node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
6,886
9
Font_Bomb:font bomb font bomb javascript bookmarklet blow web pages script loaded clicking web page starts countdown countdown reaches zero uses cascading style sheets scatter nearby text across page script wraps affected letters tag moved individually
[ 8923, 5622, 3462, 119 ]
Test
6,887
2
Android_Tactical_Assault_Kit:android tactical assault kit android tactical assault kit atak android smartphone geospatial infrastructure military situational awareness app built using nasa worldwind initially created 2010 air force research laboratory based nasa worldwind mobile codebase development deployment grew slowly rapidly since 2016 2013 officials draper laboratory said system would compatible android mobile operating systems could used navigation spatial awareness controlling drones atak plugin architecture allows developers add functionality atak polaris integrated ground guidance software atak plugin allow off-road routing mounted dismounted soldiers accounting terrain weather enemy activity equipment load connections programs atak began august 2010 originally based nasa worldwind mobile goal demonstrate robust information sharing mobile format oct 14 2014 u.s. army geospatial center recommended afrl android tactical assault kit atak world-leader esri commercial joint mapping tool kit cjmtk nasa world wind army globe engine age map engine driving nett warrior end user device atak selected due similar capabilities cjmtk similar risk less one-third total cost read full public released report nett warrior map engine trade study september 2015 darpa reported atak used successful demonstration persistent close air support program use thousands users according january 2016 article national defense magazine atak already fielded afsoc units atak excellent suitability coordinating people geography atak made available federal government users contractors need coordination atak also made available government researchers wish experiment geospatial collaboration without building systems versions addition android version also windows version wintak iphone version development itak wintak application developed microsoft windows operating system uses maps allow precise targeting intelligence surrounding land formations navigation generalized situational awareness developed conjunction atak provide similar functionality windows platform commercial licensing january 2015 afrl began licensing atak techlink u. s. companies commercial use support state/local government uses well civilian uses november 2015 twenty-five companies licensed atak commercial uses techlink licensing site
[ 2259, 6887 ]
Validation
6,888
2
BSD_Authentication:bsd authentication bsd authentication otherwise known bsd auth authentication framework software api employed openbsd accompanying software openssh originated bsd/os although specification implementation donated freebsd project bsdi openbsd chose adopt framework release 2.9 pluggable authentication modules pam serves similar purpose operating systems linux freebsd netbsd bsd auth performs authentication executing scripts programs separate processes one requiring authentication prevents child authentication process interfering parent except narrowly defined inter-process communication api technique inspired principle least privilege known privilege separation behaviour significant security benefits notably improved fail-safeness software robustness malicious accidental software bugs pam uses alternative system modules providing authentication dynamically linked requesting process method considered flexible bsd auth provide privilege separation without additional configuration
[ 5506, 7, 10631, 4242, 3477, 8344, 2080, 2083, 9635, 2087, 4663, 823, 5433, 5568, 4423, 10058, 6098, 10835, 6750, 2143, 8670, 2274, 4071, 11246, 1012, 2804, 5492, 1785 ]
None
6,889
3
Intel_8255:intel 8255 intel 8255 i8255 programmable peripheral interface ppi chip developed manufactured intel first half 1970s intel 8080 microprocessor 8255 provides 24 parallel input/output lines variety programmable operating modes 8255 member mcs-85 family chips designed intel use 8085 8086 microprocessors descendants first available 40-pin dip later 44-pin plcc packages found wide applicability digital processing systems later cloned manufacturers 82c55 cmos version higher speed lower current consumption functionality 8255 mostly embedded larger vlsi processing chips sub-function cmos version 8255 still made renesas mostly used expand i/o microcontrollers 8255 similar function mos technology 6522 versatile interface adapter 6526 mos technology cia complex interface adapter developed 6502 family chips originally available 40-pin dil package 8255 provides 24 usable i/o pins whereas mos chips provide 16 i/o pins plus 4 control pins however mos chips contain functions two programmable reload timers simple i/o shift register function furthermore mos devices allow direction input output i/o pins individually programmed 8255 i/o pins four programmable direction bits one port 7:0 one port b 7:0 one port c 3:0 one port c 7:4 comparable microprocessor i/o chips 2655 programmable peripheral interface signetics 2650 family motorola 6820 pia peripheral interface adapter motorola 6800 family western design center wdc 65c21 8255 widely used many microcomputer/microcontroller systems home computers sv-328 msx models 8255 used original ibm-pc pc/xt pc/jr clones along numerous homebuilt computers n8vem 8255 gives cpu digital system access programmable parallel i/o 8255 24 input/output pins divided three 8-bit ports b c port port b used 8-bit input/output ports port c used 8-bit input/output port two 4-bit input/output ports produce handshake signals ports b three ports grouped follows eight data lines d0–d7 available 8-bit data buffer read/write data ports control register status formula_1rd pin 5 formula_1wr pin 36 active-low signals read write operations respectively address lines allow access data register port control register listed control signal chip select formula_1cs pin 6 used enable 8255 chip active-low signal i.e. formula_1cs 0 8255 enabled reset input pin 35 connected reset line system like 8085 8086 etc. system reset ports initialized input lines done prevent 8255 and/or peripheral connected destroyed due mismatch ports example consider input device connected 8255 port previous operation port initialized output port 8255 reset using current configuration possibility damage either input device connected 8255 since 8255 device connected sending data control register control logic command word register 8-bit register used select modes operation input/output designation ports two basic operational modes 8255 two modes selected basis value present bit control word register 1 8255 operates i/o mode 0 operates bsr mode bit set/reset bsr mode available port c line port c pc pc set reset writing suitable value control word register bsr mode i/o mode independent selection bsr mode affect operation ports i/o mode selection port c pin determined follows example needed pc set control word thus per values 0b hex loaded control word register cwr mode selected bit control word register 1 three i/o modes example port b upper port c initialized input ports lower port c port output ports mode 0 hence desired operation control word register loaded 10001010 8a hex mode ports used simple i/o operations without handshaking signals port port b provide simple i/o operation two halves port c either used together additional 8-bit port used individual 4-bit ports since two halves port c independent may used one-half initialized input port half initialized output port input/output features mode 0 follows 'latched means bits put storage register array flip-flops holds output constant even inputs change latched 8255 outputs latched hold last data written required data stays bus one cycle without latching outputs would become invalid soon write cycle finishes inputs latched cpu read current values store data cpu register memory needs referenced later time input changes port read result may indeterminate wish use port port b handshake strobed input output operation initialise port mode 1 port port b initilalised operate different modes i.e. e.g. port operate mode 0 port b mode 1 pins port c function handshake lines port b mode irrespective whether acting input port output port pc0 pc1 pc2 pins function handshake lines port initialised mode 1 input port pc3 pc4 pc5 function handshake signals pins pc6 pc7 available use input/output lines mode 1 supports handshaking following features input handshaking signals output handshaking signals port initialized mode port used bidirectional handshake data transfer means data input output eight lines pa0 pa7 pins pc3 pc7 used handshake lines port remaining pins port c pc0 pc2 used input/output lines group b initialized mode 0 handshaking port b group b initialized mode 1 mode 8255 may used extend system bus slave microprocessor transfer data bytes floppy disk controller acknowledgement handshaking signals provided maintain proper data flow synchronisation data transmitter receiver
[ 548, 5128, 9006, 6129, 7281, 2874, 9947 ]
None
6,890
2
LXLE_Linux:lxle linux lxle linux distribution based upon recent ubuntu/lubuntu lts release using lxde desktop environment lxle lightweight distro focus visual aesthetics works well old new hardware january 2014 review full circle magazine gabriele tettamanzi noted lxle minor localization issues otherwise described nice light fast desktop rich software stable jesse smith reviewed lxle 12.04.3 distrowatch weekly jesse smith also reviewed lxde 14.04
[ 4611, 3079, 3089, 4113, 8209, 8727, 543, 11297, 546, 7204, 9253, 11305, 56, 3129, 4153, 59, 8248, 9276, 4673, 3654, 5190, 3147, 1101, 2125, 1107, 1110, 89, 5721, 4192, 10851, 3685, 9320, 10860, 5742, 2671, 11388, 2692, 8837, 9353, 9873, ...
Test
6,891
7
Clio_(software_company):clio software company clio legal technology company headquartered burnaby british columbia clio offers law firms cloud-based software handles various law practice management tasks including client intake contact management calendaring document management timekeeping billing trust accounting clio established 2007 jack newton rian gauvreau felt software commonly use law firms time expensive difficult use company launched software 2008 first cloud-based practice management software developed law firms 2012 clio series b raised 6 million time investment second-largest ever made british columbia-based internet company company also made first version application programming interface available 2012 september 2013 clio released mobile application provides access company software ios devices release occurred company first annual cloud conference event gained prominence legal technology industry 2014 clio received 20 million series c funding also announced android version mobile application major product update october 2016 clio published first legal trends report annual publication references aggregated metrics company user base analyze trends benchmarks law firm operations october 5 2018 clio announced acquired client intake software provider lexicata lexicata product would converted new product called clio grow time clio also supported 120 integrations legal software applications
[ 4194 ]
Validation
6,892
1
GuideStar:guidestar guidestar usa inc. information service specializing reporting u.s. nonprofit companies 2016 database provided information 2.5 million organizations guidestar one first central sources information u.s. nonprofits world largest source information nonprofit organizations guidestar founded williamsburg virginia september 1994 received tax-exempt status 1996 year company began posting nonprofit organizations financial reports world wide web guidestar also serves verify recipient organization established donated funds go donor intended individuals looking give wake disasters 2013 guidestar announced major changes guidestar exchange program allows nonprofits supplement public information available irs guidestar nonprofit profiles implemented three seals based information nonprofit provides profile bronze silver gold 2016 new seal allowed nonprofits share progress results mission guidestar platinum introduced 2019 guidestar merged foundation center form new organization candid charity watch investigator compared charity navigator charity watch better business bureau combined federal campaign great nonprofits investigator praised guidestar offering information rather making judgments guidestar placed notice pages charities listed southern poverty law center splc hate list one groups sued guidestar defamation charities echoed criticism guidestar use splc list
[]
Test
6,893
3
LOADHIGH:loadhigh computing abbreviated internal dos command command.com used load program upper memory area uma instead conventional memory command introduced ms-dos 5.0 pc dos 5.0 1991 copying built-in command earlier introduced dr dos 5.0 1990 dr dos 6.0 added support naming variant well 1991 due design ibm pc dos suffered known 640 kib barrier size memory area known conventional memory fixed independent amount system memory actually installed various schemes developed support extra memory see also ems xms dos extenders conventional memory still issue due compatibility issues scarce resource many applications demanded large part basic memory fragment runtime therefore often necessary move high tsr programs like mouse driver disk caching driver like smartdrv prior running memory-hungry application achieved using called program name parameter load tsrs high within config.sys installhigh directive must used instead command equivalent device drivers devicehigh usable within config.sys also supported since dr dos 6.0 dr dos 5.0 higher also support hiinstall hidevice respectively modern operating systems run protected mode support unsegmented flat memory model 640 kb constraint methods freeing conventional memory largely become obsolete
[ 6148, 7847, 6797, 7983, 178, 1237, 9525, 3323, 1247 ]
Test
6,894
5
Internet_Cache_Protocol:internet cache protocol internet cache protocol icp udp-based protocol used coordinating web caches purpose find appropriate location retrieve requested object situation multiple caches use single site icp use caches efficiently possible minimize number remote requests originating server hierarchically queried cache either parent sibling parents usually sit closer internet connection child child cache find object query usually sent parent cache fetch cache pass request siblings caches equal hierarchical status whose purpose distribute load amongst siblings request comes one cache cluster siblings icp used query siblings object requested sibling object usually transferred instead queried original server often called near miss — object found cache “ miss ” loaded nearby cache instead remote server icp protocol designed lightweight order minimize round-trip time caches intended unreliable quick connections approach reduce numbers server retrievals also prevent storage multiple copies instance data leads potential drawback increased intercache communication slow system icp protocol described rfc 2186 application hierarchical web caching rfc 2187 web proxies support icp include htcp designed successor icp attempts handle various problems found icp deployments icp message consists two sections header header length fixed 20 octets five 32-bit words data data variable length limited maximum icp message size including header 16,384 octets icp header consists 8 fields 2 optional fields fifth sixth field optional pink background table appropriately named “ options ” “ option data ”
[ 3520, 8648, 6569, 7567, 9616, 11413, 6140 ]
Validation
6,895
3
MacCharlie:maccharlie maccharlie hardware add-on apple macintosh made dayna communications name refers ibm pc advertising campaign time featuring charlie chaplin little tramp character allowed users run dos software ibm pc clipping unit onto chassis 128k macintosh well keyboard extender provide function keys numeric keypad absent apple original keyboard clip-on unit sat side mac like contemporary amiga sidecar contained essentially complete ibm pc compatible 8088 processor 256k ram expandable 640k single 5.25 floppy drive stored 360k second floppy drive could added running dos software users could still access macintosh menu bar desk accessories maccharlie used mac terminal performing dos processing sending video data relatively slow serial link mac display slowness coupled declining prices real ibm pc compatibles contributed short market life maccharlie
[ 6129, 3323, 8540 ]
Test
6,896
3
Outbound_laptop:outbound laptop outbound laptop apple macintosh-compatible laptop computer powered 15-mhz motorola 68000 processor later versions increased clock speed 20 mhz outbound systems inc. located boulder colorado due kangaroo logo many believed australian company outbound laptop introduced 1989 significantly lighter 4 kg easier carry apple macintosh portable released around time due apple refusal license macintosh toolbox read-only memory rom outbound users install mac rom make computer work rom typically removed older mac process would render donor mac unusable even additional cost typical price us 4,000 compared favorably mac portable outbound featured built-in pointing device located keyboard named trackbar earlier models referring trademark isopoint cylinder scrolled slid left right ran standard camcorder batteries rather expensive custom batteries commonly found portable computers around time outbound laptop succeeded outbound notebook 1991 notebook ran style lead-acid camcorder batteries earlier laptop 9.7 passive-matrix monochrome lcd display used 2.5 ide hard drive unusual time apple n't start using ide drives powerbooks powerbook 150 1994 notebook internal microphone speaker headphone jack two serial ports adb port scsi port notebook scsi port unique supported outbound outrigger full-page external monochrome monitor attached via scsi port notebook cpu ram mac rom optional 68882 fpu mounted removable daughtercard permitted easy ram installation optional upgrades daughtercard could simply swapped another one faster cpu fpu inserted available socket daughtercard four 30-pin simm sockets due notebook design 4mb ram could addressed mac system software even system 7 additional ram would appear silicon disk outbound specific ram disk apple introduction powerbook 1991 led demise mac-compatible laptop aftermarket probably significant increased competition fact outbound using roms licensing agreement apple apple refused license use subsequent proprietary roms outbound company ability manufacture laptops ended 68000 processors required roms access became difficult obtain short time outbound went business small group former employees set company perfit handle service warranty issues perfit ceased operations 1994
[ 1776, 11649, 7269, 6183 ]
Validation
6,897
7
Axway_Software:axway software axway software publicly held information technology company provides software tools enterprise software enterprise application integration business activity monitoring business analytics mobile application development web api management listed compartment b companies market capitalizations €150 million €1 billion paris euronext since june 2011 axway software incorporated 28 december 2000 software infrastructure division french services company sopra spun-out subsidiary sopra subsequently merged another french services company steria form sopra steria 2014 sopra used axway vehicle expansion enterprise application integration market subsequently number acquisitions made axway swedish company viewlocity acquired early 2002 christophe fabre became ceo axway 2005 remained position 2015 axway acquired us company cyclone commerce january 2006 much executive management axway relocated phoenix arizona february 2007 axway acquired atos b2b software business germany us company tumbleweed communications acquired june 2008 june 2011 axway spun sopra group listed paris euronext november 2012 irish company vordel api management vendor acquired brazilian company sci soluções acquired september 2013 january 2014 axway acquired assets information gateway australia axway acquired french company systar developer business activity monitoring software june 2014 january 2016 axway acquired us company appcelerator creator appcelerator titanium open-source framework multiplatform native mobile app development axway acquired us company syncplicity developer file share synchronization service february 2017 2017 sopra steria holds 33.52 axway sopra gmt holding company sopra steria axway holds 21.65 may 2016 sopra steria acquired 8.62 stake axway formerly held société générale axway component cac small 2016 axway 11,000 customers 100 countries since going public 2011 annual revenues grown €217.2 million 2011 €301.1 million 2016 profits grown €35.3 million 2011 €50.8 million 2016 axway headquartered phoenix arizona puteaux paris company development centers france annecy also site axway registered office lyon paris romania bucharest bulgaria sofia united states scottsdale arizona santa clara california also various support centers including one noida india acquisition sci 2013 lead establishment axway south america regional headquarters são paulo brazil 2017 axway main product amplify platform amplify acts data integration platform number formerly independent legacy products including appcelerator titanium provides uniform user interface various components amplify allows creation api-based services supports embedded real-time predictive analytics provides dashboards summarize data information provided different components sources axway also provides marketplace third party products services related apis titanium-built mobile apps
[ 7891, 8751 ]
Test
6,898
3
Ututo:ututo ututo linux distribution consisting entirely free software distribution named variety gecko found northern argentina ututo first fully free linux-based system recognized gnu project founder gnu project richard stallman formerly endorsed distribution nearly exclusively used personal computer switched gnewsense later trisquel ututo first released 2000 diego saravia national university salta argentina one first live cd distributions world first linux distribution argentina ututo carried simusol system simulate solar energy projects ututo simple install need configuration automatically detected hardware machine asked move mouse time distribution worked way 2002 ututo-r created offered possibility operating like software router version created marcos zapata used buenos aires public schools 2004 ututo-e project born swiftly becoming important derivative ututo project started daniel olivera 2006 ututo declared national interest argentine chamber deputies ututo xs current stable version ututo ututo xs compiled using gentoo linux ebuilds emerge software documentation spanish emergence xs series many new features added including faster system installer ututo used different hardware projects ifreetablet pablo manuel rizzo designed package management system ututo-get modelled debian apt however gentoo-based distros ututo compatible portage ututo different binaries optimized different intel amd processors releases since 2012 distribution considered dormant ututo ul ubuntu-libre current developed version ututo ututo ul utilize ubuntu distro base nonfree software removed usual ututo project linux-libre kernel 2017 original idea distributing simusol system simulate solar energy projects returned heart project tux machines reviewed utoto 2006
[ 5380, 8837, 7435, 4493, 10127, 2321, 10257, 5397, 4887, 10394, 10016, 673, 3618, 3745, 10530, 9253, 10149, 4775, 11305, 7854, 304, 2864, 2738, 4790, 823, 439, 56, 59, 7483, 3903, 4673, 2375, 4039, 5067, 8907, 1110, 9693, 2914, 6371, 485, ...
Test
6,899
4
Paedophile_Unit:paedophile unit paedophile unit branch metropolitan police service child abuse investigation command based scotland yard london england operates manufacture distribution child pornography online child grooming predatory paedophiles online organised crime associated unit subject series bbc television programmes concerning hunt britain paedophiles subject record 23,000 calls bbc audience line responsible final break-up advocacy group called paedophile information exchange paedophile unit works conjunction hi-tech crime unit examine computers used suspected offenders including computers used public areas via remote connections use technology identify arrest suspects referred proactive policing paedophile unit began life early 1960s obscene publications public morals branch although name shortened 1990 obscene publications branch opb common name however even among police hierarchy always obscene publications squad ops often colloquially known porn squad dirty squad set part clubs vice unit following passing obscene publications act 1959 originally operated pornography restrictions adult hardcore pornography began effectively rendered unenforceable advent internet unit restructured 1995 focus solely child sex offences renamed paedophile child pornography unit responsibility future investigation adult pornography transferred directly 1 area clubs vice unit charing cross police station originally part criminal investigation department transferred uniformed branch november 1972 revealed officers taking bribes pornography industry several later jailed corruption offences although staffed uniformed officers although continued usually operate plain clothes detectives initially continued part serious crime squad c1 department cid although 1990 part territorial operations to13 1993 returned cid control allowing officers use detective prefix front ranks became part so1 4 international organised crime branch specialist operations reorganisation 1995 became part organised crime group officer charge chief inspector 1972 superintendent thereafter assisted inspector number sergeants constables 1993 sixteen police officers ten civilian staff responsible administration storing evidence along officers viewing assessing material 1995 newsreader julia somerville partner arrested unit took nude pictures somerville daughter bath development boots later released without charge crime committed
[]
None
6,900
7
Nvidia_GameWorks:nvidia gameworks nvidia gameworks middleware software suite developed nvidia visual fx physx optix sdks provide wide range enhancements pre-optimised nvidia gpus gameworks distributed form compiled dlls rather traditional source code competing solution development amd gpuopen announced free open-source software mit license march 2016 nvidia made source code gameworks available github nvidia gameworks consists several main components addition suite contains sample code directx opengl developers well tools debugging profiling optimization android development gameworks criticized proprietary closed nature competing gpu manufacturers amd intel unable properly optimize nvidia libraries hardware due developers allowed see code necessary properly optimize products amd chief gaming scientist richard huddy claimed developers use gameworks contractually forbidden work amd also claims gameworks adds specific performance-crippling effects older nvidia cards unnecessary tessellation marginally affects recent cards 2014 amd considering making open source gameworks competitor released gpuopen december 2015
[ 3585, 3203, 8454, 2826, 3210, 9489, 5914, 11306, 7086, 7983, 9774, 8122, 8514, 7111, 2635, 11221, 4182, 5083, 2525, 8185, 2277, 8937, 11630, 1776, 2293, 2937, 1916, 2943 ]
Test
6,901
7
Software_Shelf_International:software shelf international software shelf international multinational corporation headquartered clearwater florida develops manufactures licenses supports range software programming services predominantly related business institutional printing print management data recovery software shelf established 1994 silicon valley redwood city california reseller distributor enterprise tools north american business markets company began develop line software programs utilities including print manager plus focused environmentally conscious sustainable business software solutions company developed first all-software solution reduce escalating ink paper hardware waste business academic institutional environment company currently maintains offices west sussex england menlo park california
[]
None
6,902
4
Need_to_know:need know term need know used government organizations particularly related military espionage describes restriction data considered sensitive need-to-know restrictions even one necessary official approvals security clearance access certain information one would given access information read clandestine operation unless one specific need know access information must necessary one conduct one official duties term also includes anyone people knowledge deemed necessary share security mechanisms aim make difficult unauthorized access occur without inconveniencing legitimate access need-to-know also aims discourage browsing sensitive material limiting access smallest possible number people battle normandy 1944 example need-to-know restriction though thousands military personnel involved planning invasion small number knew entire scope operation rest informed data needed complete small part plan true trinity project first test nuclear weapon 1945 like security measures need know misused persons wish refuse others access information hold attempt increase personal power prevent unwelcome review work prevent embarrassment resulting actions thoughts need know also invoked hide extra-legal activities may considered necessary use detrimental abuse policy considered different perspectives need know detrimental workers efficiency speed computations ibm mechanical calculators los alamos dramatically increased calculators operators told numbers meant discretionary access control mechanisms operating systems used enforce need know case owner file determines whether another person access need know often concurrently applied mandatory access control schemes lack official approval clearance may absolutely prohibit person accessing information need know subjective assessment mandatory access control schemes also audit accesses order determine need know violated term also used concept graphical user interface design computers controlling complex equipment airplanes usage many different pieces data dynamically competing finite user interface space safety-related messages given priority
[ 10442, 2190, 7983, 10835, 4404, 10580, 3480, 10170, 2779, 3516 ]
Test
6,903
4
Tactical_Network_Solutions:tactical network solutions tactical network solutions maryland-based information security company specializing 802.11 wi-fi protected setup wps wps exploitation tool released open source community vulnerability wps publicly disclosed stefan viehbock december 27 2011
[ 5373 ]
Train
6,904
4
IEEE_802.1X:ieee 802.1x ieee 802.1x ieee standard port-based network access control pnac part ieee 802.1 group networking protocols provides authentication mechanism devices wishing attach lan wlan ieee 802.1x defines encapsulation extensible authentication protocol eap ieee 802 known eap lan eapol eapol originally designed ieee 802.3 ethernet 802.1x-2001 clarified suit ieee 802 lan technologies ieee 802.11 wireless fiber distributed data interface iso 9314-2 802.1x-2004 eapol protocol also modified use ieee 802.1ae macsec ieee 802.1ar secure device identity devid 802.1x-2010 support service identification optional point point encryption local lan segment 802.1x authentication involves three parties supplicant authenticator authentication server supplicant client device laptop wishes attach lan/wlan term 'supplicant also used interchangeably refer software running client provides credentials authenticator authenticator network device provides data link client network allow block network traffic two ethernet switch wireless access point authentication server typically trusted server receive respond requests network access tell authenticator connection allowed various settings apply client connection setting authentication servers typically run software supporting radius eap protocols cases authentication server software may running authenticator hardware authenticator acts like security guard protected network supplicant i.e. client device allowed access authenticator protected side network supplicant identity validated authorized 802.1x port-based authentication supplicant must initially provide required credentials authenticator specified advance network administrator could include user name/password permitted digital certificate authenticator forwards credentials authentication server decide whether access granted authentication server determines credentials valid informs authenticator turn allows supplicant client device access resources located protected side network eapol operates data link layer ethernet ii framing protocol ethertype value 0x888e 802.1x-2001 defines two logical port entities authenticated port—the controlled port uncontrolled port controlled port manipulated 802.1x pae port access entity allow authorized state prevent unauthorized state network traffic ingress egress to/from controlled port uncontrolled port used 802.1x pae transmit receive eapol frames 802.1x-2004 defines equivalent port entities supplicant supplicant implementing 802.1x-2004 may prevent higher level protocols used content authentication successfully completed particularly useful eap method providing mutual authentication used supplicant prevent data leakage connected unauthorized network typical authentication procedure consists windows xp windows vista windows 7 support 802.1x network connections default windows 2000 support latest service pack sp4 wired connections windows mobile 2003 later operating systems also come native 802.1x client open source project known open1x produces client xsupplicant client currently available linux windows main drawbacks open1x client provide comprehensible extensive user documentation fact linux vendors provide package general wpa_supplicant used 802.11 wireless networks wired networks support wide range eap types iphone ipod touch support 802.1x release ios 2.0 android support 802.1x since release 1.6 donut chrome os supported 802.1x since mid-2011 mac os x offered native support since 10.3 avenda systems provides supplicant windows linux mac os x also plugin microsoft nap framework avenda also offers health checking agents windows defaults responding 802.1x authentication requests 20 minutes failed authentication cause significant disruption clients block period configured using hkey_local_machine\software\microsoft\dot3svc\blocktime dword value hkey_local_machine\software\microsoft\wlansvc\blocktime wireless networks registry entered minutes hotfix required windows xp sp3 windows vista sp2 make period configurable wildcard server certificates supported eaphost windows component provides eap support operating system implication using commercial certification authority individual certificates must purchased windows xp major issues handling ip address changes result user-based 802.1x authentication changes vlan thus subnet clients microsoft stated back port sso feature vista resolves issues users logging roaming profiles hotfix must downloaded installed authenticating via peap peap-mschapv2 windows vista based computers connected via ip phone may authenticate expected result client placed wrong vlan hotfix available correct windows 7 based computers connected via ip phone may authenticate expected result client placed wrong vlan hotfix available correct windows 7 respond 802.1x authentication requests initial 802.1x authentication fails cause significant disruption clients hotfix available correct enterprises deploying rolling operating systems remotely worth noting windows pe native support 802.1x however support added winpe 2.1 winpe 3.0 hotfixes available microsoft although full documentation yet available preliminary documentation use hotfixes available via microsoft blog linux distributions support 802.1x via wpa_supplicant desktop integration like networkmanager eduroam international roaming service mandates use 802.1x authentication providing network access guests visiting eduroam enabled institutions bt british telecom plc employs identity federation authentication services delivered wide variety industries governments devices support 802.1x authentication examples include network printers ethernet-based electronics like environmental sensors cameras wireless phones devices used protected network environment alternative mechanisms must provided authenticate one option would disable 802.1x port leaves port unprotected open abuse another slightly reliable option use mab option mab configured port port first try check connected device 802.1x compliant reaction received connected device try authenticate aaa server using connected device mac address username password network administrator must make provisions radius server authenticate mac-addresses either adding regular users implementing additional logic resolve network inventory database many managed ethernet switches offer options summer 2005 microsoft steve riley posted article detailing serious vulnerability 802.1x protocol involving man middle attack summary flaw stems fact 802.1x authenticates beginning connection authentication possible attacker use authenticated port ability physically insert perhaps using workgroup hub authenticated computer port riley suggests wired networks use ipsec combination ipsec 802.1x would secure eapol-logoff frames transmitted 802.1x supplicant sent clear contain data derived credential exchange initially authenticated client therefore trivially easy spoof shared media used part targeted dos wired wireless lans eapol-logoff attack malicious third party access medium authenticator attached repeatedly sends forged eapol-logoff frames target device mac address authenticator believing targeted device wishes end authentication session closes target authentication session blocking traffic ingressing target denying access network 802.1x-2010 specification began 802.1af addresses vulnerabilities previous 802.1x specifications using macsec ieee 802.1ae encrypt data logical ports running top physical port ieee 802.1ar secure device identity devid authenticated devices stopgap enhancements widely implemented vendors extended 802.1x-2001 802.1x-2004 protocol allowing multiple concurrent authentication sessions occur single port prevents traffic devices unauthenticated mac addresses ingressing 802.1x authenticated port stop malicious device snooping traffic authenticated device provides protection mac spoofing eapol-logoff attacks ietf-backed alternative protocol carrying authentication network access pana also carries eap although works layer 3 using udp thus tied 802 infrastructure
[ 5892, 7045, 8708, 9732, 7049, 4490, 8080, 9744, 11413, 5270, 10905, 3742, 5671, 9640, 6187, 172, 4396, 10924, 6064, 434, 3762, 2996, 823, 5433, 6586, 7865, 11321, 5439, 1346, 3780, 8391, 4552, 8266, 10058, 2904, 10332, 7901, 8670, 5472, 9...
Test
6,905
4
Preimage_attack:preimage attack cryptography preimage attack cryptographic hash functions tries find message specific hash value cryptographic hash function resist attacks preimage set possible inputs context attack two types preimage resistance compared collision resistance computationally infeasible find two distinct inputs x x ′ hash output i.e. collision resistance implies second-preimage resistance guarantee preimage resistance conversely second-preimage attack implies collision attack trivially since addition x ′ x already known right start definition ideal hash function fastest way compute first second preimage brute-force attack n -bit hash attack time complexity 2 considered high typical output size n 128 bits complexity best achieved adversary hash function considered preimage-resistant however general result quantum computers perform structured preimage attack 2 also implies second preimage thus collision attack faster preimage attacks found cryptanalysing certain hash functions specific function significant preimage attacks already discovered yet practical practical preimage attack discovered would drastically affect many internet protocols case practical means could executed attacker reasonable amount resources example preimaging attack costs trillions dollars takes decades preimage one desired hash value one message practical one costs thousand dollars takes weeks might practical currently known practical almost-practical attacks md5 sha-1 collision attacks general collision attack easier mount preimage attack restricted set value two values used collide time complexity collision attack contrast 2 improve resistance collision attacks double hashing good solution case someone discovers preimage attack first hash bitcoin system uses double hashed sha256 common way slow hashing searches 2000s
[ 8674, 7556, 4389, 11639, 6954, 3984, 9170, 2357, 1941, 3477, 1087 ]
None
6,906
9
Wally_Feurzeig:wally feurzeig wallace wally feurzeig june 10 1927 – january 4 2013 co-inventor seymour papert cynthia solomon programming language logo well-known researcher artificial intelligence ai wallace feurzeig born chicago parents mandel pauline feurzeig earned bachelor philosophy bachelor science degrees university chicago master science degree illinois institute technology worked argonne national laboratory university chicago joining bolt beranek newman bbn early 1960s bolt beranek newman become major center computer science research innovative applications 1962 wally feurzeig joined firm work newly available facilities artificial intelligence department one earliest ai organizations colleagues actively engaged pioneering ai work computer pattern recognition natural-language understanding automated theorem proving lisp language development robot problem solving much work done collaboration distinguished researchers massachusetts institute technology mit marvin minsky john mccarthy regular bbn consultants early 1960s groups bbn original work cognitive science instructional research man-computer communication first work knowledge representation reasoning semantic networks question answering interactive computer graphics computer-aided instruction cai actively underway j. c. r. licklider spiritual scientific leader much work championing cause on-line interaction era almost computing done via batch processing wally initial focus expanding intellectual abilities extant teaching systems led first intelligent cai system mentor employed production rules support problem-solving interactions medical diagnosis decision-making domains 1965 wally organized bbn educational technology department development computer methods improve learning teaching focus work shifted investigating programming languages educational environments shift partly due two recent technological advances invention computer time-sharing development first high-level conversational programming language idea sharing computer cycles among autonomous users working simultaneously stirred imagination cambridge 1963 1964 bbn mit teams raced first realize concept bbn winning days holding first successful demonstration computer time-sharing 1964 bbn initial system designed sheldon boilen supported five simultaneous users dec pdp-1 sharing one cathode-ray tube crt screen output seeing dynamic displays several distinct programs simultaneously asynchronously time tune breathtaking experience time sharing made feasible economic use remote distributed terminals opened possibilities interactive computer use schools bbn recently implemented telcomp one new breed high-level interactive programming languages telcomp dialect joss first conversational interpreted language developed 1962–63 cliff shaw rand corporation syntax similar language basic yet appeared like basic telcomp fortran-derived language originally designed numerical computational applications shortly telcomp created wally decided introduce children tool teach mathematics 1965–66 u.s. office education support explored use auxiliary resource eight elementary secondary schools served bbn time-sharing system students introduced telcomp worked standard arithmetic algebra trigonometry problems writing telcomp programs project strongly confirmed expectations use interactive computation high-level interpretive language would highly motivating students wally collaborators research daniel bobrow richard grant cynthia solomon bbn consultant seymour papert recently arrived mit jean piaget institute geneva idea programming language expressly designed children arose directly project group realized extant languages designed computation generally lacked facilities nonnumeric symbolic manipulation current languages inappropriate education respects also often employed extensive data type declarations got way students expressive impetus serious deficiencies control structures programs lacked procedural constructs facilities dynamic definition execution well-developed articulate debugging diagnostic editing facilities essential educational uses
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 2105, 3132, 6717, 8258, 8771, 8262, 75, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 2666, 5751, 7805, 1159, 9865, 9877, 10400, 5803, 2225, 7867, 4799, 7880, 89...
Test
6,907
4
Kenneth_P._Weiss:kenneth p. weiss kenneth p. weiss american entrepreneur human factors engineer inventor invented securid card trademark rsa security weiss holds bachelor degree university bridgeport continued graduate studies research university new hampshire temple university received doctorate neotarian fellowship founded security dynamics 1984 served ceo 1986 chairman board cto 1996 initiated purchase 1993 rsa security small encryption company working internet commerce 1994 security dynamics went public nasdaq stock exchange weiss company largest individual shareholder.. company developed sold securid card rsa encryption technologies computer security electronic commerce identity authentication resigned 1996 citing policy disagreements directors company operations policies company achieved market capitalization 4 billion 2006 company purchased emc corporation 1994 published article enumerating regarded seven significant flaws clipper chip initiative weiss ’ position article contributed abandonment multibillion-dollar u.s. government program weiss asserted would allowed electronic eavesdropping us citizen surveillance chip embedded private electronic communication equipment weiss taught penn state university bridgeport nasson college king college chairman psychology department seven years professor textbook author editorial board journal information systems security chairman identification authentication division american defense preparedness association committee computer security also member technology ethics committee information systems security association issa currently weiss founder ceo universal secure registry usr company based newton massachusetts develops technologies identification authentication mobile phone applications holds 22 u.s. patents well foreign patents weiss member american association advancement science honor societies sigma xi psi chi weiss also involved philanthropic work cape ann symphony rockport chamber music society gloucester stage co. gloucester schooner festival historical meeting house restoration cape ann historical association perfect storm foundation addison gilbert beverly hospitals lahey clinic political action groups
[ 5433, 2154, 2558, 11175 ]
Test
6,908
6
IArchiver:iarchiver iarchiver software utility handling file archives apple macintosh renamed rucksack iarchiver designed universal tool working archives used create extract convert large number common legacy archive formats drag-and-drop interface iarchiver developed currently maintained dare creative ltd software company based vienna austria
[ 2755, 965, 10470, 10857, 6797, 7983, 722, 950, 823, 10623 ]
None
6,909
3
PlayStation_3_cluster:playstation 3 cluster considerable computing capability playstation 3 cell microprocessors raised interest using multiple networked ps3s various tasks require affordable high-performance computing national center supercomputing applications already built cluster based playstation 2 terra soft solutions version yellow dog linux playstation 3 sells ps3s linux pre-installed single units 8 32 node clusters addition rapidmind pushing stream programming package ps3 january 3 2007 dr. frank mueller associate professor computer science north carolina state university clustered 8 ps3s mueller commented 256 mb system ram limitation particular application considering attempting retrofit ram software includes fedora core 5 linux ppc64 mpich2 openmp v2.5 gnu compiler collection cellsdk 1.1 summer 2007 gaurav khanna professor physics department university massachusetts dartmouth independently built message-passing based cluster using 8 ps3s running fedora linux cluster built support sony computer entertainment first cluster generated published scientific results dubbed ps3 gravity grid ps3 cluster performs astrophysical simulations large supermassive black holes capturing smaller compact objects khanna claims cluster performance exceeds 100+ intel xeon core based traditional linux cluster simulations ps3 gravity grid gathered significant media attention 2007 2008 2009 2010 khanna also created diy website build clusters accessible general public november 2010 air force research laboratory created powerful supercomputer nicknamed condor cluster connecting together 1,760 sony ps3s include 168 separate graphical processing units 84 coordinating servers parallel array capable performing 500 trillion floating-point operations per second 500 tflops built condor cluster 33rd largest supercomputer world would used analyse high definition satellite imagery even single ps3 used significantly accelerate computations marc stevens arjen k. lenstra benne de weger demonstrated using single ps3 perform md5 bruteforce hours say essentially single playstation 3 performs like cluster 30 pcs price one november 2007 march 22 2007 sce stanford university expanded folding home project ps3 along thousands pcs already joined internet ps3 owners able lend computing power game systems study improper protein folding associated diseases alzheimer parkinson huntington cystic fibrosis several forms cancer software included part 1.6 firmware update march 22 2007 set run manually automatically ps3 idle cross media bar processed information sent back project central servers internet processing power ps3 users greatly contributing folding home project ps3s third nvidia amd gpus terms teraflops contributed march 2011 million ps3 owners allowed folding home software run systems 27,000 currently active total 8.1 petaflops comparison world powerful supercomputer november 2010 tianhe-ia peak performance 2.56 petaflops 2,566 teraflops latest report stated folding home passed 5 native petaflop mark 767 teraflops supplied playstation 3 clients computational biochemistry biophysics lab barcelona launched distributed computing project called ps3grid project expected run sixteen times faster equivalent project standard pc like distributed computing projects designed run computer idle ehits lightning first virtual screening molecular docking software ps3 released simbiosys reported bio-it world july 2008 application runs 30x faster single ps3 regular single cpu pc also runs ps3 clusters achieving screening huge chemical compound libraries matter hours days rather weeks used standard expectation march 28 2010 sony announced would disabling ability run operating systems v3.21 update due security concerns otheros update would affect existing supercomputing clusters due fact connected psn would forced update however would make replacing individual consoles compose clusters difficult impossible since newer models v3.21 higher would support linux installation directly caused end ps3 common use clustered computing though projects like condor still created older ps3 units come online april 1 2010 update released possible workaround might replace damaged tsop older ie ps3 fat consoles non-fatal hardware failures defective shaders ylod combined x-ray bga rework affected memory chips would acceptable applications principle would custom hardware dmca classed reverse engineering additional modifications would include upgrading thermal profile ie larger fan/more voltage replacing tsop completely socket surplus 256mb xd card installed place hackers already done development purposes
[ 9472, 643, 7556, 785, 7699, 7963, 10780, 6815, 9508, 5798, 6311, 6184, 2345, 9126, 684, 4909, 6268, 306, 7218, 8501, 823, 6072, 8120, 10111, 5948, 4286, 1985, 2113, 8514, 5956, 6781, 4423, 1480, 1866, 8523, 3025, 6738, 4308, 342, 344, 2...
Test
6,910
9
Gambas:gambas gambas name object-oriented dialect basic programming language well integrated development environment accompanies designed run linux unix-like computer operating systems name recursive acronym gambas almost means basic gambas also word prawns spanish french portuguese languages project logos derived gambas developed french programmer benoît minisini first release coming 1999 benoît grown basic language decided make free software development environment could quickly easily make programs user interfaces gambas 1.x versions featured interface made several different separate windows forms ide dialogues similar fashion interface gimp could also develop applications using qt oriented towards development applications kde last release 1.x versions gambas 1.0.19 first 2.x versions released january 2 2008 three four years development featured major redesign interface forms functions embedded single window well changes gambas syntax although part code compatibility kept featured major updates existing gambas components well addition new ones new components could use gtk+ sdl drawing utilize opengl acceleration gambas 2.x versions load run gambas 1.x projects occasional incompatibilities next major iteration gambas 3.x versions released december 31 2011 2015 benchmark published gambas website showed gambas 3.8.90 scripting faster varying degrees perl 5.20.2 outdated 2.7.10 version python many tests gambas designed build graphical programs using qt currently qt 4.x 5.x gtk+ toolkit gtk 3.x also supported 3.6.0 gambas ide written gambas gambas includes gui designer aid creating user interfaces also make command line applications gambas runtime environment needed run executables functionality provided variety components selected provide additional features drawing provided either qt gtk+ toolkits additional component designed switch drawing also provided simple directmedia layer currently version 1.x 2.x support works also utilized audio playback separate sound component component openal specification also added gpu acceleration support available opengl component well hardware functionally provided various components also components handling specialized tasks gambas developers also use databases mysql postgresql build kde qt gnome gtk+ applications dcop translate visual basic programs gambas run linux build network solutions create cgi web applications ide also includes tool creation installation packages supporting gnu autotools slackpkg pacman rpm debs latter two tailored specific distributions fedora/rhel/centos mageia mandriva opensuse debian ubuntu/mint gambas since version 3.2 ide integrated profiler started use just-in-time compilation technology gambas intended provide similar experience developing microsoft visual basic free software clone popular proprietary program author gambas makes clear similarities visual basic syntax basic programs integrated development environment gambas written start development environment seeks improve formula object model class represented file archiver package program inspired java programming language gambas intended alternative former visual basic developers decided migrate linux also important distinctions gambas visual basic one notable example gambas array indexes always start 0 whereas visual basic indexes start 0 1 gambas also supports += -= shorthand found classic visual basic features visual basic .net however several programs many forms example code written using gambas freecode formerly freshmeat listed 23 applications developed using gambas gambas wiki listed 70 several specialized sites list gambas applications code even gambas written application named gambas3 showcase acts software center download install gambas 3 applications several community sites including community forums mailing lists also exist gambas gambas included repositories number linux distributions debian fedora mandriva linux ubuntu microsoft windows version gambas run cygwin environment although version significantly less tested linux counterparts command-line cooperative linux derivatives also used well specialized linux virtual machines independent contributor françois gallo also worked porting gambas 3.x mac os x freebsd based using local versions x11 system gambas version 3.2 run raspberry pi offers just-in-time compilation november 2013 future portability gambas discussed listing main concerns linux kernel features utilized interpreter components using linux specific software libraries primarily x11-tying qt gtk+ desktop integration components however partly due need upgrade newer toolkits gtk 3 added 3.6.0 qt 5 3.8.0 future versions would less x11 tied making projects like cygwin utterly native versions platforms possible benoît minisini stated intended encapsulate x11 specific code aid attempt replace x11 support desktop component moved component 3.6.0 october 27 2016 screenshot setup guide released main page running gambas fully cygwin including components graphical toolkits complete ide relevant patches mainlined version 3.9.2 replaces prior recommended method using freenx forwarding linux server hello world program graphical user interface public sub main end program computes 100-term polynomial 500000 times repeats ten times used benchmarking private sub test x float float end public sub main end
[ 6154, 7691, 22, 5663, 546, 4136, 5677, 11315, 1591, 4160, 4674, 4171, 1101, 92, 10851, 5733, 9320, 5747, 6778, 3718, 6797, 11412, 3736, 9881, 3233, 7343, 7355, 7870, 6338, 712, 5833, 8909, 219, 10971, 8429, 10478, 10480, 759, 1805, 9997, ...
None
6,911
2
Dynamic_video_memory_technology:dynamic video memory technology dynamic video memory technology dvmt allows dynamic allocation system memory use video memory ensure efficient use available resources maximum 2d/3d graphics performance amount video memory dependent upon amount pre-allocated memory set system plus something called dvmt dvmt name implies dynamically allocates system memory use video memory ensure efficient use available resources maximum 2d/3d graphics performance technology used intel fulfill needs graphically demanding games
[ 704, 9959, 5386, 6730, 7755, 4622, 499, 1972, 8795, 6971, 1085, 3294 ]
Test
6,912
9
Jeremy_Ashkenas:jeremy ashkenas jeremy ashkenas computer programmer known creation co-creation coffeescript livescript programming languages respectively backbone.js javascript framework underscore.js javascript library ashkenas speaker numerous conferences events worked graphics department new york times september 2015 returned september 2016 shared 2015 gerald loeb award images/graphics/interactives 2018 works observable company founded mike bostock aims create interactive notebooks
[ 2804, 3462 ]
None
6,913
7
Legacy-free_PC:legacy-free pc legacy-free pc type personal computer lacks floppy drive legacy ports industry standard architecture isa bus sometimes internal expansion bus according microsoft basic goal requirements operating system devices end users detect presence following isa slots devices legacy floppy disk controller fdc ps/2 serial parallel game ports legacy ports usually replaced universal serial bus usb ports usb adapter may used older device must connected pc lacking ports according 2001 edition microsoft pc system design guide legacy-free pc must able boot usb device away older usually bulky ports devices allows legacy-free pc much compact earlier systems many fall nettop one form factor netbooks ultrabooks could also considered portable form legacy-free pc legacy-free pcs difficult upgrade traditional beige box pc typically expected replaced completely become obsolete many legacy-free pcs include modern devices may used replace ones omitted memory card reader replacing floppy drive first decade 21st century progressed legacy-free pc went mainstream legacy ports removed commonly available computer systems form factors however ps/2 keyboard connector still retains use offer uses e.g implementation n-key rollover offered usb apple imac g3 first example legacy-free pc drawing much criticism lack legacy peripherals floppy drive apple desktop bus adb connector however success popularized usb november 1999 july 2000 dell webpc early less-successful wintel legacy-free pc legacy-free pcs introduced around 2000 prevalence usb broadband internet made many older ports devices obsolete largely took form low-end consumer systems motivation making computers less expensive easier use stable manageable dell studio hybrid asus eee box msi wind pc examples later more-successful intel-based legacy-free pcs apple introduced apple modem october 12 2005 removed internal 56k modem new computers macbook air introduced january 29 2008 also omits built-in superdrive wired ethernet connectivity available mac computers sold time superdrive would later removed macs end 2016 wired ethernet would later removed macbook models relaunched macbook 2015 dropped features magsafe charging port secure digital sd memory card reader kept two types ports 3.5mm audio jack usb 3.1 type-c port configuration later found way macbook pro 2016 difference two four usb ports included instead one addition macbook pro except entry-level model replaced function keys touch bar changes led criticism many users utilised features apple removed
[ 4228, 8044, 5681, 6129, 533, 5368 ]
None
6,914
3
X704:x704 x704 microprocessor implements 32-bit version powerpc instruction set architecture isa developed exponential technology microprocessor notable high clock frequency time circa 1997 range 400 533 mhz use bipolar transistors logic cmos circuits memory failure see use apple macintosh opposite industry observers microprocessor report expected exponential technology eventually failed result x704 lack success former employees founded intrinsity start-up developed high clock frequency mips implementation fastmath company left microprocessor business licenses fast14 dynamic logic third parties ati gpus x704 superscalar microprocessor issued three instructions per cycle arithmetic logic unit alu floating-point unit fpu branch unit realize short cycle times caches kept small limiting performance three levels cache first consisted separate 2 kb instruction data caches direct-mapped l2 cache on-die 32 kb large eight-way set set-associative l3 cache larger supporting capacities 512 kb 2 mb located externally x704 contained 2.7 million transistors 0.7 million bipolar transistors 2.0 million metal oxide semiconductor mos measured 15 mm 10 mm 150 mm fabricated 0.5 µm bicmos process six levels interconnect used 3.6 2.1 v power supplies dissipated less 85 w 533 mhz x704 packaged 356-ball ball grid array bga
[ 4868, 10501, 3846, 4743, 6663, 5642, 1548, 1933, 3472, 4881, 7065, 1563, 1309, 6815, 3493, 6949, 6311, 8102, 1321, 9391, 10543, 4017, 5297, 1461, 8120, 6715, 9020, 1725, 1983, 1985, 7234, 10180, 336, 8530, 3540, 342, 9302, 11613, 6878, 16...
None
6,915
9
WWF_(file_format):wwf file format wwf modification open standard pdf format document exchange endorsed world wide fund nature also abbreviated wwf germany wwf format promoted environmentally friendly comparable document exchange formats e.g pdf doc since documents format designed difficult print motivation behind use format prevent unnecessary printing documents website claims file format able read programs open ordinary pdf files present software creating wwf files available mac os x 10.4 windows xp later open source equivalent available linux windows xp later wwf files simply pdf files security settings printing set allowed file extension .wwf thus inability print files comes drm built adobe reader looks flag pdf see whether printing allowed pdf readers ghostscript may honour no-print flag rendering wwf files printable initiative criticised restricting users rights ineffective non-adobe readers ghostscript print documents format violating bsd license incompatible goals free open source software movement software contacting wwf without user consent criticised wwf international director corporate relations maria boulos misleading launched global product despite created wwf german division without consultation wwf international
[ 10352, 8627, 8797, 823 ]
None
6,916
4
Password_cracking:password cracking cryptanalysis computer security password cracking process recovering passwords data stored transmitted computer system common approach brute-force attack try guesses repeatedly password check available cryptographic hash password purpose password cracking might help user recover forgotten password installing entirely new password less security risk involves system administration privileges gain unauthorized access system preventive measure system administrators check easily crackable passwords file-by-file basis password cracking utilized gain access digital evidence judge allowed access particular file access restricted time crack password related bit strength see password strength measure password entropy details password stored methods password cracking require computer produce many candidate passwords checked one example brute-force cracking computer tries every possible key password succeeds common methods password cracking dictionary attacks pattern checking word list substitution etc attempt reduce number trials required usually attempted brute force higher password bit strength exponentially increases number candidate passwords must checked average recover password reduces likelihood password found cracking dictionary ability crack passwords using computer programs also function number possible passwords per second checked hash target password available attacker number billions trillions per second since offline attack possible rate depends whether authentication software limits often password tried either time delays captchas forced lockouts number failed attempts another situation quick guessing possible password used form cryptographic key cases attacker quickly check see guessed password successfully decodes encrypted data kinds password hash ordinary desktop computers test hundred million passwords per second using password cracking tools running general purpose cpu billions passwords per second using gpu-based password cracking tools see john ripper benchmarks rate password guessing depends heavily cryptographic function used system generate password hashes suitable password hashing function bcrypt many orders magnitude better naive function like simple md5 sha user-selected eight-character password numbers mixed case symbols commonly selected passwords dictionary matches filtered reaches estimated 30-bit strength according nist 2 one billion permutations would cracked seconds hashing function naive ordinary desktop computers combined cracking effort done botnets capabilities password cracking considerably extended 2002 distributed.net successfully found 64-bit rc5 key four years effort included 300,000 different computers various times generated average 12 billion keys per second graphics processors speed password cracking factor 50 100 general purpose computers 2011 available commercial products claim ability test 2,800,000,000 passwords second standard desktop computer using high-end graphics processor device crack 10 letter single-case password one day work distributed many computers additional speedup proportional number available computers comparable gpus emergence hardware acceleration past decade gpu resources used increase efficiency speed brute force attack 2012 stricture consulting group unveiled 25-gpu cluster achieved brute force attack speed 350 billion guesses per second allowing check formula_1password combinations 5.5 hours using ocl-hashcat plus virtual opencl cluster platform linux-based gpu cluster used crack 90 percent 6.5 million password hashes belonging users linkedin despite capabilities desktop cpus slower cracking passwords purpose-built password breaking machines 1998 electronic frontier foundation eff built dedicated password cracker using asics opposed general purpose cpus machine deep crack broke des 56-bit key 56 hours testing 90 billion keys per second 2010 georgia tech research institute developed method using gpgpu crack passwords coming minimum secure password length 12 characters passwords difficult remember reduce security system users might need write electronically store password using insecure method b users need frequent password resets c users likely re-use password similarly stringent requirements password strength e.g mix uppercase lowercase letters digits change monthly greater degree users subvert system memorability security passwords jeff yan et al examines effect advice given users good choice password found passwords based thinking phrase taking first letter word memorable naively selected passwords hard crack randomly generated passwords combining two unrelated words another good method personally designed algorithm generating obscure passwords another good method however asking users remember password consisting mix uppercase lowercase characters similar asking remember sequence bits hard remember little bit harder crack e.g 128 times harder crack 7-letter passwords less user simply capitalizes one letters asking users use letters digits often lead easy-to-guess substitutions e → 3 → 1 substitutions well known attackers similarly typing password one keyboard row higher common trick known attackers research detailed april 2015 paper several professors carnegie mellon university shows people choices password structure often follow several known patterns result passwords may much easily cracked mathematical probabilities would otherwise indicate passwords containing one digit example disproportionately include end password july 16 1998 cert reported incident attacker found 186,126 encrypted passwords time discovered already cracked 47,642 passwords december 2009 major password breach rockyou.com website occurred led release 32 million passwords attacker leaked full list 32 million passwords identifiable information internet passwords stored cleartext database extracted sql injection vulnerability imperva application defense center adc analysis strength passwords june 2011 nato north atlantic treaty organization experienced security breach led public release first last names usernames passwords 11,000 registered users e-bookshop data leaked part operation antisec movement includes anonymous lulzsec well hacking groups individuals july 11 2011 booz allen hamilton large american consulting firm substantial amount work pentagon servers hacked anonymous leaked day leak dubbed 'military meltdown monday includes 90,000 logins military personnel—including personnel uscentcom socom marine corps various air force facilities homeland security state department staff looks like private sector contractors leaked passwords wound hashed unsalted sha-1 later analyzed adc team imperva revealing even military personnel used passwords weak 1234 july 18 2011 microsoft hotmail banned password 123456 july 2015 group calling impact team stole user data ashley madison many passwords hashed using relatively strong bcrypt algorithm weaker md5 hash attacking latter algorithm allowed 11 million plaintext passwords recovered best method preventing password cracked ensure attackers get access even hashed password example unix operating system hashed passwords originally stored publicly accessible file /etc/passwd modern unix similar systems hand stored shadow password file /etc/shadow accessible programs running enhanced privileges i.e. system privileges makes harder malicious user obtain hashed passwords first instance however many collections password hashes stolen despite protection another strong approach combine site-specific secret key password hash prevents plaintext password recovery even hashed values purloined third approach use key derivation functions reduce rate passwords guessed unfortunately many common network protocols transmit passwords cleartext use weak challenge/response schemes modern unix systems replaced traditional des-based password hashing function crypt stronger methods bcrypt scrypt systems also begun adopt methods instance cisco ios originally used reversible vigenère cipher encrypt passwords uses md5-crypt 24-bit salt enable secret command used newer methods use large salt values prevent attackers efficiently mounting offline attacks multiple user accounts simultaneously algorithms also much slower execute drastically increases time required mount successful offline attack many hashes used storing passwords md5 sha family designed fast computation efficient implementation hardware result ineffective preventing password cracking especially methods like rainbow tables using key stretching algorithms pbkdf2 form password hashes significantly reduce rate passwords tested solutions like security token give formal proof answer constantly shifting password solutions abruptly reduce timeframe brute forcing attacker needs break use password within single shift reduce value stolen passwords short time validity 2013 long-term password hashing competition announced choose new standard algorithm password hashing many password cracking software tools popular aircrack cain abel john ripper hashcat hydra davegrohl elcomsoft many litigation support software packages also include password cracking functionality packages employ mixture cracking strategies algorithm brute force dictionary attacks proving productive increased availability computing power beginner friendly automated password cracking software number protection schemes allowed activity taken script kiddies
[ 7426, 7556, 7557, 519, 11144, 5003, 9356, 3984, 1683, 4500, 1941, 3477, 4883, 9214, 10135, 2716, 9762, 10107, 10658, 7337, 7465, 4140, 7983, 9855, 9393, 10110, 10801, 7994, 9791, 8513, 2430, 8514, 8135, 7624, 6345, 10959, 3282, 1491, 4435, ...
None
6,917
4
Browser_isolation:browser isolation browser isolation cybersecurity model aims physically isolate internet user browsing activity associated cyber risks away local networks infrastructure browser isolation technologies approach model different ways seek achieve goal effective isolation web browser user browsing activity method securing web browsers browser-based security exploits well web-borne threats ransomware malware browser isolation technology delivered customers cloud hosted service known remote browser isolation rbi model enables organizations deploy browser isolation solution users without managing associated server infrastructure also client side approaches browser isolation based client-side hypervisors depend servers order isolate users browsing activity associated risks instead activity virtually isolated local host machine client-side solutions break security physical isolation model allow avoid server overhead costs associated remote browser isolation solutions browser isolation white paper includes high level overview browser isolation cybersecurity concept explains differences client server side browser isolation models architectures browser isolation typically leverages virtualization containerization technology isolate users web browsing activity away endpoint device significantly reducing attack surface rogue links files browser isolation way isolate web browsing hosts high-risk behaviors away mission-critical data infrastructure browser isolation process physically isolate users browsing activity away local networks infrastructure isolating malware browser based cyber-attacks process 2017 american research group gartner identified remote browser browser isolation one top technologies security gartner report also forecast 50 enterprises would actively begin isolate internet browsing reduce impact cyber attacks coming three years similar research conducted transparency market research shows remote browser isolation market projected reach us 5079.8 end 2025 expanding exceptional cagr 19.6 according market research media remote browser isolation rbi market forecast reach 10 billion 2024 growing cagr 30 period 2019-2024 unlike traditional web security approaches antivirus software secure web gateways browser isolation zero trust approach rely filtering content based known threat patterns signatures traditional approaches ca n't handle 0-day attacks since threat patterns unknown rather browser isolation approach treats websites web content explicitly whitelisted untrusted isolates local device virtual environment container virtual machine web-based files rendered remotely end users access within browser without downloading alternatively files sanitized within virtual environment using file cleansing technologies content disarm reconstruction cdr allowing secure file downloads user device typically browser isolation solutions provide users 'disposable non-persistent browser environments browsing session closed times entire browser environment reset known good state simply discarded malicious code encountered session thus prevented reaching endpoint persisting within network regardless whether threat detected way browser isolation proactively combats known unknown zero-day threats effectively complementing security measures contributing defense-in-depth layered approach web security browser isolation began evolution 'security physical isolation cybersecurity model also known air-gap model security professionals physically isolating critical networks users infrastructures cybersecurity purposes decades although techniques breach 'air-gapped systems exist typically require physical access close proximity air-gapped system order effective use air-gap makes infiltration systems public internet extremely difficult impossible without physical access system first commercial browser isolation platforms leveraged national nuclear security administration lawrence livermore national laboratory los alamos national laboratory sandia national laboratories 2009 browser isolation platforms based virtualization used deliver non-persistent virtual desktops thousands federal government users june 2018 defense information systems agency disa announced request information cloud-based internet isolation solution part endpoint security portfolio rfi puts “ service would redirect act internet browsing end user ’ desktop remote server external department defense information network. ” time rfi largest known project browser isolation seeking cloud based service leveraging concurrent simultaneous use licenses ~60 total user base 3.1 million users
[ 4194, 8574, 2213, 3944, 1970, 7515, 2135, 3643, 8094 ]
Test
6,918
2
Virtuozzo_(company):virtuozzo company virtuozzo privately held software company specializing virtualization software divested parallels company 2016 virtuozzo developed first commercially available operating system-level virtualization container technology 2000 open-sourced 2005 form openvz company founded 1997 name swsoft maintained headquarters herndon virginia additional offices throughout north america europe asia research development offices located moscow russia sales offices germany singapore january 2002 virtuozzo 2.0 containers virtualization solution released 2003 swsoft acquired makers plesk web hosting products expanded presence germany novosibirsk russia december 2007 acquisition parallels inc. swsoft company announced plans change name parallels distribute products parallels brand name december 2015 virtuozzo spun became standalone company lead entrepreneur former parallels exec rob lovell may 2016 virtuozzo announced intention join open container initiative plans develop dedicated cloud-based servers well specialized linux distribution month virtuozzo launched virtuozzo application catalog developed partnership bitnami virtuozzo announced strategic partnership jelastic august 2016 produce virtuozzo devops application orchestration platform aimed mid large size companies company named george karidis ceo november 2016 karidis previously headed cloud business unit compucom april 2017 virtuozzo partnered packet.net distribute virtuozzo software packet virtuozzo operating system-level server virtualization solution designed centralize server management consolidate workloads reducing number physical servers required organizations use virtuozzo server consolidation disaster recovery server workload agility virtuozzo generate virtual machine host os like traditional vm software instead creates isolated virtual private servers vpss single physical server instance software run multiple linux vpss linux windows time server vps performs exactly like stand-alone server rebooted independently virtuozzo linux became available 2001 version supports 32- 64-bit microprocessors became available 2005 2002 virtuozzo proved 2.5 version software could run 2,500 instances red hat linux eight-processor dell server result intel partnered virtuozzo 2002 develop partitioning technology ia-64 processors linux architectures support virtuozzo linux x86 ia64 amd64 em64t itanium virtuozzo linux enables multiple linux distributions exist simultaneously one server based openvz linux-based os-level virtualization technology allows physical server run multiple isolated operating system instances 2005 company updated virtuozzo support 64-bit x86 processors virtuozzo requires least pentium iii server least 1 gb memory 4 gb available hard drive virtuozzo ’ management tools compatible microsoft ’ viridian virtual server software virtuozzo container staging processed company container platform openvz virtuozzo 7 incorporated optimized kernel-based virtual machine released july 2016 2012 company released virtuozzo storage targeted container storage second version virtuozzo storage released 2017
[ 8986, 318, 295 ]
Test
6,919
9
*Lisp:*lisp time connection machine designed built language actively developed assembly-level language named paris par allel nstruction et became evident better way program machine needed quickly waiting completion connection machine lisp cm lisp implementation high-level programming language lisp parallel computing extensions option cm lisp proposed danny hillis development expected continue several years *lisp interpreter initially developed became apparent quickly *lisp compiler translating *lisp lisp paris would needed attain gigaflops speed attainable theory connection machine *lisp compiler written jeff mincy first released 1986 application achieving two gigaflops helicopter wake simulator developed alan egolf employee united technologies j. p. massar thinking machines employee 1987 *lisp simulator emulator meant run *lisp code standard non-parallel machines developed time j. p. massar simulator still exists ported american national standards institute ansi common lisp cl 2001 older version written original cl exists carnegie mellon university cmu artificial intelligence ai repository later versions *lisp involving significant upgrades functions performance worked cliff lasser jeff mincy j. p. massar 1989 *lisp implemented thinking machines cm5 circa 1990–1991 j. p. massar mario bourgoin starlisp written common lisp cl thus full power cl behind use connection machine one needed host front-end use *lisp front-end run cl symbolics machines using genera sun microsystems workstations running lucid inc. lucid common lisp used operate *lisp starlisp operated p arallel var iable pvars represented connection machine memory essentially vectors one element per cm processor virtual processor starlisp consisted standard operations pvars like vector addition multiplication along communication primitives essentially reordered elements pvar using cm communication hardware optimally route data
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 2105, 3132, 6717, 8258, 8771, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 2666, 5751, 7805, 9345, 1159, 9865, 9877, 4770, 5803, 2225, 6840, 7867, 4799, 7...
None
6,920
1
Starcounter:starcounter starcounter in-memory application platform built starcounter ab platform based combined in-memory database engine application server combined in-memory database engine application server keeps data one place technology called virtual machine database management system vmdbms patent related technology explains way system environment configured maintain database objects database memory within environment memory application executes application memory within environment memory upon instantiation database object application environment allocates memory database database object database providing master storage database object tables classes consequence vmdbms lets application database virtual memory space implication object-relational mapper orm instead database directly accessed using sql-like queries called newsql application code major drawback in-memory databases main memory volatile therefore ensure durability solution starcounter utilizes write transaction logs disk way done traditional sql databases data needs recovered possible going back transaction logs database maintains acid compliance using transactional scope transactional memory allows long-running transactions nested transactions parallel transactions starcounter uses model-view-viewmodel mvvm pattern view model hosted server server-side code written using c since platform making use .net framework communication client server done using thin client library sends json-patches recommended way build view starcounter applications use html css polymer web components little logic possible client side starcounter likened oracle timesten in-memory database sap hana common based in-memory technology often targeted towards customers use real-time applications main difference way database management system integrated sap hana makes use column-oriented database management system timesten hand uses relational database management system rdbms starcounter unique uses object-oriented approach integrated application vmdbms underlying rdmbs starcounter ab established started development starcounter 2006 received 1.8 million funding vc round led industrifonden 2015 continue development starcounter 2.0 beta version bundles web application framework database released august 2013 starcounter ab named cool vendor in-memory computing technologies 2015 gartner september 2017 starcounter ab took 35 million sek funding existing investors anonymous investor also september 2017 starcounter ab 2.2 million euro prize competition sme instrument open disruptive innovation scheme organized horizon 2020 starcounter used enterprise installations supply chain management application used swedish superstore gekås ullared
[ 10048, 8871, 4045, 4781, 7983, 9467, 10413, 3219, 11539, 3573, 2901, 7767, 8923, 4604, 2045 ]
None
6,921
2
COM_file:com file com file type simple executable file digital equipment operating systems 1970s codice_1 used filename extension text files containing commands issued operating system similar batch file introduction cp/m microcomputer operating system type files commonly associated com extension changed executable files convention later carried dos even complemented general exe file format executables compact com files remained viable frequently used dos codice_1 file name extension relation .com commercial top-level internet domain name however similarity name exploited malicious computer virus writers com format original binary executable format used cp/m including scp msx-dos well dos simple header exception cp/m 3 files contains standard metadata code data simplicity exacts price binary maximum size 65,280 ff00h bytes 256 bytes short 64 kb stores code data one segment since lacks relocation information loaded operating system pre-set address offset 0100h immediately following psp executed hence limitation executable size entry point fixed 0100h issue 8-bit machines since address 64k memory max 16-bit machines much larger address space format fell use intel 8080 cpu architecture 65,536 bytes memory could addressed address range 0000h ffffh cp/m first 256 bytes memory 0000h 00ffh reserved system use zero page user program loaded exactly 0100h executed com files fit model perfectly introduction mp/m concurrent cp/m possibility running one program command time program loaded 0100h run although file format dos cp/m .com files two operating systems compatible dos com files contain x86 instructions possibly dos system calls cp/m com files contain 8080 instructions cp/m system calls programs restricted certain machines could also contain additional instructions 8085 z80 .com files dos set x86 segment registers value sp stack pointer register fffeh thus stack begins top memory segment works original dos 1.x api derivative cp/m api program termination .com file would performed calling int 20h terminate program function else int 21h function 0 served purpose programmer also ensure code data segment registers contained value program termination avoid potential system crash although could used dos version microsoft recommended use int 21h function 4ch program termination dos 2.x onward require data code segment set value possible make .com file run operating systems form fat binary true compatibility instruction level instructions entry point chosen equal functionality different operating systems make program execution jump section operating system use basically two different programs functionality single file preceded code selecting one use cp/m 3 first byte com file c9h 256-byte header since c9h corresponds 8080 instruction codice_3 means com file immediately terminate run earlier version cp/m support extension instruction sets 8085 z80 supersets 8080 instruction set works three processors c9h invalid opcode 8088/8086 cause processor-generated interrupt 6 exception v86 mode 386 later x86 chips since c9h opcode leave since 80188/80186 therefore used first instruction valid program executable loader versions dos rejects com files start c9h avoiding crash files may names ending .com simple format described indicated magic number start file example command.com file dr dos 6.0 actually dos executable format indicated first two bytes mz 4dh 5ah initials mark zbikowski dos memory management provided com files loader execution environment memory simply available com file execution operating system command shell command.com reloaded leaves possibilities com file either simple using single segment arbitrarily complex providing memory management system example complex program command.com dos shell provided loader load com exe programs .com system larger programs available memory size loaded run system loader assumes code data first segment .com program provide organization programs larger available memory large data segments handled dynamic linking necessary code included .com program advantage using .com rather .exe format binary image usually smaller easier program using assembler compilers linkers sufficient power became available longer advantageous use .com format complex programs format still executable many modern windows nt-based platforms run ms-dos-emulating subsystem ntvdm present 64-bit variants com files executed also dos emulators dosbox platform supported emulators windows nt-based operating systems use .com extension small number commands carried ms-dos days although fact presently implemented .exe files operating system recognize .exe file header execute correctly despite technically incorrect .com extension fact .exe file renamed .com still execute correctly use original .com extensions commands ensures compatibility older dos batch files may refer full original filenames commands codice_4 codice_5 codice_6 codice_7 codice_8 codice_9 dos directory contains com file exe file name extension specified com file preferentially selected execution example directory system path contains two files named codice_10 codice_11 following would execute codice_10 user wishing run codice_11 explicitly use complete filename taking advantage default behaviour virus writers malicious programmers used names like codice_14 creations hoping placed directory corresponding exe file command batch file may accidentally trigger program instead text editor codice_15 .com files may fact contain .exe format executable windows nt derivatives windows 2000 windows xp windows vista windows 7 pathext variable used override order preference acceptable extensions calling files without specifying extension command line default value still places codice_16 files codice_17 files closely resembles feature previously found jp software line extended command line processors 4dos 4os2 4nt computer virus writers hoped take advantage modern computer users likely lack knowledge .com file extension associated binary format along likely familiarity .com internet domain name e-mails sent attachment names similar www.example.com unwary microsoft windows users clicking attachment would expect begin browsing site named codice_18 instead would run attached binary command file named codice_19 giving full permission machine whatever author mind nothing malicious com file format exploitation coincidental name collision .com com mand files .com com mercial web sites
[ 10113, 1922, 4870, 8966, 6664, 8715, 9996, 6797, 3216, 8976, 2322, 7317, 2840, 2201, 7323, 1952, 37, 2729, 7849, 11562, 6829, 7983, 5425, 178, 7986, 5557, 9525, 4409, 3386, 7739, 7999, 4674, 2627, 4548, 8517, 4424, 5065, 6730, 9166, 3410,...
Test
6,922
8
MnoGoSearch:mnogosearch mnogosearch open-source search engine unix-like computer systems written c. distributed gnu general public license designed organize search within website group websites intranet local system mnogosearch index text/plain text/html text/xml data natively many others datatypes using external parsers engine ready index multilingual websites wide range character sets languages supported detected automatically uses content negotiation technology fetch versions page different languages perform diacritic-insensitive search segment phrases chinese japanese thai possible use synonyms ispell-based fuzzing extend search results results sorted relevance last modified time title windows version mnogosearch features graphical user interface sold commercial license march 2019 software longer maintained available
[ 113, 5612, 2045, 7983 ]
Test
6,923
3
The_Activision_Decathlon:activision decathlon activision decathlon sports game written david crane atari 2600 published activision 1983 ported atari 8-bit family atari 5200 commodore 64 colecovision msx platforms four players compete ten different events real-life decathlon either sequence individually game became somewhat notorious amount wear damage inflicted upon console controllers namely atari 2600 version rapid back-and-forth movement joystick propels athlete track game later reissued simply decathlon uk budget label firebird subsequently featured playstation 2 compilation activision anthology atari 2600 version decathlon reviewed video magazine arcade alley column described absolute triumph imaginative programming masterwork
[ 10316, 9006, 10695 ]
None
6,924
3
CPUID:cpuid codice_1 instruction identified codice_1 opcode processor supplementary instruction name derived cpu identification x86 architecture allowing software discover details processor introduced intel 1993 introduced pentium sl-enhanced 486 processors program use codice_1 determine processor type whether features mmx/sse implemented prior general availability codice_1 instruction programmers would write esoteric machine code exploited minor differences cpu behavior order determine processor make model outside x86 family developers mostly still required use esoteric processes involving instruction timing cpu fault triggers determine variations cpu design present motorola 680x0 family -- never cpuid instruction kind -- certain specific instructions required elevated privileges could used tell various cpu family members apart 68000 offered unprivileged move sr 2 different cpus could told apart cpu error condition triggered codice_1 instruction specific x86 architecture architectures like arm often provide on-chip registers read prescribed ways obtain sorts information provided x86 cpuid instruction codice_1 opcode 0fh a2h two bytes a20fh single word assembly language codice_1 instruction takes parameters codice_1 implicitly uses eax register determine main category information returned intel recent terminology called cpuid leaf codice_1 called codice_10 first store eax register highest eax calling parameter leaf cpu implements obtain extended function information codice_1 called significant bit eax set determine highest extended function calling parameter call codice_1 codice_13 cpuid leaves greater 3 less 80000000 accessible model-specific registers ia32_misc_disable.boot_nt4 bit 22 0 default name suggests windows nt4 boot properly unless bit set later versions windows need basic leaves greater 4 assumed visible current windows systems basic valid leaves go 14h information returned leaves disclosed publicly available documentation i.e reserved recently added leaves also sub-leaves selected via ecx register calling cpuid returns cpu manufacturer id string twelve-character ascii string stored ebx edx ecx order highest basic calling parameter largest value eax set calling codice_1 returned eax list processors highest function implemented following known processor manufacturer id strings following known id strings virtual machines instance genuineintel processor values returned ebx 0x756e6547 edx 0x49656e69 ecx 0x6c65746e following code written gnu assembler x86-64 architecture displays vendor id string well highest calling parameter cpu implements returns cpu stepping model family information register eax also called signature cpu feature flags registers edx ecx additional feature info register ebx processor info feature flags manufacturer specific usually intel values used manufacturers sake compatibility reserved fields masked using processor identification purposes returns list descriptors indicating cache tlb capabilities eax ebx ecx edx registers returns processor serial number processor serial number introduced intel pentium iii due privacy concerns feature longer implemented later models psn feature bit always cleared transmeta efficeon crusoe processors also provide feature amd cpus however implement feature cpu models intel pentium iii cpus serial number returned edx ecx registers transmeta efficeon cpus returned ebx eax registers transmeta crusoe cpus returned ebx register note processor serial number feature must enabled bios setting order function two leaves used processor topology thread core package cache hierarchy enumeration intel multi-core hyperthreaded processors amd use leaves alternate ways core enumeration unlike cpuid leaves leaf bh return different values edx depending logical processor cpuid instruction runs value returned edx actually x2apic id logical processor x2apic id space continuously mapped logical processors however gaps mapping meaning intermediate x2apic ids n't necessarily correspond logical processor additional information mapping x2apic ids cores provided registers although leaf bh sub-leaves selected ecx described value returned edx affected logical processor instruction running subleaf processor topology exposed leaf bh hierarchical one strange caveat order logical levels hierarchy n't necessarily correspond order physical hierarchy smt/core/package however every logical level queried ecx subleaf bh leaf correspondence level type either smt core invalid level id space starts 0 continuous meaning level id invalid higher level ids also invalid level type returned bits 15:08 ecx number logical processors level queried returned ebx finally connection levels x2apic ids returned eax 4:0 number bits x2apic id must shifted order obtain unique id next level example dual-core westmere processor capable hyperthreading thus two cores four threads total could x2apic ids 0 1 4 5 four logical processors leaf bh =eax subleaf 0 =ecx cpuid could instance return 100h ecx meaning level 0 describes smt hyperthreading layer return 2 ebx two logical processors smt units per physical core value returned eax 0-subleaf 1 case shifting aforementioned x2apic ids right one bit gives unique core number next level level id hierarchy erases smt id bit inside core simpler way interpret information last bit bit number 0 x2apic id identifies smt/hyperthreading unit inside core example advancing subleaf 1 making another call cpuid eax=bh ecx=1 could instance return 201h ecx meaning core-type level 4 ebx 4 logical processors package eax returned could value greater 3 happens bit number 2 used identify core x2apic id note bit number 1 x2apic id used example however eax returned level could well 4 happens clarkdale core i3 5x0 also gives unique id package level =0 obviusly shifting x2apic id 4 bits finally may wonder eax=4 leaf tell us n't find already eax 31:26 returns apic mask bits reserved package would 111b example bits 0 2 used identifying logical processors inside package bit 1 also reserved although used part logical processor identification scheme words apic ids 0 7 reserved package even though half values n't map logical processor cache hierarchy processor explored looking sub-leaves leaf 4 apic ids also used hierarchy convey information different levels cache shared smt units cores continue example l2 cache shared smt units core physical cores westmere indicated eax 26:14 set 1 information l3 cache shared whole package indicated setting bits least 111b cache details including cache type size associativity communicated via registers leaf 4 beware older versions intel app note 485 contain misleading information particularly respect identifying counting cores multi-core processor errors misinterpreting information even incorporated microsoft sample code using cpuid even 2013 edition visual studio also sandpile.org page cpuid intel code sample identifying processor topology correct interpretation current intel software developer ’ manual clear language open source cross-platform production code wildfire games also implements correct interpretation intel documentation topology detection examples involving older pre-2010 intel processors lack x2apic thus n't implement eax=bh leaf given 2010 intel presentation beware using older detection method 2010 newer intel processors may overestimate number cores logical processors old detection method assumes gaps apic id space assumption violated newer processors starting core i3 5x0 series newer processors also come x2apic topology correctly determined using eax=bh leaf method returns extended feature flags ebx ecx edx highest calling parameter returned eax returns extended feature flags edx ecx amd feature flags follows return processor brand string eax ebx ecx edx codice_1 must issued parameter sequence get entire 48-byte null-terminated ascii processor brand string necessary check whether feature present cpu issuing codice_1 codice_13 first checking returned value greater equal 80000004h function contains processor ’ l1 cache tlb characteristics returns details l2 cache ecx including line size bytes type associativity encoded 4 bits cache size function provides advanced power management feature identifiers returns largest virtual physical address sizes eax bits 07-00 physical address bits bits 15-8 linear address bits bits 31-16 reserved 0 could used hypervisor virtual machine system report physical/virtual address sizes possible virtual cpu specific amd k7 k8 cpus returns string hammer time eax ebx ecx edx information easy access languages well instance c code gcc prints first five values returned cpuid generally useful c implementation works 32- 64-bit systems gcc also provides header called codice_18 systems cpuid codice_19 macro expanding inline assembly typical usage would one requested extended feature present cpu would notice might get random unexpected results safer version also provided codice_18 checks extended features safety checks output values passed using reference-like macro parameters conventional pointers notice ampersands codice_21 conditional statement codice_22 call receives correct request return non-zero value fails zero microsoft visual c compiler builtin function codice_23 cpuid instruction may embedded without using inline assembly handy since x86-64 version msvc allow inline assembly program msvc would borland/embarcadero c compilers bcc32 native asm function calls necessary asm implementation pseudo code many interpreted compiled scripting languages capable using cpuid via ffi library one implementation shows usage ruby ffi module execute assembly language includes cpuid opcode non-x86 cpu architectures also provide certain forms structured information processor abilities commonly set special registers dsp transputer-like chip families taken instruction noticeable way spite relative terms many variations design alternate ways silicon identification might present example dsps texas instruments contain memory-based register set functional unit starts identifiers determining unit type model asic design revision features selected design phase continues unit-specific control data registers access areas performed simply using existing load store instructions thus devices need extending register set device identification purposes according note former intel app note 485 specifically cpuid incorporated intel® 64 ia-32 architectures software developer ’ manual manual however still directs reader app note 485 information latest published version app note 485 dating may 2012 available via archive.org app note 485 contains information easily misinterpreted though particularly respect big intel manuals tend lag behind intel isa document available top page updated even processors yet publicly available thus usually contains cpuid bits example writing isa book revision 19 dated may 2014 documents clflushopt bit leaf 7 big manuals although apparently up-to-date revision 51 dated june 2014 n't mention
[ 7173, 6150, 6151, 6153, 8716, 5655, 2073, 27, 8231, 2088, 3630, 7218, 1085, 7234, 3142, 6730, 4695, 8795, 2655, 1122, 7783, 1137, 5234, 8322, 4237, 7313, 9369, 2212, 9391, 3250, 11447, 5326, 5844, 9428, 3294, 10985, 5356, 9964, 5358, 1776...
Test
6,925
3
UDOO:udoo udoo single-board computer integrated arduino due compatible microcontroller designed computer science education world makers internet things product launched kickstarter april 2013 reaching wide consensus product line involves three single board computers – udoo quad/dual 2013 udoo neo 2015 udoo x86 2016 – differ various aspects plus udoo blu set udoo bricks udoo development platform merges dual quad core arm freescale cortex-a9 i.mx 6 cpu run linux android operating systems arduino due compatible board dedicated arm atmel sam3x8e cpu udoo joint effort aidilab srl seco usa inc collaboration multidisciplinary team researchers expertise interaction design embedded systems sensor networks cognitive science udoo project launched kickstarter april 9 2013 aidilab — siena university startup — seco embedded computing firm reached goal 27,000 40 hours goal well exceeded 4,172 backers pledged 641,614 udoo board equipped two cpus freescale i.mx 6 arm cortex a9 processor based arm v7 instruction set next generation graphics high-definition video central i.mx 6 series i.mx 6 series supports 1080p60 video playback enabling exceptional high-quality videos low power consumption devices playing high-definition content 3d graphics engine top line i.mx 6 quad i.mx 6 dual processors capable providing 200 mt/s enables ultra-vivid realistic graphics critical multimedia applications combine power main cores until-now-untapped potential 3d engine perform computational tasks otherwise atmel sam3x implements real-time computing allows full compatibility arduino due prototyping board solution udoo used like arduino due microcontroller programmed way stand-alone different clocks shared memory process tasks asynchronously without kind emulation however share communication channels i.mx 6 dual/6 quad application processors latest additions freescale semiconductor growing family multimedia-focused products offering high performance processing optimized lowest power consumption i.mx 6 dual/6 quad processors feature freescale advanced implementation arm cortex-a9 core interfaced ddr3-1066 lv-ddr3-1066 lpddr2-1066 single dual channel dram memory devices i.mx 6 dual/6 quad processor based arm cortex a9 mpcore platform following features arm cortex a9 mpcore complex includes i.mx 6 quad processor makes use dedicated hardware accelerators order meet targeted multimedia performance use hw accelerators key factor inobtaining high performance low power consumption numbers keeping cpu core relatively free perform tasks i.mx 6 quad processor incorporates following hardware accelerators miscellaneous ips interfaces atmel ’ sam3x/a series member family flash microcontrollers based high performance 32-bit arm cortex-m3 risc processor operates maximum speed 84 mhz features 512 kbytes flash 100 kbytes sram peripheral set includes high speed usb host device port embedded transceiver ethernet mac 2x cans high speed mci sdio/sd/mmc external bus interface nand flash controller 5x uarts 2x twis 4x spis well 1 pwm timer 9x general-purpose 32- bit timers rtc 12-bit adc 12-bit dac sam3x/a series ready capacitive touch thanks qtouch library offering easyway implement buttons wheels sliders sam3x/a architecture specifically designed sustain high speed data transfers includes multi-layer bus matrix well multiple sram banks pdc dma channels enable run tasks parallel maximize data throughput operates 1.62v 3.6v available 100- 144-pin qfp lfbga packages sam3x/a devices particularly well suited networking applications industrial home/building automation gateways freescale i.mx 6 atmel sam3x connected uart serial port embedded board works exactly like arduino connected external computer usb cable sam3x linux communicate two way channel exchanging messages tested baudrate 115200 serial connection also accessible external pins 0 1 arduino compatible pinout sam3x programming port accessible way arduino due via usb-to-serial converter directly external pinout serial uart connected imx 6 pins keyrow0 keycol0 sam3x side connected pins urxd utxd shared serial also available micro-usb plug cn6 removing j18 jumper communicate channel becomes shared udoo uses 4 micron mt41j256m16re-15e ram modules 2gbit module total 1gbyte clock frequency 400mhz udoo dual 528mhz udoo quad memory system consists following levels mac-net core conjunction 10/100/1000 mac implements layer 3 network acceleration functions functions designed accelerate processing various common networking protocols ip tcp udp icmp providing wire speed services client applications udoo uses ksz9031rnx ethernet transceiver completely integrated triple-speed 10base-t/100base-tx/1000base-t ethernet physical layer transceiver transmission reception data standard cat-5 unshielded twisted pair utp cable ksz9031rnx provides reduced gigabit media independent interface rgmii direct connection rgmii macs gigabit ethernet processors switches data transfer 10/100/1000 mbit/s ksz9031rnx reduces board costs simplifies board layout using on-chip termination resistors four differential pairs integrating ldo controller drive low-cost mosfet supply 1.2v core gwf-3m08 wlan module supporting ieee 802 11 b/g/n standards 6-pin connector supporting usb 2.0 /1.1 interface small form factor low cost compact wlan module designed wireless connectivity products embedded system module operates 2.4 ghz ism frequency band applies highly integrated mac/bbp rf single chip rt5370 150mbit/s phy rate supporting module built-in embedded applications ip camera ip set top box gps internet radio apparatus directly soldered main pcb features front connectors ports up-side connectors ports summary features gpu3d includes udoo provides one two i.mx 6 lvds outputs external pinout input used communicate rgb data controls external lcd displays lvds interface lvds receivers lvds port may used one single-channel output boot android otg bus switched connect sam3x therefore connection two processors plug usb cable cn3 ’ work since disconnected setup i.mx 6 communicate sam3x using android adk protocol must program sam3x sketch includes specific libraries installs app android configured use adk protocol udoo based dual quad core arm cortex-a9 cpu delivering great performance android linux os dedicated arm processor gpio specifications available accessories udoo board comes two micro sd card optional android ubuntu linux installed
[ 3585, 11395, 11396, 3467, 10767, 1170, 1682, 11282, 7445, 666, 9371, 4124, 1442, 4773, 9638, 682, 8237, 11054, 7983, 2224, 11314, 3511, 823, 1849, 8250, 9913, 11447, 10945, 6978, 7234, 7235, 6981, 9928, 11080, 2635, 9163, 6607, 2517, 2524, ...
Test
6,926
3
Out-of-order_execution:out-of-order execution computer engineering out-of-order execution formally dynamic execution paradigm used high-performance central processing units make use instruction cycles would otherwise wasted paradigm processor executes instructions order governed availability input data execution units rather original order program processor avoid idle waiting preceding instruction complete meantime process next instructions able run immediately independently out-of-order execution restricted form data flow computation major research area computer architecture 1970s early 1980s important academic research subject led yale patt hpsm simulator paper james e. smith a. r. pleszkun published 1985 completed scheme describing precise behavior exceptions could maintained out-of-order machines arguably first machine use out-of-order execution cdc 6600 1964 uses scoreboard resolve conflicts although modern usage scoreboarding considered in-order execution out-of-order execution since machines stall first raw conflict – strictly speaking machines initiate execution in-order although may complete execution out-of-order three years later ibm system/360 model 91 1966 introduced tomasulo algorithm makes full out-of-order execution possible 1990 ibm introduced first out-of-order microprocessor power1 although out-of-order execution limited floating-point instructions also case model 91 1990s out-of-order execution became common featured ibm/motorola powerpc 601 1993 fujitsu/hal sparc64 1995 intel pentium pro 1995 mips r10000 1996 hp pa-8000 1996 amd k5 1996 dec alpha 21264 1996 notable exceptions trend include sun ultrasparc hp/intel itanium intel atom silvermont architecture ibm power6 high logical complexity out-of-order technique reason reach mainstream machines mid-1990s many low-end processors meant cost-sensitive markets still use paradigm due large silicon area required implementation low power usage another design goal harder achieve out-of-order execution oooe design vulnerability microprocessor manufacturers implementations out-of-order execution mechanism reported manufacturers june 1 2017 publicized january 2018 exploitable vulnerability led millions vulnerable systems vulnerability named spectre similar vulnerability meltdown disclosed time took advantage assumption manufacturers made loading data processor cache allowing data cached privileged security boundary resulted race condition could timed leak privileged information earlier processors processing instructions performed instruction cycle normally consisting following steps new paradigm breaks processing instructions steps key concept oooe processing allow processor avoid class stalls occur data needed perform operation unavailable outline oooe processor avoids stall occurs step 2 in-order processor instruction completely ready processed due missing data oooe processors fill slots time instructions ready re-order results end make appear instructions processed normal way instructions ordered original computer code known program order processor handled data order order data operands become available processor registers fairly complex circuitry needed convert one ordering maintain logical ordering output processor runs instructions seemingly random order benefit oooe processing grows instruction pipeline deepens speed difference main memory cache memory processor widens modern machines processor runs many times faster memory time in-order processor spends waiting data arrive could processed large number instructions one differences created new paradigm creation queues allows dispatch step decoupled issue step graduation stage decoupled execute stage early name paradigm decoupled architecture earlier in-order processors stages operated fairly lock-step pipelined fashion instructions program may run correct order long end result correct separates fetch decode stages execute stage pipelined processor using buffer buffer purpose partition memory access execute functions computer program achieve high-performance exploiting fine-grain parallelism two effectively hides memory latency processor perspective larger buffer theory increase throughput however processor branch misprediction entire buffer may need flushed wasting lot clock cycles reducing effectiveness furthermore larger buffers create heat use die space reason processor designers today favour multi-threaded design approach decoupled architectures generally thought useful general purpose computing handle control intensive code well control intensive code include things nested branches occur frequently operating system kernels decoupled architectures play important role scheduling long instruction word vliw architectures avoid false operand dependencies would decrease frequency instructions could issued order technique called register renaming used scheme physical registers defined architecture physical registers tagged multiple versions architectural register exist time queue results necessary resolve issues branch mispredictions exceptions/traps results queue allows programs restarted exception requires instructions completed program order queue allows results discarded due mispredictions older branch instructions exceptions taken older instructions ability issue instructions past branches yet resolve known speculative execution
[ 1024, 4098, 7173, 9739, 2066, 7699, 5655, 1563, 10779, 10781, 1057, 6181, 8231, 6184, 10796, 3630, 9774, 2097, 6705, 7218, 4664, 2623, 2113, 7234, 7745, 3142, 2638, 10837, 604, 1122, 99, 7270, 3175, 6247, 6253, 8815, 6256, 1137, 3185, 421...
Test
6,927
2
Media_Foundation:media foundation media foundation mf com-based multimedia framework pipeline infrastructure platform digital media windows vista windows 7 windows 8 windows 8.1 windows 10 intended replacement microsoft directshow windows media sdk directx media objects dmos so-called legacy multimedia apis audio compression manager acm video windows vfw existing directshow technology intended replaced media foundation step-by-step starting features time co-existence media foundation directshow media foundation available previous windows versions including windows xp first release present windows vista focuses audio video playback quality high-definition content i.e hdtv content protection unified approach digital data access control digital rights management drm interoperability integrates dxva 2.0 offloading video processing pipeline hardware better performance videos processed colorspace encoded handed hardware composes image native colorspace prevents intermediate colorspace conversions improve performance mf includes new video renderer called enhanced video renderer evr next iteration vmr 7 9 evr better support playback timing synchronization uses multimedia class scheduler service mmcss new service prioritizes real time multimedia processing reserve resources required playback without tearing glitches second release included windows 7 introduces expanded media format support dxva hd acceleration hd content wddm 1.1 drivers used mf architecture divided control layer core layer platform layer core layer encapsulates functionality media foundation consists media foundation pipeline three components media source media sink media foundation transforms mft media source object acts source multimedia data either compressed uncompressed encapsulate various data sources like file network server even camcorder source specific functionality abstracted common interface source object use source resolver object creates media source uri file bytestream support non-standard protocols added creating source resolver source object also use sequencer object use sequence sources playlist coalesce multiple sources single logical source media sink recipient processed multimedia data media sink either renderer sink renders content output device archive sink saves content onto persistent storage system file renderer sink takes uncompressed data input whereas archive sink take either compressed uncompressed data depending output type data media sources sinks acted upon mfts mfts certain functions transform data another form mfts include multiplexers demultiplexers codecs dsp effects like reverb core layer uses services like file access networking clock synchronization time multimedia rendering part platform layer provides services necessary accessing source sink byte streams presentation clocks object model lets core layer components function asynchronously generally implemented os services pausing stopping fast forward reverse time-compression achieved controlling presentation clock however media pipeline components connected rather presented discrete components application running control layer choose source types transforms sinks needed particular video processing task hand set connections components topology complete data flow pipeline example play back compressed audio/video file pipeline consist file source object demultiplexer specific file container format split audio video streams codecs decompress audio video streams dsp processors audio video effects finally evr renderer sequence video capture application camcorder act video audio sources codec mfts work compress data feed multiplexer coalesces streams container finally file sink network sink write file stream network application also co-ordinate flow data pipeline components control layer pull request samples one pipeline component pass onto next component order achieve data flow within pipeline contrast directshow push model pipeline component pushes data next component media foundation allows content protection hosting pipeline within protected execution environment called protected media path control layer components required propagate data pipeline rate rendering synchronizes presentation clock rate time rendering embedded part multimedia stream metadata source objects extract metadata pass metadata two types coded metadata information bit rate presentation timings descriptive metadata like title author names coded metadata handed object controls pipeline session descriptive metadata exposed application use chooses media foundation provides media session object used set topologies facilitate data flow without application explicitly exists control layer exposes topology loader object application specifies required pipeline topology loader creates necessary connections components media session object manages job synchronizing presentation clock creates presentation clock object passes reference sink uses timer events clock propagate data along pipeline also changes state clock handle pause stop resume requests application theoretically one media foundation architecture media session pipeline media source transform media sink model however architecture complex set considerable scope lightweight relatively easy configure mf components designed handle processing media data simple point solutions thus practical considerations necessitated implementation variations fundamental pipeline design components source reader sink writer operate outside pipeline model developed sources split media foundation architecture three general classes pipeline architecture distinguished use distinct media session object pipeline media data flows one media sources one media sinks optionally zero media transforms media session manages flow media data pipeline pipeline multiple forks branches mf application get access media data traverses media source media sink implementing custom media transform component inserting appropriate location pipeline reader-writer architecture uses component called source reader provide media data sink writer component consume source reader contain type internal pipeline accessible application source reader media source sink writer media sink neither directly included pipeline managed media session general media data flows source reader sink writer actions application application either take packets media data called media samples source reader give directly sink writer set callback function source reader performs operation effect manages data transport application performs similar role media session pipeline architecture application since mf application manages transmission media samples source reader sink writer always access raw media data source reader sink writer components limited ability automatically load media transforms assist conversion format media data however done internally application little control source reader sink writer provide ease use pipeline architecture offers extremely sophisticated control flow media data however many components available pipeline enhanced video renderer simply readily usable reader-writer architecture application since structure media sample produced source reader identical output media source possible set pipeline architecture media samples intercepted pass pipeline copy given media sink known hybrid architecture makes possible application takes advantage sophisticated processing abilities media session pipeline utilizing ease use sink writer sink writer part pipeline interact media session effect media data processed special media sink called sample grabber sink consumes media data hands copy sink writer also possible implement hybrid architecture custom media transform copies media samples passes sink writer pass pipeline cases special component pipeline effectively acts like simple reader-writer application feeds sink writer general hybrid architectures use pipeline sink writer theoretically possible implement mechanism source reader could somehow inject media samples pipeline unlike sample grabber sink standard component exists media foundation transforms mfts represent generic model processing media data used media foundation primarily implement decoders encoders mixers digital signal processors dsps – media sources media sinks media foundation transforms evolution transform model first introduced directx media objects dmos behaviors clearly specified hybrid dmo/mft objects also created applications use mfts inside media foundation pipeline use directly stand-alone objects mfts following type microsoft recommends developers write media foundation transform instead directshow filter windows vista windows 7 windows 8 video editing video capture microsoft recommends using directshow primary focus media foundation windows vista starting windows 7 mfts also support hardware-accelerated video processing encoding decoding avstream-based media devices media foundation uses enhanced video renderer evr rendering video content acts mixer well mix 16 simultaneous streams first stream reference stream reference stream per-pixel transparency information well specified z-order reference stream transparent pixels fixed z-order position back streams final image composited onto single surface coloring pixel according color transparency corresponding pixel streams internally evr uses mixer object mixing streams also deinterlace output apply color correction required composited frame handed presenter object schedules rendering onto direct3d device shares dwm applications using device frame rate output video synchronized frame rate reference stream streams called substreams different frame rate evr discards extra frames substream higher frame rate uses frame lower frame rate windows media audio windows media video default supported formats encoding media foundation windows vista decoding mp3 file source available windows vista read mp3 streams mp3 file sink output mp3 available windows 7 format support extensible however developers add support formats writing encoder/decoder mfts and/or custom media sources/media sinks windows 7 expands upon codec support available windows vista includes avi wav aac/adts file sources read respective formats mpeg-4 file source read mp4 m4a m4v mp4v mov 3gp container formats mpeg-4 file sink output mp4 format similar windows vista transcoding encoding support exposed built-in windows application several codecs included media foundation transforms mfts addition windows media audio windows media video encoders decoders asf file sink file source introduced windows vista windows 7 includes h.264 encoder baseline profile level 3 main profile support aac low complexity aac-lc profile encoder playback various media formats windows 7 also introduces h.264 decoder baseline main high-profile support level 5.1 aac-lc he-aac v1 sbr multichannel he-aac v2 ps stereo decoders mpeg-4 part 2 simple profile advanced simple profile decoders includes decoding popular codec implementations divx xvid nero digital well mjpeg dv mft decoders avi windows media player 12 uses built-in media foundation codecs play formats default midi playback also yet supported using media foundation applications support media foundation include application uses protected media path windows also uses media foundation
[ 10243, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 10282, 4143, 9263, 11316, 1077, 8246, 1098, 4174, 4178, 9813, 603, 2145, 622, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 651, 5259, 653, 3224, 4771, 7846, 2221, 10414, 8391, 214, 994...
Test
6,928
4
Lambros_D._Callimahos:lambros d. callimahos lambros demetrios callimahos december 16 1910 – october 28 1977 us army cryptologist flute player callimahos born alexandria greek parents family emigrated united states four father journalist main interests school chemistry physics medicine show interest music age fourteen entered high school asbury park callimahos earned degree law rutgers accord fathers wishes attended juilliard music school age nineteen graduated degree 1933 started bottom class became head class second year encouragement teacher arthur lora graduation continued study europe musical debut munich 1935 heralded meisterfloetist also played vienna autumn played all-bach programme munich consisting seven sonatas transcription flute harpsichord b-minor suite two-year tour recitals europe appointed professorship mozarteum two cds performances recorded released april 1937 first united states debut town hall continued tour europe united states joined united states army 1941 hoping interest cryptology could put service taught italian cryptanalysis fort monmouth enrolled japanese course eventually served signals intelligence officer new delhi world war ii assigned army security agency assistant william f. friedman national security agency formed men joined 1950s developed course ca-400 expansion friedman intensive-study course graduates course became members dundee society part course devised zendian problem also revised friedman work produce text military cryptanalytics 1955 established nsa technical journal served technical advisor rest career health problems forced retirement 1976
[ 6599, 4007, 7119, 7887, 9615, 2580, 1941 ]
None
6,929
4
MIRACL_(security_firm):miracl security firm miracl formally known certivox london-based web 2.0 security firm develops information security infrastructure service iaas encryption based software service saas solutions enterprises individuals company provides on-demand encryption key management multi-factor authentication cloud specializes elliptical curve cryptography red herring selected miracl finalist 2012 europe top 100 brian spector founded certivox data security specialists 2008 help people protect business individual privacy company opened offices shoreditch 2011 company partnered low-power customer specific standard product cssp provider quicklogic february 2012 efforts jointly develop data security solutions across platforms also february company acquired shamus software creator miracl cryptographic library 2011 certivox received 1.46 million series funding led pentech ventures octopus investments 2012 launched service called privatesky allowing users encrypt messages large files 5gb design offered government businesses individuals one-click security microsoft outlook html5 web browsers however privatesky taken offline company following ripa warrant gchq national technical assistance centre ntac wanted decryption keys customer data certivox launched m-pin strong authentication system july 2013 january 2016 company changed name miracl name acronym multiprecision integer rational arithmetic cryptographic library created dublin city university school computing 1988 company acquired purchase shamus software 2012 ceo shamus software google scholar dr. michael scott also joined miracl chief cryptographer reason given name change reflect “ pivot mission business providing individual products offering complete solutions potential transform industry ”
[ 3880, 11244, 4429, 467, 119 ]
Test
6,930
5
Bias_tee:bias tee bias tee three-port network used setting dc bias point electronic components without disturbing components bias tee diplexer low-frequency port used set bias high-frequency port passes radio-frequency signals blocks biasing levels combined port connects device sees bias rf called tee 3 ports often arranged shape t. conceptually bias tee viewed ideal capacitor allows ac blocks dc bias ideal inductor blocks ac allows dc although bias tees made simple inductor capacitor wideband bias tees considerably complicated practical components parasitic elements bias tees designed transmission-line environments typically characteristic impedance z 50 ohms 75 ohms impedance capacitor x chosen much less z impedance inductor x chosen much greater z ω angular frequency radians per second f frequency hertz bias tees designed operate range signal frequencies reactances chosen minimal impact lowest frequency wide-range bias tees inductor must large lowest frequency large inductor stray capacitance creates self-resonant frequency high enough frequency stray capacitance presents low-impedance shunt path signal bias tee becomes ineffective practical wide-band bias tees must use circuit topologies avoid shunt path instead one inductor series string inductors addition additional resistors capacitors prevent resonances example picosecond pulse labs model 5580 bias tee works 10 khz 15 ghz consequently simple design would need inductance least 800 μh x j 50 ohms 10 khz inductor must still look like inductor 15 ghz however commercial 820 μh inductor self-resonant frequency 1.8 mhz – four orders magnitude low johnson gives example wideband microstrip bias tee covering 50 khz 1 ghz using four inductors 330 nh 910 nh 18 µh 470 µh series design cribbed commercial bias tee modeled parasitic element values simulated results optimized component selection show advantage additional components johnson provided simulation bias tee used inductors capacitors without q suppression johnson provides simulated actual performance details girardi duplicated improved johnson design points additional construction issues bias tee used insert dc power ac signal power remote antenna amplifiers devices usually positioned receiving end coaxial cable pass dc power external source coaxial cable running powered device bias “ ” consists feed inductor deliver dc connector device side blocking capacitor keep dc passing receiver rf signal connected directly one connector blocking capacitor series internal blocking diode prevents damage bias “ ” reverse supply voltage applied bias tees used variety applications generally used provide rf signal dc power remote device running two separate cables would advantageous biasing often used photodiodes vacuum solid state microchannel plate detectors transistors triodes high frequencies signal leak common power supply rail conversely noise power supply appear signal line examples include power ethernet active antennas low-noise amplifiers converters telephone line plain old telephone service early microphones use bias tee circuit—often gyrator replacing inductor—this enables thin cable 2 conductors send power system device send audio device back system modern microphones often use 3 conductors phantom power circuit similar bias tee circuit several bias tee designs construction horizontal bar based rigid coaxial cable air dielectric radius chosen large possible without allowing higher modes design bias based upon power going remote device seen base station receiver using capacitor rf output terminal effectively creating open circuit dc current incoming rf signal one antenna output dc power front-end bias typically consists bandpass filter low noise amplifier mixer coupled local oscillator one point small slice cut center conductor therefore capacitor formed low frequencies blocked kind capacitor advantage nearly invisible higher frequencies pass frequencies 1 mhz capacitance increased dielectric like npo multiplies capacitance factor 65 thickness capacitor minimal without leading electric breakdown dielectric means avoid peaks electric field means smooth electrodes rounded edges dielectric protruding electrodes doorknob design stack capacitors used every capacitor needs access surface inner conductor hidden behind another capacitor high frequencies wo n't see electric field needs lot time travel dielectric high dielectric constant small coil made fine wire air core mnfezn-core connects inner conductor one sides capacitor port outer conductor leading t. frequencies 1 ghz hit coil side apply equal electric field whole coil therefore higher modes excited within coil inductiveness coil almost current leaks center conductor port frequencies 1 mhz 1 ghz leak port second coil cone shaped core outside outer conductor inside housing avoid interference components cone acts like tapered transmission line transformer starts high impedance lot power reflected rest travel coil leakage low frequency port oscillations capacitor coil composed lc circuit damped dielectric core also small coil 10 ohm resistance damp oscillations avoid ripple transmitted spectrum
[]
Test
6,931
3
Tashiro_Masashi_no_Princess_ga_Ippai:tashiro masashi princess ga ippai story hero masashi tashiro rescue four princesses distress one happy ending four unhappy endings used game becoming one first video games multiple endings game successful started appearing frequently getting high prices online auction sites like yahoo 2000 masashi tashiro arrested convicted several times connection voyeurism drug abuse
[ 9006, 8735 ]
Test
6,932
7
MongoDB_Inc.:mongodb inc. mongodb inc. formerly 10gen american software company develops provides commercial support open source database mongodb nosql database stores data json-like documents flexible schemas company first established 2007 10gen based new york city 10gen founded former doubleclick founder cto dwight merriman former doubleclick ceo gilt groupe founder kevin p. ryan former doubleclick engineer shopwiki founder cto eliot horowitz received 81 million venture capital funding flybridge capital partners in-q-tel intel capital new enterprise associates nea red hat sequoia capital union square ventures 10gen originally aimed build platform service architecture based entirely open source components however company unable find existing database platform met principles cloud architecture result company began develop document-oriented database system called mongodb realizing potential software 10gen team decided scrap cloud platform focus maintaining mongodb instead february 2009 10gen released mongodb open source project 10gen opened first west coast office august 2010 offices palo alto reston london dublin barcelona sydney 2012 september 2012 10gen named top software company number 9 overall wall street journal next big thing 2012 april 2013 10gen moved old new york times building office located prince st. august 27 2013 10gen announced would change name mongodb inc. associating closely ultimately became flagship products august 5 2014 dev ittycheria appointed president chief executive officer mongodb inc primary technology product open source nosql database mongodb mongodb inc. employs developers mongodb july 2018 mongodb database downloaded 40 million times 2016 mongodb inc launched mongodb atlas fully managed database service offering atlas available 50 regions amazon web services microsoft azure google cloud platform contains features global clusters automated provisioning upgrades backup restore monitoring 2018 mongodb inc launched mongodb stitch serverless platform stitch provides four core services march 2010 mongodb announced would offer commercial support mongodb mongodb subscription offering includes access mongodb enterprise professional support commercial licensing mongodb 2.4 release mongodb introduced mongodb enterprise part subscription offering mongodb enterprise contains monitoring security features kerberos authentication role-based privileges mongodb 4.0 mongodb enterprise version contains following features ops manager on-premises solution managing mongodb ops manager available part mongodb enterprise advanced subscription features comprehensive support mongodb best sla cloud manager cloud based solution managing mongodb cloud manager automates provisioning aws automation agent installed user mongodb compass allows quickly visualize structure data database perform ad hoc queries – zero knowledge mongodb query language mongodb charts data visualization tool allowing users create graphs charts maps tables json data stored mongodb database mongodb connector bi allows use bi tool choice visualize discover report mongodb data using standard sql queries mongodb world annual developer conference hosted mongodb inc started 2014 mongodb world provides multi-day opportunity communities experts mongodb network learn peers research upcoming trends interesting use cases hear new releases developments mongodb inc. major participants include developers operators cios ctos september 2012 company announced partnership edx offer free mongodb training online 47,000 enrollments first mongodb online education courses 2012 june 2018 1,000,000 course registrations mongodb university addition online education mongodb university offers public training classes well on-site training mongodb inc. known 10gen received funding u.s. government cia-sponsored venture capital arm in-q-tel source concern india
[ 4194, 7043, 9828, 9455 ]
Validation
6,933
9
SuperCollider:supercollider supercollider environment programming language originally released 1996 james mccartney real-time audio synthesis algorithmic composition since evolving system used developed scientists artists working sound efficient expressive dynamic programming language providing framework acoustic research algorithmic music interactive programming live coding released terms gplv2 2002 supercollider free open-source software starting version 3 supercollider environment split two components server scsynth client sclang components communicate using osc open sound control sc language combines object-oriented structure smalltalk features functional programming languages c-family syntax sc server application supports simple c c++ plugin apis making easy write efficient sound algorithms unit generators combined graphs calculations external control server happens via osc possible use languages applications supercollider sound generation bundled optimised command-line executable named scsynth cases controlled within supercollider programming language used independently audio server following features supernova independent implementation server architecture adds multi-processor support explicit parallel grouping synthesis nodes supercollider programming language dynamically typed garbage-collected single-inheritance object-oriented functional language similar smalltalk syntax similar lisp c programming language architecture strikes balance needs realtime computation flexibility simplicity abstract language like many functional languages implements functions first-class objects may composed functions methods default argument values variable length argument lists called order keyword arguments closures lexical scope lexical dynamic features typical functional languages supported including creation closures via partial application explicit currying tail call optimization list comprehensions coroutines specifics include implicit expansion tuples stateless pattern system constant-time message lookup real-time garbage collection allows large systems efficient handle signal processing flexibly supporting methods reflective conversational literate programming supercollider makes relatively easy find new sound algorithms develop custom software well custom frameworks regards domain specific knowledge general e.g. allows represent properties time pitch variable degrees abstraction copious example implementations specific purposes supercollider language allows users construct cross-platform graphical user interfaces applications standard class library user interface components may extended number available frameworks interactive programming system supports programmatic access rich-text code files may used generate vector graphics algorithmically server controlled using open sound control osc variety applications used control server supercollider language environments see typically used osc-aware systems used pure data third-party clients supercollider server exist including rsc3 scheme client hsc3 based haskell scalacollider based scala overtone based clojure sonic pi distinct development environments mentioned provide interface supercollider programming language instead communicate directly audio server provide approaches facilitating user expression supercollider runs macos linux windows freebsd opensuse operating systems multiple language-editing environments clients used supercollider see also demonstrated supercollider run android ios supercollider code commonly edited used within cross-platform ide supports linux mac windows development environments supercollider support include versatile dynamic programming language supercollider used live coding i.e performances involve performer modifying executing code fly specific kinds proxies serve high level placeholders synthesis objects swapped modified runtime environments allow sharing modification objects process declarations networks various extension libraries support different abstraction access sound objects e.g dewdrop_lib allows live creation modification pseudo-classes -objects
[ 2304, 7172, 8964, 4490, 6797, 8958, 9871, 10510, 7571, 9366, 6810, 3876, 5031, 5037, 7983, 823, 1591, 9783, 9023, 8262, 3665, 7128, 7769, 10584, 9565, 10083, 6502, 2670, 7535, 3705, 9210, 2045, 7550 ]
Test
6,934
3
Cub_Linux:cub linux cub linux computer operating system designed mimic desktop appearance functionality chrome os based ubuntu linux lts 14.04 trusty tahr used openbox window manager tools taken lxde gnome xfce well number utilities cloud-centric operating system heavily focused chromium browser cub linux tagline cub chromium ubuntu cub linux originally called chromixium os developer richjack initially announced project ubuntu user forums september 19 2014 since project released first stable version chromixium 1.0 32 bit live iso april 26 2015 followed service pack address number issues screen tearing slow menu generation july 2015 number updates rolled new release version 1.5 initially 32 bit followed 64 bit release november 2015 point towards end 2015 google owns rights chrome os chromium trademarks requested richjack cease use chromixium mark related websites social media presences january 17 2016 richjack announced chromixium would changing name cub linux immediate effect chromixium name would completely dropped 31 march 2016 towards end 2016 cub linux website mysteriously disappeared github page still open user d4zzy involved cub linux development say sudden end cub killed due private life restrictions one time pick july 19 2017 developer feren os announced would bring ing back cub form phoenix linux page updated since release alpha 2 march 2018 jesse smith distrowatch weekly reviewed chromixium os 1.0
[ 8837, 8957, 7435, 10127, 2321, 5397, 4887, 10394, 10016, 673, 3745, 10530, 9253, 10149, 11305, 7854, 7983, 2738, 4790, 439, 56, 59, 7483, 3903, 3649, 4673, 8262, 2375, 4039, 5067, 8907, 1110, 9693, 2914, 4194, 485, 3685, 9064, 4841, 6890,...
Test
6,935
6
SSHFS:sshfs computing sshfs ssh filesystem filesystem client mount interact directories files located remote server workstation normal ssh connection client interacts remote file system via ssh file transfer protocol sftp network protocol providing file access file transfer file management functionality reliable data stream designed extension secure shell protocol ssh version 2.0 current implementation sshfs using fuse rewrite earlier version rewrite done miklos szeredi also wrote fuse sftp provides secure file transfer secure remote file system sftp clients may transfer files directories related file system may mounted locally using sftp alone using sshfs remote file system may treated way volumes cds dvds usb flash drives shared disks using unix command ls sshfs sometimes list owner file correctly although possible map manually distributed remote file systems multiple users protocols apple filing protocol network file system server message block often used sshfs alternative protocols situations users confident files directories targeted writing another user time advantage sshfs compared network file system protocols given user already ssh access host require additional configuration work opening additional entry ports firewall
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 7225, 11323, 8772, 1109, 4708, 10341, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 5293, 7344, 2230, ...
Test
6,936
3
Fast_interrupt_request:fast interrupt request fast interrupt requests fiqs specialized type interrupt request standard technique used computer cpus deal events need processed occur receiving data network card keyboard mouse actions fiqs specific arm cpu architecture supports two types interrupts fiqs fast low latency interrupt handling interrupt requests irqs general interrupts fiq takes priority irq arm system also one fiq source time supported helps reduce interrupt latency interrupt service routine executed directly without determining source interrupt context save required servicing fiq since set banked registers reduces overhead context switching
[ 9964, 3175 ]
Test
6,937
4
Eye_vein_verification:eye vein verification eye vein verification method biometric authentication applies pattern-recognition techniques video images veins user eyes complex random patterns unique modern hardware software detect differentiate patterns distance eyes veins sclera—the white part eyes—can imaged person glances either side providing four regions patterns one side eye verification employs digital templates patterns templates encoded mathematical statistical algorithms allow confirmation identity proper user rejection anyone else advocates eye vein verification note one technology strengths stability pattern eye blood vessels patterns change age alcohol consumption allergies redness eye veins clear enough reliably imaged cameras smartphones technology works contacts glasses though sunglasses least one version eye vein detection uses infrared illumination part imaging allowing imaging even low-light conditions dr. reza derakhshani university missouri kansas city developed concept using veins whites eyes identification holds several patents technology including 2008 patent concept using blood vessels seen whites eye unique identifier recent research explored using vein patterns iris sclera recognition eye vein verification like methods biometric authentication used range security situations including mobile banking government security healthcare environments eyeverify kansas city kansas company markets eye vein verification system called eyeprint 2012 eyeverify licensed technology developed patented derakhshani derakhshani serves chief science officer eyeverify
[ 2737, 10207 ]
Test
6,938
4
Browser_exploit:browser exploit browser exploit form malicious code takes advantage flaw vulnerability operating system piece software intent breach browser security alter user browser settings without knowledge malicious code may exploit activex html images java javascript web technologies cause browser run arbitrary code users whose web browsers fallen victim successful browser exploit may find homepage search page and/or favorites changed signs include internet settings options within browser altered access blocked specific functions redirection incorrectly typed url prefixes multiple ways users protect web browsers falling victim browser exploit things include installing firewall software keeping software updated cautious downloading files opening email attachments unknown sources jailbreakme series browser based exploits used jailbreak apple ios mobile operating system uses exploit browser pdf parser execute unauthorised code gain access underlying operating system
[ 450, 3462, 8200, 6537, 10026, 7482, 5677, 7515, 4883, 2259, 7098, 3643, 4957 ]
Test
6,939
6
Ranish_Partition_Manager:ranish partition manager ranish partition manager freeware hard disk partition editor disk cloning utility boot manager gives high level control creating multi-boot systems available freeware live cd systemrescuecd ultimate boot cd windows version runs ms-dos pc dos dr-dos freedos rpm create bit-identical partition clones see speed rpm runs instantly following aside tools run regularly used operating system rpm one fastest ways partition hard disk restore clone move operating system rpm updated many years unknown whether works dynamic disk large sector drive quirks display problems occur using drives much larger rpm written ranish partition manager used create manual backup primary partition table extended partition table using rpm possible convert logical drives primary partitions rpm done deleting logical drive moving beginning extended partition type 0x0f forward recreating primary partition location logical drive saving changes process reversed convert primary partition logical drive however conversions partition must deviate standard chs alignment logical drives usually start second head head 1 primary partitions usually start beginning cylinder modern operating systems probably would problems reading editing files converted drive software used re-sizing imaging partitions may decide silently correct partition moving beginning partition perhaps conform standard chs alignment conform 1-mib alignment re-sizing would prevent windows xp booting might prevent windows vista booting starting sector moved without updating vista boot files secondly user unaware partition moved may realize old backup partition table obsolete however another possible problem converting primary partitions logical drives unless primary partitions made purpose windows xp disk management known delete nonstandard extended partitions must least 63 sectors primary partition allocate ebr order make conversion reasons may preferable primary partition may converted extended partition start head 1 instead beginning cylinder space beginning cylinder head 1 free space previous partition end end last complete cylinder end earlier cylinder starting primary partitions head 1 instead head 0 another advantage allows bit-identical cloning primary partitions logical drives making completely normal usual logical drives ebrs logical drives beginning cylinder logical drive begins next head logical drive ends cylinder boundary however author tested installing booting operating systems primary partitions beginning head 1 first partition first partition usually begins head 1 cylinder begins master boot record like graphical partition editors gparted sector-precise meaning show numbers sectors cylinders partitions created however things rpm gparted resize partitions data ntfs fat etc format ntfs partitions although rpm able format fat partitions windows xp error partition formatted rpm ranish partition manager gnu parted parted display partitions one chs format sector precise parted show locations ebrs values contain linux information displayed using codice_1 format requires scrutinizing n't indicate errors/warnings color rpm unlike command line tools parted sfdisk rpms text user interface allows user move cursor anywhere partition table select values change parted riskier less efficient use saves every change soon made takes time update certain things rpm create partitions manually using wizard
[ 292, 9166, 2193, 178, 3315, 3859, 4563, 2744, 8857, 1150 ]
None
6,940
2
Hero_of_Sparta:hero sparta hero sparta action-adventure game developed published spanish studio gameloft iberica ios nintendo ds android playstation portable hd version also released ios android symbian devices versions removed play store game available android devices gameloft official website game follows storyline set ancient greece wherein player controls protagonist throughout multiple landscapes fighting mythical beasts game moderately well received critics game consists eight levels five ds version player controls spartan king wielding sword fighting various mythical beasts player collect different-colored orbs defeating enemies color corresponding different effect green orbs restore health blue restore magical energy red orbs grant experience points used upgrade damage special powers weapons found throughout course game versions game upgrading weapons maximum capacities cause take ultimate form game features real-time events called focus kills occur certain enemies nearly defeated player prompted input series controls tap screen perform finishing blow enemy successful focus kills award player orbs cases player required perform focus kills defeat bosses story centers around spartan king argos awakens beach shortly entire fleet ships wiped violent storm exploring island spirit oracle apparently held captivity pleads argos rescue exchange oracle offers use power return argos homeland game directly compared god war franchise even called shameless god war rip-off sequel hero sparta ii released july 29 2010
[ 10330, 7029, 11254 ]
None
6,941
2
Nagare_(web_framework):nagare web framework nagare free open-source web framework developing web applications stackless python nagare uses component model inspired seaside like seaside nagare uses continuations provide framework http connectionless request response cycle n't break normal control flow application allows web applications developed much way desktop applications rapid application development however nagare written python rather smalltalk
[ 1920, 3462, 8582, 2062, 9614, 148, 1812, 9245, 10526, 8739, 3876, 4777, 7980, 5165, 4529, 7987, 692, 8883, 5048, 6074, 9666, 8644, 1353, 595, 4056, 6493, 102, 8554, 8691, 119, 3705, 11259 ]
None
6,942
3
Advanced_RISC_Computing:advanced risc computing advanced risc computing arc specification promulgated defunct consortium computer manufacturers advanced computing environment project setting forth standard mips risc-based computer hardware firmware environment although ace went defunct computer ever manufactured fully complied arc standard arc system widespread legacy windows nt family operating systems use arc conventions naming boot devices sgi uses modified version arc firmware calls arcs systems sgi computers run irix 6.1 later indy octane boot arcs console uses drive naming conventions windows accordingly addition various risc-based computers designed run windows nt used versions arc boot console boot nt include following predicted intel ia-32-based computers would adopt arc console although sgi ever marketed machines arc firmware namely sgi visual workstation series launched 1999 products complying degree arc standard include
[ 5380, 9742, 7311, 8976, 2452, 9723, 408, 7215, 11058, 7093, 2811, 7234, 10051, 3142, 6854, 5076, 6879, 3945, 3818, 5873, 3323, 8700, 11007 ]
Test
6,943
7
Presto_(SQL_query_engine):presto sql query engine presto high performance distributed sql query engine big data architecture allows users query variety data sources hadoop aws s3 alluxio mysql cassandra kafka mongodb one even query data multiple data sources within single query presto community driven open-source software released apache license presto originally designed developed facebook data analysts run interactive queries large data warehouse apache hadoop presto data analysts facebook relied apache hive running sql analytics multi petabyte data warehouse hive inadequate facebook scale presto invented fill gap run fast queries original development started 2012 deployed facebook later year november 2013 facebook announced release open source 2013 2014 netflix disclosed used presto 10 petabytes data stored amazon simple storage service s3 january 2019 presto software foundation announced foundation not-for-profit organization dedicated advancement presto open source distributed sql query engine development presto continues independently prestodb maintained facebook prestosql maintained presto software foundation cross pollination code presto ’ architecture similar classic database management system using cluster computing mpp visualized one coordinator node working sync multiple worker nodes clients submit sql statements get parsed planned following parallel tasks scheduled workers workers jointly process rows data sources produce results returned client compared original apache hive execution model used hadoop mapreduce mechanism query presto write intermediate results disk resulting significant speed improvement presto written java programming language single presto query combine data multiple sources presto offers connectors data sources including files alluxio hadoop distributed file system amazon s3 mysql postgresql microsoft sql server amazon redshift apache kudu apache phoenix apache kafka apache cassandra apache accumulo mongodb redis unlike hadoop distribution-specific tools cloudera impala presto work flavor hadoop without presto supports separation compute storage may deployed premises cloud
[ 11030, 8217, 10661, 5677, 10413, 7983, 7347, 5047, 5691, 11201, 1222, 5960, 11343, 8539, 990, 4194, 11111, 5612, 7022, 2163, 7288 ]
None
6,944
7
Multisite_cloud:multisite cloud multisite cloud cloud composed several single sites data centers different providers explicitly accessible cloud users multisite cloud environment tasks program workflow scheduled order achieve efficient processing
[]
Test
6,945
4
Aloysius_Cheang:aloysius cheang aloysius cheang managing director apac cloud security alliance another role standards secretariat overseeing standardization efforts within csa cloud security alliance owning relationships sdos aloysius former member singapore government chief security officer roundtable founder sig^2 2001 also held senior executive positions various consulting companies telco worldwide remit sig^2 rose become de facto security community asia lead formalisation singapore government-backed association information security professionals aisp cheang pro tem chairman 2006–2007 also co-editor iso/iec 27032 guidelines cybersecurity represented singapore iso/iec/jtc 1 sc 27 wg4 previous contribution ss 507 “ business continuity/disaster recovery industry standard ” adopted iso/iec 24762 cheang sits singapore standards committee national infocomm competency framework security sub-committee cheang professional certifications include cisa cissp gcih first microsoft security mvp south asia member microsoft sea mvp hall fame views presented times asia cio asia zdnet computerworld new paper mypaper sin chew daily wen wei po straits times channelnewsasia independent source specialist opinion
[ 997 ]
Test
6,946
5
OFTP:oftp odette file transfer protocol oftp protocol created 1986 used edi electronic data interchange two communications business partners name comes odette organisation organization data exchange teletransmission europe odette file transfer protocol odette-ftp defined 1986 working group four organisation data exchange tele-transmission europe odette address electronic data interchange edi requirements european automotive industry designed spirit open system interconnection osi model utilising network service provided ccitt x.25 recommendation oftp 2 written 2007 data interchange specification secure transfer business documents internet isdn x.25 networks description oftp 1.3 found rfc 2204 whilst oftp 2 defined rfc 5024 oftp 2 work point-to-point indirectly via van value added network single oftp 2 entity make receive calls exchanging files directions means oftp 2 work push pull mode opposed as2 work push mode oftp 2 encrypt digitally sign message data request signed receipts also offers high levels data compression services available using oftp 2 tcp/ip x.25/isdn native x.25 used tcp/ip network internet additional session level security available using oftp 2 tls transport layer security
[ 2432, 6993 ]
Test
6,947
2
Valerie_Aurora:valerie aurora valerie anita aurora software engineer feminist activist co-founder ada initiative non-profit organization sought increase women participation free culture movement open source technology open source culture aurora also known within linux community advocating new developments filesystems linux including chunkfs union file system birth name val henson changed shortly 2009 choosing middle name computer scientist anita borg 2012 aurora ada initiative co-founder mary gardiner named two influential people computer security sc magazine 2013 o'reilly open source award aurora raised new mexico home-schooled became involved computer programming attended def con 1995 studied computer science mathematics new mexico institute mining technology first became involved file systems worked zfs 2002 sun microsystems later moved ibm worked group theodore ts considered extensions ext2 ext3 linux file systems working intel implemented ext2 dirty bit relative atime along arjan van de ven came idea chunkfs simplifies file system checks dividing file system independent pieces also co-organized first linux file systems workshop order figure spread awareness raise funding file system development 2009 worked red hat file systems developer well part-time science writer linux consultant already activist women open source joined mary gardiner members geek feminism blog develop anti-harassment policies conferences noirin shirley sexually assaulted apachecon 2010 aurora quit job linux kernel developer red hat gardiner founded ada initiative february 2011 organization named ada lovelace worked charles babbage considered world first computer programmer two years later aurora founded double union hackerspace women amelia greenhall liz henry banned 2018 ada initiative shut october 2015 maintaining blog since 2007 aurora written extensively coding experiences women open source included descriptions def con harassment took place 2013 aurora provided comment verge electronic frontier foundation involvement legal defense andrew auernheimer prison hacking previously harassed kathy sierra aurora said another case 're saying 'the cases care ones white men interested ’ less interested protecting women web comment received negatively eff director international freedom expression jillian york another 2013 controversy received commentary aurora donglegate pycon attendee adria richards faced backlash reporting conversation overheard two men sitting near aurora condemned threats sent richards stated anonymous using large numbers computers distorting social pressure asked firing one males appropriate response said n't enough information know two years later aurora praised gender ratio pycon called guido van rossum python community biggest success story women open source interview approved culture website tumblr stated linus torvalds daughter patricia positive role-model
[ 1026, 5644, 4367, 8848, 657, 10642, 1939, 2197, 2581, 2199, 3478, 6808, 7450, 10774, 6302, 7584, 802, 5410, 6691, 8354, 5931, 8364, 10670, 1717, 823, 441, 2109, 11069, 10687, 9665, 10822, 8263, 843, 589, 6352, 4177, 11602, 8787, 11643, 44...
None
6,948
8
Information_and_Content_Exchange:information content exchange information content exchange ice xml-based protocol used content syndication via internet using xml sender receiver agreed-upon language communicate using client–server architecture ice defines syndicate/subscribe model comparable binary publish/subscribe protocol standards used corba dcom however ice messages delivered xml typically http connection rather lower-level binary protocol first standard specifically web syndication ice proposed firefly networks vignette january 1998 two companies ceded control specification ice consortium consisted authoring group advisory council ice authoring group included microsoft adobe sun cnet national semiconductor tribune media services ziff davis reuters amongst others limited thirteen companies ice advisory council included nearly hundred members ice submitted world wide web consortium standards body october 26 1998 showcased press event day standard failed benefit open-source implementation w3c xml specifications often received version 1.1 protocol published july 1 2000 version 2.0 featured improved web service support released august 1 2004 versions appeared since vignette demo version ice-capable server named site-to-site february 1998 aiming show protocol could facilitate content exchange websites site-to-site initially scheduled release summer 1998 launched name vignette syndication server february 22 1999 syndication server vignette became primary ice vendor june 1999 vignette invested 14 million leading web syndicator isyndicate adopt vignette storyserver development isyndicate website part deal isydicate committed making content available ice protocol comparable xml specifications include wddx nitf xmlnews newsml prism well cdf rss atom open content syndication ocs twice java implementation ice 2.0 rice ruby implementation ice 1.1 twice rice developed maintained jim menard icecubes original java reference implementation ice 1.1 although actively maintained since december 2000
[ 9665, 10020, 10024, 2222, 124, 479 ]
Validation
6,949
3
Gekko_(microprocessor):gekko microprocessor gekko superscalar out-of-order 32-bit powerpc microprocessor custom-made ibm 2000 nintendo use cpu sixth generation game console nintendo gamecube later triforce arcade board gekko role game system facilitate game scripting artificial intelligence physics collision detection custom graphics lighting effects geometry smooth transformations moving graphics data system project announced 1999 ibm nintendo agreed one billion dollar contract cpu running approximately 400 mhz ibm chose modify existing powerpc 750cxe processor suit nintendo needs tight balanced operation alongside flipper graphics processor customization bus architecture dma compression floating point unit support special set simd instructions cpu made ground work custom lighting geometry effects could burst compressed data directly gpu gekko considered direct ancestor broadway processor also designed manufactured ibm powers wii console
[ 6914, 7170, 4868, 10501, 3846, 4743, 6663, 5642, 1548, 1933, 398, 6926, 3472, 4881, 659, 7065, 1563, 1309, 6815, 10784, 10658, 3493, 8102, 6311, 4136, 1321, 9391, 10543, 4017, 5297, 1461, 8120, 6715, 9020, 1725, 1983, 1985, 10180, 6981, 2...
None
6,950
3
Von_Neumann_architecture:von neumann architecture von neumann architecture—also known von neumann model princeton architecture—is computer architecture based 1945 description mathematician physicist john von neumann others first draft report edvac document describes design architecture electronic digital computer components term von neumann architecture evolved mean stored-program computer instruction fetch data operation occur time share common bus referred von neumann bottleneck often limits performance system design von neumann architecture machine simpler harvard architecture machine—which also stored-program system one dedicated set address data buses reading writing memory another set address data buses fetch instructions stored-program digital computer keeps program instructions data read-write random-access memory ram stored-program computers advancement program-controlled computers 1940s colossus eniac programmed setting switches inserting patch cables route data control signals various functional units vast majority modern computers use memory data program instructions von neumann vs. harvard distinction applies cache architecture main memory split cache architecture earliest computing machines fixed programs simple computers still use design either simplicity training purposes example desk calculator principle fixed program computer basic mathematics run word processor games changing program fixed-program machine requires rewiring restructuring redesigning machine earliest computers much programmed designed particular task reprogramming —when possible all—was laborious process started flowcharts paper notes followed detailed engineering designs often-arduous process physically rewiring rebuilding machine could take three weeks set debug program eniac proposal stored-program computer changed stored-program computer includes design instruction set store memory set instructions program details computation stored-program design also allows self-modifying code one early motivation facility need program increment otherwise modify address portion instructions operators manually early designs became less important index registers indirect addressing became usual features machine architecture another use embed frequently used data instruction stream using immediate addressing self-modifying code largely fallen favor since usually hard understand debug well inefficient modern processor pipelining caching schemes large scale ability treat instructions data makes assemblers compilers linkers loaders automated programming tools possible makes programs write programs possible made sophisticated self-hosting computing ecosystem flourish around von neumann architecture machines high level languages leverage von neumann architecture providing abstract machine-independent way manipulate executable code runtime e.g. lisp using runtime information tune just-in-time compilation e.g languages hosted java virtual machine languages embedded web browsers smaller scale repetitive operations bitblt pixel vertex shaders accelerated general purpose processors just-in-time compilation techniques one use self-modifying code remained popular mathematician alan turing alerted problem mathematical logic lectures max newman university cambridge wrote paper 1936 entitled computable numbers application entscheidungsproblem published proceedings london mathematical society described hypothetical machine called universal computing machine known universal turing machine hypothetical machine infinite store memory today terminology contained instructions data john von neumann became acquainted turing visiting professor cambridge 1935 also turing phd year institute advanced study princeton new jersey 1936 – 1937 whether knew turing paper 1936 time clear 1936 konrad zuse also anticipated two patent applications machine instructions could stored storage used data independently j. presper eckert john mauchly developing eniac moore school electrical engineering university pennsylvania wrote stored-program concept december 1943 von neumann involved manhattan project los alamos national laboratory required huge amounts calculation drew eniac project summer 1944 joined ongoing discussions design stored-program computer edvac part group wrote description titled first draft report edvac based work eckert mauchly unfinished colleague herman goldstine circulated von neumann name consternation eckert mauchly paper read dozens von neumann colleagues america europe influenced next round computer designs jack copeland considers historically inappropriate refer electronic stored-program digital computers 'von neumann machines los alamos colleague stan frankel said von neumann regard turing ideas time first draft report circulated turing producing report entitled proposed electronic calculator described engineering programming detail idea machine called automatic computing engine ace presented executive committee british national physical laboratory february 19 1946 although turing knew wartime experience bletchley park proposed feasible secrecy surrounding colossus subsequently maintained several decades prevented saying various successful implementations ace design produced von neumann turing papers described stored-program computers von neumann earlier paper achieved greater circulation computer architecture outlined became known von neumann architecture 1953 publication faster thought symposium digital computing machines edited b. v. bowden section chapter computers america reads follows machine institute advanced studies princeton 1945 professor j. von neumann working moore school engineering philadelphia e.n.i.a.c built issued behalf group co-workers report logical design digital computers report contained detailed proposal design machine since become known e.d.v.a.c electronic discrete variable automatic computer machine recently completed america von neumann report inspired construction e.d.s.a.c electronic delay-storage automatic calculator cambridge see page 130 1947 burks goldstine von neumann published another report outlined design another type machine parallel machine time would exceedingly fast capable perhaps 20,000 operations per second pointed outstanding problem constructing machine development suitable memory instantaneously accessible contents first suggested using special vacuum tube—called selectron —which princeton laboratories rca invented tubes expensive difficult make von neumann subsequently decided build machine based williams memory machine—completed june 1952 princeton—has become popularly known maniac design machine inspired least half dozen machines built america known affectionately johniacs book first two paragraphs chapter ace read follows automatic computation national physical laboratory one modern digital computers embodies developments improvements technique automatic electronic computing recently demonstrated national physical laboratory teddington designed built small team mathematicians electronics research engineers staff laboratory assisted number production engineers english electric company limited equipment far erected laboratory pilot model much larger installation known automatic computing engine although comparatively small bulk containing 800 thermionic valves judged plates xii xiii xiv extremely rapid versatile calculating machine basic concepts abstract principles computation machine formulated dr. a. m. turing f.r.s. paper read london mathematical society 1936 work machines britain delayed war 1945 however examination problems made national physical laboratory mr. j. r. womersley superintendent mathematics division laboratory joined dr. turing small staff specialists 1947 preliminary planning sufficiently advanced warrant establishment special group already mentioned april 1948 latter became electronics section laboratory charge mr. f. m. colebrook first draft described design used many universities corporations construct computers among various computers illiac ordvac compatible instruction sets date information following chronology difficult put proper order dates first running test program dates first time computer demonstrated completed dates first delivery installation decades 1960s 1970s computers generally became smaller faster led evolutions architecture example memory-mapped i/o lets input output devices treated memory single system bus could used provide modular system lower cost sometimes called streamlining architecture subsequent decades simple microcontrollers would sometimes omit features model lower cost size larger computers added features higher performance shared bus program memory data memory leads von neumann bottleneck limited throughput data transfer rate central processing unit cpu memory compared amount memory single bus access one two classes memory time throughput lower rate cpu work seriously limits effective processing speed cpu required perform minimal processing large amounts data cpu continually forced wait needed data move memory since cpu speed memory size increased much faster throughput bottleneck become problem problem whose severity increases every new generation cpu von neumann bottleneck described john backus 1977 acm turing award lecture according backus surely must less primitive way making big changes store pushing vast numbers words back forth von neumann bottleneck tube literal bottleneck data traffic problem importantly intellectual bottleneck kept us tied word-at-a-time thinking instead encouraging us think terms larger conceptual units task hand thus programming basically planning detailing enormous traffic words von neumann bottleneck much traffic concerns significant data find several known methods mitigating von neumann performance bottleneck example following improve performance problem also sidestepped somewhat using parallel computing using example non-uniform memory access numa architecture—this approach commonly employed supercomputers less clear whether intellectual bottleneck backus criticized changed much since 1977 backus proposed solution major influence modern functional programming object-oriented programming much less geared towards pushing vast numbers words back forth earlier languages like fortran internally still computers spend much time even highly parallel supercomputers 1996 database benchmark study found three four cpu cycles spent waiting memory researchers expect increasing number simultaneous instruction streams multithreading single-chip multiprocessing make bottleneck even worse context multi-core processors additional overhead required maintain cache coherence processors threads aside von neumann bottleneck program modifications quite harmful either accident design simple stored-program computer designs malfunctioning program damage programs operating system possibly leading computer crash memory protection forms access control usually protect accidental malicious program modification
[ 7170, 7173, 6664, 9739, 2066, 7699, 5655, 10779, 10781, 6181, 8231, 3630, 6705, 5682, 7218, 1591, 2619, 2623, 2113, 7234, 3142, 2638, 1122, 3175, 3178, 3693, 8815, 630, 8822, 6268, 3197, 7313, 6815, 8352, 5793, 6818, 4773, 6821, 7852, 939...
Test
6,951
5
WebRTC_Gateway:webrtc gateway webrtc gateway connects webrtc established voip technology sip webrtc web real-time communication api definition drafted world wide web consortium w3c supports browser-to-browser applications voice calling video chat messaging without need either internal external plugins enable browsers using different application providers communicate e.g user logged application providers x wants call someone logged application provider so-called webrtc trapezoid used case two providers use widely used voip signalling protocol sip federate however respective browser-based clients signals server using proprietary application protocols built top http websocket component mediates webrtc sip referred webrtc gateway beside connecting different webrtc applications webrtc gateway also enables communication webrtc phone voip even pstn phone thereby webrtc gateway extends scope webrtc applications enables much wider reach usage scenarios usual process webrtc user downloads webrtc javascript application application used communicate another user webrtc gateway would usually contain server user would download webrtc javascript application receiving call user webrtc gateway needs decide whether callee reachable webrtc call translated sip example translate call sip gateway map different layers already number open source commercial solutions available providing webrtc gateway functionality lot required functionality webrtc gateway media handling signalling mapping supported sbc function webrtc gateway often integrated sbcs provided sbc vendors
[ 9381, 3462, 9834, 10924, 7214, 5972, 11413, 124, 10271 ]
None
6,952
0
Variable_rules_analysis:variable rules analysis linguistics variable rules analysis set statistical analysis methods commonly used sociolinguistics historical linguistics describe patterns variation alternative forms language use also sometimes known varbrul analysis name software package dedicated carrying relevant statistical computations varbrul variable rule method goes back theoretical approach developed sociolinguist william labov late 1960s early 1970s mathematical implementation developed henrietta cedergren david sankoff 1974 variable rules analysis designed provide quantitative model situation speakers alternate different forms meaning stand free variation way probability choice either one form conditioned variety context factors social characteristics situation variation entirely random rule-governed also known structured variation variable rules analysis computes multivariate statistical model basis observed token counts determining factor assigned numerical factor weight describes influences probabilities choice either form done means stepwise logistic regression using maximum likelihood algorithm although necessary computations required variable rules analysis carried help mainstream general-purpose statistics software packages spss often done means specialised software dedicated needs linguists called varbrul originally written david sankoff currently exists freeware implementations mac os microsoft windows title goldvarb x also versions implemented statistical language r therefore available platforms include r-varb rbrul variable rules approaches commonly employed analysis data sociolinguistic research especially studies aim investigate reflexes linguistic change time appear shape structured variation patterns within speech community
[ 5833, 5450, 6797 ]
Validation
6,953
1
Object-based_spatial_database:object-based spatial database object-based spatial database spatial database stores location objects object-based spatial model treats world surface littered recognizable objects e.g cities rivers exist independent locations objects simple polygons lines complex represent cities field-based data model sees world continuous surface features e.g elevation vary using object-based spatial database easier store additional attributes objects direction speed etc using attributes make easier answer queries like find tanks whose speed 10 km oriented north find enemy tanks certain region storing attributes objects provide better result presentation improved manipulation capabilities efficient way field-based data model information usually stored different layers harder extract different information various layers data model applied er germ model giser s.shekhar introduces direction spatial object presents solution object-direction-based queries common representations data model follow open-source software program adds support geographic objects postgresql object-relational database postgis follows simple features sql specification open geospatial consortium provides uml representation geographic applications represent concept field object provides way differentiate spatial relation simple association represents framework objects classes partitioned three kinds classes simple classes link classes path classes objects simple class one hand like objects models object type object identity attributes whose values either data type e.g integer string object type attribute may contain reference another object structure object basically tuple record hand objects simple class nodes database graph – whole database also viewed single graph objects link class like objects simple class additionally contain two distinguished references source target objects belonging simple classes makes edges database graph finally object path class like object simple class contains additionally list references node edge objects form path database graph represent data model store geographic information top eer model geis define input data model provide following data model geometry giser model geometry entity related spatial object relationship determines shape additional entities represent primitives points lines polygons proposed related models topology topology property belonging spatial object property remains unaltered even object deforms example road network two nodes network thus remain connected even path nodes changed road construction order represent topology basic primitives networks i.e. graphs partitions provided additional primitives added lines worboy model system support representation stored data oracle spatial component enterprise oracle 10g provides support stores object road top current implentend construction used network data model store geographic data nodes links graph representation node links set attributes example route object added database supports raster set vector representation
[ 8201, 1146, 580, 3454 ]
Validation
6,954
4
Collision_attack:collision attack cryptography collision attack cryptographic hash tries find two inputs producing hash value i.e hash collision contrast preimage attack specific target hash value specified roughly two types collision attacks generally mathematically stated collision attack finds two different messages m1 m2 hash m1 hash m2 classical collision attack attacker control content either message arbitrarily chosen algorithm much like symmetric-key ciphers vulnerable brute force attacks every cryptographic hash function inherently vulnerable collisions using birthday attack due birthday problem attacks much faster brute force would hash n bits broken 2 time evaluations hash function efficient attacks possible employing cryptanalysis specific hash functions collision attack discovered found faster birthday attack hash function often denounced broken nist hash function competition largely induced published collision attacks two commonly used hash functions md5 sha-1 collision attacks md5 improved much 2007 takes seconds regular computer hash collisions created way usually constant length largely unstructured directly applied attack widespread document formats protocols however workarounds possible abusing dynamic constructs present many formats way two documents would created similar possible order hash value one document would shown authority signed signature could copied file malicious document would contain two different messages document conditionally display one subtle changes file extension collision attack chosen-prefix collision attack specific merkle–damgård hash functions case attacker choose two arbitrarily different documents append different calculated values result whole documents equal hash value attack much powerful classical collision attack mathematically stated given two different prefixes p1 p2 attack finds two appendages m1 m2 hash p1 ∥ m1 hash p2 ∥ m2 ∥ concatenation operation 2007 chosen-prefix collision attack found md5 requiring roughly 2 evaluations md5 function paper also demonstrates two x.509 certificates different domain names colliding hash values means certificate authority could asked sign certificate one domain certificate specially signature could used create new rogue certificate impersonate another domain real-world collision attack published december 2008 group security researchers published forged x.509 signing certificate could used impersonate certificate authority taking advantage prefix collision attack md5 hash function meant attacker could impersonate ssl-secured website man-in-the-middle thereby subverting certificate validation built every web browser protect electronic commerce rogue certificate may revokable real authorities could also arbitrary forged expiry time even though md5 known weak 2004 certificate authorities still willing sign md5-verified certificates december 2008 least one microsoft code-signing certificate still using md5 may 2012 flame malware successfully used new variation chosen-prefix collision attack spoof code signing components microsoft root certificate still used compromised md5 algorithm 2019 researchers found chosen-prefix collision attack sha-1 computing complexity 2 2 cost less 100,000 us dollars many applications cryptographic hash functions rely collision resistance thus collision attacks affect security example hmacs vulnerable attack useful attacker must control input hash function digital signature algorithms sign large amount data efficiently implementations use hash function reduce compress amount data needs signed constant size digital signature schemes often vulnerable hash collisions unless using techniques like randomized hashing usual attack scenario goes like 2008 researchers used chosen-prefix collision attack md5 using scenario produce rogue certificate authority certificate created two versions tls public key certificate one appeared legitimate submitted signing rapidssl certificate authority second version md5 hash contained flags signal web browsers accept legitimate authority issuing arbitrary certificates 2003 denial service dos attack described used hash collisions exploit worst-case runtime hash table lookups issue affected major programming languages used weaker hash functions
[ 5764, 517, 7556, 3984, 9744, 660, 1941, 3477, 161, 4389, 8627, 8628, 2357, 9271, 11584, 9170, 212, 6238, 8674, 11639, 6905 ]
Validation
6,955
3
Plinian_Core:plinian core plinian core set vocabulary terms used describe different aspects biological species information biological species information kinds properties traits related taxa—biological non-biological—are included thus instance terms pertaining descriptions legal aspects conservation management demographics nomenclature related resources incorporated plinian core aimed facilitate exchange information species upper taxa scope scope plinian core design requirements includes ease use self-contained able support data integration multiple databases ability handle different levels granularity core terms grouped current version follows plinian core started collaborative project instituto nacional de biodiversidad gbif spain 2005 series iterations elements defined implanted different projects resulted plinian core flat deprecated result new development impulse overcome 2012 new formal requirements additional input better support standard documentation well align processes tdwg world reference body biodiversity information standards new version plinian core v3.x.x defined provides flexibility fully represent information species variety scenarios new elements deal aspects ipr related resources referenced etc introduced elements already included better-defined documented partner development plinian core new phase incorporated university granada ug spain alexander von humboldt institute iavh colombia national commission knowledge use biodiversity conabio mexico university são paulo usp brazil plinian core task group within tdwg interest group species information constituted currently working development plinian core presented levels abstract model application profiles abstract model comprising abstract model schema xsd terms uris normative part comprehensive allows different levels granularity describing species properties taken menu choose terms level detail needed specific project subsets abstract model intended implemented specific projects application profiles aps besides containing part elements aps impose additional specifications included elements controlled vocabularies examples aps use follow plinian incorporates number elements already defined standards following table summarizes standards elements used plinian core
[ 9669 ]
Validation
6,956
3
Darwin_4078:darwin 4078 game takes place within gigantic spaceship virtually infinite capacity ability manipulate time space player must deal enigmatic creatures called evol consist pure energy need keep capsules order maintain existence world characters game designed resemble microscopic organisms appearance quick tricky movements player ship undergoes 10 types transformations throughout game offensive defensive maneuvers specific design sound effects used minimal different types sounds used according type shots speed sound resembling long scream results player ship hit returns weakest evolutionary state game designer graphic designer music composer tomo furukawa would go become vocalist band guniw tools player must progress 16 different levels defeating boss end level player controls ship using 8-way joystick 2 buttons one button targets enemies air targets enemies ground power player ship increases evolves two broad categories define enemies attack first type shoots forward direction constant speed second type shoots bullets travel different speeds depending distance player ship bullets travel quicker player farther away slower player close made staying away enemies would necessarily make easier avoid attacks game difficulty also change time enemies become stronger player ship evolves style continued game sequel player reaches 2,000,000 points gain bonus 2,000,000 points bonus 3,000,000 points reach 3,000,000 points bonus system allows player reach 10,000,000 points gaining 5,000,000 points game counter display digits ten millions destroying 16 ground enemies row desert level extends gameplay without insert additional credits biggest characteristic game evolution player ship ship starts form called beas evolves player collects evol capsules appear certain enemies killed player ship grows size strength evolves certain forms may difficult use effectively player must pace evolution properly order succeed 19 different evolutionary forms total ship attacks target airborne enemies gradually increase strength ship evolves attacks enemies ground improved way hitting airborne enemies certain number shots causes get knocked player ship dock enemies short period time knocked ship attacks enemies ground increase strength period however ground enemies killed power-up power-ups exist attacks enemies ground giant version zanzō knocked player use improve ground attack players must collect evol capsules frequently order advance strongest evolutionary forms failing collect capsules certain period time causes ship gradually devolve one level time however devolution timer stopped ship docked enemy character explained player ship devolves weakest form pister one rank beas hit enemy attack apply ship black deame suppurate forms farther ship evolutionary chain gets hit longer animation ship devolve though coming contact enemies normally results instant loss ship invincible devolution animation lasts player may kill enemies ramming player loses ship hit enemy attack weakest evolutionary form pister crash enemy ship devolving several evolutionary forms achieved gathering capsules mutation occurs player hit enemy attack certain evolutionary stage devolve time certain evolutionary stage ship attacks become highly stylized powerful used effectively reverse evolution another special form occurs player hit enemy attack specific set normal evolutions reverse evolutionary form black deame bat-like bears completely different appearance forms ship unaffected enemy attacks packs extraordinary amount firepower shoots numerous smaller versions main attack however player fails collect evol capsule allotted period time ship immediately devolves weakest form making transformation double-edged sword impossible maintain black deame form throughout game docking enemies since attack power powerful enemies die instantly rather knocked darwin 4078 ported 2nd generation msx 1987 hudson soft bore similar appearance arcade game b-wings nes game hector '87 sequel titled also written s.r.d released data east 1987 ported sega april 8 1990 sega mega drive darwin 4081 direct sequel game bears similarities darwin side-scrolling action game developed data east uses evolution system darwin 4081 numbered 4081 4th game used evolution system darwin 4078 s.r.d 4079 act-fancer 4080 similar games include bio-ship paladin upl bermuda triangle snk also feature ships change appearance power-ups
[ 1776, 10931, 9006 ]
None
6,957
3
MCST-R500S:mcst-r500s mcst r500s 32-bit system-on-a-chip developed moscow center sparc technologies mcst fabricated tsmc
[ 4386, 6659, 7234, 9861, 2503, 7687, 5358, 1776, 1425, 499, 1399, 2490, 2523, 11580, 9309 ]
None
6,958
9
SenseTalk:sensetalk sensetalk english-like scripting language derived hypertalk language used hypercard sensetalk originally developed scripting language within hypersense multimedia authoring application nextstep openstep platforms sensetalk resurfaced 2002 scripting language eggplant first commercial mac os x cross-platform gui testing application sensetalk english-like scripting language xtalk family derived hypertalk advanced programming language extensions number features distinguish sensetalk xtalk languages one inclusion lists property lists first class data structures another inclusion objects sensetalk treats script property list object encapsulating properties behaviors sensetalk include concept object classes instead treats every object equally object inherit behavior object objects multiple inheritance supported
[ 9185, 4486, 7307, 4844, 7983, 9780, 4571 ]
Validation
6,959
1
Data_event:data event data event relevant state transition defined event schema typically event schemata described pre- post condition single set data items contrast eca event condition action considers event signal data event refers change signal describes specific state transitions referred eca conditions considering data events relevant data item state transitions allows defining complex event-reaction schemata database defining data event schemata relational databases limited attribute instance events object-oriented databases also support collection properties allows defining changes collections data events
[ 6784, 5850, 9286 ]
Test
6,960
0
Shlomo_Argamon:shlomo argamon shlomo argamon american/israeli computer scientist forensic linguist currently tenured professor computer science director master data science program illinois institute technology chicago il shlomo argamon received b.s applied mathematics carnegie-mellon university m.phil ph.d. computer science yale university supervised drew mcdermott spent two years postdoctoral research fulbright foundation fellowship sarit kraus bar-ilan university ramat gan israel since late 1990s argamon worked primarily computational linguistic analysis non-denotational meaning including computational analysis language stylistics sentiment analysis metaphor analysis also published well-cited research active learning machine learning metalearning robotic mapping argamon best known work computational stylistics particularly author profiling together moshe koppel others shown statistical analysis word usage determine author age sex native language personality type high accuracy english-language texts work also shown textual features indicating differences male female authorship consistent languages across time also developed computational stylistic methods provide insights meaning stylistic differences one argamon key innovations purpose development computational stylistic analysis using systemic functional linguistics example together jeff dodick paul chase examined whether clear consistent differences scientific method experimental sciences historical sciences work showed using systemic functional features computational stylistic analysis provides evidence multiple scientific methodologies sorts posited previously philosophers science recently argamon pushed increased use linguistic analysis attribution cybersecurity attacks pointed linguistic attribution techniques often used good effect natural language texts arise different attack scenarios provided analyses high-profile cases sony pictures hack democratic national committee cyber attacks shadow brokers nsa leak 2013 argamon founded illinois institute technology master data science program currently directs program seeks teach students think real problems need solved simply find technical solutions argamon views data scientists sensemakers whose job merely produce analytic results help clients make sense complex uncertain fast-changing world rigorous analysis explanation data
[ 8288, 1890 ]
None
6,961
6
Fusion-io_NVMFS:fusion-io nvmfs sandisk/fusion-io nvmfs file system formerly known direct file system dfs accesses flash memory via virtual flash storage layer instead using traditional block layer api file system two main novel features first lays files directly large virtual storage address space second leverages virtual flash storage layer perform block allocations atomic updates result nvmfs performs better much simpler traditional unix file system similar functionalities additionally approach avoids log-on-log performance issues triggered log-structured file systems microbenchmark results show nvmfs deliver 94,000 i/o operations per second iops direct reads 71,000 iops direct writes virtualized flash storage layer top first-generation fusion-io iodrive direct access performance nvmfs consistently better ext3 platform sometimes 20 buffered access performance nvmfs also consistently better ext3 sometimes 149 application benchmarks show nvmfs outperforms ext3 7 250 requiring less cpu power additionally i/o latency lower nvmfs compared ext3 api used nvmfs access flash memory consists layer provides api called virtualized flash storage layer dfs paper responsibility layer perform block allocation wear leveling garbage collection crash recovery address translation also make address translation data structures persistent
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 5661, 9249, 9762, 5158, 7225, 8772, 1109, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 5293, 7344, 2230, 5816, 12...
Test
6,962
9
Gretl:gretl gretl open-source statistical package mainly econometrics name acronym g nu r egression e conometrics ime-series l ibrary graphical user interface gui command-line interface written c uses gtk+ widget toolkit creating gui calls gnuplot generating graphs native scripting language gretl known hansl see also used together tramo/seats r stata python octave ox julia gretl output models latex files besides english gretl also available albanian basque bulgarian catalan chinese czech french galician german greek italian polish portuguese varieties romanian russian spanish turkish ukrainian gretl reviewed several times journal applied econometrics recently australian economic review review also appeared journal statistical software 2008 since journal featured several articles gretl used implement various statistical techniques gretl offers fully documented xml-based data format also import ascii csv databank eviews excel gnumeric gnu octave jmulti opendocument spreadsheets pcgive rats 4 sas xport spss stata files export stata gnu octave r csv jmulti pcgive file formats gretl scripting language called hansl recursive acronym hansl neat scripting language hansl turing-complete interpreted programming language featuring loops conditionals user-defined functions complex data structures considered domain-specific language econometrics like scientifically oriented programming languages matlab julia matrices supported natively primitive variable type gretl add-ons known function packages written hansl simple example hansl running code produces random number generation rng gretl examined tested yalta schreiber 2012 authors conclude results show rng related procedures gretl implemented soundly perform well three crush test suites testu01 due libre nature breadth econometric techniques contains gretl widely used teaching econometrics undergraduate level onwards datasets gretl format available several popular textbooks following list textbooks use gretl software choice addition free supplement hill griffiths lim principles econometrics wiley available
[ 2050, 2180, 7301, 11654, 5129, 7945, 3980, 2317, 4493, 15, 6797, 7950, 8079, 1939, 2457, 5148, 7580, 7326, 802, 3618, 7341, 9133, 7983, 5555, 9780, 9148, 6718, 10687, 2242, 5830, 5703, 4808, 5833, 5450, 9926, 10822, 2000, 8147, 9944, 3674...
Test
6,963
6
AtheOS_File_System:atheos file system atheos file system afs originally used atheos operating system mbr partition id 0x2a part syllable syllable-based wave os operating system afs started exactly data structures file system bfs extended feature set many ways afs 64-bit journaled file system support file attributes file indexing soft deletions also partially supported
[ 5120, 6669, 3598, 10257, 6677, 5142, 8214, 9762, 5158, 11323, 8772, 10851, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 7344, 2230, 5816, 1212, 8380, 10951, 9420, 3795, 4819, ...
Validation
6,964
4
TCP_hole_punching:tcp hole punching tcp nat traversal tcp hole punching sometimes nat punch-through occurs two hosts behind network address translation nat trying connect outbound tcp connections scenario particularly important case peer-to-peer communications voice-over-ip voip file sharing teleconferencing chat systems similar applications tcp hole punching experimental used nat traversal technique establishing tcp connection two peers behind nat device internet computer network nat traversal general term techniques establish maintain tcp/ip network and/or tcp connections traversing nat gateways following terms host client peer used almost interchangeably nat traversal tcp hole punching establishes bidirectional tcp connections internet hosts private networks using nat work types nats behavior standardized two hosts connecting tcp via outbound connections simultaneous tcp open case tcp state machine diagram availability tcp hole punching depends type computer port allocation used nat two peers behind nat connect via need know little bit one thing absolutely need know location peer remote endpoint remote endpoint data ip address port peer connect two peers b initiate tcp connections binding local ports pa pb respectively need know remote endpoint port mapped nat make connection peers behind nat discover public remote endpoint peer problem called nat port prediction tcp nat traversal hole punching techniques solve port prediction problem nat port allocation one two depending whether nats exhibit predictable non-predictable behavior possible perform tcp connection via tcp simultaneous open shown connection matrix representing different cases impact end-to-end communication methods used nats allow peers perform port prediction remote peer information one mapping guess value subsequent mappings tcp connection happen two steps first peers make connection third party learn mapping second step peers guess nat port mapping subsequent connections solves port prediction method requires making least two consecutive connections peer require use third party method work properly case carrier-grade nat lot subscribers behind ip addresses limited amount ports available allocating consecutive ports internal host might impractical impossible case port prediction trivial peers simply exchange port bound another communication channel udp dht making outbound connections tcp simultaneous open method requires one connection per peer require third party perform port prediction solution peers first connect third party server save port mapping value give peers port mapping value peer second step peers reuse local endpoint perform tcp simultaneous open unfortunately requires use so_reuseaddr tcp sockets use violates tcp standard lead data corruption used application protect data corruption assume port prediction already taken place one methods outlined peer knows remote peer endpoint peers make posix connect call peer endpoint tcp simultaneous open happen follows tcp simultaneous open work nat enough guarantee nats behave nicely respect tcp simultaneous open technique described works fine within cgn cgn also make use port overloading behavior means distinct internal endpoints port value mapped public endpoint break uniqueness quintuple result acceptable tcp port preservation also lead cases cgn ports overloaded issue protocol soundness port overloading tcp allows cgn fit hosts internally preserving tcp end-to-end communication guarantees
[ 8640, 3011, 10924, 6541, 14, 3792, 4435, 8308, 3770 ]
None
6,965
9
Semantic_dictionary_encoding:semantic dictionary encoding semantic dictionary encoding sde preserves full semantic context source programs adding information used accelerating speed code generation sde forms code-generating loader form bytecode combined jit compiler code generation load time elementary form dictionary entries represent nodes directed acyclic graph dag describes actions program abstract syntax tree ast tabular form uses intermediate representation ir based encoded abstract syntax tree symbol table program
[ 8609, 10703 ]
Test
6,966
2
OpenPlay:openplay openplay name open-source cross-platform networking library created apple inc. openplay compiles runs classic mac os macos windows linux operating systems openplay high-level networking solution game applications known abstraction game player top automatically managed networking core version 2.0 includes netsprockets api mac os 9 netsprockets subset apple obsolete game sprockets
[ 576, 2921, 6797, 7983, 823, 2685, 3167 ]
Validation
6,967
9
Jacob_T._Schwartz:jacob t. schwartz jacob theodore jack schwartz january 9 1930 – march 2 2009 american mathematician computer scientist professor computer science new york university courant institute mathematical sciences designer setl programming language started nyu ultracomputer project founded new york university department computer science chairing 1964 1980 schwartz born bronx new york january 9 1930 ignatz hedwig schwartz attended stuyvesant high school went city college new york received b.s 1949 city college new york m.a 1949 ph.d. 1951 yale university research interests included theory linear operators von neumann algebras quantum field theory time-sharing parallel computing programming language design implementation robotics set-theoretic approaches computational logic proof program verification systems multimedia authoring tools experimental studies visual perception multimedia high-level software techniques analysis visualization bioinformatic data authored 18 books 100 papers technical reports also inventor artspeak programming language historically ran mainframes produced graphical output using single-color graphical plotter served chairman computer science department founded courant institute mathematical sciences new york university 1969 1977 also served chairman computer science board national research council former chairman national science foundation advisory committee information robotics intelligent systems 1986 1989 director darpa information science technology office darpa/isto arlington virginia jacob schwartz two daughters abby schwartz living new york city rachel fainman stage name rachel kane living winnipeg canada jack also two grandchildren adrienne fainman adam fainman
[ 4930, 11075, 8262, 11497, 1783 ]
Test
6,968
2
Kernel_same-page_merging:kernel same-page merging computing kernel same-page merging abbreviated ksm also known kernel shared memory memory merging kernel feature makes possible hypervisor system share identical memory pages amongst different processes virtualized guests directly linked kernel-based virtual machine kvm use ksm merge memory pages occupied virtual machines ksm performs memory sharing scanning main memory finding duplicate pages detected duplicate pair merged single page mapped original locations page also marked copy-on-write cow kernel automatically separate one process modify data ksm originally intended run virtual machines one host sharing memory processes well virtual machines upon implementation different users found ksm also useful non-virtualized environments memory premium experimental implementation ksm red hat found 52 virtual instances windows xp 1 gb memory could run host computer 16 gb ram ksm merged linux kernel mainline kernel version 2.6.32 released december 3 2009 effective operating system kernel must find identical memory pages held different processes kernel also needs decide whether pages going update infrequently enough merging would efficient use processor resources concern although memory usage reduced cpu usage increased thus negating potential increases performance security also concern
[ 5120, 4616, 3082, 5139, 10780, 10785, 3618, 6180, 8242, 9266, 5176, 4161, 10817, 8772, 6213, 8268, 589, 593, 8273, 6244, 5222, 10856, 4207, 5244, 4734, 11391, 7812, 8326, 7821, 4238, 10382, 2195, 2711, 6808, 9882, 1694, 2723, 8364, 10933, ...
Test
6,969
9
CMU_Common_Lisp:cmu common lisp cmucl free common lisp implementation originally developed carnegie mellon university cmucl runs unix-like platforms including linux bsd experimental windows port well steel bank common lisp derived cmucl scieneer common lisp commercial derivative cmucl earliest implementation predates common lisp part spice lisp around 1980 1985 rob maclachlan started re-writing compiler would become python compiler cmucl ported unix workstations ibm pc rt mips sparc early cmucl releases support intel x86 architecture due lack registers cmucl strictly separated type-tagged immediate data types garbage collector would rely knowing one half cpu registers could hold tagged types half untagged types leave enough registers python backend cmu canceled project favor dylan implementation using cmucl compiler base maintenance taken group volunteers 1996 group making regular releases infrastructure around time port intel x86 architecture completed first running freebsd later linux problem lacking registers solved new conservative garbage collector new garbage collector accepts value type registers treats anything might pointer pointer purpose collecting moving target
[ 10752, 11269, 2062, 9231, 9749, 8728, 4633, 4122, 8226, 2105, 6201, 6717, 8258, 8771, 1613, 9299, 3675, 7267, 8293, 3176, 2666, 2667, 5751, 7805, 9865, 6797, 9875, 9877, 4779, 5803, 2225, 8883, 7867, 4799, 7880, 8908, 205, 7896, 10463, 73...
Test
6,970
6
Self-certifying_File_System:self-certifying file system computing self-certifying file system sfs global decentralized distributed file system unix-like operating systems also providing transparent encryption communications well authentication aims universal distributed file system providing uniform access available server however usefulness sfs limited low deployment sfs clients developed june 2000 doctoral thesis david mazières sfs client daemon implements sun network file system nfs protocol communicating operating system thus work operating system supports nfs including windows client manages connections remote file systems necessary acting kind protocol translation layer sfs server works similarly distributed file system servers exposing existing disk file system network specific sfs protocol unix-like systems sfs file systems usually found /sfs/hostname hostid sfs file system first accessed path connection server made directory created automounted primary motivation behind file system address shortcomings hardwired administratively configured distributed file systems larger organizations various remote file transfer protocols designed operate securely separate administrative realms example sfs one could store files single remote server access files securely transparently location stored locally without special privileges administrative cooperation running sfs client daemon available file systems found path regardless physical location implicitly authenticated path names — include public-key fingerprint server hence called self-certifying addition new perspective sfs also addresses commonly raised limitations distributed file systems example nfs smb clients rely server file system security policies nfs servers rely client computer authentication often complicates security one compromised computer could breach security entire organization nfs smb protocols also provide confidentiality encryption tamper resistance computers network without encapsulation layers ipsec unlike coda afs sfs provide local caching remote files thus dependent network reliability latency bandwidth
[ 5120, 6669, 3598, 10257, 6677, 5142, 8214, 9762, 5158, 3629, 11323, 8772, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 6797, 654, 2193, 2194, 2197, 2199, 11419, 3742, 6309, 1190, 5286, 10405, 7344, 2230, 5816, 1212, 8380, 10951, 9420, ...
None
6,971
3
ZiiLABS:ziilabs ziilabs global technology company producing line media-oriented application processors reference platforms enabling software series platforms named zms designed create products target range low-power consumer electronics embedded devices including android-based phones tablets ziilabs founded 1994 3dlabs became wholly owned subsidiary creative technology ltd 2002 january 2009 company re-branded ziilabs re-branding reflected 3dlabs focus supplying low-power media-rich application processors hardware platforms middleware rather 3d gpus previously case company announced first applications/media processor dms-02 2005 followed zms-05 zms-08 recently zms-20 zms-40 zms processors combine ziilabs ’ core asset stemcell computing array arm cores integrated peripheral functions create system chip soc 3dlabs company developed glint permedia gpus used personal workstation graphics cards 2002 company acquired intense3d group become vertically integrated graphics board vendor supplying workstation graphics card realizm brand 3dlabs stopped developing graphics gpus cards 2006 focus media processor business november 2012 creative technology limited announced entered agreement intel corporation intel license certain technology patents ziilabs inc. ltd acquire certain engineering resources assets related uk branch part 50 million deal ziilabs still wholly owned creative continues retain ownership stemcell media processor technologies patents continue supply support zms series chips customers company products include range arm-based zms processors feature so-called stemcell media processing architecture plus portfolio tablet reference platforms based in-house android board support package application software recent platform jaguar android reference tablet announced may 2011 core asset ziilabs zms chips seem array processing units called stemcells programmed perform media processing described 32-bit floating-point processing units likely form digital signal processor cores used accelerate various operations video codec 3d graphics handling zms processors handled programming array coprocessors job years number development platforms made introduced including zii development kits traditional large form factor systems
[ 7170, 4622, 11282, 9235, 11289, 1057, 38, 4139, 8237, 9774, 2097, 8250, 1085, 8253, 7745, 7747, 9799, 6730, 2635, 7755, 4699, 8795, 99, 8812, 10359, 10360, 10361, 10363, 638, 10369, 10371, 644, 8842, 146, 659, 7833, 666, 5786, 4258, 4773,...
Validation
6,972
2
Windows_Aero:windows aero windows aero backronym authentic energetic reflective open design language introduced windows vista operating system changes made aero interface affected many elements windows interface including incorporation new look along changes interface guidelines reflecting appearance layout phrasing tone instructions text applications windows aero force development windows vista windows 7 2012 development windows 8 windows server 2012 microsoft moved design language codenamed metro aero interface unveiled windows vista complete redesign windows interface replacing windows xp luna theme release windows vista beta 1 july 2005 little shown aero public leaked builds previous user interfaces plex featured longhorn builds 3683–4042 slate first featured lab06 compile build 4042 used development reset jade builds 4074 4094 microsoft started using aero theme public builds build 5048 first build full-featured aero build 5219 build 5270 released december 2005 contained implementation aero theme virtually complete according sources microsoft though number stylistic changes introduced operating system release windows aero incorporated following features windows vista windows aero revised windows 7 several ui changes touch friendly interface many new visual effects features including pointing device gestures windows 8 windows server 2012 adopted metro design language inherit elements aero aero glass theme replaced flatter solid colored theme transparency effects removed interface aside taskbar maintains transparency longer blur effect flip 3d also removed switches metro-style apps pre-release versions windows 8 used updated version aero glass flatter squared look glass theme ultimately removed final version first time since release windows 95 microsoft completely revised user interface guidelines covering aesthetics common controls buttons radio buttons task dialogs wizards common dialogs control panels icons fonts user notifications tone text used windows vista windows 7 computers meet certain hardware software requirements aero glass theme used default primarily incorporating various animation transparency effects desktop using hardware acceleration desktop window manager dwm personalize section added control panel windows vista users customize glass effects either opaque transparent change color tinted enabling aero glass also enables new features including enhanced alt-tab menu taskbar thumbnails live previews windows flip 3d window switching mechanism cascades windows 3d effect windows 7 features refinements aero glass including larger window buttons default minimize maximize close query revised taskbar thumbnails ability manipulate windows dragging top sides screen side make fill half screen top maximize ability hide windows hovering show desktop button taskbar ability minimize windows shaking one use dwm extension aero glass theme requires video card 128mb graphics memory least 64mb video ram 1gb system ram on-board graphics supporting pixel shader 2.0 wddm-compatible drivers aero glass also available windows 7 starter available limited extent windows vista home basic automatically disabled user detected running non-genuine copy windows windows server 2008 windows server 2008 r2 also support aero glass part desktop experience component disabled default wizard 97 prevailing standard wizard design visual layout functionality used windows 98 windows server 2003 well microsoft products time frame aero wizards replacement wizard 97 incorporating visual updates match aesthetics rest aero well changing interaction flow specifically notifications allow application operating system component icon notification area create pop-up window information event problem windows first introduced windows 2000 known colloquially balloons similar appearance speech balloons commonly seen comics balloons often criticized prior versions windows due intrusiveness especially regard interacted full-screen applications games entire application minimized bubble came notifications aero aim less intrusive gradually fading appearing full-screen application screensaver displayed—in cases notifications queued appropriate time larger icons multiple font sizes colors also introduced aero notification windows segoe ui typeface default font aero languages use latin greek cyrillic character sets default font size also increased 8pt 9pt improve readability segoe ui typeface prior windows 8 numeral zero 0 narrow capital letter wider windows 8 segoe ui keeps difference numeral one 1 top hook capital letter equal crown base windows 8 1 base crown base aero base icons designed iconfactory previously designed windows xp icons vista user experience guidelines also address issue tone writing text used aero user interface prior design guidelines microsoft done much address issue user interface text phrased way information requests presented user consistent parts operating system guidelines vista applications suggest messages present technically accurate advice concisely objectively positively assume intelligent user motivated solve particular problem specific advice includes use second person active voice e.g print photos camera avoidance words like please sorry thank
[ 6150, 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 1581, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 8798, 4704, 3170, 8296, 5225, 622, 9839, 4210, 7796, 1656, 6265, 7290, 47...
Test
6,973
9
Pkfix:pkfix text-producing systems latex tex produce dvi files files written user files used moderate extent still post-processed tool called dvips converted dvi files postscript files understood many printers older versions dvips embedded bitmapped fonts represented letters symbols pictures fixed resolution instance 300 dpi files printed newer devices resolution 1200 dpi letters files bitmapped fonts display remarkably low quality jagged lines curves diagonals one solution problem substitute bitmapped fonts scalable fonts known among postscript users type 1 fonts remedy problem low quality printing one use heiko oberdiek utility called pkfix input pkfix postscript file generated dvips versions 5.58 newer output another postscript file time bitmapped fonts substituted scalable fonts possible technically speaking pkfix perl script searches postscript file comments bitmapped pk fonts introduced relatively recent dvips versions replaces corresponding type 1 fonts course simpler solution problem would reprocess latex/tex files recent tools fonts cases person given postscript file n't author document n't access source files worse source files may lost times
[ 8582, 1609, 5612, 7983, 8628 ]
Test
6,974
2
Single_address_space_operating_system:single address space operating system computer science single address space operating system sasos operating system provides one globally shared address space processes
[ 2625, 10499, 4423, 7561, 7983, 7057, 6706, 7187, 11539, 10776, 10809, 4669, 5598, 7039 ]
Test
6,975
4
Challenge–response_authentication:challenge–response authentication computer security challenge–response authentication family protocols one party presents question challenge another party must provide valid answer response authenticated simplest example challenge–response protocol password authentication challenge asking password valid response correct password clearly adversary eavesdrop password authentication authenticate way one solution issue multiple passwords marked identifier verifier ask passwords prover must correct password identifier assuming passwords chosen independently adversary intercepts one challenge–response message pair clues help different challenge different time example communications security methods unavailable u.s. military uses akac-1553 triad numeral cipher authenticate encrypt communications triad includes list three-letter challenge codes verifier supposed choose randomly random three-letter responses added security set codes valid particular time period ordinarily 24 hours interesting challenge–response technique works follows say bob controlling access resource alice comes along seeking entry bob issues challenge perhaps 52w72y alice must respond one string characters fits challenge bob issued fit determined algorithm known bob alice correct response might simple 63x83z character response one challenge real world rules would much complex bob issues different challenge time thus knowing previous correct response even n't hidden means communication used alice bob use challenge-response protocols also used assert things knowledge secret value captchas example sort variant turing test meant determine whether viewer web application real person challenge sent viewer distorted image text viewer responds typing text distortion designed make automated optical character recognition ocr difficult preventing computer program passing human non-cryptographic authentication generally adequate days internet user could sure system asking password really system trying access nobody likely eavesdropping communication channel observe password entered address insecure channel problem sophisticated approach necessary many cryptographic solutions involve two-way authentication user system must convince know shared secret password without secret ever transmitted clear communication channel eavesdroppers might lurking one way done involves using password encryption key transmit randomly generated information challenge whereupon end must return response similarly encrypted value predetermined function originally offered information thus proving able decrypt challenge instance kerberos challenge encrypted integer n response encrypted integer n 1 proving end able decrypt integer n variations hash function operates password random challenge value create response value encrypted hashed exchanges directly reveal password eavesdropper however may supply enough information allow eavesdropper deduce password using dictionary attack brute-force attack use information randomly generated exchange response different challenge guards possibility replay attack malicious intermediary simply records exchanged data retransmits later time fool one end thinking authenticated new connection attempt authentication protocols usually employ cryptographic nonce challenge ensure every challenge-response sequence unique protects man-in-the-middle attack subsequent replay attack impractical implement true nonce strong cryptographically secure pseudorandom number generator cryptographic hash function generate challenges highly unlikely occur sometimes important use time-based nonces weaken servers different time zones servers inaccurate clocks also important use time-based nonces synchronized clocks application vulnerable delayed message attack attack occurs attacker copies transmission whilst blocking reaching destination allowing replay captured transmission delay choosing easily accomplished wireless channels time-based nonce used limit attacker resending message restricted expiry time perhaps less one second likely effect upon application mitigating attack mutual authentication performed using challenge-response handshake directions server ensures client knows secret client also ensures server knows secret protects rogue server impersonating real server challenge–response authentication help solve problem exchanging session keys encryption using key derivation function challenge value secret may combined generate unpredictable encryption key session particularly effective man-in-the-middle attack attacker able derive session key challenge without knowing secret therefore able decrypt data stream avoid storage passwords operating systems e.g unix-type store hash password rather storing password authentication system need verify hash password entered matches hash stored password database makes difficult intruder get passwords since password stored difficult determine password matches given hash however presents problem many challenge-response algorithms require client server shared secret since password stored challenge-response algorithm usually use hash password secret instead password case intruder use actual hash rather password makes stored hashes sensitive actual passwords scram challenge-response algorithm avoids problem examples sophisticated challenge-response algorithms people consider captcha kind challenge-response authentication blocks spambots
[ 7556, 7557, 519, 6035, 1945, 1054, 2080, 7212, 1069, 3629, 6064, 5433, 6098, 2003, 2527, 5857, 2274, 10341, 2928, 7794, 5492, 8694, 119, 2558, 4863 ]
None
6,976
3
The_Hobbit_(1982_video_game):hobbit 1982 video game hobbit illustrated text adventure computer game released 1982 zx spectrum home computer based book hobbit j. r. r. tolkien developed beam software philip mitchell dr. veronika megler published melbourne house later converted home computers available time including commodore 64 bbc micro oric computers arrangement book publishers copy book included game sold parser advanced time used subset english called inglish released adventure games used simple verb-noun parsers allowing simple phrases like get lamp inglish allowed player type advanced sentences ask gandalf curious map take sword kill troll parser complex intuitive introducing pronouns adverbs viciously attack goblin punctuation prepositions allowing player interact game world ways previously possible many locations illustrated image based originals designed kent rees tape version save space image stored compressed format storing outline information flood filling enclosed areas screen slow cpu speed meant would take several seconds scene draw disk-based versions game used pre-rendered higher-quality images game innovative text-based physics system developed veronika megler objects including characters game calculated size weight solidity objects placed inside objects attached together rope damaged broken main character sitting barrel barrel picked thrown trapdoor player would go unlike works interactive fiction game also real time insofar period idleness causes wait command automatically invoked possibility events occurring result suppressed entering pause command stops events key pressed game cast non-player characters npcs entirely independent player bound precisely game rules loyalties strengths personalities affect behaviour always predicted character gandalf example would roam freely around game world fifty locations picking objects getting fights captured volatility characters coupled rich physics impossible-to-predict fighting system enabled game played many different ways though would also lead problems important character killed early numerous possible solutions hindsight game might regarded one first examples emergent gameplay also resulted however many bugs example development megler found animal npcs killed player arrived game documentation warned due immense size complexity game impossible guarantee ever completely error-free melbourne house issued version 1.1 fixes another bug resulted game unwinnable forcing release version 1.2 company never fixed bugs info 1985 rated hobbit commodore 64 three-plus stars five stating graphics pleasant show-stoppers game parser puzzles typical adventures today magazine concluded tolkien fans likely pleased title hobbit bestseller uk zx spectrum 1983 c64 bbc following year game 1983 golden joystick award best strategy game game also huge commercial success selling 100,000 copies first two years retail price £14.95 records sales figures article march 1985 estimated range 100,000 200,000 figure 500,000 copies possible making excellent candidate bestselling text adventure time challenged infocom ’ zork use images many locations opposed mostly text-only adventure games time flexibility inglish parser innovative independence non-player characters popularity tolkien work attributed game phenomenal success help players book called guide playing hobbit david elkan published 1984 developer beam software followed hobbit 1985 1987 shadows mordor game two lord rings 1989 crack doom would also reuse inglish sherlock 1986 parody game released crl boggit phrase game entered popular culture thorin sits starts singing gold also game mentioned nick montfort twisty little passages book exploring history form interactive fiction genre discworld noir references hobbit protagonist lewton discovers someone concealed wine barrel wonders brings mind phrases wait – time passes thorin sits starts singing gold
[ 9006, 11666, 5399, 952, 5628 ]
Test
6,977
9
PDF/VT:pdf/vt pdf/vt international standard published iso august 2010 iso 16612-2 defines use pdf exchange format optimized variable transactional printing built top pdf/x-4 first variable-data printing vdp format ensures modern international color consortium-based icc color management use icc output intents adds notion encapsulated groups graphic objects support optimized efficient processing repeating text graphic image content introducing concept document part metadata dpm enables reliable dynamic management pages high volume transactional output hvto print data like record selection postage optimization based metadata pdf/vt-1 always consists self-contained file variants standard support use external graphic content pdf/vt-2 well streaming use multi-part mime packages pdf/vt-2s addition digital master vdp printing shared viewed interactively navigated human operators using normal pdf reader though completely accurate rendering requires pdf/x-4 pdf/vt conforming viewer number vendors announced support pdf/vt upon publication standard 2010 subsequent years various pdf/vt-consuming -producing products also reached market ubiquity pdf well fact pdf iso standard iso 32000-1:2008 clearly work favor pdf/vt nevertheless currently difficult predict industry pdf/vt adopted fast happen positioned vis-à-vis formats architectures variable data printing practical requirements benefits pdf/vt explained detail along related recommendations guide global graphics. ref name= dopdf/vtright /ref
[ 10752, 5384, 8854, 11036, 5149, 2206, 9245, 5413, 10413, 11056, 8627, 3126, 1079, 5816, 11074, 8904, 1610, 9290, 8524, 2519, 2904, 4058, 4064, 8421, 8426, 5614, 1010, 3447, 2045, 10238 ]
Test
6,978
3
Puma_(microarchitecture):puma microarchitecture puma family 16h low-power microarchitecture amd apus succeeds jaguar second-generation version targets market belongs amd architecture family 16h beema line processors aimed low-power notebooks mullins targeting tablet sector puma cores use microarchitecture jaguar inherits design like jaguar puma core support following instruction sets instructions mmx sse sse2 sse3 ssse3 sse4a sse4.1 sse4.2 avx f16c clmul aes bmi1 movbe move big-endian instruction xsave/xsaveopt abm popcnt/lzcnt amd-v. amd released revision puma core puma+ part carrizo-l platform 2015 differences cpu microarchitecture unclear puma+ featured 2 4 cores 2.5ghz required newer fp4 socket
[ 3585, 3586, 3588, 6151, 5645, 11282, 10260, 4124, 7712, 2088, 8237, 2094, 6705, 8250, 7234, 11331, 2635, 7247, 7783, 7788, 8815, 1137, 1651, 638, 8322, 11396, 8327, 10375, 1682, 9369, 666, 2719, 4767, 9400, 9913, 10945, 3783, 2764, 9427, ...
None
6,979
2
Oberon_(operating_system):oberon operating system oberon system modular single-user single-process multitasking operating system written programming language name originally developed late 1980s eth zürich oberon system unconventional visual text user interface instead conventional cli gui tui innovative time influenced design acme text editor plan 9 bell labs operating system oberon system still maintained also subsequently developed multi-process smp-capable bluebottle operating system zooming user interface oberon operating system originally developed part ns32032-based ceres workstation project written almost entirely since 2013 edition described entirely oberon programming language basic system designed implemented niklaus wirth jürg gutknecht design implementation fully documented book project oberon user interface programmers reference found martin reiser book oberon system later extended ported hardware team eth-zürich recognition popular magazines wirth gutknecht although active computer science professors referred 'part-time programmers book 'project oberon late 2013 couple months 80th birthday niklaus wirth published second edition project oberon details implementation oberon system using risc cpu design realized xilinx fpga board presented symposium organized 80th birthday ethz meantime several emulators version implemented according josef templ former member developer group eidgenössische technische hochschule zürich later member institut für systemsoftware johannes kepler university linz one versions v4 maintained genealogy different versions oberon system following oberon text user interface tui differentiated terminal user interface combines point-and-click convenience graphical user interface gui linguistic strength command line interface cli closely tied naming conventions oberon language text appearing almost anywhere screen edited therefore used command input commands activated middle-mouse click text fragment form module.command optionally followed parameters terminated command defined procedure empty argument list parameters command defined executing middle click must explicitly scanned retrieved procedure checks questions asked command execution sometimes called non-modal user interface ui nothing like command prompt required although radically different command line tui efficient powerful steep ascent early learning curve makes little bit difficult beginning questions asked deliberate design decision needs getting used editors ask user closing modified text case oberon system usage tui programming interface fully documented martin reiser book oberon system short introduction user interface found niklaus wirth home page later versions system oberon oberon v4 v4 short sometimes also referred linz-oberon oberon system 3 s3 sometimes also called eth-oberon spirit oberon enhanced basic interface different incompatible implementations buttons drop menus active elements v4 used purpose dedicated control character embedded normal text contrast system 3 extended kernel introducing persistent objects extensions include large set user interface elements mastering oberon user interface purely textual also called gadgets system s3 absolutely non-trivial therefore recommended proceed successful installation oberon system 3 andré fischers oberon system 3 tutorial expanded version tutorial published book print whole book available electronic form single user license every installed version system 3 windows linux native i.e also gadgets toolkit olr information get copy oberon companion may found section oberon wikibook similar user interfaces yet appear commonplace operating systems rob pike acme system plan 9 bell labs strongly inspired oberon tui whether worksheet interface macintosh programmer workshop influenced oberon tui vice versa difficult decide oberon system based wirth previous computer design lilith apple macintosh precursor lisa oberon system ceres precursor lilith roots inspired alto developed xerox parc v1 first usable version time oberon trilogy published major change text model together editor called write yielded v2 foreshadowed table section history major fork beginning 1990s v4 vs. system 3 group around jürg gutknecht introduced persistent objects object-libraries thereby extending kernel group around realized similar features introducing active elements mapped special character thereby extending fonts without changing kernel system 3 sometimes also called spirit oberon later renamed eth oberon whereas v4 sometimes also called linz oberon version oberon system 3 integrated microsoft windows os called plugin oberon version called oberon v4 see also history closer original operating system developed n. wirth j. gutknecht originally developed ethz h.p mössenböck went institut für systemsoftware johannes-kepler university linz jku development v4 moved also therefore v4 sometimes also called linz-oberon contrast eth-oberon recent version v4 extensions available jku oberon v4 appears orphaned almost changes since 2000 another repository v4 claudio nieder oberon v4 also shows difference different v4 implementations since 2013 page moved to/is mirrored sourceforge v4 closer would called integrated development environment operating system many extensions written v4 still available ftp server ssw jku documentation found web-pages information normally included packages given oberon special rich text format computer science department eth zurich recent years begun exploring active objects concurrency operating systems released early version new language active oberon new operating system first called aos — due copyright issues — called a2 and/or bluebottle available eth zurich source via internet native versions a2 i.e running bare hardware currently possible intel ia-32 x86-64 single- multi-processor systems strongarm cpu family versions running top another operating system available windows winaos unix unixaos linux linuxaos os-x darwinaos part industrial research project native systems group eth zurich developed application-specific operating system called stailaos based latest version oberon os targeted towards applications like real-time analytics high performance trading systems main memory based erp etc native oberon stands oberon system running bare hardware pc-native oberon version oberon operating system runs ia-32 x86-32 pc hardware never v4 native oberon every information section implicitly assumes system 3 native oberon minimal hardware requirements 133 mhz pentium 100mb hard disk vesa 2 graphics card resolution least 1024x768 pixel optionally 3com network card basic system runs single hd-floppy additional software installed network full installation includes gadgets gui written completely oberon programming language confusion caused fact exists version called lno acronym linux native oberon uses linux hardware abstraction layer hal goal compatible possible pc-native oberon versions oberon system i.e without native name partially modified interfaces low level modules 2015 peter matthias revitalized lno name olr oberon linux revival multi-platform distribution running seamlessly intel x86 risc-v mips arm runs nicely raspberry pi inexpensive chip computer tweaking adjusting group membership or/and permissions devices runs nicely tiny core linux olr interfaces linux kernel direct system calls olr currently mid 2017 misses network layer 2013 niklaus wirth paul reed completed re-implementation original oberon system digilent xilinx spartan 3 fpga starter board work included revision project oberon identified project oberon new edition 2013 system since ported xilinx spartan 6 fpga development board saanlima electronics 2015 paul reed collaborated victor yurkovsky creation oberonstation xilinx spartan 3-based computer designed specifically run oberon peter de wachter implemented emulator also ported java javascript michael schierl running modern browsers ported free pascal/ultibo markus greim andreas pirklbauer maintains experimental version extensions project oberon 2013 github a2 yet another name active object system 2003. br alo arm linux oberon lno family arm cpu. br aos active object system 2002. br bb blackbox component builder component pascal ide oberon microsystems. br bluebottle os another name active object system 2003. br cp component pascal dialect oberon family similar oberon-2. br etho oberon developed eidgenössische technische hochschule eth zürich. br fox compiler active oberon appearing aos a2 bluebottle br leo linux eth oberon etho 2.4.3 linux x86. br lno linux native oberon. br native oberon oberon running bare hardware rather atop another operating system. br olr oberon linux revival version uses linux hal runs x86 arm mips. br op2 portable oberon-2 compiler op2 developed port oberon onto commercially available platforms. br paco scope parallel compiler appears a2 compiles scope independent thread br risc5 cpu project oberon 2013 based upon wirth risc architecture confused risc-v. br unixaos unix-based aos. br winaos windows-based aos. br
[ 2179, 3587, 5380, 6801, 4114, 6675, 8082, 9107, 8219, 5663, 1952, 10789, 7983, 2224, 9391, 10548, 823, 8248, 1849, 6716, 8508, 6979, 8262, 213, 11221, 7775, 9320, 5356, 9964, 1776, 6128, 499, 5492, 3451 ]
Test
6,980
4
Impermium:impermium impermium cyber-security startup company based redwood city california provided anti-spam account protection services internet web sites 2014 company acquired google company founded 2010 mark risher vishwanath ramarao naveen jamal met managing anti-spam systems yahoo mail company protected 1.5 million sites worldwide including disqus livefyre pinterest squarespace tumblr attacks including fraudulent registrations login account hijacking malicious user-generated content forms social spam impermium received venture capital financing funds including accel partners greylock partners highland capital partners morado ventures social+capital partnership january 2014 google announced acquisition company merging team technology anti-spam group
[ 2558 ]
Validation
6,981
3
Allwinner_Technology:allwinner technology allwinner technology fabless semiconductor company designs mixed-signal systems chip soc company headquartered zhuhai guangdong china sales technical support office shenzhen guangdong logistics operations hong kong since founding 2007 allwinner released fifteen soc processors use android-based tablets well smartphones over-the-air ott boxes video camera systems car dvrs car media players 2012 2013 allwinner number one supplier terms unit shipments application processors android tablets worldwide according digitimes q4 2013 allwinner lost number one position terms unit shipments chinese market rockchip q2 2014 allwinner reported digitimes third largest supplier chinese market rockchip mediatek digitimes also projected allwinner fall number four position q4 2014 passed intel allwinner unit shipments continue decline series processors used mobile applications mainly referring tablet application 2011 company became arm processor licensee subsequently announced series arm cortex-a8 powered mobile application processors including a10 a13 a10s a12 used numerous tablets also pc-on-a-stick media center devices also adopted free hardware projects like cubieboard development board december 2012 allwinner announced availability two arm cortex-a7 mpcore powered products dual-core allwinner a20 quad-core allwinner a31 production a31 started september 2012 end products mostly high-end tablets chinese manufacturers appeared market early 2013 including onda v972 allwinner first make arm processor core available mass production march 2013 allwinner launched quad-core phablet processor a31s based quad-core cortex-a7 cpu architecture processor allows 3g 2g lte wifi bt fm gps agps nfc using minimum external components october 2013 allwinner released second dual-core a23 touted efficient dual core processor tablets a23 cpu frequency intended run 1.5 ghz june 2014 allwinner announced a33 quad-core soc pin compatible allwinner a23 new soc features four cortex-a7 cores 256 kb l1 cache 512 kb l2 cache mali-400 mp2 gpu new feature support openmax api allwinner positioned a33 entry-level tablets targeting quad-core tablets priced 30 60 july 2014 announced started mass production chip sell low 4 per unit april 2019 allwinner announced a50 28nm quad-core soc a50 features four cortex-a7 cores running 1.8ghz 512 kb l2 cache mali-400 mp2 gpu june 2017 allwinner announced a63 28nm quad-core soc apc 2017 conference a63 features four cortex-a53 cores running 1.8ghz 512 kb l2 cache mali-t760 mp2 gpu opengl es 3.2 support vpu 4k/6k vp9 h.265 h.264 4k 30fps video decoder h.264 hp encoder 1080p 30fps october 2013 allwinner disclosed upcoming octa-core a80 soc featuring four high-performance arm cortex-a15 four efficient arm cortex-a7 cpu cores big.little configuration june 30 2014 chinese brand onda officially released octa-core onda v989 tablet based allwinner a80 first allwinner a80-based tablet available consumers priced cny 1099 ~us 177 september 2014 allwinner announced allwinner a83t octa-core tablet processor packs eight highly energy-efficient cortex-a7 cores run simultaneously around 2.0 ghz also includes powervr gpu first tablet chip expected hit market q4 2014 april 2019 allwinner announced roadmap 2019 2020 feature a100 a200 a300 a301 soc allwinner a200 descrided “ ai blessing computational power ” f series processors based allwinner ’ melis os mainly used smart video radios video mp5 etc 2007 2011 allwinner introduced f-series processors including f10 f13 f18 f20 f1e200 f1c100 f20 series runs allwinner in-house operating system melis2.0 mainly used vehicle multimedia systems e-ink readers video intercom systems h-series introduced 2014 integrated application processors primarily targeted ott set-top box applications eg hdmi mini pcs gaming boxes etc allwinner launched a80 octa-core ott box solution targeting high-end ott box market launched allwinner h8 octa-core processor mid-range ott boxes recently launched quad-core allwinner h3 targeting us 35 50 ott box market r “ real-time series chip designed low power applications timing critical must done edge rather fog cloud chip also built redundancies meet industrial automotive standards processing r series chip applicable number different industries including industrial automation safe plcs power generation distribution healthcare automotive technology technology specifically r16 chip also utilised robotic vacuums smart speakers resulting longterm partnership cogobuy group ’ subsidiary ingdan cogobuy ’ preparatory k-system used basis add integrated slam modules allwinner chip ’ technical advantages patents cogobuy held allowed chip localisation edge computing required ai room mapping cleaning r40 r16 technology implemented number banana pi models r8 chip also used “ world ’ first nine dollar computer ” kickstarter project 2015 v-series video encoding processor targeting applications smart dvr ip camera smart home applications similar series soc adds support functions digital watermarking motion detection video scaling well cbr/vbr bit rate control mode july 2014 allwinner announced first 64-bit tablet processor hit market soon allwinner soc family includes a-series intended android os f-series intended company self-developed melis operating system a-series including a10 a20 a31 socs proprietary in-house designed multimedia co-processing dsp digital signal processing processor technology hardware accelerated video image audio decoding called cedarx subprocessing called cedarv video decoding cedara audio decoding able decode 2160p 2d 1080p 3d video main disadvantages cedarx technology associated libraries allwinner cedarx proprietary libraries clear usage license even source code versions available terms-of-use unknown open source software glue code multimedia frameworks gnu/linux systems could used middle-ware like example openmax vaapi a-series integrated application processors primarily targeting tablets well targeting mini pcs development boards tv boxes h-series introduced 2014 primarily targeted ott set-top box applications allwinner technology cooperates around ten independent design houses idhs based shenzhen china develop solutions based allwinner processors include inet technology worldchip digital technology sochip technology topwise communication chiphd technology highcharacter science technology wits technology ococci technology next huawen technology qi hao digital technology apart white-box market allwinner processors also found many brand products including hp msi zte noox gotab skyworth mele polaroid micromax archos texet ainol onda ramos teclast ployer readboy noah rf bmorn apical astro queo etc due low price a10 soc fact special rescue mode early availability u-boot linux kernel source several device makers allwinner socs popular among open-source software developers since least 2012 linux-sunxi community one active arm soc communities slightly older hardware minimal dependence firmware blobs since allwinner also official member linaro group nonprofit engineering consortium aimed developing open-source software arm architecture however noted contributions allwinner made linaro group form binary blobs clear violation gnu gpl license linux kernel uses december 2014 allwinner released android 5.0 sdk allwinner a33 quad-core solution allwinner accused multiple times violating gpl license providing linux/android kernel source code u-boot source using lgpl-licensed code within binary blobs etc allwinner also accused including backdoor published version linux kernel backdoor allows installed app full root access system may remnant debugging development process presents significant security risk devices using allwinner provided kernel
[ 3585, 11282, 9235, 11289, 4124, 10784, 1057, 38, 4139, 3117, 8237, 9774, 2097, 8250, 1083, 8253, 10303, 7745, 7747, 2635, 4194, 99, 107, 8812, 4211, 5237, 10361, 9851, 638, 644, 11396, 8842, 7309, 146, 659, 1682, 7833, 666, 154, 5786, 4...
None
6,982
5
Internet_Citizen's_Band:internet citizen band internet citizen band better known icb early internet chat program associated protocol released 1989 icb typically served port 7326 first version icb program called forumnet fn written university kentucky staffer sean carrick casey widely used university kentucky georgia tech mit university new mexico stanford university mills college uc santa cruz uc berkeley fn based mud software program casey established protocol clients fn used realtime communications channel 1989 loma prieta earthquake internet access hard-hit santa cruz returned service reliable phone service march 1991 university kentucky changed policy shut fn server within 2 months new server created client software another fn user john atwood devries put online renamed icb new server code unrelated original server except common client software source used basis many icb servers follow 1995 2000 server code heavily rewritten stability additional features jon luini michel hoche-mong remains available icb.net web site icb still operation dedicated user base variety clients exist major operating systems icb features many standard chat program functions including channels private messages nickname registration common clients support tcl scripting commands functions clients principally icbm support scripting perl instead icb never supported multi-server shared groups number simultaneous users always somewhat limited comparison popular chat programs icb support transferring files multimedia via chat program however restrictive protocol small remote attack surface icb protocol 8-bit clean
[ 10242, 5251, 5382, 8582, 4746, 1036, 11408, 3228, 10271, 3105, 9511, 1962, 9519, 692, 8758, 1467, 6208, 1218, 8386, 2760, 2892, 4318, 3812, 4068, 6628, 7019, 7928, 10748 ]
Test
6,983
1
Elementary_key_normal_form:elementary key normal form elementary key normal form eknf subtle enhancement third normal form thus eknf tables 3nf definition happens one unique compound key overlap cases cause redundant information overlapping column table eknf elementary functional dependencies begin whole keys end elementary key attributes every full non-trivial functional dependency form x→y either x key part elementary key definition elementary functional dependency functional dependency x→a functional dependency x'→a also holds x strict subset x elementary key key x x→a elementary functional dependency attribute a. eknf defined carlo zaniolo 1982 example table whose highest normal form eknf see boyce–codd normal form achievability bcnf
[ 5792, 5794, 5795, 2022, 2024, 2025, 2026, 4281, 3004, 6782 ]
Test
6,984
2
Win32s:win32s win32s 32-bit application runtime environment microsoft windows 3.1 3.11 operating systems allowed 32-bit applications run 16-bit operating system using call thunks beta version win32s available october 1992 version 1.10 released july 1993 simultaneously windows nt 3.1 win32s intended partial implementation win32 windows api existed early versions windows nt win32s signifies subset win32s lacked number windows nt functions including multi-threading asynchronous i/o newer serial port functions many gdi extensions generally limited win32s applications specifically designed win32s platform although standard win32 programs would work correctly including microsoft 3d pinball space cadet windows 95 included applets office 95 early versions internet explorer version 5 also win32s compatible although also existed 16-bit format generally 32-bit application compatible win32s use 16mb memory extended features directx win32s inherits many limitations win16 environment true win32 applications execute within private virtual address space whereas windows 3.x used address space shared among running applications application running win32s shared address space cooperative multitasking characteristics windows 3.1 consequently win32 application run win32s must contain relocation information technique named thunking fundamental implementation win32s well chicago-kernel operating systems windows 95 windows 98 windows however allowing user-level thunking greatly complicates attempts provide stable memory management memory protection system-wide basis well core kernel security—this allows poorly written applications undermine system stability win32s well chicago-kernel systems stability security windows nt offer partially based thunking illegal except thunks win16 win32—the cpu must remain protected mode times windows xp later 32-bit versions windows transparently provide virtual machine running win16 applications although feature removed 64-bit versions windows win32s-compatible applications could built using microsoft development tools well least borland c++ 4.x however several program compilation options dlls implicit windows nt 3.1 included application win32s microsoft ceased support win32s visual c++ version 4.2 released late 1996 win32s included implementation card game freecell example application couple years game became famous inclusion windows 95 dos game included level editor required win32s run editor used windows gui displaying large maps high-resolution graphic modes already handled windows ncsa mosaic web browser version 2 also required win32s win32s still found using web search engines pw1118.exe generally installation file used developers ensure installing ole require consistent clipboard handling many applications need made ole aware i.e setting ole server must reinstalled win32s also included early win32 programs
[ 1922, 4836, 5318, 8607, 6797, 10029, 639, 7983, 3857, 8976, 9525, 2943, 5754, 1247 ]
Test
6,985
2
ScreenOS:screenos screenos real-time embedded operating system netscreen range hardware firewall devices juniper networks beside transport level security screenos also integrates flow management applications december 2015 juniper networks announced found unauthorized code screenos since august 2012 two backdoors created would allow sophisticated hackers control firewall un-patched juniper netscreen products decrypt network traffic least one backdoors appeared likely effort governmental interest speculation security field whether nsa many security industry praised juniper transparent breach wired speculated lack details disclosed intentional use random number generator known security flaws could suggest planted intentionally 2011 leaked nsa document says gchq current exploit capability following screenos devices ns5gt n25 ns50 ns500 ns204 ns208 ns5200 ns5000 ssg5 ssg20 ssg140 isg 1000 isg 2000 exploit capabilities seem consistent program codenamed feedtrough
[ 10883, 6276, 9366, 7319, 2201, 5531, 9628, 3885, 10030, 10291, 6207, 321, 10561, 1221, 9927, 9162, 7887, 6481, 341, 10590, 6624, 5603, 5220, 1253, 1126, 107, 10482, 4595, 6516, 11383 ]
Test