also supports lte bands 4 17 principally intended use u.s. network adds support lte bands 1 3 5 13 25 cdma ev-do rev rev b 5th generation ipad 2nd generation ipad mini introduced support many additional lte bands worldwide ipad air mini retina display cellular models come two variants support nano-sims quad-band gsm penta-band umts dual-band cdma ev-do rev b. additionally one variant ipad also supports lte bands 1 2 3 4 5 7 8 13 17 18 19 20 25 26 variant supports lte bands 1 2 3 5 7 8 18 19 20 td-lte bands 38 39 40 apple ability handle many different bands one device allowed offer first time single ipad variant supports cellular bands technologies deployed major north american wireless providers time device introduction moreover t-mobile usa selling ipad air mini retina display models became first ipads made available purchase directly four nationwide u.s. wireless carriers previously indicated u.s. carriers selling hardware variant device apple offers several ipad accessories adapters proprietary 30-pin dock connector ipad port besides headphone jack dock holds ipad upright angle dock connector audio line port generation ipad requires corresponding dock dock included physical keyboard supported original ipad generations compatible bluetooth keyboards also work macs pcs ipad charged standalone power adapter wall charger also used ipods iphones 10 w charger included ipad apple sells camera connection kit consists two separate adapters dock connector one usb type sd card reader adapter used transfer photos videos plug usb audio card midi keyboard third party sells adapter includes usb sd microsd single unit adapter vga connectors allows ipad work external monitors projectors another adapter mirrors screen onto hdmi compatible devices 1080p works apps rotations unlike adapters allows ipad charge another dock connector hdmi adapter released advertised second generation ipad also works first-generation ipad iphone 4 fourth generation ipod touch smart covers screen protectors magnetically attach align face ipad 2 3 4 cover three folds allow convert stand also held together magnets original ipad owners could purchase black case included similarly folding cover smart cover meant minimal easily detachable protects screen smart covers microfiber bottom cleans front ipad wakes cover removed five different colors polyurethane leather leather expensive smart covers compatible original ipad june 2012 apple started selling smart case case combined function smart cover back protection case compatible ipad 2 ipad 3rd 4th generation devices like iphone shares development environment ipad runs software software downloaded apple app store software written developers paid developer license registered devices ipad runs almost third-party iphone applications displaying iphone size enlarging fill ipad screen developers may also create modify apps take advantage ipad features onemillion apps optimized ipad application developers use ios sdk developing applications ipad ipad originally shipped customized ipad-only version iphone os dubbed v3.2 september 1 announced ipad would get ios 4.2 november 2010 fulfill apple released ios 4.2.1 public november 22 interface centred around home screen graphical list available applications home screen accessed time hardware button screen closing open application process users also add delete icons dock every home screen home screen holds twenty icons dock holds six icons users delete web clips third-party applications time may select certain applications transfer itunes apple default programs however may removed almost input given touch screen understands complex gestures using multi-touch ipad interaction techniques enable user move content touch-drag motion finger example zooming web pages photos done placing two fingers screen spreading farther apart bringing closer together gesture known pinching scrolling long list menu achieved sliding finger display bottom top vice versa go back either case list moves pasted outer surface wheel slowly decelerating affected friction way interface simulates physics real object user-centered interactive effects include horizontally sliding sub-selection vertically sliding keyboard bookmarks menu widgets turn around allow settings configured side menu bars found top bottom screen necessary options vary program always follow consistent style motif menu hierarchies back button top-left corner screen displays name parent folder layout music library similar ipod current symbian s60 phones ipad sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations options always presented alphabetically except playlists retain order itunes iphone uses large font allows users plenty room touch selection users rotate device horizontally landscape mode access cover flow likewise feature may disabled purposely wishing view screen another angle like itunes feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks ipad supports gapless playback like fifth-generation ipods introduced 2005 ipad play digital video allowing users watch tv shows movies widescreen double-tapping switches widescreen video playback ipad allows users purchase download songs itunes store directly ipad includes software allows user upload view email photos taken camera user zooms photos sliding two fingers apart closer together much like safari camera application also lets users view camera roll pictures taken ipad camera pictures also available photos application along transferred iphoto aperture mac photoshop windows pc ipad use wi-fi network trilateration skyhook wireless provide location information applications google maps 3g model supports a-gps allow position calculated gps relative nearby cellphone towers also black strip back aid 3g reception ipad headphone jack proprietary apple dock connector ethernet usb port however apple camera connection kit accessory provides two dock connector adapters importing photos videos via usb sd memory cards ipad comes several applications including safari mail photos video ipod itunes app store ibooks maps notes calendar contacts several improved versions applications developed iphone mac apps currently missing weather calculator health apps ipad syncs itunes mac windows pc apple ported iwork suite mac ipad sells pared versions pages numbers keynote apps app store although ipad designed replace mobile phone user use wired headset built-in speaker microphone place telephone calls wi-fi 3g using voip application ipad specific apps app store december 2010 reuters reported iphone ipad users lodged lawsuit apple alleging applications passing information third party advertisers without consent ipad optional ibooks application downloaded app store displays books epub-format content downloaded ibookstore ipad launch april 3 2010 ibookstore available united states several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books ipad despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble made kindle nook apps available ipad february 2010 condé nast said would sell ipad subscriptions several magazines june april 2010 new york times announced would begin publishing daily ipad top news section available free charge remainder payment subscription major news organizations including wall street journal bbc reuters released ipad applications newscorp created ipad-only publication daily february 2011 ceased operations december 2012 ipad assembled foxconn also manufactures apple ipod iphone mac mini largest plant shenzhen china pegatron shanghai china april 2011 foxconn announced would moving production ipad apple products brazil could begin production end 2011. isuppli estimated first-generation ipad 16 gb wi-fi version costs us 259.60 manufacture total excludes research development licensing royalty patent costs apple disclose makers ipad components teardown reports analysis industry insiders indicate various parts suppliers include ipad employ digital rights management drm os prevents users copying transferring certain content outside apple platform without authorization tv shows movies apps also ipad development model requires anyone creating app ipad sign non-disclosure agreement pay developer subscription critics argue apple centralized app approval process control platform could stifle software innovation particular concern digital rights advocates apple ability remotely disable delete apps ipad time digital rights advocates including free software foundation electronic frontier foundation computer engineer activist brewster kahle criticized ipad digital rights restrictions april 2010 paul sweeting analyst gigaom quoted national public radio saying ipad anti-internet hands ... offers major media companies opportunity essentially re-create old business model wherein pushing content terms rather going finding content search engine discovering content sweeting also thought limitations imposed apple impart feeling safe neighborhood saying apple offering gated community guard gate probably maid service laura sydell article author concludes consumers fears security internet viruses malware may happy opt apple gated community russian government switched ipads android devices security concerns like certain ios devices ipad jailbroken depending version ios running thus allowing applications programs authorized apple run device jailbroken users able download many applications previously unavailable app store via unofficial installers cydia well illegally pirated applications apple claims jailbreaking void factory warranty device united states even though jailbreaking legal ipad released april 2010 first jailbroken may 2010 spirit jailbreak ios version 3.1.2 ipad jailbroken ios versions 4.3 4.3.3 web-based tool jailbreakme 3.0 released july 2011 ios versions including 5.0 5.0.1 using redsn0w absinthe 2.0 released may 25 2012 first jailbreak method ios 5.1.1 devices except 32 nm version ipad 2 apple app store provides iphone ipad applications imposes censorship content become issue book publishers magazines seeking use platform guardian newspaper described role apple analogous british magazine distributor wh smith many years imposed content restrictions due exclusion pornography app store youporn others changed video format flash h.264 html5 specifically ipad e-mail exchange ryan tate valleywag steve jobs claimed ipad offers freedom porn leading many upset replies including adbustings berlin artist johannes p. osterhoff san francisco wwdc10 may 28 2010 ipad released australia canada japan well several larger european countries media reaction launch mixed media noted positive response fans device thousands people queued first day sale number countries media reaction ipad announcement mixed walter mossberg wrote software stupid meaning hardware features build less important ipad success software user interface first impressions largely positive mossberg also called price modest device capabilities praised ten-hour battery life others including pc advisor sydney morning herald wrote ipad would also compete proliferating netbooks use microsoft windows base model 499 price lower pre-release estimates tech press wall street analysts apple competitors expecting much higher entry price point cnet also criticized ipad apparent lack wireless sync portable devices microsoft zune number years built-in itunes app able download internet well reviews ipad generally favorable walt mossberg wall street journal called pretty close laptop killer david pogue new york times wrote dual review one part technology-minded people part non-technology-minded people former section notes laptop offers features cheaper price ipad review latter audience however claims readers like concept device understand intended uses enjoy using device pc magazine tim gideon wrote winner undoubtedly driving force shaping emerging tablet landscape michael arrington techcrunch said ipad beats even optimistic expectations new category device also replace laptops many people pc world criticized ipad file sharing printing abilities ars technica said sharing files computer one least favorite parts ipad experience media also praised quantity applications well bookstore media applications contrast criticized ipad closed system mentioned ipad faces competition android-based tablets outsold ipads 2013 surpassing ipads second quarter 2013 overtaken ipad installed base lost majority web browsing android statcounter estimates south america africa asia many large countries eastern europe independent criticized ipad readable bright light paper praised able store large quantities books uk release daily telegraph said ipad lack adobe flash support annoying ipad selected time magazine one 50 best inventions year 2010 popular science chose top gadget behind overall best new 2010 winner groasis waterboxx ipad tablets still wide margin globally second used android tablets market share however differs widely regions ipad lost market share globally every year since 2012 statcounter started tracking tablets separately according statcounter statistics tracks web use gives operating system/platform share based ipad lost majority use south america android also lose majority gaining back asia africa lost wide margin android 70 ipad mostly used consumers also taken business users within 90 days release ipad managed penetrate 50 fortune 100 companies companies adopting ipads business offices distributing making available ipads employees examples uses workplace include attorneys responding clients medical professionals accessing health records patient exams managers approving employee requests survey frost sullivan shows ipad usage office workplaces linked goals increased employee productivity reduced paperwork increased revenue research firm estimates mobile-office application market north america may reach 6.85 billion 2015 estimated 1.76 billion 2010 since march 2011 us federal aviation administration faa approved ipad in-cockpit use cut paper consumption several airlines 2011 alaska airlines became first airline replace pilots paper manuals ipads weighing compared printed flight manuals hopes fewer back muscle injuries dozen airlines followed suit including united distributed ipads cockpits also many airlines offer inflight magazine downloadable application ipad ipad several uses classroom praised valuable tool homeschooling soon ipad released reported 81 top book apps children ipad also called revolutionary tool help children autism learn communicate socialize easily healthcare field ipads iphones used help hospitals manage supply chain example novation healthcare contracting services company developed vha pricelynx based mobile application platform business intelligence software vendor microstrategy business intelligence app help health care organizations manage purchasing procedures efficiently save money hospitals guillermo ramas novation states doctors wo n't walk around hospital laptop ipad perfect walk around hospital long information need 2013 gianna chien aged 14 presented 8,000 doctors heart rhythm society meeting apple ipad 2 cases interfere life-saving heart devices pacemakers magnets inside ipad user guide advised pacemaker users keep ipads least away pacemaker study 2014 found ipad 2 could cause electromagnetic interference emi implantable cardioverter defibrillators united states fans attending super bowl xlv first super bowl since ipad released could use official national football league nfl app navigate cowboys stadium 2011 tampa bay buccaneers became first nfl club discontinue use paper copies playbooks instead distributed players playbook videos electronic format via ipad 2 ipad able support many music creation applications addition itunes music playback software include sound samplers guitar voice effects processors sequencers synthesized sounds sampled loops virtual synthesizers drum machines theremin-style touch responsive instruments drum pads many gorillaz 2010 album fall created almost exclusively using ipad damon albarn tour band music video luna sea 2012 single rouge filmed entirely ipad ipad greatly increased social television use viewers use ipad convenient second networked computer second screen communicating viewers television provider viewers use web browser specialized applications discuss program viewers broadcast content providers may use second screen interact viewers real time example latter facility allows content providers conduct real-time polls collect comments program displayed text main television screen viewer interaction via second screen becoming increasingly popular | [
10755,
9732,
10761,
1549,
5647,
7697,
3602,
4114,
6165,
11289,
3610,
7706,
2076,
8222,
1057,
6183,
1576,
9768,
6186,
4139,
6700,
7211,
9769,
47,
5681,
1074,
3634,
8754,
9267,
9784,
8253,
8767,
576,
7745,
1090,
10303,
2630,
5191,
8774,
724... | Test |
6,540 | 4 | Martian_packet:martian packet martian packet ip packet seen public internet contains source destination address reserved special-use internet assigned numbers authority iana public internet packet either spoofed source address actually originate claimed packet delivered requirement found martian packets commonly arise ip address spoofing denial-of-service attacks also arise network equipment malfunction misconfiguration host linux terminology martian packet ip packet received kernel specific interface routing tables indicate source ip expected another interface name derived packet mars meaning packet seems earth ipv4 ipv6 martian packets source destination addresses within special-use ranges defined rfc 6890 6to4 ipv6 transition technology ipv6 address encodes originating ipv4 address every ipv4 /32 corresponding unique ipv6 /48 prefix 6to4 relays use encoded value determining end site 6to4 tunnel 6to4 addresses corresponding ipv4 martians routable never appear public internet teredo another ipv6 transition technology encodes originating ipv4 address ipv6 address however encoding format encodes teredo server address tunnel information ipv4 client address thus definable set prefixes specific 2001:0 :/32 teredo packets martian end-site addresses however possible spoof teredo packets teredo server ipv4 address set martian | [
3872,
5472,
2947,
2409,
823,
5469,
5470
] | Test |
6,541 | 5 | Port_Control_Protocol:port control protocol port control protocol pcp computer networking protocol allows hosts ipv4 ipv6 networks control incoming ipv4 ipv6 packets translated forwarded upstream router performs network address translation nat packet filtering allowing hosts create explicit port forwarding rules handling network traffic easily configured make hosts placed behind nats firewalls reachable rest internet also act network servers requirement many applications additionally explicit port forwarding rules available pcp allow hosts reduce amount generated traffic eliminating workarounds form outgoing nat keepalive messages required maintaining connections servers various nat traversal techniques tcp hole punching time less generated traffic reduces power consumption directly improving battery runtime mobile devices pcp standardized 2013 successor nat port mapping protocol nat-pmp shares similar protocol concepts packet formats environments universal plug play internet gateway device upnp igd used local network interworking function upnp igd pcp required embedded igd upnp igd-pcp iwf specified rfc6970 dhcp ipv4 ipv6 options configure hosts port control protocol pcp server ip addresses specified rfc7291 procedure follow selecting server among list pcp server discussed rfc7488 environments nat64 deployed pcp allows learn ipv6 prefix es used pcp-controlled nat64 device build ipv4-converted ipv6 addresses nat64 rfc7225 many applications network equipment deployments require network locations reachable outside local networks following originally envisioned model ip end-to-end connectivity across internet operate network servers accept connections remote clients example equipment ip camera includes network server provides remote surveillance ip networks usually network equipment deployments place devices behind routers firewalls perform nat enable sharing ipv4 address example packet filtering improved network security protection ending breaking end-to-end connectivity rendering equipment applications inaccessible rest internet making deployed equipment accessible extending server role beyond local network requires either manual configuration port forwarding network gateway usually cpe application-level workarounds initiate connections deployed equipment additional intermediate servers used merging firewall punching connections connections actual clients approaches downsides manual cpe configuration usually either inconvenient possible using additional intermediate servers increases complexity cost example online computer game acts client requires communication game server exchanging gameplay data order make possible game server provide data clients clients must made accessible server usually clients initiate connections game server open communication channels however open connections become idle subsequently closed network gateways leading necessity maintaining using form keepalive messages keepalive messages small messages sent client server create traffic communication channel therefore prevent gateway servers closing thus keeping connection alive requires constant exchange empty messages client server increases network chatter wastes network bandwidth cpu cycles decreases autonomy battery-powered devices additionally network applications example ftp require dynamic opening multiple connections involves application-level gateways algs additionally increases complexity pcp allows equipment applications create explicit mappings external ip address protocol port internal ip address protocol port explicit mappings place inbound communication reach hosts behind nat firewall either expands server roles beyond boundaries local networks makes use various services simplified less resource-consuming created mappings permanent extent known lifetime extended similar way dynamic host configuration protocol dhcp implements leases time pcp allows applications create additional mappings dynamically required reduces eliminates need alg-enabled nat devices firewalls created explicit mappings known lifetime commonly several hours need application-level keepalive messages exchanged hosts servers purpose preserving mapping result network usage power consumption reduced application-level keepalive logic longer needs implemented client server sides pcp mapping response provides application associated externally visible parameters ip address protocol port announced clients application-specific ways incoming connections established additionally pcp inform applications external ip address changed mapping already established various types nat handled pcp providing support nat64 nat66 nat44 inclusion pcp ipv4 ipv6 firewall devices also supported pcp designed used large-scale aggregation points example part carrier-grade nats inside less expensive consumer-grade devices long-term ip camera temperature sensor acting server example short-term mappings playing online computer game example supported pcp supports transport layer protocols use 16-bit port numbers example tcp udp stream control transmission protocol sctp datagram congestion control protocol dccp protocols use port numbers example resource reservation protocol rsvp encapsulating security payload esp icmp icmpv6 supported ipv4 firewall ipv6 firewall nptv6 ipv6 prefix translation functions supported one client per external ip address case nat pcp specification define mechanism dealing multi-homed networks multiple network gateways default routes nonetheless possible implement pcp networks using coordination mechanism conntrackd however different networks external ip address es given pcp mapping use one protocol requires one specific external ip address provided client network become unavailable pcp mapping would updated use external ip address network pcp standardized 2013 successor nat port mapping protocol nat-pmp sharing similar protocol concepts packet formats one design differences nat-pmp pretty much limited deployment consumer-grade devices pcp designed also support carrier-grade equipment since 2005 nat-pmp implemented various apple products nat-pmp relates internet gateway device protocol igdp standardized 2001 part universal plug play upnp specification igdp complex tailored toward manual configuration nat-pmp designed simplicity use within software applications excluding attackers capable altering network packets exchanged explicit pcp mapping created packets contain negotiation required establishing explicit mapping exchanged hosts pcp-enabled nat devices firewalls pcp considered secure long created explicit mappings exceed domain implicit mappings words implicit mappings created result way nat devices firewalls handling regular outbound client connections meaning pcp safe long new mapping possibilities introduced explicit mapping mechanism security standpoint important pcp feature mapping request option used option signifies ip address specified additionally part mapping request used internal address created explicit mapping rather following default behavior using source ip address actual mapping request packet purpose mapping requests end pcp-enabled nat device firewall granting explicit mapping privileges higher allowed implicit mappings due unknown rules imposed elsewhere specified ip address allowing way attacker steal traffic conduct denial-of-service dos attack additionally explicit pcp security mechanisms available extensions pcp protocol providing authentication access control mechanisms using authenticated integrity-protected in-band signalling channel relies extensible authentication protocol eap perform authentication devices involved pcp negotiation session pcp-enabled nat devices firewalls may still accept unauthenticated mapping requests time previously described explicit mapping constraints still apply internally pcp works exchanging control messages hosts pcp-enabled nat devices firewalls referred servers using user datagram protocol udp underlying protocol communication consists port mapping requests created hosts result responses submitted processed servers following udp nature unreliability means udp datagrams lost duplicated reordered submitting request guarantee response kind thus host requests also referred hints addition direct responses servers also generate gratuitous notifications example unicast notifications inform hosts changes external ip address exchanged messages contain means determining either transaction belong stage session represent simplified design based messages self-describing complete additional context required message successfully processed servers may decide silently ignore host requests case unable process moment cases hosts need retransmit request also hosts may safely decide silently ignore unwanted mapping responses purpose creating pcp requests ip address server either manually configured host found part host dhcp lease set host configured default gateway host request messages sent source udp port client server udp port 5351 listens unsolicited multicast server notifications server restart announcements sent server udp port 5351 udp port 5350 hosts listen maximum udp payload length pcp messages 1100 octets pcp message consists request response header containing opcode determines associated operation relevant opcode-specific information ports mapped zero options option described result codes returned part server responses result code associated lifetime tells hosts certain operations may retried repeated example result lifetimes specify long failure condition expected persist long created mapping last | [
10242,
3847,
649,
4490,
1164,
9868,
14,
3218,
9365,
1942,
10005,
11413,
5402,
5531,
3742,
10271,
9380,
2085,
8998,
3751,
3752,
9381,
939,
10924,
7214,
7855,
2737,
562,
6834,
2996,
6964,
9909,
5433,
3770,
10171,
3133,
3006,
4797,
5181,
543... | Train |
6,542 | 4 | Ari_Schwartz:ari schwartz ari m. schwartz former senior director cybersecurity united states national security council staff white house left role october 2015 previously director cybersecurity privacy civil liberties policy schwartz came white house serving senior advisor technology policy united states secretary commerce previously national institute standards technology served internet policy advisor working internet policy task force department commerce government service schwartz vice president chief operating officer center democracy technology cdt washington d.c. united states formerly cdt senior policy analyst subsequently center vice president coo cdt schwartz rsa conference award excellence public policy online trust alliance award excellence public policy october 2015 revealed schwartz stepped role senior director cybersecurity two-year tenure remarked always planned leave role period schwartz praised departure helping develop government cybersecurity framework voluntary guideline help companies bolster security programs honest broker industry civil society schwartz detroit michigan area holds bachelor degree sociology brandeis university | [] | Validation |
6,543 | 2 | Unique_set_size:unique set size computing unique set size uss portion main memory ram occupied process guaranteed private process unshared memory process reported uss concept used software running linux operating system proposed matt mackall complications arose trying count real memory used process concepts resident set size virtual memory size vmsize n't helping developers tried know much memory programs using | [
6616,
1025,
11539,
823
] | Test |
6,544 | 5 | Synchronous_Data_Link_Control:synchronous data link control synchronous data link control sdlc computer communications protocol layer 2 protocol ibm systems network architecture sna sdlc supports multipoint links well error correction also runs assumption sna header present sdlc header sdlc mainly used ibm mainframe midrange systems however implementations exist many platforms many vendors use sdlc sna becoming rare mostly replaced ip-based protocols tunneled ip using anynet technologies united states sdlc found traffic control cabinets 1975 ibm developed first bit-oriented protocol sdlc work done ibm early 1970s de facto standard adopted iso high-level data link control hdlc 1979 ansi advanced data communication control procedures adccp latter standards added features asynchronous balanced mode frame sizes need multiples bit-octets also removed procedures messages test message sdlc operates independently communications link operate point-to-point multipoint loop facilities switched dedicated two-wire four-wire circuits full-duplex half-duplex operation unique characteristic sdlc ability mix half-duplex secondary stations full-duplex primary stations four-wire circuits thus reducing cost dedicated facilities intel used sdlc base protocol bitbus still popular europe fieldbus included support several controllers i8044/i8344 i80152 8044 controller still production third party vendors vendors putting hardware support sdlc slightly different hdlc communication controller chips 1980s included zilog motorola national semiconductor result wide variety equipment 1980s used common mainframe centric corporate networks norm 1980s common alternatives sna sdlc probably decnet digital data communications message protocol ddcmp burroughs network architecture bna burroughs data link control bdlc arpanet imps hdlc mostly extension sdlc features deleted renamed features present hdlc sdlc also sdlc later hdlc extensions iso/iec 13239 hdlc renamed sdlc frames hdlc names incorporated later versions sdlc features added hdlc subsequently added back later versions sdlc two u frames sdlc exist hdlc several u frames almost entirely unused hdlc existing primarily sdlc compatibility test u frame included early hdlc standards added later special mode sdlc operation supported e.g zilog scc incorporated hdlc sdlc loop mode mode primary number secondaries connected unidirectional ring network one transmit output connected next receive input secondary responsible copying frames arrive input reach rest ring eventually return primary except copying secondary operates half-duplex mode transmits protocol guarantees receive input secondary powered relay connects input directly output powering secondary waits opportune moment goes on-loop inserting data stream one-bit delay similar opportunity used go off-loop part clean shutdown sdlc loop mode frames arrive group ending final flag all-ones idle signal first seven 1-bits pattern 01111111 constitutes go-ahead sequence also called eop end poll giving secondary permission transmit secondary wishes transmit uses 1-bit delay convert final 1 bit sequence 0 bit making flag character transmits frames final flag transmits all-ones idle signal serve go-ahead next station loop group starts commands primary secondary appends responses primary receives go-ahead idle sequence knows secondaries finished may transmit commands beacon bcn response designed help locate breaks loop secondary see incoming traffic long time begins sending beacon response frames telling primary link secondary predecessor broken primary also receives copy commands sent indistinguishable responses appends special turnaround frame end commands separate responses unique sequence interpreted secondaries conventional one single all-zero byte runt frame address 0 reserved unused control field frame check sequence secondaries capable full-duplex operation also interpret shut-off sequence forcing abort transmission | [
9860,
3847,
1297,
5021,
2206,
10280,
10548,
7865,
2746,
4667,
4543,
7360,
4546,
11332,
1997,
1893,
4586,
5875,
3323,
5118,
2431
] | Test |
6,545 | 6 | File_change_log:file change log file change log tracks changes namespace files directories file system depending implementation file change log record changes creates links unlinks deletions renamed files data changes metadata changes example acls permissions file change log accessed file file system hidden accessed programmatically file change log differs file system journal log serve least two purposes first applications must scan entire file system discover changes since last scan reading file change log avoid scan scanning applications include backup utilities web crawler search engines replication programs second log serve audit record activity file system | [
5120,
6669,
3598,
10257,
6677,
5142,
8214,
9762,
5158,
11323,
8772,
4708,
9836,
7789,
113,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
7344,
2230,
5816,
1212,
8380,
10951,
9420,
3795,
4819,
8... | Test |
6,546 | 3 | Nuts_&_Milk:nuts amp milk versions nuts milk involve player moving various levels collecting assortment fruit scattered throughout one gathering fruit particular screen player gain access previously unopened house door containing milk fiancée yogurt player makes contact female blob advanced next level start process anew movement levels accomplished using directional pad keyboard move milk across stage avoiding pitfalls obstacles notably character rival nuts contact made time game play nuts harmful objects miniature blimps player lose life restart current level fruit reset back initial positions three milk lives lost fashion game ends famicom version milk jump short distance vertically horizontally allowing transverse pits quickly gain access adjacent platform player falls great distance milk become momentarily dazed unable move player joggles awake jump button rope bridges suspended mid-air levels using directional pad player climb well walk across reach top 50 individual levels exist famicom version one skipped freely pressing select button player cycled fifty return first level restart sequence milk lives lost famicom msx version also contain level editor mode player freely edit first stage game placing objects enemies screen milk interact stage takes place first level normal game play console reset set fantasy world nuts milk follows story pink male blob named milk must find fiancée yogurt similar pink blob red hair bow rescue nuts teal blob also vies affection journey take milk several levels process finding saving love repeat several times nuts mounts ever-present resistance quest romance originally developed japanese software company hudson soft several home computers japan nuts milk became company first famicom video game game borrows elements lode runner earlier hudson project arcade-styled platformers donkey kong even emulates title screen nintendo early 1980s releases game retains stylistic similarities games published time unique arcade-styled game never released actual arcade system two different versions game created one home computers one famicom nuts milk released home computers nintendo famicom roughly time although versions similar overall goal differences presentation famicom version played sideways angle typical 2d sidescrollers player walking jumping one area another horizontally conversely computer version presented top-down fashion platforming elements removed player instead moving four directions version also contains slight degradation sound graphics due comparatively less powerful hardware personal computers time additionally famicom version makes use standard famicom 2-button controller computer releases instead rely keyboard 1985 melbourne house ported famicom version commodore 64 name hot pop version nuts milk resembling famicom release since ported mobile phones download service beginning september 1 2003 japan kg telecom part gamemaster compilation contains hudson soft games 8-bit era service later extended parts world january 2004 tf1 i-games nuts milk extremely commonly found unauthorized famiclone systems well bootleg multicarts december 22 2005 hudson released nuts milk along classic puzzle games game boy advance hudson collection vol 4 nazotoki collection exclusively japan music versions nuts milk composed internally hudson soft made entirely synth-based chiptunes common audio medium early video games though exclusive soundtrack either game never released music versions found 1987 compilation album hudson game music catalog number 28xa-87 released japan alfa gmo records | [
10644,
6109,
9006
] | None |
6,547 | 3 | Loco-Motion_(video_game):loco-motion video game loco-motion also known guttang gottong arcade puzzle game developed konami 1982 licensed centuri loco-motion player builds path unstoppable locomotive moving tracks allow pick passengers loco-motion basically updated version sliding block puzzle game player move tiles horizontally vertically within rectangular frame contains one empty square tiles sections railroad track player must use construct path locomotive never stops moving laid around edges frame several stations passengers must picked player uses joystick slide piece track vacant square use button accelerate locomotive however always motion stopped player must avoid running dead-end barricade barrier playfield edge edge empty square costs one life player moves pieces track around route locomotive take highlighted yellow dead end countdown timer occasionally appears station passengers waiting player picks countdown reaches zero remaining amount added score bonus points passengers send crazy train onto tracks player must avoid crashing countdown timer unoccupied station reaches zero station destroyed becomes pair barrier squares crazy trains crashed destroy creates new pair dead ends destroys station collision happens within higher levels special pieces track one entrance three different exits player choose exit locomotive takes picked randomly bonus points awarded time locomotive crosses one pieces track level cleared passengers pick player moves onto next level different layout bigger smaller dead ends also bonus stations appear frequently later levels one crazy trains screen outset player creates closed loop track rides several seconds loop sweeper appears moves around loop behind sweeper reaches locomotive player loses life sweepers crashed crazy trains destroy consequences extra life awarded 10,000 points bonus station points randomly determined beginning high 2,470 points locomotion ported intellivision tomy tutor meanwhile activision working game called happy trails strikingly similar gameplay happy trails released prior locomotion saw great reviews forcing intellivision release locomotion reduced price msx saw port konami name crazy train m-network also made prototype atari 2600 video game system however july 5 1983 release game cancelled unknown reasons confuzion 1985 zx spectrum commodore 64 similar design loco-motion game boy game boy color saw release game japan uk one four games part four volume set games called konami gb collection japan game released game boy super game boy features yet uk colorized translated english game boy color | [
1776,
3788,
9006
] | Test |
6,548 | 4 | Service_scan:service scan computer networks service scan identifies services running list open ports closely tied port scanning tools e.g nmap nessus support service scan preferable referring port list identify services running non-standard ports common practice service scanners work sending probe data port monitoring response example sending get probe could detect web server exact response give indication server multiple probes sent identify less common services nmap service scan captures information unidentified ports users encouraged submit details included updates almost vulnerability scanners built-in service scan results service scan used determine tests run port | [
2084,
1200,
6993,
2739,
4373,
7031
] | Test |
6,549 | 3 | Frequency_scaling:frequency scaling computer architecture frequency scaling also known frequency ramping technique increasing processor frequency enhance performance system containing processor question frequency ramping dominant force commodity processor performance increases mid-1980s roughly end 2004 effect processor frequency computer speed seen looking equation computer program runtime instructions per program total instructions executed given program cycles per instruction program-dependent architecture-dependent average value time per cycle definition inverse processor frequency increase frequency thus decreases runtime however power consumption chip given equation p power consumption c capacitance switched per clock cycle v voltage f processor frequency cycles per second increases frequency thus increase amount power used processor increasing processor power consumption led ultimately intel may 2004 cancellation tejas jayhawk processors generally cited end frequency scaling dominant computer architecture paradigm moore law still effect frequency scaling ended despite power issues transistor densities still doubling every 18 24 months end frequency scaling new transistors longer needed facilitate frequency scaling used add extra hardware additional cores facilitate parallel computing technique referred parallel scaling end frequency scaling dominant cause processor performance gains caused industry-wide shift parallel computing form multicore processors | [
10675,
9932,
10966,
4334
] | Test |
6,550 | 4 | Windows_Metafile_vulnerability:windows metafile vulnerability windows metafile vulnerability—also called metafile image code execution abbreviated mice—is security vulnerability way versions microsoft windows operating system handled images windows metafile format permits arbitrary code executed affected computers without permission users discovered december 27 2005 first reports affected computers announced within 24 hours microsoft released high-priority update eliminate vulnerability via windows update january 5 2006 attacks using vulnerability known wmf exploits vulnerability located gdi32.dll existed versions microsoft windows windows 3.0 windows server 2003 r2 however attack vectors exist nt-based versions windows windows nt windows 2000 windows xp windows server 2003 exploits taking advantage vulnerability windows nt-based systems facilitated propagation various types malware typically drive-by downloads due extreme impact bug 2007 pwnie award mass 0wnage breaking internet versions microsoft windows operating system support windows metafile graphics standard versions windows 3.0 windows server 2003 r2 contain security flaw however windows nt 4.0 windows xp unless patched vulnerable earlier versions default installation enables windows metafile code execution source vulnerability later versions windows vulnerability according computer security expert steve gibson windows nt 4 vulnerable known exploits image preview enabled windows operating systems image preview enabled hardware-based data execution prevention dep active applications susceptible exploit operating systems windows e.g. macos unix linux etc directly affected however non-windows system could become vulnerable runs software view windows wmf files could include software incorporates clones windows native graphics device interface gdi dynamic-link library dll run windows windows programs emulator compatibility layer unix-like system uses wine emulate windows example could exploited gibson wrote program mousetrap company distributes freeware detect windows metafile vulnerability systems running windows windows emulators according assessments f-secure vulnerability inherent defect design wmf files underlying architecture files previous era includes features allow actual code executed whenever wmf file opens original purpose mainly handle cancellation print jobs spooling according secunia vulnerability caused due error handling windows metafile files '.wmf containing specially crafted codice_1 'escape records records allow arbitrary user-defined function executed rendering wmf file fails according windows 3.1 sdk documentation codice_1 escape obsoleted replaced function name windows 3.1 long wmf vulnerability discovered however obsoleted escape code retained compatibility 16 bit programs written least backwards compatible windows 3.0 change happened approximately time microsoft creating 32 bit reimplementation gdi windows nt likely vulnerability occurred effort 'escape mechanism question allows applications metafiles access output device features yet abstracted gdi hardware accelerated bézier curves encapsulated postscript support etc done passing opcode size pointer data call usually pass driver escape calls produce actual graphics general escape mechanism allowed metafiles little thought originally given possibility using things like setabortproc modern non-vulnerable metafile interpreters checks opcode blacklist whitelist keeping full set opcodes available regular code calls gdi escape functions directly code already running way code could make gdi call security risk case worth noting 16 bit windows except rarely used real mode windows 3.0 immune vulnerability pointer specified metafile point data within metafile 16 bit windows always full no-execute-data enforcement mandated segmented architecture 16 bit protected mode windows nt cpu architectures 32 bit x86 mips powerpc alpha itanium x86_64 required return-oriented programming exploit architectures no-execute functionality missing older x86 processors vulnerability cve-2005-4560 common vulnerabilities exposures database us-cert reference vu 181038 microsoft knowledge base article 912840 first observed wild researchers sunbelt software december 28 2005 announced publicly company president alex eckelberry computers affected via spread infected e-mails carry hacked wmf file attachment infection may also result methods may also used propagate infection problem within operating system using non-microsoft browsers firefox opera provide complete protection users typically prompted download view malicious file infecting computer infected files may downloaded automatically opens possibility infection disk indexing accidental previewing according assessments mcafee antivirus company vulnerability used propagate bifrost backdoor trojan horse forms malware also exploited vulnerability deliver various malicious payloads mcafee claims first generation exploits encountered 6 customer base 31 december 2005 microsoft released official patch address problem 5 january 2006 patch may applied lieu corrective measures official patch available windows 2000 windows xp microsoft windows server 2003 windows nt 4 older operating systems receive patch longer supported microsoft steve gibson stated security podcast 20 company gibson research corporation would make patch available windows 9x systems microsoft research steve gibson stated later security podcast 23 windows 9x vulnerable need patching windows 9x/me users run mouse trap utility see free downloadable patch windows nt provided paolo monti future time italian distributor eset nod32 anti-virus system patch works older operating systems supplied without warranty reports official patch automatically installed even windows automatic update configured ask installing automatically downloaded updates causes automatic reboot cause loss data user program open unsaved changes measures historical interest systems updated 5 january 2006 workaround patch available 28 december 2005 microsoft advised windows users unregister dynamic-link library file shimgvw.dll done executing command codice_3 run menu command prompt invokes previewing image files exploited attacks dll re-registered patching running codice_4 workaround blocks common attack vector eliminate vulnerability third party patch released ilfak guilfanov 31 december 2005 temporarily disable vulnerable function call gdi32.dll unofficial patch received much publicity due unavailability official one microsoft receiving recommendation sans institute internet storm center f-secure large amount publicity including indirectly slashdotted guilfanov website received visitors could cope suspended 3 january 2006 patch still available download number mirrors including internet storm center website guilfanov website went back online 4 january much-reduced state longer providing patch on-site due bandwidth issues homepage provided list mirrors user could download patch associated vulnerability-checker md5 checksum file could checked downloaded file probably genuine microsoft released patch guilfanov withdrew microsoft says patch removes flawed functionality gdi32 allowed wmf vulnerability computers running unpatched version windows defence depth approach recommended mitigate risk infection various sources recommended mitigation efforts include according sans institute internet storm center article using web browser internet explorer may offer additional protection vulnerability depending settings browsers may ask user opening image .wmf extension reduces chance opening maliciously crafted windows metafile protect vulnerability exploited browsers still open metafile masquerading another format better entirely disable image loading browser used 2006 steve gibson suggested peculiar nature 'bug indication vulnerability actually backdoor intentionally engineered system accusation became assertion spread internet rumor technology news website slashdot picked gibson speculation rumor widely debunked thomas greene writing register attributed gibson mistake lack security experience called popinjay expert | [
5891,
5636,
10756,
8455,
8584,
6797,
8976,
1429,
2709,
5397,
161,
2213,
552,
11051,
7855,
7983,
3250,
5682,
823,
704,
9537,
10437,
3916,
1103,
5078,
7515,
1632,
3555,
4836,
4074,
107,
9325,
4081,
4467,
5492,
2811
] | Test |
6,551 | 2 | ILIOS:ilios ilios acronym interlink internet operating system attempt create router-only operating system one specifically oriented towards computer networking purposes especially routing supports ipv4 routing good educational os though single tasking everything via interrupts released bsd license author research os rink springer also responsible porting freebsd xbox | [
2179,
5469,
7983
] | Test |
6,552 | 9 | BEFLIX:beflix beflix name first embedded domain-specific language computer animation invented ken knowlton bell labs 1963 name derives combination bell flicks ken knowlton used beflix create animated films educational engineering purposes also collaborated artist stan vanderbeek bell labs create series computer-animated films called poemfields 1966 1969 beflix developed ibm 7090 mainframe computer using stromberg-carlson sc2040 microfilm recorder output programming environment targeted beflix consisted fortran ii implementation fortran ii assembly program fap macros first version beflix implemented fap macro facility later version targeting fortran iv resembled traditional subroutine library lost unique flavor language pixels produced writing characters screen microfilm recorder defocused electron beam sc2040 used charactron tube expose microfilm beflix electron beam defocused draw pixels blurred character shapes characters selected create range grayscale values pixels microfilm recorder connected directly 7090 communicates magnetic tape beflix writes magnetic tape output 7090 film recorder reads tape create film output beflix also supports preview mode selected frames output written line printer memory 7090 organized rectangular surfaces pixels surfaces designated two letter code identifies particular surface geometry beflix supports two resolutions output frames fine 252x184 coarse 126x92 7090 enough memory support two fine resolution frames surface organization beflix allows different geometric combinations smaller surfaces within available memory beflix pixels store values 0-7 allowing packed 12 36-bit word 7090 beflix provides low-level operations high-level operations low-level operations beflix provides 26 scanners named z scanner value coordinate position surface low-level statements beflix apply operations scanner based set conditions met example low-level operation codice_1 says following conditions true following operations performed control passed statement label codice_2 way complicated patterns programmed behavior scanners film output proceeds scanner operations immediate operations update surfaces without frame output operations high-level operations beflix fall roughly four categories drawing primitives dynamic rectangle operations performed incrementally series output frames quick way encode animations | [
3960,
9926
] | None |
6,553 | 9 | Scene_description_language:scene description language scene description language description language used describe scene rendered 3d renderer ray tracer scene written text editor may include syntax highlighting opposed modeled graphical way scene description language may include variables constants conditional statements loops loops 3dmlw x3d xml-based scene description languages tao presentations application uses xl dynamic document description language pov-ray 3dmlw x3d tao presentations | [
9192,
10465,
10142,
479
] | Test |
6,554 | 2 | Joanna_Hoffman:joanna hoffman joanna karine hoffman born july 27 1953 american marketing executive one original members apple computer macintosh team next team hoffman born poland daughter film director jerzy hoffman armenian former wife marlena nazarian lived mother armenian ssr age 10 went live father warsaw poland around age 12 1967 mother married american moved buffalo new york hoffman joined united states 1968 hoffman quickly became fluent english excelled school background anthropology physics linguistics bachelor science humanities science mit pursued doctorate complete archaeology university chicago oriental institute 1979 scheduled travel iran archaeology dig stopped poland visit grandmother received word iran would return united states iranian revolution hoffman leave absence university chicago encouraged friends attend lecture xerox parc california heated discussion lecture jef raskin discussion focused computers look like improve people lives raskin impressed hoffman asked interview position apple began macintosh project october 1980 part raskin initial team burrell smith bud tribble brian howard time began mac still research project position constituted entire macintosh marketing team first year half project also wrote first draft macintosh user interface guidelines hoffman would eventually run international marketing team brought mac europe asia later followed steve jobs next one original members hoffman reputation apple next one could successfully engage jobs 1981 1982 satirical award apple given person best job standing jobs ” jobs aware award liked early 1990s hoffman vice president marketing general magic retiring 1995 spend time family occasion given public lectures discussing early life apple working steve jobs hoffman married alain rossmann native france also worked apple two sons children attended international school peninsula palo alto served school board abigail mcconnell portrayed hoffman 2013 film jobs british actress kate winslet portrayed hoffman 2015 film steve jobs winslet golden globe award best supporting actress – motion picture bafta award best actress supporting role nominated academy award best supporting actress performance nature relationship hoffman jobs winslet described jobs work wife extraordinary feisty eastern european person pretty much person could actually knock sense steve | [
9123,
10406,
2282,
7307,
7806,
1389,
11118,
9999,
11420,
9778,
10386,
3412,
7640,
6234,
4251,
8540,
350,
511
] | None |
6,555 | 5 | Apache_Thrift:apache thrift thrift interface definition language binary communication protocol used defining creating services numerous languages forms remote procedure call rpc framework developed facebook scalable cross-language services development combines software stack code generation engine build cross-platform services connect applications written variety languages frameworks including actionscript c c++ c cappuccino cocoa delphi erlang go haskell java node.js objective-c ocaml perl php python ruby rust smalltalk swift although developed facebook open source project apache software foundation implementation described april 2007 technical paper released facebook hosted apache thrift includes complete stack creating clients servers top part generated code thrift definition file services generate client processor code contrast built-in types created data structures sent result generated code protocol transport layer part runtime library thrift possible define service change protocol transport without recompiling code besides client part thrift includes server infrastructure tie protocols transports together like blocking non-blocking multi-threaded servers underlying i/o part stack implemented differently different languages thrift supports number protocols supported transports thrift also provides number servers stated benefits thrift include thrift written c++ create code number languages create thrift service one write thrift files describe generate code destination language write code start server call client code example description file thrift generate code descriptive information instance java codice_2 simple codice_3 inside codice_4 class | [
4107,
6161,
1047,
8217,
9245,
5154,
6694,
11303,
5165,
5677,
1586,
9789,
7742,
7233,
11332,
7750,
2130,
11355,
7261,
8799,
8294,
8810,
8303,
2163,
6774,
7292,
10377,
8860,
2222,
1203,
7359,
6338,
1222,
4294,
9926,
7889,
8408,
6875,
9441,
... | None |
6,556 | 9 | MSWLogo:mswlogo mswlogo programming language interpreted based language logo graphical user interface gui front end developed george mills massachusetts institute technology mit core ucblogo brian harvey free open-source software source code available borland c++ mswlogo supports multiple turtle graphics 3d computer graphics allows input ports com lpt also supports windows interface input/output i/o available gui keyboard mouse events trigger interrupts simple gif animations may also produced mswlogo version 6.5 command codice_1 program also used educational software jim muller wrote great logo adventure complete logo manual using mswlogo demonstration language mswlogo evolved fmslogo educational programming environment free open source implementation language logo microsoft windows released gnu general public license gpl mainly developed maintained david costanzo mswlogo version 6.5b supports many functions including | [
10752,
11269,
2056,
2062,
9231,
7184,
2577,
9749,
8728,
4633,
4122,
8226,
3119,
2105,
3132,
6717,
8258,
8771,
8262,
75,
1613,
9299,
10841,
3675,
7267,
2660,
8293,
2666,
5751,
7805,
1159,
9865,
6797,
9877,
5803,
2225,
7867,
4799,
7880,
890... | Validation |
6,557 | 2 | History_of_CP/CMS:history cp/cms article covers history cp/cms — historical context ibm time-sharing virtual machine operating system built cp/cms development occurred complex political technical milieu historical notes provides supporting quotes citations first-hand observers seminal first-generation time-sharing system ctss first demonstrated mit 1961 production use 1964–74 paved way multics cp/cms time-sharing environments time-sharing concepts first articulated late 50s particularly way meet needs scientific computing time computers primarily used batch processing — jobs submitted punch cards run sequence time-sharing let users interact directly computer calculation simulation results could seen immediately scientific users quickly embraced concept time-sharing pressured computer vendors ibm improved time-sharing capabilities mit researchers spearheaded effort launching project mac intended develop next generation time-sharing technology would ultimately build multics extremely feature-rich time-sharing system would later inspire initial development unix high-profile team leading computer scientists formed specific technical recommendations requirements seeking appropriate hardware platform new system technical problems awesome early time-sharing systems sidestepped problems giving users new modified languages dartmouth basic accessed interpreters restricted execution contexts project mac vision shared unrestricted access general-purpose computing along vendors ibm submitted proposal project mac however ibm proposal well received ibm surprise mit chose ge multics system vendor fallout event led directly cp/cms early 60s ibm struggling define technical direction company identified problem past computer offerings incompatibility many ibm products product lines new product family new generation technology forced customers wrestle entirely new set technical specifications ibm products incorporated wide variety processor designs memory architectures instruction sets input/output strategies etc course unique ibm computer vendors seemed begin new system clean sheet design ibm saw problem opportunity cost software migration increasing barrier hardware sales customers could afford upgrade computers ibm wanted change ibm embarked risky undertaking system/360 product line intended replace ibm diverse earlier offerings including ibm 7000 series canceled ibm 8000 series ibm 1130 series various specialized machines used scientific applications system/360 would span unprecedented range processing power memory size device support cost important based pledge backward compatibility customer could move software new system without modification today world standard interfaces portable systems may seem radical goal time revolutionary system/360 computer model often specific devices programs could used systems buying bigger cpu also meant buying new printers card readers tape drives etc addition customers would rewrite programs run new cpu something customers often balked s/360 ibm wanted offer huge range computer systems sharing single processor architecture instruction set i/o interface operating system customers would able mix match meet current needs could confidently upgrade systems future without need rewrite software applications ibm focus remained traditional customer base large organizations administrative business data processing start system/360 project ibm fully appreciate amount risk involved system/360 ultimately gave ibm total dominance computer industry first nearly put ibm business ibm took one largest ambitious engineering projects history process discovered diseconomies scale mythical man-month extensive literature period fred brooks illustrate pitfalls period system/360 panic project mac asked ibm provide computers extensive time-sharing capabilities direction system/360 project going time-sharing n't seen important ibm main customer base batch processing key moreover time-sharing new ground many concepts involved virtual memory remained unproven example time nobody could explain troubled manchester/ferranti atlas virtual memory n't work later explained due thrashing based cp/cms m44/44x research result ibm system/360 announcement april 1964 include key elements sought time-sharing advocates particularly virtual memory capabilities project mac researchers crushed angered decision system/360 design team met project mac researchers listened objections ibm chose another path february 1964 height events ibm launched cambridge scientific center csc headed norm rassmussen csc serve link mit researchers ibm labs located building project mac ibm fully expected win project mac competition retain perceived lead scientific computing time-sharing one csc first projects submit ibm project mac proposal ibm received intelligence mit leaning toward ge proposal modified 600-series computer virtual memory hardware enhancements would eventually become ge 645 ibm proposed modified s/360 would include virtual memory device called blaauw box – component designed included s/360 mit team rejected ibm proposal modified s/360 seen different rest s/360 line mit want use customized special-purpose computer multics sought hardware would widely available ge prepared make large commitment time-sharing ibm seen obstructive bell laboratories another important ibm customer soon made decision rejected s/360 time-sharing loss project mac devastating csc essentially lost reason existence rasmussen remained committed time-sharing wanted earn back confidence mit researchers made bold decision now-idle csc team would build time-sharing operating system s/360 robert creasy left project mac lead csc team promptly began work become cp-40 first successful virtual machine operating system based fully virtualized hardware ibm loss project mac bell laboratories caused repercussions elsewhere ibm csc soon submitted successful proposal mit lincoln laboratory s/360-67 marking improvement ibm credibility mit committing real time-sharing product rather customized rpq system ibm showing kind commitment mit found ge csc also continued work cp-40 ostensibly provide research input s/360-67 team — also csc team grown skeptical tss project faced aggressive schedule lofty goals since s/360-67 would available csc time team conceived ingenious stopgap measure building virtual-memory s/360 designed set custom hardware microcode changes could implemented s/360-40 providing comparable platform capable supporting cp-40 virtual machine architecture actual cp-40 cms development began mid 1965 even arrival modified s/360-40 first production use cp-40 january 1967 tss project meantime running late struggling problems csc personnel became increasingly convinced cp/cms correct architecture s/360 time-sharing september 1966 csc staff began conversion cp-40 cms run s/360-67 cp-67 significant reimplementation cp-40 varian reports design generalized substantially allow variable number virtual machines larger virtual memories new data structures replaced control blocks describing virtual machines hard-coded part nucleus cp-67 added concept free storage control blocks could allocated dynamically inter-module linkage also reworked code made re-entrant since csc -67 would arrive time csc modified microcode customized s/360-40 simulate s/360-67 – particularly different approach virtual memory csc repeatedly successfully used simulation work around absence hardware waiting modified s/360-40 s/360-67 later first s/370 prototypes seen logical outgrowth virtual machine thinking period early testing cp-67 also done sites s/360-67 hardware available – notably ibm yorktown heights lab mit lincoln laboratory observers cp-67 lincoln labs already frustrated severe tss problems impressed cp-67 insisted ibm provide copy cp/cms according varian demand rocked whole company invested heavily tss however site critical ibm complied varian others speculate chain events could engineered rasmussen subterfuge motivate ibm continued funding csc work counter-strategic cp/cms told several times kill april 1967 – months cp-40 went production – cp/cms already daily use lincoln labs lincoln lab personnel worked closely csc improving cp/cms began enhancing cp cms soon delivered lincoln cambridge people worked together closely exchanged code regular basis beginning tradition code sharing mutual support would continue years around time union carbide another influential ibm customer followed path – deciding run cp/cms send personnel work csc contribute cp/cms development effort cp-40 cp-67 cms essentially research systems time built away ibm mainstream product organizations active involvement outside researchers experimenting important goal constant activity robert creasy cp-40 project leader later wrote design cp/cms small varied software research development group use support… experimenting time-sharing system design ... schedules budgets plans performance goals met.… also expected redo system least got going group meant learning experience efficiency specifically excluded software design goal although always considered know system would practical use ... january 1965 starting work system became apparent presentations outside groups system would controversial tss meantime described varian elegant ambitious system exhibiting serious stability performance problems snatched nest young february 1968 time share 30 eighteen s/360-67 sites attempting run tss conference ibm announced via blue letter tss decommitted — great blow time-sharing community decision would temporarily reversed tss would scrapped 1971 however cp/cms soon began gaining attention viable alternative time s/360-67 software bundled computer hardware purchases see ibm unbundling software services particular ibm operating systems available without additional charge ibm customers cp/cms unusual delivered unsupported type-iii software source code form – meaning cp/cms sites ran unsupported operating system need self-support community support helped lead creation strong s/360-67 cp/cms user communities precursors open source movement summer 1970 cp/cms team begun work system/370 version cp/cms would become vm/370 cp-370 proved vital s/370 project providing usable simulation s/370 s/360-67 hardware – reprise csc earlier hardware simulation strategies approach enabled s/370 development testing s/370 hardware available shortage prototype s/370s causing critical delays mvs project particular remarkable technical feat transformed mvs development award cp-370 developers probably rescued cp project extinction despite aggressive efforts cancel project august 1972 marked end cp/cms ibm system/370 advanced function announcement included new s/370-158 -168 address relocation hardware s/370s four new operating systems dos/vs dos virtual storage os/vs1 os/mft virtual storage os/vs2 os/mvt virtual storage would grow svs mvs vm/370 — re-implemented cp/cms time vm cp/cms development team swelled 110 people including documenters vm/370 real ibm system longer part ibm type-iii library source code distribution continued several releases however see cp/cms free software details 1968 principals small consulting firm connecticut called computer software systems audacious idea leasing ibm system/360-67 run cp/cms reselling computer time audacious ibm would typically lease 50–100k/month systems two-person startup third fourth employees dick orenstein one authors ctss dick bayles csc – primary architect cp-67 key hires cp/cms world included harold feinleib mike field robert jesurum bob jay late november 1968 persuaded ibm accept order small feat secured initial funding css took delivery first s/360-67 began selling time december 1968 css quickly discovered selling every available virtual machine minute published prices could barely take enough revenue pay machine lease whirlwind development program followed ramping cp/cms performance point could resold profitably began fork cp/cms source code evolved independently fifteen years operating system soon renamed vp/css company went public renamed national css although vp/css shared much cp/cms parent vm/370 sibling diverged many important ways business reasons system run profit users frustrated could stop paying time simply hanging phone forces gave high priority factors affecting performance usability customer support vp/css soon became known routinely supporting two three times many interactive users comparable vm systems early ncss enhancements involved areas page migration dispatching file system device support efficient fast-path hypervisor functions accessed via diagnose diag instruction later features included packet-switched network filedef-level pipe interprocess/intermachine communication database integration similar features also appeared vm implementation ultimately ncss development team rivaled size ibm implementing wide array features vp/css platform remained use least mid-80s ncss acquired dun bradstreet 1979 renamed dbcs dun bradstreet computer services increased focus nomad product changed business strategy embrace vm platforms process discontinued support development vp/css probably last non-vm fork cp/cms interactive data corporation idc followed plan similar national css selling time-sharing services based cp/cms platform focus time financial services varian reports idc several s/360-67 systems running cp/cms one ibm first relocating s/370 presumably referring s/370-145 1971 first dat box perhaps systems announced 1972 system/370 advanced function announcement including s/370-158 -168 details citations sought history idc cp/cms time-sharing following notes provide brief quotes primarily pugh varian see references illustrating development context cp/cms direct quotes rather paraphrases provided authors perspectives color interpretations background information citations | [
6529,
5378,
2179,
4996,
6148,
10883,
10508,
3725,
7053,
9361,
9619,
9468,
789,
11539,
11673,
9370,
284,
3359,
10273,
421,
6442,
1323,
7983,
8879,
7217,
8627,
9139,
6325,
7477,
7733,
10040,
10803,
5562,
573,
8509,
1219,
964,
8388,
6342,
11... | None |
6,558 | 9 | Modula-2:modula-2 modula-2 computer programming language designed developed 1977 1985 niklaus wirth swiss federal institute technology zurich eth zurich revision pascal serve sole programming language operating system application software personal workstation lilith principal concepts wirth viewed modula-2 successor earlier programming languages pascal modula language design also influenced mesa language new programming possibilities early personal computer xerox alto xerox wirth saw 1976 sabbatical year xerox parc computer magazine byte devoted august 1984 issue language surrounding environment modula-2 general purpose procedural language sufficiently flexible systems programming much broader application particular designed support separate compilation data abstraction straightforward way much syntax based wirth earlier better-known language pascal modula-2 designed broadly similar pascal elements syntactic ambiguities removed important addition module concept direct language support multiprogramming language allows compilation single pass compiler gutknecht wirth four times faster earlier multi-pass compilers example source code hello world program modula-2 module may used encapsulate set related subprograms data structures restrict visibility portions program module design implemented data abstraction feature modula-2 clean way modula-2 programs composed modules made two parts definition module interface portion contains parts subsystem exported visible modules implementation module contains working code internal module language strict scope control particular scope module considered impenetrable wall except standard identifiers object outer world visible inside module unless explicitly imported internal module object visible outside unless explicitly exported suppose module m1 exports objects b c p enumerating identifiers explicit export list objects b c p module m1 become known outside module m1 m1.a m1.b m1.c m1.p exported qualified manner universe assumed module m1 global exporting module name i.e m1 used qualifier followed object name suppose module m2 contains following import declaration means objects exported module m1 universe enclosing program used inside module m2 referenced qualified manner like m1.a m1.b m1.c m1.p example qualified export avoids name clashes instance another module m3 would also export object called p still distinguish two objects since m1.p differs m3.p thanks qualified export matter objects called p inside exporting modules m1 m3 alternative technique available wide use modula-2 programmers suppose module m4 formulated means objects exported module m1 universe used inside module m4 mere references exported identifiers unqualified manner like b c p. example technique unqualifying import allows use variables objects outside exporting module exactly simple i.e unqualified manner inside exporting module walls surrounding modules become irrelevant objects explicitly allowed course unqualifying import usable name clashes export import rules may seem unnecessarily restrictive verbose safeguard objects unwanted access also pleasant side-effect providing automatic cross-referencing definition every identifier program identifier qualified module name definition comes module otherwise occurs unqualified simply search backwards either encounter declaration identifier occurrence import statement names module comes property becomes useful trying understand large programs containing many modules language provides limited single-processor concurrency monitors coroutines explicit transfer control hardware access absolute addresses bit manipulation interrupts uses nominal type system two major dialects modula-2 first pim named book programming modula-2 niklaus wirth three major editions pim second third corrected fourth editions describing slight variants language second major dialect iso standardization effort international organization standardization differences amongst several supersets modula-2 language extensions specific application domains several derivative languages resemble modula-2 closely new languages right different languages different purposes strengths weaknesses many current programming languages adopted features modula-2 pim 2,3,4 defines following 40 reserved words pim 3,4 defines following 29 built-in identifiers cambridge modula-2 cambridge microprocessor systems based subset pim4 language extensions embedded development compiler runs dos generates code m68k based embedded microcontrollers running minos operating system mod51 mandeno granville electronics based iso modula-2 language extensions embedded development following iec1131 industry standard programmable logic controllers plc closely related modula-2 mod51 compiler generates standalone code 80c51 based microcontrollers delco electronics subsidiary gm hughes electronics developed version modula-2 embedded control systems starting 1985 delco named modula-gm first high level language used replace machine language code embedded systems delco engine control units ecus significant delco producing 28,000 ecus per day 1988 gm world largest producer ecus first experimental use modula-gm embedded controller 1985 antilock braking system controller based motorola 68xxx microprocessor 1993 gen-4 ecu used cart championship auto racing teams irl indy racing league teams first production use modula-gm use gm trucks starting 1990 model year vcm vehicle control module used manage gm powertrain vortec engines modula-gm also used ecus gm 90° buick v6 family 3800 series ii used 1997-2005 model year buick park avenue modula-gm compilers associated software management tools sourced delco intermetrics modula-2 selected basis delco high level language many strengths alternative language choices 1986 delco electronics spun gm component divisions form delphi 1997 global sourcing required non-proprietary high-level software language used ecu embedded software developed delphi compiled commercial c compilers serious rumors soviet space program many soviet satellites programmed modula-2 according russian wikipedia article modula-2 satellites russian gps framework glonass programmed modula-2 turbo modula-2 compiler integrated development environment modula-2 programming language running ms-dos developed borland never released instead group including borland cofounder niels jensen acting jensen partners bought unreleased codebase redeveloped released topspeed modula-2 topspeed eventually sold clarion owned softvelocity still offers modula-2 compiler part clarion product line z80 cp/m version turbo modula-2 briefly marketed echelon inc. license borland companion release hitachi hd64180 marketed micromint inc. development tool sb-180 single-board computer | [
9345,
5634,
11010,
9224,
8587,
8973,
2830,
6414,
8463,
10510,
8082,
5651,
9107,
11411,
1561,
8219,
3613,
5663,
6056,
4777,
428,
7983,
9008,
5684,
7479,
6329,
8510,
1474,
963,
8262,
3529,
4553,
8524,
5457,
11219,
8057,
10586,
219,
11102,
7... | Test |
6,559 | 4 | Prelude_SIEM_(Intrusion_Detection_System):prelude siem intrusion detection system prelude siem security information event management siem tool driving security prelude siem collect centralize information company security offer single point view manage thanks logs flows analyzer prelude siem create alerts intrusions security threats network real time prelude siem provide multiple tools forensic reporting big data smart data identify weak signals advanced persistent threat apt finally prelude siem embeds tools exploitation phase make works easier operators help risk management malicious user software may able evade detection single ids nids hids etc becomes exponentially difficult get around defenses multiple protection mechanisms prelude siem comes large set sensors monitoring different kind events prelude siem permits alert collection wan scale whether scope covers city country continent world prelude siem siem system capable inter-operating systems available market implement natively intrusion detection message exchange format idmef rfc 4765 format start demanded around world way natively idmef compatible opensource ids auditd nepenthes nufw ossec pam samhain sancp snort suricata kismet etc anyone write ids use 3rd party sensors available given prelude siem open apis libraries since 2016 prelude idmef partner program prelude siem also idmef compatible many commercial ids prelude siem provides siem functions three modules alert sem analyze ans archive sim one true siem alternative market plus prelude siem promotes use ietf security standards secef project prelude idmef partner program prelude siem collects normalizes sorts aggregates correlates displays security events regardless types surveillance equipment beyond capacity processing types event logs system logs syslog flat files etc prelude siem natively compatible many ids prelude siem main characteristics following prelude siem oss designed scalable way simply adapt environment free public open-source version gplv2 small infrastructures tests educational purposes open-source version composed following main modules modules base alert module commercial version commercial version also add many functionalities modules scale performances architecture possibilities prelude siem commercial version scalable professionally usable high performance version prelude real-world environments prelude soc fully scaled version mainly soc security operations center usage commercial versions organized like | [
7813,
10790,
7983,
1232,
823,
7192,
8922,
186,
11611,
4797,
3486
] | Validation |
6,560 | 4 | NCP_Engineering:ncp engineering ncp engineering styled 'ncp engineering nuremberg-based company produces software remote access industrial internet things security information security ncp products use virtual private network vpn technologies like encryption personal firewalls electronic certificates public key infrastructure pki secure data communication ncp made ipsec vpn client compatible windows 8 windows 10 ios os x linux android operating systems ncp abbreviation network communications products supplement engineering describes company produces software in-house data processing ncp engineering founded nuremberg germany 1986 company produces software secure data communication internet networks via 3g/4g wireless lans core ncp business provisioning secure communication connections stationary mobile end-devices well affiliate branch networks company headquarters 2007 ncp partnered watchguard technologies january 2010 ncp-e established north american affiliate ncp engineering inc february 2010 ncp engineering awarded us patent 8811397 b2 system method data communication user terminal gateway via network node ncp engineering involved esukom project development real-time security solution protects corporate networks using integrated security solutions based unified metadata format since 2010 simu project partner security information event management small smes ncp engineering focused optimizing security corporate networks many years working together 2017 ncp engineering juniper networks intensified collaboration technology partnership | [
3851,
3500,
10831,
9744,
8753,
5749,
823,
11611,
5373
] | Test |
6,561 | 4 | Application_permissions:application permissions application permissions widespread coarse-grained way limit applications access sensitive information example sound recorded microphone valuable resources like battery internet traffic account balance implemented major state art pda operation systems android ios windows web browsers web services providing oauth api list available permissions usually contains accessing android 6 permissions usually revokable though appops mechanism oses usually present vanilla android aftermarket oses usually removed stock oses allowing deprive apps access personal data android ≥6 apps request permissions run time requires app developer collaboration developer free use non-runtime permissions app likely crash permission granted ones granting permission target audience app permissions marked permissions previous versions os like internet access non-revocable even show apps installation fixed xprivacy ios usage permissions regulated using guidelines android ecosystem usage permissions often abused order spy users many applications require much permissions monetize integrating libraries advertising networks showing ads spying users better target webpermissions permission system web browsers web application needs data behind permission must request first user sees window asking make choice choice remembered cleared lately currently following resources controlled cases permissions implemented 'all-or-nothing approach user either grant requested permissions app unable use app even user revoke permission app blackmail user refusing operate example crashing solutions xprivacy instead providing access requested data instead throwing exception crashing app returning disinformation make app operate permission granted also possible use static analysis analyze requested permissions | [
700,
5637,
6750
] | Test |
6,562 | 4 | Knowledge-based_authentication:knowledge-based authentication knowledge-based authentication commonly referred kba method authentication seeks prove identity someone accessing service financial institution website name suggests kba requires knowledge private information individual prove person providing identity information owner identity two types kba static kba based pre-agreed set shared secrets dynamic kba based questions generated wider base personal information static kba also referred shared secrets shared secret questions commonly used banks financial services companies e-mail providers prove identity customer allowing account access fall-back user forgets password point initial contact customer business using static kba must collect information shared provider customer—most commonly questions corresponding answers data must stored retrieved customer comes back access account weakness static kba demonstrated incident 2008 unauthorised access gained e-mail account former alaska governor sarah palin yahoo account password could reset using shared secret questions including meet spouse along date birth zip code former governor answers easily available online identity verification providers recently introduced secret sounds pictures effort help secure sites information tactics require methods data storage retrieval secret questions dynamic kba high level authentication uses knowledge questions verify individual identity require person provided questions answers beforehand questions compiled public private data marketing data credit reports transaction history initiate process basic identification factors name address date birth must provided consumer checked identity verification service identity verified questions generated real time data records corresponding individual identity provided typically knowledge needed answer questions available person wallet companies call out-of-wallet questions making difficult anyone actual identity owner know answer obtain access secured information generally period time person given respond questions number attempts limited prevent answers researched dynamic kba employed several different industries verify identities customers means fraud prevention compliance adherence type kba based existing relationship consumer gives businesses way higher identity assurance customer identity account origination | [
3329,
11244,
4435,
1557,
957,
8735
] | Validation |
6,563 | 4 | Unified_access_management:unified access management unified access management uam refers identity management solution used enterprises manage digital identities provide secure access users across multiple devices applications cloud on-premise unified access management solutions provide single platform manage access across diverse set users devices applications whether on-premise cloud unified access management uam evolution identity access management iam systems goal unified access management similar identity access management manage identities individual entities people devices authentication authorization roles privileges within across enterprise systems secure manner bolsters productivity traditional identity access management tools work well addressing specific portions enterprise specific app environments on-premises cloud specific users employees vs. external partners however many businesses must harness multiple iam solutions example may use microsoft active directory web access management tool manage access on-premise applications require identity-as-a-service idaas solutions manage access cloud software service saas apps managing multiple identities access management systems burden information technology departments adds cost requiring maintenance multiple solutions often requires users provisioned de-provisioned multiple systems given iam system may manage access specific devices specific systems fragmented identity management enterprise may able provide true single sign multi-factor authentication effective user lifecycle management slowing digital transformation significant financial impact forrester found 4.47 million annual loss productivity due poor access management per every 10,000 employees hybrid environments complicate access management many organizations able dispense on-premises systems example 2018 47 decision makers surveyed reported majority organization ’ custom applications still run on-premises extensive cost moving legacy systems means organizations likely remain hybrid time uam introduced onelogin uam differs iam providing umbrella solution central cloud directory single source truth identities access cloud directory integrates on-premise identity providers cloud identity providers requests information identity providers updates user lifecycle management work one place cloud directory let uam update appropriate identity providers uam provides functionality needed secure access across users devices typically includes | [
3521,
7368,
11244,
3086,
7729,
210,
467,
5433
] | None |
6,564 | 7 | Urgent_computing:urgent computing urgent computing prioritized immediate access supercomputers grids emergency computations severe weather prediction matters immediate concern applications provide decision makers information critical emergencies waste time waiting job queues need access computational resources soon possible | [
5956,
3927
] | None |
6,565 | 4 | Remote_backup_service:remote backup service remote online managed backup service sometimes marketed cloud backup backup-as-a-service service provides users system backup storage recovery computer files online backup providers companies provide type service end users clients backup services considered form cloud computing online backup systems typically built client software program runs given schedule systems run day usually night computers n't use newer cloud backup services run continuously capture changes user systems nearly real-time online backup system typically collects compresses encrypts transfers data remote backup service provider servers off-site hardware many products market – offering different feature sets service levels types encryption providers type service frequently target specific market segments high-end lan-based backup systems may offer services active directory client remote control open file backups consumer online backup companies frequently beta software offerings and/or free-trial backup services fewer live support options mid-1980s computer industry great state change modems speeds 1200 2400 baud making transfers large amounts data slow 1 mb 72 minutes faster modems secure network protocols development tape backup systems gained popularity period need affordable reliable online backup system becoming clear especially businesses critical data online/remote backup services came existence heyday dot-com boom late 1990s initial years large industry service providers capturing market share understanding importance role online backup providers playing web services arena today service providers online backup services position services using saas software service paas platform service strategy relevance predicted increase exponentially years come personal enterprise data storage needs rise last years also witnessed healthy rise number independent online backup providers enterprise-class cloud backup solution must include on-premises cache mitigate issues due inconsistent internet connectivity hybrid cloud backup works storing data local disk backup captured high speed either backup software d2d2c disk disk cloud appliance encrypts transmits data service provider adds protection local disasters recent backups retained locally speed data recovery operations number cloud storage appliances market used backup target including appliances ctera networks storsimple twinstrata hybrid cloud backup also beneficial enterprise users security concerns storing data locally sending cloud backup users perform necessary encryption operations incl technologies like data encryption additionally applied choose public cloud service provider important compression backup data local backup cache used compress data sending cloud order lower network bandwidth load improve backup speed becomes critical enterprises backup huge databases like oracle ms sql huge files like virtual machine images mail server databases edb files exchange recent improvements cpu availability allow increased use software agents instead hardware appliances enterprise cloud backup software-only approach offer advantages including decreased complexity simple scalability significant cost savings improved data recovery times online backup services usually priced function following things vendors limit number versions file kept system services omit restriction provide unlimited number versions add-on features plug-ins like ability back currently open locked files usually charged extra services provide built remote backup services reduce amount data sent wire backing changed files approach backing means customers total stored data reduced reducing amount data sent also stored drastically reduced transmitting changed data bits binary block level incremental backups solutions transmit changed binary data bits waste bandwidth transmitting file data small amounts change remote backup advantages traditional backup methods remote backup disadvantages traditional backup methods services provide expert backup management services part overall offering services typically include three distinct types backup modes scheduled manual event-based | [
2432,
2944,
5504,
6785,
6280,
4623,
8465,
5650,
7955,
405,
11030,
10265,
10522,
4126,
929,
6435,
3366,
11178,
3629,
10032,
10161,
9906,
5300,
4023,
2487,
3773,
7874,
10054,
1358,
3794,
7381,
3800,
728,
11097,
2267,
11482,
4194,
4710,
5737,
... | Test |
6,566 | 2 | Stack_(Haskell):stack haskell stack tool build haskell projects manage dependencies uses cabal library together default curated version hackage repository stack competes cabal binary cabal-install created result overall criticism dependency problems however provide package format uses existing codice_1 files complements projects additional codice_2 file | [
10817,
3876,
8491,
6797,
7983,
5397,
4309
] | Test |
6,567 | 5 | Inter-Asterisk_eXchange:inter-asterisk exchange inter-asterisk exchange iax communications protocol native asterisk private branch exchange pbx software supported softswitches pbx systems softphones used transporting voip telephony sessions servers terminal devices original iax protocol deprecated superseded second version commonly called iax2 iax2 protocol published informational non-standards-track rfc 5456 discretion rfc editor february 2010 iax voip protocol used type streaming media including video mainly designed ip voice calls iax uses single user datagram protocol udp data stream endpoints session signaling media payloads thus uses single udp port number typically 4569 feature provides benefits traversing network address translators network boundaries simplifies firewall configuration voip protocols typically use independent streams signaling media session initiation protocol sip h.323 media gateway control protocol mgcp carry media real-time transport protocol rtp iax binary-encoded protocol new extension features must new numeric code allocated historically modeled internal data passing asterisk modules iax supports trunking multiplexing channels single link trunking data multiple sessions merged single stream packets two endpoints reducing ip overhead without creating additional latency advantageous voip transmissions ip headers use large percentage bandwidth iax2 supports native encryption control media streams using aes-128 versions iax protocol created mark spencer much development carried asterisk open-source community primary goals iax minimize bandwidth used media transmissions particular attention drawn control individual voice calls provide native network address translation nat transparency intended easy use behind firewalls | [
8386,
9381,
6567,
7407,
6993,
2994,
5843,
11413,
10271
] | None |
6,568 | 2 | Dmalloc:dmalloc dmalloc c memory debugger library written gray watson assist programmers finding variety dynamic memory allocation mistakes replaces parts malloc c standard library provided operating system compiler versions produce information intended help programmer detect problematic code dmalloc find memory leaks off-by-one errors usage invalid addresses library functions calls | [
1952,
3367,
814,
7983,
5492,
2045,
7902
] | None |
6,569 | 5 | NetCache:netcache netcache former web cache software product owned developed netapp 1997 2006 hardware product family incorporating netcache software netcache software started commercial fork harvest object cache developed internet middleware corporation imc consisted former harvest project developers including peter b. danzig professor university southern california late 1996 software named internet middleware object cache referred cached 2 later cached 3 1997 imc acquired netapp software renamed netcache danzig becoming chief architect cto netcache division 2006 netapp sold netcache business technology blue coat systems similar line proxysg appliances became expensive product existing netapp customers hardware netcache appliance included netapp data ontap microkernel write anywhere file layout file system achieving four times throughput software equivalents available time according netapp comparisons starting ontap version 9.5 similar functionality introduced flexcache name november 2005 three hardware models offered former models include | [
3520,
10816,
3042,
10210,
11104,
6894,
890,
6140
] | Test |
6,570 | 3 | VGA-compatible_text_mode:vga-compatible text mode implementation computer monitor text mode vga-compatible hardware quite complex use pc-compatible computers widespread 1980s–1990s particularly dos systems persists today applications even modern desktop computers main features vga text mode colored programmable 16 color palette characters background blinking various shapes cursor block/underline/hidden static/blinking loadable fonts various glyph sizes linux console traditionally uses hardware vga-compatible text modes win32 console environment ability switch screen text mode text window sizes screen character actually represented two bytes aligned 16-bit word accessible cpu single operation lower character byte actual code point current character set higher attribute byte bit field used select various video attributes color blinking character set forth byte-pair scheme among features vga inherited ega cga ultimately mda colors assigned way 4-bit indexed color graphic modes see vga color palette vga modes need mda reverse bright attributes foreground background colors set explicitly vga hardware ability enable underline character attribute bit 0 set however since mda-compatible feature attribute bits used mda must set zero underline shown means bits 3 intensity 7 blink set concurrently bit 0 underline default vga palette setting bit 0 enable underline also change text colour blue means text two colors underlined light blue dark blue default palette despite underline normally visible color modes location underline defaults scanline character glyph rendering invisible underline location set visible scanline default switching mda-compatible monochrome text mode underline appear screen fonts used ega vga monospace raster fonts containing 256 glyphs glyphs font size size changed typically glyphs 8 dots wide 8–16 dots high however height value maximum 32 row glyph coded 8 bit byte high bits left glyph low bits right along several hardware-dependent fonts stored adapter rom text mode offers 8 loadable fonts two active font pointers font font b select two available fonts although usually point font point different fonts attribute bit 3 see acts font selection bit instead foreground color bit real vga hardware overrides bit use color selection many clones emulators color selection remains — meaning one font displayed normal intensity high-intensity error overcome changing palette registers contain two copies 8-color palette modes character box width 9 dots e.g default 80×25 mode however 9th column used spacing characters content changed always blank drawn current background colour exception line graphics enable mode causes code points 0xc0 0xdf inclusive 8th column repeated 9th code points cover box drawing characters must extend way right side glyph box reason placing letter-like characters code points 0xc0–0xdf avoided box drawing characters 0xb0 0xbf extended point right require extending shape cursor restricted rectangle full width character box filled foreground color character cursor current location height position may arbitrary within character box ega many vga clones allowed split-box cursor appearing two rectangles one top character box one bottom setting end cursor start however done original vga cursor completely hidden instead vga standard provide way alter blink rate although common workarounds involve hiding cursor using normal character glyph provide so-called software cursor mouse cursor tui implemented usually thing hardware cursor moving rectangle altered background special glyph text-based interfaces impulse tracker went even greater lengths provide smoother graphic-looking mouse cursor done constantly re-generating character glyphs real-time according cursor on-screen position underlying characters generally two ways access vga text-mode application video bios interface directly accessing video ram i/o ports latter method considerably faster allows quick reading text buffer reason preferred advanced tui programs vga text buffer located physical memory address 0xb8000 since usually used 16-bit x86 processes operating real-mode first half memory segment 0xb800 text buffer data read written bitwise operations applied part text buffer memory scope current mode accessible shown physical addresses used protected mode applications may either part memory mapped address space access via operating system application modern multitasking os control console accesses part system ram instead actual text buffer computers 1980s fast manipulation text buffer hardware generating individual pixels fast could displayed extremely useful fast ui even relatively modern hardware overhead text mode emulation via hardware apa graphics modes program generates individual pixels stores video buffer may noticeable monitor side difference input signal text mode apa mode size text mode signal may timings vesa standard modes registers used adapter side set parameters text mode apa modes text mode output signal essentially graphic modes source text buffer character generator framebuffer apa depending graphics adapter used variety text modes available ibm pc compatible computers listed table vga compatible cards support mda cga ega modes colored modes design text attributes mda modes specific features see — text could emphasized bright underline reverse blinking attributes far common text mode used dos environments initial windows consoles default 80 columns 25 rows 80×25 16 colors mode available practically ibm compatible personal computers two vga text modes 80×43 80×50 exist rarely used 40 column text modes never popular used demonstration purposes old hardware character sizes graphical resolutions extended vesa-compatible super vga text modes manufacturer dependent cards e.g s3 supported custom large text modes like 100×37 even 160×120 like graphic modes graphic adapters 2000s commonly capable set arbitrarily-sized text mode reasonable limits instead choosing parameters list poor software support deters widespread use custom modes linux dos systems named svga cards program called svgatextmode used set better looking text modes ega vga standard ones particularly useful large ≥ 17 monitors normal 80×25 vga text mode 720×400 pixel resolution far lower typical graphics mode would svgatextmode allows setting pixel clock higher refresh rate larger font size cursor size etc. allows better use potential video card monitor non-windows systems use svgatextmode alternative options linux framebuffer obtain sharp text critical lcd monitors 1280×1024 higher resolution none named standard text modes fits matrix size svgatextmode also allows fine tuning video signal timings despite name program supported modes conform svga i.e vesa standards vga text modes hardware-imposed limitations appear restrictive hardware text mode vga compatible video adapters limited use | [
1408,
6213,
134,
10839,
2345,
7983,
11631,
6129,
7442,
499,
6868,
11634,
823,
3323,
5598,
1247
] | Test |
6,571 | 1 | Australian_Plant_Census:australian plant census australian plant census apc provides online interface currently accepted published scientific names vascular flora australia one output interfaces national government integrated biodiversity information system ibis – oracle co. relational database management system australian national herbarium australian national botanic gardens australian biological resources study council heads australasian herbaria coordinate system australian plant census interface provides currently accepted scientific names synonyms illegitimate misapplied excluded names well state distribution data item output hyperlinks online interfaces information system including australian plant name index apni australian plant image index apii outputs australian plant census interface provide information native naturalised vascular plant taxa australia including offshore islands excludes taxa known australia cultivation yet naturalised classification plant families based angiosperm phylogeny group iii system 2009 | [
560,
10513
] | Test |
6,572 | 4 | Frank_Rowlett:frank rowlett frank byron rowlett may 2 1908 – june 29 1998 american cryptologist rowlett born rose hill lee county virginia attended emory henry college emory virginia 1929 received bachelor degree mathematics chemistry hired william friedman junior cryptanalyst signals intelligence service sis april fools day 1930 shortly followed sis abraham sinkov solomon kullback 1930s lengthy period training rowlett colleagues compiled codes ciphers use u.s. army began solving number foreign notably japanese systems mid-1930s solved first japanese machine encipherment diplomatic communications known americans red 1939–40 rowlett led sis effort solved sophisticated japanese diplomatic machine cipher codenamed purple u.s. asked greatest contribution effort rowlett said one believed could done rowlett also played crucial role protecting american communications world war ii making fundamental innovative contributions design sigaba cipher machine security important factor saving american lives combat 1964 congress awarded rowlett us 100,000 equivalent partial compensation classified cryptologic inventions addition highly developed cryptanalytic skills rowlett good manager rose quickly within organization 1943–45 chief general cryptanalytic branch 1945-1947 chief intelligence division 1949 1952 technical director office operations armed forces security agency predecessor national security agency nsa rowlett differed general ralph j. canine first director nsa personnel movements including acting differences transferred central intelligence agency cia 1952 worked 1958 time returned nsa special assistant director 1965 rowlett became commandant national cryptologic school 1965 rowlett awarded president award distinguished federal civilian service retired federal service 1966 1965 awarded national security medal president lyndon b. johnson work breaking japanese purple cipher rowlett inducted military intelligence hall fame importance protection american communications information systems security organization named highest award frank byron rowlett award frank rowlett died june 29 1998 age 90 | [
4007,
173,
7887,
6578,
1941,
6136,
5310
] | None |
6,573 | 6 | Mkdosfs:mkdosfs mkdosfs one applications included dosfstools package used create dos file system linux data storage device usually disk partition mkdosfs options device may specify number blocks device allow mkdosfs guess mkdosfs support creating boot-able partitions | [
5492
] | Validation |
6,574 | 9 | ICI_(programming_language):ici programming language ici general purpose interpreted computer programming language originally developed tim long late 1980s dynamic typing flexible data types basic syntax flow control constructs operators c. considered broadly similar perl roughly contemporary like perl also tight integration regular expressions ici acronym primitive data types ici include integers reals strings files safe pointers regular expressions aggregate data types arrays sets associative tables sets heterogeneous nested support usual set operations union intersection etc language supports subroutines nested modules variables lexically scoped subroutine module level unlike structured languages ici allows current scope adjusted tcl also allows example ici object-based many object programming features emulated language using data structure inheritance feature called super-structures support application development ici c-like file i/o system interface support well high-level event trigger facility language also modest standard library built-in functions also notable generous license permits use purpose including commercial alteration resale | [
8582,
692,
2045,
8262
] | None |
6,575 | 3 | Mini_DisplayPort:mini displayport mini displayport minidp mdp miniaturized version displayport audio-visual digital interface announced apple october 2008 2013 new apple macintosh computers port led cinema display however 2016 apple began phasing port replacing new usb-c connector mini displayport also fitted pc motherboards pc notebooks asus microsoft msi lenovo toshiba hp dell manufacturers unlike mini-dvi micro-dvi predecessors mini displayport drive display devices resolutions 2560×1600 wqxga displayport 1.1a implementation 4096×2160 4k displayport 1.2 implementation adapter mini displayport drive display devices vga dvi hdmi interfaces apple offers free license mini displayport reserve right cancel license licensee commence action patent infringement apple apple replaced dvi port macbook macbook air macbook pro imac mac mini mac pro mini displayport use video connector 24-inch cinema display may complicate compatibility | [
9057,
5661,
5384,
1832,
7594,
7818,
10954,
3629,
8719,
11631,
1400,
3453,
7647
] | None |
6,576 | 8 | Web_analytics:web analytics web analytics measurement collection analysis reporting web data purposes understanding optimizing web usage however web analytics process measuring web traffic used tool business market research assess improve effectiveness website web analytics applications also help companies measure results traditional print broadcast advertising campaigns helps one estimate traffic website changes launch new advertising campaign web analytics provides information number visitors website number page views helps gauge traffic popularity trends useful market research web analytics processes come four essential stages steps another essential function developed analysts optimization websites experiments goal a/b testing identify suggest changes web pages increase maximize effect statistically tested result interest stage impacts impact i.e. drives stage preceding following sometimes data available collection impacts online strategy times online strategy affects data collected least two categories web analytics off-site on-site web analytics historically web analytics used refer on-site visitor measurement however meaning become blurred mainly vendors producing tools span categories many different vendors provide on-site web analytics software services two main technical ways collecting data first traditional method server log file analysis reads logfiles web server records file requests browsers second method page tagging uses javascript embedded webpage make image requests third-party analytics-dedicated server whenever webpage rendered web browser desired mouse click occurs collect data processed produce web traffic reports fundamental goal web analytics collect analyze data related web traffic usage patterns data mainly comes four sources web servers record transactions log file soon realized log files could read program provide data popularity website thus arose web log analysis software early 1990s website statistics consisted primarily counting number client requests hits made web server reasonable method initially since website often consisted single html file however introduction images html websites spanned multiple html files count became less useful first true commercial log analyzer released ipro 1994 two units measure introduced mid-1990s gauge accurately amount human activity web servers page views visits sessions page view defined request made web server page opposed graphic visit defined sequence requests uniquely identified client expired certain amount inactivity usually 30 minutes page views visits still commonly displayed metrics considered rather rudimentary emergence search engine spiders robots late 1990s along web proxies dynamically assigned ip addresses large companies isps made difficult identify unique human visitors website log analyzers responded tracking visits cookies ignoring requests known spiders extensive use web caches also presented problem log file analysis person revisits page second request often retrieved browser cache request received web server means person path site lost caching defeated configuring web server result degraded performance visitor bigger load servers concerns accuracy log file analysis presence caching desire able perform web analytics outsourced service led second data collection method page tagging 'web bugs mid-1990s web counters commonly seen — images included web page showed number times image requested estimate number visits page late 1990s concept evolved include small invisible image instead visible one using javascript pass along image request certain information page visitor information processed remotely web analytics company extensive statistics generated web analytics service also manages process assigning cookie user uniquely identify visit subsequent visits cookie acceptance rates vary significantly websites may affect quality data collected reported collecting website data using third-party data collection server even in-house data collection server requires additional dns lookup user computer determine ip address collection server occasion delays completing successful failed dns lookups may result data collected increasing popularity ajax-based solutions alternative use invisible image implement call back server rendered page case page rendered web browser piece ajax code would call back server pass information client aggregated web analytics company ways flawed browser restrictions servers contacted xmlhttprequest objects also method lead slightly lower reported traffic levels since visitor may stop page loading mid-response ajax call made logfile analysis programs page tagging solutions readily available companies wish perform web analytics cases web analytics company offer approaches question arises method company choose advantages disadvantages approach main advantages log file analysis page tagging follows main advantages page tagging log file analysis follows logfile analysis almost always performed in-house page tagging performed in-house often provided third-party service economic difference two models also consideration company deciding purchase solution cheaper implement depends amount technical expertise within company vendor chosen amount activity seen websites depth type information sought number distinct websites needing statistics regardless vendor solution data collection method employed cost web visitor analysis interpretation also included cost turning raw data actionable information use third party consultants hiring experienced web analyst training suitable in-house person cost-benefit analysis performed example revenue increase cost savings gained analyzing web visitor data companies produce solutions collect data log-files page tagging analyze kinds using hybrid method aim produce accurate statistics either method early hybrid solution produced 1998 rufus evison ip geolocation possible track visitors locations using ip geolocation database api visitors geolocated city region country level ip intelligence internet protocol ip intelligence technology maps internet categorizes ip addresses parameters geographic location country region state city postcode connection type internet service provider isp proxy information first generation ip intelligence referred geotargeting geolocation technology information used businesses online audience segmentation applications online advertising behavioral targeting content localization website localization digital rights management personalization online fraud detection localized search enhanced analytics global traffic management content distribution click analytics special type web analytics gives special attention clicks commonly click analytics focuses on-site analytics editor website uses click analytics determine performance particular site regards users site clicking also click analytics may happen real-time unreal -time depending type information sought typically front-page editors high-traffic news media sites want monitor pages real-time optimize content editors designers types stakeholders may analyze clicks wider time frame help assess performance writers design elements advertisements etc data clicks may gathered least two ways ideally click logged occurs method requires functionality picks relevant information event occurs alternatively one may institute assumption page view result click therefore log simulated click led page view customer lifecycle analytics visitor-centric approach measuring falls umbrella lifecycle marketing page views clicks events api calls access third-party services etc tied individual visitor instead stored separate data points customer lifecycle analytics attempts connect data points marketing funnel offer insights visitor behavior website optimization methods data collection sometimes used packet sniffing collects data sniffing network traffic passing web server outside world packet sniffing involves changes web pages web servers integrating web analytics web server software also possible methods claim provide better real-time data methods globally agreed definitions within web analytics industry bodies trying agree definitions useful definitive time main bodies input area iab interactive advertising bureau jicwebs joint industry committee web standards uk ireland daa digital analytics association formally known waa web analytics association us however many terms used consistent ways one major analytics tool another following list based conventions useful starting point off-site web analytics based open data analysis social media exploration share voice web properties usually used understand market site identifying keywords tagged site either social media websites using http referer webpage owners able trace referrer sites helps bring traffic site hotel problem generally first problem encountered user web analytics problem unique visitors day month add total unique visitors month appears inexperienced user problem whatever analytics software using fact simple property metric definitions way picture situation imagining hotel hotel two rooms room room b table shows hotel two unique users day three days sum totals respect days therefore six period room two unique users sum totals respect rooms therefore four actually three visitors hotel period problem person stays room two nights get counted twice count day counted looking total period software web analytics sum correctly chosen time period thus leading problem user tries compare totals historically vendors page-tagging analytics solutions used third-party cookies sent vendor domain instead domain website browsed third-party cookies handle visitors cross multiple unrelated domains within company site since cookie always handled vendor servers however third-party cookies principle allow tracking individual user across sites different companies allowing analytics vendor collate user activity sites provided personal information activity sites thought anonymous although web analytics companies deny companies companies supplying banner ads done privacy concerns cookies therefore led noticeable minority users block delete third-party cookies 2005 reports showed 28 internet users blocked third-party cookies 22 deleted least month vendors page tagging solutions moved provide least option using first-party cookies cookies assigned client subdomain another problem cookie deletion web analytics depend cookies identify unique visitors statistics dependent persistent cookie hold unique visitor id users delete cookies usually delete first- third-party cookies done interactions site user appear first-time visitor next interaction point without persistent unique visitor id conversions click-stream analysis metrics dependent activities unique visitor time accurate cookies used ip addresses always unique users may shared large groups proxies cases ip address combined user agent order accurately identify visitor cookies available however partially solves problem often users behind proxy server user agent methods uniquely identifying user technically challenging would limit trackable audience would considered suspicious cookies selected option reach lowest common denominator without using technologies regarded spyware may good aware third-party information gathering subject network limitations security applied countries service providers private networks prevent site visit data going third parties methods described methods mentioned like sampling central problem vulnerable manipulation inflation deflation means methods imprecise insecure reasonable model security issue addressed number papers to-date solutions suggested papers remain theoretical possibly due lack interest engineering community financial gain current situation provides owners big websites details consult aforementioned papers | [
4096,
1033,
11274,
10262,
5150,
7710,
4640,
3634,
11319,
3643,
10814,
2119,
79,
5203,
5724,
3688,
113,
10355,
4725,
8309,
10370,
9878,
10392,
11429,
185,
705,
8914,
10450,
225,
8941,
8448,
1794,
1802,
8470,
4378,
7965,
7967,
2340,
4911,
4... | Validation |
6,577 | 5 | Netgear_NSDP:netgear nsdp nsdp netgear switch discovery protocol management protocol several network device families designed netgear message body records tlv tag-length value structures type field may one following values table list incomplete network devices discovery mac-address device model discovery device firmware update made tftp protocol need send nsdp request turn tftp-server first | [
10242,
3847,
649,
9868,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
562,
2996,
9909,
10171,
4797,
5181,
3133,
3006,
5437,
8386,
7364,
2887,
8265,
11210,
2509,
4687,
5843,
2904,
5469,
5470,
5471,
... | None |
6,578 | 4 | Abraham_Sinkov:abraham sinkov abraham abe sinkov august 22 1907 – january 19 1998 us cryptanalyst early employee u.s. army signals intelligence service held several leadership positions world war ii transitioning new national security agency war became deputy director retiring 1962 taught mathematics arizona state university sinkov son jewish immigrants russia born philadelphia grew brooklyn graduating boys high school took b.s mathematics city college new york coincidence one close friends boys high ccny solomon kullback mr. sinkov taught new york city schools unhappy working conditions anxious use mathematics knowledge practical ways opportunity career change came 1930 sinkov kullback took civil service examination placed high received mysterious letters washington asking knowledge foreign languages sinkov knew french kullback spanish acceptable prospective employer offered positions junior cryptanalysts although neither quite certain cryptanalyst accepted small signals intelligence service sis organization sinkov kullback third fourth employees primary mission compiling codes ciphers use u.s. army secondary task attempt solve selected foreign codes ciphers—this necessarily done intelligence purposes keep cryptanalysts abreast new developments field william friedman put new employees rigorous course study design cryptology bringing high levels skill making breaking codes ciphers friedman also encouraged self-improvement endeavors employees trained summers camp ft. meade earn commissions military reserves sinkov kullback also went receive doctorates mathematics sinkov received phd mathematics 1933 george washington university 1936 sinkov assigned panama canal zone established u.s. army first permanent intercept site outside continental united states sis grew slowly throughout early 1930s however successes japanese diplomatic codes using machine systems 1935 provided u.s. government critical information series crises success practical consequences sis well first time sis began garner respect military superiors military understood small organization could read sensitive messages potential adversary signal corps increased sis budget authorized increased hiring cryptanalysts 1940 even though united states officially combatant u.s. britain initiated exchanges technical material included cautious sharing cryptologic information british stages revealed extent considerable success high-level german systems u.s. equivalent success japanese led unprecedented level cooperation communication intelligence comint two countries war resulting personnel bigger budgets wider range activities organization january 1941 britain battled nazi germany nearly year united states entered second world war captain sinkov selected member delegation united kingdom initial sharing information two countries respective cryptologic programs delegation returned april mixed results report sinkov colleagues shown bletchley park secret headquarters british cryptology exchanged information german japanese systems still unclear much american delegation told british success german enigma machine sinkov later recalled told enigma problem short delegation leave details sketchy nevertheless mission uk success overall helped give us-uk cryptologic relations strong practical foundation japanese attack pearl harbor december 7 1941 japanese also attacked philippine islands general douglas macarthur ordered leave philippines re-establish u.s. army headquarters australia whence counterattacks might launched macarthur recognized need cryptologic support thus 15 april 1942 established central bureau cb cobbling together refugee elements american cryptologists evacuated philippines australian cryptologists allied contingents cb began melbourne moved brisbane july 1942 major sinkov arrived melbourne commander american detachment central bureau director cb paper general spencer b. akin macarthur chief signal officer general akin practice seldom visited organization worked sinkov washington panama confidently left cb operations control sinkov demonstrated strong organizational leadership qualities addition mathematics skills brought group americans australians—representing also different military services countries—into cohesive unit cb quickly became trusted producer signals intelligence sigint macarthur senior commanders sigint enabled consistent success air war japanese allowed macarthur win stunning victories ground campaign new guinea philippines war sinkov rejoined sis renamed army security agency 1949 armed forces security agency afsa —the first centralized cryptologic organization united states—was formed sinkov became chief communications security program remained position afsa made transition national security agency 1954 sinkov became second nsa official attend national war college first louis tordella upon return became deputy director production effectively swapping jobs old colleague frank rowlett sinkov retired nsa 1962 1966 wrote elementary cryptanalysis mathematical approach one first books subject directed high school students available general public abraham sinkov lived retirement arizona two careers 32 years nsa predecessors followed appointment professor mathematics arizona state university colonel sinkov member military intelligence hall fame | [
4007,
6572,
3629,
7887,
9617,
1941,
1783,
6749,
5310
] | None |
6,579 | 4 | SSL-Explorer:_Community_Edition:ssl-explorer community edition ssl-explorer community edition open-source ssl vpn product developed 3sp ltd company acquired barracuda networks licensed gnu general public license gpl aimed primarily smaller businesses need remote access internal network resources product designed installed standalone server allows user connect remotely internal corporate resources intranet websites network file shares ‘ fat client ’ applications data via regular web browser gives end users access applications would use every day work simple web browser without necessity installing dedicated vpn client software product first released sourceforge.net website august 2004 since 275,000 downloads main product distribution december 2007 versions core community edition product licensed gpl commercial enterprise edition product built upon community edition additional functionality licensed separately commercial license fork last gpl release created named adito later renamed openvpn als around march 2008 3sp ltd announced discontinued development community edition ssl-explorer known install function following operating systems product previously licensed gpl source code still available via sourceforge.net however future updates source code pre-built binaries forthcoming 3sp ltd. november 18 2008 3sp ltd. part barracuda networks technology behind ssl-explorer incorporated barracuda ssl vpn ssl-explorer application written java contains database web server used serve secure web pages order access back-end network resources product ideally installed upon standalone server may installed service run background processes desired product acts web-based proxy mediates requests resources external users also providing means authenticating users identities querying number user databases including microsoft active directory access rights enforced principle role based access control secondary access control measures ntfs filesystem permissions also affect resources user may access resources e.g remote desktop access require use port forwarding operate successfully purpose lightweight java applet known 'ssl-explorer agent downloaded launched client browser applet intercepts tcp/ip requests certain configurable ports forwards ssl-explorer server turn routes appropriate endpoint network using combination various techniques web proxying port forwarding corporate applications continue function unimpeded data tunneled transparently end point client via ssl-explorer using https protocol network resources may externalized ssl-explorer include following actual vpn server may placed inside either dmz within trusted network incoming connections port 443 forwarded directly ssl-explorer firewall rules one main advantages associated ssl vpn products lies fact correctly set technically possible close firewall ports apart https/ssl port 443 often lumped together similar solutions ssl-explorer conceptually different openvpn provides controlled authenticated access services applications within network rather full unchallenged network access ssl-explorer ssl vpn products whole beneficial many people number distinct groups benefit greatly usage community edition ssl-explorer provided number security features features one-time-password support hardware token authentication offered via commercial implementation barracuda ssl vpn february 2007 3sp ltd conducted performance benchmarking ssl-explorer solution using test bed platform three systems using different specifications hardware benchmarking conducted assumption minimum 256 kbit/s data throughput rate would realistic value place upon responsive vpn tunnel use remote desktop access bea jrockit jre used tests microsoft windows linux systems results obtained indicated ssl-explorer known operate successfully using ncipher nfast ln1200 ssl accelerator card ssl-explorer built using number open source software components frameworks notable projects summarized june 2007 secunia published advisory stating versions ssl-explorer prior 0.2.13 vulnerable cross-site scripting attacks http header injection attacks 3sp ltd fixed vulnerability later versions product advised users upgrade servers currently us-cert advisory notice unresolved potential security flaw affecting whole class url-rewriting clientless ssl vpn products including versions ssl-explorer derivatives many similar utilities see | [
899,
1164,
6797,
2193,
929,
10149,
8998,
5677,
7983,
2228,
823,
2872,
5433,
1474,
7364,
3791,
3545,
5491,
4725,
9471
] | Test |
6,580 | 1 | Plants_of_the_World_Online:plants world online plants world online online database published royal botanic gardens kew launched march 2017 ultimate aim enable users access information world known seed-bearing plants 2020 initial focus tropical african floras particularly flora zambesiaca flora west tropical africa flora tropical east africa | [
560,
10513,
1227,
735
] | Test |
6,581 | 9 | JetBrains_MPS:jetbrains mps jetbrains mps metaprogramming system developed jetbrains mps tool design domain-specific languages dsl uses projectional editing allows users overcome limits language parsers build dsl editors ones tables diagrams. br implements language-oriented programming mps environment language definition language workbench integrated development environment ide languages developers different domains benefit domain specific language extensions general purpose programming languages example java developers working financial applications might benefit built-in support monetary values unfortunately traditional text based languages subject text ambiguity problems makes extensions problematic mps supports composable language definitions means languages extended embedded extensions used work program mps example java extended better syntax collections extended better syntax dates extensions work well together mps solves grammar ambiguity issues working abstract syntax tree directly order edit tree text-like projectional editor used mps provides reusable language infrastructure configured language definition languages mps also provides many ide services automatically editor code completion find usages etc mbeddr embedded development system based mps languages tailored embedded development formal methods october 2009 jetbrains released youtrack bug tracking system first commercial software product developed mps april 2010 realaxy actionscript editor beta released first commercial ide based mps platform peopl tool software product line engineering realised mps mps source code released apache license | [
7777,
9926,
2537,
5612,
5677,
7983
] | None |
6,582 | 3 | Mach_3_(1987_video_game):mach 3 1987 video game mach 3 1987 3d shooter video game loriciels amiga amstrad cpc atari st msx thomson to7 zx spectrum ibm pc pc version uses cga 320x200 video mode player controls spacecraft shoots various enemy crafts avoiding mines obstacles intro screen sampled phrase spoken get ready mach 3 | [
9006
] | None |
6,583 | 2 | Slackpkg:slackpkg slackpkg software tool installing upgrading packages automatically network internet slackware slackpkg included main tree slackware 12.2 previously included extras/ since slackware 9.1 licensed gnu general public license gpl slackpkg automated package management tool written slackware shell script like swaret designed make slackware system administrator job easier allowing routine package management tasks accomplished single command slackpkg replace slackware package management tools installpkg upgradepkg rather uses features slackpkg include automated package installation upgrading searching many features package deinstallation performed directly using slackware package tools though incorporation slackpkg provides consistent user interface slackpkg resolve dependencies packages like rpm fedora opensuse third-party applications slapt-get automated package relation management | [
11525,
2310,
10760,
7689,
2955,
7435,
7181,
7947,
9487,
2448,
657,
10387,
788,
1813,
8213,
10900,
6680,
8476,
7325,
10149,
5670,
4775,
7847,
6828,
6446,
7983,
1842,
2872,
3131,
5819,
10172,
190,
3649,
10817,
9671,
5067,
3918,
463,
10062,
... | Train |
6,584 | 2 | Common_Log_File_System:common log file system common log file system clfs general-purpose logging subsystem accessible kernel-mode well user-mode applications building high-performance transaction logs introduced windows server 2003 r2 included later windows operating systems clfs used data logging well event logging clfs used txf txr store transactional state changes commit transaction binary log file created clfs viewed integrated windows tool job clfs like transactional logging system record series steps required action either played back accurately future commit transaction secondary storage undone required clfs first marshals logs records in-memory buffers writes log-files secondary storage stable media clfs terminology permanent persistence data flushed stable media controlled built-in policies clfs client application override force flush clfs allows customizable log formats expansion truncation logs according defined policies well simultaneous use multiple client applications clfs able store log files anywhere file system clfs defines device driver interface ddi via physical storage system specific drivers plug clfs api clfs driver implements aries recovery algorithm algorithms supported using custom drivers clfs supports dedicated logs well multiplexed logs dedicated log contains single stream log records whereas multiplexed log contain multiple streams stream different application even though multiplexed log multiple streams logs flushed streams sequentially single batch clfs allocate space set log records ahead-of-time logs actually generated make sure operation fail due lack storage space log record clfs stream first placed log i/o block buffer system memory periodically blocks flushed stable storage devices storage device log contains set containers allocated contiguously containing multiple log i/o blocks new log records appended present set record identified log sequence number lsn increasing 32-bit sequence number lsn metadata stored record header lsn encodes identifier container offset record identifier record information used access log record subsequently however container identifiers logical identifiers must mapped physical containers mapping done clfs | [
10243,
11270,
5643,
4624,
10769,
9234,
1043,
537,
540,
3102,
1055,
9762,
2083,
8227,
8740,
1577,
10281,
4143,
9263,
11316,
1077,
2101,
8246,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
9813,
10839,
603,
9819,
2145,
3170,
... | None |
6,585 | 8 | Open_Mashup_Alliance:open mashup alliance open mashup alliance oma non-profit consortium promotes adoption mashup solutions enterprise evolution enterprise mashup standards like emml enterprise mashup usage expected grow tenfold next five years initial members oma include large technology companies adobe systems hewlett-packard intel major technology users bank america capgemini according information technology industry analyst dion hinchcliffe ultimately oma creates standardized approach enterprise mashups creates open vibrant market competing runtimes mashups array important aftermarket services development/testing tools management administration appliances governance frameworks education professional services initial focus oma developing emml declarative mashup domain-specific language dsl aimed creating enterprise mashups emml language provides comprehensive set high-level mashup-domain vocabulary consume mash variety web data-sources diverse ways emml provides uniform syntax invoke heterogeneous service styles rest wsdl rss/atom rdbms pojo emml also provides ability mix match diverse data-formats xml json jdbc javaobjects primitive types oma web site provides emml specification emml schema reference runtime implementation capable running emml scripts sample emml mashup scripts technical documentation oma developing emml creative commons attribution derivatives license license means emml users allowed copy distribute emml however emml altered users ownership emml oma must made clear redistribution eventual objective oma submit emml specification oma specifications recognized industry standards body | [
5384,
4107,
9926,
479
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.