node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
6,686
2
ZAP_File:zap file .zap file zero administration package text file allows publishing application user microsoft windows system windows 2000 xp professional windows vista windows 7 professional applications .msi file exist used active directory domains installed using group policy .zap file simple complicated system administrator wishes make two required fields .zap file application name called friendly name setup command line information optional .zap file begins title line consisting word application inside single square brackets underneath come entry fields two required fields friendlyname name setupcommand \\server\share\setupfile also add optional entries displayversion publisher note displayversion publisher require quotation marks around variables simple example .zap file .zap file restricted .msi file rolled back application fails install correctly use elevated privileges install i.e user needs rights install software usually given group policy install first use install separate feature first use many .zap files require user intervention overcome systems administrator creates batch file runs quiet silent install batch file command however running executable file setup.exe often bypasses quiet passive silent installation switches even specified setupcommand addition .zap files run automatically prior user logon instead user must access add/remove programs within windows control panel select add new programs select installation user must access location .zap file located access location setup files locations different otherwise able install application .zap files assigned computers must published users therefore user moves another computer even temporarily install application machine whether program finally .zap files automatically uninstall user longer requires software instead software remains installed machine permanently unlike .msi installation set uninstall computer removed relevant ou creating .zap file placing accessible share usually creating active directory group access location systems administrator needs create group policy object open editing screen select user configuration software settings software installation create new package location .zap file since gpos default .msi system admin needs ensure search .zap files instead .msi files accepting new package assigning gpo relevant organizational unit ou publish application user need reload group policy server manages gpo done either logging running gpupdate command line
[ 9173, 929, 6797, 4174 ]
Validation
6,687
5
LAPDm:lapdm lapdm data link layer protocol used gsm cellular networks lapdm forms layer 2 um interface base transceiver station mobile station say used radio link cellular network subscriber handset lapdm derived much older link layer protocol called hdlc specified 3gpp specifications ts 04.05 ts 04.06 lapdm similar isdn layer 2 lapd simplifications another important difference lapdm lapd establishment contention resolution procedure gsm 04.06 section 5.4.1.4 wherein ms sends l3 message information field sabm frame echoed back bts corresponding ua frame procedure required lapdm possibility handset accidentally attempting use wrong channel lapd require contention resolution since hard-wired isdn devices accidentally use wrong channel associated control procedure used layer 2 iden rf interface similar lapdm
[]
Test
6,688
8
SOAP_with_Attachments:soap attachments soap attachments swa mime web services use web services send receive files combination soap mime primarily http note swa new specification rather mechanism using existing soap mime facilities perfect transmission files using web services invocations swa w3c note submitted proposal adopted w3c instead mtom w3c recommendation handling binary data soap messages release soap 1.2 additionally note soap 1.2 attachment feature published
[ 4740, 2091, 10486, 119, 124 ]
Test
6,689
5
Licklider_Transmission_Protocol:licklider transmission protocol licklider transmission protocol point point protocol use deep space links ltp commonly seen standard underlying convergence layer protocol bundle protocol rfc 5050 supporting wide selection networks ltp named honor american computer scientist joseph carl robnett licklider ltp designed run directly data link layer e.g aos also run user datagram protocol udp e.g used sensor network private network bandwidth contestation ’ issue software debug purposes therefore address issues like routing congestion control originally designed support “ long-haul ” transmission interplanetary network design based experiences ccsds file delivery protocol cfdp developed space communication features application divides data send two parts either part may size 0 ltp engine stores data queue checks whether link towards destination available starts transmission link available data remains queue transmission starts soon so-called “ link state cue ” arrives either underlying link layer management information base given red data send last segment red data marked “ end red data ” flag timer started segment absent green data send “ end block ” flag set otherwise green data transmitted last segment part gets marked “ end block ” flag receiver issues report segment sender received “ end red data ” segment data complete report segment transmitted timer started upon arrival report segment sender cancels timer queues report-acknowledgement receiver informs application red data successfully transmitted receiver receives report-acknowledgement cancels timer transmission red data completed transmission completed “ end block ” segment arrived two reference implementations ltp
[ 10242, 3847, 649, 9868, 3218, 9365, 10005, 11413, 5402, 5531, 3742, 10271, 9380, 2085, 9381, 3751, 3752, 10924, 562, 2996, 9909, 10171, 4797, 5181, 3133, 3006, 5437, 7364, 2887, 8265, 2509, 4687, 6993, 5843, 2904, 5469, 5470, 5471, 5472, ...
Validation
6,690
6
Share_permissions:share permissions share permissions implemented ntfs fat file systems shared resource different permissions read change full control permissions also implemented samba
[ 2193, 651, 1509, 6797 ]
None
6,691
2
Karen_Sandler:karen sandler karen sandler executive director software freedom conservancy former executive director gnome foundation attorney former general counsel software freedom law center march 2014 sandler executive director software freedom conservancy june 2011 march 2014 sandler served executive director gnome foundation leadership gnome embarked ambitious project draw women free open source software outreach program women october 31 2005 june 21 2011 worked software freedom law center sflc first counsel organization general counsel january 6 2010 sflc sandler advised wide range free open source software organizations free software foundation apache software foundation x.org foundation software public interest software freedom conservancy sflc became public speaker issues free open source software conferences oscon scale linuxcon 2010 led initiative advocating free software implantable medical devices exploring issues surrounding software implanted medical device defibrillator regulates inherited heart condition addition work software freedom conservancy sandler also served general counsel pro bono non-profit question copyright also co-host software freedom law show 2008-2010 free freedom 2010- podcasts sandler received 2017 free software award work promoting software freedom working sflc sandler worked associate corporate departments gibson dunn crutcher llp new york clifford chance new york london sandler received law degree columbia law school 2000 james kent scholar co-founder columbia science technology law review received bachelor degree engineering cooper union may 21 2011 married mike tarantino grammy nominated music engineer wedding invitation working paper record player playable record covered number internet publications record contained song sandler tarantino made together
[ 1026, 11394, 2955, 5644, 6413, 4367, 8848, 657, 9872, 1939, 3859, 2581, 3478, 10255, 6808, 10642, 7450, 1822, 6302, 7584, 802, 5410, 6947, 8354, 6694, 5931, 8364, 8621, 9908, 1717, 823, 2109, 11069, 10687, 3649, 708, 10822, 3015, 8263, 84...
None
6,692
4
Replay_4:replay 4 replay 4 proprietary backup disaster recovery software windows application servers developed appassure software released september 9 2009 replay 4 uses image-based approach backup taking snapshot moment time provides application integration mission-critical microsoft applications including microsoft exchange sql sharepoint hyper-v. replay 4 also supports windows small business servers domain controllers file servers web servers blackberry enterprise servers replay 4 provides support advanced features block level snapshots incremental forever data capture integrated data deduplication bare-metal restore dissimilar hardware failover virtual machines offsite cloud recovery etc latest version adds ability replicate data off-site storage also incorporates new technology data deduplication replay 4 named 2009 backup disaster recovery software product year storage magazine february 2010 may 2010 replay 4 named new server software product year 8th annual american business awards
[ 2208, 7905, 3366, 4074, 10413, 1358, 7983, 6514, 9655 ]
Test
6,693
9
Xprint:xprint xprint deprecated printing extension x window system allows application render output printer would display device server portion xprt uses extension xpextension handle paged output devices xprint outputs postscript pcl 3 pcl 5 raster bitmap printer resolution xprint based iso 10175 specifications applications frameworks supporting xprint include mozilla mozilla firefox qt athena motif lesstif toolkits xprint first introduced x11r6.3 rewritten inclusion x11r6.8 removed x.org server may 2008 xprint available separate repository
[ 7626, 8628 ]
None
6,694
5
D-Bus:d-bus computing d-bus desktop bus software bus inter-process communication ipc remote procedure call rpc mechanism allows communication multiple computer programs processes concurrently running machine d-bus developed part freedesktop.org project initiated havoc pennington red hat standardize services provided linux desktop environments gnome kde freedesktop.org project also developed free open-source software library called libdbus reference implementation specification library confused d-bus indeed implementations d-bus client library also exist gdbus gnome qtdbus qt/kde dbus-java sd-bus part systemd d-bus ipc mechanism initially designed replace software component communications systems used gnome kde linux desktop environments corba dcop respectively components desktop environments normally distributed many processes one providing —usually one— services services may used regular client applications components desktop environment perform tasks due large number processes involved —adding processes providing services clients accessing them— establishing one-to-one ipc communications becomes inefficient quite unreliable approach instead d-bus provides software-bus abstraction gathers communications group processes single shared virtual channel processes connected bus n't know internally implemented d-bus specification guarantees processes connected bus communicate linux desktop environments take advantage d-bus facilities instantiating one bus many process connect number buses provided granted access practice means user process connect system bus current session bus another user session buses even different session bus owned user latter restriction may change future user sessions combined single user bus d-bus provides additional simplifies existing functionality applications including information-sharing modularity privilege separation example information incoming voice-call received bluetooth skype propagated interpreted currently-running music player react muting volume pausing playback call finished d-bus also used framework integrate different components user application instance office suite communicate session bus share data word processor spreadsheet every connection bus identified context d-bus called bus name bus name consists two dot-separated strings letters digits dashes underscores example valid bus name process sets connection bus bus assigns connection special bus name called unique connection name bus names type immutable—it guaranteed wo n't change long connection exists—and importantly ca n't reused bus lifetime means connection bus ever assigned unique connection name even process closes connection bus creates new one unique connection names easily recognizable start the—otherwise forbidden—colon character example unique connection name characters colon particular meaning process ask additional bus names connection provided requested name already used another connection bus d-bus parlance bus name assigned connection said connection owns bus name sense bus name ca n't owned two connections time unlike unique connection names names reused available process may reclaim bus name released —purposely not— another process idea behind additional bus names commonly called well-known names provide way refer service using prearranged bus name instance service reports current time date system bus lies process whose connection owns bus name regardless process bus names used simple way implement single instance applications second instances detect bus name already taken also used track service process lifecycle since bus sends notification bus name released due process termination original conception replacement several component oriented communications systems d-bus shares predecessors object model express semantics communications clients services terms used d-bus object model mimic used object oriented programming languages n't mean d-bus somehow limited oop languages —in fact used implementation written c procedural programming language d-bus process offers services exposing objects objects methods invoked signals object emit methods signals collectively referred members object client connected bus interact object using methods making requests commanding object perform actions instance object representing time service queried client using method returns current date time client also listen signals object emits state changes due certain events usually related underlying service example would service manages hardware devices —such usb network drives— signals new hardware device added event clients instruct bus interested receiving certain signals particular object since d-bus bus passes signals processes registered interest process connected d-bus bus request export many d-bus objects wants object identified object path string numbers letters underscores separated prefixed slash character called resemblance unix filesystem paths object path selected requesting process must unique context bus connection example valid object path however enforced —but also discouraged— form hierarchies within object paths particular naming convention objects service entirely developers service many developers choose namespace using reserved domain name project prefix e.g every object inextricably associated particular bus connection exported d-bus point view lives context connection therefore order able use certain service client must indicate object path providing desired service also bus name service process connected bus turn allows several processes connected bus export different objects identical object paths unambiguously members —methods signals— used object specified interface interface set declarations methods including passing returning parameters signals including parameters identified dot-separated name resembling java language interfaces notation example valid interface name despite similarity interface names bus names mistaken d-bus object implement several interfaces least must implement one providing support every method signal defined combination interfaces implemented object called object type using object good practice client process provide member interface name besides member name mandatory ambiguity caused duplicated member names available different interfaces implemented object —otherwise selected member undefined erroneous emitted signal hand must always indicate interface belongs d-bus specification also defines several standard interfaces objects may want implement addition interfaces although technically optional d-bus service developers choose support exported objects since offer important additional features d-bus clients introspection standard interfaces d-bus specification defines number administrative bus operations called bus services performed using object resides bus name bus reserves special bus name manages requests made specifically combination bus name object path administrative operations provided bus defined object interface operations used example provide information status bus manage request release additional well-known bus names d-bus conceived generic high-level inter-process communication system accomplish goals d-bus communications based exchange messages processes instead raw bytes d-bus messages high-level discrete items process send bus another connected process messages well-defined structure even types data carried payload defined allowing bus validate reject ill-formed message regard d-bus closer rpc mechanism classic ipc mechanism type definition system marshaling bus supports two modes interchanging messages client service process every d-bus message consists header body header formed several fields identify type message sender well information required deliver message recipient destination bus name object path method signal name interface name etc. body contains data payload receiver process interprets —for instance input output arguments data encoded well known binary format called wire format supports serialization various types integers floating-point numbers strings compound types also referred marshaling d-bus specification defines wire protocol build d-bus messages exchanged processes within d-bus connection however define underlying transport method delivering messages existing d-bus implementations follow architecture reference implementation architecture consists two main components library equivalent internally uses native lower-level ipc mechanism transport required d-bus messages two processes ends d-bus connection d-bus specification n't mandate particular ipc transport mechanisms available use communications library decides transport methods supports instance linux unix-like operating systems typically uses unix domain sockets underlying transport method also supports tcp sockets communications libraries processes must agree selected transport method also particular channel used communication information defined d-bus calls address unix-domain socket filesystem objects therefore identified filename valid address would codice_1 processes must pass address respective communications libraries establish d-bus connection address also provide additional data communications library form comma-separated codice_2 pairs way example provide authentication information specific type connection supports message bus daemon like used implement d-bus bus processes want connect bus must know bus address address process establish d-bus connection central message bus process scenario message bus daemon selects bus address remainder processes must pass value corresponding equivalent libraries defines different bus address every bus instance provides addresses defined daemon configuration files two processes use d-bus connection exchange messages directly way d-bus normally intended used usual way always use message bus daemon i.e communications central point process establish point-to-point d-bus connection process —client service— sends d-bus message message bus process receives first instance delivers appropriate recipient message bus daemon may seen hub router charge getting message destination repeating d-bus connection recipient process recipient process determined destination bus name message header field subscription information signals maintained message bus daemon case signal propagation messages message bus daemon also produce messages response certain conditions error message process sent message nonexistent bus name d-bus started 2002 havoc pennington alex larsson red hat anders carlsson version 1.0 —considered api stable— released november 2006 heavily influenced dcop system used versions 2 3 kde d-bus replaced dcop kde 4 release implementation d-bus supports posix operating systems port windows exists used qt 4 gnome gnome gradually replaced parts earlier bonobo mechanism also used xfce one earlier adopters nowadays deprecated hardware abstraction layer hal used d-bus export information hardware added removed computer usage d-bus steadily expanding beyond initial scope desktop environments cover increasing amount system services instance networkmanager network daemon bluez bluetooth stack pulseaudio sound server use d-bus provide part services systemd uses d-bus wire protocol communication systemd also promoting traditional system daemons d-bus services logind another heavy user d-bus polkit whose policy authority daemon implemented service connected system bus also used wire protocol alljoyn protocol home automation end alljoyn adds discovery session management security header compression embedded device support makes transport agnostic although several implementations d-bus widely used reference implementation libdbus developed freedesktop.org project designed specification however libdbus low-level implementation never meant used directly application developers reference guide reimplementations d-bus included standard libraries desktop environments programming language bindings freedesktop.org project recommends applications authors use one higher level bindings implementations instead predominance libdbus used d-bus implementation caused terms d-bus libdbus often used interchangeably leading confusion gdbus implementation d-bus based gio streams included glib aiming used gtk+ gnome gdbus wrapper libdbus complete independent reimplementation d-bus specification protocol mate desktop xfce version 4.14 also based gtk+ 3 also use gdbus qtdbus implementation d-bus included qt library since version 4.2 component used kde applications libraries components access d-bus services available system 2013 systemd project rewrote libdbus effort simplify code also resulted significant increase overall d-bus performance preliminary benchmarks bmw found systemd d-bus library increased performance 360 version 221 systemd sd-bus api declared stable libnih project provides light-weight standard library c support d-bus additionally good support cross compiling kdbus project aimed reimplement d-bus kernel-mediated peer-to-peer inter-process communication mechanism beside performance improvements kdbus would advantages arising linux kernel features namespaces auditing security kernel mediating closing race conditions allowing d-bus used boot shutdown needed systemd kdbus inclusion linux kernel proved controversial dropped favor bus1 generic inter-process communication several programming language bindings d-bus developed java c ruby
[ 2432, 11394, 9225, 2955, 6413, 7181, 7309, 8848, 4113, 9872, 3859, 8344, 7450, 2971, 6555, 9245, 1822, 543, 7584, 6691, 5029, 4902, 4519, 10024, 10924, 5677, 2222, 7983, 8621, 1586, 1842, 1972, 8499, 9908, 823, 11322, 2109, 3649, 8262, 30...
Test
6,695
0
Automated_journalism:automated journalism automated journalism also known algorithmic journalism robot journalism news articles generated computer programs artificial intelligence ai software stories produced automatically computers rather human reporters programs interpret organize present data human-readable ways typically process involves algorithm scans large amounts provided data selects assortment pre-programmed article structures orders key points inserts details names places amounts rankings statistics figures output also customized fit certain voice tone style data science ai companies automated insights narrative science united robots yseop develop provide algorithms news outlets 2016 media organizations used automated journalism early adopters include news providers associated press forbes propublica los angeles times due formulaic nature automation mainly used stories based statistics numerical figures common topics include sports recaps weather financial reports real estate analysis earnings reviews statsheet online platform covering college basketball runs entirely automated program associated press began using automation cover 10,000 minor baseball leagues games annually using program automated insights statistics mlb advanced media outside sports associated press also uses automation produce stories corporate earnings 2006 thomson reuters announced switch automation generate financial news stories online news platform famously algorithm called quakebot published story 2014 california earthquake los angeles times website within three minutes shaking stopped automated journalism sometimes seen opportunity free journalists routine reporting providing time complex tasks also allows efficiency cost-cutting alleviating financial burden many news organizations face however automated journalism also perceived threat authorship quality news precarity employment within industry robot reporters built produce large quantities information quicker speeds associated press announced use automation increased volume earnings reports customers ten times software automated insights data companies produce 150 300-word articles time takes journalists crunch numbers prepare information automating routine stories tasks journalists promised time complex jobs investigative reporting in-depth analysis events francesco marconi associated press stated automation news agency freed 20 percent reporters ’ time focus higher-impact projects automated journalism cheaper content produced within less time also lowers labour costs news organizations reduced human input means less expenses wages salaries paid leaves vacations employment insurance automation serves cost-cutting tool news outlets struggling tight budgets still wish maintain scope quality coverage automated story often confusion credited author several participants study algorithmic authorship attributed credit programmer others perceived news organization author emphasizing collaborative nature work also way reader verify whether article written robot human raises issues transparency concerns perceived credibility automated news critics doubt algorithms fair accurate free subjectivity error attempted influence also remarked machines replace human capabilities creativity humour critical-thinking computers alone lack ability write stories perspective emotion thorough analysis surprising observations among concerns automation loss employment journalists interest saving costs mentioned previously news organizations inclined cut staff switching cheaper faster machines 2014 annual census american society news editors announced newspaper industry lost 3,800 full-time professional editors falling 10 within year biggest drop since industry cut 10,000 jobs 2007 2008 future automated journalism seen beneficial however others would argue could detrimental industry removes sense objectivity stated benefits section costs efficiency robot journalism present proven however utilizing system automation may separate audience article happen human journalist writing world issues may personal writing style attached story whereas article written using automation would result story bland personality automated articles written within firm would style similar sense journalist would lost process question regarding issue problems exist current technologies 2020s industry may change new technological advancements may made implement fix issues currently associated thought using robot journalism nieman reports article identifies whether machines replace journalists addresses many concerns around concept automated journalism practices discuss benefits surrounding concepts automated journalism beneficial industry however ultimately support idea human journalists stay around matter much technology changes rationale supported thought benefits automation never outweigh perks skilled journalist date current technological advancements due journalism industry reliance technology industry must stay dynamic shift current trends professionals work within field must field competitive saturated due internet internet caused many shifts way industry operates also opened avenue citizen journalist participate media much frequently due many people owning smartphones access online databases media sites many people taken roles amateur journalists overall benefited industry efficiency perspective however seen hurting professionals work journalism field
[ 2440, 1083, 9656 ]
None
6,696
3
Él_(visual_novel):él visual novel elle also known japanese adult visual novel developed elf corporation originally released june 13 1991 remake produced elf corporation retitled él released september 29 2000 green bunny produced anime original video animation titled él released two volumes 2001 series depicts survivors nuclear war gathered single tightly-monitored city december 1999 nuclear war devastates earth renders world inhospitable ensure survival humanity megaroasu plan carried terrorist organization called black widow attacks tries disrupt plan story takes place 2008 player takes role unnamed hero unknown past expert marksman heroine el miles includes ensemble minor characters advance plot game simple click adventure one ending games genre 2000 remake story exception setting refocused 2030 graphics updated included three-dimensional computer graphics script dubbed cast professional voice actors cast credits private released nuclear war triggered environmental pollution group survivors start megaro earth project city built dome protect last fragments humanity el miles sniper – policewoman defending city terrorist organization black widows el placed charge protecting parsley pop singer nearly raped black widow operatives singer finds falling love el attempts seduces el discovers fellow snipers becoming black widow operatives constantly tormented leader gimmick also unusual blackouts unexplained visions another reality end second episode whole world el miles lived actually 'created dream el man named joe last humanity disrupted parsley first release titled elle originally released june 13 1991 remake produced elf corporation retitled él released september 29 2000 original release pc-9801 software four 5 2hd floppy disks remake released windows 95 98 2000 xp cd green bunny produced anime original video animation titled él released two volumes 2001 nutech digital acquired rights él ova 2001 english release volumes 1 2 box set would follow january 2002 featuring english dub included voice talents adult actresses shelbee myne lola ova credits include kazuma kanezawa director kazuma kanezawa wrote script designs masaki kawai takeo takahashi yukio segami production arms green bunny chris beveridge reviewed english localizations series nutech digital release originally reviewed 2002 positive noting strong visuals seconds cross coloration second episode kitty media release also reviewed favorably among differences nutech digital release redubbing work release strong points ova writing execution surprise ending large cast characters resulted poor development secondary characters visuals original release hold compared newer works 2007 review increasing industry standards
[ 11143, 4425, 2156, 6797, 9006, 6776 ]
Validation
6,697
2
List_of_features_removed_in_Windows_XP:list features removed windows xp next version windows nt windows 2000 well successor windows windows xp introduced many new features also removed others following list
[ 8576, 641, 3463, 651, 6797, 7311, 3856, 8080, 8976, 10896, 2196, 11283, 11413, 4505, 9372, 4515, 8355, 11301, 3496, 6441, 10924, 1581, 3250, 3890, 9910, 6462, 7615, 321, 7106, 10051, 582, 1098, 10957, 9166, 3283, 4309, 9173, 2391, 11605, ...
Test
6,698
4
Information_Trust_Institute:information trust institute information trust institute iti founded 2004 interdisciplinary unit designed approach information security research systems perspective examines information security looking makes machines applications users trustworthy mission create computer systems software networks society depend trustworthy meaning secure dependable reliable available correct safe private survivable iti stated goal create new paradigm designing trustworthy systems ground validating systems intended trustworthy iti academic/industry partnership focusing application areas electric power financial systems defense homeland security among others brings together 100 researchers representing numerous colleges units university illinois urbana–champaign
[ 5373, 5446, 679 ]
Test
6,699
4
Avast_Antivirus:avast antivirus avast antivirus family internet security applications developed avast microsoft windows macos android ios avast antivirus products include free proprietary versions provide computer security browser security antivirus software firewall anti-phishing antispyware anti-spam among services 2017 avast popular antivirus vendor market largest share market antivirus applications avast programs available internet-connected devices available 45 languages avast product range includes following february 2018 test various antimalware products av-test avast free antivirus earned 6 6 points protection category detecting 100 malware samples used test earning av-test certified seal avast mobile security antivirus app also performed well detected 100 malware samples january 2018 test android malware av-comparatives
[ 2049, 4994, 131, 5891, 7809, 1417, 3981, 6797, 10637, 9488, 4374, 1052, 156, 6431, 2721, 5924, 2213, 550, 1318, 6823, 2601, 8614, 2859, 3243, 3885, 8493, 7983, 8615, 6834, 4403, 9523, 10166, 3643, 7103, 704, 9537, 7362, 1475, 10308, 4421,...
Validation
6,700
2
Game_Center:game center game center got removed home screen ios 10 update still exists today mac os also games ios pop open certain games ios today game center app released apple allows users play challenge friends playing online multiplayer social gaming network games games share multiplayer functionality mac ios versions app game center implemented developers ios 4.1 later mac os x 10.8 later gamekit framework game center available ipod touch 2nd generation later ios 4.1 higher required iphone 3gs later ios 4.1 higher required models ipad ios 4.2 higher required mac computers running os x 10.8 mountain lion later apple tv 4 running tvos apple watch running watchos 3 gaming became major part ios platform apple launched app store july 10 2008 unlike console systems currently market apple unified multiplayer social system platform gap soon filled third parties openfeint plus agon online scoreloop third parties control online gaming environment multiple third parties involved left non-unified experience game center announced ios 4 preview event hosted apple april 8 2010 preview released registered apple developers august released september 8 2010 ios 4.1 iphone 4 iphone 3gs ipod touch 2nd generation 4th generation included ios 4.2 ipad updated version game center released ios 5 featured addition turn-based gaming player photos friend suggestions achievement points ios 6 update added challenges way players challenge players beat leaderboard scores earn achievements june 13 2016 application removed ios 10 macos sierra however service still exists within game center players connect friends send friend requests start playing games organize online multiplayer games number friends connected single game center account limited 500 games may feature achievements completing certain task player rewarded points depending game leaderboard may present player compare score friends world many ios games use game center use every feature apps choose include following features supported game center
[ 10755, 9732, 4615, 1549, 5647, 7697, 1042, 11289, 6186, 4139, 4657, 1074, 8754, 9784, 8253, 576, 9802, 8783, 5713, 4180, 3670, 1623, 3672, 4184, 10838, 2141, 4702, 3681, 9826, 2149, 5733, 8806, 3691, 8303, 2673, 6771, 2676, 6264, 7292, 26...
Test
6,701
8
Scrapy:scrapy scrapy free open-source web-crawling framework written python originally designed web scraping also used extract data using apis general-purpose web crawler currently maintained scrapinghub ltd. web-scraping development services company scrapy project architecture built around spiders self-contained crawlers given set instructions following spirit n't repeat frameworks django makes easier build scale large crawling projects allowing developers reuse code scrapy also provides web-crawling shell used developers test assumptions site ’ behavior well-known companies products using scrapy lyst parse.ly sayone technologies sciences po medialab data.gov.uk ’ world government data site scrapy born london-based web-aggregation e-commerce company mydeco developed maintained employees mydeco insophia web-consulting company based montevideo uruguay first public release august 2008 bsd license milestone 1.0 release happening june 2015 2011 scrapinghub became new official maintainer
[ 418, 8554, 6797, 8718, 7983, 113, 5203, 823, 7325 ]
Test
6,702
2
OpenBSD_Foundation:openbsd foundation openbsd foundation canadian federal non-profit organization founded openbsd project single point contact persons organizations requiring legal entity deal wish support openbsd also serves legal safeguard projects affiliated openbsd including openssh openbgpd openntpd opencvs opensmtpd libressl announced public openbsd developer bob beck july 25 2007
[ 9223, 10631, 2825, 3465, 1932, 274, 7702, 10105, 9520, 2245, 1993, 8778, 3404, 11086, 5970, 5084, 7139, 1637, 4071, 5230, 1785, 8954 ]
None
6,703
7
Software-defined_data_center:software-defined data center software-defined data center sddc also virtual data center vdc marketing term extends virtualization concepts abstraction pooling automation data center resources services achieve service itaas software-defined data center elements infrastructure — networking storage cpu security – virtualized delivered service itaas may represent outcome sddc sddc differently cast toward integrators datacenter builders rather toward tenants software awareness infrastructure visible tenants sddc support claimed wide variety approaches critics see software-defined data center marketing tool software-defined hype noting variability 2013 analyst projected least software-defined data center components would experience market growth software-defined networking market expected valued us 3.7 billion 2016 compared us 360 million 2013 idc estimates software-defined storage market poised expand faster storage market software-defined data center encompasses variety concepts data-center infrastructure components component potentially provisioned operated managed application programming interface api core architectural components comprise software-defined data center include following software-defined data center differs private cloud since private cloud offer virtual-machine self-service beneath could use traditional provisioning management instead sddc concepts imagine data center encompass private public hybrid clouds data centers traditionally lacked capacity accommodate total virtualization 2013 companies began laying foundation software-defined data centers virtualization ben cherian midokura considered amazon web services catalyst move toward software-defined data centers convinced world data center could abstracted much smaller units could treated disposable pieces technology turn could priced utility 2013 software-defined data center term promoted paradigm shift according steve herrod promise software-defined data center companies would longer need rely specialized hardware hire consultants install program hardware specialized language rather would define applications resources require—including compute storage networking security availability—and group required components create “ logical application. ” commonly cited benefits software-defined data centers include improved efficiency extending virtualization throughout data center increased agility provisioning applications quickly improved control application availability security policy-based governance flexibility run new existing applications multiple platforms clouds addition software-defined data center implementation could reduce company energy usage enabling servers data center hardware run decreased power levels turned believe software-defined data centers improve security giving organizations control hosted data security levels compared security provided hosted-cloud providers software-defined data center marketed drive prices data center hardware challenge traditional hardware vendors develop new ways differentiate products software services concepts software-defined general software-defined data centers particular dismissed “ nonsense ” “ marketecture ” “ software-defined hype. ” critics believe minority companies “ completely homogeneous systems ’ ” already place yahoo google transition software-defined data centers according observers software-defined data centers ’ necessarily eliminate challenges relate handling differences development production environments managing mix legacy new applications delivering service-level agreements slas software-defined networking seen essential software-defined data center also considered “ least mature technology ” required enable software-defined data center however several companies including arista networks cisco microsoft vmware market products enable virtual networks provisioned extended moved across existing physical networks several competing network virtualization standards already existed 2012 neutron networking component open-source software openstack project provides application-level abstraction network resources includes interface configuring virtual switches software-defined data center approach force organizations adapt software-defined environments require rethinking many processes—including automation metering billing—and executing service delivery service activation service assurance widespread transition sddc could take years
[ 5832, 6153, 2284, 3086, 1840, 7248, 982, 8735 ]
Validation
6,704
5
Certificate_Management_over_CMS:certificate management cms certificate management cms cmc internet standard published ietf defining transport mechanisms cryptographic message syntax cms defined rfc 5272 transport mechanisms rfc 5273 one two protocols utilizing certificate request message format crmf described rfc 4211 protocol certificate management protocol cmp enrollment secure transport est protocol described rfc 7030 profile cmc use provisioning certificates end entities est play similar role scep
[ 10924, 6993, 7985, 9909, 2904, 11387, 5469, 5470 ]
Test
6,705
3
Heterogeneous_System_Architecture:heterogeneous system architecture heterogeneous system architecture hsa cross-vendor set specifications allow integration central processing units graphics processors bus shared memory tasks hsa developed hsa foundation includes among many others amd arm platform stated aim reduce communication latency cpus gpus compute devices make various devices compatible programmer perspective relieving programmer task planning moving data devices disjoint memories must currently done opencl cuda cuda opencl well fairly advanced programming languages use hsa increase execution performance heterogeneous computing widely used system-on-chip devices tablets smartphones mobile devices video game consoles hsa allows programs use graphics processor floating point calculations without separate memory scheduling rationale behind hsa ease burden programmers offloading calculations gpu originally driven solely amd called fsa idea extended encompass processing units gpus manufacturers dsps well modern gpus well suited perform single instruction multiple data simd single instruction multiple threads simt modern cpus still optimized branching etc originally introduced embedded systems cell broadband engine sharing system memory directly multiple system actors makes heterogeneous computing mainstream heterogeneous computing refers systems contain multiple processing units central processing units cpus graphics processing units gpus digital signal processors dsps type application-specific integrated circuits asics system architecture allows accelerator instance graphics processor operate processing level system cpu among main features hsa defines unified virtual address space compute devices gpus traditionally memory separate main cpu memory hsa requires devices share page tables devices exchange data sharing pointers supported custom memory management units render interoperability possible also ease various aspects programming hsa intended isa-agnostic cpus accelerators support high-level programming languages far hsa specifications cover hsa intermediate layer hsail virtual instruction set parallel programs mobile devices one hsa application areas yields improved power efficiency block diagrams provide high-level illustrations hsa operates compares traditional architectures hsa-specific features implemented hardware need supported operating system kernel specific device drivers example support amd radeon amd firepro graphics cards apus based graphics core next gcn merged version 3.19 linux kernel mainline released 8 february 2015 programs interact directly queue jobs utilizing hsa runtime first implementation known focuses berlin apus works alongside existing radeon kernel graphics driver additionally supports heterogeneous queuing hq aims simplify distribution computational jobs among multiple cpus gpus programmer perspective support heterogeneous memory management hmm suited graphics hardware featuring version 2 amd iommu accepted linux kernel mainline version 4.14 integrated support hsa platforms announced sumatra release openjdk due 2015 amd app sdk amd proprietary software development kit targeting parallel computing available microsoft windows linux bolt c++ template library optimized heterogeneous computing gpuopen comprehends couple software tools related hsa codexl version 2.0 includes hsa profiler amd kaveri a-series apus cf kaveri desktop processors kaveri mobile processors sony playstation 4 allowed integrated gpu access memory via version 2 amd iommu earlier apus trinity richland included version 2 iommu functionality use external gpu connected via pci express post-2015 carrizo bristol ridge apus also include version 2 iommu functionality integrated gpu arm bifrost microarchitecture implemented mali-g71 fully compliant hsa 1.1 hardware specifications arm announced software support would use hardware feature
[ 3586, 7173, 9739, 5645, 7699, 10260, 5655, 10781, 8231, 9255, 5677, 2094, 7218, 8250, 1083, 2623, 2113, 7234, 3142, 1614, 2638, 7247, 1122, 3175, 8815, 1137, 630, 8822, 6268, 3204, 10375, 7313, 2719, 6815, 5793, 6818, 8352, 8868, 6821, 78...
Train
6,706
2
Applied_Data_Research:applied data research applied data research adr large software vendor 1960s mid-1980s adr often described first independent software vendor founded 1959 adr originally contract development company adr eventually built series products adr widely used major packages included autoflow automatic flowcharting roscoe metacobol extensible macro processor cobol language librarian source-code management adr later purchased datacom/db database management system insyte datacom developed companion product ideal interactive development environment application ’ life fourth-generation programming language another popular adr product librarian version control system ibm mainframe operating systems known ca librarian 1978 reported librarian use 3,000 sites decade later number doubled adr received first patent issued computer program sorting system april 23 1968 program developed martin a. goetz adr instigated litigation federal court ibm accusations ibm retarding growth independent software industry monopolizing software industry leading ibm famous 1969 1970 adr programmatics wholly owned subsidiary adr received out-of-court settlement 1.4 million ibm ibm also agreed serve supplier autoflow meant another potential 600,000 revenues adr adr licensed datacom/db tcsc firm sold modified versions ibm dos/360 dos/vs operating systems known edos 1980 nixdorf computer bought tcsc nixdorf sought continue licensing arrangement adr ncsc went court dispute whether licensing arrangement terminated acquisition adr nixdorf settled court 1981 agreement nixdorf could continue resell adr products adr bought massachusetts computer associates also known compass late 1960s adr sold ameritech 1986 kept intact subsidiary 1988 ameritech sold adr computer associates unrelated massachusetts computer associates subsequently rename ca technologies computer associates integrated company systems products division new information products division roscoe remote os conversational operating environment originally marketed roscoe last marketed ca-roscoe software product ibm mainframes text editor also provides operating system functionality ability submit batch jobs similar ispf xedit ability support 200+ concurrent active users still low overhead based single address space architecture rpf roscoe programming facility scripting language string processing capability
[ 6529, 909, 8687, 9780, 5463, 3323, 2813, 6974 ]
Test
6,707
4
Blended_threat:blended threat blended threat also known blended attack software exploit turn involves combination attacks different vulnerabilities example many worm trojan horse computer virus exploit multiple techniques attack propagate kind computer threat blended threats combination worms trojan virus kinds malware recent years cyberattacks demonstrated increased ability impact physical systems stuxnet triton trisis malware 2017 ransomware outbreaks wannacry recognizing threats cyber systems exist potential physical hazards term blended threat also defined natural accidental purposeful physical cyber danger indicates potential crossover impacts harm life information operations environment and/or property adaptation based terminology 2010 us department homeland security risk lexicon symantec elaborated idea blended threats blog post noting malware begins become contained natural disaster hits region people need help flood medical centers researchers discover additional concerns inside malware ’ code type attack known “ blended threat ” – natural accidental purposeful combination physical cyber incident post describes private-sector infrastructure preparedness activities focused blended threats including planned healthcare sector higher education adding idea types crossover incidents considered blended threats august 2018 oracle wrote post observed incidents include number good examples one example approximately 20:00 gmt july 2 internet intelligence map country statistics view showed decline traceroute completion ratio dns query rate azerbaijan related widespread blackout metrics gradually recovered next day published reports reuters washington post noted blackout due explosion hydropower station following overload electrical system due increased use air conditioners driven heat wave saw temperatures exceed 100° f. another day later tropical storm maria caused islandwide power outage guam disrupted internet service island several hours venezuela experienced large power failure left capital city caracas without electricity caused disruption internet connectivity well shown figure traceroute dns metrics saw minor declines around 13:00 gmt read cited article black hat 2018 ruben santamarta reversemode provided another example cyber-physical threats demonstrated guardian summarized satellite communications ships planes military use connect internet vulnerable hackers worst-case scenario could carry 'cyber-physical attacks turning satellite antennas weapons operate essentially like microwave ovens
[ 3843, 612, 5636, 7739, 4487, 10756, 2041, 3867, 9375 ]
None
6,708
4
Smart_card_management_system:smart card management system smart card management system scms credential management system cms system managing smart cards life cycle smart cards thus system issue smart cards maintain smart cards use finally take smart cards use eol chip/smart cards provide foundation secure electronic identity used control access facilities networks computers smart cards security credentials authenticating smart card holder example using two-factor authentication security requirements smart card management system often high therefore vendors systems found computer security industry smart card management systems generally implemented software applications system needs accessible one operator user simultaneously normally case software application often provided form server application accessible several different client systems alternative approach multiple synchronized systems smart card management systems connect smart cards systems systems smart card management system must connect depends use case smart cards typical systems connect include smart card lifecycle smart card changing state examples states include issued blocked revoked process taking smart card one state another main responsibility smart card management system different smart card management systems call processes different names list widely used names processes listed briefly explained
[ 9745, 2737, 517, 2558 ]
Validation
6,709
1
SQL_Server_Compact:sql server compact microsoft sql server compact sql ce compact relational database produced microsoft applications run mobile devices desktops prior introduction desktop platform known sql server windows ce sql server mobile edition includes 32-bit 64-bit native support sql ce targets occasionally connected applications applications embedded database free download redistribute odbc driver sql ce exist one planned native applications may use sql ce via ole db latest last release sql server compact 4.0 february 2013 sql server compact edition deprecated new versions updates planned although microsoft continue support july 2021 sql server compact shares common api microsoft sql server editions also includes ado.net providers data access using ado.net apis built-in synchronization capabilities well support linq entity framework future releases unify synchronization capabilities microsoft synchronization services unlike editions microsoft sql server sql ce runs in-process application hosting disk footprint less 2 mb memory footprint approximately 5 mb sql ce optimized architecture applications share memory pool windows store apps windows 8 use sql server compact edition edition sql server versions sql ce databases support acid-compliance meet durability requirement default autoflush buffers changes memory including enlisted ambient transactions explicit sql ce transactions override commit call commitmode.immediate value therefore committed transaction changes lost meet durability requirement commit call transaction must specify immediate flag like microsoft sql server sql ce supports transactions referential integrity constraints locking well multiple connections database store however nested transactions supported even though parallel transactions different tables current release support stored procedures native xml data type either uses subset t-sql querying due lack xml support xquery supported either queries processed optimizing query processor sql ce databases also support indexing well support remote data replication local caching data remote databases merge replication bidirectional synchronization master databases sql ce databases created managed microsoft visual studio older versions sql server management studio well sql ce databases reside single .sdf file 4 gb size .sdf file encrypted 128-bit encryption data security sql ce runtime mediates concurrent multi-user access .sdf file .sdf file simply copied destination system deployment deployed clickonce sql ce runtime support datadirectories applications using sql ce database need specify entire path .sdf file ado.net connection string rather specified |datadirectory|\ database_name .sdf defining data directory .sdf database file resides defined assembly manifest application sql server management studio 2005 read modify ce 3.0 3.1 database files latest service pack sql server management studio 2008 later required read version 3.5 files microsoft visual studio express 2008 sp1 create modify query ce 3.5 sp1 database files sql server management studio read ce 4.0 files visual studio 2010 sp1 handle ce 4.0 database files .sdf sqlce database file naming convention optional extension used setting password database file optional database compressed repaired option compacted/repaired database placed new database file february 2013 microsoft announced sql server compact edition deprecated although new versions updates planned microsoft continue support sql compact standard lifecycle support policy support end july 2021
[ 4624, 10388, 10389, 10900, 10902, 3224, 5401, 7064, 5403, 11030, 2589, 11414, 4384, 7456, 8227, 11683, 11559, 10921, 4010, 5546, 1964, 3629, 430, 4781, 9263, 10157, 11570, 8246, 315, 7486, 10048, 4674, 1347, 1348, 9286, 5320, 4174, 847, 83,...
Test
6,710
5
Common_Indexing_Protocol:common indexing protocol common indexing protocol cip attempt ietf working group find mid-1990s define protocol exchanging index information directory services x.500 directory model searches scoped near root tree e.g particular country problematic implement potentially hundreds thousands directory servers would need contacted order handle query indexes contained summaries subsets information individuals organizations represented white pages schema merging subsets information multiple sources hoped index server holding subset could able process query efficiently chaining sources sources hold information would contacted example server holding base entry particular country provided list names people entries country subtree server would able process query searching person particular name chaining servers held data person protocol evolved earlier work developing whois++ intended capable interconnecting services evolving whois ldap activities protocol seen much recent deployment whois ldap environments followed separate evolution paths whois deployments typically domain name registrars data management issues addressed specifications domain name registry interconnection crisp contrast enterprises manage employee customer student identity data ldap directory looked federation protocols interconnection organizations
[ 6651, 8204, 9429, 10238 ]
None
6,711
7
6fusion:6fusion 6fusion dataservices company headquartered raleigh north carolina enables utility approach it—standardizing economic measurement infrastructure cloud services providing economic transparency global market helping end-users make better informed infrastructure decisions 6fusion ’ uc6 platform organizations view manage total cost consumption tcc business services real time achieve higher level cost optimization forecasting accuracy business agility 6fusion uses patented single unit measure infrastructure called workload allocation cube wac provides common view consumption agnostic underlying technology vendors 6fusion enables baselining benchmarking budgeting business service consumption across execution venues supports dynamic cost optimization strategies 6fusion products metering analytics reporting tools used enterprise organizations service providers cloud brokers company raised total 10m two rounds funding intersouth partners grotech ventures 6fusion product portfolio made following
[ 4194 ]
Test
6,712
4
Wardialing:wardialing wardialing war dialing technique automatically scan list telephone numbers usually dialing every number local area code search modems computers bulletin board systems computer servers fax machines hackers use resulting lists various purposes hobbyists exploration crackers – malicious hackers specialize breaching computer security – guessing user accounts capturing voicemail greetings locating modems might provide entry-point computer electronic systems may also used security personnel example detect unauthorized devices modems faxes company telephone network single wardialing call would involve calling unknown number waiting one two rings since answering computers usually pick first ring phone rings twice modem hangs tries next number modem fax machine answers wardialer program makes note number human answering machine answers wardialer program hangs depending time day wardialing 10,000 numbers given area code might annoy dozens hundreds people attempt fail answer phone two rings succeed hear wardialing modem carrier tone hang repeated incoming calls especially annoying businesses many consecutively numbered lines exchange used centrex telephone system newer wardialing software warvox require modem conduct wardialing rather programs use voip connections speed number calls wardialer make sandstorm enterprises patent multi-line war dialer system method scan-dialing telephone numbers classifying equipment connected telephone lines associated therewith patented technology implemented sandstorm phonesweep war dialer popular name technique originated 1983 film wargames film protagonist programmed computer dial every telephone number sunnyvale california find computer systems prior movie release technique known hammer dialing demon dialing film introduced method many members 414s 1985 least one company advertised war games autodialer commodore computers programs became common bulletin board systems time file names often truncated wardial.exe like due length restrictions 8 characters systems eventually etymology name fell behind war dialing gained currency within computing culture popularity wardialing 1980s 1990s prompted states enact legislation prohibiting use device dial telephone numbers without intent communicating person recent phenomenon wardriving searching wireless networks wi-fi moving vehicle wardriving named wardialing since techniques involve actively scanning find computer networks aim wardriving collect information wireless access points confused piggybacking similar war dialing port scan tcp/ip dials every tcp port every ip address find services available unlike wardialing however port scan generally disturb human tries ip address regardless whether computer responding address related wardriving warchalking practice drawing chalk symbols public places advertise availability wireless networks term also used today analogy various sorts exhaustive brute force attack authentication mechanism password dictionary attack might involve trying word dictionary password wardialing password would involve trying every possible password password protection systems usually designed make impractical making process slow and/or locking account minutes hours low number wrong password entries
[ 5281, 5189, 1926, 7557, 8488, 1899, 10924, 11341, 9840, 7222, 1625, 4956, 11165, 10110 ]
Validation
6,713
6
ZipGenius:zipgenius zipgenius freeware file archiver developed matteo riso m.dev software microsoft windows capable handling nearly two dozen file formats including common formats well password-protect archives work directly cd-r/rw drives presented two editions standard suite suite edition includes optional modules zipgenius project oriented experts power-users standard setup package simply includes main zipgenius application zipgenius first released mr. zip 98 strict group users renamed zipgenius march 1998 april 1999 first public release made zipgenius latest release version 6.3.2.3112 containing large number fixes majority bug fixes visible first glance zipgenius features include support twain devices scanners digital cameras file extraction cd/dvd burner windows xp ftp client ftpgenius zgalbum zgalbum allows users create slideshows pictures loaded folder imported twain device zipgenius also fully integrates windows explorer shell user interface functions placed multiple locations program functions accessed either menu buttons main toolbar drop-down menu customized suit user preferences zipgenius 6 capable opening variety formats commonly used linux rpm tar tar.gz tgz gz 7z regards data security archive history file encrypted recently used files list enabled always per-session disabled cryptozip 2.1 gives encryption algorithms lock user archives users create self-locking/self-erasing archives choose encrypt files one four algorithms czip blowfish twofish rijndael aes also czip files longer depends zipgenius users create executable czip .exe files allow user send encrypted archives people use zipgenius zipgenius reported still development claimed matteo riso main developer focusing next release whose codename miky2007 new version software still branded zipgenius clear 7 2007 beside sure news zipgenius ship developed wininizio software team marking fact zipgenius product wininizio.it wide community board matteo riso admin zipgenius hosted zipgenius.it 2008 wininizio software team put zipgenius.com online offer international website users speaking italian wininizio.it hosts also wide support section — italian english july 1 2009 website zipgenius.it totally redesigned upon modx web application july 6 2009 zipgenius 6.1.0.1010 released public zipgenius able handle open source upx executable compressor used compress zipgenius main executable upx.exe zipgenius program folder users get extra compression level creating new zip archives brutal+upx many executable files exe dll ocx distributed code compilation may larger size necessary zipgenius supports 7-zip compression format conceived igor pavlov compress files standard zip rar compression formats zipgenius supports openoffice.org/staroffice documents openoffice.org applications produce files special format .zip archives custom file extension containing xml files openoffice.org programs merge rebuild original documents zipgenius complies feature allows users manage files common zip files addition users optimize openoffice.org use maximum compression level available .zip format zipgenius users optimize openoffice.org document zipgenius gain 5 10 kb size reduction depending content openoffice.org file zipgenius recompress document brutal compression level
[ 6022, 10121, 1420, 6797, 1940, 3222, 9880, 3114, 10027, 7983, 950, 823, 2755, 11076, 1352, 4296, 10317, 10575, 4561, 722, 11614, 1631, 3296, 9953, 5858, 6759, 7529, 4459, 237, 1646, 7667, 6389, 4089, 894, 10623 ]
Validation
6,714
8
Jexus:jexus jexus web server simply jexus proprietary web server developed bing liu jexus supports asp.net stack defined microsoft integrating mono well php via fastcgi early releases announced csdn blog following releases announced primarily chinese forum jexus configured manually editing configuration files since march 2014 lextudio developing management console simplify tasks console aka jexus manager announced april 13 officially console enables local remote management jexus web server
[ 1920, 4485, 7430, 9229, 7567, 7695, 1937, 7443, 1556, 8350, 7457, 3746, 8994, 2596, 3237, 9125, 11682, 7338, 9387, 44, 11439, 10800, 4797, 10622, 8644, 1991, 11134, 595, 1363, 4439, 3545, 225, 865, 1250, 2404, 4837, 6379, 9580, 2287, 1137...
Test
6,715
3
PowerPC_5000:powerpc 5000 powerpc 5000 family series powerpc power isa microprocessors freescale previously motorola stmicroelectronics designed automotive industrial microcontroller system chip soc use mpc5000 family consists two lines 51xx/52xx 55xx/56xx really n't share common heritage mpc5200 family based e300 core mgt5100 processor also part freescale mobilegt platform based e200 core stems mpc5xx core upwards-compatible newer e500 core older powerpc book e specification focus automotive industrial control systems like robotics power train fuel injection cores basis multitude soc controllers ranging 40 600 mhz variety additional functionality like flash-rom ethernet controllers custom i/o mpc55xx processors compliant power isa v.2.03 specification mpc55xx family four slightly different cores really low end high end mpc56xx family powerpc e200 core based microcontrollers jointly developed freescale stmicroelectronics built 90 nm fabrication process microcontrollers tailor-made automotive applications like power steering fuel injection display control powertrain active suspension chassis control anti-lock braking systems radar adaptive cruise control freescale calls processors mpc56xx st names spc56x
[ 6914, 7299, 3844, 4868, 1158, 3846, 4743, 7302, 5642, 3467, 1548, 1933, 7305, 6415, 3472, 11405, 2073, 7065, 1563, 1309, 10658, 3493, 6949, 6311, 8102, 1321, 9391, 10543, 4017, 5297, 11314, 1461, 11447, 8120, 8761, 9020, 1725, 10557, 1983, ...
Validation
6,716
3
Zet_(hardware):zet hardware zet clone x86 processor machine code compatible x86 processors developed effort make open-hardware processor hardware design synthesized configurable device fpga cpld custom asic considered soc project supports 16-bit able run dos-compatible windows 3.x operating systems activity zet project since 2013
[ 7008, 6979, 4773, 5861, 10789, 11333, 5355, 3886, 7983, 2224, 3762, 499, 11125, 3159, 9371, 8508, 7421, 11487 ]
Test
6,717
9
AutoLISP:autolisp autolisp dialect programming language lisp built specifically use full version autocad derivatives include autocad map 3d autocad architecture autocad mechanical neither application programming interface api interpreter execute autolisp code included autocad lt product line autolisp small dynamically scoped dynamically typed lisp language dialect garbage collection immutable list structure settable symbols lacking regular lisp features macro system records definition facilities arrays functions variable number arguments let bindings aside core language primitive functions geometry accessing autocad internal dwg database manipulation graphical entities autocad properties graphical entities revealed autolisp association lists values paired autocad group codes indicate properties definitional points radii colors layers linetypes etc autocad loads autolisp code .lsp files autolisp code interact user autocad graphical editor use primitive functions allow user pick points choose objects screen input numbers data autolisp also built-in graphical user interface gui mini- domain-specific language dsl dialog control language creating modal dialog boxes automated layout within autocad autolisp derived early version xlisp created david betz language introduced autocad version 2.18 january 1986 continued enhanced successive releases release 13 february 1995 development neglected autodesk favor fashionable development environments like visual basic applications vba .net framework objectarx however remained autocad main user customizing language vital-lisp considerably enhanced version autolisp including integrated development environment ide debugger compiler activex support developed sold third party developer basis software vital lisp superset existing autolisp language added vba-like access autocad object model reactors event handling autocad objects general activex support general lisp functions autodesk purchased renamed visual lisp briefly sold add-on autocad release 14 released may 1997 incorporated autocad 2000 released march 1999 replacement autolisp since autodesk ceased major enhancements visual lisp focused effort vba .net c++ autodesk longer supports vba versions older 7.1 part long-term process changing vba .net user customizing autolisp strong following computer-aided design cad application vendors add products bricscad intellicad others autolisp functionality autolisp users consider using alternative autocad development involving autolisp since autocad 2000 performed within visual lisp since original autolisp engine replaced visual lisp engine thousands utilities applications developed using autolisp visual lisp distributed lsp fas vlx files simple hello world program autolisp would note final line inside function definition evaluated arguments codice_1 function returns null symbol displayed autocad command-line interface autocad command line functions read–eval–print loop repl would normally print hello world command line followed immediately return value call codice_1 therefore without final call codice_1 function result would codice_5 function may also used achieve result complex example might code defines new function generates autocad point object given point one-line text object displaying x coordinates beside name function includes special prefix c causes autocad recognize function regular command user upon typing 'pointlabel autocad command line would prompted pick point either typing x coordinates clicking location drawing function would place marker point create one-line text object next containing x coordinates point expressed relative active user coordinate system ucs function requires parameters contains one local variable 'pnt example could also written using built-in autocad commands achieve result however approach susceptible changes command prompts autocad releases
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 2105, 3132, 8258, 8771, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 2666, 5751, 7805, 1159, 9865, 9877, 5803, 2225, 6840, 7867, 4799, 9926, 7880, 8908, 2...
Validation
6,718
9
Julia_(programming_language):julia programming language julia high-level general-purpose dynamic programming language designed high-performance numerical analysis computational science also useful low-level systems programming specification language web programming server web use web client programming distinctive aspects julia design include type system parametric polymorphism types fully dynamic programming language multiple dispatch core programming paradigm allows concurrent parallel distributed computing direct calling c fortran libraries without glue code just-in-time compiler referred just-ahead-of-time julia community used julia garbage-collected uses eager evaluation includes efficient libraries floating-point calculations linear algebra random number generation regular expression matching many libraries available including e.g. fast fourier transforms previously bundled julia separate tools available julia include ides integrated tools e.g linter debugger rebugger.jl package supports repeated-execution debugging work julia started 2009 jeff bezanson stefan karpinski viral b. shah alan edelman set create free language high-level fast 14 february 2012 team launched website blog post explaining language mission interview infoworld april 2012 karpinski said name julia good reason really seemed like pretty name bezanson said chose name recommendation friend since 2012 launch julia community grown 9,000,000 downloads used 1,500 universities official julia docker images docker hub seen 4,000,000 downloads january 2019 juliacon academic conference julia users developers held annually since 2014 version 0.3 released august 2014 version 0.4 october 2015 version 0.5 october 2016 julia 0.6 released june 2017 stable release version 8 august 2018 julia 0.7 useful release testing packages knowing upgrade 1.0 version 1.0 released 8 august 2018 work julia 0.7 huge undertaking e.g. entirely new optimizer changes made syntax syntax stable 1.x 0.7 semantics iteration interface simplified release candidate julia 1.0 julia 1.0.0-rc1 released 7 august 2018 final version day later julia 1.1 released 21 january 2019 e.g. new exception stack language feature bugfix releases expected roughly monthly julia 1.1.x 1.0.x 1.0.x currently long-term support least year julia 1.0.1 1.0.4 followed schedule bugfix releases pipeline 0.7-release julia 1.2 released 20 august 2019 julia 1.1.x release longer maintained 1.0.x 1.2.x e.g built-in support web browsers testing running javascript vm packages work julia 1.0.x also work 1.1.x newer enabled forward compatible syntax guarantee major exception interacting non-julia code javacall.jl package however calling languages e.g r language works package r fixed call java scala etc use languages julia e.g jdbc.jl apache spark spark.jl users choose stay lts version julia milestone set fix julia 1.4 however already workaround julia-1.3.0-rc1 julia attracted high-profile users investment manager blackrock uses time-series analytics british insurer aviva uses risk calculations 2015 federal reserve bank new york used julia make models us economy noting language made model estimation 10 times faster previous matlab implementation julia co-founders established julia computing 2015 provide paid support training consulting services clients though julia remains free use 2017 juliacon conference jeffrey regier keno fischer others announced celeste project used julia achieve peak performance 1.54 petaflops using 1.3 million threads 9300 knights landing knl nodes cori cray xc40 supercomputer 5th fastest world time november 2017 8th fastest julia thus joins c c++ fortran high-level languages petaflops computations achieved three julia co-creators recipients 2019 james h. wilkinson prize numerical software awarded every four years creation julia innovative environment creation high-performance tools enable analysis solution computational science problems julia received contributions 800 developers worldwide dr. jeremy kepner mit lincoln laboratory founding sponsor julia project early days addition funds gordon betty moore foundation alfred p. sloan foundation intel agencies nsf darpa nih nasa faa essential development julia julia computing inc. founded 2015 viral b. shah deepak vinchhi alan edelman jeff bezanson stefan karpinski keno fischer june 2017 julia computing raised 4.6m seed funding general catalyst founder collective according official website main features language multiple dispatch also termed multimethods lisp generalization single dispatch polymorphic mechanism used common object-oriented programming oop languages uses inheritance julia concrete types subtypes abstract types directly indirectly subtypes type top type hierarchy concrete types subtyped way languages composition used instead see also inheritance vs subtyping julia draws significant inspiration various dialects lisp including scheme common lisp shares many features dylan also multiple-dispatch-oriented dynamic language features algol-like free-form infix syntax rather lisp-like prefix syntax julia everything expression fortress another numerical programming language features multiple dispatch sophisticated parametric type system common lisp object system clos adds multiple dispatch common lisp functions generic functions julia dylan fortress extensibility default system built-in functions generic extensible dylan multiple dispatch fundamental julia user-defined functions even basic built-in operations like codice_1 generic dylan type system however fully support parametric types typical ml lineage languages default clos allow dispatch common lisp parametric types extended dispatch semantics added extension clos metaobject protocol convergent design fortress also features multiple dispatch parametric types unlike julia however fortress statically rather dynamically typed separate compiling executing phases language features summarized following table default julia runtime must pre-installed user-provided source code run alternatively standalone executable needs julia source code built applicationbuilder.jl packagecompiler.jl julia syntactic macros used metaprogramming like lisp macros powerful different text-substitution macros used preprocessor languages c work level abstract syntax trees asts julia macro system hygienic also supports deliberate capture desired like anaphoric macros using codice_2 construct julia official distribution includes interactive session shell called julia read–eval–print loop repl used experiment test code quickly following fragment represents sample session example strings concatenated automatically println repl gives user access system shell help mode pressing codice_3 codice_4 prompt preceding command respectively also keeps history commands including sessions code tested inside julia interactive section saved file codice_5 extension run command line typing julia supported jupyter online interactive notebooks environment julia practice interoperable many languages julia keyword used call c-exported fortran shared library functions individually julia unicode 12.0 support latest 12.1.0 support adds one letter julia 1.3 utf-8 used strings default julia source code meaning also allowing option common math symbols many operators ∈ codice_6 operator julia packages supporting markup languages html also http xml json bson databases web use general julia core implemented julia c together c++ llvm dependency parsing code-lowering implemented femtolisp scheme dialect llvm compiler infrastructure project used back end generation 64-bit 32-bit optimized machine code depending platform julia runs exceptions e.g. pcre standard library implemented julia notable aspect julia implementation speed often within factor two relative fully optimized c code thus often order magnitude faster python r development julia began 2009 open-source version publicized february 2012 julia uses jit mcjit llvm julia generates native machine code directly function first run bytecodes run virtual machine vm translated bytecode running e.g java jvm dalvik android julia four support tiers currently supports x86-64 processors 64-bit optimized latest generations ia-32 x86 processors except decades old ones i.e. 32-bit mode i686 excepting cpus pre-pentium 4-era supports lower tiers e.g. tier 2 fully supports armv8 aarch64 processors supports armv7 armv6 aarch32 caveats cuda i.e nvidia ptx tier 1 support help external package least platforms may need compiled source code e.g. original raspberry pi options changed download page otherwise executables source available julia successfully built several arm platforms e.g. armv8 data center cloud processors cavium thunderx first arm 48 cores arm v7 32-bit tier 2 support binaries first get x86 arm v8 64-bit ptx 64-bit meaning nvidia cuda gpus external support powerpc 64-bit tier 3 support may may build julia supported raspbian support better newer e.g. armv7 pis julia support promoted raspberry pi foundation also support web browsers/javascript jsexpr.jl alternative language web browsers webassembly support minimal support julia supports several upcoming external julia projects
[ 512, 9224, 5129, 2062, 15, 1039, 5148, 3613, 9245, 546, 5677, 11310, 5684, 9780, 1591, 6718, 10819, 8262, 5703, 8775, 1101, 6228, 2652, 10848, 10851, 9320, 1130, 8810, 5741, 9330, 3705, 7292, 9345, 2181, 7301, 5255, 1673, 6797, 9875, 1038...
Test
6,719
7
Decentralized_network_42:decentralized network 42 decentralized network 42 also known dn42 decentralized peer-to-peer network built using vpns software/hardware bgp routers darknets try establish anonymity participants dn42 aims network explore routing technologies used internet tries establish direct non-nat-ed connections members network fully meshed dn42 uses mostly tunnels instead physical links individual networks participant connected one participants vpn physical links bgp used inter routing ospf commonly used protocol intra routing participant free choose igp network address space ipv4 consists private subnets 172.20.0.0/14 main subnet note private address ranges may also announced dn42 network interconnected similar projects notably chaosvpn uses 172.31.0.0/16 parts 10.0.0.0/8 icvpn uses 10.0.0.0/8 ipv6 unique local address ula ipv6 equivalent private address range used participants also announce globally routable addresses announcements accepted small subset dn42 order use bgp even private environment autonomous system numbers needed dn42 uses several private reserved numbers ranges including 64512 64855 76100 76199 since june 2014 dn42 using new private range 4242420000 4242429999 part larger private range defined rfc 6996 participants use hardware routers participants use general purpose servers virtual machines lower cost commonly used bgp implementation used dn42 bird quagga participants use openbgpd xorp implementation junos cisco ios
[ 8640, 2085, 10021, 3751, 2825, 9868, 5749, 5085, 5598 ]
Test
6,720
3
Renegade_III:_The_Final_Chapter:renegade iii final chapter renegade iii final chapter scrolling beat'em computer game released amstrad cpc commodore 64 msx zx spectrum systems 1989 ocean software imagine label game sequel sequel arcade game renegade unlike first two games renegade iii follows character known renegade travels time rescue captured girlfriend also dropped two-player mode found previous title though game highly praised critics receiving high scores several prominent gaming publications 91 score awarded crash 84 c+vg derided fans criticised game storyline lack deep gameplay glitches poor physics lack two-player option demonstrated video created internet comedian stuart ashen reviews zx spectrum version repeatedly criticises game whilst praising spectrum versions first two games video also includes fellow youtube user ex-television presenter larry bundy jr reviewing amstrad cpc version video game journalist jon blyth reviewing commodore 64 version game criticising game well spanish magazine microhobby valued game following scores originality 30 graphics 80 motion 80 sound 80 difficulty 100 addiction 80
[ 9006 ]
Train
6,721
1
Falcon_(storage_engine):falcon storage engine falcon transactional storage engine developed mysql relational database management system development stopped oracle purchased mysql based netfrastructure database engine falcon designed take advantage sun zfs file system architecture analysis showed interesting mixture possible performance properties low level benchmarks first alpha release 5.1.14-falcon showed falcon performed differently innodb myisam better several tests worse others inefficient support mysql limit operation limitation biggest advantage though known ease use falcon requires minimum maintenance designed reconfigure automatically handle types loads efficiently
[ 11392, 8195, 10258, 7453, 1950, 9503, 7339, 7983, 9010, 9665, 8393, 5964, 5198, 7506, 9687, 10459, 6245, 8295, 8683, 5612, 2413, 7022, 3188, 4598, 10873, 2810 ]
Test
6,722
9
TACL:tacl tacl tandem advanced command language scripting programming language used tandem computers tacl shell tandem computers originally designed sold tandem computers inc. based cupertino ca first commercially available parallel processing computers originally referred mini-computers tandem strategy emerging concept continuous availability relied mirrored disks controllers software well engineered operating system guardian later nonstop kernel nsk ensure continuous application availability ensuring system could survive single point hardware failure tandem computers inc. acquired compaq computer corporation 1997 compaq computer corp. subsequently purchased hewlett-packard 2001 today known hpe nonstop products hp integrity nonstop blade systems tacl continues scripting language used hewlett packard nonstop servers nonstop servers key components backbone infrastructure largest banks casinos retailers telephone companies email systems stock exchanges worldwide many computer systems produced tandem nonstop platform relied form redundancy hot backup failover scheme continue running tandem nonstop however cpu performs work may contain dormant backup process another cpu pair cpus 0 1 example share hardware ownership controllers disk drives drives redundant writes disk pair performed primary backup drives reads however take advantage head drive closer information choose drive onto perform read example cpu 0 fails cpu 1 takes ownership disk drive providing continuous availability data primary process running may given backup process receives checkpoint information primary process fails whatever reason backup process takes backup process may spawn backup earned name nonstop since application programs fault-tolerant makes attractive customers ability continuous availability nonstop systems also known handling high numbers transactions per second useful banks stock exchanges paragraph describes philosophy behind design hardware software upon nsk platform two programming languages least tal compiled language tacl interpreted language nsk compilers useful languages tal rumoured deprecated tacl remains default scripting language machines hp provide korn-based shell command interface also days offer tacl nsk sysadmins instance netstat command implemented tacl builtins reflect multi-cpu nature nsk probably n't much say fully understand tacl builtins probably well way understanding nsk tacl interpreted tacl instructions stored simple text file macros routines defines make scripts scripts often used store complex configuration instructions start-up hardware configuration sequences tacl language large number built-in utilities allow user capture output various system utilities parse captured text line line character character allows users build tacl programs monitor system events use filters monitor system application event logs create following subroutine file file1 run tacl routine alternate strategy create file named file1 add following two lines execute routine naming file tacl prompt
[ 8229, 1606, 5384, 9780, 6742 ]
None
6,723
5
Endpoint_Handlespace_Redundancy_Protocol:endpoint handlespace redundancy protocol endpoint handlespace redundancy protocol used reliable server pooling rserpool framework communication pool registrars maintain synchronize handlespace allocated application layer like aggregate server access protocol work progress within ietf
[ 10242, 6531, 3847, 649, 9868, 3218, 9365, 10005, 11413, 5402, 5531, 6682, 3742, 10271, 9380, 2085, 9381, 3751, 3752, 10924, 562, 2996, 9909, 10171, 4797, 5181, 3133, 3006, 5437, 7364, 2887, 8265, 2509, 6733, 4687, 5843, 2904, 5469, 5470, ...
Test
6,724
3
DoD_IPv6_product_certification:dod ipv6 product certification department defense dod internet protocol version 6 ipv6 product certification program began mandate dod assistant secretary defense networks information integration asd-nii 2005 program mandates joint interoperability test command jitc fort huachuca az test certify products ipv6 capability according request comments rfcs outlined dod ipv6 standards profiles ipv6 capable products products certified special interoperability added dod unified capabilities approved products list uc apl ipv6 list used procurement offices dod u.s. federal agencies ongoing purchases acquisitions equipment february 2009 dod ceased requirement ipv6-only testing certification entry unified capabilities approved products list uc apl according kris strance dod cio ipv6 lead testing ipv6 part product evaluations — much broader scope uc apl single consolidated list products completed interoperability io information assurance ia certification dod ipv6 standards profiles ipv6 capable products dod ipv6 profile singular “ ipv6 capable ” definition dod document lists six agreed upon product classes host router layer 3 switch network appliance security device advanced server corresponding standards rfcs lists standard according level requirement jitc uses publicly available ipv6 generic test plan gtp test product conformance performance interoperability ipv6 according dod ipv6 profile jitc uses combination automated testing tools manual functional test procedures conduct testing many companies organizations help develop test products vendors prior testing jitc organizations grant certification conduct pre-testing ensure vendor product pass necessary certification list organizations ipv6 forum service called ipv6 ready logo service represents qualification program assures devices tested ipv6 capable certified service grants qualified products display logo ipv6 forum present objectives ipv6 experts suggest pursuing purchase devices given phase-2 approval gold logo since given full treatment department defense dod committed ipv6 likely first federal organization completely converted ipv6 also process qualifying ipv6 equipment jitc/disa task certifying ipv6 products given joint interoperability test command jitc part defense information systems agency disa help standardize ipv6 qualification procedures jitc follows ’ called ipv6 generic test plan jitc qualifies product added unified capabilities approved products list fortunately jitc makes list available public http //www.techrepublic.com/blog/networking/ipv6-capable-devices-make-sure-they-are-ready/2522
[ 5472, 10144, 8482, 649, 4687, 3441, 4891, 10461, 5470 ]
Test
6,725
7
Advania:advania advania nordic information technology service corporation headquartered stockholm sweden company largest field iceland 9th largest nordic countries advania corporate clients public private sector provides wide range it-services platforms cloud solutions support multinational enterprises governments big small medium-sized businesses according swedish clients advania sweden leader creating customer value advania traces roots three nordic countries iceland norway sweden long period time country generated component eventually braided one company advania ab 2012 1939 icelandic entrepreneur einar j. skúlason founded ejs office equipment repair workshop reykjavik soon expanded business opened store started importing office machinery cash registers etc world war ii company also repaired guns lighters ejs eventually became dominant business iceland 1952 icelandic government city reykjavik founded skýrr company whose purpose take leading role computing recordkeeping iceland company privatized 1995 later became core element group companies – including ejs – merged skýrr brand 1971 company nokia elektronic ab – later renamed datapoint svenska ab – founded sweden company sold datapoint computer terminals later became network pioneer key system integrator sweden 2003 datapoint merged virtus ab it-company founded 1994 grew rapidly virtus soon became key player swedish market focusing microsoft based solutions offering storage backup services 2003 one strongest comprehensive system integrators sweden created datapoint virtus merged new company named kerfi ab 1991 merkantildata applikasjon founded norway originally business unit within merkantildata later atea company focused implementing erp solutions nordic market industry solutions retail property management logistics legal transport waste management 2000 company changed name hands listed oslo stock exchange 2005 hands unlisted acquired icelandic company kögun later merged skýrr see despite changes ownership hands kept norwegian identity acquired nett.2.3 completo 2005 2012 advania ab born skýrr iceland kerfi sweden hands norway merged became key challenger scandinavian it-market since four companies acquired merged advania listed swedish company caperio included 2018 finnish digital service provider vintor become advania finland advania finland strong roots providing ict services public private sector customers focused providing wide range services related digitalization ict infrastructure
[]
Test
6,726
1
Norwegian_Ship_Register:norwegian ship register norwegian ship register domestic ship register norway managed norwegian maritime authority physically located bergen registry 12,000 ships include commercial non-commercial vessels ships exceeding mobile offshore installations must registered smaller vessels volunteer norwegian shipbuilding register subordinate register ship registration norway became codified 1902 task handed district courts magistrates city clerks first 50 registers reduced 27 1972 responsibility centralized taken norwegian ship registers 1992 merged maritime authority 2012 third norwegian code signed christian v 15 april 1687 dedicated shipping established principals collateral insurance well arrest procedure following accidents however register ships established 1901 process establish public ship register commenced 1881 background bank considered would purpose lend money purchase ships would require legal framework would firmly establish ownership collateral ships sea law commission appointed 1882 consider legal aspects shipping industry soon became clear commission would ship registration main purpose aspects sea law coordinated internationally reached conclusion resulted 1888 proposal parliament based single central register ships parliament decided consider law similar proposals 1892 1893 1894 1897 similarly dismissed break-through ship registration came 1900–01 parliamentary session private alternative proposal launched. latter instead involved establishing series local registers ship registration act approved parliament 4 may 1901 government commission looked detailed aspects registration council state approved 23 july 1902 resulted fifty district courts given task maintaining local ship registers covering jurisdiction known names bergen ship register first significant reform came 1972 number registers reduced 27 norwegian international ship register nis created 1 july 1987 allowed flag convenience registration ships international traffic remaining norwegian flag jurisdiction instead using local registers nis established office bergen ship register part city clerk bergen nis took march 1990 initiative centralize local ship registers jointly locate nis emphasized nis operated around-the-clock duty service joint location registers would allow economies scale cutting costs would also allow time freed magistrate offices district courts another concern recent rationalization program following introduction electronic registers given little savings due decentralized nature operations parliament looked possibility centralizing local ship registers 1990 issue postponed consider merger nis ministry justice established commission look matter concluded july 1991 registers centralized located bergen proposed new register administratively part maritime authority issue concluded march government decided create norwegian ship registers located bergen would organized government agency subordinate ministry foreign affairs city clerk bergen merged magistrate bergen 1 april 1992 nis split merged office 1 may responsibility local registries transferred new norwegian ship registries 1 july time 12,000 ships registered 880 nis staff nis office increased six eight jobs lost magistrate offices district courts able use workforce tasks norwegian ship registries became part ministry trade industry 1996 minister trade industry trond giske took initiative june 2010 investigate merger norwegian ship registers norwegian maritime authority internal ministry committee concluded 1 november merger would favorable cited common organization would uniform user-friendly competitive allowing shipping companies relate single organization handling registers would remain bergen despite maritime authority based haugesund merger took effect 1 january 2012 time eighteen employees agency register required certain types vessels vessels optional register norwegian ship exceeding length well oil platforms mobile installations required registered registered foreign registry volunteer registration available ships certain fishing vessels boats length used commercially mobile cranes hovercrafts docks drags fixed maritime installations used petroleum extraction nor-registered ships must norwegian nationality nationality european economic area ownership need norwegian entity although operations must norwegian owner norwegian representative ships construction norway may registered norwegian shipbuilding register open registration recreational vessels allows owner use boat collateral loan nor-registered boat also registered volunteer boat register recreational boats sometimes sold without proper reregistration times purchasers bought boats without checking see boat collateral tied
[ 41, 3090, 5147, 6605 ]
Test
6,727
2
Universe_(Unix):universe unix versions unix operating system term universe used denote variant working environment late 1980s commercial unix variants derived either system v bsd versions provided bsd system v universes allowed user switch universe typically implemented separate directory trees separate filesystems usually included different versions commands libraries man pages header files facility offered ability develop applications portable across system v bsd variants requirements disk space maintenance separate configuration files twice work patching systems gave problematic reputation systems offered facility included harris/concurrent cx/ux convex convex/os apollo domain/os version 10 pyramid dc/osx dropped svr4-based version 2 concurrent masscomp/rtu mips computer systems risc/os siemens sinix versions system v release 4 retain system similar dual universe concept bsd commands behave differently classic system v commands /usr/ucb bsd header files /usr/ucbinclude library files /usr/ucblib /usr/ucb also found nextstep openstep well solaris
[ 2120, 7983, 5969, 2995, 2804, 5492, 9151 ]
Test
6,728
4
Pavel_Vrublevsky:pavel vrublevsky pavel olegovich vrublevsky born 26 december 1978 russian owner general manager processing company also founder investment company rnp russian forbes contributor matters relating blockchain cryptocurrencies cybersecurity also implicated range criminal cases related hacking pavel vrublevsky born raised moscow fifteen-year-old studied american field service student exchange program norway studied institute foreign languages named maurice thorez moved sociology department moscow state university graduated 2001 organized first company develop billing software telecommunications companies age eighteen 2003 age 23 founded company chronopay b.v 2005 chronopay entered russian market 2006 vrublevsky received prestigious runet award within three years company gained international recognition one premier processing companies cutting edge technology even though chronopay headquartered amsterdam company developed true leader processing credit card payments russia – controlling roughly 25 market share company ’ client roster boasted several russian companies well larger multinational corporations including sony microsoft russian charitable foundations non-profit organizations also use chronopay including greenpeace red cross additional clients included russia ’ second largest airline transaero country ’ largest cellphone operator mts 2011 chronopay five worldwide offices moscow amsterdam barcelona florida united states riga latvia two franchises china active business brazil 2011 company two hundred employees chronopay impact online card processing payment industry russia undeniable fact even today russia ’ internet-based payments marketplace entirely relies former chronopay personnel name largest russian bank sberbank popular e-money system russia yandex.money card associations mastercard many dozens important state banks payment providers dependent former chronopay employees unlike mckinsey company ’ impact management consulting according russian forbes today 2016 chronopay serves 25 wealthiest corporations concerning capitalization web companies russia including two four russian cell companies mts tele2 2006 vrublevsky led e-commerce commission nauet commission advocated preservation existing model collective management copyright internet vrublevsky vocal proponent one largest rights management societies time fair 2007 together good friend former producer t.a.t.u group ivan shapovalov vrublevsky purchased mp3search.ru online store actively engaged mp3 business t.a.t.u music group russia whose music chosen official russian soundtrack 2014 olympics shapovalov remained business partner vrublevsky ’ wife vera vrublevskaya russian producer long time running social network musicians along vrublevsky chronopay serving infamous online store allofmp3.com persecuted international society collective management copyrights ifpi accused infringing us negotiations russia accession wto allofmp3.com worked license roms gave organization 50 license fees 2007 appearance electronic air tickets russia vrublevsky engaged processing area organizing project e-avia chronopay e-avia processing payments major airlines largest clients transaero exception aeroflot 2010 vrublevsky proposed create national air ticket reservation system gds based e-avia ready transfer controlling stake structure aeroflot proposal find response result single russian gds never created entry force law storage personal data russians territory russian federation state-owned company rostech urgently called upon create national gds russian airline tickets kept 2009 pavel vrublevsky part working group combating spam ministry communications initiated campaign former partner igor gusev according spamhaus rating world main spammer owner largest partner spam network sale viagra glavmed experts agree commencement criminal prosecution gusev closure spamit spam 2010 global level spam fell half 2012 vrublevsky proposed redemption magazine hacker publishing house gameland also according media reports 2012 vrublevsky preparing deal buy oldest business publication country financial newspaper 1915 published jointly rf ministry finance vrublevsky also provided financial backing relaunch finansovaya gazette financial newspaper russia ’ oldest financial newspaper initially run ministry finance russia founded 1914 iconic publication published several influential voices throughout history including vladimir lenin two russia ’ well-respected financial journalists nikolai vardul raf shakirov worked vrublevsky took editorial reigns publication comeback previously vardul shakirov chief editors kommersant russia ’ known business newspaper vrublevsky chronopay ’ commitment paper survival went far housing paper time especially past economic hardships whole newspaper resided chronopay office vrublesky advocated creation national payment system long hastily created reaction sanctions vrublevsky outspoken advocacy foreign journalists brian krebs business insider falsely predicted would run system exchange cleared false allegations national booking system also something pushed eventually created russian corporation rostechnology weeks kremlin publicly embraced blockchain bitcoin pavel strongly advocated trumpeted cutting-edge technology eventually becoming russian forbes contributor ground-breaking development initially vrublevsky unsure public new industry eventually migrated become one loudest supporters 2007 pavel vrublevsky first came pressure central information security federal security service russian federation 2010 accused cis fsb russia treason promotion myth russian cyber threat 2011 arrested several times officers fsb investigating cyberattack aeroflot online payment system convicted orchestrating cyberattack sentenced 2.5 years prison 2013 granted early parole serving less year incarceration 2016 basis materials vrublevsky officers cis fsb arrested high treason led termination cooperation us russia cybercrime 2018 court sentenced colonel mikhailov cis fsb 22 years prison accomplice kaspersky lab ruslan stoyanov 14 years prison mikhailov ’ subordinate mr. dokuchaev 6 years prison accomplice mr. fomchenkov 7 years prison mr.dokuchaev separately wanted fbi usa alleged cyber attacks yahoo illicit pharmaceutical trade vrublevsky extensively targeted american journalist brian krebs fact krebs focus vrublevsky story wrote close twenty-five stories krebs enjoyed tremendous support russian fsb well written positive stories kaspersky labs major partner united states krebs scandal united states since terminated contracts kaspersky according krebs internal war corruption pavel troubled man attempted mentor igor gusev pavel taken years earlier request russian police world ’ top spammer running one top spam affiliate programs world selling fake viagra gusev became krebs primary source pavel gusev exiled russia looking settle score pavel set revelations entirely based gusevs statements stolen hacked databases chronopay vrublevsky published research origins investigations brian krebs another known cyber security researcher kimberly zenz accusing work behalf american intelligence agencies vrublevsky humorously compared krebs zenz failed world-famous russian spies boshirov petrov eventually vrublevsky central villain krebs new york times best- selling book spam nation however recent events arrests mikhailov ’ group subsequent charges dokuchaev fbi united states debunk kreb ’ narrative vrublevsky ’ role instance new york times noted arrests mikhailov ’ fsb group « amounted purge leadership cyberwing russia ’ main intelligence agency midst electoral hacking scandal issue carrying immense implications russia ’ relations united states. » interview new york times vrublevsky stated « “ guys selling fairy tales united states people business like me. ” interview cnn vrublevsky added « believe good thing countries russia us people directly responsible cyber hysteria eventually going far election meddling scandal happy since november 2016 leading column forbes electronic payments crypto-currencies particular popularization bitcoin vrublevsky ’ statements russian hackers received wide response spring summer 2017 vrublevsky conveyed number leading world media materials testifying non-involvement russian hackers attacks servers democratic party united states different years headed 2011 magazine finance included prestigious 33 pepper rating successful men age 33 2011 vrublevsky also major sponsor vtb league paying one million usd russia ’ main basketball league frequently seen along vtb league top management including mr. sergei ivanov one russia ’ influential politicians 2018 vrublevsky heads payments committee idacb.com one world ’ largest bitcoin associations founded 65 member states ultra high- rank representatives russian office idacb founded assistance mr. advisor internet president russia mr. putin frequently appears alongside vrublevsky facebook pages photos married producer vera vrublevskaya mother three children
[ 9248, 7809, 8805, 4830, 1087 ]
None
6,729
7
Velaro,_Inc.:velaro inc. velaro inc. software-as-a-service saas provider headquartered elkridge maryland company provides live chat software click-to-call intelligent engagement features current president alex bloom velaro founded 2001 velaro live chat software provider velaro integrates following systems
[ 1539, 10090, 5612, 7983, 467, 5524 ]
Test
6,730
9
Virtual_8086_mode:virtual 8086 mode 80386 microprocessor later virtual 8086 mode also called virtual real mode v86-mode vm86 allows execution real mode applications incapable running directly protected mode processor running protected mode operating system hardware virtualization technique allowed multiple 8086 processors emulated 386 chip emerged painful experiences 80286 protected mode suitable run concurrent real mode applications well vm86 mode uses segmentation scheme identical real mode compatibility reasons creates 20-bit linear addresses manner 20-bit physical addresses created real mode subject protected mode memory paging mechanism virtual 8086 mode mode protected-mode task consequently processor switch vm86 non-vm86 tasks enabling multitasking legacy dos applications use virtual 8086 mode operating system sets virtual 8086 mode monitor program manages real-mode program emulates filters access system hardware software resources monitor must run privilege level 0 protected mode 8086 program runs vm86 mode privilege level 3 real-mode program attempts things like access certain i/o ports use hardware devices access certain regions memory space cpu traps events calls v86 monitor examines real mode program trying either acts proxy interface hardware emulates intended function real-mode program trying access terminates real-mode program trying something either allowed adequately supported reboot machine set video display mode supported hardware emulated write operating system code v86 monitor also deny permission gently emulating failure requested operation—for example make disk drive always appear ready fact even checked drive simply permit real-mode program access also v86 monitor things like map memory pages intercept calls interrupts preempt real-mode program allowing real-mode programs multitasked like protected-mode programs intercepting hardware software i/o real-mode program tracking state v86 program expects allow multiple programs share hardware without interfering v86 mode provides way real-mode programs designed single-tasking environment like dos run concurrently multitasking environment used execute certain dos programs flexos 386 since 1987 concurrent dos 386 since 1987 windows/386 2.10 since 1987 desqview 386 since 1988 windows 3.x since 1990 multiuser dos since 1991 windows workgroups 3.1x since 1992 os/2 2.x since 1992 4690 os since 1993 real/32 since 1995 running 386 enhanced mode well windows 95 98 98 se virtual dos machines sco unix merge linux dosemu dos programs use protected mode execute using user mode emulator ntvdm x86 windows nt-based operating systems also use vm86 mode limited direct hardware access common problem running 8086 code protected mode memory addressing totally different protected mode real mode mentioned working vm86 mode segmentation mechanism reconfigured work like real mode paging mechanism still active transparent real mode code thus memory protection still applicable isolation address space interrupts hardware software int instruction occur processor switches vm86 mode returns work full protected mode handle interrupt also servicing interrupt ds es fs gs registers pushed new stack zeroed pentium architecture added number enhancements virtual 8086 mode however documented intel starting subsequent p6 microarchitecture recent formal name virtual 8086 mode enhancements abbreviated vme older documentation may use extensions last word vme acronym expansion later intel 486 chips also support enhancements address mainly 8086 virtualization overhead particular focus virtual interrupts extensions publicly documented p6 documentation official documentation referred famed appendix h omitted public documentation shared selected partners nda activating vme done setting bit number 0 0x1 value cr4 vme interrupt speed-up enhancements found useful non-vm86 protected tasks also enabled separately setting bit number 1 0x2 value called pvi protected mode virtual interrupts detecting whether processor supports vme including pvi done using cpuid instruction testing value second bit bit number 1 0x2 value edx register set vme supported processor linux latter bit reported vme flag /proc/cpuinfo file flags section virtual 8086 mode basic idea iopl less 3 pushf/popf/sti/cli/int/iret instructions treat value vif real 32-bit eflags register value simulated 16-bit flags register 32-bit pushfd/popfd continues gp fault vip cause gp fault setting simulated directing os process pending interrupts pvi idea affects cli/sti instructions first generation amd ryzen cpus found feature broken vme implementation second generation ryzen 2000 series fixed issue support virtual 8086 mode available x86-64 long mode although still present 64-bit capable processors running legacy mode addition vt-x added back ability run virtual 8086 mode x86-64 long mode done transitioning physical processor vmx root mode launching logical virtual processor running virtual 8086 mode westmere later intel processors usually start logical processor directly real mode using unrestricted guest feature requires extended page tables method removes need resort nested virtual 8086 mode simply run legacy bios booting
[ 10757, 6150, 6153, 4622, 541, 1068, 8241, 1085, 2625, 7755, 6221, 86, 4695, 8795, 2152, 8301, 5234, 634, 3197, 639, 4237, 6797, 8851, 2201, 704, 1736, 5840, 7377, 6868, 1237, 3294, 1247, 5856, 9959, 7403, 5356, 242, 3317, 255, 2304, 691...
None
6,731
2
Premake:premake premake open-source software development utility automatically building configuration source code features system following example premake script simple software project solution mysolution project myproject number notable uses including
[ 4777, 10478, 4309, 11221, 2045 ]
None
6,732
3
Namco_System_10:namco system 10 namco system 10 arcade system board released namco 2000 based sony playstation hardware preceded namco system 23 1997 succeeded namco system 246
[ 643, 9091, 3077, 11398, 10761, 6799, 9508, 6311, 9512, 684, 306, 1587, 1091, 9543, 10056, 10316, 6738, 6873, 859, 4060, 607, 359, 8937, 3824, 5746, 7028, 7801, 8316, 6781 ]
None
6,733
5
Pool_Registrar:pool registrar computing pool registrar pr component reliable server pooling rserpool framework manages handlespace prs also denoted enrp server name server ns responsibilities pr following
[ 6723, 6531, 6740, 6746, 6682 ]
Test
6,734
4
SecureWare:secureware secureware inc. founded 1986 developed software encryption technology securing unix-based operating systems secure operating system used help secure world first internet bank security first network bank s1 technologies secureware also worked closely hp federal division develop security products trusted operating system used u.s. department defense certain military information 1996 secureware internet system security division sold hewlett packard rest secureware acquired security first network bank later year
[ 125 ]
None
6,735
4
Ping_of_death:ping death ping death type attack computer system involves sending malformed otherwise malicious ping computer correctly-formed ping packet typically 56 bytes size 64 bytes internet protocol header considered however ipv4 packet including pings may large 65,535 bytes computer systems never designed properly handle ping packet larger maximum packet size violates internet protocol documented rfc 791 like large well-formed packets ping death fragmented groups 8 octets transmission however target computer reassembles malformed packet buffer overflow occur causing system crash potentially allowing injection malicious code early implementations tcp/ip bug easy exploit affect wide variety systems including unix linux mac windows peripheral devices systems began filtering pings death firewalls detection methods different kind ping attack known ping flooding later appeared floods victim many ping requests normal traffic fails reach system basic denial-of-service attack defined rfc 791 maximum packet length ipv4 packet including ip header 65,535 2 − 1 bytes limitation presented use 16-bit wide ip header field describes total packet length underlying data link layer almost always poses limits maximum frame size see mtu ethernet typically 1500 bytes case large ip packet split across multiple ip packets also known ip fragments ip fragment match imposed limit receiver ip fragments reassemble complete ip packet continue processing usual fragmentation performed ip fragment needs carry information part original ip packet contains information kept fragment offset field ip header field 13 bits long contains offset data current ip fragment original ip packet offset given units 8 bytes allows maximum offset 65,528 2-1 *8 adding 20 bytes ip header maximum 65,548 bytes exceeds maximum frame size means ip fragment maximum offset data larger 7 bytes else would exceed limit maximum packet length malicious user send ip fragment maximum offset much data 8 bytes large physical layer allows receiver assembles ip fragments end ip packet larger 65,535 bytes may possibly overflow memory buffers receiver allocated packet cause various problems evident description problem nothing icmp used payload big enough exploit problem problem reassembly process ip fragments may contain type protocol tcp udp igmp etc. correction problem add checks reassembly process check incoming ip fragment makes sure sum fragment offset total length fields ip header ip fragment smaller equal 65,535 sum greater packet invalid ip fragment ignored check performed firewalls protect hosts bug fixed another fix problem using memory buffer larger 65,535 bytes re-assembly packet essentially breaking specification since adds support packets larger allowed 2013 ipv6 version ping death vulnerability discovered microsoft windows windows tcp/ip stack n't handle memory allocation correctly processing incoming malformed icmpv6 packets could cause remote denial service vulnerability fixed ms13-065 august 2013 cve-id vulnerability cve-2013-3183
[ 6402, 4488, 6797, 4495, 2709, 11413, 5402, 8998, 10924, 7091, 823, 953, 5179, 1474, 2754, 2509, 3024, 4689, 4054, 5469, 5470, 5472, 2409, 5492, 8692, 10996, 9727 ]
Train
6,736
8
GolfBOO:golfboo golfboo golf course search engine optimized towards finding golf courses online bargains co-founded 2013 antonio conde fabio peral headquartered marbella spain engine provides search tool find locations descriptions facility list reviews golf courses europe golfboo golf course search engine locates golf courses golf vacation travel packages real estate options website uses algorithms rating system search filters golfboo founded january 2013 antonio conde online marketer fabio peral former golf consultant royal troon golf club golf director la quinta lumine buenaventura located panama first version website launched june 2013 former version site focused advertised golf courses golf bargain packages later site expanded listing tee times hotels deals real estate located specific golfing spots golfboo received online exposure initial debut due fact golf-specific travel search engine comparison website first travel website curtail search optimization towards finding real estate golf recreational areas
[]
Validation
6,737
7
Typeform_(service):typeform service typeform barcelona-based online software service saas company specializes online form building online surveys main software creates dynamic forms based user needs typeform software used apple inc. airbnb uber nike inc. typeform produces millions forms every month typeform founded 2012 robert muñoz david okuniev typeform software released alpha phase invitation software launched beta april 2013 raised €550,000 seed funding company generated additional €1.2 million 2014 typeform software officially launched february 2014 august 2014 software 100,000 users october 2015 company raised 15 million series funding led london-based index ventures previous investors point nine capital connect ventures rta ventures ceo squarespace anthony casalena facebook vice president growth javier olivan jay parikh facebook also participated funding round june 27 2018 typeform engineering team became aware unknown third party gained access typeform server obtained access customer data downloaded attackers gained access data backups surveys conducted may 3rd 2018 100,000 records affected typeforms present questions slide one another showing one question time keep users engaged include images gifs videos tool includes calculator custom thank screens question groups allow questions added sections include sub-questions logic jump customizes questions user sees based selections form embedded website open pop-up accessed unique url form-builder uses freemium business model typeform i/o developer api creates forms based user data api allows users generate forms using code rather traditional typeform tool typeform.io standalone service connected typeform.com service discontinued early 2018 typeform launched developer platform september 2017 developer-oriented apis sdks similar typeform.io functionality integrated rest platform developers create forms programatically using create api retrieve form results using responses api webhooks perform advanced form embedding embedding sdk
[ 11347, 467, 5268, 2328, 9305 ]
None
6,738
3
Ken_Kutaragi:ken kutaragi also designed sound processor super nes sony designed vlsi chip works conjunction ps1 risc cpu handle graphics rendering kutaragi closely watched financial analysts trace profiles losses profits sony corporation ken kutaragi born tokyo japan parents although wealthy japanese standards still managed business small printing plant city kutaragi grew childhood actively encouraged young boy explore mechanical abilities plant worked school aside duties parents factory kutaragi studious high-level student often described straight student kutaragi always desire tinker often taking apart toys child rather playing curiosity carried childhood leading teenager learn intricacies electronics eventually fact love electronics led enrolling university electro-communications acquired electronics degree 1970 immediately graduation kutaragi began working sony digital research labs mid-1970 although time considered radical decision kutaragi felt sony fast track quickly gained reputation excellent problem solver forward thinking engineer earning reputation working many successful projects including early liquid crystal displays lcds digital cameras late 1980s watching daughter play famicom realized potential existed within video games particular time sony executives interest video games thus nintendo expressed need sound chip upcoming new 16-bit system kutaragi accepted offer working secret designed chip spc700 found sony executives furious sony ceo norio ohga approval kutaragi able complete chip keep job even working nintendo within sony gaming still regarded fad despite hostile atmosphere video games kutaragi managed persuade norio ohga making two devices snes add-on snes-cd sony branded console could play snes-cd games nintendo cartridges efforts resulted device called play station console would compatible super famicom games software released new format called superdisc eventually partnership sony nintendo faltered due licensing disagreements kutaragi sony continued develop console kutaragi later recalled staying night working console design several nights row work interesting despite considered risky gamble sony executives kutaragi support norio ohga several years later company released original playstation success playstation led heading development consoles like playstation 2 successor playstation 3 commercial success playstation franchise makes sony computer entertainment profitable business division sony despite upstart console market veterans nintendo sega first playstation displaced become popular console era playstation 2 extended sony lead following generation one point holding 65 market share 100 million units shipped ken recognized many financial technological publications success notably named one 100 influential people 2004 time magazine gutenberg video games 1997 kutaragi appointed ceo sony computer entertainment america accordingly moved california since 1997 kutaragi favoured become next sony president enjoyed close relationship sony ceo norio ohga backed kutaragi sound chip playstation projects ohga successor nobuyuki idei promoted kutaragi deputy executive president sony-global chief operating officer vice-chairman 2003 november 30 2006 kutaragi replaced president sony computer entertainment kaz hirai president sce america addition management changes kutaragi promoted chairman scei retained position chief executive officer group april 26 2007 announced kutaragi would retire instead take role honorary chairman taking position would scei president ceo kaz hirai would eventually promoted president ceo sony june 29 2011 following reshuffling management sony announced june 28 2011 kutaragi stepped honorary chairman scei kutaragi relinquished active management business created built 2007 stepped executive chairman group ceo sony computer entertainment remained sony senior technology advisor ken kutaragi later became president ceo cyber ai entertainment inc also serves boards kadokawa group holdings inc. nojima corporation rakuten inc 2009 became visiting professor ritsumeikan university although kutaragi leadership consumer electronics successful analysts also suspect outgoing sony ceo nobuyuki idei set kutaragi fail given men cool working relationship idei assigned kutaragi tedious task turning around consumer division already falling behind competitors samsung lcd market kutaragi rival top position howard stringer given less difficult assignment content business success sony bmg music entertainment resulted promotion sony computer entertainment kutaragi heading since inception weaker year 2004 several years solid growth year sony ’ game sales fell 7.5 billion 8.2 billion operating income slid 650 million 1 billion losing 25 million q4 2004 attributed partially over-saturation video game market price wars caused ps2 lose top sales position time kutaragi labelled xbox 360 xbox 1.5 stated going playstation 2 however sce executive tetsuhiko yasuda consider microsoft competitor said might consider working games together september 2006 kutaragi admitted shortage playstation 3 consoles north america japan well postponing consoles debut europe put sony strength hardware decline
[ 9472, 10368, 643, 9091, 3077, 10761, 6799, 9508, 9126, 6311, 9512, 684, 9391, 306, 1587, 7218, 6072, 8120, 1985, 1091, 9543, 6909, 6732, 10316, 3025, 342, 6873, 1115, 859, 4060, 3677, 607, 9445, 359, 8937, 10985, 4587, 3824, 8316, 5746, ...
Test
6,739
3
JMP_(x86_instruction):jmp x86 instruction x86 assembly language codice_1 instruction performs unconditional jump instruction transfers flow execution changing instruction pointer register number different opcodes perform jump depending whether processor real mode protected mode override instruction used instructions may take 16-bit 32-bit segment offset pointers many different forms jumps relative conditional absolute register-indirect jumps following examples illustrate note although first second jumps relative commonly destination address shown instead relative offset encoded opcode example one load ip new value codice_2 load cs codice_3 ip codice_4 example two load eip value codice_5 protected mode unreal mode example three jump value stored eax register protected mode
[ 547, 6596, 8716, 10796, 372, 5080, 1915, 1247 ]
Test
6,740
5
Pool_Element:pool element pool element pe server reliable server pooling rserpool framework responsibilities pe following
[ 6746, 6682, 6531, 6733 ]
Test
6,741
3
ND812:nd812 12-bit nd812 produced nuclear data inc. commercial minicomputer developed scientific computing market nuclear data introduced 1970 price 10,000 architecture simple programmed i/o bus plus dma channel programmed i/o bus typically runs low medium-speed peripherals printers teletypes paper tape punches readers dma used cathode ray tube screens light pen analog-to-digital converters digital-to-analog converters tape drives disk drives word size 12 bits large enough handle unsigned integers 0 4095 – wide enough controlling simple machinery also enough handle signed numbers -2048 +2047 higher precision slide rule analog computers twelve bits could also store two six-bit characters note six-bit n't enough two cases unlike fuller ascii character set nd code one 6-bit character encoding included upper-case alphabetic digit subset punctuation control characters nd812 basic configuration main memory 4,096 twelve-bit words 2 microsecond cycle time memory expandable 16k words 4k word increments bits within word numbered significant bit bit 11 least significant bit bit 0 programming model consists four accumulator registers two main accumulators j k two sub accumulators r s. rich set arithmetic logical operations provided main accumulators instructions provided exchange data main sub accumulators conditional execution provided skip instructions condition tested subsequent instruction either executed skipped depending result test subsequent instruction usually jump instruction one instruction needed case test fails i/o facilities include programmable interrupts 4-levels priority trap location first 4k words memory i/o transmit 12 24 bits receive 12 24 bits transmit receive 12 bits cycle i/o instructions include 4 bits creating pulses peripheral control i/o peripherals attached via 76 signal connector allows direct memory access peripherals dma accomplished cycle stealing cpu store words directly core memory system nuclear data provided interfaces following peripherals nd812 operating system front panel run halt switches i/o facility allowed peripherals directly load programs memory computer halted executing instructions another option enter short loader program would used bootstrap desired program peripheral teletype paper tape reader since core memory non-volatile shutting computer result data program loss number system programs made available nuclear data use nd812 basc-12 assembler symbolic text editor nutran interpreter disk-based symbolic text editor assembler called basc-12 provided basc-12 two-pass assembler optional third pass pass one generates symbol table pass two produces binary output tape pass three provides listing program sample assembler principles programming nd812 computer manual shown nutran conversational fortran-like language provided nutran intended general scientific programming sample nutran shown example conversational nature nutran shown codice_1 command prompt codice_2 input prompt instruction set consists single double word instructions operands immediate direct indirect immediate operands encoded directly instruction literal value direct operands encoded address operand indirect operands encode address word containing pointer operand displacement sign bit allow single word instructions address locations -63 +63 location instruction bit 4 instruction allows choice indirect direct addressing displacement used indirect address contents location +/-63 locations instruction location used pointer actual operand many single word instructions reference memory use bits 4 5 part specification operation group 1 instructions perform arithmetic logical exchange shifting functions accumulator registers includes hardware multiply divide instructions bit 4 set k register affected bit 5 set j register affected bits set registers affected group 2 format instructions test internal conditions j k accumulator registers manipulate overflow flag status bits provide complement increment negation operations j k accumulator registers bits 9 10 11 select condition tested bit 9 change fields inhibits absolute address referencing different field one containing instruction bit 8 1 upper accumulator k used instruction otherwise lower accumulator j used bit 7 1 indirect addressing used otherwise direct addressing used status register doest exist distinct register contents several groups indicators stored j register desired jps int bits hold current field contents would used jps instruction interrupt flag overflow bits set explicitly j register contents rfov instruction bits must set distinct instructions nd812 processor provides simple stack operands n't use mechanism storing subroutine return addresses instead return address stored target codice_3 instruction codice_4 register updated point location following stored return address return subroutine indirect jump initial location subroutine restores program counter instruction following codice_3 instruction
[ 7401, 477 ]
Test
6,742
9
Transaction_Application_Language:transaction application language transaction application language tal originally tandem application language block-structured procedural language optimized use tandem hardware tal resembles cross c pascal original system programming language tandem cisc machines assembler design concept tal evolution hewlett packard spl intimately associated optimized microprogrammed cisc instruction set tal statement could easily compile sequence instructions manipulated data transient floating register stack register stack floated crest program memory allocation call stack language appearance algol pascal begin end statements however semantics far like c. permit indefinite levels procedure nesting pass complex structured arguments value strictly type variable references programming techniques much like c using pointers structures occasional overlays deliberate string handling casts appropriate available datatypes include 8 bit 16 bit 32 bit introduced later 64 bit integers microcode level support available null terminated character strings however commonly used originally tandem nonstop operating system written tal recently much rewritten c tal deprecated new development migration cisc risc tal updated/replaced ptal compilers allowed tal accelerated/re-compiled native risc applications current migration risc intel itanium 2 tal ptal replaced eptal compilers allow tal ptal code accelerated/re-compiled native itanium applications
[ 512, 477, 6722, 7173, 1606, 4998, 8262, 8524, 2638, 7983, 5040, 2045 ]
None
6,743
2
The_Unix-Haters_Handbook:unix-haters handbook unix-haters handbook semi-humorous edited compilation messages unix-haters mailing list book edited simson garfinkel daniel weise steven strassmann published 1994 book made available download free electronic format 2003 book concerns frustrations users unix operating system many users come systems felt far sophisticated computer science terms tremendously frustrated worse better design philosophy felt unix much software encapsulated book based messages sent unix-haters mailing list 1988 1993 contains foreword human factors guru norman anti-foreword dennis ritchie one creators operating system many book complaints unix operating system based design decisions fact shell expands wildcards means wildcards used filenames usernames times things example large proportion complaints anomalies command line interface many complaints still valid complaints book addressed time lack journaling file system criticisms operating system graphical user interface book predates rise linux thus concerns several commercial versions unix available inconsistencies another major complaint book —most replaced inconsistencies different versions linux incompatibilities various versions linux linux macos book printed trade paperback front cover designed similar scream air sickness bag printed phrase unix barf bag inserted inside back cover every copy publisher front-matter page dedication says ken dennis without book would possible references ken thompson dennis ritchie creators unix
[ 4360, 4398, 7983, 5492, 823, 9335 ]
Validation
6,744
2
Comparison_of_Start_menu_replacements_for_Windows_8:comparison start menu replacements windows 8 microsoft windows 8 operating system introduced updated start menu known start screen uses full-screen design consisting tiles represent applications replaced windows desktop primary interface operating system additionally on-screen start button replaced hidden button corner screen microsoft explained start button removed people used noting addition pinning apps taskbar windows 7 change controversial among users market ensued applications restore visible start button emulate previous start menu design allow users boot directly desktop instead start screen following list start menu replacements windows 8 received coverage third-party sources number skins table givens number built-in skins downloadable skins appended number indicate download extensions possible retroui startisback classic shell start8 pokki five notable retroui offered 33 languages also windows server 2012 adds taskbar resizable windows startisback also localized classic shell used free open source proprietary freeware major items localized installing language pack windows update makes items fully localized classic shell also available windows 7 windows server claims 25 million downloads pokki download restore start menu free january 2013 1.5 million users pokki application platform based chromium enables desktop applications built—like mobile apps—using standard web languages like html5 css3 javascript also available windows xp windows 7 pokki raised 21.5m investors like google intel o'reilly business model make commission software sold app store start8 downloaded 5 million times
[ 10989, 877, 7983 ]
Test
6,745
0
Semantic_analysis_(computational):semantic analysis computational semantic analysis computational composite semantic analysis computational components semantic analysis refers formal analysis meaning computational refers approaches principle support effective implementation digital computers
[ 1890, 7780, 1737, 10452, 5781 ]
Test
6,746
5
Pool_User:pool user pool user pu client reliable server pooling rserpool framework order use service provided pool pu proceed following steps
[ 6531, 4490, 6733, 6740, 6682 ]
None
6,747
5
QtWeb:qtweb qtweb discontinued free open-source web browser developed logicware lsoft technologies qtweb used webkit browser engine embedded qt framework qtweb described lightweight web browser offers amount customisable features speed simplicity navigate however criticised lack extensions support way run java problems work several websites
[ 513, 6657, 9736, 2579, 6171, 9757, 7713, 10791, 9770, 559, 4661, 3639, 10808, 3643, 9275, 64, 5707, 10834, 6231, 8281, 106, 1642, 9834, 9841, 115, 9843, 4728, 637, 1664, 2182, 10910, 8351, 7340, 9394, 9908, 185, 11449, 4797, 11466, 7885, ...
Test
6,748
2
Nokia_5800_XpressMusic:nokia 5800 xpressmusic nokia 5800 xpressmusic mid-range smartphone part xpressmusic line announced nokia 2 october 2008 london started shipping november year code-named tube first touchscreen-equipped s60 device nokia essentially first device run symbian^1 also known s60 5th edition touch-specific s60-based platform created symbian foundation touchscreen features tactile feedback though use nokia haptikos technology nokia 5800 xpressmusic 3.2-inch display resolution 640x360 pixels many features standard nokia nseries gps hsdpa wi-fi support highly anticipated device 2008 went become commercial success 8 million units sold year release praised supplied stylus low price viewed negative critics camera software issues nokia 5800 xpressmusic first touchscreen device nokia range 2004 nokia 7700 announced nokia series 90 device cancelled reached market followed nokia 7710 upgraded version 7700 became available 2005 nokia also produced uiq-based nokia 6708 phone 2005 in-house development bought taiwanese manufacturer benq nokia also produced range maemo-based internet tablets touchscreen interface mobile phones one connect use phone via bluetooth 5800 however nokia first symbian s60 touchscreen device aspect ratio display first among mobile phones compatibility mode java applications touchscreen-aware works using part screen displaying essential buttons required program launch 5800 xpressmusic january 2009 followed-up release nokia n97 may june 2009 followed series 40 based nokia 6208c january 2009 device well nokia music store launched south africa 24 april 2009 market nokia 5800 xpressmusic would compete touchscreen devices sony ericsson xperia x1 sony ericsson satio iphone 3g htc touch diamond lg renoir lg arena km900 blackberry storm 9500 samsung pixon samsung i900 omnia early february 2009 website mobile-review.com initially enthusiastic handset published research concluded nokia 5800 design flaw specifically phones used daily basis earpieces produced nokia contract third party would cease function short time repairs performed warranty would temporarily fix problem defect found earpiece design nokia public relations department admitted nokia 5800 xpressmusic contained design defect according nokia switched another earpiece manufacturer 5800 produced february 2009 later free defect previously produced earpieces eligible free warranty repair new earpiece parts also supplied nokia service centres future phone repairs permanently fix defect 21 august 2009 nokia announced new variant named nokia 5800 navigation edition addition normal nokia 5800 latest version nokia maps pre-installed also comes car charger car kit inside box gps decreases battery life nokia 5800 xpressmusic 5800 navigation edition however free lifetime navigation due new version ovi maps service available nokia.com prototype handset seen 2008 batman movie dark knight number music videos christina aguilera keeps gettin better womanizer britney spears flo rida right round pitbull shut pussycat dolls jai ho hush hush katy perry waking vegas cobra starship good girls go bad phone received generally positive reviews uk phone magazine mobile choice awarding full 5 stars 7 january 2009 issue 23 january 2009 nokia announced shipped millionth 5800 xpressmusic device even though still fully released worldwide noknok reported april one fastest selling smartphones time nokia q1 report released 16 april 2009 announced company shipped 2.6 million units quarter cumulative shipments 3 million units since smartphone launch q2 results released 16 july 2009 reports 3.7 million units shipped quarter 6.8 million units total shipped since release november 2009 8 million units sold nokia 5800 xpressmusic following specifications firmware version 20.0.012 onwards 5800 cpu clock increased 369 mhz 434 mhz matching n97 specification however improved overall performance observed since firmware version 30 13 january 2010 nokia released major firmware update version 40.0.005 update includes bug fixes speed improvements new features visible kinetic scrolling menus except main applications menus improved home screen first introduced nokia 5530 software update also saw removal alphanumeric keypad landscape view text input replaced full qwerty keyboard new home screen provides contacts carousel 20 contacts program shortcuts screen time change option selecting every menus hard notice one selects holds selection white normal colours selecting option still red like v20 19 april 2010 firmware version 50.0.005 released new major update brought new features available nokia n97 upgrade existing web browser version 7.2 full kinetic scrolling auto-full screen browsing web new music player mini-album art song list album list initial letter filtering track titles music player scrolling using scroll-bar result search function removed music player new application called ovi sync installed nokia music store received revamped user interface renamed ovi music regions quick office 4.2.374 integrated full free license search application icon changed minor updates better touch sensitivity tweaks faster operation phone present little update color option select silver hold option still white like v40 also new feature one-touch dialling firmware 51.0.006 appeared august 2010 contained minor bug fixes updates various applications rds function however remains dysfunctional since version 40.0.005 web browser lost ability re-flow text page enlarged firmware 51.2.007 also released north american nokia 5800 rm-428 august 2010 following changes software release comes improved browser improved video calls new version mail exchange also general performance improvements november 2010 updated firmware nokia 5800 released nokia 5800 v52.0.007 firmware update expects still pencil select several ability gallery big disadvantage still exists pictures videos listed one gallery separate galleries pictures videos 20 october 2011 firmware version 60.0.003 released new major update brought new symbian anna browser 7.3.1.33 swipe unlock feature
[ 1537, 4609, 11271, 11277, 529, 10770, 5143, 2072, 5659, 4132, 40, 3626, 5677, 10802, 7220, 5175, 1083, 9292, 7246, 1615, 5201, 7253, 5211, 1633, 109, 6276, 3205, 9359, 659, 5274, 669, 6310, 167, 5290, 10410, 690, 7866, 1216, 1728, 4291, ...
Test
6,749
4
Louis_W._Tordella:louis w. tordella louis william tordella may 1 1911 – january 10 1996 longest serving deputy director national security agency tordella born garrett indiana may 1 1911 grew chicago environs displayed early affinity mathematics obtained bachelors masters doctoral degrees 1930s outbreak world war ii found teaching mathematics chicago loyola university joined us navy immediately made contacts service brought aboard lieutenant junior grade 1942 went directly cryptologic work navy codebreaking organization op-20-g finished war op-20-g collection stations west coast bainbridge island washington skaggs island naval communication station war tordella stayed navy 1949 joined newly created armed forces security agency afsa early attempt achieve service unity business cryptology key figure devising policy new agency successor national security agency emerged 1952 replace afsa career nsa brought front rank cryptologists early advocate use computers cryptologic work helped cement close working relationship american industry grasp computer technology associated engineering concepts coupled understanding cryptanalysis led tordella push forcefully development supercomputers cryptologic applications tordella also leader securing american communications pushing series leading-edge new encoding devices secure u.s. government communications senior official nsa tordella played central role nsa outside relationships close collaborators britain commonwealth nations built trust tordella many foreign intelligence officials regarded linchpin relationship nsa tordella became deputy director nsa 1958 remained post retirement 1974 thus became longest serving deputy director nsa history tordella received unprecedented honors years retirement 1974 received national security medal national intelligence distinguished service medal relationship british recognized 1976 became honorary knight commander excellent order british empire 1992 security affairs support association composed mainly retired intelligence officials gave william o. baker medal distinguished service american intelligence died bethesda naval hospital 1996 waldenström macroglobulinemia colon cancer autopsy done determine actually caused death following death sixteen boxes recovered nsa office safe according budiansky ... documents turned compendium every single one nsa highly classified compartmented programs post-world war ii era lew allen ensured nsa department director ever wielded untrammeled power
[ 266, 6668, 9357, 2712, 289, 4898, 11302, 1714, 6578, 10305, 327, 4937, 7887, 10832, 2897, 4566, 7137, 365, 4719, 2419 ]
Test
6,750
5
OAuth:oauth oauth open standard access delegation commonly used way internet users grant websites applications access information websites without giving passwords mechanism used companies amazon google facebook microsoft twitter permit users share information accounts third party applications websites generally oauth provides clients secure delegated access server resources behalf resource owner specifies process resource owners authorize third-party access server resources without sharing credentials designed specifically work hypertext transfer protocol http oauth essentially allows access tokens issued third-party clients authorization server approval resource owner third party uses access token access protected resources hosted resource server oauth service complementary distinct openid oauth unrelated oath reference architecture authentication standard authorization however oauth directly related openid connect oidc since oidc authentication layer built top oauth 2.0 oauth also unrelated xacml authorization policy standard oauth used conjunction xacml oauth used ownership consent access delegation whereas xacml used define authorization policies e.g managers view documents region oauth began november 2006 blaine cook developing twitter openid implementation meanwhile ma.gnolia needed solution allow members openids authorize dashboard widgets access service cook chris messina larry halff magnolia met david recordon discuss using openid twitter ma.gnolia apis delegate authentication concluded open standards api access delegation oauth discussion group created april 2007 small group implementers write draft proposal open protocol dewitt clinton google learned oauth project expressed interest supporting effort july 2007 team drafted initial specification eran hammer joined coordinated many oauth contributions creating formal specification 4 december 2007 oauth core 1.0 final draft released 73rd internet engineering task force ietf meeting minneapolis november 2008 oauth bof held discuss bringing protocol ietf standardization work event well attended wide support formally chartering oauth working group within ietf oauth 1.0 protocol published rfc 5849 informational request comments april 2010 since 31 august 2010 third party twitter applications required use oauth oauth 2.0 framework published rfc 6749 bearer token usage rfc 6750 standards track requests comments october 2012 oauth 2.0 backwards compatible oauth 1.0 oauth 2.0 provides specific authorization flows web applications desktop applications mobile phones smart devices specification associated rfcs developed ietf oauth wg main framework published october 2012 facebook graph api supports oauth 2.0 google supports oauth 2.0 recommended authorization mechanism apis microsoft also supports oauth 2.0 various apis azure active directory service used secure many microsoft third party apis oauth 2.0 framework bearer token usage published october 2012 23 april 2009 session fixation security flaw 1.0 protocol announced affects oauth authorization flow also known 3-legged oauth oauth core 1.0 section 6 version 1.0a oauth core protocol issued address issue oauth 2.0 support signature encryption channel binding client verification relies completely tls degree confidentiality server authentication january 2013 internet engineering task force published threat model oauth 2.0 among threats outlined one called open redirector spring 2014 variant described name covert redirect wang jing oauth 2.0 analyzed using formal web protocol analysis analysis revealed setups multiple authorization servers one behaving maliciously clients become confused authorization server use may forward secrets malicious authorization server mix-up attack prompted creation new best current practice internet draft sets define new security standard oauth 2.0 assuming fix mix-up attack place security oauth 2.0 proven strong attacker models using formal analysis implementations oauth 2.0 numerous security flaws exposed april–may 2017 one million users gmail less 0.1 users may 2017 targeted oauth-based phishing attack receiving email purporting colleague employer friend wanting share document google docs clicked link within email directed sign allow potentially malicious third-party program called google apps access email account contacts online documents within approximately one hour phishing attack stopped google advised given google apps access email revoke access change passwords oauth used authorizing mechanism consume secured rss/atom feeds consumption rss/atom feeds require authentication always issue example rss feed secured google site could consumed using google reader instead three-legged oauth would used authorize rss client access feed google site also used means login without creating account site benefits host oauth system oauth authorization protocol rather authentication protocol using oauth authentication method may referred pseudo-authentication following diagrams highlight differences using openid specifically designed authentication protocol oauth authentication communication flow processes similar crucial difference openid authentication use case response identity provider assertion identity oauth authorization use case identity provider also api provider response identity provider access token may grant application ongoing access identity provider apis user behalf access token acts kind valet key application include requests identity provider prove permission user access apis identity provider typically always authenticates user part process granting oauth access token tempting view successful oauth access token request authentication method however oauth designed use case mind making assumption lead major security flaws xacml policy-based attribute-based access control authorization framework provides xacml oauth combined together deliver comprehensive approach authorization oauth provide policy language define access control policies xacml used policy language oauth focuses delegated access user grant twitter access facebook wall identity-centric authorization xacml takes attribute-based approach consider attributes user action resource context xacml possible define policies xacml provides fine-grained access control oauth oauth limited granularity coarse functionality scopes exposed target service result often makes sense combine oauth xacml together oauth provide delegated access use case consent management xacml provide authorization policies work applications processes data lastly xacml work transparently across multiple stacks apis web sso esbs home-grown apps databases ... oauth focuses exclusively http-based apps eran hammer resigned role lead author oauth 2.0 project withdrew ietf working group removed name specification july 2012 hammer cited conflict web enterprise cultures reason leaving noting ietf community enterprise use cases capable simple offered blueprint authorization protocol noted enterprise way providing whole new frontier sell consulting services integration solutions comparing oauth 2.0 oauth 1.0 hammer points become complex less interoperable less useful incomplete importantly less secure explains architectural changes 2.0 unbound tokens clients removed signatures cryptography protocol level added expiring tokens tokens could n't revoked complicating processing authorization numerous items left unspecified unlimited specification nature working group issue small get stuck leave open implementation decide hammer later gave presentation yet elaborating views david recordon later also removed name specifications unspecified reasons dick hardt took editor role framework published october 2012
[ 9734, 7, 1551, 4242, 3477, 2076, 2080, 6561, 2083, 9635, 2087, 1069, 10673, 10801, 820, 4663, 10167, 5433, 4797, 574, 5568, 3521, 322, 3269, 5573, 10058, 6098, 2013, 8670, 2143, 4575, 9313, 2274, 10466, 6888, 1516, 9967, 1012, 254 ]
None
6,751
2
Microsoft-specific_exception_handling_mechanisms:microsoft-specific exception handling mechanisms microsoft windows os family employs exception handling mechanisms based operating system specifics microsoft structured exception handling native exception handling mechanism windows forerunner technology vectored exception handling veh features codice_1 mechanism present standard c++ exceptions present imperative languages introduced later seh set handled separately thread execution microsoft supports seh programming technique compiler level ms visual c++ compiler features three non-standard keywords codice_2 codice_3 codice_4 — purpose exception handling aspects backed number win32 api functions example codice_5 raise seh exceptions manually thread execution windows link undocumented _exception_registration_record list start thread information block codice_2 statement essentially calls compiler-defined codice_7 function function allocates _exception_registration_record stack pointing codice_8 function codice_9 adds record list head end codice_2 block compiler-defined codice_11 function called reverse operation either compiler-defined routines inline programmer-defined codice_3 codice_4 blocks called within codice_8 programmer-defined blocks present _exception_registration_record created codice_7 extended additional fields used codice_8 case exception user mode code operating system parses thread _exception_registration_record list calls exception handler sequence handler signals handled exception return value list exhausted last one list always codice_17 displays general protection fault error message list traversed giving handlers chance clean resources used finally execution returns kernel mode process either resumed terminated vectored exception handling introduced windows xp vectored exception handling made available windows programmers using languages c++ visual basic veh replace structured exception handling seh rather veh seh coexist veh handlers priority seh handlers compared seh veh works like traditional notification callback scheme
[ 1474, 7273, 7274, 6797, 847, 7760, 7983, 8080, 435, 5754, 6078 ]
None
6,752
4
Extrusion_detection:extrusion detection extrusion detection outbound intrusion detection branch intrusion detection aimed developing mechanisms identify successful unsuccessful attempts use resources computer system compromise systems extrusion detection techniques focus primarily analysis system activity outbound traffic order detect malicious users malware network traffic may pose threat security neighboring systems intrusion detection mostly concerned identification incoming attacks intrusion attempts extrusion detection systems try prevent attacks launched first place implement monitoring controls leaf nodes network—rather concentrating choke points e.g. routers—in order distribute inspection workload take advantage visibility system state ultimate goal extrusion detection identify attack attempts launched already compromised system order prevent reaching target hereby containing impact threat
[ 7515 ]
None
6,753
9
Object_language:object language object language language object study various fields including logic linguistics mathematics theoretical computer science language used talk object language called metalanguage object language may formal natural language mathematical logic linguistics make use metalanguages languages describing nature languages mathematical logic object language usually formal language language metalanguage used describe object language called language object discussion using metalanguage instance someone says french say bonjour greet someone uses english metalanguage describe object language french two ways term object language used computing language object formal specification language object goal compiler interpreter computer languages object languages metalanguage specification written computer science referred specification language backus–naur form one earliest used specification languages compilers written using systems like lex yacc rules programmer writes look much like formal specification considered implementation instead many programming language implementations strictly specifications adding features making implementation-dependent design decisions basic level computers act given limited set instructions understood cpus earliest computers meant programmers sometimes composed actual 1 0 program since requires considerable programmer training patience create instructions later computer languages gone great lengths simplify programmer task example high level programming language may allow programmer assign value variable without specifying memory location cpu instruction context high level programming language source language translated compiler object code cpu read directly object code object language varies depending cpu given instructions object language context means something akin object programmer trying achieve source language object languages viewed formal logical languages compiler interpret source target language different computer science use interpreted language meaning one compiled object language context synonymous target language object language translation often machine language kind language assembly language object language compilation usually machine language term object file come mean file containing machine instructions sometimes translated program simply called object object language also confused object-oriented language type computer programming language changes programmer environment convenient objects used something similar drag-and-drop fashion symbol idea abstraction concept tokens may marks configuration marks form particular pattern although term symbol common use refers times idea symbolized times marks piece paper chalkboard used express idea formal languages studied mathematics logic term symbol refers idea marks considered token instance symbol formal languages used mathematical logic computer science well-formed formula simply formula idea abstraction concept expressed using symbols formation rules also called formal grammar particular formal language say string symbols formula_1 well-formed formula respect given formal grammar formula_2 equivalent saying formula_1 belongs language generated formula_2 formal system formal language together deductive system consists set inference rules and/or axioms formal system used derive one expression one expressions previously expressed system expressions called axioms case previously supposed true theorems case derived formal system may formulated studied intrinsic properties may intended description i.e model external phenomena theorem symbol string symbols derived using formal system string symbols logical consequence axioms rules system formal proof derivation finite sequence propositions called well-formed formulas case formal language axiom follows preceding sentences sequence rule inference last sentence sequence theorem formal system concept natural deduction generalization concept proof theory set sentences formal language
[ 477, 1952, 10560, 8037, 8262, 11625, 8554, 1552, 5395, 3386, 5213 ]
Test
6,754
4
Buffer_overflow_protection:buffer overflow protection buffer overflow protection various techniques used software development enhance security executable programs detecting buffer overflows stack-allocated variables preventing causing program misbehavior becoming serious security vulnerabilities stack buffer overflow occurs program writes memory address program call stack outside intended data structure usually fixed-length buffer stack buffer overflow bugs caused program writes data buffer located stack actually allocated buffer almost always results corruption adjacent data stack could lead program crashes incorrect operation security issues typically buffer overflow protection modifies organization stack-allocated data includes canary value destroyed stack buffer overflow shows buffer preceding memory overflowed verifying canary value execution affected program terminated preventing misbehaving allowing attacker take control buffer overflow protection techniques include bounds checking checks accesses allocated block memory go beyond actually allocated space tagging ensures memory allocated storing data contain executable code overfilling buffer allocated stack likely influence program execution overfilling buffer heap stack contains return addresses active function calls however similar implementation-specific protections also exist heap-based overflows several implementations buffer overflow protection including gnu compiler collection llvm microsoft visual studio compilers stack buffer overflow occurs program writes memory address program call stack outside intended data structure usually fixed-length buffer stack buffer overflow bugs caused program writes data buffer located stack actually allocated buffer almost always results corruption adjacent data stack cases overflow triggered mistake often cause program crash operate incorrectly stack buffer overflow type general programming malfunction known buffer overflow buffer overrun overfilling buffer stack likely derail program execution overfilling buffer heap stack contains return addresses active function calls stack buffer overflow caused deliberately part attack known stack smashing affected program running special privileges accepts data untrusted network hosts example public webserver bug potential security vulnerability allows attacker inject executable code running program take control process one oldest reliable methods attackers gain unauthorized access computer typically buffer overflow protection modifies organization data stack frame function call include canary value destroyed shows buffer preceding memory overflowed provides benefit preventing entire class attacks according researchers performance impact techniques negligible stack-smashing protection unable protect certain forms attack example protect buffer overflows heap sane way alter layout data within structure structures expected modules especially shared libraries data structure buffer impossible protect canaries thus programmers must careful organize variables use structures canaries canary words known values placed buffer control data stack monitor buffer overflows buffer overflows first data corrupted usually canary failed verification canary data therefore alert overflow handled example invalidating corrupted data canary value confused sentinel value terminology reference historic practice using canaries coal mines since would affected toxic gases earlier miners thus providing biological warning system canaries alternately known cookies meant evoke image broken cookie value corrupted three types canaries use terminator random random xor current versions stackguard support three propolice supports terminator random canaries terminator canaries use observation buffer overflow attacks based certain string operations end string terminators reaction observation canaries built null terminators cr lf -1 result attacker must write null character writing return address avoid altering canary prevents attacks using codice_1 methods return upon copying null character undesirable result canary known even protection attacker could potentially overwrite canary known value control information mismatched values thus passing canary check code executed soon specific processor return-from-call instruction random canaries randomly generated usually entropy-gathering daemon order prevent attacker knowing value usually logically possible plausible read canary exploiting canary secure value known need know it—the buffer overflow protection code case normally random canary generated program initialization stored global variable variable usually padded unmapped pages attempting read using kinds tricks exploit bugs read ram cause segmentation fault terminating program may still possible read canary attacker knows get program read stack random xor canaries random canaries xor-scrambled using part control data way canary control data clobbered canary value wrong random xor canaries vulnerabilities random canaries except read stack method getting canary bit complicated attacker must get canary algorithm control data order re-generate original canary needed spoof protection addition random xor canaries protect certain type attack involving overflowing buffer structure pointer change pointer point piece control data xor encoding canary wrong control data return value changed pointer control data return value changed without overflowing canary although canaries protect control data altered clobbered pointers protect data pointers function pointers especially problem overflowed execute shellcode called bounds checking compiler-based technique adds run-time bounds information allocated block memory checks pointers run-time c c++ bounds checking performed pointer calculation time dereference time implementations approach use either central repository describes allocated block memory fat pointers contain pointer additional data describing region point tagging compiler-based hardware-based requiring tagged architecture technique tagging type piece data memory used mainly type checking marking certain areas memory non-executable effectively prevents memory allocated store data containing executable code also certain areas memory marked non-allocated preventing buffer overflows historically tagging used implementing high-level programming languages appropriate support operating system tagging also used detect buffer overflows example nx bit hardware feature supported intel amd arm processors stack-smashing protection first implemented stackguard 1997 published 1998 usenix security symposium stackguard introduced set patches intel x86 backend gcc 2.7 stackguard maintained immunix linux distribution 1998 2003 extended implementations terminator random random xor canaries stackguard suggested inclusion gcc 3.x gcc 2003 summit proceedings never achieved 2001 2005 ibm developed gcc patches stack-smashing protection known propolice improved idea stackguard placing buffers local pointers function arguments stack frame helped avoid corruption pointers preventing access arbitrary memory locations redhat engineers identified problems propolice though 2005 re-implemented stack-smashing protection inclusion gcc 4.1 work introduced -fstack-protector flag protects vulnerable functions -fstack-protector-all flag protects functions whether need 2012 google engineers implemented -fstack-protector-strong flag strike better balance security performance flag protects kinds vulnerable functions -fstack-protector every function providing better performance -fstack-protector-all available gcc since version 4.9 fedora packages compiled -fstack-protector since fedora core 5 -fstack-protector-strong since fedora 20 packages ubuntu compiled -fstack-protector since 6.10 every arch linux package compiled -fstack-protector since 2011 arch linux packages built since use -fstack-protector-strong stack protection used packages debian freebsd base system since 8.0 stack protection standard certain operating systems including openbsd hardened gentoo dragonfly bsd stackguard propolice protect overflows automatically allocated structures overflow function pointers propolice least rearrange allocation order get structures allocated function pointers separate mechanism pointer protection proposed pointguard available microsoft windows compiler suite microsoft implements buffer overflow protection since version 2003 command-line switch enabled default since version 2005 using disables protection stack-smashing protection turned compiler flag codice_2 clang supports three buffer overflow detectors namely addresssanitizer -fsanitize=address -fsanitize=bounds safecode systems different tradeoffs terms performance penalty memory overhead classes detected bugs stack protection standard certain operating systems including openbsd intel c c++ compiler supports stack-smashing protection options similar provided gcc microsoft visual studio fail-safe c open-source memory-safe ansi c compiler performs bounds checking based fat pointers object-oriented memory access invented mike frantzen stackghost simple tweak register window spill/fill routines makes buffer overflows much difficult exploit uses unique hardware feature sun microsystems sparc architecture deferred on-stack in-frame register window spill/fill detect modifications return pointers common way exploit hijack execution paths transparently automatically protecting applications without requiring binary source modifications performance impact negligible less one percent resulting gdb issues resolved mark kettenis two years later allowing enabling feature following event stackghost code integrated optimized openbsd/sparc normal buffer allocation x86 architectures similar architectures shown buffer overflow entry show modified process pertains stackguard function called stack frame created stack frame built end memory beginning stack frame placed top stack closest beginning memory thus running end piece data stack frame alters data previously entered stack frame running end stack frame places data previous stack frame typical stack frame may look return address reta placed first followed control information ctli c function may contain many different per-call data structures piece data created call placed stack frame order thus ordered end beginning memory hypothetical function stack frame hypothetical situation ten bytes written array 13 character array excess overflow integer pointer integer control information finally return address overwriting pointer made reference position memory causing read arbitrary address overwriting reta function made execute code attempts return either existing functions ret2libc code written stack overflow nutshell poor handling unbounded strcpy calls may allow attacker control program influencing values assigned directly goal buffer overflow protection detect issue least intrusive way possible done removing harms way placing sort tripwire canary buffer buffer overflow protection implemented change compiler possible protection alter structure data stack frame exactly case systems propolice function automatic variables rearranged safely arrays allocated first stack frame places integer integer pointer memory stack frame becomes impossible move ctli reta without breaking produced code another tactic employed extra piece information called canary cnry placed buffers stack frame buffers overflow canary value changed thus effectively attack program attacker must leave definite indication attack stack frame end every function instruction continues execution memory address indicated reta instruction executed check cnry ensures altered value cnry fails test program execution ended immediately essence deliberate attacks inadvertent programming bugs result program abort canary technique adds instructions overhead every function call automatic array immediately dynamic buffer allocation dynamic buffer deallocation overhead generated technique significant work though unless canary remains unchanged attacker knows determine value canary may simply copy usually difficult arrange intentionally highly improbable unintentional situations position canary implementation specific always buffers protected data varied positions lengths varied benefits
[ 8066, 3473, 1820, 5501, 9244, 5279, 7717, 3624, 9854, 814, 7983, 5040, 5176, 9665, 1474, 1094, 4562, 6868, 4956, 8671, 9317, 4582, 4071, 9964, 499, 1399, 3323, 3708, 2045, 2558 ]
Test
6,755
4
Agnes_Meyer_Driscoll:agnes meyer driscoll agnes meyer driscoll july 24 1889 – september 16 1971 known miss aggie madame x american cryptanalyst world war world war ii born geneseo illinois 1889 driscoll moved family westerville ohio 1895 father gustav meyer taken job teaching music otterbein college 1909 donated family home anti-saloon league recently moved headquarters westerville home later donated westerville public library home anti-saloon league museum westerville local history center driscoll attended otterbein college 1907 1909 1911 received bachelor arts degree ohio state university majored mathematics physics studied foreign languages statistics music fluent english french german latin japanese earliest days college student pursued technical scientific studies graduation moved amarillo texas lived 1911 1918 worked director music military academy later chair mathematics department local high school june 22 1918 one year america entered world war driscoll enlisted united states navy – america started allowing women enlist recruited highest possible rank chief yeoman stint postal cable censorship office assigned code signal section director naval communications war ended made use option continue working post civilian except two-year hiatus worked private firm would remain leading cryptanalyst u.s. navy 1949 1920 continuing work navy driscoll studied riverbank laboratories geneva illinois fellow code breakers including william f. friedman elizebeth smith friedman worked known also worked american black chamber run herbert yardley first u.s. peacetime code-breaking agency set break codes used diplomatic correspondence efforts limited manual systems involved also emerging machine technology time applied making breaking ciphers first days code signal section co-developed one u.s. navy cipher machines cm cipher machine would become standard enciphering device navy 1920s recognition work united states congress awarded driscoll 15,000 split widow machine coinventor william greshem 1923 inventor edward hebern creator fledgling hebern electric code company attempting create secure rotor-driven cipher machine driscoll left navy test machine failed deliver secure encryption system agnes returned navy spring 1924 august 1924 married michael driscoll washington d.c. lawyer driscoll alongside lieutenant joseph rochefort broke japanese navy manual code red book code 1926 three years work helped broke blue book code 1930 early 1935 agnes driscoll led attack japanese m-1 cipher machine also known u.s. orange machine used encrypt messages japanese naval attaches around world 1939 made important inroads jn-25 japanese fleet operational code used important messages successfully solved cipher component 5-num system used number groups substitutes words numbers encrypted digital cipher navy could read standard format messages weather reports bulk messages remained discovered work later developed exploited attack pearl harbor rest pacific war provided advance warning japanese attack midway atoll would unable take part work october 1940 transferred team working break german naval enigma cipher period driscoll mentored following naval cryptographers getting work jn-25 started driscoll transferred new group attacked german enigma ciphers using catalog approach similar rainbow tables almost two years work new assignment driscoll team unable make progress solving german device partly due unwillingness use machine support mathematical approach also refused help british code breakers bletchley park traveled united states advise besides u.s. u.k. communicate effectively approach fruitless tried british determined unlikely work ultimately work superseded us-uk cryptologic exchanges 1942–43 1943 worked team break japanese cipher coral broken two months later although driscoll said little influence project 1945 appears worked attacking russian ciphers driscoll part navy contingent joined new national cryptologic agencies firstly armed forces security agency 1949 national security agency 1952 armed forces security agency may contributed attacking cipher called venona 1946 retirement national security agency filled number positions advanced ranks senior leadership retired armed forces security agency 1959 died 1971 buried arlington national cemetery 2000 inducted national security agency hall honor 2017 ohio historical marker placed front meyer home westerville honoring agnes meyer driscoll achievements
[ 4007, 7887, 10832, 6164, 2580, 1941 ]
Test
6,756
1
PhpLDAPadmin:phpldapadmin phpldapadmin web app administering lightweight directory access protocol ldap servers written php programming language licensed gnu general public license application available 14 languages supports utf-8 encoded directory strings project began fall 2002 dave smith student brigham young university byu lead developer needed robust web application manage ldap servers originally phpldapadmin called davedap august 2003 name changed phpldapadmin since time software downloaded approximately 150 times per day commonly used throughout world two developers contributed code base xavier renard uwe ebel xavier focused ldif imports/exports samba software integration uwe focused internationalizing application spring 2005 deon george took maintenance phpldapadmin due long period starting 2016 new pull requests merged master project releases made several forks exist implement new compatibilities functionality since spring 2019 new development going many pull requests merged project restoring compatibility recent php releases following linux distributions include phpldapadmin official software repositories available extra packages enterprise linux epel repository allowing managed installation distributions red hat enterprise linux fedora centos scientific linux included m23 software distribution system manages distributes software debian ubuntu kubuntu xubuntu linux mint fedora centos opensuse distributions also available repositories freebsd openbsd solaris
[ 6651, 8644, 7277, 119 ]
Test
6,757
4
Open_Relay_Behavior-modification_System:open relay behavior-modification system open relay behavior-modification system orbs created run alan brown new zealand one first dns-based blackhole lists dnsbl means internet domain may publish list ip addresses database easily queried automatically computer programs internet orbs list used blacklist ip addresses open mail relays third-party mail servers spammers relay messages thus attempt obfuscate source spam orbs list controversial number reasons many people felt methods orbs employed scan internet open mail servers could abusive orbs used probes test open relays without permission sometimes claimed testing networks continued even asked orbs stop others claimed relayed spam n't stop either cases tests interfered mail servers causing delays especially servers assigned hundreds ip addresses related testing regime excessive eyes number email administrators brown policy adding servers unable test list whether actually open relays also matter dispute another complaint open relays never sent spam listed without notice false listings orbs also alleged particularly brown engaged legal dispute listed party website created 2001 brad baker called stoporbs.org offer assistance mail administrators listed orbs blacklist reasons open relays many administrators felt listing servers reasons advertised open relays list reliable supposed purpose orbs created run alan brown new zealand shut 2001 due brown health money issues two lawsuits brought companies listed orbs xtra actrix refused remove companies listed orbs blocked probes kept relaying spam brown forced sell internet service provider manawatu internet services cover expenses state companies listed inappropriately brown also defamation lawsuit brought o'brien v brown court ruled brown made defamatory comments patrick o'brien ceo domainz .nz domain registrar comments made domainz discussion group brown offered chance apologize made additional defamatory comments following o'brien victory awarding 42,000 brown claimed net worth 500 said lawyer several groups cached lists retested open relays replaced orbs running open relay became even bigger problem dnsbls listing open relays got effective spammers shifted insecure proxy servers internet society new zealand council seats subsequently domainz board filled rebel members elections july 2000 o'brien departed run singapore internet registry
[ 6757, 8224, 4725, 5407 ]
None
6,758
2
Fedora_Unity:fedora unity fedora unity community project build comprehensive concise websites content provide fedora users contributors quality information submissions project covered open publication license options unless otherwise noted order allow submission fedora documentation project fedora unity project produces iso images i386 x86_64 architectures available jigdo downloads containing slipstreamed installation media last release fedora 12 re-spins-20100303 released march 19 2010 re-spin isos based officially released fedora 12 installation media include updates released march 3 2010
[ 823, 119 ]
None
6,759
6
Filzip:filzip filzip freeware file archiver program microsoft windows platform written philipp engel free author request donations help cost development reward work march 2019 new version released since version 3.0.6 filzip presumed unmaintained software development program localized twenty languages filzip supports seven different archive formats allowing user add extract files archives include zip bh cab jar lha lzh tar gzip handful formats supported extraction including ace arc arj rar zoo files within formats viewed without explicitly unpacking removed renamed within archive zip files may spanned written number files fixed maximum size placed removable media program integration create self-extracting executable archives redistribution without licensing fees cnet rated 4/5 stars wrote easy program operation sets freeware file compression tool apart crowded genre
[ 5380, 6022, 10121, 1420, 6797, 1940, 3222, 9880, 3114, 10027, 7983, 950, 6713, 2755, 11076, 1352, 4296, 10317, 10575, 4561, 722, 11614, 1631, 3296, 9953, 5858, 7529, 4459, 237, 1646, 7667, 6389, 4089, 894, 10623 ]
Test
6,760
2
SOX_(operating_system):sox operating system sox name unix clone developed scratch brazil late 1980s computadores e sistemas brasileiros s/a cobra tecnologia leadership ivan da costa marques certified unix-compatible x/open unisoft early 1989 sox one first re-implementation unix fully independent passed x/open verification tests one ever completed 100 outside united states sox designed run cobra minicomputers part brazilian informatics policy aimed achieve technological independence united states despite technical success sox came late cobra largely lost support sox development stopped soon certified government decided instead allow import unix system v release 4.0
[ 8207, 6675, 7187, 10776, 25, 4637, 9762, 5158, 7217, 9784, 10809, 576, 10333, 97, 8298, 7285, 9335, 2168, 633, 1147, 3197, 1150, 2179, 6787, 10883, 6797, 9366, 6296, 7325, 9887, 3241, 3248, 6837, 8388, 10436, 9932, 5840, 7382, 8410, 6369,...
Validation
6,761
5
WebFinger:webfinger webfinger protocol specified internet engineering task force ietf allows discovery information people things identified uri information person might discovered via acct uri example uri looks like email address webfinger specified discovery protocol openid connect protocol allows one easily log various sites internet webfinger protocol used federated social networks gnu social statusnet diaspora discover users federated nodes pods well remotestorage protocol historical note name webfinger derived old arpanet finger protocol different protocol designed http protocol payload represented json
[ 9313, 10727, 7368, 6761, 10154, 574 ]
None
6,762
4
Anti-spam_techniques:anti-spam techniques various anti-spam techniques used prevent email spam unsolicited bulk email technique complete solution spam problem trade-offs incorrectly rejecting legitimate email false positives opposed rejecting spam false negatives – associated costs time effort cost wrongfully obstructing good mail anti-spam techniques broken four broad categories require actions individuals automated email administrators automated email senders employed researchers law enforcement officials number techniques individuals use restrict availability email addresses goal reducing chance receiving spam sharing email address among limited group correspondents one way limit chance address harvested targeted spam similarly forwarding messages number recipients n't know one another recipient addresses put bcc field recipient get list recipients email addresses email addresses posted webpages usenet chat rooms vulnerable e-mail address harvesting address munging practice disguising e-mail address prevent automatically collected way still allow human reader reconstruct original email address nowiki no-one example.com /nowiki might written no-one example dot com instance related technique display part email address image jumbled text order characters restored using css common piece advice reply spam messages spammers may simply regard responses confirmation email address valid similarly many spam messages contain web links addresses user directed follow removed spammer mailing list – treated dangerous case sender addresses often forged spam messages responding spam may result failed deliveries – may reach completely innocent third parties businesses individuals sometimes avoid publicising email address asking contact come via contact form webpage – typically forwards information via email forms however sometimes inconvenient users able use preferred email client risk entering faulty reply address typically notified delivery problems contact forms drawback require website appropriate technology many modern mail programs incorporate web browser functionality display html urls images avoiding disabling feature help avoid spam may however useful avoid problems user opens spam message offensive images tracked web bugs targeted javascript attacks upon security vulnerabilities html renderer mail clients automatically download display html images attachments fewer risks clients configured display default email user may sometimes need give address site without complete assurance site owner use sending spam one way mitigate risk provide disposable email address — address user disable abandon forwards email real account number services provide disposable address forwarding addresses manually disabled expire given time interval expire certain number messages forwarded disposable email addresses used users track whether site owner disclosed address security breach systems use ham passwords ask unrecognised senders include email password demonstrates email message ham spam message typically email address ham password would described web page ham password would included subject line email message appended username part email address using plus addressing technique ham passwords often combined filtering systems let messages identified ham tracking spammer isp reporting offense lead spammer service terminated criminal prosecution unfortunately difficult track spammer online tools spamcop network abuse clearinghouse assist always accurate historically reporting spam way played large part abating spam since spammers simply move operation another url isp network ip addresses many countries consumers may also forward unwanted deceptive commercial email authorities e.g us email address spam uce.gov maintained us federal trade commission ftc similar agencies countries large number applications appliances services software systems email administrators use reduce load spam systems mailboxes general attempt reject block majority spam email outright smtp connection stage accept message typically analyze content – may decide quarantine categorised spam number systems developed allow domain name owners identify email authorized many systems use dns list sites authorized send email behalf many proposals spf dkim dmarc widely supported growing adoption directly attacking spam systems make much harder spoof addresses common technique spammers also used phishing types fraud via email method may used internet service providers specialized services enterprises combat spam require unknown senders pass various tests messages delivered strategies termed challenge/response systems checksum-based filter exploits fact messages sent bulk identical small variations checksum-based filters strip everything might vary messages reduce remains checksum look checksum database distributed checksum clearinghouse collects checksums messages email recipients consider spam people button email client click nominate message spam checksum database message likely spam avoid detected way spammers sometimes insert unique invisible gibberish known hashbusters middle messages make message unique checksum email servers expect never communicate particular countries receive great deal spam therefore use country-based filtering – technique blocks email certain countries technique based country origin determined sender ip address rather trait sender large number free commercial dns-based blacklists dnsbls allow mail server quickly look ip incoming mail connection reject listed administrators choose scores dnsbls reflects different policies list sites known emit spam others list open mail relays proxies others list isps known support spam spam/phishing messages contain url entice victims clicking thus popular technique since early 2000s consists extracting urls messages looking databases spamhaus domain block list dbl surbl uribl many spammers use poorly written software unable comply standards legitimate control computer using send spam zombie computer setting tighter limits deviation rfc standards mta accept mail administrator reduce spam significantly also runs risk rejecting mail older poorly written configured servers greeting delay – sending server required wait received smtp greeting banner sends data deliberate pause introduced receiving servers allow detect deny spam-sending applications wait receive banner temporary rejection – greylisting technique built fact smtp protocol allows temporary rejection incoming messages greylisting temporarily rejects messages unknown senders mail servers – using standard 4xx error codes compliant mtas proceed retry delivery later many spammers spambots downside legitimate messages first-time senders experience delay delivery helo/ehlo checking – says smtp server may verify domain name argument ehlo command actually corresponds ip address client however verification fails server must refuse accept message basis systems however configured invalid pipelining – several smtp commands allowed placed one network packet pipelined example email sent cc header several smtp rcpt commands might placed single packet instead one packet per rcpt command smtp protocol however requires errors checked everything synchronized certain points many spammers send everything single packet since care errors efficient mtas detect invalid pipelining reject email sent way nolisting – email servers given domain specified prioritized list via mx records nolisting technique simply adding mx record pointing non-existent server primary i.e lowest preference value – means initial mail contact always fail many spam sources retry failure spammer move next victim legitimate email servers retry next higher numbered mx normal email delivered brief delay quit detection – smtp connection always closed quit command many spammers skip step spam already sent taking time properly close connection takes time bandwidth mtas capable detecting whether connection closed correctly use measure trustworthy system another approach simply imitation mta gives appearance open mail relay imitation tcp/ip proxy server gives appearance open proxy spammers probe systems open relays/proxies find host attempt send mail wasting time resources potentially revealing information origin spam sending entity operates honeypot system may simply discard spam attempts submit dnsbls store analysis spamassassin policyd-weight others use various tests spam assigns numerical score test message scanned patterns applicable scores tallied total fixed value message rejected flagged spam ensuring single spam test flag message spam false positive rate greatly reduced outbound spam protection involves scanning email traffic exits network identifying spam messages taking action blocking message shutting source traffic primary impact spam spam recipients sending networks also experience financial costs wasted bandwidth risk ip addresses blocked receiving networks outbound spam protection stops spam also lets system administrators track spam sources network remediate – example clearing malware machines become infected virus participating botnet ptr dns records reverse dns used number things including content filtering techniques rely specification lists words regular expressions disallowed mail messages thus site receives spam advertising herbal viagra administrator might place phrase filter configuration mail server would reject message containing phrase header filtering looks header email contains information origin destination content message although spammers often spoof fields header order hide identity try make email look legitimate many spoofing methods detected violation rfc 5322 standard header formed also serve basis rejecting message since large percentage spam forged invalid sender addresses spam detected checking address valid mail server try verify sender address making smtp connection back mail exchanger address creating bounce stopping email sent callback verification various drawbacks 1 since nearly spam forged return addresses nearly callbacks innocent third party mail servers unrelated spam 2 spammer uses trap address sender address receiving mta tries make callback using trap address mail command receiving mta ip address blacklisted 3 finally standard vrfy expn commands used verify address exploited spammers mail administrators enable leaving receiving smtp server effective way validate sender email address smtp proxies allow combating spam real time combining sender behavior controls providing legitimate users immediate feedback eliminating need quarantine spamtrapping seeding email address spammers find normal users email address used sender must spammer black listed example email address spamtrap example.org placed source html web site way n't displayed web page human visitors website would see spammers hand use web page scrapers bots harvest email addresses html source code would find address spammer later sends address spamtrap knows highly likely spammer take appropriate action statistical bayesian filtering set requires administrative maintenance per se instead users mark messages spam nonspam filtering software learns judgements thus matched end user needs long users consistently mark/tag emails respond quickly changes spam content statistical filters typically also look message headers considering content also peculiarities transport mechanism email software programs implement statistical filtering include bogofilter dspam spambayes assp crm114 email programs mozilla mozilla thunderbird mailwasher later revisions spamassassin tarpit server software intentionally responds extremely slowly client commands running tarpit treats acceptable mail normally known spam slowly appears open mail relay site slow rate spammers inject messages mail facility depending server internet speed tarpit slow attack factor around 500 many systems simply disconnect server n't respond quickly eliminate spam however legitimate email systems also deal correctly delays fundamental idea slow attack perpetrator waste time without significant success organization successfully deploy tarpit able define range addresses protocols ports deception process involves router passing supported traffic appropriate server sent contacts sent tarpit examples tarpits include labrea tarpit honeyd smtp tarpits ip-level tarpits variety techniques email senders use try make sure send spam failure control amount spam sent judged email receivers often cause even legitimate email blocked sender put dnsbls since spammer accounts frequently disabled due violations abuse policies constantly trying create new accounts due damage done isp reputation source spam many isps web email providers use captchas new accounts verify real human registering account automated spamming system also verify credit cards stolen accepting new customers check spamhaus project rokso list background checks malicious person easily attempt subscribe another user mailing list — harass make company organisation appear spamming prevent modern mailing list management programs gnu mailman listserv majordomo qmail ezmlm support confirmed opt-in default whenever email address presented subscription list software send confirmation message address confirmation message contains advertising content construed spam address added live mail list unless recipient responds confirmation message email senders typically type anti-spam checks email coming users customers inward email coming rest internet protects reputation could otherwise harmed case infection spam-sending malware receiving server initially fully accepts email later determines message spam non-existent recipient generate bounce message back supposed sender however often case spam sender information incoming email forged unrelated third party bounce message backscatter spam reason generally preferable rejection incoming email happen smtp connection stage 5xx error code sending server still connected case sending server report problem real sender cleanly firewalls routers programmed allow smtp traffic tcp port 25 machines network supposed run mail transfer agents send email practice somewhat controversial isps block home users especially isps allow blocking turned upon request email still sent computers designated smart hosts via port 25 smart hosts via email submission port 587 network address translation used intercept port 25 smtp traffic direct mail server enforces rate limiting egress spam filtering commonly done hotels cause email privacy problems well making impossible use starttls smtp-auth port 587 submission port n't used machines suddenly start sending lots email may well become zombie computers limiting rate email sent around typical computer question legitimate email still sent large spam runs slowed manual investigation done monitoring spam reports places spamcop aol feedback loop network abuse clearinghouse domain abuse mailbox etc. isps often learn problems seriously damage isp reputation mail servers blacklisted malicious software human spam senders often use forged addresses sending spam messages control may enforced smtp servers ensure senders use correct email address field outgoing messages email users database user record email address smtp server must check email address field outgoing message address belongs user credentials supplied smtp authentication field forged smtp error returned email client e.g email address trying send isps webmail providers either acceptable use policy aup terms service tos agreement discourages spammers using system allows spammer terminated quickly violations 2000 onwards many countries enacted specific legislation criminalize spamming appropriate legislation enforcement significant impact spamming activity legislation provides specific text bulk emailers must include also makes legitimate bulk email easier identify increasingly anti-spam efforts led co-ordination law enforcement researchers major consumer financial service companies internet service providers monitoring tracking email spam identity theft phishing activities gathering evidence criminal cases analysis sites spamvertised given piece spam often followed domain registrars good results several approaches proposed improve email system since spamming facilitated fact large volumes email inexpensive send one proposed set solutions would require senders pay cost order send email making prohibitively expensive spammers anti-spam activist daniel balsam attempts make spamming less profitable bringing lawsuits spammers artificial intelligence techniques deployed filtering spam emails artificial neural networks algorithms bayesian filters methods use probabilistic methods train networks examination concentration frequency words seen spam versus legitimate email contents channel email new proposal sending email attempts distribute anti-spam activities forcing verification probably using bounce messages back-scatter occur first email sent new contacts spam subject several research conferences including
[ 1667, 3462, 519, 9222, 8202, 7949, 8334, 8337, 914, 4883, 5012, 8341, 3350, 3991, 9106, 1305, 10263, 10904, 1436, 8093, 10906, 11418, 8224, 10275, 10531, 9256, 2601, 6699, 8747, 10541, 3246, 4272, 9909, 2358, 9145, 7739, 3645, 4414, 1472, ...
Validation
6,763
2
Openmoko_Linux:openmoko linux openmoko linux operating system smartphones developed openmoko project based ångström distribution comprising various pieces free software main targets openmoko linux openmoko neo 1973 neo freerunner furthermore efforts port system mobile phones openmoko linux developed 2007 2009 openmoko inc development discontinued financial problems afterwards development software openmoko phones taken community continued various projects including shr qtmoko hackable1 openmoko linux uses linux kernel gnu libc x.org server plus graphical user environment built using efl toolkit gtk+ toolkit qt toolkit illume window manager previously matchbox window manager openembedded build framework opkg package management system used create maintain software packages different approach android everything except linux webkit java language inside android seems non-standard applications targeted android must substantially rewritten largely portable many existing gnu/linux desktop apps easily ported openmoko however limited computational power screen resolution require substantial reworking existing applications order render usable finger-oriented small-screen environment
[ 9732, 5637, 6, 11271, 3089, 10780, 3618, 3626, 5677, 7727, 9784, 1083, 10817, 1602, 7246, 7253, 3162, 607, 2658, 1138, 8315, 8316, 8829, 11391, 4225, 2179, 6276, 7812, 8326, 9356, 2195, 10393, 6301, 1694, 673, 3248, 7857, 5824, 4305, 2259...
None
6,764
5
EIA-530:eia-530 currently known tia-530-a often called eia-530 rs-530 balanced serial interface standard generally uses 25-pin connector originally created telecommunications industry association finalized 1987 revision finalized 1992 specification defines cable dte dce devices used conjunction eia-422 eia-423 define electrical signaling characteristics tia-530 calls common 25 pin connector displaced similar eia-449 also uses eia-422/423 larger 37-pin connector two types interchange circuits signals leads dce dte defined tia-530 category uses balanced characteristics eia-422 category ii unbalanced eia-423 interchange circuits category exception local loopback pin 18 remote loopback pin 21 test mode pin 25 category ii tia-530 originally used category circuits commonly called data set ready dce ready pins 6 22 data terminal ready dte ready pins 20 23 revision changed interchange circuits category ii para 4.3.6 4.3.7 standard added ring indicator pin 22 pin 23 grounded tia-530-a confusion revisions led many incorrect wiring diagrams interface manufacturers still adhere original tia-530 standard care taken ensure devices standard connecting avoid complications
[ 6681 ]
Test
6,765
3
Compaq_Presario:compaq presario presario series desktop computers notebooks compaq presario family computers launched consumer marketplace september 1993 mid-1990s compaq began manufacturing pc monitors part presario brand series all-in one units containing pc monitor case also released although hp acquired compaq 2002 presario name used compaq brand discontinued 2013 hp due marketability issues all-in-one computers containing pc monitor unit mvx00 fpx00 monitors designed sold series 3 designed compaq towers retained original spaceship shape second generation compaq presario towers except smoked-black plastic flip-up doors slightly squatter design rounded generation 2 presario towers lacked smoked plastic easy access door usb audio ports behind black smoked cd bezel covers fp meant flat panel display one first offered home pc 1x25 monitors paired presario 4500 4600 4800 series 2 designed compaq presarios originators rocket ship shape tower faceplate monitors shared design cues split lower bezel ran middle like towers meant match rare set monitors fx series built-in speakers subwoofer three extra usb ports designed go 4800 series presario multimedia towers—specifically 4830 4882 black like fx monitor monitors came jbl pro speakers could mount side monitor fx exception built-in jbl pro powered speakers subwoofer rear casing
[ 5384, 3214, 8212, 9239, 1304, 3357, 8229, 7213, 6447, 5821, 1981, 5571, 7243, 1357, 4175, 3281, 1874, 2258, 11100, 1638, 5736, 11505, 2037, 5756, 2943 ]
Test
6,766
4
Gigamon:gigamon gigamon privately held network visibility traffic monitoring technology vendor formerly traded publicly owned elliott management headquartered santa clara california gigamon 371 employees december 27 2014 743 employees april 2017 company proprietary products manipulate route traffic various application performance network management analysis compliance security tools gigamon founded 2004 gigamon systems llc company went public new york stock exchange june 11 2013 initial public offering june 12 2013 investors bought 6.75 million shares priced 19 generating 128 million sales gigamon officials rang closing bell new york stock exchange february 24 2016 january 2018 company acquired elliott management corporation qatar investment authority qia 1,6 billion us gigamon develops physical virtual network visibility technologies including network tap aggregation products traffic manipulation applications visibility fabric nodes
[ 2558 ]
None
6,767
9
Daniel_P._Friedman:daniel p. friedman daniel paul friedman born 1944 professor computer science indiana university bloomington indiana research focuses programming languages prominent author field david wise friedman wrote highly influential paper lazy programming specifically lazy streams icalp 1976 paper entitled cons evaluate arguments one first publications pushing exploration programming style potentially infinite data structures form programming employs computational effects though programs may diverge 1970s friedman wise explored topic depth also considered extensions world parallel computing 1980s friedman turned study scheme programming language explored use macros defining programming languages eugene kohlbecker matthias felleisen bruce duba co-introduced notion hygienic macros 1986 lfp paper still widely cited today christopher t. haynes mitchell wand simultaneously studied nature continuation objects uses possibilities constraining following friedman felleisen introduced lambda calculus continuations control operators work spawned work semantics connections classical logic computation practical extensions continuations friedman also prolific textbook author first textbook little lisper dates back 1974 still print fourth edition called little schemer felleisen friedman felleisen wrote three little books 1990s little mler seasoned schemer little java patterns friedman also lead author essentials programming languages textbook programming languages changed landscape language textbooks 1980s shifting focus surveys languages study principles via series interpreters today textbooks topic tend follow organization employing operational semantics type theory instead interpreters like little lisper essentials programming languages long-living book third edition recently friedman resumed work little series reasoned schemer william e. byrd oleg kiselyov explaining logic programming via extension scheme little prover carl eastlund introducing inductive proofs way determine facts computer programs daniel p. friedman author co-author following books
[ 10083, 6502, 4839, 6536, 8262, 5837, 5677, 1613, 6767, 6673, 10324, 9749, 10584, 7386 ]
Test
6,768
4
HDClone:hdclone hdclone disk cloning backup application miray software supports copying storage devices sector-by-sector well file-by-file allows create physical logical identical copy supported x86 x64 computer architectures windows desktop versions xp 10 windows server versions 2003 2016 hdclone offered free download pay version may also purchased data cd license model freemium price policy hdclone home users professional users hdclone offered seven languages website focuses german english several hundred thousand users worldwide sold 140 countries primary aim hdclone cloning storage devices creating restoring storage device images generally possible start hdclone directly windows stand-alone boot media boot media possible implement bare-metal restore windows hdclone offers command-line interface allows automatic control e.g combination windows task scheduler enterprise edition possible write 16 storage devices separate tool miray virtual disk possible mount images windows virtual drives order access content hdclone offered several editions free edition free charge offers basic functionality cloning creating respectively restoring images additional functionalities higher editions must purchased additional functions include others depending edition hdclone following additional software modules hdclone supports edition-dependent following functionalities listed file systems possible make usb drive optical medium bootable order start hdclone independently windows also allows copy operating systems hdclone executable file ca n't started uses either miray symobi linux host operating system symobi proprietary real-time operating system miray software sole base starting hdclone via boot media first 5 years hdclone 3.5 symobi based message-oriented operating system µnos based real-time kernel sphere µnos version 0.92 officially presented 1 august 2001 intermediately sphere sp 2.0 released 14 may 2002 symobi presented first time version 1.2 systems fair munich year 2006 following year version 1.4 multi-core support 32 processor cores separate tool miray virtual disk possible mount hdclone created images windows virtual drives allows access contained data via windows explorer depending edition possible mount 1 7 images time optionally permanently writeable content mounted image changed changes stored overlay functions differential image may also included restoring respective image 31 march 2003 hdclone version 1.0 announced 25 april 2003 hdclone officially presented hdclone started stand-alone product required boot media start five years version 3.6 also possible start hdclone directly windows however parallel writing multiple storage devices already realised enterprise edition one year 2010 came version 3.9 command-line interface automatic control year miray virtual disk added separate tool version 4.0 allowed open hdclone images virtual storage devices first time four years version 5.0 equipped support sata hot plugging since 2017 possible use linux additional host operating system stand-alone boot media hdclone 7 various german computer magazines like pc magazin computerbild com computerwoche chip published tips use hdclone duplicating hard disk drive content internationally hdclone mainly described via digital journalism free edition praised german computer magazines clear simple user interface recommended copying small hard disk drives criticized limited left functionalities available paid versions reduced data transfer rate mentioned regard time time reports highlight practice boot media allows using hdclone independently installed operating system hdclone mentioned example disk cloning software international books international books use hdclone also case example disk cloning software detailed description
[ 1280, 2193, 2197, 9366, 2199, 4505, 9762, 7983, 11568, 10675, 823, 9025, 9420, 9932, 1358, 7905, 4074, 5356, 3314, 499, 5363, 246, 3834 ]
None
6,769
7
Master/slave_(technology):master/slave technology master/slave model communication one device process unidirectional control one devices systems master selected group eligible devices devices acting role slaves context motor control master/slave configuration used load sharing purposes two identical motors connected two different drives coupled common load one drive defined master configured running speed-control mode whereas defined slave configured running torque-control mode terminology often replaced something different terms master slave allude practice slavery one alternative databases primary replica used documentation ibm microsoft engine yard amazon web services/amazon relational database service acm well python django drupal couchdb redis mediawiki still uses master configuration management tool salt uses terms master minion december 2017 internet systems consortium decided allow words primary secondary substitute master/slave terminology dns server software bind 2003 county los angeles california asked manufacturers suppliers contractors stop using master slave terminology products county made request based cultural diversity sensitivity los angeles county following outcries request county los angeles issued statement saying decision nothing request following controversy global language monitor found term master/slave egregious example political correctness 2004 named politically incorrect term year
[ 7681, 4423, 3784, 5833, 7497, 8554, 4396, 10681, 2222, 7022, 1136, 7248, 7347, 6037, 1049, 3323 ]
Train
6,770
1
Binary_large_object:binary large object binary large object blob collection binary data stored single entity database management system blobs typically images audio multimedia objects though sometimes binary executable code stored blob database support blobs universal blobs originally big amorphous chunks data invented jim starkey dec describes thing ate cincinnati cleveland whatever 1958 steve mcqueen movie referring blob later terry mckiever marketing person apollo felt needed acronym invented backronym basic large object informix invented alternative backronym binary large object data type definition introduced describe data originally defined traditional computer database systems particularly large store practically time field database systems first defined 1970s 1980s data type became practical disk space became cheap definition gained popularity ibm db2 term used nosql databases especially key-value store databases redis name blob borrowed deep learning software caffe represent multi-dimensional arrays world free open-source software term also borrowed refer proprietary device drivers distributed without source code exclusively binary code use term binary blob common even though first letter blob abbreviation already stands binary depending implementation culture around usage concept might alternately referred basic large object binary data type
[ 2432, 6850, 7868, 8291, 10693, 8295, 1449, 1964, 653, 10389, 11030, 3323, 1276 ]
Test
6,771
2
BootX_(Apple):bootx apple bootx software-based bootloader designed developed apple inc. use company macintosh computer range bootx used prepare computer use loading required device drivers starting-up mac os x booting kernel powerpc macintoshes running mac os x 10.2 operating system later versions using bootrom read-only memory rom computer chip containing openfirmware graphical bootsplash shown briefly compatible macintosh computers grey apple logo spinning cursor appears startup sequence program freely available part darwin operating system open-source apple public source license bootx superseded another nearly identical bootloader named codice_1 extensible firmware interface rom release intel-based mac older macintoshes dating 1983 1998 utilized basic bootloader bootloader solely rom chip varying sizes 4 megabytes mb contained computer code boot computer run mac os operating system known macintosh toolbox old world rom differs greatly design modern macintosh generally use hard drive large capacity store operating system bootloader used macintosh computers mid-1998 advent imac series macintoshes firmware updated rom reduced size 1 mb called bootrom remainder rom moved file codice_2 mac os system folder stored hard drive rom used full implementation openfirmware standard contained bootrom named new world rom 2001 release mac os x 10.0 codice_2 file replaced codice_4 bootloader file 2002 release mac os x 10.2 historical happy mac start-up picture replaced grey apple logo introducing intel mac 2006 bootrom replaced near identical extensible firmware interface rom although apple still calls bootrom codice_1 file make boot loader appealing operating system developers apple added features allow flexibility booting process network boot using tftp load mach-o elf formatted kernels bootx also boot hfs hfs+ ufs ext2 formatted volumes boot loader manipulated startup holding various key combinations alter booting process functions include verbose mode achieved holding command v key startup replaces default apple logo text-based information boot process single user mode achieved holding command depending operating system may boot basic command-line text-based version operating system facilitate maintenance recovery action rom also set require password access technical functions using openfirmware interface powerpc-based macintoshes boot process starts activation bootrom basic macintosh rom performs power self test test hardware essential startup passing test startup chime played control computer passed openfirmware openfirmware initializes random access memory memory management unit hardware necessary rom operation openfirmware checks settings stored nvram builds list devices device tree gathering stored fcode information completion task bootx takes startup process configuring keyboard display claiming reserving memory various purposes checking see various key combinations pressed process completed bootx displays grey apple logo spins spinning wait cursor proceeds load kernel kernel extensions start kernel
[ 4615, 5647, 1042, 6700, 4657, 1074, 9802, 5713, 3670, 4184, 2141, 4702, 2149, 8303, 2676, 9343, 3719, 10888, 11402, 8852, 2197, 1686, 7318, 3228, 2207, 1699, 5292, 8877, 1710, 3766, 2232, 9912, 9406, 1729, 6849, 713, 9418, 3790, 7375, 943...
Train
6,772
2
Multics:multics multics multiplexed information computing service influential early time-sharing operating system based concept single-level memory virtually modern operating systems heavily influenced multics – often unix created people worked multics – either directly linux macos indirectly windows nt initial planning development multics started 1964 cambridge massachusetts originally cooperative project led mit project mac fernando corbató along general electric bell labs developed ge 645 computer specially designed first one delivered mit january 1967 multics conceived commercial product general electric became one honeywell albeit successfully due many novel valuable ideas multics significant impact computer science despite faults multics numerous features intended ensure high availability would support computing utility similar telephone electricity utilities modular hardware structure software architecture used achieve system could grow size simply adding appropriate resource computing power main memory disk storage separate access control lists every file provided flexible information sharing complete privacy needed multics number standard mechanisms allow engineers analyze performance system well number adaptive performance optimization mechanisms multics implemented single-level store data access discarding clear distinction files called segments multics process memory memory process consisted solely segments mapped address space read write process simply used normal central processing unit cpu instructions operating system took care making sure modifications saved disk posix terminology every file codice_1ed however multics concept process memory separate memory used hold mapped-in files unix memory system part segment appeared file system included temporary scratch memory process kernel stack etc one disadvantage size segments limited 256 kilowords 1 mib due particular hardware architecture machines multics ran 36-bit word size index registers used address within segments half size 18 bits extra code used work files larger called multisegment files days one megabyte memory prohibitively expensive large databases later huge bitmap graphics limit rarely encountered another major new idea multics dynamic linking running process could request segments added address space segments could contain code could execute allowed applications automatically use latest version external routine called since routines kept segments dynamically linked process first tried begin execution since different processes could use different search rules different users could end using different versions external routines automatically equally importantly appropriate settings multics security facilities code segment could gain access data structures maintained different process thus interact application running part daemon another process user process simply performed normal procedure-call instruction code segment dynamically linked code segment implemented operation associated daemon code segment could modify data maintained used daemon action necessary commence request completed simple procedure return instruction returned control user process user code multics also supported extremely aggressive on-line reconfiguration central processing units memory banks disk drives etc could added removed system continued operating mit system early software development done common practice split multiprocessor system two separate systems off-hours incrementally removing enough components form second working system leaving rest still running original logged-in users system software development testing could done second system components second system added back main user system without ever shut multics supported multiple cpus one earliest multiprocessor systems multics first major operating system designed secure system outset despite early versions multics broken repeatedly led work made system much secure prefigured modern security engineering techniques break-ins became rare second-generation hardware base adopted hardware support ring-oriented security multilevel refinement concept master mode multics first operating system provide hierarchical file system file names could almost arbitrary length syntax given file directory could multiple names typically long short form symbolic links directories also supported multics first use now-standard concept per-process stacks kernel separate stack security ring also first command processor implemented ordinary user code – idea later used unix shell also one first written high-level language multics pl/i burroughs mcp system written algol 1964 multics developed initially ge-645 mainframe 36-bit system ge computer business including multics taken honeywell 1970 around 1973 multics supported honeywell 6180 machines included security improvements including hardware support protection rings bell labs pulled project 1969 people worked went create unix system multics development continued mit general electric honeywell continued system development 1985 80 multimillion-dollar sites installed universities industry government sites french university system several installations early 1980s honeywell stopped supporting multics users migrated systems like unix 1985 multics issued certification b2 level secure operating system using trusted computer system evaluation criteria national computer security center ncsc division nsa first operating system evaluated level multics distributed 1975 2000 groupe bull europe bull hn information systems inc. united states 2006 bull sas open sourced multics versions mr10.2 mr11.0 mr12.0 mr12.1 mr12.2 mr12.3 mr12.4 mr12.5 last known multics installation running natively honeywell hardware shut october 30 2000 canadian department national defence halifax nova scotia canada 2006 bull hn released source code mr12.5 final 1992 multics release mit system available open-source software exception optional pieces tcp/ip 2014 multics successfully run current hardware using simulator 1.0 release simulator available release 12.6f multics accompanies 1.0 release emulator adds new features including command line recall editing using video system peter h. salus author book covering unix early years stated one position multics tried much versatile flexible operating system failed miserably position however widely discredited computing community many multics technical innovations used modern commercial computing systems permanently resident kernel multics system derided day large complex 135 kb code comparison linux system 2007 might occupied 18 mb first mit ge-645 512 kilowords memory 2 mib truly enormous amount time kernel used moderate portion multics main memory entire system including operating system complex pl/1 compiler user commands subroutine libraries consisted 1500 source modules averaged roughly 200 lines source code compiled produce total roughly 4.5 mib procedure code fairly large standards day multics compilers generally optimised code density cpu performance example using small sub-routines called operators short standard code sequences makes comparison object code size modern systems less useful high code density good optimisation choice multics multi-user system expensive main memory design features multics greatly influenced unix operating system originally written two multics programmers ken thompson dennis ritchie superficial influence multics unix evident many areas including naming commands internal design philosophy quite different focusing keeping system small simple correcting deficiencies multics high resource demands limited computer hardware time name unix originally unics pun multics u unix rumored stand uniplexed opposed multiplexed multics underscoring designers rejections multics complexity favor straightforward workable approach smaller computers garfinkel abelson cite alternative origin peter neumann bell labs watching demonstration prototype suggested pun name unics – pronounced eunuchs – castrated multics although dennis ritchie said denied ken thompson transcribed 2007 interview peter seibel refers multics overdesigned overbuilt everything close unusable massachusetts institute technology still claim monstrous success clearly n't admitted however things liked enough multics actually take hierarchical file system shell — separate process replace process prime computer operating system primos referred multics shoebox william poduska founder company poduska later moved found apollo computer whose aegis later domain/os operating systems sometimes called multics matchbox extended multics design heavily networked graphics workstation environment stratus vos operating system stratus computer stratus technologies strongly influenced multics external user interface internal structure bear many close resemblances older project high-reliability availability security features multics extended stratus vos support new line fault tolerant computer systems supporting secure reliable transaction processing stratus vos directly-related descendant multics still active development production usage today protection architecture multics restricting ability code one level system access resources another adopted basis security features icl vme operating system literature contains large number papers multics various components fairly complete list available multics bibliography page important and/or informative ones listed
[ 512, 4097, 10753, 10756, 2056, 3594, 13, 9231, 6675, 7191, 5658, 9762, 7217, 10803, 7732, 7733, 9780, 4151, 1593, 3134, 2625, 8262, 2120, 1611, 5714, 9829, 107, 1147, 5245, 2179, 144, 8852, 7325, 8876, 8879, 11442, 6856, 10442, 1776, 5361...
None
6,773
4
Marcus_J._Ranum:marcus j. ranum marcus j. ranum born november 5 1962 new york city new york united states computer network security researcher credited number innovations firewalls including building first internet email server whitehouse.gov domain intrusion detection systems held technical leadership positions number computer security companies faculty member institute applied network security marcus ranum born new york city graduated gilman school baltimore maryland attending johns hopkins university obtained bachelor arts psychology 1985 ranum helped design implement digital equipment corporation secure external access link seal later altavista firewall regarded first commercial bastion host firewall 1990 left dec work trusted information systems tis chief scientist development manager internet security products tis ranum became responsible whitehouse.gov internet email site charged responsibility ranum advocated whitehouse.com domain registered well despite advice registered government later registered adult entertainment provider tis developed tis internet firewall toolkit fwtk grant darpa tis worked v-one chief scientist extensively involved company ipo three months ipo ranum formed company network flight recorder nfr served ceo three years stepping cto role ranum later left nfr consult trusecure joining tenable network security cso addition various full-time positions ranum also held board advisory positions nfr security protego networks fortify software ranum spoken usenix audiences lisa 1997 1999 tutorial lisa 2000 keynote 2002 2003 tutorial spoke full disclosure black hat security briefings 2000 recently ranum spoken interop 2005 2007 cansecwest 2010 secure360 2011 previously taught courses sans institute ranum work cited least 15 published u.s. patents well numerous computer network security articles books ranum cited author eponymous law ca n't solve social problems software marcus co-authored series face articles bruce schneier appeared approximately bi-monthly information security magazine since july 2006 ranum one number editors sans newsbites semiweekly email newsletter currently ranum lives morrisdale pennsylvania hobbies include photography firearms maintains active stock photography account deviantart wrote essay oleg volk pro-firearms site www.a-human-right.com marcus ranum also interviewed digital artist brandon pence nwflaa read 2 parts part 1 part 2 atheist maintaining blog freethought blogs network
[ 1634, 1315, 10437, 2118, 8998, 331, 7692, 1101, 11502, 10417, 6834, 1331, 11505, 5245, 2110, 8671 ]
Test
6,774
7
PySpark:pyspark apache spark open-source distributed general-purpose cluster-computing framework released support python spark pyspark provides interface programming entire clusters implicit data parallelism fault tolerance following sub-packages provided following classes marked core classes sample code may look like follows
[ 7699, 1047, 8217, 11303, 6184, 7218, 9789, 7742, 2113, 7233, 7750, 2140, 7261, 8799, 4194, 8810, 2163, 7802, 3197, 10377, 6797, 8860, 6815, 5798, 4286, 6338, 1222, 4294, 4308, 2264, 8408, 731, 11487, 8425, 747, 8447, 1296, 785, 7963, 3877...
Validation
6,775
9
XQuery:xquery xquery xml query query functional programming language queries transforms collections structured unstructured data usually form xml text vendor-specific extensions data formats json binary etc. language developed xml query working group w3c work closely coordinated development xslt xsl working group two groups share responsibility xpath subset xquery xquery 1.0 became w3c recommendation january 23 2007 xquery 3.0 became w3c recommendation april 8 2014 xquery 3.1 became w3c recommendation march 21 2017 xquery functional side effect-free expression-oriented programming language simple type system summed kilpeläinen xquery provides means extract manipulate data xml documents data source viewed xml relational databases office documents xquery contains superset xpath expression syntax address specific parts xml document supplements sql-like flwor expression performing joins flwor expression constructed five clauses named let order return language also provides syntax allowing new xml documents constructed element attribute names known advance xml-like syntax used cases expressions referred dynamic node constructors available constructs defined expressions within language arbitrarily nested language based xquery xpath data model xdm uses tree-structured model information content xml document containing seven kinds nodes document nodes elements attributes text nodes comments processing instructions namespaces xdm also models values sequences singleton value considered sequence length one items sequence either xml nodes atomic values atomic values may integers strings booleans full list types based primitive types defined xml schema features updating xml documents databases full text search capability part core language defined add-on extension standards xquery update facility 1.0 supports update feature xquery xpath full text 1.0 supports full text search xml documents xquery 3.0 adds support full functional programming functions values manipulated stored variables passed higher-order functions dynamically called sample xquery code lists unique speakers act shakespeare play hamlet encoded hamlet.xml xquery constructs performing computations expressions statements even though keywords appear suggest statement-like behaviors execute function expression within body evaluated value returned thus write function double input value one simply writes write full query saying 'hello world one writes expression style common functional programming languages examples xquery used although xquery initially conceived query language large collections xml documents also capable transforming individual documents capabilities overlap xslt designed expressly allow input xml documents transformed html formats xslt 2.0 xquery standards developed separate working groups within w3c working together ensure common approach appropriate share data model xdm type system function library include xpath 2.0 sublanguage two languages however rooted different traditions serve needs different communities xslt primarily conceived stylesheet language whose primary goal render xml human reader screen web web template language paper xquery primarily conceived database query language tradition sql two languages originate different communities xslt stronger handling narrative documents flexible structure xquery stronger data handling example performing relational joins xslt 1.0 appeared recommendation 1999 whereas xquery 1.0 became recommendation early 2007 result xslt still much widely used languages similar expressive power though xslt 2.0 many features missing xquery 1.0 grouping number date formatting greater control xml namespaces many features planned xquery 3.0 comparison must take account fact xslt 1.0 xslt 2.0 different languages xslt 2.0 particular heavily influenced xquery move strong typing schema-awareness usability studies shown xquery easier learn xslt especially users previous experience database languages sql attributed fact xquery smaller language fewer concepts learn fact programs concise also true xquery orthogonal expression used syntactic context contrast xslt two-language system xpath expressions nested xslt instructions vice versa xslt currently stronger xquery applications involve making small changes document example deleting note elements applications generally handled xslt use coding pattern involves identity template copies nodes unchanged modified specific templates modify selected nodes xquery equivalent coding pattern though future versions possible tackle problems using update facilities language development xquery 1.0 lacked kind mechanism dynamic binding polymorphism remedied introduction functions first-class values xquery 3.0 absence capability starts become noticeable writing large applications writing code designed reusable different environments xslt offers two complementary mechanisms area dynamic matching template rules ability override rules using codice_1 make possible write applications multiple customization layers absence facilities xquery 1.0 deliberate design decision consequence xquery amenable static analysis essential achieve level optimization needed database query languages also makes easier detect errors xquery code compile time fact xslt 2.0 uses xml syntax makes rather verbose comparison xquery 1.0 however many large applications take advantage capability using xslt read write modify stylesheets dynamically part processing pipeline use xml syntax also enables use xml-based tools managing xslt code contrast xquery syntax suitable embedding traditional programming languages java see xquery api java c necessary xquery code also expressed xml syntax called xqueryx xqueryx representation xquery code rather verbose convenient humans easily processed xml tools example transformed xslt stylesheets two major extensions xquery developed w3c reached recommendation status extensions xquery 1.0 work taking forward work xquery 3.0 abandoned lack resources work xquery 3.0 published recommendation 8 april 2014 xquery 3.1 recommendation february 2017 scripting procedural extension xquery designed never completed expath community group develops extensions xquery related standards xpath xslt xproc xforms following extensions currently available jsoniq extension xquery adds support extract transform data json documents jsoniq superset xquery 3.0 published creative commons attribution-sharealike 3.0 license exquery project develops standards around creating portable xquery applications following standards currently available portions borrowed permission books xml hacks o'reilly media xquery o'reilly media previous version based article
[ 9345, 11650, 8070, 5255, 7943, 8201, 11528, 9467, 5880, 6160, 6161, 5907, 4630, 151, 11030, 2972, 5917, 10910, 4255, 4768, 7455, 9893, 10791, 4392, 1964, 5677, 10413, 7983, 6709, 1594, 5051, 3388, 7612, 8762, 6335, 9914, 6850, 2757, 2374, ...
Test
6,776
3
Dragon_Knight_II:dragon knight ii dragon knight ii ドラゴンナイトii fantasy-themed eroge role-playing video game dragon knight franchise originally developed published elf corporation 1990-1991 japan first sequel original dragon knight game 1989 game erotic dungeon crawler young warrior takeru fights lift witch curse turned girls monsters following commercial critical success dragon knight ii elf followed dragon knight iii knights xentar 1991 censored remake dragon knight ii published nec avenue 1992 dragon knight ii available japanese gameplay system changed much since first dragon knight game still standard dungeon crawler first-person view perspective 2d graphics player spends time navigating dungeon-like mazes fighting enemies progress made mazes become complicated first game aid player form mini-map grid coordinates player also visit shops converse non-hostile npcs game starts one player character takeru two characters join later game battle system also undergone minor changes still features turn-based battles mostly randomly generated fights better balanced first game player attack defend use spells items deal various types female enemies berserker banshee catgirl centaur elf harpy ninja mummy werewolf fought one time enemies actually girls transformed monsters whenever player character fights one subdued enemy loses clothing later enemies revert normal self gratitude offer sex protagonist cutscene censored console versions also one boss beat end characters voice actors include taverner totani koji weaponsmith yukitoshi hori old witch hiroyuki sato apothecary witch isamu tanonaka rem lisa hatayama mei noriko namiki messiah natsuko yamada merumo mayumi horikawa cherry akiko sato orchid azusa nakao mami kaori ohara hamy minako takenouchi rika tomomi uesaka monami masami suzuki mischa mihoko fujiwara tanya yasuko kajimura nadia yuki kato bunny junko shimakata mimi yoko asada paula naomi matamura betty yumiko sakita marie mayumi seto lina mayumi shigeno eve megumi kanba nina naoko nakamura lara yasuko hirayama game narrated kaneto shiozawa vagabond youth hero first dragon knight takeru yamato wanders small town phoenix finds terrorized devoid young men phoenix ruled group powerful wicked witches destroyed all-male dragon knights three years events game woman known mesaanya arrived phoenix first appeared friendly gained villagers trust healer revealed true colors took witch tower forbade love men women next morning takeru arrival sees town changed mesaanya steals set seven evil-sealing holy scriptures takeru delivered used possesses young maiden named kate also kidnaps 28 village girls turns minions guard witch tower reluctantly takeru decides enter tower collect scriptures break curse ultimate goal takeru defeat witch supposed wait top tower also needs rescue girls one one course game takeru joined burly merchant named baan originally sent phoenix mysterious spell-casting priestess named sophia also meets rescues kate fiancé young man neighboring town went first rescue kate without combat experience disappeared eventually bewitched girls saved time find mesaanya since witch throne room empty kate also found looking takeru learns witches conquered help special-metal falcon sword genji armor capable resisting magic searching artifacts party descends hidden dungeon town graveyard baan reveals ancestor fought witches killed queen mesaanya ancestor twist ending sophia true identity revealed really disguised mesaanya along magic blast gravely wounds baan shocked takeru revealed son god legendary armor set god could use wraps around decisive duel mesaanya slain kate finally freed spell peace restored village quest completed takeru spends night kate marry leaving adventures game originally released 1990-1991 msx2 nec pc-8801 nec pc-9801 x68000 computer systems enhanced pc engine port removed sexually explicit content added voice acting new graphics developed tamtam released nec avenue 1992 among controversies first erotic game officially published video game console two soundtracks released japan nec avenue dragon knight ii fantastic remix ドラゴンナイト ii ファンタスティック・リミックス october 1991 dragon knight ii pc engine world ドラゴンナイト ii ~pcエンジンワールド 1992 distributed nippon columbia like predecessor dragon knight ii commercial success game placed third msx magazine msx soft top 30 best-selling chart may 1991 even one year later remained 28th place pc engine version fifth pc engine fan chart august 1992 magazine review gave highly positive score 90 famitsu gave score 24/40 electronic gaming monthly egm reported dragon knight ii became sleeper hit japanese role-playing fans made popular fact noticeably different rpgs game opted lots women instead beasts slight characteristics monsters predicting action scantily clad women attack sequel really entice japanese market egm also included game tons interesting people meet 1993 ranking top ten hottest video game babes second place pc engine fan listed mesaanya sophia kate among sexiest female characters pc engine games takeru renamed desmond west returns hero 1991 sequel dragon knight iii titled knights xentar highly rewritten western-localized versions phoenix takeru celebrity former witch tower renamed tower takeru honor revisited sequel fully recovered baan rejoins fight demons kate romantically met takeru uses falcon sword genji armor baan marries marie one girls dragon knight ii
[ 6696, 4425, 8355 ]
None
6,777
5
National_Transportation_Communications_for_Intelligent_Transportation_System_Protocol:national transportation communications intelligent transportation system protocol national transportation communications intelligent transportation system protocol ntcip family standards designed achieve interoperability interchangeability computers electronic traffic control equipment different manufacturers nticp around 20 years increasingly use smart city initiatives suppliers technology example riders want know next bus arrive stop using apps use ntcip siemens initiatives seattle elsewhere future ntcip used two way communication vehicles traffic signals ability buses control traffic lights done sinwaves protocol product joint standardization project guided joint committee ntcip composed six representatives national electrical manufacturers association nema american association state highway transportation officials aashto institute transportation engineers ite joint committee turn formed 14 technical working groups develop maintain standards initiated produced 50 standards information reports project receives funding contract united states department transportation usdot part wider effort develop comprehensive family intelligent transportation system standards nema initiated development ntcip 1992 early 1993 us federal highway administration fhwa brought together transportation industry representatives discuss obstacles installing field equipment new intelligent transportation systems representatives said number one priority need industry-wide standard data communications protocol since nema transportation section members already started work new industry standard offered expedite expand scope activities key objectives new ntcip protocol interchangeability similar roadside devices interoperability different types devices communications channel 1996 fhwa suggested partnership standards developing organizations expand user industry involvement aashto ite signed agreement nema establish joint committee ntcip work together developing maintaining ntcip standards ntcip enabled center field communication command/control equipment different manufacturers specified procured deployed tested ntcip communications standards field devices listed corresponding ntcip document number shown parentheses center center c2c communication involves peer-to-peer communications computers involved information exchange real-time transportation management many-to-many network type communication similar internet center request information provide information number centers example center center communications two traffic management centers exchange real-time information inventory status traffic control devices allows center system know timing plan example center system running allow traffic signal coordination across center geographic boundaries examples type communication include ntcip communications standards center center communications listed corresponding ntcip document number shown parentheses ntcip coordinated information level standards development organizations development center-to-center application profiles supports ite traffic management data dictionary ite tmdd ieee 1512 incident management ieee 1512 apta transit communications interface profiles apta tcip sae j2354 advanced traveler information systems standards ntcip framework based primarily open standards internet engineering task force ietf world wide web consortium w3c iso plus ntcip data dictionary standards specific task device communications layered modular approach communications standards used represent data communications two computers electronic devices ntcip refers “ levels ” ntcip rather “ layers ” distinguish hierarchical architecture applied defined open system interconnection reference model osi model iso internet engineering task force ietf five ntcip levels information level application level transport level subnetwork level plant level figure used permission shows structure ntcip information application transport subnetwork plant levels ensure working system deployers select specify least one ntcip protocol profile level discussion level ntcip standards apply level follows ntcip framework preclude combinations beyond expressly indicated diagram
[ 2948, 124, 8527 ]
Validation
6,778
9
CBASIC:cbasic cbasic compiled version basic programming language written cp/m operating system gordon eubanks 1976–1977 enhanced version basic-e. basic-e eubank master thesis project developed pl/m eubanks gary kildall new cp/m operating system men naval postgraduate school monterey california basic-e based basic compiler originally written gary kildall 1974 developed public expense basic-e public domain could marketed exclusively seymour rubinstein marketing director imsai contacted eubanks asked create saleable version contract imsai 8080 microcomputer eubanks developed cbasic spare time still naval officer stationed submarine uss george washington vallejo california retained joint ownership program imsai sold program company compiler systems acquired digital research 1981 basic-e early versions cbasic compiled source code intermediate p-code file executed separate run-time interpreter program cbasic could execute minimum 24 kb memory line numbers program source optional unless needed label program jump cbasic proved popular incorporated 14-digit binary-coded decimal bcd math eliminated mbasic rounding errors sometimes troublesome accounting cbasic2 adds following features infoworld 1980 described cbasic primary language development commercial cp/m applications developers widespread familiarity basic ability distribute royalty-free binaries without source code cbasic owners magazine stated language become popular despite serious drawbacks including required preprocessor interpreted source code making debugging difficult slow speed incompatible changes jerry pournelle said may 1983 digital research practically ruin ed eubanks cbasic manual acquiring company new edition much better
[ 10113, 3718, 5896, 6921, 7691, 1805, 9997, 3216, 786, 11412, 22, 2840, 2201, 3481, 3736, 9881, 797, 3233, 11683, 8868, 5925, 8101, 4136, 2729, 7849, 10666, 11562, 8494, 303, 7343, 7983, 178, 11315, 4409, 315, 7355, 7486, 7870, 4160, 7999,...
Validation
6,779
4
Pre-shared_key:pre-shared key cryptography pre-shared key psk shared secret previously shared two parties using secure channel needs used build key shared secret key derivation function typically used systems almost always use symmetric key cryptographic algorithms term psk used wi-fi encryption wired equivalent privacy wep wi-fi protected access wpa method called wpa-psk wpa2-psk also extensible authentication protocol eap known eap-psk cases wireless access points ap clients share key characteristics secret key determined system uses system designs require keys particular format password passphrase hexadecimal string secret used systems involved cryptographic processes used secure traffic systems crypto systems rely one keys confidentiality one particular attack always possible keys brute force key space search attack sufficiently long randomly chosen key resist practical brute force attack though principle attacker sufficient computational power see password strength password cracking discussion unavoidably however pre-shared keys held parties communication compromised one end without knowledge anyone several tools available help one choose strong passwords though network connection inherently unsafe one general know anyone may eavesdropping interaction choosing keys used cryptographic algorithms somewhat different pattern whatsoever avoided pattern may provide attacker lower effort attack brute force search implies random key choice force attackers spend much effort possible difficult principle practice well general rule software except cryptographically secure pseudorandom number generator csprng avoided
[ 10908, 2430, 7426, 6916, 8674, 9640, 8265, 3742, 9356, 10574, 2228, 1941, 10329, 10332, 3838 ]
Test
6,780
1
Ingres_(database):ingres database ingres database commercially supported open-source sql relational database management system intended support large commercial government applications ingres database fully open source global community contributors however actian corporation announced april 2018 acquired hcl technologies controls development ingres makes certified binaries available download well providing worldwide support ingres began research project university california berkeley starting early 1970s ending 1985 original code like projects berkeley available minimal cost version bsd license ingres spawned number commercial database applications including sybase microsoft sql server nonstop sql number others postgres post ingres project started mid-1980s later evolved postgresql acid compatible fully transactional including ddl statements part lisog open-source stack initiative 1973 system r project getting started ibm research team released series papers describing system building two scientists berkeley michael stonebraker eugene wong became interested concept reading papers started relational database research project already raised money researching geographic database system berkeley economics group called ingres interactive graphics retrieval system decided use money fund relational project instead used seed new much larger project decided re-use original project name new project became university ingres funding stonebraker approached darpa obvious funding source computing research development time darpa office naval research onr turned already funding database research elsewhere stonebraker introduced idea agencies help colleagues eventually obtained modest support nsf three military agencies air force office scientific research army research office navy electronic systems command thus funded ingres developed mid-1970s rotating team students staff ingres went evolution similar system r early prototype 1974 followed major revisions make code maintainable ingres disseminated small user community project members rewrote prototype repeatedly incorporate accumulated experience feedback users new ideas research project ended 1985 ingres remained largely similar ibm system r concept based largely dec machines unix vax/vms unlike system r ingres source code available tape modest fee 1980 1,000 copies distributed primarily universities many students u.c berkeley universities used ingres source code worked various commercial database software systems berkeley students jerry held later karel youseffi moved tandem computers built system evolved nonstop sql tandem database system re-implementation ingres technology evolved system ran effectively parallel computers included functionality distributed data distributed execution distributed transactions last fairly difficult components system first released late 1970s 1989 system could run queries parallel product became fairly famous one systems scales almost linearly number processors machine adding second cpu existing nonstop sql server almost exactly double performance tandem later purchased compaq started re-write 2000 product hewlett-packard early 1980s ingres competed head-to-head oracle two products widely regarded leading hardware-independent relational database implementations comparable functionality performance market share pricing many commentators considered ingres perhaps marginally superior product around 1985 however ingres steadily lost market share one reason oracle aggressive marketing another increasing recognition sql preferred relational query language ingres originally provided different language quel conversion sql delivered ingres version 6 took three years losing valuable time race robert epstein chief programmer project berkeley formed britton lee inc. along students ingres project paula hawthorn michael ubell joined later eric allman later epstein founded sybase sybase 2 product behind oracle time 1980s 1990s informix came nowhere took 1997 sybase product line also licensed microsoft 1992 rebranded microsoft sql server relationship soured late 1990s today sql server outsells sybase wide margin several companies used ingres source code produce products successful company named relational technology inc. rti founded 1980 stonebraker wong another berkeley professor lawrence a. rowe rti renamed ingres corporation late 1980s company ported code dec vax/vms commercial operating system dec vax computers also developed collection front-end tools creating manipulating databases e.g. reporterwriters forms entry update etc application development tools time much source rewritten add functionality example multiple-statement transactions sql b-tree access method date/time datatypes etc improve performance example compiled queries multithreaded server company purchased ask corporation november 1990 founders left company next several months 1994 ask/ingres purchased computer associates continued offer ingres variety brand names example openingres ingres ii advantage ingres 2004 computer associates released ingres r3 open source license code includes dbms server utilities character-based front-end application-development tools essence code everything except openroad windows 4gl gui-based development environment november 2005 garnett helfrich capital partnership computer associates created new company called ingres corporation provided support services ingres openroad connectivity products february 2006 ingres corporation released ingres 2006 gnu general public licence ingres 9.3 released october 7 2009 limited release targeted new application development linux windows ingres 10 released october 12 2010 full release supporting upgrade earlier versions product available 32-bit 64-bit linux 32-bit microsoft windows open-source community initiatives ingres included community bundles – alliances open-source providers projects alfresco jaspersoft hibernate apache tomcat eclipse enable ingres provide platform technology open-source technologies established ingres carleton university series open source boot camps held 2008 work open-source communities projects introduce university college students staff concepts realities open source involvement includes global ingres university alliances ingres engineering summit ingres janitors project several memberships open-source initiatives ingres icebreaker appliance combines ingres database linux operating system enabling people simultaneously deploy manage database operating system ingres café consolidated application foundation eclipse created team developers carleton university integrated environment helps software architects accelerate simplify java application development ingres geospatial community-based project create industry-standards-compliant geospatial storage features ingres dbms words storing map data providing powerful analysis functions within dbms november 2010 garnett helfrich capital acquired last 20 equity ingres corp already september 22 2011 ingres corporation became actian corporation focused action apps use ingres vectorwise rdbms systems postgres project started mid 1980s address limitations existing database-management implementations relational model primary among inability let user define new domains types combinations simpler domains see relational model explanation term domain project explored ideas including incorporation write-once media e.g. optical disks use massive storage e.g. never delete data inferencing object-oriented data models implementation also experimented new interfaces database application programs e.g. portals sometimes referred fat cursors resulting project named postgres aimed introducing minimum number features needed add complete types support included ability define types also ability fully describe relationships – time widely used maintained entirely user postgres database understood relationships could retrieve information related tables natural way using rules 1990s stonebraker started new company commercialize postgres name illustra company technology later purchased informix ingres 11 released 18 april 2017 known actian x hybrid database
[ 5384, 6797, 10389, 10518, 11030, 2972, 9893, 3241, 10413, 10286, 7983, 9397, 823, 5691, 3515, 9151, 6850, 1606, 9286, 3784, 6479, 6993, 472, 4057, 9177, 8539, 6622, 1636, 1383, 5612, 9452, 3951, 5999, 2045 ]
Validation
6,781
3
DualShock:dualshock dualshock originally dual shock trademarked dualshock dual shock line gamepads vibration-feedback analog controls developed sony interactive entertainment playstation family systems dualshock introduced japan november 1997 launched north american market may 1998 first introduced secondary peripheral original playstation updated version playstation console included controller sony subsequently phased digital controller originally included console well sony dual analog controller 28 million dualshock controllers sold brand name excluding bundled controllers dualshock analog controller scph-1200 controller capable providing vibration feedback based onscreen actions taking place game game supports well analog input two analog sticks name derives use two dual vibration motors shock motors housed within handles controller left one larger powerful one right allow varying levels vibration dualshock differs nintendo 64 rumble pak respect rumble pak uses single motor rumble pak also uses batteries power vibration function corded varieties dualshock use power supplied playstation however third party dualshock-compatible controllers use batteries instead playstation power supply rumble feature dualshock similar one featured first edition japanese dual analog controller feature removed shortly controller released dualshock like predecessor dual analog controller two analog sticks unlike earlier controller dualshock analog sticks feature textured rubber grips rather smooth plastic tips recessed grooves found dual analog controller dualshock also features two additional buttons compared dual analog l3 r3 triggered depressing analog sticks differences dual analog dualshock include longer grips/handles slightly different l2/r2 buttons dualshock controller widely supported shortly launch new titles including spyro dragon tekken 3 included support vibration feature dual analog sticks capcom re-released resident evil director cut resident evil 2 support controller added newer versions games designed dual analog vibration capability porsche challenge crash bandicoot 2 also work many games took advantage presence two motors provide vibration effects stereo including gran turismo playstation port quake ii released 1999 playstation hit ape escape became first game explicitly require dualshock/dual-analog-type controllers gameplay requiring use analog sticks 2000 ps one remodeled version original playstation released slightly redesigned dualshock controller scph-110 similar first one except color white instead gray middle controller ps one logo instead playstation naming buttons analog sticks cord brighter previous one connector semi-circle shape round edge also came colors dualshock also compatible playstation 2 use connector protocol however certain ps2 games utilize dualshock 2 analog buttons bouncer compatible dualshock dualshock fully forwards compatible playstation 2 console used play playstation games playstation 2 computer entertainment system announced dualshock 2 analog controller scph-10010 included almost exactly externally previous dualshock analog controller however minor cosmetic changes different screw positioning one fewer screw blue dualshock 2 logo added top controller connector square dualshock cable connector black rather grey standard controller black colors came later rather grey original dualshock analog sticks also noticeably stiffer original dualshock internally dualshock 2 lighter buttons except analog mode start select l3 r3 buttons readable analog values pressure-sensitive dualshock 2 made available various colors black satin silver ceramic white slate grey ocean blue emerald green crimson red candy pink original playstation forward compatible dualshock 2 playstation 3 backward compatible dualshock dualshock 2 use third party peripherals connect controller console via usb port however dualshock dualshock 2 work properly games require sixaxis functionality heavy rain announced 2007 tokyo game show dualshock 3 wireless controller scph-98050/cechzc2 gamepad playstation 3 replaces sixaxis wireless controller originally released earlier versions console dualshock 3 nearly identical previous sixaxis version adds haptic feedback – also known force feedback – capabilities found dualshock dualshock 2 sony settled patent infringement lawsuit immersion march 2007 following lengthy legal battle settlement cleared way incorporating missing rumble feature sixaxis lacked vibration function motion-sensing capabilities dualshock 3 used simultaneously without one interfering like sixaxis also usb mini-b port charging also used psp go via bluetooth though controller psp go must registered using ps3 console dualshock 3 identified dualshock 3 sixaxis markings also weighs 40 predecessor sixaxis weighed rear markings indicate original dualshock 3 draws 300 current 3.7 v power consumption 1.11 w order magnitude increase 30 current 3.7 v 0.111 w listed sixaxis however current drawn constantly maximum current rumble active main power source internal 3.7 v li-ion battery tentatively capable storing 570 mah provides 30 hours continuous gaming full charge third party replacement batteries also available like sixaxis dualshock 3 comes instructions remove replace battery dualshock 3 also draw power usb cable via usb mini-b connector top controller allows controller used battery low also used charging battery connected via usb controller communicates console usb cable rather bluetooth along release 'slim model ps3 sony released new version dualshock 3 a1 uses 5.0 v 500 connected still contains 3.7 v battery revision dualshock 3 away additional plastic brackets l1/r1 buttons l2/r2 triggers increasing controller rigidity indicator lights soldered directly board comes slightly revised color schemes dualshock 3 compatible standard usb mini-b cable many usb chargers official charging cables available sony include official cable usb 2.0 cable pack wall charger ac adapter charging kit third-party usb charger used must act usb host device rather simply providing power appropriate pins since sixaxis dualshock 3 require host signal wake begin charging sony representative confirmed april 2 2008 original sixaxis controller would officially discontinued release force-feedback enabled dualshock 3 mid-april 2008 sixaxis longer produced 2008 dropped stock retailers dualshock 3 made available various colors black satin silver ceramic white classic white metallic blue deep red pink jungle green olive candy blue light blue urban camouflage three-color digital camouflage crimson red transparent red cosmic blue transparent blue colors made available markets times additional colors also made available alongside limited edition consoles including gun-metal grey cloud black dark grey limited edition baseball themed dualshock 3 controller released march 8 2011 coincide release another color metallic gold became available june 2012 limited edition europe north america sold exclusively gamestop october 2012 limited edition controller available uk part console bundle coincide launch game americas game controller bundle november 1 2013 sony announced new see-through crystal model dualshock 3 controller japan dualshock 4 cuh-zct1 playstation 4 controller similar dualshock 3 several new features one new feature built-in two-point capacitive touch pad front controller clicked controller supports motion detection via three-axis gyroscope three-axis accelerometer vibration includes non-removable rechargeable 3.7 v 1000 mah lithium-ion battery charged system rest mode weighs dimensions also lacks sony logo front due touchpad place top gamepad features light bar three leds illuminate different colors used identify players matching colors characters controlling game provide enhanced feedback immersion changing patterns colors reaction gameplay example grand theft auto v player wanted police light bar flashes red blue also used conjunction playstation camera judge positions movements multiple players light bar developed playstation vr controller features several input output connectors stereo headset jack 3.5 mm omtp trrs connector micro-usb port extension port charged via microusb dedicated charging station console even console also includes mono speaker like wii remote second major controller video game history feature dualshock 4 features following buttons ps button share button options button directional buttons action buttons triangle circle cross square shoulder buttons r1/l1 triggers r2/l2 analog stick click buttons l3/r3 touch pad click button mark several changes dualshock 3 previous playstation controllers start select buttons merged single options button dedicated share button allows players upload screenshots videos gameplay experiences joysticks triggers redesigned based developer input ridged surface joysticks featuring outer ring surrounding convex dome caps dualshock 4 buttons differ slightly functionality dualshock 3 l1 l2 r1 r2 buttons pressure-sensitive change functionality dualshock 2 3 likely due fact games utilize buttons well due used competitors controllers including wii u xbox one playstation 3 forward compatible dualshock 4 originally via microusb cable firmware update 4.60 ps3 added wireless connectivity however motion vibration functions supported start select buttons longer present options share buttons respectively replace sony initially released dualshock 4 estimated around 10 wear issues rubber surface left analog stick exhibited excessive wear tearing short-term use january 2014 sony issued statement acknowledging issue small percentage controllers early september 2016 sony confirmed second generation dualshock 4 controllers known dualshock v2 cuh-zct2 hosts slight improvements original dualshock 4 including usb communication longer battery life ability see light bar top touchpad released september 15 2016 initial controller version light bar permanently illuminated bright-colored light potential light pollution darkened playing rooms well interest extending battery life led inquiries whether light bar could switched users required game sony executive shuhei yoshida initially responded negative july 2013 though videogame developers option disable light game early 2014 company announced future update would allow light bar dimmed enabled system update 1.70 april 2014 original dualshock 4 cuh-zct1 available jet black glacier white urban camouflage wave blue black back magma red black back gold silver steel black newer dualshock 4 cuh-zct2 currently available jet black glacier white green camouflage blue camouflage wave blue blue back magma red red back gold silver sunset orange crystal red crystal blue crystal steel black midnight blue metallic copper alpine green berry blue also dualshock 4 exclusive least initially console bundles like 20th anniversary edition gun metal metal gear solid v star wars battlefront monster hunter world god war gran turismo sport days play marvel spider-man 500 million limited edition ps4 pro dualshock controller given emmy award peripheral development technological impact video game controllers national academy television arts sciences january 8 2007 sony initially reported sixaxis received award issuing correction
[ 643, 9091, 3077, 11398, 10761, 6799, 9508, 6311, 9512, 684, 306, 1587, 1091, 9543, 10056, 6909, 6732, 10316, 6738, 3923, 6873, 859, 4060, 1501, 607, 359, 8937, 3824, 5746, 7028, 7801, 8316, 6781 ]
Test
6,782
1
Domain-key_normal_form:domain-key normal form domain-key normal form dk/nf normal form used database normalization requires database contains constraints domain constraints key constraints domain constraint specifies permissible values given attribute key constraint specifies attributes uniquely identify row given table domain/key normal form achieved every constraint relation logical consequence definition keys domains enforcing key domain restraints conditions causes constraints met thus avoids non-temporal anomalies reason use domain/key normal form avoid general constraints database clear domain key constraints databases easily test domain key constraints attributes general constraints however would normally require special database programming form stored procedures often trigger variety expensive maintain expensive database execute therefore general constraints split domain key constraints much easier build database domain/key normal form convert lesser databases may contain numerous anomalies however successfully building domain/key normal form database remains difficult task even experienced database programmers thus domain/key normal form eliminates problems found databases tends costly normal form achieve however failing achieve domain/key normal form may carry long-term hidden costs due anomalies appear databases adhering lower normal forms time third normal form boyce–codd normal form fourth normal form fifth normal form special cases domain/key normal form either functional multi-valued join dependencies converted super keys domains normal forms unconstrained domain constraints satisfied however transforming higher normal form domain/key normal form always dependency-preserving transformation therefore always possible violation dknf occurs following table constraint linking wealthy person type net worth dollars even though deduce one constraint dictates eccentric millionaire evil millionaire net worth 1,000,000 999,999,999 inclusive eccentric billionaire evil billionaire net worth 1,000,000,000 higher constraint neither domain constraint key constraint therefore rely domain constraints key constraints guarantee inconsistent wealthy person type net worth dollars combination make way database dknf violation could eliminated altering wealthy person type domain make consist two values 'evil 'eccentric wealthy person status millionaire billionaire implicit net worth dollars useful information lost relationships impossible express foreign keys obvious violations dknf example parent id attribute points one several referenced tables depending second parent type attribute violates dknf
[ 5792, 5794, 5795, 2022, 6983, 2024, 2025, 2026, 7080, 10632, 4281, 3004 ]
None
6,783
2
IPhone_X:iphone x iphone x roman numeral x pronounced ten smartphone designed developed marketed apple inc eleventh generation iphone announced september 12 2017 alongside iphone 8 iphone 8 plus steve jobs theater apple park campus release date – november 3 2017 – marked iphone series tenth anniversary iphone x intended showcase apple considered technology future using glass stainless-steel form factor beze-less design shrinking bezels chin unlike many android phones first iphone use oled screen offer wireless charging home button replaced new type password authentication called face id using advanced technologies scan user face unlock device face-recognition capability also enabled emojis animated following user expression animoji bezel-less design iphone user interaction changed significantly using gestures navigate operating system rather home button used previous iphones time november 2017 launch price tag us 999 also made expensive iphone ever even higher prices internationally due additional local sales import taxes iphone x received mixed reviews display build quality universally praised camera also scored positively tests phone received particularly polarized reception due sensor housing notch top screen introduction all-new authentication method notch heavily mocked users social media although app developers responded either neutrally positively changes brought user experience apps games reviewers mixed reactions condemning others acknowledging unusual first moments use getting accustomed presence face id facial recognition praised simple setup criticized requiring direct eyes screen though option disabled within system preferences along iphone 6s plus variant iphone se iphone x discontinued september 12 2018 following announcement new iphone xs iphone xs max iphone xr devices result shelf life 10 months iphone x shortest ever tenure flagship device history iphone november 22 2018 apple reportedly resumed production iphone x due weak sales successors iphone x remains discontinued february 2019 apple started selling refurbished models 769 technology behind iphone x development five years far back 2012 rumors drastic iphone redesign began circulating around time iphone 7 announcement third quarter 2016 intensified homepod firmware leak july 2017 suggested apple would shortly release phone nearly bezel-less design lack physical home button facial recognition new features near-final development version ios 11 operating system also leaked september 2017 confirming new design features august 31 2017 apple invited journalists september 12 press event first public event held steve jobs theater company new apple park campus cupertino california iphone x unveiled keynote us 999 starting price expensive iphone launch price price even higher international markets due currency fluctuations import fees sales taxes unlocked version phone made available purchase united states december 5 2017 april 2018 federal communications commission divulged images unreleased gold-colored iphone x model opposed space gray silver color options iphone x ships divulged initial plans release gold option device however put hold due production issues apple released revised b model iphone x fixed nfc issues users japan china america iphone x 5.8-inch oled color-accurate screen supports dci-p3 wide color gamut srgb high dynamic range contrast ratio 1,000,000:1 super retina display true tone technology found ipad pro uses ambient light sensors adapt display white balance surrounding ambient light although iphone x feature promotion technology used displays second-generation ipad pro display delivers refresh rate 120hz sample touch input 120hz oled screen technology known negative trend burn-in effects particular elements consistently screen long periods time leave faint trace even new images appear apple acknowledged oled screens excluded issue writing support document also expected behavior greg joswiak apple vice president product marketing told tom guide oled panels apple used iphone x engineered avoid oversaturation colors using oled panels typically results made color adjustments subpixel -level refinements crisp lines round corners out-of-warranty servicing damages relating manufacturing defects screen repairs iphone x cost us 279 damage repairs cost us 549 iphone x two color options silver space gray sides phone composed surgical-grade stainless steel improve durability front back made glass design intended ip67 water dust resistant iphone x contains apple a11 bionic system-on-chip also used iphone 8 8 plus six-core processor two cores optimized performance 25 faster a10 fusion processor along four cores optimized efficiency 70 faster previous generation also features first apple-designed graphics processing unit neural engine powers artificial intelligence accelerator face id replaces touch id authentication system facial recognition sensor consists two parts romeo module projects 30,000 infrared dots onto user face juliet module reads pattern pattern sent secure enclave a11 bionic chip confirm match phone owner face default system work eyes closed effort prevent unauthorized access requirement disabled settings iphone x two cameras rear one 12-megapixel wide-angle camera f/1.8 aperture support face detection high dynamic range optical image stabilization capable capturing 4k video 24 30 60 frames per second 1080p video 30 60 120 240 frames per second secondary telephoto lens features 2× optical zoom 10× digital zoom aperture f/2.4 optical image stabilization portrait mode capable producing photos specific depth-of-field lighting effects also quad-led true tone flash 2× better light uniformity front phone 7-megapixel truedepth camera f/2.2 aperture features face detection hdr capture 1080p video 30 frames per second 720p video 240 frames per second exclusively allows use animoji animated emojis placed top user face intelligently react user facial expressions iphone x also supports qi-standard wireless charging tests conducted macrumors iphone x charging speed varies significantly depending types cables powerbanks adapters wireless chargers used due different screen layout ios developers required update apps make full use additional screen real estate changes include rounded corners sensor notch top screen indicator area bottom accessing home screen apple published human interface guidelines document explain areas focus discouraged developers attempting mask call special attention new changes additionally text within app needs configured properly reference face id rather touch id authentication technology used iphone x anticipation release phone major apps quickly updated support new changes brought iphone x though required changes cause delayed app updates major apps traditional home button found previous devices iphone lineup removed entirely replaced touch-based gestures wake device users tap display use side button access home screen users must swipe bottom display access multitasking window users must swipe similarly method accessing home screen stop finger middle screen causing app carousel appear iphone x rear camera received overall rating 97 dxomark camera testing company short highest score 99 awarded samsung galaxy s9+ smartphone google pixel 2 received rating 98 consumer reports non-profit independent organization aiming write impartial reviews consumer products ranked iphone x iphone 8 iphone 8 plus well samsung galaxy s8 s8+ note 8 due less durability shorter battery life although praised x camera highest-rated smartphone camera ever tested nilay patel verge praised display calling polished tight clean bright colorful criticized repeated lack headphone jack device fragility despite apple claims durability sensor notch calling ugly patel highlighted fact apps required updates fit new screen writing popular apps received updates time review resulting apps huge black borders resembling iphone 8 especially criticized positioning sensor notch holding phone landscape mode causing notch go somewhat forgettable element top status bar giant interruption side screen cameras given positive feedback maintaining detail low-light patel particularly praised animoji calling probably single best feature iphone x writing work work incredibly well finally wrote face id whole foundation iphone x stated generally works great though acknowledging occasional misstep users must actively move phone closer face compensate specifically criticized limited range face id authentication working holding phone 25–50 centimeters away face chris velazco engadget also praised display writing experience sensor notch goes weird first noticeable due action videos usually happening center build quality given particular acclaim called beautifully made device construction seamlessly connects front back glass stainless-steel frame velazco noted new gesture-based interaction takes time getting used particularly control center moved bottom top right display camera processor performance battery life also given positive thoughts heavily negative review dennis green business insider significantly criticized impossible one-handed use iphone x writing new gestures use phone swiping top access notifications control center work using phone one hand due able reach top review sparked outrage among twitter users many used condescending tones green reasoned n't know whether anger directed toward loyalty apple justify choice spend 1,000 phone obvious much criticism came people never used phone macworld roman loyola praised face id authentication system writing setup process easy system integration seamless touch id fingerprint authentication past said loyola note half-second slower unlocking time touch id well needing look directly screen making impossible unlock phone next user desk face id raised concerns regarding possibility law enforcement accessing individual phone pointing device user face united states senator al franken asked apple provide information security privacy face id day announcement apple responding highlighting recent publication security white paper knowledge base detailing answers inconsistent results shown testing face id identical twins tests showing system managing separate two tests failed however despite apple promise increased security face id compared touch id fingerprint authentication system multiple media reports indicating otherwise verge noted courts united states granted different fifth amendment rights united states constitution biometric unlocking systems opposed keycodes keycodes considered testimonial evidence based contents users thoughts whereas fingerprints considered physical evidence suspects ordered unlock phones via fingerprint many attempts break face id sophisticated masks attempted though failed week iphone x released vietnamese security firm bkav announced blog post successfully created 150 mask tricked face id though wired noted bkav technique proof-of-concept rather active exploitation risk technique requiring detailed measurement digital scan iphone owner face putting real risk danger targets espionage world leaders additionally reuters reported early november 2017 apple would share certain facial data users third-party app developers precise selfie filters fictional game characters mirror real-world user facial expressions although developers required seek customer permission allowed sell data others create profiles users use data advertising limited rough map rather full capabilities still get access 50 kinds facial expressions american civil liberties union aclu center democracy technology raised privacy questions apple enforcement privacy restrictions connected third-party access apple maintaining app store review processes effective safeguards rough map facial data third-parties access also enough unlock device according reuters however overall idea letting developers access sensitive facial information still satisfactorily handled according jay stanley senior policy analyst aclu stanley telling reuters privacy issues around use sophisticated facial recognition technology unlocking phone overblown … real privacy issues access third-party developers much debate iphone x revolved around design sensor housing dubbed notch media top display outline described visually disgusting element verge posted report focusing public criticism people mocking apple odd design choice every reviewer equally negative opinions third-party ios developers interviewed ars technica said despite work restructuring design elements apps notch cause problems even arguing notch good push simplify designs two weeks iphone x release apple approved notch remover app app store places black bars across top home screen make notch visually disappear approval done despite company user interface guidelines discouraging developers specifically masking design iphone x first device notch–both essential phone sharp aquos s2 announced display notch–but iphone x arguably popularized november 2017 early adopters new phone reported experiencing activation issues certain cellular carriers notably announced within hours issue fixed end spokesperson verizon carrier told media none customers affected despite reports problems november 2017 iphone x users reported reddit device screen would become unresponsive experiencing rapid temperature drops apple released ios 11.1.2 update november 16 2017 fixing issue forbes contributor gordon kelly reported march 2018 1,000 users experienced problems using camera flash cold weather problem still persisting ios 11.3 beta 1 apple engaged legal battle qualcomm allegedly anti-competitive practices dual-sourcing cellular modem chips reduce reliance semiconductor manufacturer starting iphone 7 2016 apple used half qualcomm modem chips half intel professional measurement tests performed wireless signal testing firm cellular insights indicated previous-gen iphone 7 qualcomm chips outperform intel lte download speeds 67 faster weak signal conditions resulting sources recommending purchase unlocked iphone x one bought cellular carrier verizon order get models featuring faster qualcomm modem additionally cnet reported september 2017 new iphone models including x 8 8 plus ability connect next-generation wireless lte data connection despite 10 new android devices including flagships main smartphone competitor samsung capability apple new smartphones support lte advanced theoretical peak speed 500 megabits per second android models ability connect gigabit lte allowing theoretical speeds 1 gigabit per second doubling apple speed releasing iphone x japan china customers experienced issues related phone nfc trying access public transit smart card readers april 2018 apple released revision iphone x included vastly improved nfc chip solved problem nfc reader errors cases previously around 1 3 nfc attempts would fail initial reports issue also affected users america
[ 10755, 9732, 1549, 5647, 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 6186, 4139, 6700, 7211, 1074, 8754, 9784, 1083, 8253, 576, 1090, 2630, 8783, 4180, 10838, 1623, 3672, 10840, 9312, 1121, 3681, 9826, 8806, 3691, 2673, 6258, 1...
Train
6,784
1
Data_item:data item data item describes atomic state particular object concerning specific property certain time point collection data items object time forms object instance table row type complex information broken elementary data items atomic state data items identified object property p time value v function p v f p values typically represented symbols like numbers texts images sounds videos others values necessarily atomic complexity value depends complexity property time component looking databases xml files object usually identified object name type object identifier part data properties defined columns table row properties object instance tags xml often time explicitly expressed attribute applying complete data set data collections provide time instance level time series column level even attribute/property level
[ 3146, 6959 ]
None
6,785
4
Symantec_Online_Backup:symantec online backup symantec online backup online remote backup service provides businesses system backing storing computer files internet released february 2008 symantec protection network platform symantec online backup example cloud computing saas software service sales symantec online backup discontinued january 2010
[ 9569, 4194, 6565, 1801, 6797, 7983, 467 ]
Test