node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
6,786 | 4 | Defensive_computing:defensive computing defensive computing form practice computer users help reduce risk computing problems avoiding dangerous computing practices primary goal method computing able anticipate prepare potentially problematic situations prior occurrence despite adverse conditions computer system mistakes made users achieved adherence variety general guidelines well practice specific computing techniques strategies defensive computing could divided two categories network security backup restoration data users put computers risk accessing internet networks use either allows others gain access user system important information implementing certain strategies defensive users aim reduce risk associated network access firewall collection security measures protects computer harmful inbound outbound traffic internet prevents unauthorized access computer systems security measures integrated form special software runs autonomously either individual computer systems externally built software within routers modems firewall software protect computers sending unauthorized harmful outbound traffic important defensive computing strategy seek implement quality firewall software filters inbound outbound traffic basic strategy defensive computer users install use anti-malware software firewalls may completely protect computer malicious software may able get firewall onto system anti-malware anti-virus anti-phishing email filtering software offer protection harmful software reside within computer amount malicious software available internet steadily increasing important defensive users use anti-malware effective easily updated order combat new strains malicious software developed side anti malware contains serious vulnerabilities malware could use vulnerabilities anti-malware launch malicious code anti-malware works scanning files network connections known signatures signatures never date able scan network connections encryptions ssl/tls need bypassed even broken anti-malware software monitoring emails anti-malware opens attachments analysis bug scanner used starting point malware attackers need send malware mailbox scanned automatically questionable malware scanners even useful ex mozilla developer rober o'callahan writes blog anti malware software disabled except windows defender important aspect defensive computing users skeptical data access via internet malicious software exist multitude different forms many misleading general computer users even anti-malware software defensive users think critically information access reduce chances downloading spreading malicious software strategies include scanning email attachments prior opening manually filtering suspicious emails inboxes users aware persuasive subject lines headings emails address may actually contain malicious software spam mislead users false advertisement resulting identity theft defensive users scan files download prior opening also configure computers show file extensions revealing potentially dangerous files appear harmless skepticism also applied websites visited users emails users led false advertisements also malicious software unknowingly downloaded infect computer visiting certain website despite efforts defensive computer user loss important data occur due malware power outages equipment failure general misuse although loss data completely prevented defensive users take steps minimize amount data lost restore systems previous state defensive strategy unintentional data loss regular backup important files users make multiple copies important data store either computer another device compact disc external hard drive users also upload important files internet provided access internet storage services operating systems give users option performing procedure restores computer predetermined state option available user obtain appropriate restoration software system event system failure serious case data loss user restore lost changed files remove malicious files previously exist | [
3072,
5764,
7044,
10245,
10756,
9227,
9356,
9102,
7441,
8978,
4863,
4883,
4245,
278,
9233,
10392,
1690,
3867,
9242,
10141,
5281,
9761,
2213,
3366,
5542,
8998,
9256,
939,
300,
9771,
1970,
4023,
10297,
3643,
6588,
7739,
8637,
9791,
1088,
33... | None |
6,787 | 2 | Xenix:xenix xenix discontinued version unix operating system various microcomputer platforms licensed microsoft corporation late 1970s santa cruz operation sco later acquired exclusive rights software eventually replaced sco unix known sco openserver mid-to-late 1980s xenix common unix variant measured according number machines installed microsoft chairman bill gates said 1996 long time microsoft highest-volume unix license bell labs developer unix part regulated bell system could sell unix directly end customers instead licensed software others microsoft expected unix would operating system future personal computers became powerful enough purchased license version 7 unix 1978 announced august 25 1980 would make available 16-bit microcomputer market microsoft able license unix name company gave original name microsoft called xenix universal operating environment sell xenix directly end users licensed software oems ibm intel management systems development tandy altos sco siemens sinix ported proprietary computer architectures 1981 microsoft said first version xenix close original unix version 7 source pdp-11 later versions incorporate fixes improvements company stated intended port operating system zilog z8000 series digital lsi-11 intel 8086 80286 motorola 68000 possibly numerous processors provide microsoft full line system software products including basic languages first port z8001 16-bit processor first customer ship january 1981 central data corporation illinois followed march 1981 paradyne corporation z8001 product first 8086 port altos computer systems non-pc-compatible 8600-series computers first customer ship date q1 1982 intel sold complete computers xenix intel system 86 brand specific models 86/330 86/380x also offered individual boards made computers isbc brand included processor boards like isbc 86/12 also mmu boards isbc 309 first intel xenix systems shipped july 1982 tandy doubled xenix installed base made trs-xenix default operating system trs-80 model 16 68000-based computer early 1983 largest unix vendor 1984 seattle computer products also made pc-incompatible 8086 computers bundled xenix like gazelle ii used s-100 bus available late 1983 early 1984 also port ibm system 9000 sco initially worked pdp-11 port v7 called dynix struck agreement microsoft joint development technology exchange xenix 1982 1984 port 68000-based apple lisa 2 jointly developed sco microsoft first shrink-wrapped binary product sold sco 1983 oem directory microsoft said difficulty porting various 8086 z8000-based machines lack standardized memory management unit protection facilities hardware manufacturers compensated designing hardware ensuing complexity made extremely difficult impossible small manufacturer develop computer capable supporting system xenix scratch xenix kernel must custom-tailored new hardware environment generally available port unmapped intel 8086/8088 architecture done santa cruz operation around 1983 sco xenix pc xt shipped sometime 1984 contained enhancement 4.2bsd also supported micnet local area networking later 286 version xenix leveraged integrated mmu present chip running 286 protected mode 286 xenix accompanied new hardware xenix oems example sperry pc/it ibm pc clone advertised capable supporting eight simultaneous dumb terminal users version xenix 2.0 still based version 7 unix version 3.0 upgraded unix system iii code base 1984 intel manual xenix 286 noted xenix kernel 10,000 lines time followed system v.2 codebase xenix 5.0 a.k.a xenix system v microsoft hopes xenix become preferred choice software production exchange company stated 1981 microsoft referred ms-dos single-user single-tasking operating system advised customers wanted multiuser multitasking support buy xenix planned time improve ms-dos would almost indistinguishable single-user xenix xedos would also run 68000 z8000 lsi-11 would upwardly compatible xenix byte 1983 described multi-user ms-dos future microsoft chris larson described ms-dos 2.0 xenix compatibility second important feature company advertised dos xenix together listing shared features single-user os multi-user multi-tasking unix-derived operating system promising easy porting started selling system v however breakup bell system microsoft believing could compete unix developer decided abandon xenix decision immediately transparent led term vaporware agreed ibm develop os/2 xenix team together best ms-dos developers assigned project 1987 microsoft transferred ownership xenix sco agreement left microsoft owning slightly less 20 sco amount prevented companies disclose exact amount event sco ipo microsoft eventually lost interest os/2 well company based high-end strategy windows nt 1987 sco ported xenix 386 processor 32-bit chip securing knowledge microsoft insiders microsoft longer developing xenix xenix system v release 2.3.1 introduced support i386 scsi tcp/ip sco xenix system v/386 first 32-bit operating system available market x86 cpu architecture microsoft continued use xenix internally submitting patch support functionality unix 1987 trickled code base xenix sco unix microsoft said used xenix sun workstations vax minicomputers extensively within company late 1988 internal microsoft email transport done xenix-based 68000 systems 1995–1996 company moved exchange server product sco released sco unix higher-end product based system v.3 offering number technical advances xenix xenix remained product line meantime sun microsystems completed merge xenix bsd sunos system v.3 system v release 4 last version sco xenix/386 system v.2.3.4 released 1991 aside unix base xenix incorporated elements bsd notably vi text editor supporting libraries termcap curses kernel featured original extensions microsoft notably file locking semaphores userland microsoft added visual shell menu-driven operation instead traditional unix shell limited form local networking serial lines rs-232 ports possible micnet software supported file transfer electronic mail although uucp still used networking via modems oems often added modifications xenix system trusted xenix variant initially developed ibm name secure xenix later versions trusted xenix name developed trusted information systems incorporated bell-lapadula model multilevel security multilevel secure interface stu-iii secure communications device stu-iii connection would made available applications running privilege level key loaded stu-iii evaluated formal methods achieved b2 security rating dod trusted computer system evaluation criteria—the second highest rating ever achieved evaluated operating system version 2.0 released january 1991 version 3.0 april 1992 version 4.0 september 1993 still use late 1995 | [
2560,
7682,
4114,
6675,
8725,
1561,
10273,
563,
7224,
9784,
2120,
6218,
2132,
1121,
1634,
11363,
7269,
6760,
8301,
9839,
633,
1148,
640,
2179,
132,
10886,
6797,
671,
7848,
3241,
3248,
10436,
8395,
9932,
4305,
1247,
6369,
9444,
8423,
11501... | Validation |
6,788 | 7 | WestGrid:westgrid westgrid government-funded infrastructure program started 2003 mainly western canada provides institutional research faculty students access high performance computing distributed data storage using combination grid networking collaboration tools westgrid one four partners within umbrella organization compute canada westgrid 14 partner institutions across four provinces british columbia alberta saskatchewan manitoba participating institutions include westgrid also works partnership province optical regional advanced network westgrid network partners include | [] | Test |
6,789 | 0 | LENA_Foundation:lena foundation lena developer advanced technology programs accelerate language development children 0-3 close opportunity gaps nonprofit organization uses technology system comprises lena device patented processing software secure cloud-based data access technology used cornerstone programs aimed increasing interactive talk children caregivers implemented community organizations around world lena system also used researchers universities harvard mit brown university stanford university hospitals research institutions used study subjects language builds children brains autism child language acquisition communication deaf hard hearing families lena research foundation nonprofit organization created 2009 donation assets infoture inc. terrance terry judith judi paul also majority owners renaissance learning inc. rli founder renaissance learning terry paul became familiar achievement gap caused differences home language environments 1998 read meaningful differences everyday lives young american children betty hart ph.d. todd risley ph.d. based data gathered intensive longitudinal study meaningful differences revealed number adult words spoken children birth three predicted almost variance children language ability iq age three terry realized help advanced speech recognition technology could streamline data acquisition process provide parents tool easy use could thoroughly chart child natural language environment called lena “ language environment analysis ” 2004 terry started infoture inc. hired team scientists engineers scientific advisors conduct research development work lena system infoture launched pilot version lena system february 2006 february 2009 pauls donated assets infoture gift 2 million create lena research foundation nonprofit organization january 2018 organization updated name lena adopted tagline building brains early talk lena organizational goals based science shows talk conversational engagements child experiences first four years life better academics society based research harvard university showing interactive talk children caregivers one important factors affecting early brain development new research mit published february 2018 confirmed conversational turns responsible activation broca area children lena several programs designed encourage interactive talk children caregivers including programs aimed parents childcare providers home visitors growing body research shows early childhood contains critical periods tasks language acquisition meaning first three years once-in-a-lifetime opportunity development early childhood development drives success school life fostering cognitive skills like attentiveness self-regulation motivation sociability interactive talk — specifically conversational turns — proved key factor stimulating brain growth important years according center developing child harvard university additionally longitudinal research lena found amount conversation children experience ages 18-24 months related iq verbal comprehension language skills adolescence investing early children lead huge social economic gains research shown investments young children lead reductions criminal activity later life 13 percent returns investment annually positive effects last several generations lena stands language environment analysis lena technology provides 25 different metrics natural language environment children including estimates percentile scores adult words spoken child conversational turns child vocalizations system also generates automatic expressive language developmental age percentile score based child voiceprint parent places lena device children lena vest records entire day child sound environment device connected computer special software processes recording data metrics including child exposure verbal stimulation number child utterances information pediatricians child height weight system also generates percentile scores comparing child vocalizations children age lena start program parents uses regular feedback lena system plus 13 weekly group sessions help improve home language environment since introduction 2015 lena start implemented school districts library systems types organizations huntsville ala. san mateo county calif. ames iowa longmont co. minneapolis minn. sites across country texas children hospital first regional healthcare center adopt model lena grow professional development program teachers work early childhood classrooms according lena website lena ’ talk reports teachers focus primarily conversational turns strong measure interactive talk training teachers increase conversational turns important children spend 60 percent time childcare program first piloted escambia county florida launching sites around country lena home supplement existing parent coaching curriculums typically home visitors facilitate use lena system help parents track progress towards increasing interactive talk homes lena sp version lena designed researchers language professionals use lena developmental snapshot based 52-question parent survey assesses expressive receptive language skills provides estimate child developmental age 2 months 36 months | [
10557
] | Train |
6,790 | 3 | Palm_V:palm v palm v personal digital assistant made palm computing division 3com functionally similar predecessor palm iii series pdas distinguished sleek design anodized aluminum finish built-in rechargeable battery first palm device palm v design created design firm ideo palm v series succeeded palm m500 series battery contacts back unit short circuited data stored device erased data held kind memory required power retaining data enthusiasts able fix issue adding diode one battery contacts charging device diode open short-circuit diode blocked short circuiting current | [
2308,
10500,
3606,
8982,
6178,
5164,
7983,
9013,
694,
5318,
3017,
11337,
9037,
2258,
1621,
4832,
4449,
2285,
1776,
2420,
8952,
7547,
9598
] | Test |
6,791 | 9 | Brendan_Eich:brendan eich brendan eich born july 4 1961 american technologist creator javascript programming language co-founded mozilla project mozilla foundation mozilla corporation served mozilla corporation chief technical officer briefly chief executive officer ceo brave software brendan eich grew palo alto attended ellwood p. cubberley high school graduated class 1979 eich received bachelor degree mathematics computer science santa clara university received master degree 1985 university illinois urbana-champaign eich started career silicon graphics working seven years operating system network code worked three years microunity systems engineering writing microkernel dsp code first mips r4000 port gcc started work netscape communications corporation april 1995 eich originally joined intending put scheme browser netscape superiors insisted language ’ syntax resemble java result language much functionality scheme object orientation self syntax java first version completed ten days order accommodate navigator 2.0 beta release schedule called mocha renamed livescript september 1995 later javascript month eich continued oversee development spidermonkey specific implementation javascript navigator early 1998 eich co-founded mozilla project jamie zawinski others creating mozilla.org website meant manage open-source contributions netscape source code served mozilla chief architect aol bought netscape 1999 aol shut netscape browser unit july 2003 eich helped spin mozilla foundation august 2005 serving lead technologist member board directors mozilla foundation eich became chief technical officer newly founded mozilla corporation meant mozilla foundation for-profit arm eich continued mozilla spidermonkey module javascript engine passed ownership 2011 march 24 2014 eich promoted ceo mozilla corporation gary kovacs john lilly ellen siminoff resigned mozilla board prior appointment anonymously expressing disagreements eich strategy desire ceo experience mobile industry employees mozilla foundation separate organization mozilla corporation tweeted calls resignation reference donation 1,000 california proposition 8 called banning same-sex marriage california eich stood decision fund campaign wrote blog sorry “ causing pain ” pledged promote equality mozilla activists created online campaign eich online dating site okcupid automatically displaying message firefox users information eich donation suggesting users switch different browser although giving link continue firefox others mozilla corporation spoke blogs favor board members wanted stay company different role april 3 2014 eich resigned ceo left mozilla personal blog posted present circumstances effective leader eich ceo brave software internet security company raised 2.5 million early funding angel investors january 20 2016 company released developer versions open-source brave web browser blocked ads trackers included micropayments system offer users choice viewing selected ads paying websites display brave software eich co-created basic attention token bat cryptocurrency designed use brave browser bat launched ico may 31 2017 raised 35 million | [
9736,
6154,
9757,
5677,
9281,
7234,
8262,
4171,
84,
6231,
603,
4189,
8289,
5219,
6252,
10860,
3184,
119,
4728,
637,
1664,
8854,
11418,
1698,
679,
1713,
3761,
1203,
7861,
11449,
5311,
7871,
7885,
7889,
4822,
8923,
7396,
4844,
10991,
8443,
... | Validation |
6,792 | 3 | Streaker_(video_game):streaker video game streaker arcade adventure game published mastertronic bulldog label 1987 game runs amstrad cpc msx sinclair zx spectrum hero game carlin naked man mugged stripped needs find clothes carlin town planet zuggi resembles town earth many ways locations including hotel cafe supermarket chemist shop streaker finds clothes able enter locations game fully dressed game arcade adventure somewhere puzzle-based adventure game action game gameplay controlled nested menu system mastertronic spellbound multitude items game many used seem purpose streaker pick keys open doors eat food items raise hunger levels needs solve number simple puzzles aspects life zuggi similar earth number fantastic elements world example streaker may teleport beam transfer using number different coloured beamers teleport streaker location corresponding beampad beampads moved streaker good way avoid thieves nice touches include streaker ability advance time acquiring stopwatch game played real time often need wait particular location open save load options appearing streaker picks tape recorder streaker quest made difficult presence number thieves steal streaker clothes contact cause lose life naked clothes may regained thieves finding offering thief item wants thieves follows despite rather unusual aim game seem prurient content therein 1980s young children occasionally unwittingly perplexed embarrassed teachers telling spent evening playing streaker | [
10931,
9006
] | Validation |
6,793 | 3 | Aleste_2:aleste 2 aleste 2 アレスタ2 scrolling shooter video game developed released compile msx2 1989 exclusively japan sequel aleste first game aleste series feature recurring series heroine ellinor later appeared musha aleste aleste 2 along compile shooters also released now-defunct woomb service 2009 projectegg released game digitally windows also english game takes place year 2039 two decades super computer dia51 attacked decimated earth long restoration period earth invaded race alien plant-like humanoids called vagand intent finding new food source earth first attack earth vagand destroys earth space cruiser commanded previous earth hero ray waizen plan invade earth challenged newest version aleste piloted daughter ray yuri waizen ellinor vowed avenge father death personally kill vagand leader gaizel retro gamer included among top ten msx games three aleste titles msx computers worth seeking chose aleste 2 looks superb allows select weapons start game first title canon feature reoccurring protagonist ellinor | [
5851,
10931
] | None |
6,794 | 4 | Client_certificate:client certificate cryptography client certificate type digital certificate used client systems make authenticated requests remote server client certificates play key role many mutual authentication designs providing strong assurances requester identity | [
8391,
8039,
4490,
6064,
6651
] | Train |
6,795 | 9 | Erik_Meijer_(computer_scientist):erik meijer computer scientist erik meijer born 18 april 1963 curaçao dutch computer scientist entrepreneur tie-dye enthusiast 2000 early 2013 software architect microsoft headed cloud programmability team founded applied duality inc. 2013 associate professor utrecht university since 2015 director engineering facebook received ph.d. nijmegen university 1992 meijer research included areas functional programming particularly haskell compiler implementation parsing programming language design xml foreign function interfaces work microsoft included c visual basic linq volta reactive programming framework reactive extensions .net 2009 recipient microsoft outstanding technical leadership award 2007 outstanding technical achievement award member c team meijer lived netherlands antilles age 14 father retired job family moved back netherlands 2011 erik meijer appointed part-time professor cloud programming within software engineering research group delft university technology also member acm queue editorial board since 2013 also honorary professor programming language design school computer science university nottingham associated functional programming laboratory early 2013 erik meijer left microsoft started applied duality incorporated period worked hack language facebook rxjava library netflix dart language google christmas 2014 erik meijer diagnosed chronic myelogenous leukemia suffered close death experience hospitalized teaches course mooc provider coursera called principles reactive programming course edx called introduction functional programming | [
1952,
8059,
3876,
7147,
1203,
1591,
1051,
5399,
479
] | Test |
6,796 | 4 | Arcserve:arcserve arcserve provider data protection replication recovery solutions enterprise mid-market businesses arcserve founded 1983 cheyenne software software vendor ca technologies known computer associates acquired cheyenne 1996 continued develop market arcserve product brand arcserve first developed product used back software programs ensure data network could lost major function first release automatically copy information system mishaps power failures equipment malfunctions would destroy erase early nineties arcserve became cheyenne flagship product massive growth sales cheyenne brought improved version core program arcserve 1993 began distribution original equipment manufacturers oems mid-nineties cheyenne continued release series new arcserve products tailored specifically different market segments macintosh windows users software vendor ca technologies known computer associates acquired cheyenne 1996 continued develop market arcserve product brand august 2014 arcserve became independent company marlin equity partners acquired business ca technologies released first product named arcserve unified data protection udp arcserve provides largest independent software vendor isv developed backup software products market supports wide variety platforms applications arcserve unified data protection udp offered fully integrated software set-and-forget virtual physical appliances arcserve r cloud april 26 2017 arcserve announced acquisition email archiving technology named arcserve udp archiving july 11 2017 arcserve announced acquisition zetta cloud-based disaster recovery solutions provider offers direct-to-cloud draas baas arcserve udp cloud direct | [
6993,
7983,
1358,
735
] | None |
6,797 | 2 | Microsoft_Windows:microsoft windows microsoft windows group several graphical operating system families developed marketed sold microsoft family caters certain sector computing industry active microsoft windows families include windows nt windows iot may encompass subfamilies e.g windows server windows embedded compact windows ce defunct microsoft windows families include windows 9x windows mobile windows phone microsoft introduced operating environment named windows november 20 1985 graphical operating system shell ms-dos response growing interest graphical user interfaces guis microsoft windows came dominate world personal computer pc market 90 market share overtaking mac os introduced 1984 apple came see windows unfair encroachment innovation gui development implemented products lisa macintosh eventually settled court microsoft favor 1993 pcs windows still popular operating system however 2014 microsoft admitted losing majority overall operating system market android massive growth sales android smartphones 2014 number windows devices sold less 25 android devices sold comparison however may fully relevant two operating systems traditionally target different platforms still numbers server use windows comparable competitors show one third market share similar end user use recent version windows pcs tablets smartphones embedded devices windows 10 recent version server computers windows server version 1903 specialized version windows also runs xbox one video game console microsoft developer windows registered several trademarks denote family windows operating systems target specific sector computing industry 2014 following windows families actively developed following windows families longer developed term windows collectively describes several generations microsoft operating system products products generally categorized follows history windows dates back 1981 microsoft started work program called interface manager announced november 1983 apple lisa macintosh name windows windows 1.0 released november 1985 windows 1.0 compete apple operating system achieved little popularity windows 1.0 complete operating system rather extends ms-dos shell windows 1.0 program known ms-dos executive components included calculator calendar cardfile clipboard viewer clock control panel notepad paint reversi terminal write windows 1.0 allow overlapping windows instead windows tiled modal dialog boxes may appear windows microsoft sold included windows development libraries c development environment included numerous windows samples windows 2.0 released december 1987 popular predecessor features several improvements user interface memory management windows 2.03 changed os tiled windows overlapping windows result change led apple computer filing suit microsoft alleging infringement apple copyrights windows 2.0 also introduced sophisticated keyboard shortcuts could make use expanded memory windows 2.1 released two different versions windows/286 windows/386 windows/386 uses virtual 8086 mode intel 80386 multitask several dos programs paged memory model emulate expanded memory using available extended memory windows/286 spite name runs intel 8086 intel 80286 processors runs real mode make use high memory area addition full windows-packages runtime-only versions shipped early windows software third parties made possible run windows software ms-dos without full windows feature set early versions windows often thought graphical shells mostly ran top ms-dos use file system services however even earliest windows versions already assumed many typical operating system functions notably executable file format providing device drivers timer graphics printer mouse keyboard sound unlike ms-dos windows allowed users execute multiple graphical applications time cooperative multitasking windows implemented elaborate segment-based software virtual memory scheme allows run applications larger available memory code segments resources swapped thrown away memory became scarce data segments moved memory given application relinquished processor control windows 3.0 released 1990 improved design mostly virtual memory loadable virtual device drivers vxds allow windows share arbitrary devices multi-tasked dos applications windows 3.0 applications run protected mode gives access several megabytes memory without obligation participate software virtual memory scheme run inside address space segmented memory provides degree protection windows 3.0 also featured improvements user interface microsoft rewrote critical operations c assembly windows 3.0 first microsoft windows version achieve broad commercial success selling 2 million copies first six months windows 3.1 made generally available march 1 1992 featured facelift august 1993 windows workgroups special version integrated peer-to-peer networking features version number 3.11 released sold along windows 3.1 support windows 3.1 ended december 31 2001 windows 3.2 released 1994 updated version chinese version windows 3.1 update limited language version fixed issues related complex writing system chinese language windows 3.2 generally sold computer manufacturers ten-disk version ms-dos also simplified chinese characters basic output translated utilities next major consumer-oriented release windows windows 95 released august 24 1995 still remaining ms-dos-based windows 95 introduced support native 32-bit applications plug play hardware preemptive multitasking long file names 255 characters provided increased stability predecessors windows 95 also introduced redesigned object oriented user interface replacing previous program manager start menu taskbar windows explorer shell windows 95 major commercial success microsoft ina fried cnet remarked time windows 95 finally ushered market 2001 become fixture computer desktops around world microsoft published four oem service releases osr windows 95 roughly equivalent service pack first osr windows 95 also first version windows bundled microsoft web browser internet explorer mainstream support windows 95 ended december 31 2000 extended support windows 95 ended december 31 2001 windows 95 followed release windows 98 june 25 1998 introduced windows driver model support usb composite devices support acpi hibernation support multi-monitor configurations windows 98 also included integration internet explorer 4 active desktop aspects windows desktop update series enhancements explorer shell also made available windows 95 may 1999 microsoft released windows 98 second edition updated version windows 98 windows 98 se added internet explorer 5.0 windows media player 6.2 amongst upgrades mainstream support windows 98 ended june 30 2002 extended support windows 98 ended july 11 2006 september 14 2000 microsoft released windows millennium edition last dos-based version windows windows incorporated visual interface enhancements windows nt-based counterpart windows 2000 faster boot times previous versions however required removal ability access real mode dos environment removing compatibility older programs expanded multimedia functionality including windows media player 7 windows movie maker windows image acquisition framework retrieving images scanners digital cameras additional system utilities system file protection system restore updated home networking tools however windows faced criticism speed instability along hardware compatibility issues removal real mode dos support pc world considered windows one worst operating systems microsoft ever released 4th worst tech product time november 1988 new development team within microsoft included former digital equipment corporation developers dave cutler mark lucovsky began work revamped version ibm microsoft os/2 operating system known nt os/2 nt os/2 intended secure multi-user operating system posix compatibility modular portable kernel preemptive multitasking support multiple processor architectures however following successful release windows 3.0 nt development team decided rework project use extended 32-bit port windows api known win32 instead os/2 win32 maintained similar structure windows apis allowing existing windows applications easily ported platform also supported capabilities existing nt kernel following approval microsoft staff development continued windows nt first 32-bit version windows however ibm objected changes ultimately continued os/2 development first release resulting operating system windows nt 3.1 named associate windows 3.1 released july 1993 versions desktop workstations servers windows nt 3.5 released september 1994 focusing performance improvements support novell netware followed windows nt 3.51 may 1995 included additional improvements support powerpc architecture windows nt 4.0 released june 1996 introducing redesigned interface windows 95 nt series february 17 2000 microsoft released windows 2000 successor nt 4.0 windows nt name dropped point order put greater focus windows brand next major version windows nt windows xp released october 25 2001 introduction windows xp aimed unify consumer-oriented windows 9x series architecture introduced windows nt change microsoft promised would provide better performance dos-based predecessors windows xp would also introduce redesigned user interface including updated start menu task-oriented windows explorer streamlined multimedia networking features internet explorer 6 integration microsoft .net passport services modes help provide compatibility software designed previous versions windows remote assistance functionality retail windows xp marketed two main editions home edition targeted towards consumers professional edition targeted towards business environments power users included additional security networking features home professional later accompanied media center edition designed home theater pcs emphasis support dvd playback tv tuner cards dvr functionality remote controls tablet pc edition designed mobile devices meeting specifications tablet computer support stylus pen input additional pen-enabled applications mainstream support windows xp ended april 14 2009 extended support ended april 8 2014 windows 2000 microsoft also changed release schedules server operating systems server counterpart windows xp windows server 2003 released april 2003 followed december 2005 windows server 2003 r2 lengthy development process windows vista released november 30 2006 volume licensing january 30 2007 consumers contained number new features redesigned shell user interface significant technical changes particular focus security features available number different editions subject criticism drop performance longer boot time criticism new uac stricter license agreement vista server counterpart windows server 2008 released early 2008 july 22 2009 windows 7 windows server 2008 r2 released rtm release manufacturing former released public 3 months later october 22 2009 unlike predecessor windows vista introduced large number new features windows 7 intended focused incremental upgrade windows line goal compatible applications hardware windows vista already compatible windows 7 multi-touch support redesigned windows shell updated taskbar home networking system called homegroup performance improvements windows 8 successor windows 7 released generally october 26 2012 number significant changes made windows 8 including introduction user interface based around microsoft metro design language optimizations touch-based devices tablets all-in-one pcs changes include start screen uses large tiles convenient touch interactions allow display continually updated information new class apps designed primarily use touch-based devices changes include increased integration cloud services online platforms social networks microsoft onedrive formerly skydrive xbox live services windows store service software distribution new variant known windows rt use devices utilize arm architecture update windows 8 called windows 8.1 released october 17 2013 includes features new live tile sizes deeper onedrive integration many revisions windows 8 windows 8.1 subject criticism removal start menu september 30 2014 microsoft announced windows 10 successor windows 8.1 released july 29 2015 addresses shortcomings user interface first introduced windows 8 changes pc include return start menu virtual desktop system ability run windows store apps within windows desktop rather full-screen mode windows 10 said available update qualified windows 7 sp1 windows 8.1 windows phone 8.1 devices get windows 10 application windows 7 windows 8.1 windows update windows 7 february 2017 microsoft announced migration windows source code repository perforce git migration involved 3.5 million separate files 300 gigabyte repository may 2017 90 percent engineering team uses git 8500 commits 1760 windows builds per day multilingual support built windows since windows 3 language keyboard interface changed region language control panel components supported input languages input method editors automatically installed windows installation windows xp earlier files east asian languages chinese right-to-left scripts arabic may need installed separately also said control panel third-party imes may also installed user feels provided one insufficient needs interface languages operating system free download languages limited certain editions windows language interface packs lips redistributable may downloaded microsoft download center installed edition windows xp later translate windows interface require certain base language language windows originally shipped used languages emerging markets full language packs translates complete operating system available specific editions windows ultimate enterprise editions windows vista 7 editions windows 8 8.1 rt except single language require specific base language commonly used popular languages french chinese languages downloaded download center available optional updates windows update service except windows 8 interface language installed applications affected changes windows interface language availability languages depends application developers windows 8 windows server 2012 introduces new language control panel interface input languages simultaneously changed language packs regardless type downloaded central location pc settings app windows 8.1 windows server 2012 r2 also includes counterpart settings page changing interface language also changes language preinstalled windows store apps mail maps news certain microsoft-developed apps remote desktop limitations language packs however still effect except full language packs installed edition except single language caters emerging markets windows nt included support several different platforms x86-based personal computer became dominant professional world windows nt 4.0 predecessors supported powerpc dec alpha mips r4000 although platforms implement 64-bit computing operating system treated 32-bit however windows 2000 successor windows nt 4.0 dropped support platforms except third generation x86 known ia-32 newer 32-bit mode client line windows nt family still runs ia-32 although windows server line ceased supporting platform release windows server 2008 r2 introduction intel itanium architecture ia-64 microsoft released new versions windows support itanium versions windows xp windows server 2003 released time mainstream x86 counterparts windows xp 64-bit edition released 2005 last windows client operating systems support itanium windows server line continues support platform windows server 2012 windows server 2008 r2 last windows operating system support itanium architecture april 25 2005 microsoft released windows xp professional x64 edition windows server 2003 x64 editions support x86-64 simply x64 eighth generation x86 architecture windows vista first client version windows nt released simultaneously ia-32 x64 editions x64 still supported edition windows 8 known windows rt specifically created computers arm architecture arm still used windows smartphones windows 10 tablets windows rt updated starting windows 10 fall creators update later includes support pcs arm architecture windows ce officially known windows embedded compact edition windows runs minimalistic computers like satellite navigation systems mobile phones windows embedded compact based dedicated kernel dubbed windows ce kernel microsoft licenses windows ce oems device makers oems device makers modify create user interfaces experiences windows ce provides technical foundation windows ce used dreamcast along sega proprietary os console windows ce core windows mobile derived successor windows phone 7 based components windows ce 6.0 r3 windows ce 7.0 windows phone 8 however based nt-kernel windows 8 windows embedded compact confused windows xp embedded windows nt 4.0 embedded modular editions windows based windows nt kernel xbox os unofficial name given version windows runs xbox one specific implementation emphasis virtualization using hyper-v three operating systems running consisting core operating system second implemented games windows-like environment applications microsoft updates xbox one os every month updates downloaded xbox live service xbox subsequently installed using offline recovery images downloaded via pc windows 10-based core replaced windows 8-based one update new system sometimes referred windows 10 xbox one onecore xbox one system also allows backward compatibility xbox 360 xbox 360 system backwards compatible original xbox 2017 microsoft announced would start using git open source version control system created linus torvalds microsoft previously used proprietary version control system called source depot microsoft began integrate git team foundation server 2013 windows continued rely source depot however decision came complexity windows codebase especially well suited decentralized nature linux development git originally created manage git repository contains complete history files proved unworkable windows developers cloning repository takes several hours microsoft working new project called virtual file system git vfsforgit address challenges according net applications tracks use operating systems devices active web windows used operating-system family personal computers july 2017 close 90 usage share including personal computers kinds e.g. desktops laptops mobile devices windows oses accounted 35.24 usage share july 2017 compared android highest 41.24 ios 13.22 macos 4.64 according statcounter tracks use operating systems use devices active web windows used less half market developing countries also developed ones—such united states use windows desktops plurality operating system fallen 46.18 united kingdom ireland numbers easiest monthly numbers find track real use may mirror installed base sales numbers recent years devices consistent server numbers next section terms number devices shipped operating system installed smartphones windows phone third-most-shipped os 2.6 android 82.8 ios 13.9 second quarter 2015 according idc across pcs mobile devices 2014 windows oses second-most-shipped 333 million devices 14 android 1.2 billion 49 ahead ios macos combined 263 million 11 use latest version windows 10 exceeded windows 7 globally since early 2018 developed countries japan australia us windows 10 already popular version since early 2017 usage share windows serversthose running web servers also kinds servers 33.6 consumer versions windows originally designed ease-of-use single-user pc without network connection security features built outset however windows nt successors designed security including network multi-user pcs initially designed internet security mind much since first developed early 1990s internet use less prevalent design issues combined programming errors e.g buffer overflows popularity windows means frequent target computer worm virus writers june 2005 bruce schneier counterpane internet security reported seen 1,000 new viruses worms previous six months 2005 kaspersky lab found around 11,000 malicious programs—viruses trojans back-doors exploits written windows microsoft releases security patches windows update service approximately month usually second tuesday month although critical updates made available shorter intervals necessary versions windows including windows 2000 sp3 windows xp updates automatically downloaded installed user selects result service pack 2 windows xp well service pack 1 windows server 2003 installed users quickly otherwise might windows 9x series offered option profiles multiple users concept access privileges allow concurrent access true multi-user operating systems addition implemented partial memory protection accordingly widely criticised lack security windows nt series operating systems contrast true multi-user implement absolute memory protection however lot advantages true multi-user operating system nullified fact prior windows vista first user account created setup process administrator account also default new accounts though windows xp limited accounts majority home users change account type fewer rights – partially due number programs unnecessarily required administrator rights – home users ran administrator time windows vista changes introducing privilege elevation system called user account control logging standard user logon session created token containing basic privileges assigned way new logon session incapable making changes would affect entire system logging user administrators group two separate tokens assigned first token contains privileges typically awarded administrator second restricted token similar standard user would receive user applications including windows shell started restricted token resulting reduced privilege environment even administrator account application requests higher privileges run administrator clicked uac prompt confirmation consent given including administrator credentials account requesting elevation member administrators group start process using unrestricted token leaked documents published wikileaks codenamed vault 7 dated 2013–2016 detail capabilities cia perform electronic surveillance cyber warfare ability compromise operating systems microsoft windows august 2019 computer experts reported bluekeep security vulnerability potentially affects older unpatched microsoft windows versions via program remote desktop protocol allowing possibility remote code execution may include related flaws collectively named dejablue affecting newer windows versions i.e. windows 7 recent versions well addition experts reported microsoft security vulnerability based legacy code involving microsoft ctf ctfmon ctfmon.exe affects windows versions older windows xp version recent windows 10 versions patch correct flaw currently available windows versions windows nt 3 based file system permission system referred agdlp accounts global local permissions file permissions applied file/folder form 'local group 'global groups members global groups hold groups users depending different windows versions used system varies vendor products linux netware due 'static allocation permission applied directory file folder however using process aglp/agdlp/agudlp allows small number static permissions applied allows easy changes account groups without reapplying file permissions files folders january 6 2005 microsoft released beta version microsoft antispyware based upon previously released giant antispyware february 14 2006 microsoft antispyware became windows defender release beta 2 windows defender freeware program designed protect spyware unwanted software windows xp windows server 2003 users genuine copies microsoft windows freely download program microsoft web site windows defender ships part windows vista 7 windows 8 windows defender microsoft security essentials combined single program named windows defender based microsoft security essentials borrowing features user interface although enabled default turned use another anti-virus solution windows malicious software removal tool optional microsoft safety scanner two free security products offered microsoft windows 10 anniversary update microsoft introduced limited periodic scanning feature allows windows defender scan detect remove threats third-party anti-virus software missed advanced threat protection service introduced enterprise users new service uses cloud service detect take actions advanced network attacks article based report symantec internetnews.com described microsoft windows fewest number patches shortest average patch development time five operating systems monitored last six months 2006 study conducted kevin mitnick marketing communications firm avantgarde 2004 found unprotected unpatched windows xp system service pack 1 lasted four minutes internet compromised unprotected also unpatched windows server 2003 system compromised connected internet 8 hours computer running windows xp service pack 2 compromised aol national cyber security alliance online safety study october 2004 determined 80 windows users infected least one spyware/adware product much documentation available describing increase security microsoft windows products typical suggestions include deploying microsoft windows behind hardware software firewall running anti-virus anti-spyware software installing patches become available windows update owing operating system popularity number applications released aim provide compatibility windows applications either compatibility layer another operating system standalone system run software written windows box include | [
1,
8197,
8199,
9,
8204,
13,
8206,
18,
8211,
8213,
25,
8225,
8227,
8228,
44,
8243,
8247,
57,
61,
8254,
8255,
8258,
75,
76,
79,
81,
83,
85,
8278,
8281,
97,
8290,
100,
8294,
8295,
8296,
8298,
107,
8299,
8301,
8303,
8304,
115,
117,
... | Train |
6,798 | 0 | Google_Neural_Machine_Translation:google neural machine translation google neural machine translation gnmt neural machine translation nmt system developed google introduced november 2016 uses artificial neural network increase fluency accuracy google translate gnmt improves quality translation applying example based ebmt machine translation method system learns millions examples gnmt proposed architecture system learning first tested hundred languages supported google translate large end-to-end framework system learns time create better natural translations gnmt capable translating whole sentences time rather piece piece gnmt network undertake interlingual machine translation encoding semantics sentence rather memorizing phrase-to-phrase translations google brain project established 2011 secretive google x research lab google fellow jeff dean google researcher greg corrado stanford university computer science professor andrew ng ng ’ work led biggest breakthroughs google stanford september 2016 research team google announced development google neural machine translation system gnmt november google translate began using neural machine translation nmt preference previous statistical methods smt used since october 2007 proprietary in-house smt technology google translate nmt system uses large artificial neural network capable deep learning using millions examples gnmt improves quality translation using broader context deduce relevant translation result rearranged adapted approach grammatically based human language gnmt proposed architecture system learning first tested hundred languages supported google translate gnmt create universal interlingua rather aimed commonality found many languages considered interest psychologists linguists computer scientists new translation engine first enabled eight languages english french german spanish portuguese chinese japanese korean turkish 2016 march 2017 three additional languages enabled russian hindi vietnamese along thai support added later support hebrew arabic also added help google translate community month mid april 2017 google netherlands announced support dutch european languages related english support added nine indian languages viz hindi bengali marathi gujarati punjabi tamil telugu malayalam kannada end april 2017 list language translation pairs supported google translate neural machine translation nmt model july 2017 languages currently support translation english gnmt system said represent improvement former google translate able handle zero-shot translation directly translates one language another example japanese korean google translate previously first translated source language english translated english target language rather translating directly one language another currently non-english language pairs supported | [
5122,
2440,
2059,
3085,
11538,
1044,
5399,
538,
7599,
4531,
4662,
3127,
2488,
10557,
3646,
6208,
8514,
3533,
5197,
6223,
10452,
8538,
2781,
8440,
2273,
1890,
5857,
7780,
7918,
8046,
8688,
10231,
2680,
7164
] | Train |
6,799 | 3 | PlayStation_2_technical_specifications:playstation 2 technical specifications playstation 2 technical specifications describe various components playstation 2 ps2 video game console sixth-generation hardware playstation 2 video game console consists various components heart console configuration central processing unit cpu custom risc processor known emotion engine operates 294 mhz 300 mhz later consoles cpu heavily relies integration two vector processing units known vpu0 vpu1 graphics synthesizer floating-point unit fpu order render 3d graphics components system dvd-rom optical drive dualshock 2 controller provide software user control input playstation 2 software distributed cd-rom dvd-rom addition console play audio cds dvd movies backwards compatible original playstation games accomplished inclusion original playstation cpu also serves ps2 i/o processor ps2 also supports limited functionality original playstation memory cards controllers ps2 dualshock 2 controller upgraded version playstation dualshock analog face shoulder d-pad buttons replacing digital buttons original like predecessor dualshock 2 controller features force feedback technology standard playstation 2 memory card 8 mb capacity uses sony magicgate encryption requirement prevented production memory cards third parties purchase magicgate license memory cards without encryption used store playstation game saves playstation games would unable read write card – card could used backup variety non-sony manufactured memory cards available playstation 2 allowing larger memory capacity standard 8 mb however use unsupported compatibility guaranteed memory cards 128 mb storage space console also features usb ieee 1394 expansion ports compatibility usb ieee 1394 devices dependent software supporting device example ps2 bios boot iso image usb flash drive operate usb printer machine operating system include functionality contrast gran turismo 4 tourist trophy programmed save screenshots usb mass storage device print images certain usb printers playstation 2 hdd installed via expansion bay back console required play certain games notably popular final fantasy xi replaced powerpc-based deckard iop 4 mb sdram starting scph-7500x | [
4098,
643,
9091,
3077,
11398,
10761,
528,
9508,
3366,
6311,
9126,
9512,
684,
3629,
9391,
306,
1587,
1461,
7234,
1091,
9543,
10056,
6732,
10316,
2383,
6738,
6873,
859,
4060,
1501,
607,
5215,
9441,
359,
8937,
1776,
3824,
5746,
7028,
8700,
... | Test |
6,800 | 4 | Google_App_Runtime_for_Chrome:google app runtime chrome android runtime chrome arc discontinued compatibility layer sandboxing technology running android applications desktop laptop computers isolated environment allowed applications safely run web browser independent user operating system near-native speeds since discontinued google developed another method run android apps chrome os devices android runtime chrome partially open-sourced project development google announced sundar pichai google i/o 2014 developer conference limited beta consumer release september 2014 duolingo evernote sight words vine android applications made available chrome web store installation chromebook devices running os version 37 higher development google taking place behind closed doors individual repository commits code reviews issue tracking kept internal company open sourced parts arc licensed bsd-style license limited beta consumer release september 2014 duolingo evernote sight words vine android applications made available chrome web store installation chromebook devices running os version 37 higher october 2014 three apps added cloudmagic onefootball podcast addict march 2015 anandtech reported vlc media player added coming months april 1 2015 google released arc welder chrome packaged app providing arc runtime application packager intended give android developers preview upcoming technology chance test android apps chrome platform arc builds upon google native client native client platform extended posix-compatible layer top nacl integrated runtime pepper apis emulate linux environment foundation android phone allows running almost unchanged dalvik vm sandboxed environment arc uses chrome permission system android one according security evaluation meng xu arc apps may communicate installed chrome extensions files stored underlying operating system might open avenues various attacks threats mitigated heavily sandboxed environment arc second half 2014 developer tools documentation released google several community efforts arc appeared vlad filippov maintains archon unofficial distribution arc runtime installed non-chromebook computers developer also maintains javascript nodejs tool automate packaging android apps use arc developers created user-friendly tools beyond chromeos-apk simplify packaging applications arcon runtime first chrome packaged app called twerk android application arcon packager used named chrome apk packager name changed google request active reddit community maintains list android apps work arcon runtime vlad filippov published guide run opera mini inside chromium browser reception mostly positive developers expressed confusion wide scale competing development platforms google offers web apps chrome packaged apps android apps delivered arc google responded fully committed platforms encourage developers choose one fits best | [
4995,
5892,
3462,
7816,
6797,
5262,
8719,
5524,
7700,
10645,
8858,
1435,
10525,
2978,
4901,
1959,
3499,
10284,
5677,
7983,
1203,
823,
5431,
7359,
196,
3269,
3782,
11590,
4683,
11343,
3664,
3795,
1240,
8413,
6367,
2658,
6632,
9320,
5483,
2... | Test |
6,801 | 3 | Wirth's_law:wirth law wirth law adage computer performance states software getting slower rapidly hardware becoming faster adage named niklaus wirth discussed 1995 article plea lean software wirth attributed saying martin reiser preface book oberon system wrote hope progress hardware cure software ills however critical observer may observe software manages outgrow hardware size sluggishness observers noted time indeed trend becoming obvious early 1987 states two contributing factors acceptance ever-growing software rapidly growing hardware performance customers ignorance features essential versus nice-to-have enhanced user convenience functionality supposedly justify increased size software wirth argues people increasingly misinterpreting complexity sophistication details cute essential hidden cost result calls creation leaner software pioneered development oberon software system developed 1986 1989 based nothing hardware primary goal show software developed fraction memory capacity processor power usually required without sacrificing flexibility functionality user convenience law restated 2009 attributed larry page founder google referred page law first use name attributed sergey brin google i/o conference 2009 common forms use names leading hardware software companies 1990s intel microsoft ceos andy grove bill gates intel giveth microsoft taketh away andy giveth bill taketh away gates law speed software halves every 18 months variant wirth law borrowing name bill gates co-founder microsoft observation speed commercial software generally slows 50 every 18 months thereby negating benefits moore law could occur variety reasons featuritis code cruft developer laziness management turnover whose design philosophy coincide previous manager may law named david may variant stating software efficiency halves every 18 months compensating moore law | [
6656,
2273,
6979,
5798,
5802,
78,
8367,
4208,
785,
1778,
153,
7006,
7775
] | None |
6,802 | 9 | Not_Quite_C:quite c quite c nqc programming language application programming interface api native bytecode compiler toolkit lego mindstorms cybermaster lego spybotics systems based primarily c language specific limitations maximum number subroutines variables allowed differ depending version firmware rcx language invented david baum released two books subject simple test program written nqc rcx motor connected output port could look like thus motor go full speed two seconds turned nqc legal tournaments sanctioned first number teams complained far without success nqc compilers integrated development environments ides available many platforms including microsoft windows mac os x linux beos dos one bricx command center compiler sources ide sources | [
1952,
8262,
6797,
10964,
823,
2045,
5790
] | Validation |
6,803 | 2 | Adam_Leventhal_(programmer):adam leventhal programmer adam leventhal born 1979 united states american software engineer one three authors dtrace dynamic tracing facility solaris 10 sun microsystems latest os allows users observe debug tune system behavior real time available public since november 2003 dtrace since used find opportunities performance improvements production environments adam joined solaris kernel development team graduating cum laude brown university 2001 b.sc math computer science 2006 adam dtrace colleagues chosen gold winners wall street journal technology innovation awards contest panel judges representing industry well research academic institutions year sun microsystems acquired oracle corp leventhal announced leaving company served chief technology officer delphix 2010 2016 | [
9665,
7983,
11506,
8599,
8671
] | Train |
6,804 | 3 | Bonnell_(microarchitecture):bonnell microarchitecture bonnell cpu microarchitecture used intel atom processors execute two instructions per cycle like many x86 microprocessors translates x86 instructions cisc instructions simpler internal operations sometimes referred micro-ops effectively risc style instructions prior execution majority instructions produce one micro-op translated around 4 instructions used typical programs producing multiple micro-ops number instructions produce one micro-op significantly fewer p6 netburst microarchitectures bonnell microarchitecture internal micro-ops contain memory load memory store connection alu operation thus similar x86 level powerful micro-ops used previous designs enables relatively good performance two integer alus without instruction reordering speculative execution register renaming side effect speculative execution invulnerability meltdown spectre bonnell microarchitecture therefore represents partial revival principles used earlier intel designs p5 i486 sole purpose enhancing performance per watt ratio however hyper-threading implemented easy i.e low-power way employ whole pipeline efficiently avoiding typical single thread dependencies 2 march 2008 intel announced new single-core atom z5xx series processor code-named silverthorne used ultra-mobile pcs mobile internet devices mids supersede stealey a100 a110 processor 47 million transistors 25 mm die allowing extremely economical production ~2500 chips single 300 mm diameter wafer atom z500 processor dual-thread performance equivalent predecessor stealey outperform applications use simultaneous multithreading sse3 run 0.8 2.0 ghz tdp rating 0.65 2.4 w dip 0.01 w idle feature 32 kb instruction l1 24 kb data l1 caches 512 kb l2 cache 533 mt/s front-side bus processors manufactured 45 nm process 2 march 2008 intel announced lower-power variants diamondville cpu named atom n2xx intended use nettops classmate pc like predecessors single-core cpus hyper-threading n270 tdp rating 2.5 w runs 1.6 ghz 533 mhz fsb n280 clock speed 1.66 ghz 667 mhz fsb 22 september 2008 intel announced new 64-bit dual-core processor unofficially code-named dual diamondville branded atom 330 used desktop computers runs 1.6 ghz fsb speed 533 mhz tdp rating 8 w. dual core consists two diamondville dies single substrate 2009 nvidia used atom 300 geforce 9400m chipset mini-itx form factor motherboard ion platform although atom processor relatively low-power x86 microprocessor many chipsets commonly used dissipate significantly power example atom n270 commonly used netbooks mid-2010 tdp rating 2.5 w intel atom platform uses 945gse express chipset specified maximum tdp 11.8 w processor responsible relatively small portion total power dissipated individual figures 2.5 w n270 processor 6 w 945gse chipset 3.3 w 82801gbm i/o controller intel also provides us15w system controller hub-based chipset combined tdp less 5 w together atom z5xx silverthorne series processors used ultra-mobile pcs mids though manufacturers released ultra-thin systems running processors e.g sony vaio x initially atom motherboards consumer market featured intel 945gc chipset uses 22 watts early 2009 manufacturers offering lower-power motherboards 945gse us15w chipset atom n270 n280 z5xx series cpu 21 december 2009 intel announced n450 d510 d410 cpus integrated graphics new manufacturing process resulted 20 reduction power consumption 60 smaller die size intel gma 3150 45 nm shrink gma 3100 hd capabilities included on-die gpu netbooks using new processor released 11 january 2010 major new feature longer battery life 10 hours 6-cell systems generation atom codenamed pineview used pine trail platform intel pine trail-m platform utilizes atom processor codenamed pineview-m platform controller hub codenamed tiger point graphics memory controller moved processor paired tiger point pch creates power-efficient 2-chip platform rather 3-chip one used previous-generation atom chipsets 1 march 2010 intel introduced n470 processor running 1.83 ghz 667 mhz fsb tdp rating 6.5 w. new atom n4xx chips became available 11 january 2010 used netbook nettop systems includes integrated single-channel ddr2 memory controller integrated graphics core also features hyper-threading manufactured 45 nm process new design uses half power older menlow platform reduced overall power consumption size makes platform desirable use smartphones mobile internet devices d4xx d5xx series support x86-64 bit instruction set ddr2-800 memory rated embedded use series integrated graphics processor built directly cpu help improve performance models targeted nettops low-end desktops support speedstep atom d510 dual-core processor runs 1.66 ghz 1 mb l2 cache tdp rating 13 w. single-core atom d410 runs 1.66 ghz 512 kb l2 cache tdp rating 10 w. tunnel creek embedded atom processor used queens bay platform topcliff pch lincroft z6xx whitney point pch included oak trail tablet platform oak trail intel atom platform based moorestown platforms include lincroft microprocessor use two distinct input/output platform controller hubs i/o-pch codenamed langwell whitney point respectively oak trail presented 11 april 2011 released may 2011 z670 processor part oak trail platform delivers improved video playback faster internet browsing longer battery life without sacrificing performance according intel oak trail includes support 1080p video decoding well hdmi platform also improved power efficiency allows applications run various operating systems including android meego windows stellarton tunnel creek cpu altera field programmable gate array fpga sodaville consumer electronics atom soc groveland consumer electronics atom soc 32 nm shrink bonnell called saltwell intel released third-generation cedar trail platform consisting range cedarview processors nm10 southbridge chip based 32 nm process technology fourth quarter 2011 intel stated improvements graphics capabilities including support 1080p video additional display options including hdmi displayport enhancements power consumption enable fanless designs longer battery life cedar trail platform includes two new cpus 32 nm-based n2800 1.86 ghz n2600 1.6 ghz replace previous generation pineview n4xx n5xx processors cpus also feature integrated gpu supports directx 9 addition netbook platform two new cedarview cpus nettops d2500 d2700 released 25 september 2011 early march 2012 n2800-based intel dn2800mt motherboard started become available due use netbook processor mini-itx motherboard reach idle power consumption low 7.1 w. penwell atom soc part medfield mid/smartphone platform berryville consumer electronics atom soc cloverview atom soc part clover trail tablet platform december 2012 intel launched 64-bit centerton family atom cpus designed specifically use bordenville platform servers based 32 nm saltwell architecture centerton adds features previously unavailable atom processors intel vt virtualization technology support ecc memory briarwood atom soc designed server platform | [
3459,
5380,
3973,
8325,
9095,
5386,
9611,
4108,
9741,
398,
3470,
6926,
5649,
6033,
5523,
6804,
7313,
4886,
8851,
3352,
9111,
5883,
10669,
9391,
5681,
10675,
4276,
1461,
10548,
2237,
5309,
8125,
8126,
6339,
5444,
9541,
1998,
2638,
977,
353... | Test |
6,805 | 4 | SAML_1.1:saml 1.1 security assertion markup language saml xml standard exchanging authentication authorization data security domains saml product oasis organization security services technical committee saml 1.1 ratified oasis standard september 2003 critical aspects saml 1.1 covered detail official documents samlcore samlbind new saml probably read introductory saml topic first samloverview document oasis prior saml 1.1 saml 1.0 adopted oasis standard november 2002 saml undergone one minor v1.1 one major revision v2.0 since v1.0 relatively simple protocol saml 1.0 historical interest however since us federal e-authentication initiative adopted saml 1.0 core technology versions 1.0 1.1 saml similar see samldiff specific differences two standards article concentrates saml 1.1 since important standard upon many standards implementations depend warning implementers deployers note well code examples article non-normative illustration purposes consult oasis saml specifications normative requirements saml assertions contain statements service providers use make access control decisions instance authentication statements assert service provider principal indeed authenticate identity provider particular time using particular method authentication information principal may disclosed authentication statement authentication statement example e-mail address principal asserted service provider e-mail address example suffice large number situations cases however additional information needed service provider make access control decision example suppose students allowed access scholarships data attribute statement indicate whether principal affiliation student service provider uses allow deny access resp scholarships application attributes often obtained ldap directory consistent representations attributes across security domains crucial example showing student might obtain access scholarships application service provider functioning policy enforcement point policy decision point situations may preferable associate policy decision point identity provider case service provider passes uri identity provider asserts authorization decision statement dictates whether principal allowed access secured resource given uri three statement types mutually exclusive example authentication statements attribute statements may included single assertion shown precludes need make subsequent round trips service provider identity provider saml protocol simple request-response protocol saml requester sends saml codice_1 element responder similarly saml responder returns saml codice_2 element requester bindings profiles needed affect message exchange detailed following sections saml 1.1 formally defines one protocol binding saml soap binding compatible saml 1.1 implementation must implement saml soap http synchronous protocol binding transport mechanisms besides http permitted provided protocol-independent aspects saml soap binding observed see section 3.1.2 samlbind saml 1.1 soap binding built top version 1.1 soap numbering purely coincidental saml requester wraps saml codice_1 element within body soap message similarly saml responder returns saml codice_2 element within body returned soap message error responder returns soap fault code instead saml markup must included soap body saml 1.1 define saml-specific soap headers requester free insert soap headers wishes although none required recall soap 1.1 codice_5 http header must included http request although value may empty saml requester may give following value codice_5 header saml responder must depend value however secure connection required saml requests responses situations message integrity confidentiality required http ssl 3.0 tls 1.0 server-side certificate required saml responder may return 403 forbidden response refuses respond saml requester responder must return 500 internal server error response event soap error soap fault element must included well otherwise 200 ok response returned even presence saml processing error response include saml codice_7 element soap body general profiles describe use cases message exchanges required ultimately transfer assertions identity provider service provider saml 1.1 specifies two web browser sso profiles browser/post profile relies push operation passes sso assertion value browser using http post say identity provider pushes assertion service provider browser/artifact profile employs pull mechanism profile essentially passes sso assertion identity provider service provider reference browser using http redirect subsequently dereferenced via back-channel exchange i.e. service provider pulls assertion identity provider using saml soap http profiles support cross-domain single sign-on sso specification define additional profiles particular saml 1.1 support profile secure web service message support single logout profile saml 1.1 profiles begin inter-site transfer service managed identity provider principal arrives transfer service first place dictated specification see sections 4.1 4.2 samloverview possible scenarios practice client accessing secured resource service provider redirected inter-site transfer service identity provider precise sequence steps needed accomplish outlined saml 1.1 see section 4.3 samloverview rough ideas along lines scenario thoroughly addressed saml 2.0 visiting inter-site transfer service principal transferred assertion consumer service service provider exactly principal transferred inter-site transfer service assertion consumer service depends profile used case browser/artifact profile redirect used case browser/post profile client issues post request without user intervention expedite processing assertion consumer service two separate urls specified endpoint locations may recorded metadata files exactly identity provider obtains trusted metadata file otherwise determines trusted endpoint locations particular service provider scope respect saml 1.1 note conforming saml 1.1 identity provider must provide inter-site transfer service similarly saml 1.1 service provider must provide assertion consumer service saml 1.1 browser/post profile specifies following four 4 steps terminology used original specification modified slightly conform saml 2.0 specification message flow begins request directed idp principal via http user agent requests inter-site transfer service identity provider codice_8 desired resource service provider say nowiki https //sp.example.com/home /nowiki words following get request issued user agent ssl/tls profile specify url transfer service codice_9 parameter obtained user agent inter-site transfer service returns html document containing codice_10 element codice_9 parameter preserved step 1 value codice_12 parameter base64 encoding saml codice_2 element following saml response must digitally signed identity provider important assumed principal already established security context identity provider otherwise inter-site transfer service would unable provide authentication statement saml codice_2 element user agent requests assertion consumer service service provider values codice_9 codice_12 parameters taken html form step 2 note automate submission form following line javascript may appear anywhere page assumes course page contains single codice_10 element codice_18 assertion consumer service consumes saml codice_2 element creates security context service provider redirects user agent target resource saml 1.1 browser/artifact profile specifies following six 6 steps terminology used original specification modified slightly conform saml 2.0 specification message flow begins request directed idp principal via http user agent requests inter-site transfer service identity provider codice_8 desired resource service provider say nowiki https //sp.example.com/home /nowiki words following get request issued user agent ssl/tls profile specify url transfer service codice_9 parameter obtained user agent principal redirected assertion consumer service service provider following response returned user agent codice_22 reference assertion identity provider willing provide upon request important assumed principal already established security context identity provider otherwise inter-site transfer service would unable provide authentication statement user agent requests assertion consumer service service provider codice_8 codice_22 words following get request issued user agent ssl/tls assertion consumer service service provider begins back-channel exchange artifact resolution service identity provider saml soap message bound http post request codice_22 previously sent identity provider service provider steps 2 3 identity provider completes back-channel exchange responding saml assertion bound saml soap message case authentication statement includes codice_26 containing principal e-mail address assertion consumer service parses saml codice_2 element creates security context service provider redirects user agent target resource | [
7368,
4979,
820,
10486,
6651,
5433,
1851,
6811,
479
] | Test |
6,806 | 3 | Intel_8259:intel 8259 intel 8259 programmable interrupt controller pic designed intel 8085 intel 8086 microprocessors initial part 8259 later suffix version upward compatible usable 8086 8088 processor 8259 combines multiple interrupt input sources single interrupt output host microprocessor extending interrupt levels available system beyond one two levels found processor chip 8259a interrupt controller isa bus original ibm pc ibm pc 8259 introduced part intel mcs 85 family 1976 8259a included original pc introduced 1981 maintained pc/xt introduced 1983 second 8259a added introduction pc/at 8259 coexisted intel apic architecture since introduction symmetric multi-processor pcs modern pcs begun phase 8259a favor intel apic architecture however anymore separate chip 8259a interface still provided platform controller hub southbridge chipset modern x86 motherboards main signal pins 8259 follows eight interrupt input request lines named irq0 irq7 interrupt request output line named intr interrupt acknowledgment line named inta d0 d7 communicating interrupt level vector offset connections include cas0 cas2 cascading 8259s eight slave 8259s may cascaded master 8259 provide 64 irqs 8259s cascaded connecting int line one slave 8259 irq line one master 8259 three registers interrupt mask register imr interrupt request register irr in-service register isr irr maintains mask current interrupts pending acknowledgement isr maintains mask interrupts pending eoi imr maintains mask interrupts sent acknowledgement end interrupt eoi operations support specific eoi non-specific eoi auto-eoi specific eoi specifies irq level acknowledging isr non-specific eoi resets irq level isr auto-eoi resets irq level isr immediately interrupt acknowledged edge level interrupt trigger modes supported 8259a fixed priority rotating priority modes supported 8259 may configured work 8080/8085 8086/8088 8086/8088 interrupt controller provide interrupt number data bus interrupt occurs interrupt cycle 8080/8085 issue three bytes data bus corresponding call instruction 8080/8085 instruction set 8259a provides additional functionality compared 8259 particular buffered mode level-triggered mode upward compatible programming 8259 conjunction dos microsoft windows introduced number confusing issues sake backwards compatibility extends far back original pc introduced 1981 first issue less root second issue dos device drivers expected send non-specific eoi 8259s finish servicing device prevents use 8259 eoi modes dos excludes differentiation device interrupts rerouted master 8259 slave 8259 second issue deals use irq2 irq9 introduction slave 8259 pc/at slave 8259 int output connected master ir2 irq2 line isa bus originally connected ir2 rerouted ir1 slave thus old irq2 line generates irq9 cpu allow backwards compatibility dos device drivers still set irq2 handler installed bios irq9 redirects interrupts original irq2 handler pc bios thus also dos traditionally maps master 8259 interrupt requests irq0-irq7 interrupt vector offset 8 int08-int0f slave 8259 pc/at later interrupt requests irq8-irq15 interrupt vector offset 112 int70-int77 done despite first 32 int00-int1f interrupt vectors reserved processor internal exceptions ignored design pc reason reserved vectors exceptions operating systems map least master 8259 irqs used platform another interrupt vector base offset since operating systems allow changes device driver expectations 8259 modes operation auto-eoi may used especially important modern x86 hardware significant amount time may spent i/o address space delay communicating 8259s also allows number optimizations synchronization critical sections multiprocessor x86 system 8259s since isa bus support level triggered interrupts level triggered mode may used interrupts connected isa devices means pc/xt pc/at compatible systems 8259 must programmed edge triggered mode mca systems devices use level triggered interrupts interrupt controller hardwired always work level triggered mode newer eisa pci later systems edge/level control registers elcrs control mode per irq line effectively making mode 8259 irrelevant systems isa buses elcr programmed bios system startup correct operation elcrs located 0x4d0 0x4d1 x86 i/o address space 8-bits wide bit corresponding irq 8259s bit set irq level triggered mode otherwise irq edge triggered mode 8259 generates spurious interrupts response number conditions first irq line deasserted acknowledged may occur due noise irq lines edge triggered mode noise must maintain line low state 100 ns noise diminishes pull-up resistor returns irq line high thus generating false interrupt level triggered mode noise may cause high signal level systems intr line system sends acknowledgment request 8259 nothing resolve thus sends irq7 response first case generate spurious irq7 similar case occur 8259 unmask irq input de-assertion properly synchronized many systems irq input deasserted i/o write processor n't wait write reaches i/o device processor continues unmasks 8259 irq irq input deasserted 8259 assert intr time processor recognizes intr issues acknowledgment read irq 8259 irq input may deasserted 8259 returns spurious irq7 second master 8259 irq2 active high slave 8259 irq lines inactive falling edge interrupt acknowledgment second case generate spurious irq15 rare pc/xt isa system one 8259 controller pc/at later systems two 8259 controllers master slave irq0 irq7 master 8259 interrupt lines irq8 irq15 slave 8259 interrupt lines labels pins 8259 ir0 ir7 irq0 irq15 names isa bus lines 8259s attached | [
1058,
8090,
548,
9861,
3272,
6797,
8301,
7151,
5457,
8625,
499,
5368,
5529,
602,
1660,
3294,
5823
] | Test |
6,807 | 3 | Macintosh_IIfx:macintosh iifx macintosh iifx personal computer designed manufactured sold apple computer inc. march 1990 april 1992 introduction cost depending configuration fastest macintosh available time iifx powerful 68030-based macintosh ii family replaced top apple lineup macintosh quadra 1991 last apple computer released designed using snow white design language dubbed wicked fast product manager frank casanova – came apple apollo computer boston massachusetts boston term wicked commonly used denote anything extreme – iifx runs clock rate 40 megahertz 32 kb level 2 cache six nubus slots includes number proprietary asics coprocessors designed speed machine chips require system-specific drivers 40 mhz speed refers main logic board clock bus motorola 68030 cpu computer motorola 68882 fpu machine eight ram slots maximum 128 mb ram enormous amount time iifx features specialized high-speed 80 ns ram using 64-pin dual-ported simms contemporary macintosh models use 30-pin simms extra pins separate path allow latched read write operations also possible use parity memory modules iifx stock 68k macintosh support along special versions macintosh iici logic board total 8 ram slots must populated four time 1 4 16 mb chips results maximum memory amount 128 mb iifx includes two special dedicated processors floppy disk operations sound adb serial communications i/o chips feature pair 10 mhz embedded 6502 cpus cpu family used apple ii machines iifx uses scsi hard disk interface previous macintosh models since macintosh plus iifx requires special black-colored scsi terminator external drives first introduced iifx offered configurations introduced may 15 1990 | [
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
576,
1090,
10833,
4180,
10838,
10840,
9312,
8806,
7281,
6258,
10357,
4220,
10365,
10878,
6783,
7299,
4741,
8842,
6283,
7824,
147,
7830,
4258,
7842,
7844,
3241,
7869,
... | Test |
6,808 | 2 | Theodore_Ts'o:theodore ts theodore yue tak ts 曹子德 born 1968 software engineer mainly known contributions linux kernel particular contributions file systems primary developer maintainer e2fsprogs userspace utilities ext2 ext3 ext4 filesystems maintainer ext4 file system ts graduated mit degree computer science 1990 worked mit information systems department 1999 time project leader kerberos v5 team 1994 ts created codice_1 linux device node corresponding kernel driver linux unix first kernel interface provided high quality cryptographic random numbers user programs codice_1 works without access hardware random number generator allowing user programs depend upon existence separate daemons codice_3 take random numbers hardware make accessible via codice_1 since creation codice_1 codice_6 become standard interfaces unix linux bsd macos systems mit ts went work va linux systems two years late 2001 joined ibm worked improvements linux kernel performance scalability working real-time kernel ibm ts joined linux foundation late 2007 two-year fellowship initially served chief platform strategist becoming chief technology officer 2008 ts also served treasurer usenix 2008 chaired annual linux kernel developers summit 2010 ts moved google saying would working kernel file system storage stuff ts debian developer maintaining several packages mostly filesystem-related ones including e2fsprogs since march 2003 member security area directorate internet engineering task force one chairs ipsec working group one founding board members free standards group ts awarded free software foundation 2006 award advancement free software | [
1026,
3082,
5644,
5139,
2581,
10780,
10785,
9762,
6691,
6180,
2597,
8242,
9266,
2109,
8772,
6213,
10822,
8263,
8268,
589,
4177,
8787,
5222,
10856,
7793,
3189,
4734,
7812,
4238,
10382,
8848,
657,
2194,
2195,
2197,
2199,
2711,
9882,
1694,
3... | None |
6,809 | 1 | InterSystems:intersystems intersystems corporation privately held vendor software systems technology high-performance database management rapid application development integration healthcare information systems vendor products include intersystems iris data platform caché database management system intersystems ensemble integration platform healthshare healthcare informatics platform trakcare healthcare information system sold outside united states intersystems based cambridge massachusetts company earned 644 million 2017 intersystems founded 1978 phillip t. terry ragon current ceo 2018 firm one original vendors m-technology aka mumps systems product called ism years acquired several mumps implementations dtm data tree 1993 dsm digital 1995 msm micronetics 1998 making intersystems dominant technology vendor firm eventually started combining features products one called openm consolidated technologies product caché 1997 time stopped new development legacy m-based products although company stills supports existing customers launched ensemble integration platform 2003 healthshare scalable health informatics platform 2006 2007 intersystems purchased trakhealth australian vendor trakcare modular healthcare information system based intersystems technology may 2011 firm launched globals free database based multi-dimensional array storage technology used caché september 2011 intersystems purchased siemens health services shs france parent company siemens september 2017 intersystems announced intersystems iris data platform company said combines database management capabilities together interoperability analytics well technologies sharding performance company products include largest customer intersystems epic leading health records vendor like intersystems epic privately held rooted older programming language called mumps developed mass general hospital 1960s founders coded first products turned outside investors preferring maintain control said zina moukheiber forbes profile 2013 large customers include u.s. department veterans affairs partners healthcare cleveland clinic national health services england scotland wales european space agency credit suisse august 14 2008 boston globe reported intersystems filing lawsuit microsoft corporation another tenant cambridge mass. headquarters seeking prevent microsoft expanding building intersystems also filed lawsuit building owner equity office partners subsidiary blackstone group contending conspired microsoft lease space intersystems rights sought drive rents process 2010 ceo terry ragon led coalition cambridge called save skyline protest city zoning change would allowed signs top commercial buildings partly response microsoft desire put sign top shared building disputes eventually settled microsoft intersystems agreed put low signs front building street level | [
11683,
7076,
9828,
5929,
8201,
7149,
974,
7412,
1142
] | Test |
6,810 | 9 | Csound:csound csound computer programming language sound also known sound compiler audio programming language precisely audio dsl called csound written c opposed predecessors free software available lgpl csound originally written mit barry vercoe 1985 based earlier system called music 11 turn followed music-n model initiated max mathews bell labs development continued throughout 1990s 2000s led john fitch university bath first documented version 5 release version 5.01 march 18 2006 many developers contributed notably istvan varga gabriel maldonado robin whittle richard karpen michael gogins matt ingalls steven yi richard boulanger victor lazzarini developed many years currently nearly 1700 unit generators one greatest strengths completely modular extensible user csound closely related underlying language structured audio extensions mpeg-4 saol csound takes two specially formatted text files input orchestra describes nature instruments score describes notes parameters along timeline csound processes instructions files renders audio file real-time audio stream output orchestra score files may unified single structured file using markup language tags csd file filename extension .csd simple example unified csound data file produces wave file containing one-second sine wave tone 1 khz sample rate 96 khz many programming languages writing long programs csound eased using integrated environment editing previewing testing debugging one officially supported csoundqt many features automatic code insertion integrated documentation browser integrated widgets graphically controlling parameters realtime plus button playing code version 5.01 released march 18 2006 – 20 years csound first release csound 5 available binary source code linux microsoft windows mac os x sourceforge csound project much improved expanded compared original software effectively made software library api variety front ends developed addition basic c api also python java lisp tcl c++ among bindings like one haskell allows control csound purely functional environment use plug-ins allows additional capabilities without modifications csound code possibility write user-defined opcodes extensions original language ladspa dssi supported vst support removed real-time performance midi added 1990s another addition support fltk widgets graphical interface components sliders knobs etc controlling real-time audio integration custom graphical interfaces written python csound 6 development since features hashed csound conference held 2011 hanover csound 6 released july 2013 available github csound 6 also available android major new features csound 6 include development csound 6 led john ffitch steven yi victor lazzarini currently csound score note events generated real time opposed instruments definable compile time csound first starts csound 6 limitation removed set sound processors defined compiled load time individual processing objects spawned destroyed real time input audio processed real time output generated also real time note events triggered based osc communications within instrument instance spawned midi entered stdin typing terminal sending textual statements another program use csound 5 live performance tool augmented variety third-party software live event sheet within csoundqt used modify score real-time addition interfaces programming languages used script csound paper detailing use csound qt pure data real-time musical synthesis presented 2012 linux audio conference ounk project attempts integrate python csound csoundac provides way algorithmic composition python using csound backend audivation csound live packages various opcodes max/msp wrappers suitable use ableton live csound also available mobile systems ios android csound5 chosen audio/music development system olpc project xo-1 laptop platform | [
7172,
267,
8958,
7571,
6933,
791,
3876,
10284,
5037,
5677,
7983,
692,
9783,
9023,
9926,
3665,
596,
11221,
7769,
9565,
6502,
8554,
5612,
7535,
8947,
9210,
2045,
7550
] | None |
6,811 | 4 | SAML_2.0:saml 2.0 security assertion markup language 2.0 saml 2.0 version saml standard exchanging authentication authorization data security domains saml 2.0 xml-based protocol uses security tokens containing assertions pass information principal usually end user saml authority named identity provider saml consumer named service provider saml 2.0 enables web-based cross-domain single sign-on sso helps reduce administrative overhead distributing multiple authentication tokens user saml 2.0 ratified oasis standard march 2005 replacing saml 1.1 critical aspects saml 2.0 covered detail official documents samlcore samlbind samlprof samlmeta 30 individuals 24 companies organizations involved creation saml 2.0 particular special note liberty alliance donated identity federation framework id-ff specification oasis became basis saml 2.0 specification thus saml 2.0 represents convergence saml 1.1 liberty id-ff 1.2 shibboleth 1.3 assertion package information supplies zero statements made saml authority saml assertions usually made subject represented codice_1 element saml 2.0 specification defines three different kinds assertion statements created saml authority saml-defined statements associated subject three kinds statements defined follows important type saml assertion so-called bearer assertion used facilitate web browser sso example short-lived bearer assertion issued identity provider nowiki https //idp.example.org/saml2 /nowiki service provider nowiki https //sp.example.com/saml2 /nowiki assertion includes authentication assertion codice_2 attribute assertion codice_3 presumably service provider uses make access control decision prefix codice_4 represents saml v2.0 assertion namespace note example codice_5 element contains following child elements words assertion encodes following information assertion b07b804c-7c29-ea16-7300-4f3d6f7928ac issued time 2004-12-05t09:22:05z identity provider nowiki https //idp.example.org/saml2 /nowiki regarding subject 3f7b3dcf-1674-4ecd-92c8-1544f346baf8 exclusively service provider nowiki https //sp.example.com/saml2 /nowiki authentication statement particular asserts following principal identified codice_9 element authenticated time 2004-12-05t09:22:00z means password sent protected channel likewise attribute statement asserts principal identified codice_9 element staff member institution following protocols specified samlcore important protocols—the authentication request protocol—is discussed detail saml 1.1 web browser sso profiles idp-initiated unsolicited codice_15 element transmitted identity provider service provider via browser prefix codice_16 denotes saml protocol namespace saml 2.0 however flow begins service provider issues explicit authentication request identity provider resulting authentication request protocol significant new feature saml 2.0 principal entity acting principal behalf wishes obtain assertion containing authentication statement codice_17 element transmitted identity provider codice_17 element implicitly requests assertion containing authentication statement evidently issued service provider nowiki https //sp.example.com/saml2 /nowiki subsequently presented identity provider via browser identity provider authenticates principal necessary issues authentication response transmitted back service provider via browser saml message transmitted one entity another either value reference reference saml message called artifact receiver artifact resolves reference sending codice_19 request directly issuer artifact responds actual message referenced artifact suppose example identity provider sends following codice_19 request directly service provider via back channel response service provider returns saml element referenced enclosed artifact protocol forms basis http artifact binding bindings supported saml 2.0 outlined bindings specification samlbind web browser sso http redirect binding http post binding commonly used example service provider may use http redirect send request identity provider uses http post transmit response example illustrates entity choice binding independent partner choice binding saml protocol messages carried directly url query string http get request since length urls limited practice http redirect binding suitable short messages codice_17 message longer messages e.g containing signed encrypted saml assertions saml responses usually transmitted via bindings http post binding saml requests responses transmitted via http redirect codice_22 codice_23 query string parameter respectively sent message deflated without header checksum base64-encoded url-encoded order upon receipt process reversed recover original message example encoding codice_17 message yields message formatted readability may signed additional security practice data contained codice_17 codice_26 contains sp id codice_27 agreed idp sp beforehand via manual information exchange via saml metadata case signing request security constraint codice_17 contains information known idp beforehand assertion consumer service url signing request recommended security purposes following example service provider identity provider use http post binding initially service provider responds request user agent document containing xhtml form value codice_22 parameter base64-encoding codice_17 element transmitted identity provider via browser sso service identity provider validates request responds document containing another xhtml form value codice_23 parameter base64 encoding codice_15 element likewise transmitted service provider via browser automate submission form following line javascript may appear anywhere xhtml page assumes course first form element page contains samlresponse containing codice_33 element codice_34 http artifact binding uses artifact resolution protocol saml soap binding http resolve saml message reference consider following specific example suppose service provider wants send codice_17 message identity provider initially service provider transmits artifact identity provider via http redirect next identity provider sends codice_19 request artifactresolverequest shown earlier directly service provider via back channel finally service provider returns codice_37 element containing referenced codice_17 message course flow go direction well identity provider may issue artifact fact common see example double artifact profile example later topic general saml 2.0 artifact defined follows samlbind thus saml 2.0 artifact consists three components two-byte codice_39 two-byte codice_40 arbitrary sequence bytes called codice_41 three pieces information concatenated base64-encoded yield complete artifact codice_39 uniquely identifies artifact format saml 2.0 predefines one artifact type 0x0004 codice_40 reference particular artifact resolution endpoint managed artifact issuer may either idp sp mentioned earlier codice_41 determined type definition meat artifact format type 0x0004 artifact defined follows thus type 0x0004 artifact size 44 bytes unencoded codice_45 arbitrary sequence bytes although practice codice_45 sha-1 hash issuer entityid codice_47 random sequence bytes references saml message artifact issuer willing produce on-demand example consider hex-encoded type 0x0004 artifact look closely see codice_39 0x0004 codice_40 0x0000 front artifact next 20 bytes sha-1 hash issuer entityid nowiki https //idp.example.org/saml2 /nowiki followed 20 random bytes base64-encoding 44 bytes see artifactresolverequest example saml 2.0 saml 1.1 primary use case still web browser sso scope saml 2.0 broader previous versions saml suggested following exhaustive list profiles although number supported profiles quite large profiles specification samlprof simplified since binding aspects profile factored separate bindings specification samlbind saml 2.0 specifies web browser sso profile involving identity provider idp service provider sp principal wielding http user agent service provider four bindings choose identity provider three leads twelve 12 possible deployment scenarios outline three deployment scenarios one common scenarios service provider sends saml request idp sso service using http-redirect binding identity provider returns saml response sp assertion consumer service using http-post binding message flow begins request secured resource service provider 1 request target resource sp principal via http user agent requests target resource service provider service provider performs security check behalf target resource valid security context service provider already exists skip steps 2–7 service provider may use kind mechanism discover identity provider used e.g. ask user use preconfigured idp etc 2 redirect idp sso service service provider generates appropriate samlrequest relaystate redirects browser idp sso service using standard http 302 redirect codice_50 token opaque reference state information maintained service provider value codice_22 parameter deflated base64-encoded url-encoded value codice_17 element samlrequest may signed using sp signing key typically however necessary 3 request sso service idp user agent issues get request sso service identity provider values codice_22 codice_50 parameters provided redirect sso service identity provider processes codice_17 element url-decoding base64-decoding inflating request order performs security check user valid security context identity provider identifies user mechanism details omitted 4 respond xhtml form sso service validates request responds document containing xhtml form value codice_50 parameter preserved step 3 value codice_23 parameter base64 encoding following codice_15 element 5 request assertion consumer service sp user agent issues post request assertion consumer service service provider values codice_23 codice_50 parameters taken xhtml form step 4 6 redirect target resource assertion consumer service processes response creates security context service provider redirects user agent target resource 7 request target resource sp user agent requests target resource service provider 8 respond requested resource since security context exists service provider returns resource user agent relatively simple deployment saml 2.0 web browser sso profile samlprof service provider sp identity provider idp use http post binding message flow begins request secured resource sp 1 request target resource sp principal via http user agent requests target resource service provider service provider performs security check behalf target resource valid security context service provider already exists skip steps 2–7 2 respond xhtml form service provider responds document containing xhtml form codice_50 token opaque reference state information maintained service provider value codice_22 parameter base64 encoding following codice_17 element codice_17 element inserted xhtml form first base64-encoded 3 request sso service idp user agent issues post request sso service identity provider values codice_22 codice_50 parameters taken xhtml form step 2 sso service processes codice_17 element url-decoding base64-decoding inflating request order performs security check user valid security context identity provider identifies user details omitted 4 respond xhtml form sso service validates request responds document containing xhtml form value codice_50 parameter preserved step 3 value codice_23 parameter base64 encoding following codice_15 element 5 request assertion consumer service sp user agent issues post request assertion consumer service service provider values codice_23 codice_50 parameters taken xhtml form step 4 6 redirect target resource assertion consumer service processes response creates security context service provider redirects user agent target resource 7 request target resource sp user agent requests target resource service provider 8 respond requested resource since security context exists service provider returns resource user agent complex deployment saml 2.0 web browser sso profile samlprof service provider sp identity provider idp use http artifact binding artifacts delivered respective endpoints via http get message flow begins request secured resource sp 1 request target resource sp principal via http user agent requests target resource service provider service provider performs security check behalf target resource valid security context service provider already exists skip steps 2–11 2 redirect single sign-on sso service idp service provider redirects user agent single sign-on sso service identity provider codice_50 parameter codice_74 parameter appended redirect url 3 request sso service idp user agent requests sso service identity provider codice_75 opaque reference state information maintained service provider codice_76 saml artifact issued step 2 4 request artifact resolution service sp sso service dereferences artifact sending codice_19 element bound saml soap message artifact resolution service service provider value codice_78 element saml artifact transmitted step 3 5 respond saml authnrequest artifact resolution service service provider returns codice_37 element containing codice_17 element bound saml soap message sso service identity provider sso service processes codice_17 element performs security check user valid security context identity provider identifies user details omitted 6 redirect assertion consumer service sso service identity provider redirects user agent assertion consumer service service provider previous codice_50 parameter new codice_74 parameter appended redirect url 7 request assertion consumer service sp user agent requests assertion consumer service service provider codice_75 token value step 3 codice_85 saml artifact issued step 6 8 request artifact resolution service idp assertion consumer service dereferences artifact sending codice_19 element bound saml soap message artifact resolution service identity provider value codice_78 element saml artifact transmitted step 7 9 respond saml assertion artifact resolution service identity provider returns codice_37 element containing codice_15 element bound saml soap message assertion consumer service service provider 10 redirect target resource assertion consumer service processes response creates security context service provider redirects user agent target resource 11 request target resource sp user agent requests target resource service provider 12 respond requested resource since security context exists service provider returns resource user agent saml 2.0 identity provider discovery profile introduces following concepts hypothetical example common domain let suppose example uk example.co.uk example deutschland example.de belong virtual organization example global alliance example.com example domain example.com common domain example uk example deutschland presence domain uk.example.com de.example.com resp. common domain cookie secure browser cookie scoped common domain browser user cookie stores history list recently visited idps name value cookie specified idp discovery profile samlprof successful act authentication idp requests common domain cookie writing service service appends idp unique identifier common domain cookie sp receives unauthenticated request protected resource requests common domain cookie reading service discover browser user recently used idp assertion query/request profile general profile accommodates numerous types so-called queries using following saml 2.0 elements saml soap binding often used conjunction queries attribute query perhaps important type saml query often requester acting behalf principal queries identity provider attributes give example query issued principal directly note codice_26 codice_97 case sometimes called attribute self-query identity provider might return following assertion wrapped codice_15 element shown contrast bearerassertion shown earlier assertion longer lifetime corresponding lifetime x.509 certificate principal used authenticate identity provider moreover since assertion signed user push assertion relying party long user prove possession corresponding private key hence name holder-of-key relying party assured assertion authentic quite literally metadata makes saml work work well let look important uses metadata metadata ensures secure transaction identity provider service provider metadata trust information encoded implementation proprietary manner sharing trust information facilitated standard metadata saml 2.0 provides well-defined interoperable metadata format entities leverage bootstrap trust process identity provider publishes data codice_101 element note following details entity descriptor definition identity provider manages sso service supports saml web browser sso profile specified samlprof see example identity provider described codice_107 element shown next section sso service identity provider described codice_107 element previous metadata element describes sso service identity provider note following details element noted beginning section values codice_112 attributes used service provider route saml messages minimizes possibility rogue identity provider orchestrating man-in-the-middle attack like identity provider service provider publishes data codice_101 element note following details entity descriptor definition service provider manages assertion consumer service supports saml web browser sso profile specified samlprof see example service provider described codice_133 element shown next section assertion consumer service contained codice_133 element note following details codice_133 metadata element noted beginning section values codice_112 attributes used identity provider route saml messages minimizes possibility rogue service provider orchestrating man-in-the-middle attack previous examples codice_101 element shown digitally signed practice however multiple codice_101 elements grouped together codice_159 element single digital signature entire aggregate note following details codice_159 element typically metadata aggregates published trusted third parties called federations vouch integrity metadata aggregate note metadata aggregates large composed hundreds even thousands entities per aggregate primary references secondary references deprecated references | [
3521,
2501,
7368,
425,
8159,
10829,
4863,
820,
4979,
6805,
7320,
5433,
90,
1851,
2013,
7198,
479
] | Test |
6,812 | 2 | Chown:chown command chown abbreviation change owner used unix unix-like operating systems change owner file system files directories unprivileged regular users wish change group membership file may use chgrp ownership file system may altered super-user user give away ownership file even user owns similarly member group change file group id group chown name_of_new_owner file_name | [
2432,
515,
9733,
9735,
3976,
521,
5256,
6281,
6664,
4750,
8975,
11663,
4369,
5397,
2198,
7196,
4001,
6138,
9505,
2599,
7847,
7975,
8236,
4398,
7983,
1336,
8504,
7356,
3522,
451,
1987,
965,
2245,
8517,
9542,
5706,
3659,
8522,
1741,
10967,
... | None |
6,813 | 6 | File_descriptor:file descriptor unix related computer operating systems file descriptor fd less frequently fildes abstract indicator handle used access file input/output resource pipe network socket file descriptors form part posix application programming interface file descriptor non-negative integer generally represented c programming language type negative values reserved indicate value error condition unix process except perhaps daemon expect three standard posix file descriptors corresponding three standard streams traditional implementation unix file descriptors index per-process maintained kernel turn indexes system-wide table files opened processes called table records mode file resource opened reading writing appending possibly modes also indexes third table called inode table describes actual underlying files perform input output process passes file descriptor kernel system call kernel access file behalf process process direct access file inode tables linux set file descriptors open process accessed path codice_1 pid process identifier unix-like systems file descriptors refer unix file type named file system well regular files includes directories block character devices also called special files unix domain sockets named pipes file descriptors also refer objects normally exist file system anonymous pipes network sockets file data structure c standard i/o library usually includes low level file descriptor object question unix-like systems overall data structure provides additional abstraction instead known file handle following lists typical operations file descriptors modern unix-like systems functions declared codice_2 header codice_3 header instead function used perform various operations file descriptor depending command argument passed commands get set attributes associated file descriptor including series new operations file descriptors added many modern unix-like systems well numerous c libraries standardized future version posix codice_4 suffix signifies function takes additional first argument supplying file descriptor relative paths resolved forms lacking codice_4 suffix thus becoming equivalent passing file descriptor corresponding current working directory purpose new operations defend certain class tocttou attacks unix file descriptors behave many ways capabilities passed processes across unix domain sockets using codice_6 system call note however actually passed reference open file description mutable state file offset file status access flags complicates secure use file descriptors capabilities since programs share access open file description interfere use changing offset whether blocking non-blocking example operating systems specifically designed capability systems rarely mutable state associated capability unix process file descriptor table example c-list | [
7196,
9762,
6180,
5158,
7728,
52,
10813,
5697,
10835,
8298,
9840,
3700,
9872,
4764,
10407,
1193,
3766,
5815,
8386,
716,
2253,
7884,
10959,
6358,
728,
10971,
8414,
4320,
2786,
9444,
4333,
242,
8447,
256,
3330,
778,
8975,
2322,
5397,
792,
... | Test |
6,814 | 4 | Nadim_Kobeissi:nadim kobeissi nadim kobeissi computer science researcher specialized applied cryptography professor new york university paris campus author cryptocat open-source encrypted web chat client kobeissi also known speaking publicly internet censorship internet surveillance kobeissi born beirut lebanon studied lebanese american university beirut 2008–2009 graduated degree philosophy concordia university montreal 2013 kobeissi ph.d. student studying applied cryptography french institute research computer science automation inria france 2015 2018 kobeissi primary author cryptocat project discontinued 2019 2015 kobeissi became active researching formal verification cryptographic protocols december 2018 defended ph.d. thesis formal verification real-world cryptographic protocols implementations vérification formelle des protocoles et des implementations cryptographiques 2010 kobeissi early supporter bradley manning support network organized march montreal december year support wikileaks ran wikileaks mirror site defended wikileaks various canadian news publications 2011 2012 kobeissi hosted chomp.fm radio program internet activism ran weekly montreal ckut-fm radio station show included guests electronic frontier foundation eff security researcher bruce schneier journalist glenn greenwald 2013 kobeissi led effort known skype open letter brought together forty organizations including electronic frontier foundation reporters without borders open technology institute calling microsoft skype release transparency reports regarding skype monitoring surveillance effort successful microsoft released first transparency report shortly letter published | [
1315,
5813
] | Validation |
6,815 | 3 | Superscalar_processor:superscalar processor superscalar processor cpu implements form parallelism called instruction-level parallelism within single processor contrast scalar processor execute one single instruction per clock cycle superscalar processor execute one instruction clock cycle simultaneously dispatching multiple instructions different execution units processor therefore allows throughput number instructions executed unit time would otherwise possible given clock rate execution unit separate processor core processor multi-core processor execution resource within single cpu arithmetic logic unit flynn taxonomy single-core superscalar processor classified sisd processor single instruction stream single data stream though single-core superscalar processor supports short vector operations could classified simd single instruction stream multiple data streams multi-core superscalar processor classified mimd processor multiple instruction streams multiple data streams superscalar cpu typically also pipelined superscalar pipelining execution considered different performance enhancement techniques former executes multiple instructions parallel using multiple execution units whereas latter executes multiple instructions execution unit parallel dividing execution unit different phases superscalar technique traditionally associated several identifying characteristics within given cpu seymour cray cdc 6600 1966 often mentioned first superscalar design 1967 ibm system/360 model 91 another superscalar mainframe motorola mc88100 1988 intel i960ca 1989 amd 29000-series 29050 1990 microprocessors first commercial single-chip superscalar microprocessors risc microprocessors like first superscalar execution risc architectures free transistors die area used include multiple execution units risc designs faster cisc designs 1980s 1990s except cpus used low-power applications embedded systems battery-powered devices essentially general-purpose cpus developed since 1998 superscalar p5 pentium first superscalar x86 processor nx586 p6 pentium pro amd k5 among first designs decode x86-instructions asynchronously dynamic microcode-like micro-op sequences prior actual execution superscalar microarchitecture opened dynamic scheduling buffered partial instructions enabled parallelism extracted compared rigid methods used simpler p5 pentium also simplified speculative execution allowed higher clock frequencies compared designs advanced cyrix 6x86 simplest processors scalar processors instruction executed scalar processor typically manipulates one two data items time contrast instruction executed vector processor operates simultaneously many data items analogy difference scalar vector arithmetic superscalar processor mixture two instruction processes one data item multiple execution units within cpu thus multiple instructions processing separate data items concurrently superscalar cpu design emphasizes improving instruction dispatcher accuracy allowing keep multiple execution units use times become increasingly important number units increased early superscalar cpus would two alus single fpu later design powerpc 970 includes four alus two fpus two simd units dispatcher ineffective keeping units fed instructions performance system better simpler cheaper design superscalar processor usually sustains execution rate excess one instruction per machine cycle merely processing multiple instructions concurrently make architecture superscalar since pipelined multiprocessor multi-core architectures also achieve different methods superscalar cpu dispatcher reads instructions memory decides ones run parallel dispatching one several execution units contained inside single cpu therefore superscalar processor envisioned multiple parallel pipelines processing instructions simultaneously single instruction thread available performance improvement superscalar techniques limited three key areas existing binary executable programs varying degrees intrinsic parallelism cases instructions dependent executed simultaneously cases inter-dependent one instruction impacts either resources results instructions codice_1 run parallel none results depend calculations however instructions codice_2 might runnable parallel depending order instructions complete move units number simultaneously issued instructions increases cost dependency checking increases extremely rapidly exacerbated need check dependencies run time cpu clock rate cost includes additional logic gates required implement checks time delays gates research shows gate cost cases may formula_1 gates delay cost formula_2 formula_3 number instructions processor instruction set formula_4 number simultaneously dispatched instructions even though instruction stream may contain inter-instruction dependencies superscalar cpu must nonetheless check possibility since assurance otherwise failure detect dependency would produce incorrect results matter advanced semiconductor process fast switching speed places practical limit many instructions simultaneously dispatched process advances allow ever greater numbers execution units e.g. alus burden checking instruction dependencies grows rapidly complexity register renaming circuitry mitigate dependencies collectively power consumption complexity gate delay costs limit achievable superscalar speedup roughly eight simultaneously dispatched instructions however even given infinitely fast dependency checking logic otherwise conventional superscalar cpu instruction stream many dependencies would also limit possible speedup thus degree intrinsic parallelism code stream forms second limitation collectively limits drive investigation alternative architectural changes long instruction word vliw explicitly parallel instruction computing epic simultaneous multithreading smt multi-core computing vliw burdensome task dependency checking hardware logic run time removed delegated compiler explicitly parallel instruction computing epic like vliw extra cache prefetching instructions simultaneous multithreading smt technique improving overall efficiency superscalar processors smt permits multiple independent threads execution better utilize resources provided modern processor architectures superscalar processors differ multi-core processors several execution units entire processors single processor composed finer-grained execution units alu integer multiplier integer shifter fpu etc may multiple versions execution unit enable execution many instructions parallel differs multi-core processor concurrently processes instructions multiple threads one thread per processing unit called core also differs pipelined processor multiple instructions concurrently various stages execution assembly-line fashion various alternative techniques mutually exclusive—they frequently combined single processor thus multicore cpu possible core independent processor containing multiple parallel pipelines pipeline superscalar processors also include vector capability | [
4098,
7173,
6151,
9739,
528,
2066,
7699,
2071,
5655,
1563,
10779,
10781,
1057,
6181,
8231,
6184,
3630,
9774,
4144,
2097,
6705,
7218,
2620,
2623,
2113,
7234,
1606,
3142,
4172,
2638,
10837,
2140,
9309,
7263,
1122,
4194,
7270,
3175,
5223,
62... | None |
6,816 | 4 | Secure_Network_Programming:secure network programming secure network programming snp prototype first secure sockets layer designed built networking research laboratory university texas austin led simon s. lam work published 1994 usenix summer technical conference project authors 2004 acm software system award work began 1991 theoretical investigation networking research laboratory formal meaning protocol layer satisfying upper interface specification service provider lower interface specification service consumer networking research laboratory received grant national security agency june 1991 investigate apply theory modules interfaces security verification time three well-known authentication systems built mit kerberos developed dec spx ibm kryptoknight systems suffered common drawback namely export clean easy-to-use interface could readily used internet applications example would take tremendous amount effort “ kerberize ” existing distributed application toward goal secure network programming masses inventors snp conceived secure sockets high-level abstraction suitable securing internet applications 1993 designed built prototype snp designed application sublayer top sockets snp provides user interface closely resembling sockets resemblance design security could retrofitted existing socket programs minor modifications also sublayer carefully designed implementation thoroughly debugged easily used internet application uses sockets end-to-end communications natural idea hindsight 1993 novel major departure mainstream network security research time snp secure sockets support stream datagram semantics security guarantees i.e. data origin authenticity data destination authenticity data integrity data confidentiality many ideas design choices snp found subsequent secure sockets layers including placing authenticated communication endpoints application layer use public key cryptography authentication handshake protocol establishing session state including shared secret use symmetric key cryptography data confidentiality managing contexts credentials secure sockets layer paper presented june 8 1994 usenix summer technical conference includes system design together performance measurement results prototype implementation clearly demonstrate practicality secure sockets layer snp invented secure sockets internet applications general independently concurrently design development http protocol world-wide web still infancy 1993 subsequent secure socket layers ssl netscape tls ietf re-implemented several years later using key ideas first presented snp enabled secure e-commerce browsers servers today many internet applications including email use https consists http running secure sockets layer | [
6098
] | None |
6,817 | 9 | Dead_code:dead code computer programming dead code section source code program executed whose result never used computation execution dead code wastes computation time memory result dead computation may never used may raise exceptions affect global state thus removal code may change output program introduce unintended bugs compiler optimizations typically conservative approach dead code removal ambiguity whether removal dead code affect program output programmer may aid compiler matter making additional use static and/or inline functions enabling use link-time optimization example although division ix iy computed never used throw exception division zero occurs therefore removal dead code may change output program dead code elimination form compiler optimization dead code removed program dead code analysis performed using live variable analysis form static code analysis data flow analysis contrast unreachable code analysis based control flow analysis dead code elimination technique class optimizations unreachable code elimination redundant code elimination large programming projects sometimes difficult recognize eliminate dead code particularly entire modules become dead test scaffolding make appear code still live times contract language require delivery code even code longer relevant ides xcode visual studio 2010 eclipse galileo ability locate dead code compiling stage optimization techniques seek remove dead code implementation extreme forms optimization size may sometimes desirable deliberately introduce carefully shape seemingly dead code allows fold otherwise unrelated code sections together thereby reduce combined size extra code effectively harm first path execution code used carry actions necessary alternative paths execution sections code may become dead code functional level seen artificially introduction harmless/useful side-effects reduction redundancy code also used opcode level order allow usage shorter instructions would possible folding code sequences without concerted introduction side-effects caused dead code | [
11446,
9866,
2620,
10618
] | None |
6,818 | 3 | Very_long_instruction_word:long instruction word long instruction word vliw refers instruction set architectures designed exploit instruction level parallelism ilp whereas conventional central processing units cpu processor mostly allow programs specify instructions execute sequence vliw processor allows programs explicitly specify instructions execute parallel design intended allow higher performance without complexity inherent designs traditional means improve performance processors include dividing instructions substeps instructions executed partly time termed pipelining dispatching individual instructions executed independently different parts processor superscalar architectures even executing instructions order different program out-of-order execution methods complicate hardware larger circuits higher cost energy use processor must make decisions internally methods work contrast vliw method depends programs providing decisions regarding instructions execute simultaneously resolve conflicts practical matter means compiler software used create final programs becomes far complex hardware simpler many means parallelism processor executes every instruction one i.e. non-pipelined scalar architecture may use processor resources inefficiently yielding potential poor performance performance improved executing different substeps sequential instructions simultaneously termed pipelining even executing multiple instructions entirely simultaneously superscalar architectures improvement achieved executing instructions order different occur program termed out-of-order execution three methods raise hardware complexity executing operations parallel processor must verify instructions interdependencies example first instruction result used second instruction input execute time second instruction execute first modern out-of-order processors increased hardware resources schedule instructions determine interdependencies contrast vliw executes operations parallel based fixed schedule determined programs compiled since determining order execution operations including operations execute simultaneously handled compiler processor need scheduling hardware three methods described require thus vliw cpus offer computing less hardware complexity greater compiler complexity superscalar cpus superscalar designs number execution units invisible instruction set instruction encodes one operation superscalar designs instruction width 32 bits fewer contrast one vliw instruction encodes multiple operations least one operation execution unit device example vliw device five execution units vliw instruction device five operation fields field specifying operation done corresponding execution unit accommodate operation fields vliw instructions usually least 64 bits wide far wider architectures example following instruction super harvard architecture single-chip computer sharc one cycle floating-point multiply floating-point add two autoincrement loads fits one 48-bit instruction codice_1 since earliest days computer architecture cpus added several arithmetic logic units alus run parallel superscalar cpus use hardware decide operations run parallel runtime vliw cpus use software compiler decide operations run parallel advance complexity instruction scheduling moved compiler complexity hardware reduced substantially similar problem occurs result parallelizable instruction used input branch modern cpus guess branch taken even calculation complete load instructions branch architectures even start compute speculatively cpu guesses wrong instructions context need flushed correct ones loaded takes time led increasingly complex instruction-dispatch logic attempts guess correctly simplicity original reduced instruction set computing risc designs eroded vliw lacks logic thus lacks energy use possible design defects negative aspects vliw compiler uses heuristics profile information guess direction branch allows move preschedule operations speculatively branch taken favoring likely path expects branch branch takes unexpected way compiler already generated compensating code discard speculative results preserve program semantics vector processor single instruction multiple data simd cores combined vliw architecture fujitsu fr-v microprocessor increasing throughput speed concept vliw architecture term vliw invented josh fisher research group yale university early 1980s original development trace scheduling compiling method vliw developed graduate student new york university vliw notion prescheduling execution units instruction-level parallelism software well established practice developing horizontal microcode fisher innovations involved developing compiler could target horizontal microcode programs written ordinary programming language realized get good performance target wide-issue machine would necessary find parallelism beyond generally within basic block also developed region scheduling methods identify parallelism beyond basic blocks trace scheduling method involves scheduling likely path basic blocks first inserting compensating code deal speculative motions scheduling second likely trace schedule complete fisher second innovation notion target cpu architecture designed reasonable target compiler compiler architecture vliw processor must codesigned inspired partly difficulty fisher observed yale compiling architectures like floating point systems fps164 complex instruction set computing cisc architecture separated instruction initiation instructions saved result needing complex scheduling algorithms fisher developed set principles characterizing proper vliw design self-draining pipelines wide multi-port register files memory architectures principles made easier compilers emit fast code first vliw compiler described ph.d. thesis john ellis supervised fisher compiler named bulldog yale mascot fisher left yale 1984 found startup company multiflow along cofounders john o'donnell john ruttenberg multiflow produced trace series vliw minisupercomputers shipping first machines 1987 multiflow vliw could issue 28 operations parallel per instruction trace system implemented mix medium-scale integration msi large-scale integration lsi large-scale integration vlsi packaged cabinets technology obsoleted grew cost-effective integrate components processor excluding memory one chip multiflow early catch following wave chip architectures began allow multiple-issue cpus major semiconductor companies recognized value multiflow technology context compiler architecture subsequently licensed firms cydrome company producing vliw numeric processors using emitter-coupled logic ecl integrated circuits timeframe late 1980s company like multiflow failed years one licensees multiflow technology hewlett-packard josh fisher joined multiflow demise bob rau founder cydrome also joined hp cydrome failed two would lead computer architecture research hewlett-packard 1990s along systems time 1989–1990 intel implemented vliw intel i860 first 64-bit microprocessor first processor implement vliw one chip processor could operate simple risc mode vliw mode early 1990s intel introduced i860 risc microprocessor simple chip two modes operation scalar mode vliw mode vliw mode processor always fetched two instructions assumed one integer instruction floating-point i860 vliw mode used extensively embedded digital signal processor dsp applications since application execution datasets simple well ordered predictable allowing designers fully exploit parallel execution advantages enabled vliw vliw mode i860 could maintain floating-point performance range 20-40 double-precision mflops high value time processor running 25-50mhz 1990s hewlett-packard researched problem side effect ongoing work pa-risc processor family found cpu could greatly simplified removing complex dispatch logic cpu placing compiler compilers day far complex 1980s added complexity compiler considered small cost vliw cpus usually made multiple risc-like execution units operate independently contemporary vliws usually four eight main execution units compilers generate initial instruction sequences vliw cpu roughly manner traditional cpus generating sequence risc-like instructions compiler analyzes code dependence relationships resource requirements schedules instructions according constraints process independent instructions scheduled parallel vliws typically represent instructions scheduled parallel longer instruction word incorporates individual instructions results much longer opcode termed long specify executes given cycle examples contemporary vliw cpus include trimedia media processors nxp formerly philips semiconductors super harvard architecture single-chip computer sharc dsp analog devices c6000 digital signal processor dsp family texas instruments st200 family stmicroelectronics based lx architecture designed josh fisher hp lab paolo faraboschi mppa manycore family kalray contemporary vliw cpus mainly successful embedded media processors consumer electronic devices vliw features also added configurable processor cores system-on-a-chip soc designs example tensilica xtensa lx2 processor incorporates technology named flexible length instruction extensions flix allows multi-operation instructions xtensa c/c++ compiler freely intermix 32- 64-bit flix instructions xtensa processor one-operation risc instructions 16 24 bits wide packing multiple operations wide 32- 64-bit instruction word allowing multi-operation instructions intermix shorter risc instructions flix allows soc designers realize vliw performance advantages eliminating code bloat early vliw architectures infineon carmel dsp another vliw processor core intended soc uses similar code density improvement method called configurable long instruction word cliw outside embedded processing markets intel itanium ia-64 explicitly parallel instruction computing epic elbrus 2000 appear examples widely used vliw cpu architectures however epic architecture sometimes distinguished pure vliw architecture since epic advocates full instruction predication rotating register files long instruction word encode non-parallel instruction groups vliws also gained significant consumer penetration graphics processing unit gpu market though nvidia amd since moved risc architectures improve performance non-graphics workloads ati technologies ati advanced micro devices amd terascale microarchitecture graphics processing units gpus vliw microarchitecture december 2015 first shipment pcs based vliw cpu elbrus-4s made russia silicon technology allowed wider implementations execution units built compiled programs earlier generation would run wider implementations encoding binary instructions depended number execution units machine transmeta addressed issue including binary-to-binary software compiler layer termed code morphing crusoe implementation x86 architecture mechanism advertised basically recompile optimize translate x86 opcodes runtime cpu internal machine code thus transmeta chip internally vliw processor effectively decoupled x86 cisc instruction set executes intel itanium architecture among others solved backward-compatibility problem general mechanism within multiple-opcode instructions bit field allocated denote dependency prior vliw instruction within program instruction stream bits set compile time thus relieving hardware calculating dependency information dependency information encoded instruction stream allows wider implementations issue multiple non-dependent vliw instructions parallel per cycle narrower implementations would issue smaller number vliw instructions per cycle another perceived deficiency vliw designs code bloat occurs one execution unit useful work thus must execute operation nop instructions occurs dependencies code instruction pipelines must allowed drain later operations proceed since number transistors chip grown perceived disadvantages vliw diminished importance vliw architectures growing popularity especially embedded system market possible customize processor application system-on-a-chip embedded vliw products available several vendors including fr-v fujitsu bsp15/16 pixelworks st231 stmicroelectronics trimedia nxp semiconductors ceva-x dsp ceva jazz dsp improv systems silicon hive texas instruments tms320 dsp line evolved c6xxx family look like vliw contrast earlier c5xxx family | [
7173,
7687,
9739,
9741,
2066,
7699,
5655,
10779,
10781,
10786,
6181,
8231,
3630,
9774,
6705,
7218,
2623,
2113,
7234,
3142,
8262,
2635,
1614,
2638,
4188,
9309,
1122,
3175,
8815,
630,
8822,
6268,
3197,
7313,
146,
9368,
6815,
8352,
5793,
682... | None |
6,819 | 9 | SmithProject:smithproject smithproject open source cfml script engine smith project initiated youngculture ag based need migrate large coldfusion based web application java-based engine cfml engines include adobe coldfusion new atlanta bluedragon lucee railo coral web builder | [
4512,
5314,
5677,
9144,
5048,
4507
] | Test |
6,820 | 2 | Windows_startup_process:windows startup process windows startup process process microsoft windows series operating systems initializes windows versions 1.01 windows 2.11 system loaded codice_1 executed loaded codice_2 codice_3 codice_4 codice_5 along configuration settings file codice_6 default shell ms-dos executive modules codice_7 codice_8 codice_9 fonts various device drivers codice_10 codice_11 codice_12 incorporated codice_2/codice_3 codice_4/codice_5 windows 3.x 95/98/me boot loader phase handled ms-dos boot phase codice_17 codice_18 executed along configuration settings files codice_6 codice_20 virtual device drivers also loaded startup process commonly loaded registry codice_21 codice_20 file system configuration files device drivers loaded 16-bit modules codice_23 codice_7 codice_9 loaded 32-bit dlls codice_26 codice_27 codice_28 loaded 32-bit vxd message server msgsrv32 starts codice_29 responsible loading network logon client client microsoft networks microsoft family logon windows logon user logging windows startup sound played shell usually codice_30 loaded boot section codice_20 file startup items loaded versions windows 9x except also possible load windows booting dos prompt typing win command line switches used win command codice_32 switch windows boots safe mode codice_33 switch windows boots safe mode networking latter switch works properly windows 95 windows 3.1 additional options available codice_34 starts windows 386 enhanced mode codice_35 starts windows standard mode startup sound added windows 3.1 windows nt boot loader called ntldr responsible accessing file system boot drive starting ntoskrnl.exe loading boot-time device drivers memory boot system drivers loaded kernel system thread starts session manager subsystem smss.exe turn starts winlogon loads graphical identification authentication library user successfully logged machine winlogon following windows 95/98/me also possible run program user logs using runservicesonce runservices keys windows nt replaced services.exe program able load set system services user logs additionally english-language versions windows startup folder called startup instead startup win9x due minimally restricted environment operating systems program add startup registry key system folder method frequently used malware sequence booting windows vista later versions different previous version windows uses nt kernel operating system boot loader vista called winload.exe invoked windows boot manager additionally gina use versions windows nt since 3.1 entirely replaced credential providers | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
7207,
1577,
10281,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10879,
8841,
6797,
2193,
9... | Validation |
6,821 | 3 | Addressing_mode:addressing mode addressing modes aspect instruction set architecture central processing unit cpu designs various addressing modes defined given instruction set architecture define machine language instructions architecture identify operand instruction addressing mode specifies calculate effective memory address operand using information held registers and/or constants contained within machine instruction elsewhere computer programming addressing modes primarily interest write assembly languages compiler writers note generally accepted way naming various addressing modes particular different authors computer manufacturers may give different names addressing mode names different addressing modes furthermore addressing mode one given architecture treated single addressing mode may represent functionality another architecture covered two addressing modes example complex instruction set computer cisc architectures digital equipment corporation dec vax treat registers literal immediate constants another addressing mode others ibm system/360 successors reduced instruction set computer risc designs encode information within instruction thus latter machines three distinct instruction codes copying one register another copying literal constant register copying contents memory location register vax single mov instruction term addressing mode subject different interpretations either memory address calculation mode operand accessing mode first interpretation instructions read memory write memory add literal register considered addressing mode second interpretation allows machines vax use operand mode bits allow register literal operand first interpretation applies instructions load effective address addressing modes listed divided code addressing data addressing computer architectures maintain distinction architectures allow almost addressing modes used context instructions shown purely representative order illustrate addressing modes necessarily reflect mnemonics used particular computer different computer architectures vary greatly number addressing modes provide hardware benefits eliminating complex addressing modes using one simpler addressing modes even though requires extra instructions perhaps extra register proven much easier design pipelined cpus addressing modes available simple ones risc architectures five simple addressing modes cisc architectures dec vax dozen addressing modes quite complicated ibm system/360 architecture three addressing modes added system/390 addressing modes particular addressing mode required usually encoded within instruction code e.g ibm system/360 successors risc lots addressing modes specific field often set aside instruction specify addressing mode dec vax allowed multiple memory operands almost instructions reserved first bits operand specifier indicate addressing mode particular operand keeping addressing mode specifier bits separate opcode operation bits produces orthogonal instruction set even computer many addressing modes measurements actual programs indicate simple addressing modes listed account 90 addressing modes used since measurements based code generated high-level languages compilers reflects extent limitations compilers used instruction set architectures intel x86 ibm/360 successors load effective address instruction performs calculation effective operand address instead acting memory location loads address would accessed register useful passing address array element subroutine may also slightly sneaky way calculations normal one instruction example using instruction addressing mode base+index+offset detailed allows one add two registers constant together one instruction |jump| address effective address absolute instruction address address parameter modifications |jump| offset jump relative effective address pc-relative instruction address offset parameter added address next instruction offset usually signed allow reference code instruction particularly useful connection jumps typical jumps nearby instructions high-level language statements reasonably short measurements actual programs suggest 8 10 bit offset large enough 90 conditional jumps roughly ±128 ±512 bytes another advantage pc-relative addressing code may position-independent i.e loaded anywhere memory without need adjust addresses versions addressing mode may conditional referring two registers jump reg1=reg2 one register jump unless reg1=0 registers implicitly referring previously-set bit status register see also conditional execution |jumpvia| reg effective address register indirect instruction address specified register example a7 access content address register a7 effect transfer control instruction whose address specified register many risc machines well cisc ibm system/360 successors subroutine call instructions place return address address register—the register-indirect addressing mode used return subroutine call nop execute following instruction cpu executing sequential instruction immediately executes following instruction sequential execution considered addressing mode computers instructions cpu architectures sequential instructions instructions sequential instructions cpu designers often add features deliberately sacrifice performance instructions—branch instructions—in order make sequential instructions run faster conditional branches load pc one 2 possible results depending condition—most cpu architectures use addressing mode taken branch sequential execution taken branch many features modern cpus -- instruction prefetch complex pipelineing out-of-order execution etc -- maintain illusion instruction finishes next one begins giving final results even though exactly happens internally basic block sequential instructions exhibits temporal spatial locality reference cpus use sequential execution program counter extremely rare cpus instruction always specifies address next instruction cpus instruction pointer holds specified address program counter provision incrementing cpus include drum memory computers ibm 650 secd machine rtx 32p computing architectures go much attempting bypass von neumann bottleneck using variety alternatives program counter computer architectures conditional instructions arm longer instructions 64-bit mode conditional load instructions x86 cases make conditional branches unnecessary avoid flushing instruction pipeline instruction 'compare used set condition code subsequent instructions include test condition code see whether obeyed ignored |skipeq| reg1| reg2| skip next instruction reg1=reg2 skip addressing may considered special kind pc-relative addressing mode fixed +1 offset like pc-relative addressing cpus versions addressing mode refer one register skip reg1=0 registers implicitly referring previously-set bit status register cpus version selects specific bit specific byte test skip bit 7 reg12 0 unlike conditional branches skip instruction never needs flush instruction pipeline though may need cause next instruction ignored mul reg1| reg2| reg3| reg1 reg2 reg3 addressing mode effective address considered addressing mode computers example operands registers result placed register sometimes referred 'base plus displacement' offset usually signed 16-bit value though 80386 expanded 32 bits offset zero becomes example register indirect addressing effective address value base register many risc machines register 0 fixed value zero register 0 used base register becomes example absolute addressing however small portion memory accessed 64 kilobytes offset 16 bits 16-bit offset may seem small relation size current computer memories 80386 expanded 32-bit could worse ibm system/360 mainframes unsigned 12-bit offset however principle locality reference applies short time span data items program wants access fairly close addressing mode closely related indexed absolute addressing mode example 1 within subroutine programmer mainly interested parameters local variables rarely exceed 64 kb one base register frame pointer suffices routine class method object-oriented language second base register needed points attributes current object self high level languages example 2 base register contains address composite type record structure offset used select field record records/structures less 32 kb size add reg1| reg2| constant reg1 reg2 constant addressing mode effective address considered addressing mode computers constant might signed unsigned example codice_1 move immediate hex value feedabba register d0 instead using operand memory value operand held within instruction dec vax machine literal operand sizes could 6 8 16 32 bits long andrew tanenbaum showed 98 constants program would fit 13 bits see risc design philosophy clear carry bit implied addressing mode also called implicit addressing mode x86 assembly language explicitly specify effective address either source destination sometimes either source destination effective address sometimes implied opcode implied addressing quite common older computers mid-1970s computers typically single register arithmetic could performed—the accumulator accumulator machines implicitly reference accumulator almost every instruction example operation b c done using sequence load b add c store -- destination accumulator implied every load add instruction source accumulator implied every store instruction later computers generally one general purpose register ram location could source destination arithmetic—and later computers need addressing mode specify source destination arithmetic among x86 instructions use implicit registers one operands results multiplication division counting conditional jump many computers x86 avr one special-purpose register called stack pointer implicitly incremented decremented pushing popping data stack source destination effective address implicitly address stored stack pointer many 32-bit computers 68000 arm powerpc one register could used stack pointer—and use register autoincrement indirect addressing mode specify registers used pushing popping data stack current computer architectures e.g ibm/390 intel pentium contain instructions implicit operands order maintain backwards compatibility earlier designs many computers instructions flip user/system mode bit interrupt-enable bit etc implicitly specify special register holds bits simplifies hardware necessary trap instructions order meet popek goldberg virtualization requirements—on system trap logic need look operand final effective address opcode cpus designed every operand always implicitly specified every instruction -- zero-operand cpus load reg address requires space instruction quite large address often available cisc machines variable-length instructions x86 risc machines special load upper literal instruction places 16- 20-bit constant top half register used base register base-plus-offset addressing mode supplies low-order 16 12 bits combination allows full 32-bit address load reg |index| address also requires space instruction quite large address address could start array vector index could select particular array element required processor may scale index register allow size array element note less base-plus-offset addressing mode except offset case large enough address memory location example 1 within subroutine programmer may define string local constant static variable address string stored literal address instruction offset—which character string use iteration loop—is stored index register example 2 programmer may define several large arrays globals class variables start array stored literal address perhaps modified program-load time relocating loader instruction references offset—which item array use iteration loop—is stored index register often instructions loop re-use register loop counter offsets several arrays load reg base|index| base register could contain start address array vector index could select particular array element required processor may scale index register allow size array element could used accessing elements array passed parameter load reg base|index| offset base register could contain start address array vector records index could select particular record required offset could select field within record processor may scale index register allow size array element load reg base|index| base register could contain start address array vector data structure index could contain offset one particular array element required addressing mode dynamically scales value index register allow size array element e.g array elements double precision floating-point numbers occupying 8 bytes value index register multiplied 8 used effective address calculation scale factor normally restricted power two shifting rather multiplication used load reg1 base| computers distinct addressing mode many computers use base plus offset offset value 0 example a7 load reg base determining effective address value base register incremented size data item accessed example a7 would access content address register a7 increase address pointer a7 1 usually 1 word within loop addressing mode used step elements array vector high-level languages often thought good idea functions return result side effects lack side effects makes program understanding validation much easier addressing mode side effect base register altered subsequent memory access causes error e.g page fault bus error address error leading interrupt restarting instruction becomes much problematic since one registers may need set back state instruction originally started least two computer architectures implementation problems regard recovery interrupts addressing mode used load reg base| determining effective address value base register decremented size data item accessed within loop addressing mode used step backwards elements array vector stack implemented using mode conjunction previous addressing mode autoincrement see discussion side-effects autoincrement addressing mode addressing modes mentioned article could extra bit indicate indirect addressing i.e address calculated using mode fact address location typically complete word contains actual effective address indirect addressing may used code data make implementation pointers references handles much easier also make easier call subroutines otherwise addressable indirect addressing carry performance penalty due extra memory access involved early minicomputers e.g dec pdp-8 data general nova registers limited addressing range 8 bits hence use memory indirect addressing almost way referring significant amount memory load reg1 base=pc offset pc-relative addressing mode used load register value stored program memory short distance away current instruction seen special case base plus offset addressing mode one selects program counter pc base register cpus support pc-relative data references cpus include mos 6502 derivatives used relative addressing branch instructions instructions used mode jumps used variety addressing modes x86-64 architecture 64-bit armv8-a architecture pc-relative addressing modes called rip-relative x86-64 literal armv8-a motorola 6809 also supports pc-relative addressing mode pdp-11 architecture vax architecture 32-bit arm architectures support pc-relative addressing pc register file addressing mode used compiler typically places constants literal pool immediately immediately subroutine uses prevent accidentally executing constants instructions addressing mode always fetches data memory stores data memory sequentially falls execute next instruction effective address points data confused pc-relative branch fetch data store data memory instead branches instruction given offset effective address points executable instruction addressing modes listed used 1950–1980 period longer available current computers list means complete many interesting peculiar addressing modes used time time e.g absolute-minus-logical-or two three index registers word size larger address word referenced memory-indirect addressing could indirect flag set indicate another memory indirect cycle flag referred indirection bit resulting pointer tagged pointer indirection bit tagging whether direct pointer indirect pointer care needed ensure chain indirect addresses refer one get infinite loop trying resolve address ibm 1620 data general nova hp 2100 series nar 2 multi-level memory indirect could enter infinite address calculation loop memory indirect addressing mode nova influenced invention indirect threaded code dec pdp-10 computer 18-bit addresses 36-bit words allowed multi-level indirect addressing possibility using index register stage well computers registers regarded occupying first 8 16 words memory e.g icl 1900 dec pdp-10 meant need separate add register register instruction – one could use add memory register instruction case early models pdp-10 cache memory tight inner loop loaded first words memory fast registers addressable installed ran much faster would magnetic core memory later models dec pdp-11 series mapped registers onto addresses input/output area primarily intended allow remote diagnostics confusingly 16-bit registers mapped onto consecutive 8-bit byte addresses dec pdp-8 minicomputer eight special locations addresses 8 15 accessed via memory indirect addressing locations would automatically increment use made easy step memory loop without needing use registers handle steps data general nova minicomputer 16 special memory locations addresses 16 31 accessed via memory indirect addressing 16 23 would automatically increment use 24 31 would automatically decrement use data general nova motorola 6800 family mos technology 6502 family processors internal registers arithmetic logical instructions mostly performed values memory opposed internal registers result many instructions required two-byte 16-bit location memory given opcodes processors one byte 8 bits length memory addresses could make significant part code size designers processors included partial remedy known zero page addressing initial 256 bytes memory 0000 – 00ff a.k.a. page 0 could accessed using one-byte absolute indexed memory address reduced instruction execution time one clock cycle instruction length one byte storing often-used data region programs could made smaller faster result zero page used similarly register file many systems however resulted high utilization zero page memory area operating system user programs limited use since free space limited zero page address mode enhanced several late model 8-bit processors including wdc 65816 csg 65ce02 motorola 6809 new mode known direct page addressing added ability move 256-byte zero page memory window start memory offset address 0000 new location within first 64 kb memory csg 65ce02 allowed direct page moved 256-byte boundary within first 64 kb memory storing 8-bit offset value new base page b register motorola 6809 could direct page dp register wdc 65816 went step allowed direct page moved location within first 64 kb memory storing 16-bit offset value new direct register result greater number programs able utilize enhanced direct page addressing mode versus legacy processors included zero page addressing mode similar scaled index addressing except instruction two extra operands typically constants hardware checks index value bounds another variation uses vector descriptors hold bounds makes easy implement dynamically allocated arrays still full bounds checking computers special indirect addressing modes subfields within words ge/honeywell 600 series character addressing indirect word specified either 6-bit 9-bit character fields within 36-bit word dec pdp-10 also 36-bit special instructions allowed memory treated sequence fixed-size bit fields bytes size 1 bit 36 bits one-word sequence descriptor memory called byte pointer held current word address within sequence bit position within word size byte instructions existed load store bytes via descriptor increment descriptor point next byte bytes split across word boundaries much dec software used five 7-bit bytes per word plain ascii characters one bit per word unused implementations c use four 9-bit bytes per word since 'malloc function c assumes size int multiple size char actual multiple determined system-dependent compile-time operator sizeof elliott 503 elliott 803 apollo guidance computer used absolute addressing index registers thus indirect jumps jumps registers supported instruction set instead could instructed add contents current memory word next instruction adding small value next instruction executed could example change codice_2 codice_3 thus creating effect indexed jump note instruction modified on-the-fly remains unchanged memory i.e self-modifying code value added next instruction large enough could modify opcode instruction well instead address | [
1029,
7173,
9739,
2062,
2066,
7699,
5655,
10779,
8732,
10781,
3615,
6181,
8231,
10796,
3630,
6705,
7218,
2620,
2623,
2113,
7234,
3142,
9291,
2638,
1122,
7269,
3175,
6250,
8815,
7281,
630,
3702,
7286,
8822,
6268,
3197,
7313,
1175,
6296,
73... | None |
6,822 | 1 | The_Third_Manifesto:third manifesto third manifesto 1995 christopher j date hugh darwen proposal future database management systems response two earlier manifestos purpose theme manifestos avoid object-relational impedance mismatch object-oriented programming languages relational database management systems third manifesto proposes maintain relational model databases support objects user-defined types major theme manifesto explain inadequacies existing relational database management systems shortcomings relational database model per se rather implementation decisions systems sql query language systems use manifesto describes alternative sql named d. specification desirable characteristics database language rather specific syntax grammar describes family languages rather particular language however example particular member hypothetical family called tutorial described detail including significant portions grammar several partial implementations exist including | [
8582,
8808,
5677,
10413,
8628,
9397,
1146,
11327
] | Validation |
6,823 | 4 | ClamWin_Free_Antivirus:clamwin free antivirus clamwin free antivirus free open-source antivirus tool windows provides graphical user interface clam antivirus engine firefox extensions allow users process downloaded files clamwin clamwin free antivirus scans demand automatically scan files read written non-affiliated projects clam sentinel winpooch add-ons provide real-time scanning capability clamwin clamwin free antivirus virus database updated automatically detects connection internet small balloon tip appears taskbar icon indicating completion status update process retries establish connection server fails download updates first time historically clamwin free antivirus suffered poor detection rates scans slow less effective antivirus programs example 2009 clamwin free antivirus failed detect almost half trojan horses password stealers malware av-test zoo malware samples 1–21 june 2008 test performed virus.gr clamwin free antivirus version 0.93 detected 54.68 threats ranked 37th 49 products tested best scored 99 10 august-05 september 2009 test performed virus.gr clamwin free antivirus version 0.95.2 detected 52.48 threats ranked 43 55 products tested best scored 98.89 6 september 2011 cnet gave clamwin free antivirus rating excellent 4 5 stars | [
2049,
7809,
131,
5891,
1417,
3981,
10637,
4374,
1052,
156,
6431,
2721,
5924,
2213,
550,
1318,
8614,
2601,
8615,
2859,
3243,
6699,
8493,
7983,
6834,
4403,
9523,
10166,
7739,
7103,
704,
9537,
7362,
10308,
4421,
202,
1355,
5069,
10574,
10708... | None |
6,824 | 3 | Battle_Cross_(1982_video_game):battle cross 1982 video game battle cross shoot 'em arcade game released omori electric 1982 player controls fighter spacecraft moving around screen shooting enemies | [
1776,
10931,
9006
] | Test |
6,825 | 5 | Media_Resource_Control_Protocol:media resource control protocol media resource control protocol mrcp communication protocol used speech servers provide various services speech recognition speech synthesis clients mrcp relies another protocol real time streaming protocol rtsp session initiation protocol sip establishing control session audio streams client server mrcp uses similar style clear-text signaling http many internet protocols message contains 3 sections first-line header body first line indicates type message well information response codes header contains number lines format nowiki header data /nowiki body whose length specified header contains details message like http mrcp uses request usually issued client response model responses may simply acknowledge receipt request give information regarding processing example mrcp client may request send audio data processing say speech recognition server could respond message containing suitable port number send data since mrcp support audio data specifically would handled protocol real-time transport protocol rtp mrcp protocol version 2 approved rfc version 2 uses sip managing sessions audio streams server clients whereas version 1 specify underlying protocol mrcp adopted wide range commercial speech servers microsoft speech server lumenvox speech engine neospeech speech engine/server nuance recognizer vocalizer sestek tts sestek call steering well commercial interactive voice response software blueworx voice response | [
8386,
9380,
9381,
3533,
10557,
10271
] | None |
6,826 | 9 | Itk:itk itk framework building mega-widgets using incr tcl object system mega-widgets high-level widgets like file browser tab notebook act like ordinary tk widgets constructed using tk widgets component parts without write c code effect mega-widget looks acts exactly like tk widget considerably easier implement | [
9345,
8262,
9575,
692,
3193
] | Validation |
6,827 | 2 | Microsoft_Bob:microsoft bob microsoft bob microsoft software product released march 11 1995 discontinued early 1996 program intended provide user-friendly interface windows 3.1x windows 95 windows nt operating systems supplanting windows program manager microsoft bob presented screens showing house rooms user could go containing familiar objects corresponding computer applications—for instance desk pen paper checkbook items case clicking pen paper would open word processor cartoon dog named rover cartoon characters provided guidance using speech balloons rover others later returned windows xp search companions upon release microsoft bob criticized media gain wide acceptance users resulted discontinuation microsoft bob released march 1995 windows 95 released although widely publicized prior date codename utopia project leader bob karen fries microsoft researcher design based research professors clifford nass byron reeves stanford university melinda gates wife bill gates marketing manager product microsoft originally purchased domain name bob.com boston-area techie bob antia later traded bob kerstein windows2000.com domain name bob included various office suite programs finance application word processor user interface designed simplify navigational experience novice computer users similar early graphical shells like jane main interface portrayed inside house different rooms corresponding common real-world room styles kitchen family room room contains decorations furniture well icons represent applications bob offers user option fully customizing entire house user full control decorating room add remove reposition objects user also add remove rooms house change destinations door also feature bob offers multiple themes room designs decorations contemporary postmodern applications built bob represented matching decorations – example clicking clock opens calendar pen paper represent word processor user also add shortcuts applications computer shortcuts display icon inside various styles decorations boxes picture frames released right internet beginning become popular bob offered email client user could subscribe mci mail dial-up email account price 5.00 per month send 15 emails per month email limited 5000 characters additional email limit reached additional 45 cents toll-free phone number called set account bob features assistants cartoon characters intended help user navigate virtual house perform tasks main interface within built-in applications edition microsoft bob bundled gateway 2000 computer around 1995 gateway edition contained gateway branding login screen along additional rooms backgrounds seen retail version one additional room attic contained box gateway 2000 computer along additional rooms icons appeared default new rooms bob one microsoft visible product failures despite discontinued windows 95 released microsoft bob continued severely criticized reviews popular media 2017 melinda gates acknowledged software needed powerful computer people back bob received 7th place pc world magazine list 25 worst tech products time number one worst product decade cnet.com spot list 50 worst inventions published time magazine called bob overly cutesy operating system designed around clippy microsoft steve ballmer mentioned bob example situation decided succeeded let stop microsoft employee raymond chen wrote article encrypted copy bob included windows xp install cds take space slow downloading illegal copies tech journalist harry mccracken called story delightfully urban legend-y tale noted similarities april fools day joke claiming bob hidden windows vista rover software dog mascot reappeared windows xp file search function typeface comic sans created used microsoft bob microsoft | [
259,
4356,
4995,
6150,
11524,
6797,
782,
1935,
4624,
8976,
10769,
10900,
3605,
11030,
3224,
11549,
7838,
7456,
929,
5666,
3875,
7970,
7333,
11559,
1832,
6441,
7215,
7727,
7983,
3890,
11060,
8757,
7359,
4289,
194,
3527,
5319,
6476,
10957,
... | None |
6,828 | 2 | Nix_package_manager:nix package manager nix cross-platform package management system utilizes purely functional deployment model software installed unique directories generated cryptographic hashes dependencies software included within hash solving problem dependency hell novel approach package management promises generate reliable reproducible portable packages nix packages defined lazy functional programming language specifically designed package management dependencies tracked directly language special values called derivations installed nix lazily nix keeps track references automatically installed packages garbage collected package depends cost greater storage requirements upgrades nix guaranteed atomic efficiently rolled back also enables multiple users safely install software system without administrator privileges nix full support linux safely installed side-by-side existing package manager macos also officially supported nixos linux distribution using nix consistently every piece software system including linux kernel | [
10760,
7181,
8213,
6680,
9245,
5155,
5670,
7722,
5677,
3131,
3649,
10817,
3667,
6227,
9324,
1138,
2168,
7293,
6797,
10900,
10394,
4775,
5819,
190,
4302,
2259,
6361,
8413,
741,
231,
2281,
7920,
6393,
2304,
11525,
2310,
7435,
7947,
9487,
78... | Test |
6,829 | 2 | Code_segment:code segment computing code segment also known text segment simply text portion object file corresponding section program virtual address space contains executable instructions term segment comes memory segment historical approach memory management succeeded paging program stored object file code segment part file loader places program memory may executed various memory regions allocated particular pages corresponding segments object files segments needed run time example code segment object file loaded corresponding code segment memory code segment memory typically read-only fixed size embedded systems usually placed read-only memory rom without need loading code segment read-only particular architecture allows self-modifying code fixed-position position independent code may shared memory several processes segmented paged memory systems memory region code segment may placed heap stack order prevent heap stack overflows overwriting | [
1922,
8966,
6921,
3603,
11411,
1820,
3386,
6078,
576,
2627,
6087,
4424,
5065,
8012,
9932,
5840,
6868,
10333,
8167,
7421
] | Validation |
6,830 | 9 | Printer_Command_Language:printer command language printer command language commonly referred pcl page description language pdl developed hewlett-packard printer protocol become de facto industry standard originally developed early inkjet printers 1984 pcl released varying levels thermal matrix page printers hp-gl/2 pjl supported later versions pcl pcl occasionally incorrectly said abbreviation printer control language actually another term page description language pcl levels 1 5e/5c command-based languages using control sequences processed interpreted order received consumer level pcl data streams generated print driver pcl output also easily generated custom applications hp introduced pcl 6 around 1995 hp laserjet 4000 series printers consists pcl 6 enhanced architecture altered modular easily modified future hp printers prints complex graphics faster reduces network traffic higher quality early implementations hp market pcl 6 well thus causing confusion terminology pcl xl renamed pcl 6 enhanced many third-party products still use older term products may claim pcl 6 compliant may include pcl 5 backward compatibility pcl 6 enhanced primarily generated printer drivers windows cups due structure compression methodology custom applications rarely use directly pcl 6 enhanced stack-based object-oriented protocol similar postscript however restricted binary encoding opposed postscript sent either binary code plain text plain-text commands code examples shown pcl programming documentation meant compiled utility like hp jetasm sent printer pcl 6 enhanced designed match drawing model windows gdi way windows printer driver simply passes gdi commands little modification leading faster return-to-application times microsoft extended concept next-generation xps format printer implementations xps developed new idea comparable display postscript apple quartz contrast gdi printers compressed bitmap sent printer jetready printers clj 3500/3550/3600 use undocumented extensions otherwise mandate class 3.0 inputs pjl printer job language introduced hp laserjet iiisi pjl adds job level controls printer language switching job separation environment commands status readback device attendance file system commands | [
10885,
3974,
5384,
137,
6797,
4751,
11665,
8733,
11694,
8628,
8763,
11074,
9795,
3524,
73,
7626,
3323,
10960,
465,
9683,
1877,
4836,
10352,
3579
] | Test |
6,831 | 1 | Raima_Database_Manager:raima database manager raima database manager rdm acid-compliant embedded database management system designed use embedded systems applications rdm designed utilize multi-core computers networking local wide area on-disk in-memory storage management rdm provides support multiple application programming interfaces apis low-level c api c++ sql native odbc jdbc ado.net labview rdm highly portable available windows linux unix several real-time embedded operating systems source-code license also available rdm support non-sql record cursor level database access sql database design manipulation capabilities non-sql features important resource-restricted embedded system environments high performance small footprint priority sql important providing widely-known standard database access method small enough footprint embedded systems environments raima inc. originally released rdm 1984 called db_vista one first microcomputer network model database management systems designed exclusively use c language applications companion product called db_query introduced 1986 first sql-like query report writing utility network model database db_vista derivative dbms designed provide high-performance transaction-processing client-server sql dbms called raima database server rds released 1993 first dbms provided odbc api native sql interface also first sql system incorporated use network model ddl features soon thereafter rds renamed velocis 2001 rdm server version 8.4 rdm server released 2012 uninterrupted development rdm also known rdm embedded continued recent feature additions including database mirroring use support highly available ha systems database replication multi-version concurrency read-only transactions multiple transactional file server access encryption sql designed specifically use embedded systems applications version 12.0 rdm released 2013 also 2013 rdm introduced first on-platform sql dbms available use national instruments labview graphical programming language named national instruments labview embedded tools network product year version 14.0 rdm released q3/16 rdm v. 14.0 contains all-new data storage engine optimized specifically working in-memory resident data sets new in-memory database imdb allows significant performance gains reduction processing requirements compared older in-memory on-disk implementations version 14.1 rdm released q1/18 new release focuses ease use portability speed raima new file format develop deploy anywhere performance increased 50-100 depending use case compared previous rdm releases raima extended improved sql support snapshots geospatial functionality version 14.1 consolidates source code lines features raima database manager rdm server one source code rdm 14.1 includes major features updated in-memory support snapshots r-tree support compression encryption sql sql pl platform independence—develop deploy anywhere rmd 14.1 includes portability options direct copy paste permit development deployment different target platforms regardless architecture byte order release includes streamlined interface cursor-based extended sql support stored procedures support sql pl also supports odbc c c++ ado.net c jdbc java supported development environments include microsoft visual studio apple xcode eclipse wind river workbench redesigned optimized database file format architecture maintains acid compliance data safeguards separate formats in-memory on-disk hybrid storage file formats hide hardware platform specifics e.g. byte ordering download packages include examples rdm speed performance benchmarks transactional file server tfs software component within rdm system maintains safe multi-user transactional updates set files responds page requests tfserver utility links tfs allow run separate utility allowing users run rdm distributed computing environment tfs may also linked directly application avoid rpc overhead calling separate server modes operation dynamic ddl encryption additional sql data types data providers drivers interoperability different “ tree ” support snapshots circular tables support database limitations data types supported non-sql core ddl features sql ddl features rdm transactional file server tfs specializes serving managing database files given medium tfs set functions called rdm runtime manage sharing database files among one runtime library instances normal multi-user configuration tfs functions wrapped server process called tfserver standard tcp/ip used make connection whether runtime library tfserver computer different computers however computer faster shared-memory protocol available default figure shows one rdm client runtime may connections multiple tfservers one tfserver may used multiple client runtimes applications using rdm runtime tfservers locations processes invisible processes may one computer may different computers provides opportunities true distributed processing tfserver considered “ database controller ” much way disk controller manages storage device tfs initialized root directory stored files managed tfs one computer multiple disk controllers recommended one tfserver assigned controller facilitates parallelism one computer especially multiple cpu cores also present complete application system may multiple tfservers running one computer multiple computers networked together tfserver able run parallel others allowing performance scale accordingly tfs functions used rdm runtime programmer visibility calls made functions made available runtime library three forms descriptive reasons call tfsr tfst tfss rdm database union feature provides unified view multiple identically structured databases since rdm allows highly distributed data storage processing feature provides mechanism unifying distributed data giving appearance single large database simple illustration consider widely distributed database organization headquarters seattle branch offices boston london mumbai office owns maintains employee records locally headquarters also performs reporting entire organization database location structure identical others although fully contained database location also considered partition larger global database case partitioning based geographical location mechanism querying distributed database simple programmer database opened partitions referenced together symbols “ ” individual partition names partitioning unified queries also used scaling performance consider database operation begins lookup record ’ primary key “ database ” composed four partitions stored multi-core computer different disks controlled different disk controllers requirement scheme divides primary key among four partitions scheme modulo primary key application quickly determines partition store record read record since multiple cpu cores run multiple processes applications tfss four partitions accessible parallel four controllers permit processing capacity four times larger single-core single-disk single-partition configuration rdm allows database content encrypted transported across network written database files rdm encryption supports rijndael/aes encryption algorithm 128- 192- 256-bit keys based application-specified encryption key database mirroring rdm reproduces exact byte-for-byte copy master database onto mirrored slave database database mirroring important database feature applications require high availability ha tfserver fail reason application ha monitor automatically switch mirrored tfserver rdm provides synchronous mirroring transaction committed master tfserver also securely committed mirror tfserver rdm also provides set ha support api functions called application ha monitor monitor operational status tfservers mirroring also used support maintaining multiple copies database updates made master readers directed one mirrored slaves order distribute many possible database readers across multiple computers situation necessary master wait slave confirm successful commit transaction mirroring process run asynchronously rdm database mirroring requires master mirrored databases maintained computer/operating system platforms due released q2/18 replication similar mirroring really intended ha support transferring likely portions one database master another database slave replication designed work databases necessarily maintained platform slave databases rdm-managed databases 3rd-party dbms rdm replication includes support multiple master single slave selective replication circular table data—important embedded computers devices edge data grid status condition monitoring occurs status data stored master circular table replicated central control system maintaining permanent history device statuses made available variety time series analyses rdm also provides database change notification api library allows slave access master replication logs without data stored managed database allows example master store device control information database replicated device notification api order efficiently control device operation rdm sql programming language sql pl based ansi/iso sql persistent stored modules psm specification iso/iec 90756-4:2011 +2012 provides high-level language stored procedures functions written compiled called within rdm sql system rdm sql designed specifically use embedded systems applications important features rdm sql include rdm provides application programming interfaces allow application development variety programming languages rdm ported wide variety computers operating systems packages available following platforms rdm 14.1 consists two packages rdm 14.1 core rdm 14.1 enterprise rdm based applications used today major industries including aerospace defense automotive business automation financial government industrial automation medical telecommunication sampling rdm users includes following | [
10048,
7650,
7080,
10921,
5612,
4781,
10286,
6395,
7983,
9263,
10413,
3219,
5492,
10389,
823,
3323,
8188
] | Validation |
6,832 | 8 | Versus_IO:versus io versus online comparison tool mobile phones tablets cameras camcorders cities versus aims 1 destination help users make informed buying decisions world ’ first multi-language all-algorithm big data driven content provider generating fully automated natural text keen focus user interface comparison platform turns raw data natural language simplifies complexity using versus consumers able view results simple clear format without ‘ information overload ’ ultimately allowing users digest complex product data quickly efficiently versus plans add additional 640 categories include real estate motorcycles food credit cards banks plastic surgeons even people unlike similar sites comparisons include user reviews strictly based technical specifications screen resolution processing power site presents results pointing one prefer product service launched april 2012 german startup urge io currently available 18 languages claims 500k monthly visits 60 page-view growth rate monthly basis | [] | None |
6,833 | 7 | Community_cloud:community cloud community cloud computing collaborative effort infrastructure shared several organizations specific community common concerns security compliance jurisdiction etc whether managed internally third-party hosted internally externally controlled used group organizations shared interest costs spread fewer users public cloud private cloud cost savings potential cloud computing realized | [
4194
] | Test |
6,834 | 4 | Cisco_Systems:cisco systems cisco systems inc. american multinational technology conglomerate headquartered san jose california center silicon valley cisco develops manufactures sells networking hardware telecommunications equipment high-technology services products numerous acquired subsidiaries opendns webex jabber jasper cisco specializes specific tech markets internet things iot domain security energy management cisco stock added dow jones industrial average june 8 2009 also included p 500 index russell 1000 index nasdaq-100 index russell 1000 growth stock index cisco systems founded december 1984 leonard bosack sandy lerner two stanford university computer scientists pioneered concept local area network lan used connect geographically disparate computers multiprotocol router system time company went public 1990 cisco market capitalization 224 million end dot-com bubble year 2000 cisco 500 billion market capitalization cisco systems founded december 1984 sandy lerner director computer facilities stanford university graduate school business lerner partnered husband leonard bosack charge stanford university computer science department computers cisco initial product roots stanford university campus technology early 1980s students staff stanford including bosack used technology campus link school computer systems talk one another creating box functioned multiprotocol router called blue box blue box used software originally written stanford research engineer william yeager due underlying architecture ability scale well yeager well-designed invention became key cisco early success 1985 bosack stanford employee kirk lougheed began project formally network stanford campus adapted yeager software became foundation cisco ios despite yeager claims denied permission sell blue box commercially july 11 1986 bosack lougheed forced resign stanford university contemplated filing criminal complaints cisco founders theft software hardware designs intellectual properties 1987 stanford licensed router software two computer boards cisco addition bosack lerner lougheed greg satz programmer richard troiano handled sales completed early cisco team company first ceo bill graves held position 1987 1988 1988 john morgridge appointed ceo name cisco derived city name san francisco company engineers insisted using lower case cisco early years logo intended depict two towers golden gate bridge february 16 1990 cisco systems went public market capitalization 224 million listed nasdaq stock exchange august 28 1990 lerner fired upon hearing news husband bosack resigned protest couple walked away cisco 170 million 70 committed charity although cisco first company develop sell dedicated network nodes one first sell commercially successful routers supporting multiple network protocols classical cpu-based architecture early cisco devices coupled flexibility operating system ios allowed keeping evolving technology needs means frequent software upgrades popular models time cisco 2500 managed stay production almost decade virtually unchanged company quick capture emerging service provider environment entering sp market product lines cisco 7000 cisco 8500 1992 1994 cisco acquired several companies ethernet switching kalpana grand junction notably mario mazzola crescendo communications together formed catalyst business unit time company envisioned layer 3 routing layer 2 ethernet token ring switching complementary functions different intelligence architecture—the former slow complex latter fast simple philosophy dominated company product lines throughout 1990s 1995 john morgridge succeeded john chambers internet protocol ip became widely adopted mid-to-late 1990s cisco introduced products ranging modem access shelves as5200 core gsr routers making major player market late march 2000 height dot-com bubble cisco became valuable company world market capitalization 500 billion july 2014 market cap us 129 billion still one valuable companies perceived complexity programming routing functions silicon led formation several startups determined find new ways process ip mpls packets entirely hardware blur boundaries routing switching one juniper networks shipped first product 1999 2000 chipped away 30 cisco sp market share response cisco later developed homegrown asics fast processing cards gsr routers catalyst 6500 switches 2004 cisco also started migration new high-end hardware crs-1 software architecture ios-xr part rebranding campaign 2006 cisco systems adopted shortened name cisco created human network advertising campaign efforts meant make cisco household brand—a strategy designed support low-end linksys products future consumer products traditional business side cisco continued develop routing switching security portfolio quickly growing importance ethernet also influenced company product lines limits ios aging crescendo architecture also forced cisco look merchant silicon carrier ethernet segment resulted new asr9000 product family intended consolidate company carrier ethernet subscriber management business around ezchip-based hardware ios-xr throughout mid-2000s cisco also built significant presence india establishing globalization centre east bangalore 1 billion cisco also expanded new markets acquisition—one example 2009 purchase mobile specialist starent networks cisco continued challenged domestic alcatel-lucent juniper networks overseas competitors huawei due lower-than-expected profit 2011 cisco reduced annual expenses 1 billion company cut around 3,000 employees early-retirement program accepted buyout planned eliminate many 10,000 jobs around 14 percent 73,400 total employees curtailment 2011 analyst call cisco ceo john chambers called several competitors name including juniper hp july 24 2012 cisco received approval eu acquire nds tv software developer us 5 billion 2013 cisco sold linksys home-router unit belkin international inc. signaling shift sales businesses rather consumers july 23 2013 cisco systems announced definitive agreement acquire sourcefire 2.7 billion august 14 2013 cisco systems announced would cut 4,000 jobs workforce roughly 6 starting 2014 end 2013 cisco announced poor revenue due depressed sales emerging markets caused economic uncertainty fears national security agency planting backdoors products april 2014 cisco announced funding early-stage firms focus internet things investment fund allocated investments iot accelerators startups alchemist accelerator ayla networks evrythng later year company announced laying another 6,000 workers 8 global workforce part second restructuring november 4 2014 cisco announced investment stratoscale may 4 2015 cisco announced ceo chairman john chambers would step ceo july 26 2015 remain chairman chuck robbins senior vice president worldwide sales operations 17-year cisco veteran announced next ceo july 23 2015 cisco announced divesture television set-top-box cable modem business technicolor sa 600 million division originally formed cisco 6.9 billion purchase scientific atlanta deal came part cisco gradual exit consumer market part effort cisco new leadership focus cloud-based products enterprise segments cisco indicated would still collaborate technicolor video products november 19 2015 cisco alongside arm holdings dell intel microsoft princeton university founded openfog consortium promote interests development fog computing january 2016 cisco invested velocloud software-defined wan sd-wan start-up cloud offering configuring optimizing branch office networks cisco contributed velocloud 27 million series c round led march capital partners february 2017 cisco launched cloud-based secure internet gateway called cisco umbrella provide safe internet access users n't use corporate networks vpns connect remote data centers immediately reporting fourth quarter earnings 2017 cisco price-per-share value jumped 7 earnings per share ratio increased 60 61 cents per share due part cisco outperformance analyst expectations september 2017 chambers announced would step executive chairman role end term board december 2017 december 11 2017 robbins elected succeed chambers executive chairman retaining role ceo chambers given title chairman emeritus reuters reported cisco systems inc ’ csco.o product revenue russia grew 20 percent 2017 ahead cisco ’ technology product revenue growth so-called bric countries brazil china india may 1 2018 cisco systems agreed buy ai-driven business intelligence startup accompany 270 million june 2018 cisco systems ranked 444th forbes global 2000 list 221.3 billion market cap fiscal year 2017 cisco reported earnings us 0.1 billion annual revenue us 49.3 billion increase 2.8 previous fiscal cycle cisco shares traded 43 per share market capitalization valued us 213.2 billion september 2018 low net income fiscal year 2018 attributed one time tax charge allowed cisco bring back capital overseas cisco used money able bring back lower tax rate fund share buybacks acquisitions cisco acquired variety companies spin products talent company 1995–1996 company completed 11 acquisitions several acquisitions stratacom biggest deals industry occurred internet boom 1999 company acquired cerent corporation start-up company located petaluma california us 7 billion expensive acquisition made cisco date acquisition scientific atlanta larger 1999 cisco also acquired stake 1 billion kpmg consulting enable establishing internet firm metrius founded keyur patel fuse several acquired companies grown 1bn+ business units cisco including lan switching enterprise voice internet protocol voip platform webex home networking latter came result cisco acquiring linksys 2003 2010 supplemented new product line dubbed cisco valet cisco announced january 12 2005 would acquire airespace us 450 million reinforce wireless controller product lines cisco announced january 4 2007 would buy ironport deal valued us 830 million completed acquisition june 25 2007 ironport best known ironport antispam senderbase email reputation service email security appliances accordingly ironport integrated cisco security business unit ironport senderbase renamed sensorbase take account input database cisco devices provide sensorbase allows devices build risk profile ip addresses therefore allowing risk profiles dynamically created http sites smtp email sources cisco announced march 15 2012 would acquire nds group 5bn transaction completed july 30 2012 recent merger deals cisco bought starent networks mobile packet core company moto development group product design consulting firm helped develop cisco flip video camera also 2010 cisco became key stakeholder e-skills week march 2011 cisco completed acquisition privately held network configuration change management software company pari networks although many buy-ins crescendo networks 1993 tandberg 2010 resulted acquisition flagship technology cisco many others failed—partially completely instance 2010 cisco occupied meaningful share packet-optical market revenues still par us 7 billion price tag paid 1999 cerent acquired technologies flip pure digital saw product lines terminated january 2013 cisco systems acquired israeli software maker intucell around 475 million cash move expand mobile network management offerings month cisco systems acquired cognitive security company focused cyber threat protection cisco also acquired solvedirect cloud services march 2013 ubiquisys mobile software april 2013 cisco acquired cyber-security firm sourcefire october 2013 june 16 2014 cisco announced completed acquisition threatgrid company provided dynamic malware analysis threat intelligence technology june 17 2014 cisco announced intent acquire privately held tail-f systems leader multi-vendor network service orchestration solutions traditional virtualized networks april 2 2015 cisco announced plans buy embrane software-defined networking startup deal give cisco embrane software platform provides layer 3–7 network services things firewalls vpn termination server load balancers ssl offload may 7 2015 cisco announced plans buy tropo cloud api platform simplifies addition real-time communications collaboration capabilities within applications june 30 2015 cisco acquired privately held opendns company best known dns service adds level security monitoring domain name requests august 6 2015 cisco announced completed acquisition privately held maintenancenet us-based company best known cloud-based contract management platform serviceexchange month cisco acquired pawaa privately held company bangalore india provides secure on-premises cloud-based file-sharing software september 30 2015 cisco announced intent acquire privately held portcullis computer security uk-based company provides cybersecurity services enterprise clients government sectors october 26 2015 cisco announced intent acquire parstream privately held company based cologne germany provides analytics database allows companies analyze large amounts data store near real time anywhere network october 27 2015 cisco announced would acquire lancope company focuses detecting threat activity 452.5 million cash-and-equity deal june 28 2016 cisco announced intent acquire cloudlock privately held cloud security company founded 2011 three israeli military veterans 293 million deal expected close first quarter 2017 august 2016 cisco announced getting closer making deal acquire springpath startup whose technology used cisco hyperflex systems cisco already owns undisclosed stake hyper-converged provider january 2017 cisco announced would acquire appdynamics company monitors application performance 3.7 billion acquisition came one day appdynamics set ipo january 26 2017 cisco founded innovation alliance germany eleven companies bringing together 40 sites 2,000 staff provide small businesses germany expertise august 1 2017 cisco completed acquisition viptela inc. 610 million cash assumed equity awards viptela privately held software-defined wide area network sd-wan company based san jose ca october 23 2017 cisco systems announced would acquiring broadsoft 1.9 billion entrench cloud communication collaboration area 2017 cisco systems shares mainly held institutional investors vanguard group blackrock state street corporation others cisco products services focus upon three market segments—enterprise service provider midsize small business cisco provides products services across five major technology areas networking including ethernet optical wireless mobility security collaboration including voice video data data center internet things cisco grown increasingly popular asia-pacific region last three decades dominant vendor australian market leadership across market segments uses australian office one main headquarters asia-pacific region offering diverse product portfolio long-term stability integration sustainable competitive advantage cisco became major provider voice ip enterprises moving home user market acquisitions scientific atlanta linksys scientific atlanta provides voip equipment cable service providers time warner cablevision rogers communications upc others linksys partnered companies skype microsoft yahoo integrate consumer voip services wireless cordless phones cisco partners offer cloud-based services based cisco virtualized unified computing system ucs part cisco unified services delivery solution includes hosted versions cisco unified communications manager ucm cisco unified contact center cisco unified mobility cisco unified presence cisco unity connection unified messaging cisco webex meeting center part tactical operations initiative cisco maintains several network emergency response vehicles nerv s. vehicles maintained deployed cisco employees natural disasters public crises vehicles self-contained provide wired wireless services including voice radio interoperability voice ip network-based video surveillance secured high-definition video-conferencing leaders first responders crisis areas 3 mbit/s bandwidth via 1.8-meter satellite antenna nervs based cisco headquarters sites san jose california research triangle park north carolina allowing strategic deployment north america become fully operational within 15 minutes arrival high-capacity diesel fuel-tanks allow largest vehicles run 72 hours continuously nerv deployed incidents october 2007 california wildfires hurricanes gustav ike katrina 2010 san bruno gas pipeline explosion tornado outbreaks north carolina alabama 2011 hurricane sandy 2012 tactical operations team maintains deploys smaller portable communication kits emergencies outside north america 2010 team deployed assist earthquake recovery haiti christchurch new zealand 2011 deployed flooding brazil well response 2011 earthquake tsunami japan 2011 cisco received innovation preparedness award american red cross silicon valley chapter development use vehicles disasters cisco systems also sponsors line professional certifications cisco products four five path network designers levels certification entry ccent associate ccna/ccda professional ccnp/ccdp expert ccie/ccde recently architect ccar ccde previous well nine different paths routing switching design industrial network network security service provider service provider operations storage networking voice datacenter wireless number specialist technician sales datacenter certifications also available cisco also provides training certifications via portal called cisco networking academy qualifying schools become members cisco networking academy provide ccna level level courses cisco academy instructors must ccna certified ccai certified instructor cisco often finds involved technical education 10,000 partnerships 65 countries cisco academy program operates many exotic locations example march 2013 cisco announced interest myanmar investing two cisco networking academies yangon mandalay channel partner network cisco products including ip phones telepresence seen movies tv series company featured documentary film something ventured premiered 2011 cisco 2002–03 recipient ron brown award u.s. presidential honor recognize companies exemplary quality relationships employees communities cisco included part fortune 100 best companies work ranking 20 2011 according report technology consulting firm lexinnova cisco one leading recipients network security-related patents largest portfolio within companies 6,442 security-related patents 2015 class action lawsuit filed april 20 2001 accused cisco making misleading statements relied purchasers cisco stock insider trading cisco denied allegations suit august 18 2006 cisco liability insurers directors officers paid plaintiffs us 91.75 million settle suit december 11 2008 free software foundation filed suit cisco regarding cisco failure comply gpl lgpl license models make applicable source code publicly available may 20 2009 cisco settled lawsuit complying fsf licensing terms making monetary contribution fsf cisco criticized involvement censorship people republic china according author ethan gutmann cisco telecommunications equipment providers supplied chinese government surveillance internet infrastructure equipment used block internet websites track online activities china cisco stated customize develop specialized unique filtering capabilities enable governments block access information sells equipment china sells worldwide wired news uncovered leaked confidential cisco powerpoint presentation detailed commercial opportunities golden shield project internet control may 2011 group falun gong practitioners filed lawsuit alien tort statute alleging cisco knowingly developed customized product assist chinese government prosecution abuse falun gong practitioners lawsuit dismissed september 2014 united states district court northern district california decision appealed united states court appeals ninth circuit september 2015 october 2007 employees cisco brazilian unit arrested charges imported equipment without paying import duties response cisco stated import directly brazil instead use middlemen december 1 2008 multiven filed antitrust lawsuit cisco systems inc. multiven complaint alleges cisco harmed multiven consumers bundling tying bug fixes/patches updates operating system software maintenance services smartnet may 2010 cisco accused person filed antitrust suit british-nigerian technology entrepreneur peter alfred-adekeye hacking pressured us government extradite canada cisco settled antitrust lawsuit two months alfred-adekeye arrest making software updates available multiven customers cisco linksys e2700 e3500 e4500 devices reported remotely updated firmware version forces users register cloud service allows cisco monitor network use ultimately shut cloud service account thus render affected router unusable according german magazine der spiegel nsa developed jetplow gaining access asa series 5505 5510 5520 5540 5550 500-series pix firewalls cisco chief security officer addressed allegations publicly denied working government weaken cisco products exploitation implement security back doors document included trove national security agency files released glenn greenwald book place hide details agency tailored access operations tao unit nsa employees intercept servers routers network gear shipped organizations targeted surveillance install covert firmware onto delivered trojan horse systems described nsa manager “ productive operations tao pre-position access points hard target networks around world. ” cisco denied allegations customer document saying information included specific cisco products supply chain intervention implant techniques new security vulnerabilities cisco general counsel also said cisco work government including united states government weaken products allegations reported prompted company ceo express concern president united states march 2014 cisco systems sued patent infringement spherix says 43 billion cisco sales infringe old nortel patents owned spherix officials spherix saying wide range cisco products switches routers infringe 11 former nortel patents company owns january 2008 cisco announced investment 10 million three years towards job creation technology sector development palestinian territories according cisco project cooperation palestinian authority president mahmoud abbas ramallah-based exalt technologies handles software development cisco outsources palestinian territories | [
2049,
7681,
10242,
9732,
517,
1541,
8711,
2057,
6153,
2060,
7698,
5141,
8726,
2071,
9749,
10265,
1052,
3614,
7199,
2080,
8735,
2085,
550,
11303,
2601,
6699,
10283,
2607,
8752,
9779,
10297,
5178,
10302,
10303,
10307,
10308,
11333,
6214,
3657... | Test |
6,835 | 2 | Sky_Force:sky force sky force vertically scrolling shoot 'em video game series created polish video game developer infinite dreams inc.. gameplay reminiscent capcom 19xx series seibu kaihatsu raiden series featuring weapon upgrade system large end stage bosses first title series originally released symbian pocket pc 2004 ported palm webos 2005 ios 2009 android 2010 first game series entirely sprite-based 2d game game received near perfect rating ign gave score 9.5 10 second outing initially released symbian pocket pc palm webos 2006 later released ios 2009 iphone ios 7 2010 psp 2011 psp version sky force reloaded simply named sky force 2d graphics style first title combined 3d polygon objects like destructible towers received remake mobile 2016 pc playstation 4 xbox one versions released 2017 also nintendo switch version released 2018 psp version game received metascore 69 100 metacritic based 6 reviews third part series released 2014 ios android free-to-play game third part series 2d graphics first two titles entirely replaced polygonal 3d graphics ios version game received favorable metascore 83 100 composed 8 reviews title windows version sky force 2014 released steam 2015 apple tv 4 2016 released playstation 3 playstation 4 playstation vita via playstation network summer 2016 version f2p improved upgrade system game received favorable review hardcore gamer gave score 4 5 | [
8937,
4082,
6797
] | Test |
6,836 | 8 | Deferred_deep_linking:deferred deep linking deferred deep linking one aspect mobile deep linking describes principle deep linking app yet installed case deep linking deferred application installed user implies clicking otherwise invoking deep link causes common use case drive installs linking functionality not-yet-installed app provides user incentive install deferred deep linking allows mobile developers mobile marketers deliver seamlessly automated user experience whether app previously installed improving conversion rates user retention currently industry standard deferred deep linking various platform providers offer differing levels support platforms real support majority option roll-your-own approach general approach provide mechanism url parameters passed around app store ie received source linking application click stored passed destination linked-to application installed launched major technical challenge solve approach identifying click caused install correct url parameters passed newly-installed app tying clicks installs family technologies known attribution | [
8413,
6469
] | Test |
6,837 | 2 | RSTS/E:rsts/e rsts multi-user time-sharing operating system initially developed evans griffiths hart boston acquired digital equipment corporation dec part hewlett packard pdp-11 series 16-bit minicomputers first version rsts rsts-11 version 1 implemented 1970 dec software engineers developed tss-8 time-sharing operating system pdp-8 last version rsts rsts/e version 10.1 released september 1992 rsts-11 rsts/e usually referred rsts article generally use shorter form kernel rsts programmed assembly language macro-11 compiled installed disk using cilus program running dos-11 operating system rsts booted extended version basic programming language dec called basic-plus system software cusps operating system including programs resource accounting login logout managing system written basic-plus 1970 1973 rsts ran 56k bytes magnetic core memory 64 kilobytes including memory-mapped i/o space would allow system 16 terminals maximum 17 jobs maximum program size 16k bytes end 1973 dec estimated 150 licensed systems running rsts 1973 memory management support included rsts rsts/e newer dec pdp-11/40 pdp-11/45 minicomputers pdp-11/20 supported rsts-11 introduction memory management newer pdp-11 computers meant machines able address four times amount memory 18-bit addressing 256k bytes also paved way developers separate user mode processes core kernel 1975 memory management support updated newer 22-bit addressable pdp-11/70 rsts systems could expanded use much two megabytes memory running 63 jobs rts ccl concepts introduced although compiled sysgen multi-terminal service introduced would allow single job ability control multiple terminals 128 total large-message send/receive interprocess communication became sophisticated efficient august 1,200 licensed systems 1977 installation process rsts longer dependent dos-11 rsts kernel could compiled rt-11 rts formatted kernel file rt-11 silus copied system disks computer time-sharing basic-plus rts well rt-11 rsx-11 teco third party rtss ran user mode processes independent rsts kernel systems manager could decide bootstrap phase rts run systems default kbm 3,100 licensed systems 1978 final memory management update included machines could support 22bit addressing rsts could use maximum amount memory available pdp-11 4 megabytes support also included supervisory mode made rsts first dec operating system capability decnet also supported well remote diagnostics field service technicians rdc colorado springs colorado dec subscription service end decade 5,000 licensed systems 1981 support separate instruction data space users unibus machines pdp-11/44 pdp-11/45 pdp-11/55 pdp-11/70 provided extension memory constraints individual program compiling programs use separate instruction data space would soon give program 64 kb instructions 64 kb buffering data dcl rts included well support newer revision decnet iii 1983 rsts/e v8.0-06 included support smallest 18-bit pdp-11 sold dec micropdp-11 pre-generated kernel cusps included distribution make installation micropdp-11 easier dec sold pre-generated version micropdp-11 microrsts reduced price however users needed purchase full version need generate kernel file system upgraded given designation rsts directory structure 1 rds1 previous versions rsts file system given designation rds0 newer file system designed support 1700 user accounts thought well 10,000 licensed users least equal number unlicensed users 1985 1989 rsts became mature product version 9 revisions dcl installed primary rts file system upgraded rds1.2 support new user account features passwords encrypted using modified des algorithm instead limited six 6 characters stored dec radix-50 format version 9 non-user system account project group zero designation 0,1 accounts project number 1 privileged unlike root account unix systems version 9 released additional accounts could created project zero multiple privileges could individually set account support lat protocol included well ability run newest version decnet iv network enhancements gave user connected terminal decserver ability communicate rsts machine easily could vax running vms dcl command structure dec operating systems also contributed familiar look feel another pseudo command file processor based vms features dcl command file processor fully supported integrated rsts extensive changes dcl monitor dcl executes command files part job therefore pseudo keyboard forcing commands keyboard necessary atpk 1994 dec sold pdp-11 software business mentec digital continued support pdp-11 customers short period assistance mentec staff issue ip rights digital later compaq later still hewlett packard straightforward much mis-information pervaded hobbyist user community digital mentec granted no-cost license anyone non-commercial hobby purpose use specific non-current versions several operating systems developed pdp-11 use specific pdp-11 emulator known simh emulators versions pdp software released use authorized disk images authorized operating systems may found internet along simh emulator ibm pc class computers thus possible hobbyist run rsts/e personal computer using software emulation fast faster originally ran real hardware standard complement documentation manuals accompanies rsts distribution consists least 11 large three-ring binders collectively known orange wall one small three-ring binder containing rsts/e quick reference guide paperback copy introduction basic aa-0155b-tk 11 three-ring binders contains volume 1 general information installation volume 2 system management volume 3 system usage volume 4 utilities volume 4a utilities volume 4b utilities volume 5 basic-plus volume 6 system programming volume 7 macro programming volume 7a macro programming volume 8 rms last software product description dec outlined following topics major features rsts/e version 10.1 rsts uses serial communication connection interact operator connection might local computer terminal 20 current loop interface rs-232 interface either local serial port remote connection via modem ethernet connection utilizing decnet lat many 128 terminals using multi-terminal service could connect rsts system running maximum 63 jobs depending processor used amount memory disk space system load rsts systems nowhere near many terminals users could also submit jobs run batch mode also batch program called atpk allowed users run series commands imaginary terminal pseudo-terminal semi-interactive mode similar batch commands ms-dos users connected system typing login command hello logged-out terminal pressing return actually typing command logged-out terminal simply started login program interpreted command one commands allowed used user yet logged logged associated program command chained otherwise message please say hello printed terminal prior version 9 user could also initiate 1 line login however left password screen anyone behind view examples follow one could determine status terminal command responses printed command interpreter logged-in user communicating basic-plus kbm given prompt ready user logged given prompt bye user would log supplying ppn number password user numbers consisted project number would equivalent group number unix comma programmer number numbers range 0 254 special exceptions specifying account project programmer number enclosed brackets typical user number could 10,5 project 10 programmer 5 2,146 254,31 200,220 etc user running system program logged system manager enabled ppn number 0,0 would appear systat cusp ** ** thus valid account number every project programmer number 0 usually reserved group account could referenced special symbol one user number 20,103 reference file name beginning would refer file stored account user number 20,0 feature would useful educational environments programmer number 0 could issued instructor class individuals students given accounts project number instructor could store account files marked shared project number would students class two special classes project numbers existed project number 0 generally reserved system software prior version 9 1 project 0 account named 0,1 programmers project number 1 privileged accounts equivalent single account root unix systems except account numbers 1,0 1,254 privileged accounts version 9 released account could granted specific privileges systems manager account 0,1 used store operating system file run-time library systems certain system files relating booting system author comments appear right bold dir command installed ccl equivalent run command direct program 0,1 account number directory name operating system storage account would referred project number 0 programmer number 1 numbers shown file represent size disk blocks block 512 bytes 1/2 kilobyte k c indicates file contiguous stored one file without separated pieces similar files microsoft windows system drive defragmented p indicates specially protected deleted even privileged user unless p bit cleared separate command numbers brackets like 40 represent protections file always displayed decimal protections indicate file may seen user users programmer number file read may altered another user whether file may executed ordimary user giving additional privileges protection codes similar r w x protections unix similar operating systems bsd linux code 60 equivalent private file code 63 private non-deletable file 40 public file library files kept account 1,1 usually referenced logical name lb account 1,2 system startup account much like unix system starting root contains system cusps could referenced prefixing cusp name dollar sign used account 1,3 1,4 1,5 account 1,1 also special privilege account user logged account permitted execute poke system call put values memory system thus account number 1,1 closest equivalent root unix-based systems one features rsts means execution programs environment used run various environments allowed programming basic-plus enhanced basic-plus-2 traditional programming languages cobol fortran environments separate one could start program one environment system would switch different environment running different program return user original environment started environments referred rts term command line interface rtss kbm prior version 9 systems manager needed define rts system would start one would execute compiled programs systems manager may also install special ccl commands take precedence kbm commands exception dcl ccl analogous shortcut program windows system symbolic link unix-based systems ccls installed memory-resident command either startup dynamically system running system manager i.e permanent like disk file logged user switch environments type language statements basic-plus programming language issue run commands specific programs issue special command called ccl execute program command options rsts systems managers generated kernel include control-t one line status option could tell program running rts program using much memory program taking much could expand much memory rts using programs written basic-plus ran basic rts allowed 32k bytes memory 64k total language interpreted different keyword internally converted unique byte code variables data indexed stored separately within memory space internal byte-code format known pcode interactive save command issued basic plus rts simply saved working memory area disk file .bac extension although format undocumented two electronic engineering undergraduates southampton university uk nick de smith david garrod developed decompiler could reverse engineer bac files original basic plus source complete original line numbers variable names subsequently worked dec rest memory used basic rts one wrote programs language permitted true binary executables basic-plus-2 fortran-iv macro assembler amount memory available would 56k 8k allocated rts standard basic-plus prompt ready response example starting version 9 dcl became primary startup rts even though ability execute binary programs became possible advent disappearing rsx rts see dcl incorporated recent versions dec operating systems rsx-11 rt-11 vms later openvms compatibility standard dcl prompt dollar sign example programs written rsx rts cobol macro assembler later releases basic-plus-2 could utilize maximum amount memory available binary program 56k due requirements rts needing top 8k use rsts version 7 later allowed rsx rts included kernel making completely disappear user address space thus allowing 64k bytes memory user programs programs got around limitations amount available memory using libraries permissible complicated overlay strategies calling programs chaining passing commands shared memory area called core common among practices rsx default kbm standard rsx prompt logged logged mcr monitor console routine sign example rt-11 rts emulated single job version rt-11 distribution like rsx emulation rt-11 occupied top 8k memory leaving bottom 56k cusps programs written fortran-iv macro assembler rt-11 default kbm standard rt-11 prompt logged logged sign example teco editor implemented rts maximize amount memory available editing buffer also first implemented rsts v5b release general purpose runtime systems rsx rt11 teco rts distributed rsts contain built-in kbm user would start teco like program running teco program teco.tec teco affine qedit direct ancestors first unix-based text editor ed rsts systems used ccl create file make filespec edit file teco filespec run teco program mung filespec data following program example teco could used calculate pi currently set 20 digits user typed unrecognised command system boot option prompt init.sys startup utility message type 'help help displayed user subsequently typed 'help including quotes prompt response amusing anyway ... followed actual help message one nice features system manager could compile kernel rotating display pattern gave illusion 2 snakes chasing around console lights normal kernel would give illusion 1 snake moving right left data lights across bottom system manager also compiled lights object module would see additional snake moving left right address lights across top accomplished using supervisory mode versions prior 9.0 rsx also similar display pattern would appear 2 snakes playing chicken would run center console command 'make allowed user make text file automatically enter teco text editor user typed 'make love system created file called 'love typed back 'not war kevin herbert later working dec added undocumented feature 90 allow user enter ^f see list open files user process complete blocks use file sizes beginning version 9.0 undocumented feature would allow system manager change display system date rsts became first operating system would display system date set numbers representing stardate commonly known tv series system industries bought source license rsts implement enhancement called simacs simultaneous machine access allowed special disk controller set semaphore flag disk access allowing multiple writes files rsts system disk shared multiple pdp-11 rsts systems feature implemented system industries controllers attached many dec computers designed dr. albert chu worked system industries required many changes way access disks accomplished rsts operating system fips file information processing system system handled i/o access single-threaded rsts allow disk access stall another machine active access block required fips could timeout request go next request 'come back stalled one round robin fashion code allow written philip hunt working system industries milipitas ca eventually worked digital equipment new england area late 1980s early '90s 1981 evans griffiths hart marketed ross/v product ross/v allowed user mode processes rsts cusps rtss user programs ability run unmodified vms vax-11 machines code emulation handled kernel processes would normally handled rsts kernel running pdp-11 original basic-plus language carried versions rsts subcontracted evans griffiths hart inc. fixed price 10,500 rsts applications run pdp-11 emulator information see pdp-11 rsts originally called btss name changed btss rtss product name btss marketed honeywell simple typing mistake changed name rtss rsts addition new memory management support ability install memory pdp-11/40 pdp-11/45 led another name change rsts-11 became rsts/e computer bureaus sometimes deployed user-11 rsts/e-based data management | [
2560,
2,
6155,
6675,
7187,
7188,
10776,
25,
8732,
4637,
9759,
9762,
4643,
6180,
5158,
7217,
10803,
9784,
10809,
576,
2625,
3650,
8262,
6221,
10833,
3160,
10333,
97,
1121,
11363,
6760,
10856,
8298,
9835,
7285,
4727,
2168,
9335,
634,
1147,
... | Test |
6,838 | 0 | MBROLA:mbrola mbrola speech synthesis software worldwide collaborative project mbrola project web page provides diphone databases large number spoken languages mbrola software complete speech synthesis system languages text must first transformed phoneme prosodic information mbrola format separate software e.g espeakng necessary mbrola project started 1995 tcts lab faculté polytechnique de mons belgium scientific project obtain set speech synthesizers many languages possible first release mbrola software 1996 provided freeware non-commercial non-military application licenses created voice databases differ also mostly non-commercial non-military use due free usage non-commercial applications mbrola alternative choice private/home users de facto speech synthesis engine espeakng linux workstations mostly used commercial solutions e.g speaking time clocks boarding notifications ports terminals etc initial development voice databases updates support mbrola software ceased gradually closed-source binaries fell behind development recent hardware operating systems deal mbrola development team decided release mbrola open source software october 24 2018 source code released github gnu affero general public license january 23 2019 tool called mbrolator released provide creation mbrola database wav files license mbrola software uses mbrola multi-band resynthesis overlap add algorithm speech generation although diphone-based quality mbrola synthesis considered higher diphone synthesisers preprocesses diphones imposing constant pitch harmonic phases enhances concatenation slightly degrading segmental quality mbrola time-domain algorithm similar psola implies low computational load synthesis time unlike psola however mbrola require preliminary marking pitch periods feature made possible develop mbrola project around mbrola algorithm many speech research labs companies individuals around world provided diphone databases many languages voices notable omissions chinese | [
4768,
3874,
3533,
6797,
7983,
2901,
214,
823,
11004,
2045,
2590
] | Test |
6,839 | 2 | Kernel_virtual_address_space:kernel virtual address space kernel virtual address space kva virtual memory area linux kernel threads reside second part virtual address space occupied user virtual address space contain user threads | [
823
] | Train |
6,840 | 9 | LISP_2:lisp 2 lisp 2 programming language proposed 1960s successor lisp largely lisp-like semantics algol 60-like syntax today mostly remembered syntax fact many features beyond early lisps early lisps many limitations including limited data types slow numerics use fully parenthesized notation also considered problem inventor lisp john mccarthy expected issues addressed later version called notionally lisp 2 hence name lisp 1.5 successor earliest lisp lisp 2 joint project system development corporation information international inc. intended ibm built an/fsq-32 military computer development later shifted ibm 360/67 digital equipment corporation pdp-6 project eventually abandoned | [
512,
10752,
11269,
1159,
6919,
2062,
9231,
1552,
791,
8728,
10012,
3869,
8226,
5031,
5803,
6717,
4799,
5569,
8262,
11218,
10712,
3675,
7392,
11488,
10083,
6502,
5361,
8435,
3446,
5751,
3323
] | Validation |
6,841 | 0 | Affix_grammar_over_a_finite_lattice:affix grammar finite lattice linguistics affix grammars finite lattice agfl formalism notation context-free grammars finite set-valued features acceptable linguists many different schools agfl-project aims development technology natural language processing available gnu gpl | [
7780,
2316
] | Validation |
6,842 | 4 | Benild_Joseph:benild joseph benild joseph born 15 may 1992 indian cyber security researcher tedx speaker white hat hacker currently president information systems security association issa india chapter advisory board member cybersecurity ventures featured book hacking hacker authored roger grimes silicon india magazine listed one top 8 ethical hackers india benild joseph born wayanad kerala studied infant jesus english medium school interest technology prompted mother send computer institute later learnt programming coding penchant towards technology led hacking working ebay tesco citigroup law enforcement agencies government organizations india helping dealing cyber threats safeguarding digital assets | [
4689,
7692,
4830
] | Test |
6,843 | 6 | Block_allocation_map:block allocation map computer file systems block allocation map data structure used track disk blocks considered use blocks may also referred allocation units clusters cp/m used block allocation map directory directory entry could list 8 16 blocks depending disk format allocated file file used blocks additional directory entries would needed thus single file could multiple directory entries benefit method possibility use sparse files declaring large file size allocating blocks actually used detriment method disk may free space unallocated blocks data appended file directory entries used commodore dos used similarly named significantly different block availability map | [
7969,
8129,
9762,
1801,
4409,
4764
] | Test |
6,844 | 1 | ANSI-SPARC_Architecture:ansi-sparc architecture ansi-sparc architecture ansi-sparc stands american national standards institute standards planning requirements committee abstract design standard database management system dbms first proposed 1975 ansi-sparc model however never became formal standard mainstream dbms systems fully based tend exhibit full physical independence prevent direct user access conceptual level idea logical data independence widely adopted objectives three-level architecture separate user view three levels three level architecture aim enabling users access data personalised view distancing internal level external level means users need know data physically stored database level separation also allows database administrator dba change database storage structures without affecting users views three different types schema corresponding three levels ansi-sparc architecture overall description database called database schema | [
1341
] | Test |
6,845 | 3 | PlayStation_2_homebrew:playstation 2 homebrew homebrew playstation 2 refers independent development video games consumers playstation 2 video game console sony released linux-based operating system ps2 package also includes keyboard mouse ethernet adapter hdd currently sony online store states linux kit longer sale north america however july 2005 european version still available kit boots installing proprietary interface run-time environment region-coded dvd european north america kits work ps2 respective regions europe australia ps2 came free yabasic interpreter bundled demo disc time allows simple programs created ps2 end-user included failed attempt circumvent uk tax defining console computer contained certain software port netbsd project blackrhino gnu/linux alternative debian-based distribution also available ps2 using homebrew programs e.g 'sms media player possible listen various audio file formats mp3 oma ogg vorbis aac flac ac3 watch various video formats divx/xvid mpeg1 mpeg2 mpeg4-asp avi container using console media played device connected console i.e external usb/firewire/thumb drive/hard disk drive fat32 internal hard disk early revision consoles optical cd-r w /dvd±r w disks modded systems patched disks network shares windows network ps2 host protocol homebrew programs launched directly memory card unmodified consoles using certain software takes advantage long known used exploit dealing boot part ee/iop process independence recent development may 2008 called free mcboot allows homebrew programs launched without trigger disc required older exploit also allows use homebrew unmodded systems without functional disc drive however installation exploit individual memory card requires either already exploited/modded system order launch installer boot image load app loads elf files network adapter hard drive also required copying one memory card another work newer exploit work newest ps2s scph-9000x model bios 2.30 work models prior newest versions free mcboot version 1.90 newer also ability install boot sony non-sony hdds using fat ps2 network adapter support called free hdboot fhdb minor issues possible game entirely hdd without needing use optical disc drive physical memory card homebrew programs used play patched backups original ps2 dvd games unmodified consoles install retail discs installed hard drive older models esr hd loader hd advance open ps2 loader homebrew emulators older computer gaming systems developed ps2 | [
4136,
10316,
11287,
823,
10203,
5215
] | Validation |
6,846 | 2 | Dave_Cutler:dave cutler david neil dave cutler sr. born march 13 1942 american software engineer designer developer several operating systems computer industry operating systems microsoft windows nt digital equipment corporation rsx-11m vaxeln vms openvms cutler born lansing michigan grew dewitt michigan graduating olivet college michigan 1965 went work dupont cutler holds least 20 patents affiliate professor computer science department university washington cutler avid auto racing driver competed atlantic championship 1996 2002 scoring career best 8th milwaukee mile 2000 cutler member adelphic alpha pi fraternity olivet college michigan cutler first exposure computers came tasked perform computer simulations model one dupont customers using ibm gpss-3 language ibm model 7044 work led interest computers operating systems worked cutler left dupont pursue interest computer systems beginning digital equipment corporation 1971 worked famous mill facility maynard massachusetts april 1975 digital began hardware project code-named star design 32-bit virtual address extension pdp-11 june 1975 cutler together dick hustvedt peter lipman appointed technical project leaders software project code-named starlet develop totally new operating system star family processors two projects tightly integrated beginning three technical leaders starlet project together three technical leaders star project formed blue ribbon committee digital produced fifth design evolution programs design featured simplifications memory management process scheduling schemes earlier proposals architecture accepted star starlet projects culminated development vax-11/780 superminicomputer vax/vms operating system respectively digital began working new cpu using risc design principles 1986 cutler working dec decwest facility bellevue washington selected head prism project develop company ’ risc machine operating system code named mica embody next generation design principles compatibility layer unix vms risc machine based ecl technology one three ecl projects digital undertaking time funding research development r costs multiple ecl projects yielding products would ultimately compete strain three ecl projects vax 9000 one directly commercialized primarily early successes pmax advanced development project need differing business models prism canceled 1988 favor pmax prism later surfaced basis digital alpha family computer systems cutler known disdain things unix sardonic nature showed vms versus unix debates digital early 1980s expressed low opinion unix process input/output model reciting get byte get byte get byte byte byte tune finale rossini william tell overture cutler left digital microsoft october 1988 led development windows nt later worked targeting windows nt digital 64-bit alpha architecture based prism design windows 2000 demise windows alpha demise digital instrumental porting windows amd new 64-bit amd64 architecture officially involved windows xp pro 64-bit windows server 2003 sp1 64-bit releases moved working microsoft live platform august 2006 dave cutler awarded prestigious status senior technical fellow microsoft 2008 professional developers conference microsoft announced azure services platform cloud-based operating system microsoft developing conference keynote cutler mentioned lead developer project along amitabh srivastava spokesperson microsoft confirmed cutler longer working windows azure joined xbox team information provided cutler role working within team may 2013 microsoft announced xbox one console cutler mentioned worked development host os portion system running inside new gaming device apparently work focused creating optimized version microsoft hyper-v host os specifically designed xbox one | [
4194,
3142,
9759,
6797,
1935,
7983,
5873,
8402,
8976,
5492,
757,
8502,
10590,
639
] | Test |
6,847 | 9 | Maya_Embedded_Language:maya embedded language maya embedded language mel scripting language used simplify tasks autodesk 3d graphics software maya tasks achieved maya gui achieved mel well certain tasks available gui mel offers method speeding complicated repetitive tasks well allowing users redistribute specific set commands others may find useful mel syntactically similar perl tcl provides memory management dynamic array-allocation offers direct access functions specific maya majority standard maya commands default mel scripts saved maya program files directory mel fairly limited compared mainstream scripting languages mel primarily language meant journal maya session thus lacks many advanced features associative arrays python added maya alternative mel maya 8.5 still mel offers advantages python mel often criticized lack programming features object orientation practice however mel used metaprogramming language mel instructs maya node architecture solve problem since nodes form actual computational core maya using robust readily apparent programming method would inefficient approach many ways mel complements maya api somewhat clear boundaries allocated tasks makes mel harder learn fully understand tools designed using mel scripts generally come following categories example script copies selected object path maya also offers expression language super-set mel results nodes executed part maya dependency graph expressions developed maya expression editor allow scripts trigger maya evaluates scene file change time simulate complex behaviors perform useful tasks | [
8582,
8554,
9780,
692,
6335
] | Validation |
6,848 | 4 | BPO_security:bpo security information security emerged significant concern banks mobile phone companies businesses use call centers business process outsourcing bpo instances theft personal data reported call centers britain financial services authority examined standards india april 2005 banking code standards board audited eight india-based call centres 2006 handling million calls per month uk examinations extend africa-based call centres staffed workers indian origin bcsb report stated customer data subject level security uk high risk complex processes subject higher levels scrutiny similar activities onshore india nasscom said take breach security extremely seriously assist police probe three identifiable types illicit activities concerning fraud emanating call centers items 1 2 mostly subject police action call centres use internal procedures minimise risk mitigation measures include limited | [] | Validation |
6,849 | 9 | AppleScript_Editor:applescript editor applescript editor formerly recently known script editor code editor applescript scripting language included classic mac os macos applescript editor provides basic debugging capabilities save applescripts plain text .applescript compiled script .scpt script bundle .scptd application .app applescript editor also handles script dictionary files allowing user see scripting classes commands available scriptable application installed computer prior mac os x 10.3 script editor developed using carbon 10.3 introduced new script editor written using cocoa applescript editor known script editor mac os x 10.6 also os x 10.10 renamed back script editor likely introduction javascript automation | [
11521,
2819,
1796,
3719,
4615,
10888,
11402,
9100,
5647,
10512,
1042,
8852,
9109,
1686,
7318,
4888,
3228,
11037,
2207,
1439,
1699,
811,
3371,
5292,
1710,
6700,
7983,
4657,
1074,
8877,
10036,
3766,
2232,
9529,
9912,
11257,
9406,
576,
1729,
... | None |
6,850 | 1 | IBM_Informix:ibm informix ibm informix product family within ibm information management division centered several relational database management system rdbms offerings informix products originally developed informix corporation whose informix software subsidiary acquired ibm 2001 april 2017 ibm hcl technologies products platforms division agreed long-term 15-year partnership co-develop support market product ibm continued active development marketing key informix products current version 12.10 forms basis several product editions variation capacity functionality informix database used many high transaction rate oltp applications retail finance energy utilities manufacturing transportation sectors recently server enhanced support data warehouse workloads informix server supports object-relational model permitted ibm offer extensions support data types part sql standard widely used time series spatial extensions provide data type support language extensions permit high performance domain specific queries efficient storage datasets based time series spatial data current version ibm informix 12.10 code-named centaurus development major enhancements made previous releases adding built-in index compression integration json collections support mongodb json drivers server enhancement permitting database objects partitioned across multiple servers cluster grid aka sharding queries optionally return data locally connected server instance entire grid sql heterogeneous clusters fully supported several deployment options available including provide high levels data redundancy fault tolerance feature marketed ibm informix flexible grid informix offered number editions including free developer editions editions small mid-sized business editions supporting complete feature set designed used support largest enterprise applications also advanced data warehouse edition informix version includes informix warehouse accelerator uses combination newer technologies including in-memory data tokenization deep compression columnar database technology provide extreme high performance business intelligence data warehouse style queries informix timeseries unique feature database system allows efficient fast manipulation time series data generated devices smart electric meters found financial trading systems time stamped stock 'ticks type data well suited storage use normal sql supported style data organization unique among ibm database products apple mac environment supported informix since version 11.7 ibm several database products capabilities overlap areas informix often compared ibm major database product db2 offered mainframe zseries platform well unix linux speculation ibm would combine informix db2 database products proven unfounded ibm instead continued expand variety database products offers netezza data warehouse appliance cloudant nosql database ibm described approach market providing workload optimized systems informix generally considered optimized environments low database administration including use embedded database long track record supporting high transaction rates providing uptime characteristics needed mission critical applications manufacturing lines reservation systems informix widely deployed retail sector low administration overhead makes useful in-store deployments ability deeply embed informix gateways routers timeseries support small footprint low administration requirements informix also targeted internet-of-things solutions many data-handling requirements handled gateways embed informix connect sensors devices internet april 2017 ibm announced outsourcing development informix indian specialists hcl number ibm employees working informix would also move hcl part arrangement ibm continue market sell informix customers addition products based version 12.1 engine ibm informix family also includes number legacy database products still supported market include informix online informix standard edition se informix c-isam products simpler smaller footprint database engines also frequently embedded third party applications collectively products often referred informix classics ibm informix family also includes client-side development environment client-sdk supports number different environments including .net windows developers variety protocols unix linux environments ibm long-term plans informix db2 databases sharing technology although ibm continually denied fusion two products ibm training includes complete set core data servers training courses apply informix courses delve many essential informix concepts fundamentals advanced sql topics part ibm academic initiative ibm offering informix software documentation training higher education institutions worldwide new informix campus program ibm offering inclusive package informix materials college faculty called informix box offers hands-on labs powerpoints use lessons recorded training teachers dvds class material vmware virtual appliance images well t-shirts students users groups remain active belgium croatia france germany united states many countries iiug international informix users group acts federation user groups provides numerous services members | [
8201,
1546,
1037,
2068,
4116,
4630,
1049,
5658,
2089,
10286,
9268,
9782,
5691,
9286,
4680,
8781,
10326,
8792,
9828,
10340,
2669,
6770,
1142,
6775,
2168,
1146,
6780,
3196,
5768,
8340,
10389,
4255,
4263,
6311,
8871,
4781,
10413,
9397,
6850,
... | Test |
6,851 | 7 | Basho_Technologies:basho technologies basho technologies distributed systems company developed key-value nosql database technology riak object storage system built upon riak platform called riak cs basho developer riak open source distributed database offers high availability fault tolerance operation simplicity scalability riak enterprise commercial version database offered basho project sponsor advanced multi-data center replication enterprise support riak key value store system collect unstructured data store objects buckets queried also highly scalable able distribute server cluster add new servers needed maintaining high availability riak written erlang language gives system built-in support distribution across server cluster fault tolerance ability absorb new hardware added cluster without disrupting operations following demise basho company assets purchased bet365 previously closed source components riak_repl multi-data-centre replication released open-source github.com basho also offered riak cloud storage cs open source multi-tenant cloud storage database built riak platform integrated private clouds public clouds amazon web services aws used enterprises power internal private clouds startups amazon-compatible api download service riak cs includes large object support s3-compatible api authentication multi-tenancy per-user reporting operational model adding capacity visual interface monitoring metrics riak 1.0 released september 2011 featured secondary indexes riak pipe riak search integration lager leveldb support riak 1.1 released early 2012 included numerous changes riak core new ownership claim algorithm riak kv improvements mapreduce improvements august 2012 riak 1.2 released riak enterprise 1.2 added ssl encryption better balancing granular control replication across multiple data centers march 2013 basho released portions riak cs code open source basho also announced commercial version riak cs enterprise adding multi-datacenter replication monitoring tools 24x7 support riak 1.4 featured pn-counters database first distributed data type pn-counters eventually consistent incremented decremented node across cluster compact binary data format reduces storage overheads connected small objects large bucket names riak cs 1.4 provides compatibility openstack openstack object storage swift ceph object stores increased scalability riak 2.0 released september 2014 includes support new data types tunable consistency search integration apache solr riak 2.1 released april 2015 focused performance simplification developers system administrators basho technologies founded january 2008 earl galleher former executive vice president akamai technologies antony falco former vp product management technical services akamai 2011 donald j. rippert long time cto accenture joined basho president ceo bobby patrick former cmo gxs digex joined cmo late 2012 rippert left basho gregory collins took ceo basho march 2014 collins stepped adam wray former ceo tier 3 became new ceo basho time basho cto justin sheehy chief architect original riak author andy gross left company dave mccrory former svp engineering warner music group took cto mccrory well known creating concept data gravity theory describes difficulty relocating large volumes data due physical restrictions bandwidth 2012 basho announced ricon two-day distributed systems conference developers basho hosted ricon west ricon east 2012 2013 hosted single ricon conference 2014 2015 basho recognized dbta 100 companies matter data crn big data 100 data management 2017 basho put receivership | [
9601,
8170,
11595,
11343,
7248,
19,
11221,
5560,
8446,
3582,
8408
] | None |
6,852 | 4 | EMC_NetWorker:emc networker emc networker formerly legato networker enterprise-level data protection software product unifies automates backup tape disk-based flash-based storage media across physical virtual environments granular disaster recovery cross-platform support provided linux windows macos netware openvms unix environments deduplication backup data provided integration dell emc data domain dd boost storage solutions central networker server manages datazone contains backup clients networker storage nodes access backup media platforms supported core networker server aix hp-ux pa-risc itanium linux fully featured x86 x86-64 itanium client powerpc zlinux macos client solaris sparc x64 sgi irix client tru64 windows java based networker management console nmc software bundled networker distribution provides user interface functions client configuration policy settings schedules monitoring reports daily operations deduplicated non-deduplicated backups core networker software backs client file systems operating system environment add-on database application modules provide backup services products oracle db2 sap lotus informix sybase well microsoft exchange server sharepoint sql server client backup data sent remote networker storage node stored locally attached device use dedicated storage node additionally networker supports client direct backups allowing clients back directly shared devices bypassing storage node processes networker snapshot management automates generation point-in-time data snapshots cloning supported storage arrays emc vnx xtremio symmetrix ndmp module used client-less backups nas filers like isilon emc vnx netapp vmware virtual machines directly backed either installing networker client virtual machine networker vmware protection solution leverages vproxys perform application consistent image filesystem backups networker also supports backup recovery microsoft windows server hyper-v virtual servers using volume shadow copy services interface support protects parent child partitions guests well applications running within virtual machines networker came emc acquisition legato october 2003 legato founded 1988 four individuals worked together sun microsystems jon kepecs bob lyon joe moran russell sandberg networker unix first introduced 1990 | [
9218,
6153,
6797,
5523,
1304,
9655,
823,
10302,
10051,
11332,
10951,
1358,
863,
11233,
2154,
5356,
8944,
499,
5492,
1399,
8700
] | None |
6,853 | 7 | BuildHive:buildhive buildhive free cloud-hosted continuous integration service github projects based jenkins buildhive detect build test number common project types apache maven play without need configuration developer starts build test cycle every time sees new commit registered github repository also automatically schedule builds github pull requests leave pass/fail comment pull request project owners know whether pull requests pass tests merging contributors wait tests run machine submitting pull request number features provided commercial jenkins plugins cloudbees also makes available paying customers buildhive support private github repositories complex configurations commercial cloudbees service available requirements buildhive originally started christmas side project developer kohsuke kawaguchi | [
9297,
4194,
11221
] | None |
6,854 | 3 | MIPS_Magnum:mips magnum mips magnum line computer workstations designed mips computer systems inc. based mips series risc microprocessors first magnum released march 1990 production various models continued 1993 sgi bought mips technologies sgi cancelled mips magnum line promote workstations including entry-level sgi indy early r3000-based magnum series ran risc/os variant bsd unix subsequent magnum workstations based jazz architecture ran risc/os windows nt addition proprietary operating systems linux netbsd ported jazz-based mips magnum machines models mips magnum rebadged sold groupe bull olivetti addition headless i.e. without framebuffer video card versions marketed servers name mips millennium model number information mips magnum 3000 25 33 mhz mips r3000a microprocessor mips magnum r4000 pc-50 mips r4000pc processor 16 kb l1 cache l2 cache running external clock rate 50 mhz internally doubled microprocessor 100 mhz mips magnum r4000 sc-50 identical magnum r4000pc includes one megabyte secondary cache addition primary cache main memory mips magnum 3000 accepted 30-pin true-parity 80ns simms maximum 128 mb mips magnum r4000 accepted eight 72-pin true-parity simms maximum 256 mb mips magnum r4000 r4000 pc-50 r4000 sc-50 includes single on-board scsi bus using on-board ncr 53c94 fast-narrow scsi chipset internal cable four 50-pin connections links internal scsi devices also interfaces external scsi devices via endlink mounted rear case mips magnum r4000 includes on-board sonic ethernet chipset aui ethernet connector mounted case video output magnum r4000 consists proprietary framebuffer available custom full-length option card — g364 framebuffer g364 includes sun 13w3-style output converted common vga pin-out capable pixel screen resolutions 640x480 800x600 1024x768 1280x1024 simple framebuffer g364 include accelerated graphics functions mips magnum r4000 also includes two standard rs232-capable serial ports ibm at-compatible parallel port also mips magnum r4000 ibm at-compatible floppy disk controller single floppy drive bay mips magnum 3000 used mips r3000 processor custom proprietary motherboard incorporated turbochannel bus noted dec also manufactured decstation line workstations running ultrix also used mips processors turbochannel bus magnum 3000 ran risc/os mips computer systems inc. proprietary port bsd unix including system v features later magnums mips magnum r4000pc mips magnum r4000sc also used mips microprocessor — mips r4000 full 64-bit microprocessor available either low-cost version r4000pc 16 kb l1 cache l2 cache higher-performance version r4000sc 1 mb secondary cache addition 16 kb primary cache mips computer systems inc. co-founded advanced computing environment consortium silicon graphics microsoft motorola others mips magnum r4000 intended mips entry windows nt workstation market however mips computer systems inc. in-house effort design mips-based windows nt system met delays mips technologies abandoned in-house efforts instead licensed jazz design microsoft developed early 1990s facilitate porting development windows nt noted windows nt first developed mips architecture later ported intel 386 alpha powerpc architectures mips magnum r4000 indeed jazz-based systems acer pica nec riscstation olivetti m700 etc incorporated many features common intel-based pc commercial unix workstations era — example magnum r4000 included eisa bus used ibm ps/2-compatible keyboards mice used commodity chipset components whose control registers mapped memory locations set forth ibm standard mips magnum r4000 ran either windows nt beginning version 3.1 equipped little-endian arc firmware risc/os mips computer systems inc. proprietary big-endian firmware mips monitor installed firmware could switched arc mips monitor loading either one magnum flash memory/nvram floppy disk thus magnum r4000 could dual-boot windows unix mips magnum r4000 supported windows nt version 3.1 released 1993 version 4.0 released 1996 however support microsoft mips systems ended release windows nt version 4.0 useful software windows/mips — either microsoft third-party vendors — scarce even mips supported example microsoft never ported microsoft office suite mips mips magnum 3000 unlike mips magnum r4000 able run windows nt magnums could run risc/os mips computer system inc. proprietary port unix running risc/os mips magnum r4000 requires use big-endian mips monitor firmware mips magnum run netbsd also ran openbsd one point lack developer interest proper resources lead termination arch support prior december 1 1998 2.4 release earlier risc/os-only mips magnum 3000 machines correct port netbsd/mipsco later windows nt-capable mips magnum r4000 correct port netbsd/arc mips magnum r4000 among earliest supported machines effort port linux kernel mips initial support begun april 1995 support magnum r4000 became stable 2.1 development tree around 1999 however support magnum linux atrophied since qemu pc emulator version 0.9.1 emulate mips magnum acer pica 61 using -m parameter -m magnum -m pica61 qemu run mips compiled version debian gnu/linux x86 platform along windows nt 3.5,3.51 4.0 binaries | [
780,
8976,
2452,
2071,
408,
6942,
7594,
7215,
11058,
2995,
5686,
823,
9665,
7234,
10051,
3142,
9932,
2525,
6879,
3818,
6250,
6252,
10734,
7151,
5873,
5492,
3445,
8700,
11007
] | Validation |
6,855 | 2 | Messages_Server:messages server messages server component os x server apple inc first introduced ichat server release mac os x server 10.4 upgraded version 2 release mac os x 10.5 server october 2007. ichat server originally based jabberd 1.4.3 named apple ichat online chat client software version 2 software based jabberd2 2.0s9 supports server federation allows chat clients talk directly systems support xmpp also supports server-based chat archiving | [
10242,
5251,
5382,
4746,
1036,
11408,
7318,
3228,
10271,
3105,
9511,
168,
1962,
7983,
9519,
8758,
1467,
6208,
1218,
2760,
2892,
7378,
8404,
4318,
865,
3812,
4068,
5093,
6628,
7928,
8441,
10748
] | None |
6,856 | 7 | Utility_computing:utility computing utility computing computer utility service provisioning model service provider makes computing resources infrastructure management available customer needed charges specific usage rather flat rate like types on-demand computing grid computing utility model seeks maximize efficient use resources and/or minimize associated costs utility packaging system resources computation storage services metered service model advantage low initial cost acquire computer resources instead resources essentially rented repackaging computing services became foundation shift demand computing software service cloud computing models propagated idea computing application network service initial skepticism significant shift however new model computing caught eventually became mainstream ibm hp microsoft early leaders new field utility computing business units researchers working architecture payment development challenges new computing model google amazon others started take lead 2008 established utility services computing storage applications utility computing support grid computing characteristic large computations sudden peaks demand supported via large number computers utility computing usually envisioned form virtualization amount storage computing power available considerably larger single time-sharing computer multiple servers used back end make possible might dedicated computer cluster specifically built purpose rented even under-utilized supercomputer technique running single calculation multiple computers known distributed computing term grid computing often used describe particular form distributed computing supporting nodes geographically distributed cross administrative domains provide utility computing services company bundle resources members public sale might paid portion revenue clients one model common among volunteer computing applications central server dispense tasks participating nodes behest approved end-users commercial case paying customers another model sometimes called virtual organization vo decentralized organizations buying selling computing resources needed go idle definition utility computing sometimes extended specialized tasks web services utility computing merely means pay use regards computing power utility computing new concept rather quite long history among earliest references ibm mainframe providers conducted kind business following two decades often referred time-sharing offering computing power database storage banks large organizations worldwide data centers facilitate business model mainframe operating systems evolved include process control facilities security user metering advent mini computers changed business model making computers affordable almost companies intel amd increased power pc architecture servers new generation processor data centers became filled thousands servers late 90 utility computing re-surfaced insynq inc. launched on-demand applications desktop hosting services 1997 using hp equipment 1998 hp set utility computing division mountain view ca assigning former bell labs computer scientists begin work computing power plant incorporating multiple utilities form software stack services ip billing-on-tap marketed hp introduced utility data center 2001 sun announced sun cloud service consumers 2000 december 2005 alexa launched alexa web search platform web search building tool underlying power utility computing alexa charges users storage utilization etc space market specific industries applications well niche applications powered utility computing example polyserve inc. offers clustered file system based commodity server storage hardware creates highly available utility computing environments mission-critical applications including oracle microsoft sql server databases well workload optimized solutions specifically tuned bulk storage high-performance computing vertical industries financial services seismic processing content serving database utility file serving utility enable organizations independently add servers storage needed retask workloads different hardware maintain environment without disruption spring 2006 3tera announced applogic service later summer amazon launched amazon ec2 elastic compute cloud services allow operation general purpose computing applications based xen virtualization software commonly used operating system virtual computers linux though windows solaris supported common uses include web application saas image rendering processing also general-purpose business applications decision support business intelligence 8th edition page 680 | [
2314,
526,
3086,
531,
6421,
2710,
154,
10020,
170,
4799,
9665,
4802,
11075,
5956,
1480,
3405,
467,
8792,
10200,
7642,
735,
4194,
7537,
6772
] | Test |
6,857 | 5 | Shared_medium:shared medium telecommunication shared medium medium channel information transfer serves one user time channels function correctly one user transmitting channel access method always effect circuit switching user typically gets fixed share channel capacity multiplexing scheme divides capacity medium common multiplexing schemes include time-division multiplexing frequency-division multiplexing channel access methods circuit switching include time-division multiple access frequency-division multiple access etc packet switching sharing dynamic — user takes little none capacity idle utilize entire capacity transmitting users idle channel access methods packet switching include carrier sense multiple access token passing etc | [
3168,
2785,
7490,
2787,
5092,
7498,
5581,
11181,
2994,
2802
] | Test |
6,858 | 3 | Silicon_Graphics_International:silicon graphics international silicon graphics international corp. sgi formerly rackable systems inc. american manufacturer computer hardware software including high-performance computing solutions x86-based servers datacenter deployment visualization products founded rackable systems 1999 adopted sgi name 2009 acquiring silicon graphics inc.. november 1 2016 hewlett packard enterprise completed acquisition sgi 275 million rackable systems inc. went public june 2005 6.25 million shares offered 12 per share 2006 rackable announced signed agreement acquire terrascale technologies inc. april 1 2009 rackable announced agreement acquire silicon graphics inc. 25 million purchase ultimately 42.5 million finalized may 11 2009 time rackable announced adoption sgi global name brand following week company changed nasdaq stock ticker symbol rack sgi new sgi began two main product lines servers storage continuing original rackable systems servers storage visualization professional services acquired silicon graphics inc. time acquisition completion sgi said anticipated survival majority two companies product lines although consolidation likely areas high overlap products 2010 sgi announced purchase assets assumed limited amount liabilities copan systems copan provider storage archive products real-time access long-term persistent data copan products offered part sgi storage line 2011 sgi acquired outstanding shares sgi japan ltd year company announced acquisition opencfd ltd december company announced mark j. barrenechea resignation president chief executive officer member board directors mark reported join open text corporation shortly thereafter announced barrenechea agreed continue serve sgi board february 2012 announced jorge luis titinger would become sgi president chief executive officer 2013 sgi acquired filetek inc. august 11 2016 announced hewlett packard enterprise would acquire sgi 7.75 per share cash transaction valued approximately 275 million net cash debt deal completed november 1 2016 | [
3328,
5380,
9095,
5898,
7311,
5523,
5272,
9762,
426,
3764,
11447,
7234,
10051,
1480,
9932,
5076,
7001,
221,
4194,
6243,
8164,
998,
1638,
5356,
4463,
499,
1398,
1149
] | Validation |
6,859 | 3 | ET-188:et-188 et-188 ibm pc xt compatible computer made yugoslav company novkabel novosadska fabrika kabela novi sad cable factory novi sad serbia 1980s novkabel already experience developing computer systems era 20 era 60 others used make et-188 original design compatible ibm pc xt save space lower cost et-188 used 8mhz intel 80188 cpu integrated timer dma interrupt controller also made faster original xt et-188 offered public 1985 advertised yugoslav computer press improved et-188a model may 1986 presented public belgrade technical fair beogradski sajam tehnike ram new redesigned case among things et-188a used education classrooms throughout vojvodina province | [
9606,
1515,
780,
10635,
9166,
7665,
10356
] | Train |
6,860 | 1 | Hibernate_(framework):hibernate framework hibernate orm hibernate short object-relational mapping tool java programming language provides framework mapping object-oriented domain model relational database hibernate handles object-relational impedance mismatch problems replacing direct persistent database accesses high-level object handling functions hibernate free software distributed gnu lesser general public license 2.1 hibernate primary feature mapping java classes database tables mapping java data types sql data types hibernate also provides data query retrieval facilities generates sql calls relieves developer manual handling object conversion result set mapping java classes database tables implemented configuration xml file using java annotations using xml file hibernate generate skeleton source code persistence classes auxiliary annotations used hibernate use xml file java annotations maintain database schema provided facilities arrange one-to-many many-to-many relationships classes addition managing associations objects hibernate also manage reflexive associations wherein object one-to-many relationship instances class type hibernate supports mapping custom value types makes following scenarios possible definition objects object-oriented application follow oop principles objects back-end follow database normalization principles resulting different representation requirements problem called object-relational impedance mismatch mapping way resolving object-relational impedance mismatch problem mapping informs orm tool java class object store database table hibernate provides sql inspired language called hibernate query language hql writing sql-like queries hibernate data objects criteria queries provided object-oriented alternative hql criteria query used modify objects provide restriction objects hql hibernate query language object-oriented version sql generates database independent queries need write database-specific queries without capability changing database would require individual sql queries changed well leading maintenance issues hibernate provides transparent persistence plain old java objects pojos strict requirement persistent class no-argument constructor though necessarily proper behavior applications also requires special attention methods object classes hibernate recommends providing identifier attribute planned mandatory requirement future release collections data objects typically stored java collection classes implementations interfaces java generics introduced java 5 also supported hibernate configured lazy load associated collections lazy loading default hibernate 3 related objects configured cascade operations one object example parent class object configured cascade operations child class objects hibernate used standalone java applications java ee applications using servlets ejb session beans jbi service components also included feature programming languages example adobe integrated hibernate version 9 coldfusion runs j2ee app servers abstraction layer new functions syntax added cfml hibernate jargon entity stand-alone object hibernate persistent mechanism manipulated independently objects contrast component subordinate entity manipulated respect entity example album object may represent entity tracks object associated album objects would represent component album entity assumed tracks saved retrieved database album object unlike j2ee hibernate switch databases hibernate started 2001 gavin king colleagues cirrus technologies alternative using ejb2-style entity beans original goal offer better persistence capabilities offered ejb2 simplifying complexities supplementing certain missing features early 2003 hibernate development team began hibernate2 releases offered many significant improvements first release jboss inc. part red hat later hired lead hibernate developers order development 2005 hibernate version 3.0 released key features included new interceptor/callback architecture user defined filters jdk 5.0 annotations java metadata feature hibernate 3 version 3.5.0 certified implementation java persistence api 2.0 specification via wrapper core module provides conformity jsr 317 standard dec 2011 hibernate core 4.0.0 final released includes new features multi-tenancy support introduction serviceregistry major change hibernate builds manages services better session opening sessionfactory improved integration via org.hibernate.integrator.spi.integrator auto discovery internationalization support message codes logging distinction api spi implementation classes december 2012 hibernate orm 4.1.9 final released mar 2013 hibernate orm 4.2 final released december 2013 hibernate orm 4.3.0 final released features java persistence api 2.1 september 2015 hibernate orm 5.0.2 final released improved bootstrapping hibernate-java8 hibernate-spatial karaf support november 2018 hibernate orm 5.1.17 final released final release 5.1 series october 2018 hibernate orm 5.3 final released featured java persistence api 2.2 inheritance caching december 2018 hibernate orm 5.4.0 final released hibernate api provided java package org.hibernate org.hibernate.session interface represents hibernate session i.e. main point manipulation performed database entities latter activities include among things managing persistence state transient persisted detached objects fetching persisted ones database management transaction demarcation session intended last long logical transaction database due latter feature session implementations expected thread safe used multiple clients hibernate software includes following components | [
3591,
3080,
7176,
1034,
10250,
2063,
5677,
3131,
572,
7742,
11327,
7750,
9286,
2658,
1142,
8825,
3705,
3710,
3712,
148,
9896,
10413,
3763,
5314,
6860,
1756,
1250,
9455,
5872,
1780,
9467,
4358,
10526,
10540,
7983,
7475,
9011,
3895,
7485,
1... | None |
6,861 | 5 | JREAP:jreap joint range extension applications protocol jreap enables tactical data messages transmitted long-distance networks e.g satellite links thereby extending range tactical data links tdls jreap documented u.s. military standard mil-std 3011 nato standardization agreement stanag 5518 interoperability standard joint range extension applications protocol jreap jreap developed due need communicate data long distances without degradation message format content jreap takes message format originally formatted changes protocol message transmitted beyond line-of sight media jreap protocol message structure transmission reception pre-formatted messages communications media messages designed jreap provides foundation joint range extension jre link 16 tactical data links overcome line-of-sight limitations radio terminals joint tactical information distribution system jtids multifunctional information distribution system mids extends coverage data links use long-haul media | [
5472,
10924,
11413,
7388,
9725,
4223
] | Validation |
6,862 | 7 | List_of_BPMN_2.0_engines:list bpmn 2.0 engines list notable business process model notation 2.0 bpmn 2.0 workflow management systems wfmss | [
8425,
5677,
1041,
4088,
10236,
7261
] | None |
6,863 | 4 | Slide_attack:slide attack slide attack form cryptanalysis designed deal prevailing idea even weak ciphers become strong increasing number rounds ward differential attack slide attack works way make number rounds cipher irrelevant rather looking data-randomizing aspects block cipher slide attack works analyzing key schedule exploiting weaknesses break cipher common one keys repeating cyclic manner attack first described david wagner alex biryukov bruce schneier first suggested term slide attack used 1999 paper describing attack requirements slide attack work cipher broken multiple rounds identical f function probably means cyclic key schedule f function must vulnerable known-plaintext attack slide attack closely related related-key attack idea slide attack roots paper published edna grossman bryant tuckerman ibm technical report 1977 grossman tuckerman demonstrated attack weak block cipher named new data seal nds attack relied fact cipher identical subkeys round cipher cyclic key schedule cycle one key makes early version slide attack summary report including description nds block cipher attack given cipher systems beker piper 1982 first introduce notation section assume cipher takes n bit blocks key-schedule using formula_1 keys length slide attack works breaking cipher identical permutation functions f f function may consist one round cipher defined key-schedule example cipher uses alternating key schedule switches formula_2 formula_3 round f function would consist two rounds formula_4 appear least f next step collect formula_5 plaintext-ciphertext pairs depending characteristics cipher fewer may suffice birthday paradox formula_5 needed pairs denoted formula_7 used find slid pair denoted formula_8 slid pair property formula_9 formula_10 slid pair identified cipher broken vulnerability known-plaintext attacks key easily extracted pairing slid pair thought happens message one application function f ’ slid ’ one encryption round attack gets name process finding slid pair somewhat different cipher follows basic scheme one uses fact relatively easy extract key one iteration f choose pair plaintext-ciphertext pairs formula_8 check see keys corresponding formula_9 formula_10 keys match slid pair otherwise move next pair formula_5 plaintext-ciphertext pairs one slid pair expected along small number false-positives depending structure cipher false positives eliminated using keys different message-ciphertext pair see encryption correct probability wrong key correctly encipher two messages low good cipher sometimes structure cipher greatly reduces number plaintext-ciphertext pairs needed thus also large amount work clearest examples feistel cipher using cyclic key schedule reason given formula_15 search formula_16 reduces possible paired messages formula_17 formula_5 since half message fixed formula_19 plaintext-ciphertext pairs needed order find slid pair | [
7556,
2567,
3084,
2957,
7056,
658,
660,
1173,
1941,
4128,
1315,
4389,
10662,
169,
11185,
8627,
8628,
2357,
10806,
1847,
9528,
2110,
9156,
9541,
10315,
8273,
7635,
212,
9556,
10963,
11349,
2265,
1114,
7643,
9697,
8674,
229,
618,
1898,
881,... | Test |
6,864 | 2 | Highly_Available_STorage:highly available storage highly available storage hast protocol tool set freebsd written pawel jakub dawidek core freebsd developer hast provides block device synchronized two servers use filesystem two machines comprise cluster machine cluster node hast uses primary-secondary master-slave configuration one cluster node active time hast-provided devices appear like disk devices /dev/hast/ directory freebsd used like standard block devices hast similar raid1 mirror raid component provided across network one cluster node | [
1927,
274,
9625,
1946,
4636,
2212,
10535,
7983,
11698,
11573,
1718,
10422,
5177,
5819,
11459,
8266,
8395,
7249,
850,
10455,
6361,
9306,
6491,
7521,
1891,
998,
4073,
9201,
3058,
7027,
9844,
2421,
2424,
1273,
2045,
9343
] | Test |
6,865 | 3 | Slipstream_(computer_science):slipstream computer science slipstream processor architecture designed reduce length running program removing non-essential instructions form speculative computing non-essential instructions include things results written memory compare operations always return true also statistically branch instructions taken makes sense assume always case speculation involved slipstream processors generally described two parallel executing streams one optimized faster a-stream executing reduced code slower r-stream runs behind a-stream executes full code r-stream runs faster single stream due data prefetched a-stream effectively hiding memory latency due a-stream assistance branch prediction two streams complete faster single stream would 2005 theoretical studies shown configuration lead speedup around 20 main problem approach accuracy a-stream becomes accurate less speculative overall system runs slower furthermore large enough distance needed a-stream r-stream cache misses generated a-stream slow r-stream | [
8815
] | Test |
6,866 | 4 | Pod_slurping:pod slurping pod slurping act using portable data storage device ipod digital audio player illicitly download large quantities confidential data directly plugging computer data held may inside firewall work development fixes problem including number third-party security products allow companies set security policies related usb device use features within operating systems allow administrators users disable usb port altogether unix-based unix-like systems easily prevent users mounting storage devices microsoft released instructions preventing users installing usb mass storage devices operating systems additional measures include physical obstruction usb ports measures ranging simple filling ports epoxy resin commercial solutions deposit lockable plug port following external links act indirect mechanism learning topic e.g. detailed descriptions examples implementations | [
8998,
2953,
4620,
7983,
11568,
5492,
5397
] | Test |
6,867 | 3 | Sokoban_(video_game):sokoban video game version game includes 50 levels 1988 sokoban published us spectrum holobyte commodore 64 ibm-pc apple ii series soko-ban sokoban hit japan sold 400,000 units country time spectrum holobyte imported united states 1988 review computer gaming world praised spectrum holobyte soko-ban pure simple playable mentally challenging citing addictive qualities also reviewed 1988 dragon 132 hartley patricia kirk lesser role computers column reviewers gave game 4½ 5 stars | [
9006,
5762,
9166,
7622
] | Test |
6,868 | 2 | X86_memory_segmentation:x86 memory segmentation x86 memory segmentation refers implementation memory segmentation intel x86 computer instruction set architecture segmentation introduced intel 8086 1978 way allow programs address 64 kb 65,536 bytes memory intel 80286 introduced second version segmentation 1982 added support virtual memory memory protection point original model renamed real mode new version named protected mode x86-64 architecture introduced 2003 largely dropped support segmentation 64-bit mode real protected modes system uses 16-bit segment registers derive actual memory address real mode registers cs ds ss es point currently used program code segment cs current data segment ds current stack segment ss one extra segment determined programmer es intel 80386 introduced 1985 adds two additional segment registers fs gs specific uses defined hardware way segment registers used differs two modes choice segment normally defaulted processor according function executed instructions always fetched code segment stack push pop data reference referring stack uses stack segment references data use data segment extra segment default destination string operations example movs cmps fs gs hardware-assigned uses instruction format allows optional segment prefix byte used override default segment selected instructions desired real mode v86 mode size segment range 1 byte 65,536 bytes using 16-bit offsets 16-bit segment selector segment register interpreted significant 16 bits linear 20-bit address called segment address remaining four least significant bits zeros segment address always added 16-bit offset instruction yield linear address physical address mode instance segmented address 06efh:1234h suffix h means hexadecimal segment selector 06efh representing segment address 06ef0h offset added yielding linear address 06ef0h 1234h 08124h way segment address offset added single linear address mapped 2 4096 distinct segment offset pairs example linear address 08124h segmented addresses 06efh:1234h 0812h:0004h 0000h:8124h etc could confusing programmers accustomed unique addressing schemes also used advantage example addressing multiple nested data structures real mode segments always 64 kb long practical effect segment longer 64 kb rather every segment must 64 kb long protection privilege limitation real mode even segment could defined smaller 64 kb would still entirely programs coordinate keep within bounds segments program always access memory since arbitrarily set segment selectors change segment addresses absolutely supervision therefore real mode well imagined variable length segment range 1 65,536 bytes enforced cpu effective 20-bit address space real mode limits addressable memory 2 bytes 1,048,576 bytes 1 mb derived directly hardware design intel 8086 subsequently closely related 8088 exactly 20 address pins packaged 40-pin dip packages even 20 address lines address data buses multiplexed fit address data lines within limited pin count segment begins multiple 16 bytes called paragraph beginning linear flat address space 16 byte intervals since segments 64 kb long explains overlap occur segments location linear memory address space accessed many segment offset pairs actual location beginning segment linear address space calculated segment×16 segment value 0ch 12 would give linear address c0h 192 linear address space address offset added number 0ch:0fh 12:15 would c0h+0fh=cfh 192+15=207 cfh 207 linear address address translations carried segmentation unit cpu last segment ffffh 65535 begins linear address ffff0h 1048560 16 bytes end 20 bit address space thus access offset 65,536 bytes 65,520 65536−16 bytes past end 20 bit 8088 address space 8088 address accesses wrapped around beginning address space 65535:16 would access address 0 65533:1000 would access address 952 linear address space programmers using feature led gate a20 compatibility issues later cpu generations linear address space expanded past 20 bits 16-bit real mode enabling applications make use multiple memory segments order access memory available one 64k-segment quite complex viewed necessary evil smallest tools could less memory root problem appropriate address-arithmetic instructions suitable flat addressing entire memory range available flat addressing possible applying multiple instructions however leads slower programs memory model concept derives setup segment registers example tiny model cs=ds=ss program code data stack contained within single 64 kb segment small memory model ds=ss data stack reside segment cs points different code segment 64 kb 80286 protected mode extends processor address space 2 bytes 16 megabytes adjusting shift value instead 16-bit segment registers contain index table segment descriptors containing 24-bit base addresses offset added support old software processor starts real mode mode uses segmented addressing model 8086 small difference though resulting physical address longer truncated 20 bits real mode pointers 8086 pointers refer addresses 100000 10ffef roughly 64-kilobyte region memory known high memory area hma later versions ms-dos could use increase available conventional memory i.e within first mb addition hma total address space approximately 1.06 mb though 80286 truncate real-mode addresses 20 bits system containing 80286 hardware external processor gating 21st address line a20 line ibm pc provided hardware full backward compatibility software original ibm pc pc/xt models subsequent at-class pc clones well 286 protected mode seldom used would excluded large body users 8086/88 machines moreover still necessitated dividing memory 64k segments like done real mode limitation worked around 32-bit cpus permit use memory pointers greater 64k size however segment limit field 24-bit long maximum segment size created 16mb although paging used allocate memory individual segment may exceed 16mb method commonly used windows 3.x applications produce flat memory space although os still 16-bit api calls could made 32-bit instructions thus still necessary place code performs api calls 64k segments 286 protected mode invoked could exited except performing hardware reset machines following rising ibm pc/at standard could feign reset cpu via standardised keyboard controller significantly sluggish windows 3.x worked around problems intentionally triggering triple fault interrupt-handling mechanisms cpu would cause cpu drop back real mode nearly instantly logical address consists 16-bit segment selector supplying 13+1 address bits 16-bit offset segment selector must located one segment registers selector consists 2-bit requested privilege level rpl 1-bit table indicator ti 13-bit index attempting address translation given logical address processor reads 64-bit segment descriptor structure either global descriptor table ti=0 local descriptor table ti=1 performs privilege check cpl current privilege level found lower 2 bits cs register rpl requested privilege level segment selector dpl descriptor privilege level segment found descriptor privilege levels integers range 0–3 lowest number corresponds highest privilege inequality false processor generates general protection gp fault otherwise address translation continues processor takes 32-bit 16-bit offset compares segment limit specified segment descriptor larger gp fault generated otherwise processor adds 24-bit segment base specified descriptor offset creating linear physical address privilege check done segment register loaded segment descriptors cached hidden parts segment registers intel 80386 later protected mode retains segmentation mechanism 80286 protected mode paging unit added second layer address translation segmentation unit physical bus also importantly address offsets 32-bit instead 16-bit segment base segment descriptor also 32-bit instead 24-bit general operation segmentation unit otherwise unchanged paging unit may enabled disabled disabled operation 80286 paging unit enabled addresses segment virtual addresses rather physical addresses 80286 segment starting address offset final 32-bit address segmentation unit derived adding two virtual logical addresses paging unit enabled segmentation unit generates validates 32-bit virtual addresses enabled paging unit finally translates virtual addresses physical addresses physical addresses 32-bit 386 larger newer processors support physical address extension 80386 also introduced two new general-purpose data segment registers fs gs original set four segment registers cs ds es ss 386 cpu put back real mode clearing bit cr0 control register however privileged operation order enforce security robustness way comparison 286 could returned real mode forcing processor reset e.g triple fault using external hardware x86-64 architecture use segmentation long mode 64-bit mode four segment registers cs ss ds es forced 0 limit 2 segment registers fs gs still nonzero base address allows operating systems use segments special purposes unlike global descriptor table mechanism used legacy modes base address segments stored model-specific register x86-64 architecture provides special swapgs instruction allows swapping kernel mode user mode base addresses instance microsoft windows x86-64 uses gs segment point thread environment block small data structure thread contains information exception handling thread-local variables per-thread state similarly linux kernel uses gs segment store per-cpu data x64 cpu powers real mode indistinguishable 32-bit pentium 4 64-bit instructions used unless long mode set long mode operating 16-bit instructions virtual x86 mode disabled protected mode disappears gs/fs also used gcc thread-local storage canary-based stack protector logical addresses explicitly specified x86 assembly language e.g syntax intel syntax mov dword fs eax 42 however segment registers usually used implicitly segmentation turned x86-32 processors true 64-bit mode well beyond scope discussion many 32-bit operating systems simulate flat memory model setting segments bases 0 order make segmentation neutral programs instance linux kernel sets 4 general purpose segments since base set 0 cases limit 4 gib segmentation unit affect addresses program issues arrive paging unit course refers 80386 later processors earlier x86 processors paging unit current linux also uses gs point thread-local storage segments defined either code data system segments additional permission bits present make segments read read/write execute etc protected mode code may always modify segment registers except cs code segment selector current privilege level cpl processor stored lower 2 bits cs register ways raise processor privilege level reload cs lcall far call int interrupt instructions similarly ways lower privilege level reload cs lret far return iret interrupt return instructions real mode code may also modify cs register making far jump using undocumented codice_1 instruction 8086 8088 course real mode privilege levels programs absolute unchecked access memory cpu instructions information segmentation see ia-32 manuals freely available amd intel websites | [
2304,
1922,
5380,
6921,
9996,
6797,
5008,
9490,
11539,
4884,
3990,
6296,
541,
3871,
1954,
6570,
2987,
10284,
6829,
814,
5040,
435,
3512,
6078,
2625,
1474,
2627,
6596,
10561,
1736,
4424,
6730,
6221,
7501,
9166,
5840,
5073,
5074,
7760,
7508... | Test |
6,869 | 2 | Windows_Activation_Services:windows activation services windows process activation service also known process activation mechanism introduced within internet information services v7.0 windows activation service builds existing internet information services v6.0 powerful provides support protocols besides http tcp named pipes windows activation service extends asp.net http hosting concept asmx web services standalone windows component windows activation service completely separated iis hosting environment provides protocol-agnostic activation mechanism limited http windows activation service allows developers choose appropriate protocol needs http data transfer relies asp.net http protocols tcp named pipes windows activation service leverages extensibility points asp.net transferring data capabilities implemented form protocol handlers manage communication worker process windows service two types protocol handlers loaded activates worker process instance process protocol handler pph app domain protocol handler adph | [
2244,
1098,
10924,
6797,
7983,
4439,
4797,
7838
] | Test |
6,870 | 2 | Nokia_X5:nokia x5 nokia x5-00/01 pair smartphones x-series nokia mobile phones original china model comes symbian os 9.3 worldwide model uses s60 3rd edition fp2 x5-00 released china second quarter 2010 x6 could released region due china still using partial-3g td-scdma mobile network mobile phones unlike selected countries started use 3.5g hsdpa mobile network although original version x5 china alternative version original x6 large on-board memory comes music service later june 2010 nokia announced x5 gain release countries china named x5-01 features wider smaller 2.36-inch screen better microsdhc support 32 gb sdhc use hsdpa network mode released september 2010 july 2018 hmd global released new android phone name nokia x5 2018 original x5 candybar mobile phone alpha-numeric keypad features carl zeiss 5-megapixel camera equipped dual led flash 256 mb internal memory use 8 gb microsd card nokia x5-01 slider mobile phone qwerty/qwertz keypad depending country sale features five megapixels camera led flash arm 11 600 mhz processor 200 mb internal memory 32 gb microsd 2 gb card included sales package x5-01 wi-fi phone models bluetooth connectivity running symbian os 9.3 series 60 v3.2 ui design original x5 mixed reviews despite china-only release design x5-01 come great criticism vastly deficient dimensions phone 74.3 × 66.4 × 16.8 mm weight 129 grams display 2.36 phone comes full qwerty keypad available six colors yellow green purple pink azure graphite black phone comes additional 3 labeled soft keys media keys volume keys navi keys | [
1537,
4609,
8577,
3205,
11655,
9359,
1424,
529,
2449,
8083,
10770,
5143,
2072,
7063,
5274,
5019,
5659,
669,
8472,
11545,
4003,
4132,
6310,
167,
40,
3626,
5290,
10410,
10802,
7220,
821,
5175,
7866,
1083,
1728,
7617,
4291,
7877,
10053,
199,... | None |
6,871 | 9 | Circular_dependency:circular dependency software engineering circular dependency relation two modules either directly indirectly depend function properly modules also known mutually recursive circular dependencies natural many domain models certain objects domain depend however software design circular dependencies larger software modules considered anti-pattern negative effects however circular cyclic dependencies found widespread among source files real-world software mutually recursive modules however somewhat common functional programming inductive recursive definitions often encouraged circular dependencies cause many unwanted effects software programs problematic software design point view tight coupling mutually dependent modules reduces makes impossible separate re-use single module circular dependencies cause domino effect small local change one module spreads modules unwanted global effects program errors compile errors circular dependencies also result infinite recursions unexpected failures circular dependencies may also cause memory leaks preventing certain primitive automatic garbage collectors use reference counting deallocating unused objects large software designs software engineers may lose context inadvertently introduce circular dependencies tools analyze software find unwanted circular dependencies circular dependencies often introduced inexperienced programmers need implement kind callback functionality experienced programmers avoid unnecessary circular dependencies applying design patterns like observer pattern implementation circular dependencies c/c++ bit tricky structure class definition must placed usage file circular dependency classes b thus require definition placed b definition b placed course impossible forward declaration therefore needed accomplish following example illustrates done note although name e.g codice_1 declared multiple times forward declarations defined one definition rule following another example forward declaration might useful application needs self-sustaining array objects able add remove objects run-time static variables first last defined declaration reserve memory space note static variables change object object stay given class also initialized 0 null know start | [
2304,
8582,
2887,
2417,
9490,
2012
] | Test |
6,872 | 3 | Alcazar:_The_Forgotten_Fortress:alcazar forgotten fortress alcazar forgotten fortress dungeon action-adventure game similar dungeon master legend zelda released 1985 coleco adam computer accessory also port colecovision created tom loughry activision graphics keri janssen longaway game also ported commodore 64 later plot alcazar get main castle alcazar going multiple enemy castles retrieve stolen crown game starts world map contains 22 castles player main goal move character various castles ultimately arrive main castle fortress right side map castle multiple rooms traps floors map routes change every time new game started game four difficulty levels beginner intermediate advanced expert various items may also obtained game pistol used attacking hook used cross gaps also map bottom left corner help prevent lost castle dungeons also many traps enemies present player either fight evade player incurs much damage lose life losing lives ends game though extra lives may also obtained well game continues adam version game supports saving game one earliest adventure games demo mode shows demonstration game play wait title screen 30 seconds game go mode ahoy praised alcazar beautifully written theme song stated graphics insufficiently detailed magazine concluded game enticing blend mental physical stimulation ... electronic passport hours entertainment | [
10931,
9006
] | Validation |
6,873 | 3 | PlayStation_2_online_functionality:playstation 2 online functionality selected games sony playstation 2 video game console offer online gaming online capabilities games enable feature provide free online play use broadband internet connection playstation 2 network adaptor since service official name sometimes referred either ps2 network play ps2 network gaming ps2 online service launched july 2001 japan august 2002 north america june 2003 europe slimline models network adapter integrated hardware games also allowed online gameplay using dial-up connection available models lan play connecting two network adapters/slimline consoles together directly ethernet cable router network instead unified online service like seganet xbox live online multiplayer ps2 responsibility game publisher run third-party servers however later ps2 online games required console authorized sony dynamic network authentication system dnas connecting server unofficial servers also exist could connected setting dns settings connect unofficial dns server recent ps2 online games developed exclusively support broadband internet access last official online server final fantasy xi ultimately shut march 31 2016 dnas following couple days later april 4 indirectly shutting several remaining unofficial servers exception ones support non-dnas ps2 titles tony hawk pro skater 3 despite dnas shutdown several fan created servers still exist require dnas workaround connect exceptions call duty 3 older models non-slim playstation 2 console network adapter needed play online use hard drive versions network adapter provide ethernet port north american versions also featured phone-line port dial-up connection newer slimline versions however ethernet port built making network adapter unnecessary hard drive use nearly impossible well ruling need keep network adapter production playing online games requires users set system network connection configuration saved memory card done network startup disk came network adapter using one many games utility built resident evil outbreak set network settings new slimline playstation 2 came disk box default last version disk network startup disk 5.0 included newer scph 90004 model released 2009 however december 31 2012 playstation 2 discontinued servers games since shut released 2002 final fantasy xi first ever console game offer cross-platform play connecting playstation 2 personal computer released august year one first video games allowed voice chat console pal games supported online gaming display net play logo cover north american games feature online icon lower right corner cover games support dial-up connectivity broadband also found logo time game servers shut however computer programs xbslink svdl xlink kai allow users achieve online play ps2 games using network configuration simulates worldwide lan | [
643,
9091,
3077,
11398,
10761,
6799,
9508,
6311,
9512,
684,
306,
1587,
1091,
9543,
10056,
6732,
10316,
7502,
6738,
859,
4060,
5215,
607,
359,
8937,
3824,
5746,
7028,
7801,
8316,
6781
] | None |
6,874 | 4 | Trishneet_Arora:trishneet arora trishneet arora born 2 november 1993 founder ceo tac security security company arora written books cyber security ethical hacking web defence named forbes 30 30 2018 asia list fortune magazine 40 40 2019 list india brightest business minds arora founded tac security cyber security company provides protection corporations network vulnerabilities data theft clients reliance industries central bureau investigation punjab police india gujarat police helps punjab gujarat police investigating cyber crimes conducted training sessions officials arora company mainly provides vulnerability assessment penetration testing services according arora increase number attacks portals companies 2016 tac security raised pre-series funding indian investor vijay kedia prior tac security inducted subinder khurana former vice president cognizant board film-maker sunil bohra working biographical film arora expected released 2019 | [] | None |
6,875 | 8 | Hessian_(Web_service_protocol):hessian web service protocol hessian binary web service protocol makes web services usable without requiring large framework without learning new set protocols binary protocol well-suited sending binary data without need extend protocol attachments hessian developed caucho technology inc company released java python actionscript adobe flash implementations hessian open source license apache license third-party implementations several languages c++ c javascript perl php ruby objective-c erlang also available open-source although hessian primarily intended web services adapted tcp traffic using hessianinput hessianoutput classes caucho java implementation | [
8644,
10020,
3462,
8582,
10470,
11303,
8554,
11355,
5612,
5677,
5165,
7983,
10924,
10097,
6555,
9245
] | None |
6,876 | 4 | Tagged_Message_Delivery_Agent:tagged message delivery agent tmda open-source software application designed reduce amount junk email user receives tmda main difference anti-spam systems use controversial challenge/response system bulk mailing machines programs either unwilling save bandwidth unable due lack programming answer technical countermeasures used tmda thwart spam include | [
2527
] | None |
6,877 | 4 | Port_knocking:port knocking computer networking port knocking method externally opening ports firewall generating connection attempt set prespecified closed ports correct sequence connection attempts received firewall rules dynamically modified allow host sent connection attempts connect specific port variant called single packet authorization exists single knock needed consisting encrypted packet primary purpose port knocking prevent attacker scanning system potentially exploitable services port scan unless attacker sends correct knock sequence protected ports appear closed port knocking usually implemented configuring daemon watch firewall log file connection attempts certain points modify firewall configuration accordingly also performed kernel level using kernel-level packet filter iptables userspace process examining packets higher level using packet capture interfaces pcap allowing use already open tcp ports used within knock sequence port knock similar secret handshake consist number tcp udp even sometimes icmp protocol packets numbered ports destination machine complexity knock anything simple ordered list e.g tcp port 1000 tcp port 2000 udp port 3000 complex time-dependent source-ip-based other-factor-based encrypted hash portknock daemon firewall machine listens packets certain ports either via firewall log packet capture client user would carry extra utility could simple netcat modified ping program complicated full hash-generator use attempted connect machine usual way portknocks stateful systems first part knock received successfully incorrect second part would allow remote user continue indeed would give remote user clue far sequence failed usually indication failure end knock sequence port expected open opened packets sent remote user time technique securing access remote network daemons widely adopted security community actively used many rootkits even year 2000 defeating port knocking protection requires large-scale brute force attacks order discover even simple sequences anonymous brute force attack three-knock tcp sequence e.g port 1000 2000 3000 would require attacker test every three port combination 1–65535 range scan port attacks uncover changes port access target system since port knocking definition stateful requested port would open correct three-port number sequence received correct order without receiving intervening packets source average case scenario requires approximately 141 trillion 65535 2 packets determine correct three-port number technique combination knock attempt-limiting longer complex sequences cryptographic hashes makes successful port access attempts extremely difficult successful port knock sequence supplied open port firewall rules generally open port ip address supplied correct knock adding dynamic functionality firewall behaviour instead using preconfigured static ip whitelist firewall authorised user situated anywhere world would able open necessary port without assistance server administrator system could also configured allow authenticated user manually close port session close automatically using timeout mechanism establish new session remote user would required reauthenticate using correct sequence stateful behaviour port knocking allows several users different source ip addresses varying levels port knock authentication simultaneously allowing legitimate user correct knock sequence firewall firewall middle port attack multiple ip addresses assuming bandwidth firewall completely consumed attacking ip address ports firewall still appear closed using cryptographic hashes inside port knock sequence defends packet sniffing source target machines preventing discovery port knock sequence using information create traffic replay attacks repeat prior port knock sequences port knocking used part defense depth strategy even attacker successfully gain port access port security mechanisms still place along assigned service authentication mechanisms opened ports implementation technique straightforward using bare minimum shell script server windows batch file command line utility client overhead server client terms traffic cpu memory consumption minimal port knock daemons complex code type vulnerability within code obvious auditable port knock system implemented ports ssh sidesteps issue brute force password attacks logins case ssh ssh daemon activated without correct port knock attack filtered tcp/ip stack rather using ssh authentication resources attacker daemon inaccessible correct port knock supplied port knocking flexible customisable system add-in administrator chooses link knock sequence activity running shell script changes implementing additional firewall rules open ports specific ip addresses easily incorporated script simultaneous sessions easily accommodated addition mitigating brute force password attacks inevitable growth logs associated process daemon port knocking also protects protocol vulnerability exploits exploit discovered could compromise daemon default configuration using port knocking listening port reduces possibility compromise software process updated authorized users would continue served provide correct knock sequence random access attempts would ignored port knocking viewed part overall network defense strategy providing protection random targeted attacks complete standalone solution network security professionals largely ignored port knocking solution past since early implementations relied solely providing correct port combinations achieve access modern port knock systems incorporate features secure cryptographic hashes blacklists whitelists dynamic attack responses increase system capability port knocking effective means maximizing server resources internet facing networks properly implemented port knocking lower overall security system effective measure provides additional layer security minimal server resource overhead worst systems port knocking introduce new security issues poor implementation expose ambivalent administration attitudes situations risk compensation port knocking totally dependent robustness port knocking daemon failure daemon deny port access users usability security perspective undesirable single point failure modern port knocking implementations mitigate issue providing process-monitoring daemon restart failed stalled port knocking daemon process systems use cryptographic hashes vulnerable ip address spoofing attacks attacks form denial service use port knocking functionality lock known ip addresses e.g administrator management stations sending packets spoofed ip address random ports servers using static addressing especially vulnerable types denials service addresses well known port knocking problematic networks exhibiting high latency port knocking depends packets arriving correct sequence access designed functionality tcp/ip hand designed function assembling order packets coherent message situations solution client continue resending correct sequence packets periodic basis sequence acknowledged server port knocking used sole authentication mechanism server security perspective simple port knocking relies security obscurity unintended publication knock sequence infers compromise devices supporting sequence furthermore unencrypted port knocking vulnerable packet sniffing network trace suitable length detect correct knock sequence single ip address thus provide mechanism unauthorised access server extension attached network compromised log files device source valid knock sequences revealing another point failure solutions treating knock sequence one-time password defeat aim simplified administration practice port knocking must combined forms authentication vulnerable replay man-in-the-middle attacks whole system effective | [
2947,
7556,
14,
4369,
10387,
11413,
5402,
939,
10924,
3629,
9791,
8386,
9285,
6345,
10442,
3924,
10341,
2409,
1776,
8694,
4863
] | Test |
6,878 | 3 | Broadway_(microprocessor):broadway microprocessor broadway codename 32-bit central processing unit cpu used nintendo wii video game console designed ibm initially produced using 90nm soi process later produced 65nm soi process according ibm processor consumes 20 less power predecessor 180 nm gekko used nintendo gamecube video game console broadway produced ibm 300 mm semiconductor development manufacturing facility east fishkill new york bond assembly test operation broadway module performed ibm facility bromont quebec official details released public nintendo ibm unofficial reports claim derived 486 mhz gekko architecture used gamecube runs 50 faster 729 mhz powerpc 750cl released 2006 stock cpu offered ibm virtually identical broadway difference 750cl came variants ranging 400 mhz 1000 mhz | [
6914,
7170,
4868,
10501,
3846,
4743,
6663,
5642,
1548,
1933,
398,
6926,
3472,
4881,
659,
7065,
1563,
1309,
6815,
10784,
3493,
6949,
6311,
4136,
1321,
8102,
1067,
4653,
9391,
10543,
4017,
5297,
8120,
6715,
9020,
1725,
1983,
1985,
10180,
69... | Train |
6,879 | 3 | NEC_RISCstation:nec riscstation nec riscstation line computer workstations made nec mid-1990s based mips risc microprocessors designed run microsoft windows nt series nearly identical machines also sold nec headless i.e. video card framebuffer configuration riscserver series intended use windows nt workgroup servers riscstations based modified jazz architecture licensed mips computer systems inc. originally designed microsoft although architecturally similar contemporaneous intel 80386-based personal computers including example pci bus riscstations faster pentium-based workstations time although based jazz design riscstations use g364 framebuffer instead using s3 968-based video card 3dlabs glint-based adapter pci slot riscstations used standard ibm at-style tower minitower case motherboard also met form factor standard pci peripherals video card peripheral expansion several operating systems supported riscstations like jazz-based mips computers mips magnum riscstations ran arc console firmware boot windows nt little-endian mode mips iii architecture capable either little-endian big-endian operation however microsoft stopped supporting mips architecture windows nt version 4.0 riscstations ceased production 1996 addition windows nt nec ported version unix system v riscstation although support lacking linux/mips riscstation series supported netbsd netbsd/arc supported openbsd prior termination port 1998 riscstation line included march 1995 dual-cpu configuration riscstation 2000 priced 14,000 came equipped two 150 mhz mips r4400 cpus 64 mb ram 1 gb scsi hard drive 3x cd-rom drive 17-inch nec-brand crt monitor | [
7234,
6854,
3818,
6252,
7215,
8976,
7442,
2995,
5492,
2452,
5686,
823,
8851,
6942
] | Test |
6,880 | 5 | T.38:t.38 t.38 itu recommendation allowing transmission fax ip networks foip real time t.38 fax relay standard devised 1998 way permit faxes transported across ip networks existing group 3 g3 fax terminals t.4 related fax standards published itu 1980 rise internet late 1990s voip voice ip began gain ground alternative conventional public switched telephone network pstn however voip systems optimized use aggressive lossy bandwidth-saving compression voice rather data calls conventional fax machines worked poorly due network impairments delay jitter packet loss thus way transmitting fax ip needed practical scenarios t.38 fax call least part call carried pstn although required t.38 definition two t.38 devices send faxes particular type device called internet-aware fax device iaf capable initiating completing fax call towards ip network typical scenario t.38 used t.38 fax relay t.30 fax device sends fax pstn t.38 fax gateway converts encapsulates t.30 protocol t.38 data stream sent either t.38 enabled end point fax machine fax server another t.38 gateway converts back pstn pcm analog signal terminates fax t.30 device t.38 recommendation defines use tcp udp transport t.38 packets implementations tend use udp due tcp requirement acknowledgement packets resulting retransmission packet loss introduces delays using udp t.38 copes packet loss using redundant data packets t.38 call setup protocol thus t.38 devices need use standard call setup protocols negotiate t.38 call e.g h.323 sip mgcp two primary ways fax transactions conveyed across packet networks t.37 standard specifies fax image encapsulated e-mail transported ultimately recipient using store-and-forward process intermediary entities t.38 however defines protocol supports use t.30 protocol sender recipient terminals see diagram t.38 lets one transmit fax across ip network real time original g3 fax standards traditional time-division multiplexed tdm network also called public switched telephone network pstn special protocol needed real-time fax ip internet protocol since existing fax terminals supported pstn connections information flow generally smooth uninterrupted opposed jittery arrival ip packets trick come protocol makes ip network “ invisible ” endpoint fax terminals would mean user legacy fax terminal need know fax call traversing ip network network interconnections supported t.38 shown two fax terminals either side figure communicate using t.30 fax protocol published itu 1980 interconnection pstn ip packet network requires “ gateway ” pstn ip networks pstn-ip gateways support tdm voice pstn side voip foip packet side voice sessions gateway take voice packets ip side accumulate packets ensure smooth flow tdm data upon release meter tdm eventually heard human stored computer later playback gateway employs packet-management techniques enhance quality speech presence network errors taking advantage natural ability listener really hear occasional missing repeated packet facsimile data transmitted modems ’ forgiving human ear speech missing packets often cause fax session fail worst create one image lines error best job t.38 “ fool ” terminal “ thinking ” ’ communicating directly another t.30 terminal also correct network delays so-called spoofing techniques missing delayed packets fax-aware buffer-management techniques spoofing refers logic implemented protocol engine t.38 relay modifies protocol commands responses tdm side keep network delays ip side causing transaction fail done example padding image lines deliberately causing message re-transmitted render network delays transparent sending/receiving fax terminals networks packet loss excessive delay exhibit acceptable fax performance without t.38 provided pcm clocks gateways high accuracy explained t.38 removes effect pcm clocks synchronized also reduces required network bandwidth factor 10 corrects packet loss delay shown diagram t.38 gateway composed two primary elements fax modems t.38 subsystem fax modems modulate demodulate pcm samples analog data turning sampled-data representation fax terminal ’ analog signal binary translation vice versa pstn network samples analog signal voice modem signal ’ know difference 8,000 times per second sps encodes 8-bit data bytes means 8000 samples-per-second times 8-bits per sample 64,000 bits per second bit/s represent modem voice data one direction directions modem transaction consumes 128,000 bits network bandwidth however typical modem fax terminal transmits image data 33,600 bit/s analog data first converted digital content represent 33,600 bits plus network overhead bytes needed since t.30 fax half-duplex protocol network needed one direction time refer rfc 3261 diagram sample-rate clock fax terminal one gateway ’ modems used trigger sampling analog line 8,000 times per second clocks usually quite accurate low-cost terminal adapters one two-line gateway pcm clock surprisingly inaccurate terminal sending data gateway gateway ’ clock slow buffers jitter buffers gateway eventually overflow causing transaction fail since difference often quite small problem occurs long detailed fax images giving clocks time cause jitter buffer gateway either underflow overflow missing duplicated packets t.38 provides facilities eliminate effects packet loss data redundancy packet sent either zero one two three even previously sent packets repeated specification impose limit increases network bandwidth required ’ still much less using t.38 allows receiving gateway reconstruct complete packet sequence even fairly high level packet loss | [
6880,
1121,
10924,
7407,
3921,
5843,
11413,
8541,
10271
] | None |
6,881 | 5 | Diameter_Credit-Control_Application:diameter credit-control application diameter credit-control application networking protocol diameter application used implement real-time credit-control variety end user services ietf standard first defined rfc 4006 updated rfc 8506 purpose diameter credit control application provide framework real-time charging primarily meant communication gateways/control-points back-end account/balance systems typically online charging system application specifies methods diameter credit control application specify type units bought/used items charged left service context specified separately semantics examples units used/bought examples items charged diameter credit control also specifies handle fairly complex issue multiple unit types used/charged single user balance instance user may pay online time download bytes single account balance session-based credit control process uses several interrogations may include first intermediate last interrogation interrogation money reserved user account session-based charging typically used scenarios charged units continuously consumed e.g charging bytes upload/download event-based credit control process uses events charging mechanism event-based charging typically used units continuously consumed e.g user sending mms order support credit control via diameter two diameter messages ccr credit control request cca credit control answer command code ccr/cca 272 defined rfc 4006 quota management client sends ccr server requesting units reporting consumption server grants units charges user simple debit/credit client sends ccr asking server credit/debit user account price inquiries client ask server price unit server responds price message flows general driven control-point asking units server granting message may also generated diameter applications nasreq rfc4005 sessions time/usage-limited following diagram shows simplified message flow session using quota grants client starts requesting 10 units server server verifies user/subscriber enough balance example server grants client units requested subscriber insufficient balance could granted less units rejected completely subscriber session used granted units client sends update server telling many units used many would like granted time client allowed request units previous grant completely used order avoid suspending subscriber session talking server example client sends request 7 units 10 previously granted units used ask 10 units server grants server use used-units count debiting subscriber balance granting units indicate used used-units avp contains actual usage also possible server tell client long grant valid case client expected send update grant timer expires many update messages session finally subscriber ended session client sends termination message server containing last used-units server use termination message clear related reservations made back-end balance management system subscriber terminate session instead depleted balance server would responded earlier reject update message possibly telling client/control-point redirect traffic normally makes sense http/wap traffic new command codes cca ccr may require avps indicated bold avps new dcca table uses following symbols | [
5875,
8670
] | Validation |
6,882 | 4 | FADO:fado fado stands false authentic documents online european image-archiving system set help combat illegal immigration organised crime established joint action council european union enacted 1998 proliferation genuine false documents means frequent updating essential ever sophisticated techniques used produce genuine documents forgeries computerised system restricted access therefore built enables fast secure information exchange general secretariat council european union document experts european union member states iceland norway switzerland database established fado joint acts includes following data fado currently available document experts 31 fado partner states member states european union eu iceland norway switzerland part information shared document experts classified restricted system fado made publicly available via public register authentic documents online prado website managed council european union document descriptions fado available 24 official languages european union documents introduced document experts languages standardised descriptions translated automatically thus documents immediately available supported languages additional free text information contained translated later specialised linguists general secretariat council | [
6298
] | Validation |
6,883 | 2 | The_Settlers_IV:settlers iv settlers iv released settlers fourth edition north america real-time strategy video game city-building elements developed blue byte published ubi soft released germany microsoft windows february 2001 united kingdom march north america august fourth game settlers series following settlers 1993 settlers ii 1996 settlers iii 1998 august blue byte released expansion settlers iv mission cd featuring new single-player campaign missions new maps single-player multiplayer modes random map generator map editor gameplay improvements bug fixes december released second expansion settlers iv trojans elixir power containing new single-player campaigns additional single multiplayer maps improved graphics additional gameplay tweaks march 2002 settlers iv gold edition released containing original game expansions plus fan-made maps multiplayer mode two minigames november 2009 gameloft ported original game ios title settlers although featuring updated graphics utilising touch controls gameplay game mechanics storyline identical original april 2010 settlers released webos specifically optimised palm pre gameloft later released hd versions ipad bada symbian android 2013 gold edition released gog.com 2018 game re-released settlers iv history edition game single-player campaign player controls three races romans vikings mayans initially fight one another joining forces combat much greater threat posed exiled god morbus banished earth instigating failed rebellion great god unable bear touching foliage morbus leads mysterious dark tribe sets attempting erase natural greenery planet surface trojans elixir power takes place many centuries later war dark tribe faded memory three victorious civilisations returned fighting one another however morbus proves threat attempting permanently cure allergy greenery creating powerful elixir falls trojans unite others stand dark tribe acting feedback fans felt settlers iii focused combat designers aimed return core supply demand-based gameplay first two titles series result game designed strike balance economic planning military conquest although basic gameplay remains relatively unchanged settlers iii game mechanics altered example first time series offensive strength player military tied economic value settlement player access rank soldier beginning mission ability select rank every soldier prior recruitment game single-player campaign focuses race defeated solely military means specialty units squad leaders added enhance tactical aspects combat warships also made available allowing combat sea settlers iv received mixed reviews critics feeling similar settlers iii many opining blue byte failed steer gameplay away over-reliance combat although graphics animations generally praised ai mission variety limited combat strategy criticised reviews comparing game unfavourably titles age empires ii handheld version received positive reviews lauded replicating original game portable device successfully adapting controls touchscreen common criticism concerned lack free play multiplayer modes settlers iv real-time strategy game city-building elements controlled via point click interface general gameplay game mechanics similar settlers iii primary goal maps build settlement functioning economy producing sufficient military and/or specialist units conquer rival territories achieve end player must engage economic micromanagement construct buildings generate resources game played one two modes single-player multiplayer single-player mode player play either campaign missions individual non-campaign games free maps campaign mode player must complete series missions goal defeat computer controlled opponent opponents gaining possession territory case dark tribe destroying temple using gardeners original release game three separate campaigns three missions one campaign romans vikings mayans fourth campaign twelve missions player controls three races fight dark tribe mission cd expansion added three additional campaigns five missions race plus three settlement missions three conflict missions trojans elixir power expansion added three campaigns four missions original three races four settlement missions new campaign twelve missions player controls trojans dark tribe free maps multiplayer mode played via lan online player chooses map play refines game various ways adjusting number computer controlled opponents amount raw materials available start game and/or victory conditions player also select type game played choosing conflict mode player/race competes one another ranking list players receive points end game ranking blue byte online league table cooperation mode players combine forces achieve predetermined objective computer controlled races economic mode winner player produce goods least four seven categories within time limit settlefest players compete separate identical single-player maps first reach given objective free settle mode one player/race whether playing single-player multiplayer mode game begins way player small settlement set amount raw materials tools predetermined number settlers basic gameplay revolves around serfs titular settlers transport materials tools produce populate perform requisite task building settlers iii new settlers acquired construction residences point player directly control normal settler instead general orders issued ordering construction building ai handling delegation orders specific settlers however player control specialist settlers four types pioneers extend player territory digging border thieves scout enemy territory steal resources geologists test mountainous ground raw materials gardeners reclaim terrain corrupted dark tribe playing multiplayer game player also access fifth specialist unit saboteur attack destroy enemy buildings military installations settlers iii players construct road network instead settlers walk freely around player territory ai handling pathfinding like previous games series settlers iv adjustable goods priority system determines order items transported players also build marketplaces allow establishment trade routes areas geographical region shipyards allow manufacture warships ferries transport specialist settlers soldiers war machines trade ships transport items landing dock different geographical region original game player controlled three races romans vikings mayans trojans elixir power added trojans fourth race settlers iii race slightly different economic model example romans trojans construction industries require roughly equal amounts wood stone vikings wood stone mayans stone wood race also specific skills example romans produce manna using two buildings vikings build war machines warships use manna rather physical ammunition mayans utilise desert terrain grow agave plants necessary production tequila economy player control throughout game adjustable multiple ways example player control distribution goods selecting percentage given resource transported given building similar manner player select tools made tool production important insofar buildings require raw materials worker right tool example player built mine building still empty despite presence idle settlers pickaxe need manufactured toolsmith game also uses notification system alerts player building occupied either due lack right tool absence available settlers settlers iii game features magic whereby race call upon deities economic and/or military assistance player manna priests finite access number spells nature depends race spells include limited tuning fish stone turning enemy soldiers allies romans turning stone iron temporarily freezing enemies vikings turning wood gold turning enemy bowmen butterflies mayans turning sulphur iron turning enemy soldiers normal settlers trojans player territory expanded using pioneers building military complex near territory border complex must least one soldier garrisoned territory expand recruit soldiers player must build barracks individual soldier requiring requisite weapon transition settler soldier player also build lookout towers manned regular settlers see great distances n't grant new territory three classes soldier common races swordsmen bowmen squad leaders level swordsmen bowmen set player prior recruitment types soldier three ranks determined amount gold necessary recruitment gold level 1 one gold bar level 2 two gold bars level 3 squad leaders available one rank require sword suit armour three gold bars recruit well stronger health level 3 swordsman also affect troops around improving formations increasing combat strategy enhancing abilities additionally player assigns squad leader group soldiers orders need issued squad leader squad automatically follow destination ordered player race also produce warships war machines catapults romans magical lightning generators vikings canons mayans ballistae trojans special military units medics romans axe warriors vikings blowgun warriors mayans backpack catapultists trojans swordmen bowmen special military units three levels recruitment order player attack enemy building must click near building soldiers selected player units defeat soldiers stationed building occupy player territory increasing according building radius defense player military buildings automatic enemies attack soldiers stationed building defend nearby soldiers also defend building unless ordered soldiers fighting within territory strength always 100 fighting outside strength tied economic value settlement especial importance improving strength one army eyecatchers decorative monuments worth double construction value relation player military strength game begins shortly failure rebellion instigated dark god morbus great god treachery banishes morbus earth morbus hated place universe due vast amounts greenery unable bear touching foliage morbus determines destroy earth plant life dark gardener eventually develops substance known shadow-weed sucks energy land killing nearby foliage transforming terrain blackened wasteland dark lands meanwhile unaware presence morbus war raging three races recently come contact one another romans vikings mayans first encounter dark lands romans whose scouts return word effects shadow-weed initially believe new mayan weapon result romans attack destroy nearby mayan colony quickly realise dark lands mayans mayans also encountered dark lands suggest temporary alliance romans reluctantly agree however begin investigate dark lands mayans turn elsewhere vikings also encounter effects shadow-weed discover one sacred burial grounds surrounded dark lands setting reclaim territory attacked army mindless soldiers nearby romans learn secret dark army created human settlers converted shamans servants morbus thus forming dark tribe put work mushroom farms converting mushroom spores manna transported nearest dark temple used create dark army clearer understanding dark tribe romans ally vikings determine destroy farms however mayans see alliance romans vikings direct threat attacking colonies belonging realise alliance focused attacking combating dark tribe time however find surrounded dark lands despite previous animosity romans vikings save mayans three unite going offensive effort wipe dark tribe eventually vikings locate believe final dark temple destroy remnants dark tribe survive rally final battle secure knowledge one victory required mayans launch attack prove victorious dark tribe temples farms eradicated way breeding new troops morbus retreats lair begging mercy morbus horrified see vines infesting building quickly wrapping around turning stone trojans elixir power begins many centuries events main game morbus remains petrified state territory controlled trojans unaware races morbus identity war dark tribe story begins morbus assistant q'nqüra spreads shadow-weed around statue releasing trojans discover statue gone effects shadow-weed spreading elect abandon area landing new island encounter friendly romans hostile mayans allying romans trojans tell disappearance morbus statue romans tell history war call meeting four races shocked however learn dark tribe using aerial vehicles dubbed manacopters easily infiltrate lines inflict huge losses romans vikings mayans attacked trojans tasked destroying dark tribe research lab manacopter blueprints raid lab however discover morbus plan dark gardeners attempting create elixir cure inability touch greenery using complex combination herbs one herb final breakthrough four races divide land sectors search final herb shortly thereafter vikings locate priests begin harvest dark tribe soon arrive trojans develop poison use herb vikings unable harvest time viking priest ambushed killed dark tribe acquire herb however remains unclear priest able use poison death meanwhile morbus temple located trojans lead assault succeed destroying morbus able create drink elixir emerging ruins temple see greenery surrounding laughs declares nothing stop game cuts time later site temple stands small cottage garden full blooming flowers morbus emerges cottage happily attends garden fully cured hatred foliage settlers iv announced blue byte ects august 1999 however volker wertich created settlers series designed programmed original settlers settlers iii would involved development later explained blue byte wanted ready release christmas 2000 opinion sufficient time create worthy title game first shown e3 event may 2000 blue byte stated gameplay would emphasise economic planning military conquest citing negative feedback fans felt settlers iii combat-orientated designers intended new game return core supply demand-based gameplay settlers settlers ii also revealed game would feature three playable races romans vikings mayans new non-playable race dark tribe speaking importance dark tribe economic-based gameplay project manager co-designer hans-jürgen brändle explained interview gameszone brändle stated made sure balance settling combat virtually every rule change new feature addressing game would feature nearly identical economic processes settlers iii despite refocused gameplay explained majority feedback gave us clear understanding economy settlers simply great game artificially inflated new goods people fun ease playing overwhelmed unnecessarily complex contexts speaking ign later year brändle reiterated designers hopes game would fully integrate economic-based settling combat previous title three races game brändle explained developers chose romans traditional settlers race vikings fan-requested race mayans needed race used stone wood construction industry developers felt mayans somewhat historically mysterious culture gameszone interview brändle also addressed issue similarity graphics new game settlers iii explaining deliberately programmed engine much like previous one wanted make fans feel like back familiar world settlers settlers iii buildings game created using 3d studio max adobe photoshop used create textures race assigned specific artist worked nothing except buildings particular race according lead artist/co-designer/co-writer torsten hess done style buildings within people uniform however certain overriding rules individual artists adhere one important technique hess employed settlers iii textures applied dirtied create lived-in real-world sense hess explains rigid straight edges avoided beautiful curves moving lines instead used suggest life settlers world textures means stronger colours slightly higher contrast figures well lot detail use many different colour families definitely want avoid sterile look also draw textures hand settlers designers also used basic techniques developed settlers iii figures could n't graphically complex since small details would lost given size 32 pixels height however time designs detailed enough seem least somewhat realistic even small size solve problem settlers proportions exaggerated weapons tools designed proportionally big correctly sized implements would far small seen process animating settlers character animator/co-writer thorsten wallner explains place skeleton behind settler controls movement sequences skeleton dictates standard movements bending running standing additional animations added individual characters technology need animate every settler anew add additional animations july 2000 blue byte advertised 5,000 participants online closed beta however beta postponed early august due technical issues related lobby software causing disruption battle isle andosia war late august blue byte revealed would least mid-september beta began october blue byte released smack thief minigame designed promote main game variation whac-a-mole smack thief player must click viking thieves raid roman stores escape available free download blue byte website game allowed players upload high scores global high score table early november online beta cancelled blue byte stating decided take step concentrate completing game conducting large public beta test requires lot additional resources want invest specifically development quality assurance instead ensured internal testing department interview planet games brändle explained resources filter sort anticipated feedback beta test currently concentrating exclusively completion product following week blue byte announced slated december release pushed back january 2001 thomas hertzler blue byte ceo series producer explaining know many gamers particularly looking forward settlers iv year course understand settlers fans disappointed end however made decision players mind settlers iv shelves christmas fans receive game corresponds blue byte high quality standard january german release date pushed back february 15 february 6 ubi soft announced acquisition blue byte revealing plans publish game internationally president ceo yves guillemot stating february 15 game released germany planned however suffered numerous bugs leading negative reaction fans criticism game blue byte german gaming press although blue byte issued patch day game released introduced additional problems leading negative press second patch released four days later correct problems introduced first patch according german magazine pc games 76 players experienced technical difficulties release version game co-designer thorsten mutschall later admitted ready release february held back additional playtesting programming march 19 ubi soft announced game would released throughout europe end month explaining reasons behind unfortunate delay product essentially quality assurance issues november 2009 working conjunction blue byte license ubisoft gameloft ported game ios released title settlers april 2010 game ported webos specifically optimised use palm pre september gameloft released hd versions ipad bada optimised wave s8500 settlers hd later released symbian january 2011 android may although handheld versions game feature updated graphics gameplay game mechanics identical original storyline including full twenty-one single-player missions original release three roman missions three viking missions three mayan missions twelve mission dark tribe campaign main change game involves hud redesigned accommodate touchscreen controls example rather building menu always present onscreen accessed pressing icon opens build menu within menu player access various submenus basic buildings food buildings military buildings similarly access menu control specialist settlers player touches another icon available player settlers available pressing icon two seconds brings brief help screen icon pausing game allows player access full help menu replacing extended tool tips appeared on-screen original settlers iv received mixed average reviews aggregate score 74 100 metacritic based five reviews 71 gamerankings based seventeen reviews ios version received positively aggregate score 79 gamerankings based six reviews pc player damian knaus scored original game 85 100 giving gold player award although impressed dark tribe criticised integration gardeners gameplay calling unnecessary extravagance also critical lack real innovations absence female settlers however despite reservations felt game best settlers title thus far especially impressed graphics pc games rüdiger steidle scored 77 lowest score magazine ever given settlers title issue review appeared editorial justifying score text box within review titled 77 magazine stated review steidle criticised game similarity settlers iii writing blue byte altered concept although praised graphics tutorials variety mission objectives critical bugs writing typical blue byte fashion game appeared time first patch concluded anyone like fan series disappointed pc gamer jim preston scored 72 although praised economic system game built criticised lack variety within writing 're forced create entire supporting infrastructure settlement way every time also referred gameplay complication masquerading depth ign dan adams scored 7 10 comparing unfavourably biggest criticism concerned lack differentiation settlers iii writing aside improved graphics small additions hard tell really new game also critical ai pathfinding repetitive missions felt designers failed steer gameplay away over-reliance combat although praised graphics animations game great personality concluded blue byte n't managed find new ideas might keep series becoming serious pool stagnant gaming quickly becoming gamespy bernard dy scored 67 100 comparing unfavourably age empires ii like adams felt similar settlers iii although praised appealing graphics fascinating animations felt blue byte failed return gameplay economic focus writing nearly every scenario race build military also criticised ai lack combat strategy mission variety however praise free settle multiplayer modes concluded settlers fourth edition charming moments long surpassed games better character superior combat gamespot ron dulin scored 6.4 10 finding similar problems adams dy comparing unfavourably impressions games city building series finding similar settlers iii felt blue byte failed move away reliance combat also criticised mission variety lack combat strategy writing never complex moving units slowly enemy territory hoping 'll left opponent n't although praised basic supply demand-based gameplay graphics concluded settlers fourth edition really old game old problems computer gaming world mark asher scored 3 5 criticising scenarios differ minor ways arguing best part game free settler mode although praised graphics called game pleasant enough experience noted offered major differences previous settlers titles would interest existing fanbase opined may getting bored formula game commercial success 2001 highest selling german-developed game february 2002 awarded platinum award verband der unterhaltungssoftware deutschland e.v vud award given titles costing dm55 sell 200,000 units nationally within first twelve months release august 2002 game sold 300,000 units germany appspy andrew nesvadba scored ios version 5 5 praising graphics touchscreen controls writing settlers everything great strategy games easy enough jump muck around progressing ultimately complex amazingly detailed set interactions players learn arron hirst 148apps scored 4 5 although critical lack free play multiplayer modes praised controls replication original game mechanics concluding game immersive addicting toucharcade also scored 4 5 criticising lack free play praising graphics sound effects calling game solid experience pocket gamer tracy erickson scored 8 10 giving silver award calling surprisingly good largely positive although critical lack free play multiplayer modes felt playing area oftentimes cluttered icons menus concluded praising deep economic strategy gameplay pocket gamer wayne turton scored bada version settlers hd 7 10 giving bronze award praising tutorials controls graphics however critical absence non-campaign missions multiplayer mode combat system writing victory usually comes side field units concluded magical quality settlers hd draws depth keep playing symbian ewan spence scored symbian version 76 although critical ai feeling screen becomes cluttered especially combat concluded hits required marks game like pocket gamer brendan caldwell scored android version 8 10 giving silver award calling almost resounding victory although critical tutorials felt n't adequately explain intricacies game controls argued n't quite accuracy speed truly emulate traditional mouse keyboard setup concluded depth often enjoyed android titles settlers hd enthralling game game first expansion settlers iv mission cd released germany august 2001 featuring three five-mission single-player campaigns three settlement missions focusing building player settlement achieving economic goals opposed military conquest three conflict missions focusing combat sixteen new maps single-player mode eighteen new maps multiplayer mode terms gameplay mission cd features improved ai varied mission objectives sophisticated scripting within missions higher difficulty single-player games expansion also features random map generator map editor numerous bug fixes stabilisations blue byte released second expansion settlers iv trojans elixir power december featuring thirteen new maps single-player mode thirteen new maps multiplayer mode three new four-mission single-player campaigns original three races four settlement missions new twelve-mission campaign player controls new race trojans expansion also features improved graphics adjustable difficulty random map generator map editor included mission cd terms gameplay importance eyecatchers modified whereas original game player could increase offensive strength beyond 100 building enough eyectachers building large numbers single eyectacher trojans elixir power maximum offensive strength achievable 100 reached player builds least one every eyecatcher released march 2002 settlers iv gold edition contains original game mission cd trojans elixir power also features fan-made maps multiplayer mode smack thief minigame new minigame dark side microsoft windows wallpapers settlers -themed skins winamp icq 2013 gold edition released gog.com blue byte later released two german-language expansions november 2002 released die siedler iv die neue welt set shortly vikings discover america game begins mayans organising feast vikings travelling europe aim taking possession wonders world beginning colossus rhodes vikings meanwhile discover map amongst mayans possessions leading mythological island inhabited women promptly set find trojans expelled troy romans searching new homeland head west time romans attempting reconquer world beginning newly discovered continent expansion features four five-mission single-player campaigns one three original races one trojans multiple objectives many optional economic-based rather military-based also two new single-player maps three new multiplayer maps enhanced graphics textures november 2003 released die siedler iv community pack expansion features four fan-created single-player campaigns based real historical conflicts roman attack carthage third punic war viking invasion england huaxtec resistance spanish conquistadors battle troad wars diadochi november 2018 ubisoft re-released game standalone history edition part settlers history collection optimised windows 10 re-release contains original game mission cd trojans elixir power die neue welt community pack expansions features autosave 4k monitor support dual monitor support adjustable resolutions texture quality vsync online multiplayer available uplay history collection also includes re-releases settlers settlers ii settlers iii | [
10080,
6539,
2285,
6797,
9780,
6266
] | Test |
6,884 | 2 | IPhone_5S:iphone 5s iphone 5s stylized marketed iphone 5s smartphone designed marketed apple inc seventh generation iphone succeeding iphone 5 device unveiled september 10 2013 apple cupertino headquarters released september 20 2013 along lower-cost counterpart iphone 5c iphone 5s maintains almost external design predecessor iphone 5 although 5s received new white/gold color scheme addition white/silver space gray/black 5s vastly upgraded internal hardware however introduced a7 64-bit dual-core system-on-chip first 64-bit processor used smartphone accompanied m7 motion co-processor redesigned home button touch id fingerprint recognition system used unlock phone authenticate app store itunes store purchases also introduced camera also updated larger aperture dual-led flash optimized different color temperatures iphone 5s originally shipped ios 7 introduced revamped visual appearance among new features designed jony ive ios 7 departed skeuomorphic elements used previous versions ios favor flat colorful design among new software features introduced iphone 5s airdrop ad-hoc wi-fi sharing platform control center control panel containing number commonly used functions itunes radio internet radio service earphones known earpods included 5s apple released accessories including case dock reception towards device generally positive outlets considering best smartphone available market due upgraded hardware touch id changes introduced ios 7 criticized iphone 5s keeping design small display iphone 5 others expressed security concerns touch id system nine million units iphone 5s iphone 5c sold weekend release breaking apple sales record iphones iphone 5s best selling phone major u.s. carriers september 2013 iphone 5s succeeded apple flagship smartphone larger iphone 6 september 2014 march 21 2016 5s received direct replacement announcement iphone se incorporated internal hardware similar iphone 6s retaining smaller form factor design 5s iphone 5s iphone supported six major versions ios second ios device support six major updates first ipad 2 supported ios 4 9 official unveiling media speculation primarily centered reports next iphone would include fingerprint scanner including apple july 2012 acquisition authentec developer mobile security products references fingerprint sensor home button beta release ios 7 leaked packaging iphone 5s showing traditional home button metallic ring around similar ring-based imagery seen official invitation apple iphone press event september 2013 new device unveiled shortly official unveiling wall street journal also reported rumor apple announced iphone 5c iphone 5s media event cupertino headquarters september 10 2013 iphone 5c became available preorder september 13 2013 iphone 5s available preorder devices released september 20 2013 promotion focused touch id 64-bit apple a7 processor also highlight event schiller showed demos infinity blade iii demonstrate a7 processing power device camera using untouched photographs release ios 7 september 18 2013 also announced keynote iphone 5s released september 20 2013 united states united kingdom canada china france germany australia japan hong kong singapore released 25 additional countries october 25 2013 12 countries november 1 2013 indonesia last country receive iphone 5s january 26 2014 september 19 2014 iphone 5s succeeded apple flagship smartphone iphone 6 iphone 6 plus older model remained available purchase reduced price 64gb version discontinued gold edition iphone 5s discontinued september 9 2015 apple revealed iphone 6s iphone 6s plus iphone 5s discontinued march 21 2016 succeeded iphone se continues form factor features vastly upgraded internals similar flagship iphone 6s break apple product positioning trend north america western europe starting iphone 4s released october 2011 gave newly released model one year flagship phone moving midrange second year production third final year entry-level offering discontinuation iphone 5s expected continue sale september 2016 replacing a7 processor early meant apple reduced long-term chip support window year ios addition new iphone launch meant stimulate demand sales iphone 6s 6s plus met expectations since september 2015 release iphone family expected suffer first ever negative growth quarter 2016 iphone 5s maintains similar design iphone 5 lcd multi-touch retina display screen resolution 640×1136 326 ppi home button updated new flat design using laser-cut sapphire cover surrounded metallic ring button longer concave contain familiar squircle icon seen previous models phone thick weighs phone uses aluminum composite frame device available three color finishes space gray replacing black slate trim iphone 5 white silver trim white gold trim iphone 5s first iphone available gold color decision influenced fact gold seen popular sign luxury product among chinese customers iphone 5s powered apple a7 system-on-chip first 64-bit processor ever used smartphone device operating system pre-loaded software optimized run 64-bit mode promising increased performance although third-party app developers would need optimize apps take advantage enhanced capabilities a7 processor designed apple manufactured samsung a7 processor accompanied m7 motion co-processor dedicated processor processing motion data iphone accelerometer gyroscopes without requiring attention main processor integrates ios 7 new coremotion apis a7 soc m7 motion co-processor also found ipad air ipad mini 2 released quarter iphone 5s phone includes 1560 mah battery provides 10 hours talk time 250 hours standby time camera still 8 megapixels resolution image capture size 3264 × 2448 4:3 lens larger aperture 2.2 larger sized pixels image sensor previous iphone models flashlight dual true tone flashes consisting amber led white led variably used based color temperature photo improve color balancing camera also includes automatic image stabilization dynamic tone mapping 10 fps burst mode best shot mode slow motion video 120 fps home button iphone 5s incorporates fingerprint recognition system known touch id based technology authentec company apple acquired 2012 sensor uses capacitive cmos-based sensor detect sub-epidermal layers fingers 500 pixels per inch uses 360-degree design read print angle sensor activated touch-sensitive metallic ring surrounding button touch id used various authentication activities within operating system unlocking device authenticating app store itunes purchases instead apple id password sensor trained recognize fingerprints multiple fingers multiple users fingerprint data stored encrypted format within secure enclave a7 chip accessible apps servers including icloud iphone 5s camera paired double led flash allowing higher quality nighttime photos included ios 7 new camera app allowing iphone 5s capture fast continuous shots record slow-motion videos earphones known apple earpods included iphone 5s according technology commentators design earphones aimed improve sound quality allowing air travel freely apple states design earphones allows rival high-end headphones cost hundreds dollars reviews gizmodo techradar reported although earphones sounded better predecessor reviewers felt quality sound produced poor techradar opined earpods inferior earphones similar price iphone 5s initially supplied ios 7 released september 20 2013 jonathan ive designer ios 7 new elements described update bringing order complexity highlighting features refined typography new icons translucency layering physics gyroscope-driven parallaxing major changes design design ios 7 os x yosemite version 10.10 noticeably departs skeuomorphic elements green felt game center wood newsstand leather calendar favor flat colorful design ios 7 adds airdrop ad-hoc wi-fi sharing platform users share files iphone 5 onwards ipod touch 5th generation ipad 4th generation onwards ipad mini 1st generation onwards operating system also adds control center control panel accessed swiping bottom screen control center contains number commonly used functions volume brightness controls along toggles enabling wi-fi bluetooth airplane mode using rear camera flash led flashlight itunes radio internet radio service also included iphone 5s free ad-supported service available itunes users featuring siri integration ios users able skip tracks customize stations purchase station songs itunes store users could also search history previous songs apple announced june 2018 iphone 5s support ios 12 update made iphone 5s longest supported ios device supported six major versions ios operating system par ipad 2 supported ios 4 ios 9 iphone 5s also receive major speed boosts 70 according apple includes camera keyboard functions supported 6 versions ios ios 7 ios 12 iphone revealed iphone 5s receiving ios 13 update debuted june 3 2019 wwdc come later 2019 autumn keynote apple announced case iphone 5s made soft microfiber inside leather outside case announced along iphone 5c case first cases apple announced since iphone 4 bumpers docks iphone 5s 5c found apple online store announcement casing difference iphone 5s 5c separate docks made specifically respective phone iphone 5s received mostly positive reception reviewers commentators walt mossberg things digital gave phone favorable review saying touch id sounds like gimmick ’ real advance biggest step ever biometric authentication everyday devices labeled best smartphone market david pogue new york times praised touch id said innovation smartphone market saturated maybe age annual mega-leaps focused much review ios 7 believed biggest change device previous generations praising new siri features control center airdrop editorial pogue stated ios 7 biggest change iphone series citing utilitarian interface changes main contributor scott stein cnet criticized lack design change iphone 5 said although iphone 5s required upgrade easily fastest advanced apple smartphone date although praised camera 64-bit a7 chip m7 motion-chip fingerprint scanning capabilities investors thought iphone 5s although notable improvement iphone 5 still relatively unchanged predecessor worried iphone line become stagnant dull product apple share price fell 5.4 launch close month low 467.71 nasdaq darrell etherington techcrunch praised iphone 5s best smartphone available said looks may different iphone 5 internal components dramatic impact day-to-day activities normal smartphone user went detail explaining impact improved camera specifications phone etherington suggested 64-bit a7 processor reach full potential developers create applications supporting myriam joire engadget found iphone 5s could benefit significantly a7 developers created applications optimized 64-bit processor anand lal shimpi anandtech praised phone a7 processor describing seriously impressive stated futureproof iphone ever launched much pains use word futureproof one people likes hold onto device iphone 5s good starting point scott lowe ign also spoke highly 64-bit processor substantial lead processing power htc one samsung galaxy s4 accounting graphics boost 32 38 cpu benchmarks debut apple 64-bit a7 processor took rival android smartphone makers surprise particularly qualcomm whose 64-bit system-on-chip released 2015 reviewers recommended iphone 5s iphone 5c released time 5c retained almost hardware discontinued iphone 5 iphone 5s featured substantially improved performance/features thanks new 64-bit a7 processor well extra storage space relatively small additional upfront cost iphone 5c us 650 versus us 550 march 2014 especially case ios 8 released iphone 5s iphone 5c moved mid low end iphone range respectively iphone 5s still 16 32 gb storage available iphone 5c make 8 gb storage 4.9gb available user installing ios 8 furthermore 5c polycarbonate exterior received mixed reception seen cost-cutting downgrade compared iphone 5 aluminum/glass case 5s retained latter design looked even premium due additional gold finish 2015–16 still significant number customers preferred 4-inch screen size iphone 5s remained second-most popular iphone iphone 6 ahead iphone 6s apple stated event sold 30 million 4-inch iphones 2015 even form factor succeeded flagship iphone redesigned larger display 4.7/5.5-inch iphone 6 6 plus back september 2014 furthermore 5/5s design regarded long golden child apple phone design benchmark phones general 5s gold finish adding premium touch 5 already well-regarded look succeeding 6 6s design less critically acclaimed felt little bit wrong though holding slick 650 bar soap iphone 5 described elegance rooted way aluminum glass work together felt streamlined yet substantial different iphone 6 feels substantial size alone plus unlike ubiquitous rounded corners 6 iphone 5 ’ really look like anything else market time however iphone 5/5s design suited scaling contrast iphone 6/6s could better accommodate growing consumer trend towards larger screen sizes indeed spawned 6/6s plus phablet models apple discontinued iphone 5s replaced iphone se outwardly appears almost identical 5s even se internal hardware upgraded significantly iphone 5s 5c sold nine million units first three days setting record first weekend smartphone sales 5s selling three times units 5c first day release 1 iphones us iphone 5ss 0.3 iphone 5cs. ref name= cnet ip5s/c sales 1 /ref gene munster piper jaffray reported line fifth avenue apple store contained 1,417 people release day compared 1,300 iphone 4 2010 549 iphone 3g 2008 respective release days first time apple launched two models simultaneously first-day release china also contributed record sales result launch day major in-stock shortages reported stores across countries iphone 5s initially went sale great many customers line outside apple stores worldwide left disappointed due severe shortages across 5s models gold model particular highly limited supply situation eased us days following launch countries reported receiving restocks commentators questioned apple handled initial release online pre-orders offered iphone 5s meaning large numbers people queuing outside physical stores line receiving unit us apple offered online reservation system customers could keep checking units available local apple stores order pickup online orders also short supply launch day shipping date across model sizes colors changing 7-10 working days october countries within hours online orders taken iphone 5s best selling phone sprint verizon t-mobile september 2013 united states outselling iphone 5c samsung galaxy s4 according consumer intelligence research partners iphone 5s outsold 5c two-to-one margin september release confirming apple ceo tim cook view high-end smartphone market reaching point market saturation commentators viewed 5c flop supply chain cuts signifying decline demand 5s viewed massive success apple admitted failed anticipate sales ratio leading overstocking 5c shortages 5s six months release iphone 5s march 25 2014 apple announced sales iphone brand exceeded 500 million units may 2014 despite market eight months iphone 5s reportedly outsold newly released samsung galaxy s5 40 7 million iphone 5s units versus 5 million galaxy s5 units galaxy s5 failure oust iphone 5s top selling spot major setback samsung mobile preceding samsung galaxy siii samsung galaxy s4 first quarter releases outsold iphone 4s iphone 5 respectively number technology writers including adrian kingsley-hughes zdnet kevin roose new york believed fingerprint scanning functionality iphone 5s could help spur adoption technology alternative passwords mainstream users especially bring device scenarios fingerprint-based authentication systems enjoyed wider usage enterprise environments however citing research biometrics engineer geppy parziale roose suggested cmos-based sensor could become inaccurate wear time unless apple designed sensor prevent occurring brent kennedy researcher united states computer emergency readiness team recommended users immediately rely technology citing uncertainty whether system could properly reject spoofed fingerprint following release iphone 5s german chaos computer club announced september 21 2013 bypassed apple new touch id fingerprint sensor using easy everyday means group explained security system defeated photographing fingerprint glass surface using captured image make latex model thumb pressed sensor gain access spokesman group stated hope finally puts rest illusions people fingerprint biometrics plain stupid use something ca n't change leave everywhere every day security token however 2013 39 american smartphone users used security measures protect smartphone others also tried chaos computer club method concluded easy process either time effort given user use high resolution photocopy complete fingerprint special chemicals expensive equipment spoofing process takes time achieve several problems experienced iphone 5s hardware release widely reported issue angle reported phone level sensor drifted several degrees caused gyroscope compass accelerometer become inaccurate reports suggested hardware-induced problem encountered problems crashing blue screen restarting power button making rattling noise phone shaken overheating microphone working touch id working itunes purchases issues since fixed software updates | [
10755,
9732,
5647,
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
6186,
4139,
6700,
7211,
1074,
8754,
9784,
1083,
8253,
1090,
8783,
4180,
10838,
1623,
3672,
10840,
9312,
3681,
9826,
8806,
3691,
2673,
6258,
10357,
4220,
7292,
2686,
... | Test |
6,885 | 4 | Automatic_number-plate_recognition:automatic number-plate recognition automatic number-plate recognition anpr see also names technology uses optical character recognition images read vehicle registration plates create vehicle location data use existing closed-circuit television road-rule enforcement cameras cameras specifically designed task anpr used police forces around world law enforcement purposes including check vehicle registered licensed also used electronic toll collection pay-per-use roads method cataloguing movements traffic example highways agencies automatic number-plate recognition used store images captured cameras well text license plate configurable store photograph driver systems commonly use infrared lighting allow camera take picture time day night anpr technology must take account plate variations place place concerns systems centered privacy issues government tracking citizens movements misidentification high error rates increased government spending critics described form mass surveillance anpr sometimes known various terms anpr invented 1976 police scientific development branch britain prototype systems working 1979 contracts awarded produce industrial systems first emi electronics computer recognition systems crs wokingham uk early trial systems deployed a1 road dartford tunnel first arrest detection stolen car made 1981 however anpr become widely used new developments cheaper easier use software pioneered 1990s collection anpr data future use i.e solving then-unidentified crimes documented early 2000s first documented case anpr used help solve murder occurred november 2005 bradford uk anpr played vital role locating subsequently convicting killers sharon beshenivsky software aspect system runs standard home computer hardware linked applications databases first uses series image manipulation techniques detect normalize enhance image number plate optical character recognition ocr extract alphanumerics license plate anpr systems generally deployed one two basic approaches one allows entire process performed lane location real-time transmits images many lanes remote computer location performs ocr process later point time done lane site information captured plate alphanumeric date-time lane identification information required completed approximately 250 milliseconds information easily transmitted remote computer processing necessary stored lane later retrieval arrangement typically large numbers pcs used server farm handle high workloads found london congestion charge project often systems requirement forward images remote server require larger bandwidth transmission media anpr uses optical character recognition ocr images taken cameras dutch vehicle registration plates switched different style 2002 one changes made font introducing small gaps letters p r make distinct therefore legible systems license plate arrangements use variations font sizes positioning—anpr systems must able cope differences order truly effective complicated systems cope international variants though many programs individually tailored country cameras used existing road-rule enforcement closed-circuit television cameras well mobile units usually attached vehicles systems use infrared cameras take clearer image plates 1990s significant advances technology took automatic number-plate recognition anpr systems limited expensive hard set fixed based applications simple point shoot mobile ones made possible creation software ran cheaper pc based non-specialist hardware also longer needed given pre-defined angles direction size speed plates would passing camera field view scaled-down components cost-effective price points led record number deployments law enforcement agencies around world smaller cameras ability read license plates higher speeds along smaller durable processors fit trunks police vehicles allowed law enforcement officers patrol daily benefit license plate reading real time interdict immediately despite effectiveness noteworthy challenges related mobile anprs one biggest processor cameras must work fast enough accommodate relative speeds 100 mph 160 km/h likely scenario case oncoming traffic equipment must also efficient since power source vehicle battery equipment must small minimize space requires relative speed one issue affects camera ability actually read license plate algorithms must able compensate variables affect anpr ability produce accurate read time day weather angles cameras license plates system illumination wavelengths also direct impact resolution accuracy read conditions installing anpr cameras law enforcement vehicles requires careful consideration juxtaposition cameras license plates read using right number cameras positioning accurately optimal results prove challenging given various missions environments hand highway patrol requires forward-looking cameras span multiple lanes able read license plates high speeds city patrol needs shorter range lower focal length cameras capturing plates parked cars parking lots perpendicularly parked cars often require specialized camera short focal length technically advanced systems flexible configured number cameras ranging one four easily repositioned needed states rear-only license plates additional challenge since forward-looking camera ineffective oncoming traffic case one camera may turned backwards seven primary algorithms software requires identifying license plate complexity subsections program determines accuracy system third phase normalization systems use edge detection techniques increase picture difference letters plate backing median filter may also used reduce visual noise image number possible difficulties software must able cope include problems corrected within software primarily left hardware side system work solutions difficulties increasing height camera may avoid problems objects vehicles obscuring plate introduces increases problems adjusting increased skew plate cars tow bars may obscure one two characters license plate bikes bike racks also obscure number plate though countries jurisdictions victoria australia bike plates supposed fitted small-scale systems allow errors license plate used giving specific vehicles access barricaded area decision may made acceptable error rate one character likelihood unauthorized car similar license plate seen quite small however level inaccuracy would acceptable applications anpr system front end anpr system imaging hardware captures image license plates initial image capture forms critically important part anpr system accordance garbage garbage principle computing often determine overall performance license plate capture typically performed specialized cameras designed specifically task although new software techniques implemented support ip-based surveillance camera increase utility anpr perimeter security applications factors pose difficulty license plate imaging cameras include speed vehicles recorded varying level ambient light headlight glare harsh environmental conditions dedicated license plate capture cameras incorporate infrared illumination order solve problems lighting plate reflectivity many countries use license plates retroreflective returns light back source thus improves contrast image countries characters plate reflective giving high level contrast reflective background lighting conditions camera makes use active infrared imaging normal colour filter lens infrared illuminator next benefits greatly infrared waves reflected back plate possible dedicated anpr cameras however cameras used purposes must rely heavily software capabilities full-colour image required well use anpr-retrieved details necessary one infrared-enabled camera one normal colour camera working together avoid blurring ideal shutter speed dedicated camera set 1/1000 second also important camera uses global shutter opposed rolling shutter assure taken images distortion-free car moving slower shutter speeds could result image blurred read using ocr software especially camera much higher vehicle slow-moving traffic camera lower level vehicle angle approaching camera shutter speed need fast shutter speeds 1/500 second cope traffic moving 40 mph 64 km/h 1/250 second 5 mph 8 km/h license plate capture cameras produce usable images vehicles traveling maximize chances effective license plate capture installers carefully consider positioning camera relative target capture area exceeding threshold angles incidence camera lens license plate greatly reduce probability obtaining usable images due distortion manufacturers developed tools help eliminate errors physical installation license plate capture cameras several state police forces department justice victoria use fixed mobile anpr systems new south wales police force highway patrol first trial use fixed anpr camera system australia 2005 2009 began roll-out mobile anpr system known officially manpr three infrared cameras fitted highway patrol fleet system identifies unregistered stolen vehicles well disqualified suspended drivers well 'persons interest persons outstanding warrants city mechelen uses anpr system since september 2011 scan cars crossing city limits inbound outbound cars listed 'black lists insurance stolen etc generate alarm dispatching room intercepted patrol early 2012 1 million cars per week automatically checked way police service ontario uses automatic licence-plate recognition software nab drivers behind wheels vehicles ontario number plates technique tested danish police permanent use since mid 2016 180 gantries major roads built throughout country together 250 fixed cameras enable levy eco tax lorries 3.5 tonnes system currently opposed whilst may collecting data vehicles passing cameras eco tax charged 11 march 2008 federal constitutional court germany ruled areas laws permitting use automated number plate recognition systems germany violated right privacy specifically court found retention sort information i.e. number plate data pre-destined use e.g. use tracking suspected terrorists enforcement speeding laws violation german law systems provided jenoptik robot gmbh called trafficapture 2012 state consortium formed among hungarian ministry interior national police headquarters central commission public administration electronic services aim install operate unified intelligent transportation system nationwide coverage end 2015 within system 160 portable traffic enforcement data-gathering units 365 permanent gantry installations brought online anpr speed detection imaging statistical capabilities since data points connected centrally located member consortium able separately utilize range administrative enforcement activities remote vehicle registration insurance verification speed lane traffic light enforcement wanted stolen vehicle interception among others several hungarian auxiliary police units also use system called matrix police cooperation police consists portable computer equipped web camera scans stolen car database using automatic number-plate recognition system installed dashboard selected patrol vehicles pda-based hand-held versions also exist mainly used control license plate parking cars auxiliary police authority order moving vehicles stop stolen car found formal police informed vehicle registration plates saudi arabia use white background several vehicle types may different background united states diplomatic plates letters 'usd arabic reads 'dsu read right left direction arabic script 17 arabic letters used registration plates challenge plates recognition saudi arabia size digits plates use eastern arabic numerals 'western arabic equivalents research source code available apnr arabic digits technique tested swedish police authority nine different locations sweden several cities tested—and put service—the kgys kent guvenlik yonetim sistemi city security administration system i.e. capital ankara debuted kgys- consists registration plate number recognition system main arteries city exits system used two cameras per lane one plate recognition one speed detection system widened network registration number cameras together enforcing average speed preset distances arteries limit photo evidence date-time details posted registration address speed violation detected 2012 fine exceeding speed limit 30 approximately us 175 project system integration « olli technology » ministry internal affairs ukraine department state traffic inspection sti experiments introduction modern technical complex capable locate stolen cars drivers deprived driving licenses problem cars real time ukrainian complex video control working principle video fixing car recognition license plates check data base home office states purpose automatic number-plate recognition united kingdom help detect deter disrupt criminality including tackling organised crime groups terrorists vehicle movements recorded network nearly 8000 cameras capturing 25 30 million anpr ‘ read ’ records daily records stored two years national anpr data center accessed analysed used evidence part investigations uk law enforcement agencies 2012 uk parliament enacted protection freedoms act includes several provisions related controlling restricting collection storage retention use information individuals act home office published code practice 2013 use surveillance cameras including anpr government law enforcement agencies aim code help ensure use characterised surveillance consent consent part community must informed consent assumed system operator surveillance consent regarded analogous policing consent addition set standards introduced 2014 data infrastructure data access management united states anpr systems commonly referred alpr automatic license plate reader/recognition technology due differences language i.e. number plates referred license plates american english mobile anpr use widespread among us law enforcement agencies city county state federal level according 2012 report police executive research forum approximately 71 us police departments use form anpr mobile anpr becoming significant component municipal predictive policing strategies intelligence gathering well recovery stolen vehicles identification wanted felons revenue collection individuals delinquent city state taxes fines monitoring amber alerts widespread implementation technology many u.s. states issue misdemeanor citations 500 license plate identified expired incorrect vehicle successfully recognized plates may matched databases including wanted person protection order missing person gang member known suspected terrorist supervised release immigration violator national sex offender lists addition real-time processing license plate numbers anpr systems us collect indefinitely store data license plate capture images dates times gps coordinates stockpiled help place suspect scene aid witness identification pattern recognition tracking individuals department homeland security proposed federal database combine monitoring systems cancelled privacy complaints 1998 washington d.c. police lieutenant pleaded guilty extortion blackmailing owners vehicles parked near gay bar 2015 los angeles police department proposed sending letters home addresses vehicles enter areas high prostitution early private sector mobile anpr applications vehicle repossession recovery although application anpr private companies collect information privately owned vehicles collected private property example driveways become issue sensitivity public debate anpr uses include parking enforcement revenue collection individuals delinquent city state taxes fines technology often featured reality tv show parking wars featured e network show tow truck drivers booting teams use anpr find delinquent vehicles high amounts unpaid parking fines laws vary among states regarding collection retention license plate information 14 states limits long data may retained lowest new hampshire 3 minutes colorado 3 years supreme court virginia ruled 2018 data collected alprs constitute personal information anpr used speed limit enforcement australia austria belgium dubai uae france italy netherlands spain south africa uk kuwait works tracking vehicles travel time two fixed points calculating average speed cameras claimed advantage traditional speed cameras maintaining steady legal speeds extended distances rather encouraging heavy braking approach specific camera locations subsequent acceleration back illegal speeds developed monitoring system named covering 2500 km 2012 tutor system also able intercept cars changing lanes average speed cameras trajectcontrole place netherlands since 2002 july 2009 12 cameras operational mostly west country along a12 divided several “ sections ” allow cars leaving entering motorway first experimental system tested short stretch a2 1997 deemed big success police reducing overspeeding 0.66 compared 5 6 regular speed cameras used location first permanent average speed cameras installed a13 2002 shortly speed limit reduced 80 km/h limit noise air pollution area 2007 average speed cameras resulted 1.7 million fines overspeeding total 9.7 millions according dutch attorney general average number violation speed limits motorway sections equipped average speed cameras 1 2 compared 10 15 elsewhere one notable stretches average speed cameras uk found a77 road scotland monitored kilmarnock girvan 2006 confirmed speeding tickets could potentially avoided 'specs cameras changing lanes rac foundation feared people may play russian roulette changing one lane another lessen odds caught however 2007 system upgraded multi-lane use 2008 manufacturer described myth “ categorically untrue ” exists evidence implementation systems specs considerable effect volume drivers travelling excessive speeds stretch road mentioned a77 glasgow ayr noted huge drop speeding violations since introduction specs system recent innovations contributed adoption anpr perimeter security access control applications government facilities within us homeland security efforts protect alleged acts terrorism resulted adoption anpr sensitive facilities embassies schools airports maritime ports military federal buildings law enforcement government facilities transportation centers anpr marketed able implemented networks ip based surveillance cameras perform double duty alongside facial recognition object tracking recording systems purpose monitoring suspicious anomalous behavior improving access control matching watch lists anpr systems commonly installed points significant sensitivity ingress egress major us agencies department homeland security department justice department transportation department defense purchased anpr perimeter security applications large networks anpr systems installed cities boston london new york city provide citywide protection acts terrorism provide support public gatherings public spaces center evidence-based crime policy george mason university identifies following randomized controlled trials automatic number-plate recognition technology rigorous addition government facilities many private sector industries facility security concerns beginning implement anpr solutions examples include casinos hospitals museums parking facilities resorts us private facilities typically access government police watch lists may develop match databases customers vips critical personnel banned person lists addition providing perimeter security private anpr service applications valet recognized customer vip recognition logistics key personnel tracking sales advertising parking management logistics vendor support vehicle tracking many cities districts developed traffic control systems help monitor movement flow vehicles around road network typically involved looking historical data estimates observations statistics cctv cameras used help traffic control centres giving live data allowing traffic management decisions made real-time using anpr footage possible monitor travel individual vehicles automatically providing information speed flow various routes details highlight problem areas occur help centre make informed incident management decisions counties united kingdom worked siemens traffic develop traffic monitoring systems control centres public projects hampshire county council romanse provide interactive real-time website showing details traffic city site shows information car parks ongoing road works special events footage taken cctv cameras anpr systems used provide average point-to-point journey times along particular routes displayed variable-message sign vms giving drivers ability plan route romanse also allows travellers see current situation using mobile device internet connection wap gprs 3g allowing view mobile device cctv images within hampshire road network uk company trafficmaster used anpr since 1998 estimate average traffic speeds non-motorway roads without results skewed local fluctuations caused traffic lights similar company operates network 4000 anpr cameras claims four central digits identified numberplate data retained ieee intelligent transportation systems society published papers plate number recognition technologies applications ontario 407 etr highway uses combination anpr radio transponders toll vehicles entering exiting road radio antennas located junction detect transponders logging unique identity vehicle much way anpr system without anpr second system would possible monitor traffic drivers opt rent transponder c 2.55 per month charged video toll charge c 3.60 using road heavy vehicles gross weight 5,000 kg required use one using either system users highway notified usage charges post numerous electronic toll collection networks use combination radio frequency identification anpr include portuguese roads old highways toll stations drivers pay cards also lanes electronic collection systems however new highways option electronic toll collection system electronic toll collection system comprises three different structures smart tag installed vehicle car quickly identified owner bank account automatically deducted process realized speed 250 km per hour car smart tag driver required go pay station pay tolls 3rd 5th day surplus charge fails owner sent letter home heavy fine paid increases five-fold car inserted police database vehicle impounding system also used limited access areas main cities allow entry pre-registered residents planned implemented roads city entrance toll collection/access restriction efficacy system considered high almost impossible driver complain london congestion charge example system charges motorists entering payment area transport london tfl uses anpr systems charges motorists daily fee £11.50 enter leave move around within congestion charge zone 7 a.m. 6:00 p.m. monday friday reduced fee £10.50 paid vehicle owners sign automatic deduction scheme fines traveling within zone without paying charge £65 per infraction paid deadline doubling £130 per infraction thereafter currently 1,500 cameras use automatic number plate recognition anpr technology also number mobile camera units may deployed anywhere zone estimated around 98 vehicles moving within zone caught camera video streams transmitted data centre located central london anpr software deduces registration plate vehicle second data centre provides backup location image data front back number plates captured vehicles going – gives four chances capture number plates vehicle entering exiting zone list compared list cars whose owners/operators paid enter zone – paid fined registered owner vehicle looked database provided dvla johannesburg south africa anpr used etoll fee collection owners cars driving inner city must pay charge.the number tolls passed depends distance travelled particular freeway freeways anpr n12 n3 n1 etc stockholm sweden anpr used stockholm congestion tax owners cars driving inner city must pay charge depending time day 2013 also gothenburg congestion tax also includes vehicles passing city main highways several uk companies agencies use anpr systems include vehicle operator services agency vosa driver vehicle licensing agency dvla transport london anpr systems may also used for/by vehicle owners used variety techniques attempt evade anpr systems road-rule enforcement cameras general one method increases reflective properties lettering makes likely system unable locate plate produce high enough level contrast able read typically done using plate cover spray though claims regarding effectiveness latter disputed jurisdictions covers illegal covered existing laws countries law disallow use sprays users attempted smear license plate dirt utilize covers mask plate novelty frames around texas license plates made illegal texas 1 september 2003 texas senate bill 439 caused problems anpr devices law made class c misdemeanor punishable fine us 200 class b punishable fine us 2,000 180 days jail proven owner deliberately obscure plates law later clarified 2007 allow novelty frames anpr system read plate flag image attention human operators looking see able identify alphanumerics order avoid surveillance penalty charges upsurge car cloning usually achieved copying registration plates another car similar model age difficult detect especially cloners may change registration plates travel behavior hinder investigations 2013 researchers sunflex zone ltd created privacy license plate frame uses near infrared light make license plate unreadable license plate recognition systems introduction anpr systems led fears misidentification furthering 1984 -style surveillance united states gregg easterbrook oppose call machines issue speeding tickets red-light tickets beginning slippery slope towards automated justice system similar criticisms raised countries easterbrook also argues technology employed maximize revenue state rather promote safety electronic surveillance system produces tickets us often excess 100 virtually impossible citizen contest court without help attorney revenues generated machines shared generously private corporation builds operates creating strong incentive tweak system generate many tickets possible older systems notably unreliable uk known lead charges made incorrectly vehicle owner pay £10 order issued proof offense improvements technology drastically decreased error rates false accusations still frequent enough problem perhaps best known incident involving abuse anpr database north america case edmonton sun reporter kerry diotte 2004 diotte wrote article critical edmonton police use traffic cameras revenue enhancement retaliation added anpr database high-risk drivers attempt monitor habits create opportunity arrest police chief several officers fired result office privacy commissioner canada expressed public concern growing police use technology spy motorists concerns include storage information could used identify people store details driving habits daily life contravening data protection act along similar legislation see personally identifiable information laws uk strict system uses cctv footage identify individuals also concern safety data mined following discovery police surveillance records lost gutter also case uk saying use anpr cameras unlawful regulation investigatory powers act 2000 breach exists say fact anpr used monitor activities law-abiding citizens treats everyone like suspected criminals intended surveyed act police known refer system anpr 24/7 traffic movement database diversion intended purpose identifying vehicles involved criminal activities opposing viewpoint plates cloned 'read innocent motorist vehicle allow elimination vehicle investigation visual examination images stored likewise stolen vehicles read anpr systems time theft report police assisting investigation associated press reported august 2011 new york police department cars license plate tracking equipment purchased federal hidta high intensity drug trafficking area funds used spy muslims mosques track license plate numbers worshipers police unmarked cars outfitted electronic license plate readers would drive street automatically catalog plates everyone parked near mosque amassing covert database would distributed among officers used profile muslims public 2013 american civil liberties union aclu released 26,000 pages data anpr systems obtained local state federal agencies freedom information laws documents paint startling picture technology deployed rules becoming tool mass routine location tracking surveillance wrote aclu aclu reported many locations devices used store location information vehicles suspected particular offense private companies also using license plate readers sharing information collect police little oversight privacy protections lack regulation means policies governing long location data kept vary widely aclu said 2012 aclu filed suit department homeland security funds many local state anpr programs grants agency failed provide access records aclu requested freedom information act programs mid-august 2015 boston discovered license plate records million people online unprotected many anpr systems claim accuracy trained match plates single jurisdiction region fail trying recognize plates jurisdictions due variations format font color layout plate features jurisdictions offer vanity affinity plates particularly us create many variations within single jurisdiction time time us states make significant changes license plate protocol affect ocr accuracy may add character add new license plate design alpr systems must adapt changes quickly order effective another challenge alpr systems states license plate protocol example one state uses standard three letters followed four numbers time alpr systems alarms user ’ responsibility make sure plate caused alarm matches state associated license plate listed in-car computer maximum effectiveness anpr system able recognize plates jurisdiction jurisdiction associated many variables make tasks difficult currently least one us anpr provider platesmart claims system independently reviewed able accurately recognize us state jurisdiction license plates one european anpr provider claims system differentiate eu plate jurisdictions anpr software vendors publish accuracy results based image benchmarks results may vary depending images vendor chosen include test 2017 sighthound reported 93.6 accuracy private image benchmark 2017 openalpr reported accuracy rates commercial software range 95-98 public image benchmark april 2018 research brazil ’ federal university paraná federal university minas gerais compared systems reported median recognition rate 93.53 stated significant improvement 81.8 rate obtained previous works | [
5857,
5133,
1169,
5331,
5875,
2901
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.