node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
7,086 | 3 | Kepler_(microarchitecture):kepler microarchitecture kepler codename gpu microarchitecture developed nvidia first introduced retail april 2012 successor fermi microarchitecture kepler nvidia first microarchitecture focus energy efficiency geforce 600 series geforce 700 series geforce 800m series gpus based kepler manufactured 28 nm kepler also found use gk20a gpu component tegra k1 soc well quadro kxxx series quadro nvs 510 nvidia tesla computing modules kepler followed maxwell microarchitecture used alongside maxwell geforce 700 series geforce 800m series architecture named johannes kepler german mathematician key figure 17th century scientific revolution goal nvidia previous architecture design focused increasing performance compute tessellation kepler architecture nvidia targeted focus efficiency programmability performance efficiency aim achieved use unified gpu clock simplified static scheduling instruction higher emphasis performance per watt abandoning shader clock found previous gpu designs efficiency increased even though requires additional cores achieve higher levels performance cores power-friendly two kepler cores using 90 power one fermi core according nvidia numbers also change unified gpu clock scheme delivers 50 reduction power consumption area programmability aim achieved kepler hyper-q dynamic parallelism multiple new compute capabilities 3.x functionality higher gpu utilization simplified code management achievable gk gpus thus enabling flexibility programming kepler gpus finally performance aim additional execution resource cuda core register cache kepler ability achieve memory clock speed 6 ghz increases kepler performance compare previous nvidia gpus gk series gpu contains features older fermi newer kepler generations kepler based members add following standard features kepler architecture employs new streaming multiprocessor architecture called smx smxs reason kepler power efficiency whole gpu uses single unified clock speed although smxs usage single unified clock increases power efficiency due fact multiple lower clock kepler cuda cores consume 90 less power multiple higher clock fermi cuda core additional processing units needed execute whole warp per cycle doubling 16 32 per cuda array solve warp execution problem smx front-end also double warp schedulers dispatch unit register file doubled 64k entries feed additional execution units risk inflating die area smx polymorph engines enhanced 2.0 rather double alongside execution units enabling spurr polygon shorter cycles dedicated fp64 cuda cores also used kepler cuda cores fp64 capable save die space improvement nvidia made smx results include increase gpu performance efficiency gk110 48kb texture cache unlocked compute workloads compute workload texture cache becomes read-only data cache specializing unaligned memory access workloads furthermore error detection capabilities added make safer workloads rely ecc register per thread count also doubled gk110 255 registers per thread additional die spaces acquired replacing complex hardware scheduler simple software scheduler software scheduling warps scheduling moved nvidia compiler gpu math pipeline fixed latency introduced instruction-level parallelism addition thread level parallelism instructions statically scheduled consistency introduced moving fixed latency instructions static scheduled compiler removed level complexity gpu boost new feature roughly analogous turbo boosting cpu gpu always guaranteed run minimum clock speed referred base clock clock speed set level ensure gpu stays within tdp specifications even maximum loads loads lower however room clock speed increased without exceeding tdp scenarios gpu boost gradually increase clock speed steps gpu reaches predefined power target 170 w default taking approach gpu ramp clock dynamically providing maximum amount speed possible remaining within tdp specifications power target well size clock increase steps gpu take adjustable via third-party utilities provide means overclocking kepler-based cards nvidia fermi kepler gpus geforce 600 series support direct3d 11.0 specification nvidia originally stated kepler architecture full directx 11.1 support includes direct3d 11.1 path following modern ui direct3d 11.1 features however supported ref name= nvidia/d3d11.1 /ref according definition microsoft direct3d feature level 11_1 must complete otherwise direct3d 11.1 path executed integrated direct3d features kepler architecture geforce 400 series fermi architecture nvidia kepler gpus geforce 600/700 series support direct3d 12 feature level 11_0 exclusive kepler gpus txaa new anti-aliasing method nvidia designed direct implementation game engines txaa based msaa technique custom resolve filters designed address key problem games known shimmering temporal aliasing txaa resolves smoothing scene motion making sure in-game scene cleared aliasing shimmering low level gk110 sees additional instructions operations improve performance new shuffle instructions allow threads within warp share data without going back memory making process much quicker previous load/share/store method atomic operations also overhauled speeding execution speed atomic operations adding fp64 operations previously available fp32 data hyper-q expands gk110 hardware work queues 1 32 significance single work queue meant fermi could occupied times n't enough work queue fill every sm 32 work queues gk110 many scenarios achieve higher utilization able put different task streams would otherwise idle smx simple nature hyper-q reinforced fact easily mapped mpi common message passing interface frequently used hpc legacy mpi-based algorithms originally designed multi-cpu systems became bottlenecked false dependencies solution increasing number mpi jobs possible utilize hyper-q algorithms improve efficiency without changing code dynamic parallelism ability kernels able dispatch kernels fermi cpu could dispatch kernel incurs certain amount overhead communicate back cpu giving kernels ability dispatch child kernels gk110 save time go back cpu process free cpu work tasks enabling dynamic parallelism requires new grid management dispatch control system new grid management unit gmu manages prioritizes grids executed gmu pause dispatch new grids queue pending suspended grids ready execute providing flexibility enable powerful runtimes dynamic parallelism cuda work distributor kepler holds grids ready dispatch able dispatch 32 active grids double capacity fermi cwd kepler cwd communicates gmu via bidirectional link allows gmu pause dispatch new grids hold pending suspended grids needed gmu also direct connection kepler smx units permit grids launch additional work gpu via dynamic parallelism send new work back gmu prioritized dispatched kernel dispatched additional workload pauses gmu hold inactive dependent work completed nvidia gpudirect capability enables gpus within single computer gpus different servers located across network directly exchange data without needing go cpu/system memory rdma feature gpudirect allows third party devices ssds nics ib adapters directly access memory multiple gpus within system significantly decreasing latency mpi send receive messages to/from gpu memory also reduces demands system memory bandwidth frees gpu dma engines use cuda tasks kepler gk110 also supports gpudirect features including peer‐to‐peer gpudirect video nvenc nvidia power efficient fixed-function encode able take codecs decode preprocess encode h.264-based content nvenc specification input formats limited h.264 output still nvenc limited format support 4096x4096 encode like intel quick sync nvenc currently exposed proprietary api though nvidia plans provide nvenc usage cuda theoretical single-precision processing power kepler gpu gflops computed 2 operations per fma instruction per cuda core per cycle × number cuda cores × core clock speed ghz note like previous generation fermi kepler able benefit increased processing power dual-issuing mad+mul like tesla capable theoretical double-precision processing power kepler gk110/210 gpu 1/3 single precision performance double-precision processing power however available professional quadro tesla high-end titan-branded geforce cards drivers consumer geforce cards limit performance 1/24 single precision performance lower performance gk10x chips similarly capped 1/24 single precision performance | [
3585,
3203,
398,
10512,
9489,
7833,
1309,
10658,
2339,
9774,
9911,
11322,
5948,
8514,
7111,
2635,
10971,
2525,
9057,
2277,
8937,
11630,
1776,
6900,
2937,
2943
] | Test |
7,087 | 2 | Chntpw:chntpw chntpw software utility resetting blanking local passwords used windows nt 2000 xp vista 7 8 8.1 10 editing sam database windows stores password hashes two ways use program via standalone chntpw utility installed package available modern linux distributions e.g ubuntu via bootable cd/usb image also floppy release support dropped chntpw support fully encrypted ntfs partitions possible exceptions encrypted partitions readable linux e.g luks usernames containing unicode characters active directory passwords exception local users systems members ad domain password changing feature also n't fully functional either password blanking highly recommended fact latter versions windows possible option furthermore bootable image might problems controllers requiring 3rd party drivers cases use stand-alone program full-featured linux environment recommended codice_1 utility included many various linux distributions including ones focused security software 10th anniversary author changed license non-commercial one gnu general public license gpl version 2 | [
929,
7754,
7983,
8976,
823,
8857,
4154,
5755,
2045
] | None |
7,088 | 6 | XCOPY:xcopy computing codice_1 command used ibm pc dos ms-dos ibm os/2 microsoft windows freedos reactos related operating systems copying multiple files entire directory trees one directory another copying files across network codice_1 stands extended copy created functional file copying utility codice_3 command found earlier operating systems codice_1 first appeared dos 3.2 still included windows 10 codice_1 deprecated favor codice_6 powerful copy tool built microsoft windows server desktop operating systems dr dos 6.0 includes implementation command freedos version developed rene ableidinger licensed gpl j. edmeades developed wine-compatible version included reactos licensed lgpl create new directory copying contents existing directory including files subdirectories hidden system attributes empty directories directory names include blank signs spaces names put quotation marks copy entire drive mapped network drive ignoring errors network restartable mode copy single file without prompt file directory codice_1 fails insufficient memory error path plus filename longer 254 characters moving large files without /j option available server 2008r2 consume available ram system codice_1 copy open files process may open files exclusive read access withholding file_share_read https //msdn.microsoft.com/en-us/library/aa363858.aspx windows volume shadow copy service used situations codice_1 use therefore codice_1 useful backing live operating system volumes | [
2432,
3970,
8834,
6148,
10631,
2568,
6281,
6797,
3856,
6674,
4248,
8729,
4001,
4771,
292,
7847,
808,
7983,
10033,
178,
9780,
1978,
7356,
5437,
7486,
10428,
960,
8517,
1741,
4174,
9166,
1750,
9946,
1632,
10727,
6506,
9709,
1647,
9839,
2545... | Validation |
7,089 | 4 | Credant_Technologies:credant technologies credant technologies company located addison texas offering products services data security company founded 2001 bob heard chris burchett andrew kahl company offers range products protect data leaking several different versions main technology used different locations network via policy proxy border lan internet dmz central enterprise server within network also editions exchange servers domain controllers available products self-encrypting drivers encrypt data drive without additional requirements client user bitlocker management systems policy reporting tools company claims products protect two million end-points several industries universities health-care aeronautical financial government/defense 18 december 2012 dell announced reached agreement credant would acquire company prior acquisition dell already technology partner credant dell bought 16 companies past 4 years several directly indirectly field data-security major step field security services made dell start 2011 acquired secureworks 2012 acquisition sonicwall best known firewalls intrusion detection prevention appliances also companies dell bought past years offer products services security including perot systems quest software acquisition credant dell gambles continuation strong growth security services | [
8998,
5608,
11146,
8022,
1400,
5245
] | Test |
7,090 | 4 | National_Industrial_Security_Program:national industrial security program national industrial security program nisp nominal authority united states managing needs private industry access classified information nisp established 1993 executive order 12829 national security council nominally sets policy nisp director information security oversight office nominally authority implementation isoo secretary defense nominally executive agent nisp recognizes four different cognizant security agencies equal authority department defense department energy central intelligence agency nuclear regulatory commission major component nisp nisp operating manual also called nispom dod 5220.22-m nispom establishes standard procedures requirements government contractors regards classified information current nispom edition dated 28 feb 2006 chapters selected sections edition dod 5220.22-m sometimes cited standard sanitization counter data remanence nispom actually covers entire field government–industrial security data sanitization small part two paragraphs 141-page document furthermore nispom actually specify particular method standards sanitization left cognizant security authority defense security service provides clearing sanitization matrix c sm specify methods june 2007 edition dss c sm overwriting longer acceptable sanitization magnetic media degaussing physical destruction acceptable | [
1475,
3972,
8997,
2534,
7527,
11368,
7369,
11695,
7090,
9086,
10195,
6494,
831
] | Validation |
7,091 | 4 | Resource_exhaustion_attack:resource exhaustion attack resource exhaustion attacks computer security exploits crash hang otherwise interfere targeted program system form denial-of-service attack different distributed denial-of-service attacks involve overwhelming network host web server requests many locations resource exhaustion attacks generally exploit software bug design deficiency software manual memory management commonly written c c++ memory leaks common bug exploited resource exhaustion even garbage collected programming language used resource exhaustion attacks possible program uses memory inefficiently impose limits amount state used necessary file descriptor leaks another common vector general-purpose programming languages require programmer explicitly close file descriptors even particularly high-level languages allow programmer make mistakes | [
2304,
2754,
8930,
8679,
2409,
6735,
3473,
11351,
953,
6813,
2558,
3871
] | Test |
7,092 | 7 | CallFire:callfire callfire inc. cloud telephony services provider saas headquartered santa monica california known locally silicon beach callfire develops web-based voip products services business-to-business b2b service small medium-sized businesses smb company incorporated 2004 dinesh ravishanker vijesh mehta komnieve singh punit shah tj thinakaran came board 2006 2007 respectively round founding team dan retzlaff james nguyen shane neman hired initial years ronald burr hired spring 2012 company provides cloud communication services voice broadcasting power dialing interactive voice response 2010 callfire ranked 285 inc. magazine ’ 29th annual list america ’ fastest growing private companies callfire ranked 15 within telecommunications industry los angeles metropolitan region much callfire ’ annual growth attributed “ growth calls use service u.s. elections well hurricane sandy ” | [] | None |
7,093 | 3 | ARCS_(computing):arcs computing arcs firmware bootloader also known prom console used computers produced sgi since beginning 1990s arcs system loosely compliant advanced risc computing arc standard promulgated advanced computing environment consortium early 1990s another sense arc standard based sgi arcs used basis generating arc standard although arc calls little-endian system arcs system big-endian mips-based systems despite various inconsistencies two sgi arcs implementations arc standard share many commonalities device naming calling conventions etc. computers use arcs firmware based mips line microprocessors sgi visual workstation series based intel pentium iii also uses arcs visual workstation series commercially produced x86-compatible system used arcs firmware rather traditional pc bios used intel 386-lineage machines list product lines use arcs console includes | [
7234,
10051,
6247,
1515,
6252,
7311,
6256,
7983,
499,
5076,
2452,
221,
6942
] | Test |
7,094 | 5 | Metro_Ring_Protocol:metro ring protocol metro ring protocol mrp layer 2 resilience protocol developed foundry networks currently delivered products manufactured brocade communications systems hewlett packard protocol quite tightly specifies topology layer 2 devices usually core larger network configured able achieve much faster failover times layer 2 protocols spanning tree | [] | Train |
7,095 | 5 | Roger_Wilco_(software):roger wilco software roger wilco one first voice-over-ip client programs designed primarily use online multiplayer video games roger wilco enabled online gamers talk one another computer headset audio input device instead typing messages within year software introduction 2 million online video gamers flocked application roger wilco procedure words radiophone communication mean understood message comply roger wilco developed us startup company called resounding technology three company four founders roommates undergraduate students princeton university adam frankl tony lovell henri de marcellus david lewis led marketing business development based silicon valley responsible growing roger wilco community managed partnerships video game publishers bundled roger wilco games plantronics pny game peripheral manufacturers also bundled roger wilco products company began publishing pre-release versions software autumn 1998 first general availability release roger wilco mark followed may 1999 company distributed client server freeware server software roger wilco base station developed linux freebsd windows 9x windows nt development client mac os never progressed beyond alpha phase david lewis demonstrated product server-less voice capabilities mpath interactive startup company silicon valley went acquire resounding technology based proprietary peer-to-peer voice technology company ipo 'd soon renamed hearme inc december 2000 gamespy bought roger wilco intellectual property early 2001 integrated updated version client software game server browser gamespy arcade players could use roger wilco software bought subscription gamespy game tools suite david lewis licensed sdk versions voice technology virtually every major game publisher including activision ea microsoft ubisoft others licensing arrangement microsoft enabled use voice sdk microsoft xbox required multi-player xbox game developers included in-game voice chat capabilities today virtually every leading online multiplayer game includes voicechat due pioneering efforts resounding team gamespy published final version roger wilco client windows july 8 2003 year vice president consumer products gamespy industries told boston globe roger wilco 5 million users | [
576,
4490,
7983,
8976,
499,
823,
1754
] | None |
7,096 | 4 | Lookout_(IT_security):lookout security lookout private security company headquartered san francisco california develops markets cloud-based security software mobile devices company founded 2007 three security researchers previously consulting name flexilis years raised 300 million venture capital funding lookout also expanded consumer android app mobile devices operating systems business version lookout founded three security researchers met university southern california los angeles students formed consulting firm focused cybersecurity called flexilis 2003 2004 discovered vulnerability nokia phones allowed take control phones remotely bluetooth founders could n't get nokia patch vulnerability scanned data nokia phones 2005 academy awards using high-powered bluetooth device publicity stunt exposing security vulnerabilities private phones celebrities led widespread media attention nokia soon fixed problem 2007 flexilis began developing mobile security app raised 5.5 million venture capital 2009 flexilis changed name lookout 11 million venture capital funding raised 2010 followed 40 million 2011 75 million 2012 55 million 2013 series f funding round 2014 raised another 150 million funding 2014 co-founder john hering stepped ceo former juniper networks executive jim dolce appointed position 2017 lookout citizen lab discovered malicious app called pegasus made israeli-firm nso group iphone android versions posed ordinary apps took control phone downloaded following year lookout electronic frontier foundation published report exposing series similar hacking campaigns lebanese government called dark caracal lookout develops markets security app mobile phones also called lookout free version includes antivirus antimalware scans locator features free version comes pre-installed android devices sold t-mobile sprint paid versions add ability remotely lock wipe phone backup photos features enterprise version adds analytics admin console tools detect malicious software corporate networks first free version lookout introduced december 2009 first paid version introduced following year safe browsing browser add-on added 2011 2012 version 3 lookout overhauled user interface added signal flare documents phone location runs battery following year lookout added feature secretly takes photo someone tries unlock phone unsuccessfully order catch thieves first business version added features administrators introduced 2013 followed first enterprise version june 2015 | [
6186,
8172,
2542
] | Test |
7,097 | 2 | Intel_Advisor:intel advisor intel advisor also known advisor xe vectorization advisor threading advisor simd vectorization optimization shared memory threading assistance tool c c++ c fortran software developers architects product available windows linux operating systems form standalone gui tool microsoft visual studio plug-in command line interface also supporting usage mpi intel advisor incorporates two workflows two feature-sets vectorization advisor threading advisor vectorization advisor supports analysis scalar sse avx avx2 avx-512-enabled codes generated intel gnu microsoft compilers auto-vectorization also supports analysis explicitly vectorized codes use openmp 4.x intel cilk plus well codes written using c vector intrinsics assembly language intel advisor includes following main features vectorization advisor capability introduced 2016 release intel advisor works compilers gcc microsoft provide additional information used intel compilers version 15.x newer examples include vectorize vector efficiency metrics intel advisor available part intel parallel studio xe vectorization advisor part intel advisor 2016 supports native analysis 2nd generation intel® xeon phi™ codenamed knights landing processor starting intel advisor 2016 update 3 version advisor survey map analysis several avx-512-specific tuning capabilities advisor also separate capability analysis non-executed code paths analyze avx-512 code characteristics running analysis platforms n't support avx-512 intel advisor automates roofline performance model first proposed berkeley extended university lisbon advisor roofline analysis helps identify given loop/function memory cpu bound also identifies optimized loops high impact performance optimized public sources known used schlumberger sandia national lab well leading design company classified great timesaver incredibly useful tool supporting parallel algorithm research advisor also aims simplify speed-up parallel design implementation providing step-by-step workflow claimed useful academia educational purposes public sources new vectorization advisor capabilities introduced august 2015 known used lrz ichec daresbury lab pexip prototype threading designs software architects add code annotations describe threading understood advisor ignored compiler advisor projects scalability threading checks synchronization errors threading suitability projections intel xeon phi beginning 2015 release suitability analysis supported first generation intel xeon phi™ coprocessor knights corner threading performance scalability parallel runtimes overheads modeling suitability estimates intel® xeon phi™ processor peak performance given loop/workload automatically compares appropriate double-socket 16-core intel® xeon® reference performance baseline | [
833,
2821,
9095,
6184,
8680,
779,
7983,
8126,
823,
3162,
1916,
477,
3962
] | Test |
7,098 | 4 | Vundo:vundo vundo trojan commonly known vundo virtumonde virtumondo sometimes referred ms juan either trojan horse computer worm known cause popups advertising rogue antispyware programs sporadically misbehavior including performance degradation denial service websites including google facebook also used deliver malware host computers later versions include rootkits ransomware vundo infection typically caused either opening e-mail attachment carrying trojan variety browser exploits including vulnerabilities popular browser plug-ins java many popups advertise fraudulent programs antispywaremaster winfixer antivirus 2009. codice_1 consists two main components browser helper objects class id components windows registry hkey local machine file names dynamic attaches system using bogus browser helper objects dll files attached winlogon.exe explorer.exe recently lsass.exe vundo inserts registry entries suppress windows warnings disabling firewall antivirus automatic updates service disables automatic updates service quickly re-disables manually re-enabled attacks malwarebytes anti-malware spybot search destroy lavasoft ad-aware hijackthis several malware removal tools frequently hides vundofix combofix rather pushing fake antivirus products new ad popups drive download attacks copies ads major corporations faked simply closing allows drive-by download exploit insert payload user computer since many different varieties vundo trojans symptoms vundo vary widely ranging relatively benign severe almost varieties vundo feature sort pop-up advertising well rooting make difficult delete computers infected exhibit following symptoms | [
10756,
9746,
4374,
3351,
6938,
3867,
2213,
5677,
1970,
2611,
9791,
3394,
4165,
9569,
3555,
877,
6643,
7413,
2041
] | None |
7,099 | 3 | INT_16H:int 16h int 16h int 16h int 22 shorthand bios interrupt call 16hex 22nd interrupt vector x86-based computer system bios typically sets real mode interrupt handler vector provides keyboard services interruption responsible control pc keyboard interruption responsible obtaining basic keyboard functionality i.e responsible collecting keystrokes obtain status buffer keyboard etc standard encoding keyboard offers int 16 h us keyboard adapt coding int 16h another type keyboard example hebrew keyboard must attend scan-code key pressed perform suitable interpreting key want 101 letters keyboard keys int 16h interprets expanded keys scan-code different normal keys e.g. key pause | [
1408,
5312
] | Test |
7,100 | 1 | JDBC_driver:jdbc driver jdbc driver software component enabling java application interact database jdbc drivers analogous odbc drivers ado.net data providers ole db providers connect individual databases jdbc java database connectivity api requires drivers database jdbc driver gives connection database implements protocol transferring query result client database jdbc technology drivers fit one four categories jdbc type 1 driver also known jdbc-odbc bridge database driver implementation employs odbc driver connect database driver converts jdbc method calls odbc function calls driver platform-dependent makes use odbc turn depends native libraries underlying operating system jvm running upon also use driver leads installation dependencies example odbc must installed computer driver database must support odbc driver use driver discouraged alternative pure-java driver available implication application using type 1 driver non-portable given binding driver platform technology n't suitable high-transaction environment type 1 drivers also n't support complete java command set limited functionality odbc driver sun oracle provided jdbc-odbc bridge driver codice_1 driver native code java closed source sun's/oracle jdbc-odbc bridge removed java 8 vendors available driver written loading causes instance created also calls codice_2 instance parameter drivermanager list drivers available creating connection may sometimes case one jdbc driver capable connecting given url example connecting given remote database might possible use jdbc-odbc bridge driver jdbc-to-generic-network-protocol driver driver supplied database vendor cases order drivers tested significant drivermanager use first driver finds successfully connect given url first drivermanager tries use driver order registered drivers listed jdbc.drivers always registered first skip drivers untrusted code unless loaded source code trying open connection tests drivers calling method driver.connect one turn passing url user originally passed method codice_3 first driver recognizes url makes connection jdbc type 2 driver also known native-api driver database driver implementation uses client-side libraries database driver converts jdbc method calls native calls database api example oracle oci driver type 2 driver jdbc type 3 driver also known pure java driver database middleware database driver implementation makes use middle tier calling program database middle-tier application server converts jdbc calls directly indirectly vendor-specific database protocol differs type 4 driver protocol conversion logic resides client middle-tier like type 4 drivers type 3 driver written entirely java client-side jdbc driver may used multiple databases depends number databases middleware configured support type 3 driver platform-independent platform-related differences taken care middleware also making use middleware provides additional advantages security firewall access jdbc type 4 driver also known direct database pure java driver database driver implementation converts jdbc calls directly vendor-specific database protocol written completely java type 4 drivers thus platform independent install inside java virtual machine client provides better performance type 1 type 2 drivers overhead conversion calls odbc database api calls unlike type 3 drivers need associated software work database protocol vendor specific jdbc client requires separate drivers usually vendor supplied connect different types databases | [
9471,
9348,
7175,
4490,
5677,
7983,
9263,
9234,
2901,
9144,
8122,
6015
] | Validation |
7,101 | 2 | Crash_reporter:crash reporter crash reporter usually system software whose function identify reporting crash details alert crashes production development testing environments crash reports often include data stack traces type crash trends version software reports help software developers- web saas mobile apps diagnose fix underlying problem causing crashes crash reports may contain sensitive information passwords email addresses contact information become objects interest researchers field computer security implementing crash reporting tools part development cycle become standard crash reporting tools become commodity many offered free like crashlytics many giant industry players part software development eco-system entered game companies twitter google others putting lot efforts encouraging software developers use apis knowing increase revenues road advertisements mechanisms realize must offer elegant solutions many possible development issues otherwise competitors take actions keep adding advanced features crash reporting tools make important development functionality giant companies include portfolio solutions many crash reporting tools specialized mobile app many sdks macos standard crash reporter /system/library/coreservices/crash reporter.app crash reporter.app sends unix crash logs apple engineers look top text field window crash log bottom field user comments users may also copy paste log email client send application vendor use crash reporter.app 3 main modes display nothing crash display application crashed dialog box display crash report window microsoft windows includes crash reporting service called windows error reporting prompts users send crash reports microsoft online analysis information goes central database run microsoft consists diagnostic information helps company development team responsible crash debug resolve issue choose crash reports third party software available third party developers granted access microsoft system considers parts debug release process targeted bug fixes applied windows update words people experiencing particular type crash offered bug fix thus limiting exposure issue according der spiegel microsoft crash reporter exploited nsa tailored access operations tao unit hack computers mexico secretariat public security according source microsoft crash reports automatically harvested nsa xkeyscore database order facilitate operations another error reporting library windows crashrpt crashrpt library light-weight open source error handling framework applications created microsoft visual c++ running windows library distributed new bsd license crashrpt intercepts unhandled exceptions creates crash minidump file builds crash descriptor xml format presents interface allow user review crash report finally compresses sends crash report software support team crashrpt also provides server-side command line tool crash report analysis named crprober tool able read received crash reports directory generate summary file text format crash report also groups similar crash reports making easier determine popular problems crprober tool provide graphical interface rather cryptic difficult use also open-source server software named crashfix server store organize analyze crash reports sent crashrpt library group similar crash reports built-in bug tracker generate statistical reports crashfix server provides web-based user interface making possible several project members collaborate upload debugging symbols browse crash reports associate bugs crash reports abrt automated bug reporting tool claimed distro-independent deployed fedora red hat enterprise linux distributions abrt intercepts core dumps applications user-confirmation sends bug reports various bug-tracking systems fedora bugzilla ubuntu hosts public error tracker errors.ubuntu.com collects hundreds thousands error reports daily millions machines program crashes ubuntu crash handler apport notify user offer report crash user chooses report crash details possibly including core dump uploaded ubuntu server daisy.ubuntu.com analysis core dump automatically processed create stack trace crash signature crash signature used classify subsequent crash reports caused error bug buddy crash reporting tool used gnome platform application using gnome libraries crashes bug buddy generates stack trace using gdb invites user submit report gnome bugzilla user add comments view details crash report crash reporting tool used kde called dr. konqi user also get backtrace using gdb talkback also known quality feedback agent crash reporter used mozilla software version 1.8.1 report crashes products centralized server aggregation case-by-case analysis talkback proprietary software licensed mozilla corporation supportsoft mozilla product e.g mozilla firefox mozilla thunderbird crash talkback enabled talkback agent would appear prompting user provide optional information regarding crash talkback replace native os crash reporter enabled appear along talkback agent talkback replaced breakpad firefox since version 3 breakpad previously called airbag open-source replacement talkback developed google mozilla used current mozilla products firefox thunderbird significance first open source multi-platform crash reporting system since 2007 breakpad included firefox windows mac os x linux breakpad typically paired socorro receives classifies crashes users breakpad part crash reporting system includes reporting mechanism crashpad open-source crash reporter used google chromium developed replacement breakpad due update macos 10.10 removed api used breakpad crashpad currently consists crash-reporting client related tools macos windows considered substantially complete platforms crashpad became crash reporter client chromium macos march 2015 windows november 2015 world warcraft another program use crash reporter error reporter error reporter may detect crashes time sometimes os crash reporter invoked instead error reporter even known crash reporting errors android ios operating systems also built crash reporting functionality | [
3371,
6797,
5492,
5078,
2262,
8726,
11418,
637,
479
] | Test |
7,102 | 4 | UDP_flood_attack:udp flood attack udp flood attack denial-of-service dos attack using user datagram protocol udp sessionless/connectionless computer networking protocol using udp denial-of-service attacks straightforward transmission control protocol tcp however udp flood attack initiated sending large number udp packets random ports remote host result distant host thus large number udp packets victimized system forced sending many icmp packets eventually leading unreachable clients attacker may also spoof ip address udp packets ensuring excessive icmp return packets reach anonymizing network location operating systems mitigate part attack limiting rate icmp responses sent udp flood attack tools attack managed deploying firewalls key points network filter unwanted network traffic potential victim never receives never responds malicious udp packets firewall stops however firewalls 'stateful i.e hold number sessions firewalls also susceptible flood attacks | [
6080,
2018,
4163,
3428,
8998,
10924,
10651,
11413,
5402,
2299,
9727
] | Train |
7,103 | 4 | Cheetah_Mobile:cheetah mobile cheetah mobile inc chinese mobile internet company headquartered beijing china creator popular global mobile apps 634 million monthly active users jan 2017 company established 2010 merger kingsoft security conew image grew second-largest internet security software provider china according iresearch company located 1st yaojiayuan south rd chaoyang district beijing china 2014 cheetah mobile launched ipo selling 12 million american depositary shares us 14 per share thereby raised us 168 million ipo managed morgan stanley jp morgan chase co. credit suisse group kingsoft tencent major investors cheetah mobile holding 54 18 respectively late 2015 cheetah mobile announced entered global strategic partnership yahoo company incorporated yahoo ’ search native advertising platforms within apps result cheetah mobile stated revenue generated yahoo increased 30 percent daily within first two weeks february 2016 cheetah mobile cubot launched cheetahphone android 6.0 marshmallow based smartphone mwc barcelona spain august 2 2016 cheetah mobile announced acquisition french startup news republic 57 million news republic news aggregator cheetah mobile ad supported products include despite popularity clean master android app reported 2014 ads promoting clean master manipulate android users deceptive tactics browsing websites within app advertising framework april 2014 ferenc lászló nagy sophos labs captured pop-up ads led clean master warning device infected virus july 2014 cheetah mobile encouraged users uninstall google chrome replace cheetah mobile browser clean master clean optimization process practice allowed cheetah mobile gain unfair position marketplace led google crackdown december 2018 cheetah mobile implicated massive click fraud scheme leading google remove two apps play store cheetah mobile denied charges | [
2049,
7809,
131,
1417,
4374,
1052,
156,
798,
2721,
2213,
550,
1318,
6823,
2601,
8614,
2859,
3243,
6699,
8615,
6834,
4403,
10166,
704,
9537,
7362,
10308,
4421,
202,
1355,
4685,
5069,
10574,
10708,
2005,
11225,
1242,
2907,
8668,
2654,
9055,... | None |
7,104 | 3 | Sun-3:sun-3 sun-3 series unix computer workstations servers produced sun microsystems launched september 9 1985 sun-3 series vmebus-based systems similar earlier sun-2 series using motorola 68020 microprocessor combination motorola 68881 floating-point co-processor optional sun 3/50 proprietary sun mmu sun-3 systems supported sunos versions 3.0 4.1.1_u1 also current support netbsd linux models listed approximately chronological order max ram sizes may greater third-party memory board used 1989 coincident launch sparcstation 1 sun launched three new sun-3 models 3/80 3/470 3/480 unlike previous sun-3s use motorola 68030 processor 68882 floating-point unit 68030 integral mmu 68030-based architecture called sun-3x sun 3/260s upgraded sun 3400 cpu boards known sun 3/460s | [
3328,
9090,
5251,
7299,
9731,
1801,
4235,
1809,
4241,
2710,
1818,
8863,
7072,
9343,
8994,
1316,
10789,
1707,
2731,
5677,
6187,
3247,
6322,
1461,
2871,
823,
4664,
4285,
6464,
9665,
6338,
10436,
8007,
1480,
1611,
9422,
2895,
3919,
597,
3285... | Test |
7,105 | 3 | LGA_775:lga 775 lga 775 also known socket intel desktop cpu socket lga stands land grid array unlike earlier common cpu sockets predecessor socket 478 lga 775 socket holes instead 775 protruding pins touch contact points underside processor cpu socket unusually long life span lasting 7 years last processors supporting ceased production 2011 socket superseded lga 1156 socket h lga 1366 socket b sockets lga 775 distance four screw holes heatsink 72 mm thus interchangeable ones sockets lga 1156 1155 1150 1151 distance 75 mm prescott cedar mill pentium 4 cores well smithfield presler pentium cores used lga 775 socket july 2006 intel released desktop processor core 2 duo codenamed conroe also uses socket subsequent core 2 quad intel changed socket 478 lga 775 new pin type offers better power distribution processor allowing front-side bus raised 1600 mt/s 't socket derived cancelled tejas core replace prescott core another advantage intel newer architecture motherboard pins rather cpu transferring risk pins bent cpu motherboard cpu pressed place load plate rather human fingers directly installer lifts hinged load plate inserts processor closes load plate top processor pushes locking lever pressure locking lever load plate clamps processor 775 copper contact points firmly onto socket 775 pins ensuring good connection load plate covers edges top surface cpu integrated heat spreader center free make contact cooling device placed top cpu spacing cpu cooler mounting holes 72mm x 72mm examination relevant intel data sheets shows lga 775 used consumer level desktops lga 771 used xeon based intel workstation server class computers appear differ placement indexing notches swap two address pins many pins devoted functions interfacing multiple cpus clearly defined lga 775 specifications information available appear consistent lga 771 considering lga 775 predated lga 771 nearly year half would seem lga 771 adapted lga 775 rather way around fact using adapter allow lga 771 processors used lga 775 motherboards i845gv/ge/i848p/i865g/gv/p/pe/i910gl/i915g/gl/gv/p/pl/i925x/xe/ lakeport 945pl /945p 945g 945gc 945gz 955x 946pl 946gz p broadwater i955x i946 946gz pl 965 i975 q965 p965 g965 q963 i975x bearlake x35 p35 q35 g35 p33 g33 q33 p31 g31 x38 eaglelake x48 p45 p43 g45 g43 g41 b43 q43 q45 sis 649/649fx/655/656/656fx/662/671/671fx/671dx/672 pt800/pm800/pt880/pm880/p4m800/p4m800 pro/pt880 pro/pt880 ultra/pt894/pt894 pro/p4m890/pt890/p4m900 ati radeon xpress 200 ati radeon xpress 1250 ati crossfire xpress 3200 nforce4 ultra nforce4 sli xe nforce4 sli nforce4 sli x16 nforce 570 sli nforce 590 sli nforce 610i nforce 630i nforce 650i ultra nforce 650i sli nforce 680i lt sli nforce 680i sli nforce 730i nforce 740i sli nforce 750i sli nforce 760i sli nforce 780i sli nforce 790i sli geforce 9300 geforce 9400 sources force load plate ensures processor completely level giving cpu upper surface optimal contact heat sink cold-water block fixed onto top cpu carry away heat generated cpu socket also introduces new method connecting heat dissipation interface chip surface motherboard lga 775 heat dissipation interface connected directly motherboard four points compared two connections socket 370 clamshell four-point connection socket 478 done avoid reputed danger heat sinks/fans pre-built computers falling transit lga 775 announced better heat dissipation properties socket 478 designed replace prescott core cpus early incarnations ran much hotter previous northwood-core pentium 4 cpus initially neutralized benefits better heat transfer however modern core 2 processors run much lower temperatures prescott cpus replace lga 775 processors following mechanical maximum load limits exceeded heat sink assembly shipping conditions standard use load limits could crack processor die make unusable transition lga packaging lowered load limits smaller load limits socket 478 processors bigger socket 370 socket 423 socket processors fragile large enough ensure processors crack compatibility quite variable earlier chipsets intel 915 tend support single core netburst pentium 4 celeron cpus fsb 533/800 mt/s intermediate chipsets e.g intel 945 commonly support single core pentium 4-based cpus well dual core pentium processors 945 chipset-based motherboards could given bios upgrade support 65nm core-based cpus chipsets also varies lga 775 cpu support complicated mixture chipset capability voltage regulator limitations bios support example g41 chipset n't support netburst cpus pentium pentium extreme edition pentium 4 celeron | [
3588,
9611,
5901,
5523,
2455,
3992,
3352,
8855,
3995,
4252,
11417,
6175,
7714,
10019,
4523,
2604,
2350,
6192,
9649,
3892,
4537,
4805,
7110,
8394,
3403,
4427,
4179,
3798,
4185,
7002,
9945,
10715,
11484,
9570,
10468,
613,
8552,
7657,
1260,
... | Validation |
7,106 | 2 | Features_new_to_Windows_8:features new windows 8 transition windows 7 windows 8 introduced number new features across various aspects operating system include greater focus optimizing operating system touchscreen-based devices tablets cloud computing windows 8 introduces new windows runtime winrt platform used create new type application officially known windows store apps commonly called metro-style apps apps run within secure sandbox share data apps common apis winrt com-based api allows use various programming languages code apps including c++ c++/cx c visual basic .net html5 javascript metro-style apps packaged distributed via appx new file format package management unlike desktop applications metro-style apps sideloaded subject licensing conditions windows 8.1 update allows sideloading apps windows 8.1 pro devices joined active directory domain windows 8 two apps may snap side widescreen display allow multi-tasking forming sidebar separates apps windows 8.1 apps continually resized desired width snapped apps may occupy half screen large screens allow four apps snapped upon launching app windows allows user pick snapped view app open term metro-style apps referred metro design language prominently used windows 8 recent microsoft products reports surfaced microsoft employees told stop using term due potential trademark issues unspecified partner microsoft spokesperson however denied reports stated metro-style merely codename new application platform windows 8 introduces apis support near field communication nfc windows 8 devices allowing functionality like launching urls/applications sharing information devices via nfc windows store digital distribution platform built windows 8 manner similar apple app store google play allows distribution purchase apps designed windows 8 developers still able advertise desktop software windows store well ensure secure high quality windows store means distributing winrt-based apps consumer-oriented versions windows 8 windows 8.1 windows store features redesigned interface improved app discovery recommendations offers automatic updates apps windows 8 features redesigned user interface built upon metro design language optimizations touchscreens metro-style apps either run full-screen environment snapped side screen alongside another app desktop snapping requires screen resolution 1366×768 higher windows 8.1 lowers snapping requirement screen resolution 1024x768 users switch apps desktop clicking top left corner swiping left side touchscreen invoke sidebar displays currently opened metro-style apps right-clicking upper left corner provides context menu options switch open apps traditional desktop accessible tile start screen launching desktop app shortcut cycles programs regardless type interface also incorporates taskbar right side screen known charms lowercase accessed app desktop sliding right edge touchscreen compatible trackpad moving mouse cursor one right corners screen pressing charms include search share start devices settings charms start charm invokes dismisses start screen charms invoke context-sensitive sidebars used access app system functionality aforementioned changes involving use hot corners user interface navigation windows 8 fundamentally different compared previous versions windows assist new users operating system microsoft incorporated tutorial appears installation windows 8 also first sign-in new user account visually instructs users move mouse cursor corner screen swipe corners devices touchscreens interact operating system tutorial disabled appear new user accounts windows 8.1 introduces navigation hints instructions displayed first use operating system also includes help support app windows 8.1 aforementioned hotspots upper right upper left corners disabled pressing right-clicking bottom left corner screen opens quick link menu menu contains shortcuts frequently used areas control panel file explorer programs features run search power options task manager windows 8.1 quick link menu includes options shut restart device windows 8.1 update introduced changes facilitate mouse-oriented means switching closing metro-style apps patterned upon mechanics used desktop programs windows user interlace lieu recent apps sidebar computer icons opened apps displayed taskbar desktop programs shortcuts apps also pinned taskbar mouse connected auto-hiding titlebar minimize close buttons displayed within apps mouse moved toward top screen number apps included standard installation windows 8 including mail email client people contact manager messaging im client calendar calendaring app photos image viewer music audio player video video player camera webcam digital camera client skydrive reader e-book reader six apps expose bing services search news finance weather travel sports windows 8.1 adds calculator alarm clock sound recorder reading list food drink health fitness help tips scan file manager integrated skydrive app windows 8 also includes metro-style system component called pc settings exposes small portion control panel settings windows 8.1 improves component include options previously exclusive control panel windows 8.1 update adds additional options pc settings windows 8 introduces new form start menu called start screen resembles home screen windows phone shown place desktop startup start screen serves primary method launching applications consists grid app tiles arranged columnar groups groups arranged without group names app tiles either small taking 1 square large taking 2 squares size also display dynamic content provided corresponding apps notifications slide shows users arrange individual app tiles entire groups additional section start screen called apps accessed via right click mouse upward swipe display installed apps categorized names semantic zoom feature available start screen apps view enables users target specific area group screen start screen uninstall apps directly windows 8.1 makes following changes start screen windows 8.1 reverts two changes featured windows 8 windows 8 removed start button taskbar favor ways invoking start screen windows 8.1 restores button windows 8 also showed start screen upon logon opposed editions windows show desktop windows 8.1 user may choose one see first windows 8.1 update boots desktop default non-tablet devices introduces ability switch taskbar start screen open metro-style app directing mouse cursor toward bottom screen windows 8.1 introduces new slide shutdown option allows users drag partially revealed lock screen image toward bottom screen shut operating system windows 8.1 update introduces visible power button start screen power button appear hardware device types default new account profiles windows 8.1 update also receive four additional tiles pinned start screen pc pc settings documents pictures windows rt pc settings tile added windows 8 searching start screen clicking search charm display search results within full-screen interface unlike previous versions windows searching start menu returned results multiple sources simultaneously windows 8 searches individual categories apps settings files default windows 8 searches apps user begins searching start screen search charm also search categories user interface via keyboard shortcuts pressing opens search charm search apps searches files searches settings search queries also redirected specific categories apps entered searching apps windows 8 display list apps support search charm frequently used apps prioritized users pin individual apps always appear search charm also search directly within apps user redirects entered search query specific app presses within app already open searching files windows 8 highlight words phrases match search query provide suggestions based content properties files appear information files associated programs sizes appear directly beneath filenames user hovers file mouse cursor long presses finger tooltip appear display additional information windows 8.1 searching longer opens full-screen interface results instead displayed metro-style flyout interface windows 8.1 also reinstates unified local search results optionally provide results bing dubbed smart search windows 8.1 bing optionally analyze user search habits return relevant content stored locally internet enabled smart search exposes additional search categories within user interface web images web videos accessed via new keyboard shortcut new full screen hero interface powered bing display aggregated multimedia photos youtube videos songs/albums xbox music content news articles wikipedia entries related search query like predecessor windows 8.1 allows users search setting file categories option search category apps removed interface keyboard shortcut previously associated functionality displays unified search results search charm also longer search within apps directly display list compatible apps search content within apps users must first open app available use search feature within app interface windows 8.1 update enhances bing smart search feature providing support natural language queries detect misspellings display apps settings relevant query example typing get apps windows display shortcut windows store windows 8.1 update also introduces visible search button start screen acts shortcut metro-style flyout interface windows 8 introduces redesigned lock screen interface based metro design language lock screen displays customizable background image current date time notifications apps detailed app status updates two new login methods optimized touch screens also available including four-digit pin picture password users allow use certain gestures performed selected picture log gestures take account shape start end points well direction however shapes gestures limited tapping tracing line circle microsoft found limiting gestures increased speed sign-ins three times compared allowing freeform methods wrong gestures always deny login lock pc five unsuccessful attempts text password provided windows 8.1 introduces ability display photo slide show lock screen feature display images local remote directories includes additional options use photos optimized current screen resolution disable slide show device running battery power display lock screen slide show instead turning screen period user inactivity lock screen also display interactive toast notifications examples users answer calls instant messages received skype contacts dismiss alarm notifications lock screen users also take photos without dismissing lock screen windows 8 introduces new forms notifications metro-style apps certain events file explorer pc settings component includes options globally disable toast notifications app notifications lock screen notification sounds notifications also disabled per-app basis settings charm windows 8 provides additional options suppress toast notifications 1 hour 3 hour 8 hour time intervals windows 8.1 introduces quiet hours feature also available windows phone allows users suppress notifications based time day e.g. notifications disabled 12:00 6:00 pm windows 8 allows users link profiles microsoft account provide additional functionality synchronization user data settings including belonging desktop allows integration microsoft services xbox live xbox music xbox video gaming multimedia skydrive online file storage windows 8 includes improved support multi-monitor configurations taskbar optionally shown multiple displays display also show dedicated taskbar addition options available prevent taskbar buttons appearing certain monitors wallpapers also spanned across multiple displays display separate wallpaper windows 8.1 includes improved support high-resolution monitors desktop scaling feature helps resize items desktop solve visibility problems screens high native resolution windows 8.1 also introduces per-display dpi scaling provides option scale 200 windows explorer renamed file explorer incorporates ribbon toolbar designed bring forward commonly used commands easy access button advances user back level folder hierarchy removed explorer windows xp also restored additionally file explorer features redesigned preview pane takes advantage widescreen layouts file explorer also provides built-in function mounting iso img vhd files virtual drives easier management files folders windows 8 introduces ability move selected files folders via drag drop parent folder subfolder listed within breadcrumb hierarchy address bar file explorer progress windows file operations also redesigned offering ability show multiple operations graph tracking transfer speeds ability pause resume file transfer new interface also introduced managing file name collisions file operation allowing users easily control conflicting files copied libraries introduced windows 7 individual icons changed user interface previously users change icons manually editing configuration files windows 8.1 however longer creates default libraries new users display libraries listing file explorer default instead windows 8.1 introduces shortcuts default user profile folders documents downloads pictures etc within pc location file explorer windows 8 ships internet explorer 10 run either desktop program operates similarly internet explorer 9 app new full-screen interface optimized use touchscreens internet explorer 10 also contains integrated version flash player available full desktop limited form within metro app windows 8.1 ships internet explorer 11 includes tab syncing webgl spdy support along expanded developer tools metro version also adds access favorites split-screen snapping multiple tabs additional option always display address bar tabs also available metro version also detect highlight phone numbers web page turn clickable links clicked initiate call compatible app skype windows 8 includes overhauled version task manager features following changes windows 8 introduces revised virtual also known on-screen keyboard interface optimized touchscreen devices includes wider spacing keys designed prevent common typing errors occur using touchscreens pressing holding key reveals related keys accessed via press swipe suggestions incomplete words available emoji characters also supported windows 8.1 introduces ability swipe space bar desired direction suggested word switch on-screen suggestions windows 8.1 update introduces new gesture allows users tap twice hold second tap drag drop highlighted text objects visible option hide show virtual keyboard also available windows 8 displays peek button password text boxes optionally allows users view passwords entered order ensure typed correctly feature disabled via group policy file history continuous data protection component file history automatically creates incremental backups files stored libraries including users participating homegroup user-specified folders different storage device another internal external hard drive storage space network share specific revisions files tracked restored using history functions file explorer file history replaces backup restore shadow copy known windows explorer previous versions main backup tool windows 8 unlike shadow copy performs block-level tracking files file history utilizes usn journal track changes simply copies revisions files backup location unlike backup restore file history back files encrypted efs windows 8 adds native support usb 3.0 allows faster data transfers improved power management compatible devices native stack includes support newer efficient usb attached scsi uas protocol turned default even usb 2.0 devices although must however supporting firmware/hardware take advantage windows 8.1 enhanced support power saving features usb storage devices addition without problems poorly implemented hardware degrading user experience hangs disconnects support advanced format hard drives without emulation included first time port windows arm architecture also created windows 8 known windows rt specifically optimized mobile devices tablets windows rt able run third-party windows store apps comes preinstalled version office 2013 specially redesigned touchscreen use windows 8.1 improves hardware support directx 11.2 alongside existing winpe-based windows setup used installations initiated booting dvd usb network upgrade assistant offered provide simpler faster process upgrading windows 8 previous versions windows program runs compatibility check scan device hardware software windows 8 compatibility allows user purchase download generate installation media dvd usb flash drive install windows 8 new installation process also allows users transfer user data clean installation windows similar program branded windows 8 setup used installations user already product key windows 8 implements oem activation 3.0 allows microsoft digitally distribute windows licenses original equipment manufacturers oems windows 8 devices store product keys directly firmware rather printed certificate authenticity coa sticker new system designed prevent oem product keys used computers licensed also allows installer automatically detect accept product key event re-installation windows 8.1 update adds new installation mode known wimboot wim image contains windows installation left compressed rather extracted system configured use files directly within system image installation method primarily designed reduce footprint windows installation devices small amounts storage system image also doubles recovery image speeding refresh reset operations supported systems unified extensible firmware interface uefi windows located solid-state drive emmc windows 8 incorporates improved support mobile broadband first-class method internet connectivity upon insertion sim card operating system automatically determine user carrier configure relevant connection settings using access point name database operating system also monitor mobile data usage changes behavior accordingly reduce bandwidth use metered networks carriers also offer dedicated windows store apps account management also installed automatically part connection process functionality demonstrated app could also display monthly data usage statistics live tile windows 8 also reduces need third-party drivers software implement mobile broadband providing generic driver providing integrated airplane mode option windows 8 supports geolocation windows 8.1 adds support nfc printing mobile broadband tethering auto-triggered vpn geofencing windows 8.1 update provides options network settings charm show estimated data usage selected network designate network metered connection windows 8 defaults hybrid boot mode operating system shut hibernates kernel allowing faster boot subsequent startup improvements compounded using processor cores startup default create seamless transition power-on self-test windows startup process manufacturers logos shown windows boot screen compatible systems uefi advanced startup menu uses graphical interface mouse touch support place text-based menu used previous versions increased boot speed devices uefi make difficult access using keyboard shortcuts boot menu launched within windows—using either pc settings app holding shift clicking restart option power menu using new -o switch shutdown.exe though legacy version advanced startup menu still enabled instead uefi firmware exposed windows via class drivers updated firmware capsules distributed update driver signed package inf file security catalog similarly devices driver installed windows prepares update installed next boot windows boot manager renders status information device boot screen windows 8 includes wddm 1.2 directx graphics infrastructure dxgi 1.2 desktop window manager runs times even systems unsupported graphics cards dwm also supports software rendering also includes support stereoscopic 3d content major features include preemptive multitasking finer granularity dma buffer primitive triangle pixel instruction-level reduced memory footprint improved resource sharing improved timeout detection recovery 16-bit color surface formats 565 5551 4444 mandatory windows 8 direct3d 11 video supports yuv 4:4:4/4:2:2/4:2:0/4:1:1 video formats 8 10 16-bit precision well 4 8-bit palettized formats windows 8.1 introduces wddm 1.3 adds support miracast enables wireless wired delivery compressed standard- high-definition video desktops tablets mobile phones devices windows 8 adds support printer driver architecture version 4 adds metro friendly interface well changes way architecture written windows 8.1 adds support wi-fi direct printing nfc printing native apis 3d printing xml-based 3d manufacturing format 3mf windows powershell microsoft task automation framework consisting command-line shell associated scripting language built .net framework powershell provides full access com wmi enabling administrators perform administrative tasks local remote windows systems windows 8 includes windows powershell v3.0 windows 8.1 comes windows powershell v4.0 features host new commands managing start screen windows defender windows components hardware network windows go feature exclusive enterprise version windows 8 allows organization provision bootable usb flash drives windows installation allowing users access managed environment compatible pc windows 8.1 updates feature enable booting usb composite device storage smart card function action center introduced windows 7 expanded include controls notifications new categories smartscreen status drive health status file history device software updates new automatic maintenance feature periodically perform number maintenance tasks diagnostics updates malware scans improve system performance pc settings app windows 8 used interact windows update although traditional interface control panel retained windows 8 able distribute firmware updates compatible devices configured automatically download windows updates metered networks new set windows powershell cmdlets enable adding removing features windows programs features applet control panel deployment image servicing management dism utility windows 8 includes features previously available imagex able periodically check component store corruption repair report amount disk space use winsxs folder also determine cleanup performed windows 8 detect system experiencing issues preventing system functioning correctly automatically launch advanced startup menu access diagnostic repair functions system recovery windows 8 introduced new functions known collectively push-button reset allows user re-install windows without needing use installation media feature consists reset refresh functions accessible within advanced boot options menu pc settings options reboot system windows recovery environment perform requested operation refresh preserves user profiles settings windows store apps reset performs clean installation windows reset function may also perform specialized disk wiping formatting procedures added security operations remove installed desktop applications system users also create custom disk image use refresh reset windows 8 introduces virtual smart card support digital certificate smart card stored onto user machine protected trusted platform module thereby eliminating need user physically insert smart card though entering pin still required virtual smart card support enables new two-factor authentication scenarios windows 8.1 improves functionality simplifying device enrollment process virtual smart cards introduces additional virtual smart card functionality metro-style applications enrollment management features via winrt apis windows 8.1 features pervasive support biometric authentication throughout operating system includes native fingerprint registration feature enables use fingerprint tasks signing device purchasing apps windows store consenting authentication prompts e.g. user account control windows 8.1 also introduces new winrt apis biometrics windows rt logging microsoft account automatically activates passive device encryption feature-limited version bitlocker seamlessly encrypts contents mobile devices protect contents windows 8.1 device encryption similarly available x86-based windows devices automatically encrypting user data soon operating system configured user signs microsoft account supported active directory network recovery key generated saved directly user account unlike bitlocker device encryption x86-based devices requires device meet connected standby specifications among requirements requires device use solid state storage ram soldered directly motherboard trusted platform module tpm 2.0 chip windows 8.1 introduces assigned access formerly called kiosk mode restricts windows device running single predetermined metro-style app windows 8.1 slated include provable pc health feature would allow owners subject devices connected network remote pc analysis provable pc health connected devices would periodically send various configuration-related information cloud service would provide suggestions remediation upon detection issue however feature dropped operating system general availability windows 8 integrates windows live family safety operating system allowing parents restrict user activity via web filtering application restriction computer usage time limits parental controls functionality introduced windows vista previously partially removed windows 7 made part windows live family safety instead notable change family safety administrators specify time periods computer usage example administrator restrict user account remained signed total time period one hour previous versions windows administrators could restrict accounts based time day windows 8 introduced four new features offer security startup process uefi secure boot trusted boot measured boot early launch anti-malware elam four secure boot native feature windows 8 part uefi startup uefi firmware checks validity digital signature present windows boot loader bootmgfw.efi signed microsoft public key signature check happens every time computer booted prevents malware infecting system operating system loads uefi firmware allow signatures keys enrolled database prior windows 8 release microsoft announced certified computers ship microsoft public key enrolled secure boot enabled default however following announcement company accused critics free open-source software advocates including free software foundation trying use secure boot hinder outright prevent installation alternative operating systems linux microsoft denied secure boot requirement intended serve form lock-in clarified x86 certified systems arm systems must allow secure boot enter custom mode disabled trusted boot feature windows boot loader ensures integrity microsoft components loaded memory including elam loads last elam ensures third-party boot drivers trustworthy loaded elam check fails elam use either windows defender third-party compatible antivirus 2011 build conference anaheim california microsoft showed windows 8 machine prevent infected usb flash memory compromising boot process measured boot attest state client machine sending details configuration remote machine feature relies attestation feature trusted platform module designed verify boot integrity client windows platform binary table allows executable files stored within uefi firmware execution startup microsoft states feature meant allow critical software persist even operating system changed reinstalled 'clean configuration specifically anti-theft security software also mis-used including lenovo lenovo service engine feature windows 8 includes updated windows defender antivirus program defends system broad range malware including computer viruses computer worms spyware windows 8.1 augments network inspection system nis network intrusion detection system feature present microsoft security essentials since july 2010 windows 8 includes various features controlled keyboard shortcuts hyper-v native hypervisor previously offered windows server included windows 8 pro replacing windows virtual pc hosted hypervisor storage spaces storage virtualization technology succeeds logical disk manager allows organization physical disks logical volumes similar logical volume manager linux raid1 raid5 higher abstraction level storage space behaves like physical disk user thin provisioning available disk space spaces organized within storage pool i.e collection physical disks span multiple disks different sizes performance technology usb sata sas process adding new disks replacing failed older disks fully automatic controlled powershell commands storage pool host multiple storage spaces storage spaces built-in resiliency disk failures achieved either disk mirroring striping parity across physical disks storage pool refs filesystem limited 4 pb 4096 tb limits total number storage pools number storage spaces within pool review ars technica concluded storage spaces windows 8 good foundation current iteration simply flawed recommend circumstances microsoft mvp helge klein also criticized storage spaces unsuitable touted market soho users storage spaces enhanced windows server 2012 r2 tiering caching support used caching ssd new features added windows 8.1 instead windows 8.1 gained support specific features sshd drives e.g host-hinted lba caching tp_042v14_sata31_hybrid information windows 8.1 also gained support nvm express nvme new industry standard protocol pcie-attached storage pcie flash cards | [
6150,
9744,
9745,
11283,
537,
6171,
4637,
3102,
8740,
3109,
11301,
6697,
1581,
3122,
9780,
2101,
7739,
10811,
582,
1098,
4178,
8798,
4194,
10338,
8296,
5225,
8299,
7796,
5749,
6265,
8315,
1659,
636,
639,
641,
651,
6797,
10896,
9874,
2196,... | None |
7,107 | 4 | National_Cyber_Security_Hall_of_Fame:national cyber security hall fame national cyber security hall fame founded larry letow rick geritz established 2012 recognize contributions key individuals field cyber security mission statement respect past protect future according website designed honor innovative individuals organizations vision leadership create fundamental building blocks cyber security industry organization also highlights major milestones industry 40-year history timeline representation includes inductees corresponding accomplishments nominations cyber security hall fame submitted following categories reviewed advisory committee chaired 2013 mike jacobs 2019 members cyber security hall fame advisory board | [
1312,
3361,
8865,
1059,
8283,
4049,
6005,
8155,
2558
] | Test |
7,108 | 5 | Pulse-code_modulation:pulse-code modulation pulse-code modulation pcm method used digitally represent sampled analog signals standard form digital audio computers compact discs digital telephony digital audio applications pcm stream amplitude analog signal sampled regularly uniform intervals sample quantized nearest value within range digital steps linear pulse-code modulation lpcm specific type pcm quantization levels linearly uniform contrast pcm encodings quantization levels vary function amplitude a-law algorithm μ-law algorithm though pcm general term often used describe data encoded lpcm pcm stream two basic properties determine stream fidelity original analog signal sampling rate number times per second samples taken bit depth determines number possible digital values used represent sample early electrical communications started sample signals order multiplex samples multiple telegraphy sources convey single telegraph cable american inventor moses g. farmer conveyed telegraph time-division multiplexing tdm early 1853 electrical engineer w. m. miner 1903 used electro-mechanical commutator time-division multiplexing multiple telegraph signals also applied technology telephony obtained intelligible speech channels sampled rate 3500–4300 hz lower rates proved unsatisfactory 1920 bartlane cable picture transmission system used telegraph signaling characters punched paper tape send samples images quantized 5 levels 1926 paul m. rainey western electric patented facsimile machine transmitted signal using 5-bit pcm encoded opto-mechanical analog-to-digital converter machine go production british engineer alec reeves unaware previous work conceived use pcm voice communication 1937 working international telephone telegraph france described theory advantages practical application resulted reeves filed french patent 1938 us patent granted 1943 time reeves started working telecommunications research establishment first transmission speech digital techniques sigsaly encryption equipment conveyed high-level allied communications world war ii 1943 bell labs researchers designed sigsaly system became aware use pcm binary coding already proposed reeves 1949 canadian navy datar system ferranti canada built working pcm radio system able transmit digitized radar data long distances pcm late 1940s early 1950s used cathode-ray plate electrode encoding perforations oscilloscope beam swept horizontally sample rate vertical deflection controlled input analog signal causing beam pass higher lower portions perforated plate plate collected passed beam producing current variations binary code one bit time rather natural binary grid goodall later tube perforated produce glitch-free gray code produced bits simultaneously using fan beam instead scanning beam united states national inventors hall fame honored bernard m. oliver claude shannon inventors pcm described communication system employing pulse code modulation filed 1946 1952 granted 1956 another patent title filed john r. pierce 1945 issued 1948 three published philosophy pcm 1948 t-carrier system introduced 1961 uses two twisted-pair transmission lines carry 24 pcm telephone calls sampled 8 khz 8-bit resolution development improved capacity call quality compared previous frequency-division multiplexing schemes 1967 first pcm recorder developed nhk research facilities japan 30 khz 12-bit device used compander similar dbx noise reduction extend dynamic range stored signals video tape recorder 1969 nhk expanded system capabilities 2-channel stereo 32 khz 13-bit resolution january 1971 using nhk pcm recording system engineers denon recorded first commercial digital recordings 1972 denon unveiled first 8-channel digital recorder dn-023r used 4-head open reel broadcast video tape recorder record 47.25 khz 13-bit pcm audio 1977 denon developed portable pcm recording system dn-034r like dn-023r recorded 8 channels 47.25 khz used 14-bits emphasis making equivalent 15.5 bits 1973 adaptive differential pulse-code modulation adpcm developed p. cummiskey nikil jayant james l. flanagan compact disc cd brought pcm consumer audio applications introduction 1982 cd uses 44,100 hz sampling frequency 16-bit resolution stores 80 minutes stereo audio per disc pcm method encoding typically used uncompressed digital audio diagram sine wave red curve sampled quantized pcm sine wave sampled regular intervals shown vertical lines sample one available values y-axis chosen pcm process commonly implemented single integrated circuit called analog-to-digital converter adc produces fully discrete representation input signal blue points easily encoded digital data storage manipulation several pcm streams could also multiplexed larger aggregate data stream generally transmission multiple streams single physical link one technique called time-division multiplexing tdm widely used notably modern public telephone system electronics involved producing accurate analog signal discrete data similar used generating digital signal devices digital-to-analog converters dacs produce voltage current depending type represents value presented digital inputs output would generally filtered amplified use recover original signal sampled data demodulator apply procedure modulation reverse sampling period demodulator reads next value transitions output signal new value result transitions signal gains significant amount high-frequency energy due aliasing effects remove undesirable frequencies demodulator passes signal reconstruction filter suppress energy outside expected frequency range greater nyquist frequency formula_1 common sample depths lpcm 8 16 20 24 bits per sample lpcm encodes single sound channel support multichannel audio depends file format relies synchronization multiple lpcm streams two channels stereo common format systems support 8 audio channels 7.1 surround common sampling frequencies 48 khz used dvd format videos 44.1 khz used compact discs sampling frequencies 96 khz 192 khz used equipment benefits debated nyquist–shannon sampling theorem shows pcm devices operate without introducing distortions within designed frequency bands provide sampling frequency least twice highest frequency contained input signal example telephony usable voice frequency band ranges approximately 300 hz 3400 hz effective reconstruction voice signal telephony applications therefore typically uses 8000 hz sampling frequency twice highest usable voice frequency regardless potential sources impairment implicit pcm system forms pcm combine signal processing coding older versions systems applied processing analog domain part analog-to-digital process newer implementations digital domain simple techniques largely rendered obsolete modern transform-based audio compression techniques telephony standard audio signal single phone call encoded 8,000 samples per second 8 bits giving 64 kbit/s digital signal known ds0 default signal compression encoding ds0 either μ-law mu-law pcm north america japan a-law pcm europe rest world logarithmic compression systems 12- 13-bit linear pcm sample number mapped 8-bit value system described international standard g.711 circuit costs high loss voice quality acceptable sometimes makes sense compress voice signal even adpcm algorithm used map series 8-bit µ-law a-law pcm samples series 4-bit adpcm samples way capacity line doubled technique detailed g.726 standard later found even compression possible additional standards published international standards describe systems ideas covered privately owned patents thus use standards requires payments patent holders adpcm techniques used voice ip communications pcm either return-to-zero rz non-return-to-zero nrz nrz system synchronized using in-band information must long sequences identical symbols ones zeroes binary pcm systems density 1-symbols called ones-density ones-density often controlled using precoding techniques run length limited encoding pcm code expanded slightly longer code guaranteed bound ones-density modulation channel cases extra framing bits added stream guarantee least occasional symbol transitions another technique used control ones-density use scrambler polynomial raw data tend turn raw data stream stream looks pseudo-random raw stream recovered exactly reversing effect polynomial case long runs zeroes ones still possible output considered unlikely enough within normal engineering tolerance cases long term dc value modulated signal important building dc offset tend bias detector circuits operating range case special measures taken keep count cumulative dc offset modify codes necessary make dc offset always tend back zero many codes bipolar codes pulses positive negative absent typical alternate mark inversion code non-zero pulses alternate positive negative rules may violated generate special symbols used framing special purposes word pulse term pulse-code modulation refers pulses found transmission line perhaps natural consequence technique evolved alongside two analog methods pulse width modulation pulse position modulation information encoded represented discrete signal pulses varying width position respectively respect pcm bears little resemblance forms signal encoding except used time division multiplexing numbers pcm codes represented electrical pulses device performs coding decoding function telephone circuit called codec | [
8192,
646,
2057,
10381,
1550,
7698,
2968,
2458,
5020,
10270,
5664,
11686,
3496,
8232,
5291,
7723,
2221,
2989,
9006,
1969,
2994,
3123,
5304,
1849,
3130,
1083,
2368,
7490,
3140,
7108,
2891,
3788,
3921,
10833,
3156,
3416,
7900,
3040,
1121,
3... | Validation |
7,109 | 3 | ETen_Chinese_System:eten chinese system eten chinese system 倚天中文系統 popular dos-compatible traditional chinese operating system chinese windows 95 dos support chinese characters extended ascii many companies taiwan developed ibm pc compatible traditional chinese operating system running dos mutually incompatible os kuo chia 國喬 acer developer eten os e-ten earned early profits sales hardware based plug-in card based chinese system products software chinese systems widely copied many traditional chinese users software pirates difficult e-ten control traditional chinese products compatible eten os time microsoft developed chinese windows 3.1 windows 95 traditional chinese software developer users shifted windows dos last version eten os chinese windows-compatible version eten traditional chinese os used dos based pos systems | [
6129
] | Test |
7,110 | 3 | Socket_423:socket 423 socket 423 423 pin cpu socket used first generation pentium 4 processors based willamette core replaced socket 478 2001 socket houses processor designed socket 423 package socket short-lived became apparent electrical design proved inadequate raising clock speed beyond 2.0 ghz intel produced chips using socket less year november 2000 august 2001 replaced socket 478 processors used socket also locked multiplier means overclockable unless front side bus frequency increased however raising fsb frequency could push buses spec thus cause system instability powerleap pl-p4/n device developed form socket adapter allowing use socket 478 processors socket 423 | [
3588,
5901,
5523,
2455,
3992,
8855,
11417,
3995,
4252,
6175,
7714,
10019,
4523,
2604,
2350,
6192,
9649,
4537,
7105,
4805,
8394,
3403,
4427,
4179,
3798,
4185,
7002,
9945,
11484,
9570,
10468,
613,
8552,
7657,
1260,
4717,
1776,
10225,
371,
9... | Train |
7,111 | 3 | Turing_(microarchitecture):turing microarchitecture turing codename graphics processing unit gpu microarchitecture developed nvidia successor volta architecture named prominent mathematician computer scientist alan turing architecture first introduced august 2018 siggraph 2018 along professional workstation quadro rtx products based one week later gamescom along consumer geforce rtx 20 series products based architecture introduces first consumer products capable real-time ray tracing longstanding goal computer graphics industry key elements include dedicated artificial intelligence processors tensor cores dedicated ray tracing processors turing leverages microsoft dxr optix vulkan access ray-tracing february 2019 nvidia released geforce 16 series gpus utilizes new turing design lacks ray tracing artificial intelligence cores turing manufactured using tsmc 12 nm finfet semiconductor fabrication process high-end tu102 gpu includes 18.6billion transistors fabricated using process turing also uses gddr6 memory samsung electronics previously micron technology turing microarchitecture combines multiple types specialized processor core enables implementation limited real-time ray tracing accelerated use new rt ray-tracing cores designed process quadtrees spherical hierarchies speed collision tests individual triangles features turing gddr6 memory produced samsung electronics quadro rtx series rtx 20 series initially launched micron memory chips switching samsung chips november 2018 nvidia reported rasterization cuda performance gains existing titles approximately 30–50 previous generation ray-tracing performed rt cores used produce reflections refractions shadows replacing traditional raster techniques cube maps depth maps instead replacing rasterization entirely however information gathered ray-tracing used augment shading information much photo-realistic especially regards off-camera action nvidia said ray-tracing performance increased 8 times previous consumer architecture pascal generation final image accelerated tensor cores used fill blanks partially rendered image technique known de-noising tensor cores perform result deep learning supercomputers codify example increase resolution images tensor cores primary usage problem solved analyzed supercomputer taught example results desired supercomputer determines method use achieve results done consumer tensor cores methods delivered via driver updates consumers turing development platform called rtx rtx uses microsoft dxr optix vulkan access ray-tracing includes access ai-accelerated features ngx windows 10 october 2018 update includes public release directx raytracing | [
3585,
3203,
9489,
10658,
7086,
9774,
10675,
11322,
5949,
8514,
7236,
1480,
2635,
2525,
2277,
8937,
11630,
1776,
6900,
2937
] | None |
7,112 | 2 | AQuoSA:aquosa aquosa adaptive quality service architecture open architecture provisioning adaptive quality service functionality linux kernel project features flexible portable lightweight open architecture supporting qos related services top general-purpose operating system linux architecture well founded formal scheduling analysis control theoretical results key feature aquosa resource reservation layer capable dynamically adapting cpu allocation qos aware applications based run-time requirements order provide functionality aquosa embeds kernel-level cpu scheduler implementing resource reservation mechanism cpu based earliest deadline first edf gives ability linux kernel realize partially temporal isolation among tasks running within system aquosa one projects provides real-time scheduling capabilities unprivileged users multi-user system controlled way means properly designed access-control model architecture project may summarized follows lowest level patch linux kernel adds ability notify dynamically loaded modules relevant scheduling event identified creation death tasks well block unblock events patch minimally invasive consists lines code properly inserted mainly within linux scheduler code sched.c called generic scheduler patch potentially allows implement scheduling policy resource reservations layer composed three components core component dynamically loadable kernel module implements resource reservations scheduling paradigm cpu exploiting functionality introduced linux kernel generic scheduler patch second user-level library qres library allows application use new scheduling policy complete well-designed set api calls essentially calls allow application ask system reserve certain percentage cpu process es third kernel-level component supervisor mediates requests made applications qres library total sum requested cpu shares violate schedulability condition scheduler less one slightly less one due overhead supervisor behaviour completely configurable system administrator possible specify per-user/per-group basis minimum guaranteed maximum allowed values reservations made cpu aquosa applications may use directly resource reservation layer allows reserve fraction cpu run required scheduling guarantees example multimedia application may ask operating system run application guarantee scheduled least q milliseconds every p milliseconds q p depend nature application registering application resource reservation layer possible specify minimum guaranteed reservation system always guarantee application based requests minimum guaranteed reservations layer performs admission control i.e allows new application addition new set running applications overcome cpu saturation limit typical multimedia application making use high compression technologies may quite difficult impractical inconvenient run applications fixed reservation cpu fact efficient reservation used may vary time due varying compression level results varying decompression time traditional real-time systems make use wcet worst case execution time analysis techniques order compute maximum time instance example periodic task may execute cpu blocking waiting next instance analysis difficult today complex multimedia applications especially running general-purpose hardware like standard pcs technologies like multi-level caches cpu execution pipelines on-bus buffers multi-master buses introduce many unpredictable variables determining time required memory accesses systems much convenient tune system design based average expected load application otherwise system may significantly under-utilized runtime already mentioned certain classes multimedia applications video player quite impossible find appropriate fixed value fraction cpu required application run-time due heavy fluctuations load depending actual data processed application fixed reservation based average requirements slightly greater results transient periods poor quality runtime e.g movie playback hand fixed reservation based maximum expected load results unneeded over-reservation cpu time except periods load really approaches maximum expected value classes applications much convenient use adaptive reservation techniques like ones provided adaptive reservation layer aquosa performs continuous on-line monitoring computational requirements application process es may dynamically adapt reservation made cpu depending monitored data adaptive reservation layer exposes applications api using set controllers quite general use within wide set multimedia applications real-time variations linux require users real-time capabilities modified os root privileges system perfectly acceptable embedded system context however excessive multi-user systems real-time scheduling features needed multimedia applications similar therefore aquosa embeds dedicated access-control model system administrators details found paper topic published rtas 2008 | [
1776,
6419,
7983,
823
] | Test |
7,113 | 3 | Nano-ITX:nano-itx nano-itx computer motherboard form factor first proposed via technologies cebit march 2003 implemented late 2005 nano-itx boards measure fully integrated low power consumption motherboards many uses targeted smart digital entertainment devices pvrs set-top boxes media centers car pcs thin devices four nano-itx motherboard product lines far via epia n epia nl epia nx via epia nr boards available wide variety manufacturers supporting numerous different cpu platforms udoo released least 1 nano-itx board udoo bolt | [
10337,
2500,
455,
3883,
7151,
10095,
2161,
2803,
8730,
10715,
666,
9307,
3037
] | Validation |
7,114 | 1 | Institute_for_Social_Inventions:institute social inventions institute social inventions think-tank set 1985 publicise launch good ideas improving quality life founder nicholas albery 1948-2001 sought promote non-technological innovations institute emerged informal network social centers info-services spread around london throughout 1970s one earliests centers bit information service founded 1968 john hoppy hopkins years coordinator bit nicholas albery came idea institute would promote kinds ideas experimentations developed mainly inside called alternative society institute known different names institute social innovations institute social change denominations revolved around concept new improvements made within situation mainstream society goes time considered merged global ideas bank formed 1995 | [
6202,
4651
] | None |
7,115 | 7 | Matrixx_Software:matrixx software matrixx software digital commerce platform company matrixx software founded jennifer kyriakakis dave labuda 2009 labuda serves company cto ceo kyriakakis serves company vp marketing company based saratoga california matrixx produces digital commerce platform used large telecom companies management operations support systems business support systems runs premises private cloud/nfv environments public cloud one focus company aid billing daily transactions processed mobile devices attempting improve cost/revenue margin billing client companies matrixx also polls mobile users regarding views mobile telecom companies 2016 matrixx received 5 million financing pldt capital acquiring 4 company 2018 company raised 40 million series c round funding led sutter hill ventures investors including ck hutchison holdings bringing company total financing 100 million investors company included venture capital arms telstra swisscom | [] | None |
7,116 | 3 | Tombs_&_Treasure:tombs amp treasure tombs treasure known japan adventure game originally developed nihon falcom 1986 pc-8801 pc-9801 fm-7 msx 2 x1 japanese computer systems famicom/nes version released 1988 altered story-based featured new music role-playing elements english-language nes version published infocom 1991 japanese enhanced remakes released saturn windows systems 1998 1999 respectively game takes place ancient mayan city chichen itza yucatán peninsula alternates using three-quarters overhead view travelling ruin ruin switching first-person perspective upon entering specific location start game player allowed name protagonist young brown-haired man lead female green-haired lass daughter one professor imes names manually entered game randomly choose pre-coded list names characters professor imes renowned archaeologist investigating artifact known sun key potentially ability unlock greatest secrets lost mayan civilization rumored housed somewhere within chichen itza however latest expedition team mysteriously disappeared exploring different temples dates june 22 july 14 guide josé able escape unharmed return artifacts team found hoping help player quest find professor three talking professor secretary anne travel mexico ancient city look clues several actual sites chichen itza explored player although interiors purposes purposefully changed slightly order help create atmosphere fantasy mystery-solving intrigue furthermore ruin home demon said control creature known tentacula although speculation gathered professor notes josé say player start tombs treasure predominantly solving puzzles interacting objects one another found throughout mayan city travelling temple temple available action walk using d-pad however temple entered player may start exploring much thoroughly using list picture-based action keys go push wash etc characters interact environment inspecting clues manipulating unlock another area elsewhere several items collect well whose purpose learned looking game gives three characters—the boy girl josé—their special attributes let contribute quest boy player in-game avatar usually hands-on work girl talented musically josé strong able move things two however light turn-based combat also faces player demon encountered inside ruin encounters almost always happen first room ruin although exceptions fighting accomplished simply enough using fight command although means player using bare hands equipping sword done fight selecting use highlighting sword inventory first battles strictly turn-based means healing simply bashing away monster one dead however possible run away fight go command player fully healed comes back try battle later game uses simplistic experience point system gives player additional levels hit points winning battles successfully solving puzzles throughout chichen itza player kept advancing far early simply wo n't strong enough yet contend higher-level monsters sure encounter although occasionally player may defeated despite strong enough game also came packaged small guide represented professor journal written awkward cursive form hard understand well speaking riddles often aid player read correctly ruins strictly show entered vast majority | [
577,
6797,
9006,
1265,
625,
627,
11666
] | None |
7,117 | 4 | PrivateCore:privatecore privatecore venture-backed startup located palo alto california develops software secure server data server attestation memory encryption company attestation memory encryption technology fills gap exists “ data motion ” encryption tls email encryption “ data rest ” encryption disk encryption tape encryption protecting “ data use ” random access memory privatecore memory encryption technology protects threats servers cold boot attacks hardware advanced persistent threats rootkits/bootkits computer hardware supply chain attacks physical threats servers insiders privatecore acquired facebook deal announced 7 august 2014 privatecore founded 2011 security veterans vmware google seed funding foundation capital privatecore “ virtualizes ” physical security enables service providers enterprises deploy servers processing sensitive data outsourced environments maintaining security around data use company memory encryption technology spurred number industry trends including increasing sophistication hackers larger number servers outsourced environments larger amounts sensitive data placed persistent memory x86 virtualization technology increase environment attack surface privatecore acquired facebook deal announced 7 august 2014 privatecore focus securing data-in-use x86 servers company taken advantage recent microprocessor innovations including larger microprocessor caches hardware cryptographic acceleration technology enable effective methods encrypting memory maintaining acceptable application performance technology approach goes beyond previous academic research efforts tresor privatecore assumes element need trusted system central processing unit cpu firm uses trusted platform module tpm chips intel trusted execution technology intel txt provide remote server attestation privatecore also supports cryptographic hardware acceleration provided intel aes-ni technology privatecore technology positioned applicable outsourced hosted environments enterprise trust compute infrastructure privatecore vcage product portfolio comprises vcage manager vcage host vcage manager validates integrity x86 servers running linux well vcage host vcage host installs bare-metal servers provides hardened hypervisor based kvm secure server random access memory ram aes encryption vcage host loading secure hypervisor cpu cache acting gateway encrypt memory paging cpu cache ram vcage memory encryption leverages kvm hypervisor also potential support hypervisors vcage host supports existing kvm management tools vcage supports number use cases including creating openstack trusted computing pools well protecting x86 servers co-location bare-metal cloud environments vcage manager vcage host became generally available 11 february 2014 | [
9541,
11046,
6153,
8204,
3629,
10348,
7794,
499,
4695,
7354,
8439,
9791
] | None |
7,118 | 2 | Notification_Center:notification center notification center feature ios macos provides overview alerts applications displays notifications user completes associated action rather requiring instant resolution users may choose applications appear notification center handled initially released ios 5 october 2011 notification center made available macs part os x mountain lion july 2012 notification center released ios 5 replace previous system dealing push local notifications instead interrupting user alert notification center instead displays banner top screen allows user continue using device disappears set period time previous notifications collated notification center panel displayed ios dragging status bar os x clicking notification center button using track-pad gestures swiping right left notifications may selected user redirects user application notification initially created marking alert read notification read removed panel users may also remove notifications without reading deleting individual alerts dismissing application alerts within application generating ios device locked new notifications appear lock screen users may access application generating alert swiping application icon finger left right along notification notification center iphone ipod touch also includes weather stocks widgets displaying information weather user current location stocks user selected stocks application feature available ipad os x release ios 7 added weather widget ipad notification center users also select option display twitter facebook buttons allowing send tweets update status directly notification center ios 7 however option send tweets update facebook statuses removed application uses push notifications system provided apple local notifications may use notification center users may customise want appear notification center may opt stop certain applications appearing center sending alerts screen os x users may also disable alerts banners day stopping notifications appearing screen however notifications sent time still visible notification center panel similar service included ios 6 part disturb feature | [
10755,
9732,
4615,
5647,
7697,
1042,
11289,
6186,
4139,
6700,
4657,
1074,
8754,
9784,
8253,
576,
9802,
8783,
5713,
4180,
3670,
1623,
3672,
4184,
10838,
2141,
4702,
3681,
9826,
2149,
8806,
3691,
8303,
2673,
6771,
2676,
7292,
2686,
6783,
93... | Test |
7,119 | 4 | Zendian_problem:zendian problem zendian problem exercise communication intelligence operations mainly traffic analysis cryptanalysis devised lambros d. callimahos part advanced course ca-400 callimahos taught national security agency cryptanalysts starting 1950s scenario involves 375 radio messages said intercepted december 23 us army contingent united nations force landed fictional island zendia pacific ocean typical intercept looks like message first line provided intercept operator giving call signs frequency time reference number rest message transcript morse code transmission beginning intercepted message header consists 8 four-digit groups initially meaning numeric header known meanings various components header serial number assigned transmitting organization message center worked traffic analysis rest message consists indicators ciphertext first group evidently discriminant indicating cryptosystem used depending cryptosystem second group may contain message-specific keying element initial rotor settings first two groups repeated end message allows correction garbled indicators remaining characters encrypted text since transmissions always use complete groups nulls may used pad text cryptosystems employed include transposition dinome rotor-based ciphers one-part code successfully tackled without use computer solution easy practical exercise reinforces many basic principles including ways exploit collection message traffic certain amount cleartext inter-operator chatter also provided may help analysis headers discriminants also given intercepts next three days may used traffic analysis determining daily operating procedures zendian problem declassified available either part military cryptanalytics book published reprints aegean park press walnut creek ca usa small differences ciphertext sources neither entirely error-free indeed errors intentional dealing part learning process karl heinz-everts web site provides link downloadable archive intercepts site also provides analysis partial solutions viewed anyone wishing learn working exercise cryptanalists successfully finished ca-400 became members dundee society society founded lambros d. callimahos named empty dundee marmalade jar desk could n't disclose society real purpose large print showing fictional nation zendia hangs wall library national cryptologic museum operated nsa copies map shrunken degree feature labels illegible appear previously cited books | [
6017,
6928,
1941,
8726,
1189,
3495,
9900,
3629,
1838,
9517,
5308,
6343,
6344,
6599,
11335,
7759,
7887,
3154,
8276,
7893,
991,
7137,
8674,
2148,
7652,
3305,
7145,
2419,
6005,
6136
] | None |
7,120 | 5 | CAMEL_Application_Part:camel application part camel application part cap signalling protocol used intelligent network architecture cap remote operations service element rose user protocol layered top transaction capabilities application part tcap ss 7 protocol suite cap based subset etsi core allows implementation carrier-grade value added services unified messaging prepaid fraud control freephone gsm voice gprs data networks camel means adding intelligent applications mobile rather fixed networks builds upon established practices fixed line telephony business generally classed heading intelligent network application part inap cs-2 protocol camel application part cap portable software provides mechanisms support operator services beyond standard gsm services subscribers roaming within outside home plmn hplmn cap product extends framework gsm/3g networks implementing in-based services within gsm/3g networks camel used subscriber roaming networks allowing home network monitor control calls made subscriber camel provides services prepaid roaming services fraud control special numbers e.g. 123 voicemail works everywhere closed user groups e.g. office extension numbers work everywhere camel cap defined four phases accompanying specification builds upon previous phase cap phase provides message set procedures needed support corresponding camel phase requirements defined 3gpp ts 22.078 service aspects 3gpp ts 23.078 technical realization definition protocol may considered split three sections | [
706,
7811,
5704,
10864,
7865,
1437
] | Test |
7,121 | 4 | Firestarter_(firewall):firestarter firewall firestarter personal firewall tool uses netfilter iptables/ipchains system built linux kernel ability control inbound outbound connections firestarter provides graphical interface configuring firewall rules settings provides real-time monitoring network traffic system firestarter also provides facilities port forwarding internet connection sharing dhcp service firestarter free open-source software uses gui widgets gtk+ | [
1792,
2049,
4480,
2563,
1164,
6797,
1172,
9496,
3482,
1436,
4511,
6431,
10531,
5924,
550,
8998,
10790,
3243,
1708,
3885,
7983,
8753,
2996,
823,
569,
5178,
11577,
9279,
5057,
1858,
10433,
11073,
2118,
4814,
9423,
10574,
10451,
10708,
4568,
... | Test |
7,122 | 3 | Socket_FS1:socket fs1 socket fs1 notebooks using amd apu processors codenamed llano trinity richland socket fs1r2 llano -branded products combine k10 cedar vliw5 uvd 3 video acceleration amd eyefinity-based multi-monitor support three displayport-monitors trinity richland -branded products piledriver northern islands vliw4 uvd 3 vce 1 video acceleration amd eyefinity-based multi-monitor support four displayport-monitors amd desktop cpus available 722-pin package socket am1 fs1b clear whether desktop cpus compatible socket fs1 vice versa | [
3586,
9475,
3588,
8452,
9092,
10375,
3464,
4872,
5645,
398,
7058,
10260,
4246,
2719,
2463,
4767,
2850,
7712,
9122,
1322,
2094,
11183,
1329,
6705,
3892,
8629,
9400,
6978,
11331,
9157,
3783,
11080,
2764,
7247,
9551,
7122,
9427,
7132,
2525,
... | None |
7,123 | 6 | Temp_File_Cleaner:temp file cleaner temp file cleaner tfc utility program microsoft windows designed quickly remove temporary unnecessary files might otherwise prove difficult find dynamic paths multiple locations tfc minimilist design single purpose allow compact installation version 3.1.1 full installation occupies 3.7mb supports removal unnecessary temporary files created google chrome mozilla firefox internet explorer opera browsers well created course normal system operation windows updates cache windows logs windows root user temp files created variety programs addition tfc includes ability customize operations include deeper search subdirectories brute force deletion root path specification addition advanced cleaning protocols windows debug files hibernation files system restore data tfc allows test run operation offering users ability preview files would deleted upon normal execution well amount space would freed | [
8584,
6797,
7983,
3571,
52
] | Test |
7,124 | 4 | Anomaly-based_intrusion_detection_system:anomaly-based intrusion detection system anomaly-based intrusion detection system intrusion detection system detecting network computer intrusions misuse monitoring system activity classifying either normal anomalous classification based heuristics rules rather patterns signatures attempts detect type misuse falls normal system operation opposed signature-based systems detect attacks signature previously created order positively identify attack traffic system must taught recognize normal system activity two phases majority anomaly detection systems consist training phase profile normal behaviors built testing phase current traffic compared profile created training phase anomalies detected several ways often artificial intelligence type techniques systems using artificial neural networks used great effect another method define normal usage system comprises using strict mathematical model flag deviation attack known strict anomaly detection techniques used detect anomalies include data mining methods grammar based methods artificial immune system network-based anomalous intrusion detection systems often provide second line defense detect anomalous traffic physical network layers passed firewall security appliance border network host-based anomalous intrusion detection systems one last layers defense reside computer end points allow fine-tuned granular protection end points application level anomaly-based intrusion detection network host levels shortcomings namely high false-positive rate ability fooled correctly delivered attack attempts made address issues techniques used payl mcpad | [
9576,
5577,
939,
9948,
5245
] | None |
7,125 | 2 | Indus_OS:indus os indus os formerly known firstouch indian mobile operating system based android currently available english 23 indian regional languages spoken 95 indian population active user base 10 million company app marketplace app bazaar 400,000 apps indus os partnered phone brands gionee itel micromax_informatics intex technologies karbonn mobiles celkon swipe elite trio mobiles indus os founded 2015 rakesh deshmukh akash dongre sudheer b three alumni indian institute technology bombay hari padmanabhan iit kanpur alumni industry veteran serial entrepreneur seed investor company indus os raised total 13 million series funding led omidyar network jsw ventures ventureast company also funded among others angel investors mayank singhal temasek holdings pranay chulet founder quikr amit gupta naveen tewari co-founders inmobi kunal bahl rohit bansal co-founders snapdeal may 2015 micromax_informatics started shipping latest version unite 3 unite series smartphones firstouch os operating system available english 10 indian languages key feature operating system swipe-to-translate indus swipe helped users translate transliterate english text regional languages operating system also app marketplace app bazaar 5000 applications regional languages popular application marketplace microsoft skype available popular indian regional languages including hindi december 2015 firstouch announced collaboration government india ministry electronics information technology previously known department electronics deity introduce text-to-speech technology regional languages operating system regional app marketplace app bazaar integrated carrier billing facility hence allows users download apps regional languages without requiring email id paying credit cards 90 indus os users activated app bazaar smartphones 75 use monthly basis app bazaar 50000 applications regional languages operating system features english 23 regional languages assamese bengali gujarati hindi kannada malayalam marathi odia punjabi tamil telugu urdu company patented keyboard allows word prediction matra prediction auto correction swipe-to-translate transliterate features users indus os offices mumbai delhi dhaka currently 70-member team company also plans open office china effort partner international smartphone brands operating system received positive review firstpost tech2 rehan hooda review intex aqua supre+ claimed indus os shining factor otherwise ordinary smartphone abhishek baxi android authority review operating system said unlike stock android custom android skins support indian languages indus os menu items icon texts et al appear chosen regional language big win app bazaar support carrier billing allowing users download paid apps games via mobile balance pre-paid get billed post-paid ’ mighty convenient consumers great motivator app developers publishers indus os economic times telecom award 2016 innovation developing oem product category may 7 2016 indus os declared second popular os india according research study conducted counterpoint research may 2016 os second popular india 7.6 market share greater market share microsoft apple android remains popular 82.3 indus os awarded prestigious tie50 silicon valley top start-up award year 2016 et telecom award 2016 'innovation development oem product indus os 'digital startup year award drivers digital awards 2016 nasscom announced indus os one top 10 startups india nasscom product conclave 2016 company also awarded aegis graham bell award digital india category alongside vodafone india year 2016 gsma nominated indus os annual global mobile awards mobile world congress barcelona 2017 category best mobile innovation emerging markets indus os brand year award technology category world consulting research corporation mumbai december 21 2016 mint newspaper mit technology review named akash dongre co-founder chief product officer indus os one top innovators age 35 india emtech 2017 event indus os also named superbrand super startups awarded 30+ innovative business models india october 2017 indus os awarded confederation indian industry industrial innovation award one top 10 startup india company story also documented case study ivey publishing also distributed harvard business review | [
2259
] | None |
7,126 | 6 | Dell_Fluid_File_System:dell fluid file system dell fluid file system fluidfs shared-disk filesystem made dell provides distributed file systems clients customers buy appliance combination purpose-built network-attached storage nas controllers integrated primary backup power supplies i.e. appliance attached block level storage via iscsi fiber channel protocol single dell fluidfs appliance consists two controllers operating concert i.e. active/active connecting back-end storage area network san depending storage capacity requirements user preference fluidfs version 4 nas appliances used compellent equallogic san arrays equallogic fs7600 fs7610 connect client network dell equallogic arrays either 1 gbit/s fs7600 10 gbit/s fs7610 iscsi protocol compellent fluidfs available either 1 gbit/s 10 gbit/s iscsi connectivity client network connection backend compellent san either 8 gbit/s fibre channel 10 gbit/s iscsi fluidfs software layer running nas appliance creates single name-space users offering access via server message block smb network file system nfs also includes features prevent data-loss corruption uses caching increase performance fluidfs result dell acquisition intellectual property exanet firm whose assets included hardware-independent scalable nas storage product previously known dell scalable file system dsfs dell changed name fluidfs acquisition compellent successfully used fluid data tag-line startup company dell developed exanet file system support ndmp backup integrated ip obtained acquisition ocarina networks included deduplication data compression technology dell initially adapted fluidfs work compellent equallogic powervault storage platforms underlying software architecture fluidfs employs linux-based symmetric clustering model distributed metadata native load balancing flexible caching capabilities features scalability limited volume size traditional file systems supports scaling adding capacity system scaling adding nodes performance system fluidfs operates across symmetric cluster purpose-built nas controllers housed pairs within 2u appliance interface fabric shared back-end storage via iscsi fibre channel storage area networks fluidfs architecture layered presents traditional file system network clients performing special functions back end designed utilize available resources network server disk levels improve response times based back-end storage product maximum number nas appliances storage capacity varies number nas appliances varies 1 4 entire capacity system managed single global namespace fluidfs v6 supports multitenancy total storage capacity tens pb maximum size single file 128 tb number files name-space limited 64 billion per appliance 256 billion 4 appliances making one largest industry | [
5120,
2564,
6153,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
54,
7225,
8772,
1109,
4708,
9836,
7789,
9333,
6263,
9335,
7802,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2230... | Test |
7,127 | 4 | Air-gap_malware:air-gap malware air-gap malware malware designed defeat air-gap isolation secure computer systems using various air-gap covert channels one techniques successfully demonstrated scientists fraunhofer society november 2013 modern computers especially laptops built-in microphones speakers air-gap malware designed communicate secure information acoustically frequencies near beyond limit human hearing technique limited computers close physical proximity also limited requirement transmitting receiving machines infected proper malware form communication link physical proximity limit overcome creating acoustically linked mesh network effective mesh network ultimately traditional ethernet connection outside world secure information removed secure facility 2014 researchers introduced ″airhopper″ bifurcated attack pattern showing feasibility data exfiltration isolated computer nearby mobile phone using fm frequency signals 2015 bitwhisper covert signaling channel air-gapped computers using thermal manipulations introduced bitwhisper supports bidirectional communication requires additional dedicated peripheral hardware later 2015 researchers introduced gsmem method exfiltrating data air-gapped computers cellular frequencies transmission generated standard internal bus renders computer small cellular transmitter antenna 2016 researchers categorized various out-of-band covert channels oob-ccs malware communication channels require specialized hardware transmitter receiver oob-ccs high-bandwidth conventional radio-frequency channels however capable leaking sensitive information require low data rates communicate e.g. text recorded audio cryptographic key material general researchers demonstrated air-gap covert channels realized number different mediums including | [
7515,
28,
8574
] | Test |
7,128 | 9 | Impromptu_(programming_environment):impromptu programming environment impromptu mac os x programming environment live coding impromptu built around scheme language member lisp family languages source code core opened extempore project environment allows make changes program runtime variables functions may redefined changes take effect immediately programmer also create schedule code future execution well data events notes graphics objects event scheduled execution continues looping performed using idiom called temporal recursion works function asynchronously schedule future call final action library allows communicating audio units audio synthesis graphics layers quicktime quartz core image opengl video composition code written objective-c called editor also objective-c frameworks perform calls scheme interpreter impromptu scheme interpreter initially built tinyscheme 1.35 baseline substantially modified since better suit live coding context real-time garbage collector objective-c integration added also new statically typed language called extempore language integrated system language syntactically scheme-like semantically closer c designed real-time sound synthesis computationally heavy tasks provides type inference compiled machine language llvm study keith live coding performance impromptu andrew sorensen first two minutes 1:56 silent performer writes program produce introduction piece modifies code fly evolve composition core impromptu released extempore bsd style licence runs linux mac os x includes scheme interpreter extempore language compiler scheduler bindings apple libraries absent environment interface dynamic libraries | [
2304,
9345,
10083,
7172,
9783,
6502,
10470,
1390,
7983,
7184,
7571,
2676,
6933,
823,
7769,
9210
] | Test |
7,129 | 7 | Quip_(software):quip software quip collaborative productivity software suite mobile web allows groups people create edit documents spreadsheets group typically business purposes quip founded bret taylor co-creator google maps ceo friendfeed former facebook cto along kevin gibbs founded google app engine taylor founded company 2012 leaving position facebook roughly year later quip launched public mobile-centric tool creating shared notes lists documents app well-received winning accolades one best apps year time next web guardian 2015 quip announced received 30 million funding round led greylock partners july 2016 salesforce announced acquisition quip estimated total 750 million january 2017 quip acquired designer studio unity variety core quip provides word processing spreadsheet functionality accessible via web ios app android app alongside documents quip live updating history edits made well ability highlight portions document add comments facilitates collaboration 2015 quip also added standalone chat rooms | [
10090
] | Validation |
7,130 | 4 | Alec_Yasinsac:alec yasinsac alec yasinsac dean school computing university south alabama united states retired u.s. marine yasinsac awarded doctoral degree 1996 university virginia doctoral advisor william wulf received master science computer science naval postgraduate school bachelor science mathematics appalachian state university yasinsac co-founder co-director security assurance information security sait laboratory visiting scholar national academy engineering nae 2006 served advisory board nae 2007 national meeting symposium electronic voting led team conducted source code review support florida department state audit florida 13th congressional district 2006 election | [] | Test |
7,131 | 2 | XOS_(mobile_operating_system):xos mobile operating system xos pronounced eks-oh-es customized version android mobile operating system developed mobile phone company infinix mobile ltd succeeding infinix previous operating system xui xos designed evolving creative smartphone operating system shipped infinix smart phones three distinctive features ai intelligence lightning speed customization option 50 million smartphone devices powered xos currently improved 1000 times attain 21 faster performance compared original android os xos also provides 20 apps redesigned satisfy users needs | [] | Test |
7,132 | 3 | Socket_940:socket 940 socket 940 940-pin socket 64-bit amd opteron server processors amd athlon 64 fx consumer processors socket entirely square shape pins arranged grid exception four key pins used align processor corners amd opteron older amd athlon 64 fx fx-51 use socket 940 microprocessors designed socket intended used server platform provide additional features provide additional robustness one feature acceptance registered memory recent 940-pin socket am2 visually similar one two electrically incompatible due integrated memory controller socket 940 cpu integrate ddr controller whereas am2 models use ddr2 controller | [
3586,
8322,
3588,
8452,
9475,
3464,
4872,
7058,
10260,
4246,
4767,
2463,
7712,
9122,
1322,
11183,
1329,
3892,
8629,
9400,
6978,
11331,
9157,
3783,
7247,
9551,
7122,
9427,
2525,
4451,
5859,
1260,
7788,
7151,
1651
] | None |
7,133 | 2 | IOS_5:ios 5 ios 5 fifth major release ios mobile operating system developed apple inc. successor ios 4 announced company worldwide developers conference june 6 2011 released october 12 2011 succeeded ios 6 september 19 2012. ios 5 revamped notifications adding temporary banners appear top screen introducing notification center central location recent notifications operating system also added icloud apple cloud storage service synchronization content data across icloud-enabled devices imessage apple instant messaging service first time system software updates installed wirelessly without requiring computer itunes ios 5 also featured deep integration twitter introduced multitasking gestures ipads added easily accessible camera shortcut lock screen ios 5 subject criticism iphone 4s users initial release poor battery life failures sim cards echoes phone calls problems fixed subsequent releases ios 5 introduced apple worldwide developers conference june 6 2011 beta version available developers later day ios 5 officially released october 12 2011. ios 5.0.1 released november 10 2011 first update ios 5 update included fixes battery issues ios 5.1 released march 7 2012 along new ipad retina display update included support japanese language siri redesigned camera app ipad bug fixes battery life issues ios 5.1.1 released may 7 2012 update included reliability improvements high dynamic range photos safari bookmark synchronization fixes bug fixes previous ios versions notifications popped screen dialog boxes interrupting current activity ios 5 notifications revamped show temporary banner top screen recent notifications also accessed pulling notification center top screen users prefer old notification system keep choosing appropriate option settings menu ios 5 introduces icloud apple cloud storage service new service allows users synchronize music pictures videos application data across icloud-enabled devices ios 5 enables wireless system updates supported devices meaning computer itunes n't necessary update devices activation new devices updates done wirelessly ios 5 features deep twitter integration users able sign twitter directly settings menu photos tweeted directly photos camera apps users also able tweet safari youtube google maps apps multitasking gestures debut ipad release ios 5 multitasking allows users jump apps without double-tapping home button first going home screen multitasking gestures available ipad 2 ipad keyboard could undocked bottom screen could split two half-keyboards first ios 5 release allowed camera app easily accessed lock screen first time users double-clicked home button camera icon would appear next slide unlock message users would click directly access camera ios 5.1 update streamlined process dropping home button double-click procedure requiring users swipe camera icon security purposes device locked passcode method accessing camera allows access camera app features device pressing volume-up button allows user take picture imessage new instant messaging service built messages app allowed anyone ios 5 device send basic multimedia messages anyone else compatible ios 5 device contrast sms messages sent imessage use internet rather regular cellular texting also contrast regular sms android blackberry devices compatible service imessages synchronized across user devices color-coded blue regular sms green ios mail app included rich text formatting better indent control flagging messages ability drag addresses cc bcc lines reminders allows users create lists tasks alerts either date-based location-based newsstand act native app rather special folder selected shows icons periodicals user subscribed newspapers magazines new issues downloaded automatically ipod app replaced separate music videos apps initial october 2011 release ios 5 saw significant upgrade issues errors installation apple server overload following user complaints apple officially confirmed ios 5 poor battery life iphone 4s users stated upcoming software update would fix issues ios 5.0.1 update fixed bugs related battery issues november 2011 engadget reported ios 5 update caused wi-fi connection drops users report also wrote recent ios 5.0.1 update certainly n't fixed matter either questioned whether events unrelated part larger issue users iphone 4s reported issues sim card ios 5 given error messages invalid sim sim failure apple released second software build 5.0.1 update designed fix sim card issues users iphone 4s reported random appearance echoes phone calls made earphones initial release ios 5 party call sometimes unable hear conversation due problem many aspects ios 5 received positive reviews including new notification center ability sync update wirelessly imessage richmond shane telegraph said ios 5 brilliant upgrade already brilliant operating system different people look different things mobile operating system people prefer blackberry android windows mobile value ease use attention detail design ios 5 apple continues deliver best user experience available richard goodwin know mobile said reckon ios 5 everything needs ’ wait get teeth stuck soon ’ released autumn 2011 release apple dropped support older devices specifically iphone 3g second-generation ipod touch | [
10755,
9732,
1549,
4111,
5647,
7697,
6675,
11289,
541,
6186,
4139,
6700,
1074,
8754,
9784,
8253,
8767,
576,
5696,
8774,
8783,
4180,
10838,
1623,
3672,
9308,
3167,
3681,
9826,
8806,
3691,
2673,
6264,
7292,
2686,
6783,
7806,
10878,
10888,
5... | None |
7,134 | 3 | IA-64:ia-64 ia-64 also called intel itanium architecture instruction set architecture isa itanium family 64-bit intel microprocessors basic isa specification originated hewlett-packard hp evolved implemented new processor microarchitecture intel hp continued partnership expertise underlying epic design concepts order establish first new isa 20 years bring entirely new product line market intel made massive investment product definition design software development tools os software industry partnerships marketing support effort intel created largest design team history new marketing industry enabling team completely separate x86 first itanium processor codenamed merced released 2001 itanium architecture based explicit instruction-level parallelism compiler decides instructions execute parallel contrasts superscalar architectures depend processor manage instruction dependencies runtime itanium models including tukwila cores execute six instructions per clock cycle 2008 itanium fourth-most deployed microprocessor architecture enterprise-class systems behind x86-64 power isa sparc 1989 hp began become concerned reduced instruction set computing risc architectures approaching processing limit one instruction per cycle intel hp researchers exploring computer architecture options future designs separately began investigating new concept known long instruction word vliw came research yale university early 1980s vliw computer architecture concept like risc cisc single instruction word contains multiple instructions encoded one long instruction word facilitate processor executing multiple instructions clock cycle typical vliw implementations rely heavily sophisticated compilers determine compile time instructions executed time proper scheduling instructions execution also help predict direction branch operations value approach useful work fewer clock cycles simplify processor instruction scheduling branch prediction hardware requirements penalty increased processor complexity cost energy consumption exchange faster execution time hp begun believe longer cost-effective individual enterprise systems companies develop proprietary microprocessors intel also researching several architectural options going beyond x86 isa address high end enterprise server high performance computing hpc requirements thus intel hp partnered 1994 develop ia-64 isa using variation vliw design concepts intel named explicitly parallel instruction computing epic intel goal leverage expertise hp developed early vliw work along develop volume product line targeted high-end enterprise class servers high performance computing hpc systems could sold original equipment manufacturers oems hp wished able purchase off-the-shelf processors built using intel volume manufacturing leading edge process technology higher performance cost effective current pa-risc processors resulting products would intel hp would one many customers order achieve volumes necessary successful product line itanium products would required meet needs broader customer base software applications os development tools available customers required itanium products designed documented manufactured quality support consistent rest intel products therefore intel took lead microarchitecture design productization packaging test steps industry software operating system enabling linux windows nt marketing part intel definition marketing process engaged wide variety enterprise oem software os vendors well end customers order understand requirements ensure reflected product family meet needs broad range customers end-users hp made substantial contribution isa definition merced/itanium microarchitecture itanium 2 productization responsibility intel original goal delivering first itanium family product codenamed merced 1998 intel product marketing industry engagement efforts substantial achieved design wins majority enterprise server oem including based risc processors time industry analysts predicted ia-64 would dominate servers workstations high-end desktops eventually supplant risc complex instruction set computing cisc architectures general-purpose applications compaq silicon graphics decided abandon development alpha mips architectures respectively favor migrating ia-64 1997 apparent ia-64 architecture compiler much difficult implement originally thought delivery itanium began slipping since itanium first ever epic processor development effort encountered unanticipated problems team accustomed addition epic concept depends compiler capabilities never implemented research needed several groups developed operating systems architecture including microsoft windows unix unix-like systems linux hp-ux freebsd solaris tru64 unix monterey/64 last three canceled reaching market 1999 intel led formation open source industry consortium port linux ia-64 named trillium later renamed trillian due trademark issue led intel included caldera systems cern cygnus solutions hewlett-packard ibm red hat sgi suse turbolinux va linux systems result working ia-64 linux delivered ahead schedule first os run new itanium processors intel announced official name processor itanium october 4 1999 within hours name itanic coined usenet newsgroup pun name titanic unsinkable ocean liner sank maiden voyage 1912 time itanium released june 2001 performance superior competing risc cisc processors recognizing lack software could serious problem future intel made thousands early systems available independent software vendors isvs stimulate development hp intel brought next-generation itanium 2 processor market year later itanium 2 processor released 2002 relieved many performance problems original itanium processor mostly caused inefficient memory subsystem 2003 amd released opteron implemented 64-bit architecture x86-64 opteron gained rapid acceptance enterprise server space provided easy upgrade x86 intel responded implementing x86-64 em64t xeon microprocessors 2004 november 2005 major itanium server manufacturers joined intel number software vendors form itanium solutions alliance promote architecture accelerate software porting 2006 intel delivered montecito marketed itanium 2 9000 series dual-core processor roughly doubled performance decreased energy consumption 20 percent itanium 9300 series processor codenamed tukwila released 8 february 2010 greater performance memory capacity tukwila originally slated release 2007 device uses 65 nm process includes two four cores 24 mb on-die caches hyper-threading technology integrated memory controllers implements double-device data correction dddc helps fix memory errors tukwila also implements intel quickpath interconnect qpi replace itanium bus-based architecture peak interprocessor bandwidth 96 gb/s peak memory bandwidth 34 gb/s quickpath processor integrated memory controllers interfaces memory directly using qpi interfaces directly connect processors i/o hubs quickpath also used intel processors using nehalem microarchitecture making probable tukwila nehalem able use chipsets tukwila incorporates four memory controllers supports multiple ddr3 dimms via separate memory controller much like nehalem-based xeon processor code-named beckton itanium 9500 series processor codenamed poulson follow-on processor tukwila features eight cores 12-wide issue architecture multithreading enhancements new instructions take advantage parallelism especially virtualization poulson l3 cache size 32 mb l2 cache size 6 mb 512 kb 256 kb per core die size 544 mm² less predecessor tukwila 698.75 mm² isscc 2011 intel presented paper called 32nm 3.1 billion transistor 12-wide-issue itanium processor mission critical servers given intel history disclosing details itanium microprocessors isscc paper likely refers poulson analyst david kanter speculates poulson use new microarchitecture advanced form multi-threading uses many two threads improve performance single threaded multi-threaded workloads new information released hotchips conference new information presents improvements multithreading resiliency improvements instruction replay ras new instructions thread priority integer instruction cache prefetching data access hints kittson 9500 poulson slightly higher clocked january 2019 intel announced kittson would discontinued last order date january 2020 planned successor intel extensively documented itanium instruction set technical press provided overviews architecture renamed several times history hp originally called pa-wideword intel later called ia-64 itanium processor architecture ipa settling intel itanium architecture still widely referred ia-64 64-bit register-rich explicitly parallel architecture base data word 64 bits byte-addressable logical address space 2 bytes architecture implements predication speculation branch prediction uses variable-sized register windowing parameter passing mechanism also used permit parallel execution loops speculation prediction predication renaming control compiler instruction word includes extra bits approach distinguishing characteristic architecture architecture implements large number registers 128-bit instruction word called bundle contains three slots holding 41-bit instruction plus 5-bit template indicating type instruction slot types m-unit memory instructions i-unit integer alu non-alu integer long immediate extended instructions f-unit floating-point instructions b-unit branch long branch extended instructions template also encodes stops indicate data dependency exists data stop instructions pair stops constitute instruction group regardless bundling must free many types data dependencies knowledge allows processor execute instructions parallel without perform complicated data analysis since analysis already done instructions written within slot instructions predicated specifying predicate register value true false determine whether instruction executed predicated instructions always execute predicated codice_4 always reads true ia-64 assembly language instruction format deliberately designed written mainly compilers humans instructions must grouped bundles three ensuring three instructions match allowed template instructions must issue stops certain types data dependencies stops also used limited places according allowed templates fetch mechanism read two bundles per clock l1 cache pipeline compiler take maximum advantage processor execute six instructions per clock cycle processor thirty functional execution units eleven groups unit execute particular subset instruction set unit executes rate one instruction per cycle unless execution stalls waiting data units group execute identical subsets instruction set common instructions executed multiple units execution unit groups include ideally compiler often group instructions sets six execute time since floating-point units implement multiply–accumulate operation single floating point instruction perform work two instructions application requires multiply followed add common scientific processing occurs processor execute four flops per cycle example 800 mhz itanium theoretical rating 3.2 gflops fastest itanium 2 1.67 ghz rated 6.67 gflops practice processor may often underutilized slots filled useful instructions due e.g data dependencies limitations available bundle templates densest possible code requires 42.6 bits per instruction compared 32 bits per instruction traditional risc processors time no-ops due wasted slots decrease density code additional instructions speculative loads hints branches cache difficult generate optimally even modern compilers 2002 2006 itanium 2 processors shared common cache hierarchy 16 kb level 1 instruction cache 16 kb level 1 data cache l2 cache unified instruction data 256 kb level 3 cache also unified varied size 1.5 mb 24 mb 256 kb l2 cache contains sufficient logic handle semaphore operations without disturbing main arithmetic logic unit alu main memory accessed bus off-chip chipset itanium 2 bus initially called mckinley bus usually referred itanium bus speed bus increased steadily new processor releases bus transfers 2×128 bits per clock cycle 200 mhz mckinley bus transferred 6.4 gb/s 533 mhz montecito bus transfers 17.056 gb/s itanium processors released prior 2006 hardware support ia-32 architecture permit support legacy server applications performance ia-32 code much worse native code also worse performance contemporaneous x86 processors 2005 intel developed ia-32 execution layer ia-32 el software emulator provides better performance montecito intel therefore eliminated hardware support ia-32 code 2006 release montecito intel made number enhancements basic processor architecture including see chipsets ... markets | [
10752,
7173,
9739,
4108,
4112,
5649,
7699,
5655,
10781,
8231,
10796,
7218,
2623,
2113,
7234,
3142,
3654,
8266,
7755,
2638,
10839,
7770,
5214,
1119,
1122,
10851,
3175,
4204,
8815,
8820,
630,
8822,
4217,
5754,
8315,
4734,
2693,
6797,
7313,
... | Test |
7,135 | 4 | Hacking:_The_Art_of_Exploitation:hacking art exploitation hacking art exploitation book jon smibbs erickson computer security network security published starch press 2003 second edition 2008 examples book developed compiled tested gentoo linux jon erickson computer security expert background computer science 2011 worked vulnerability researcher computer security specialist california bootable cd included book provides linux-based programming debugging environment users content exploiting moves programming networking cryptography book use notable measure real-world examples discussions rarely bring specific worms exploits computer programming portion hacking takes half book section goes development design construction testing exploit code thus involves basic assembly programming demonstrated attacks range simple buffer overflows stack complex techniques involving overwriting global offset table erickson discusses countermeasures non-executable stack evade return-to-libc attacks dive deeper matters without known guaranteed exploits address space layout randomization book also cover openwall grsecurity pax projects kernel exploits networking segment hacking explains basics osi model basic networking concepts including packet sniffing connection hijacking denial service port scanning cryptology section hacking covers basic information theory addition symmetric asymmetric encryption winds cracking wep utilizing fluhrer mantin shamir attack besides basics including man-in-the-middle attacks dictionary attacks use john ripper hacking discusses quantum key distribution lov grover quantum search algorithm peter shor quantum factoring algorithm breaking rsa encryption using large quantum computer introduction book states hacking done within confines law productive reasons programming chapter book different types programs described shown via examples chapter covers control structures basic aspects programming live cd provides environment reader follow along examples book programming exploitation taking computer code set rules changing computer want finding ways holes system change important part exploitation chapter covers exploit techniques memory corruption buffer overflows format strings especially using perl bash shellcode osi model communication among computers networking osi model used osi model model provides standards computers use communicate seven layers osi model physical layer data-link layer network layer transport layer session layer presentation layer application layer packet computer sends another computer must go layer osi model sockets standard way communicate network use computer operating systems socket socket used programmer create way send receive data using layers osi two types sockets stream socket datagram socket stream sockets use transmission control protocol tcp datagram socket uses user datagram protocol udp peeling back layers 'peeling back layers describes osi layers actually work osi model described great detail images book make easy understand network sniffing switched unswitched networks exist networking switched network uses devices called switches analyze tell packets travelling network endpoint unswitched network free flow packets without stopped analyzed sniffing refers using program allows see packets network going denial service denial service attack attempt make computer resource unavailable intended users means denial service attack sends large quantity communication requests intended resource order overflow resource becomes unusable certain period time types attacks usually directed routers firewalls order shut gain access computers network router susceptible types attacks firewall usually handle attack unaffected distributed denial service attack communication requests come multiple computers greatly increasing number requests regular denial service attack types dos attacks include ping death teardrop ping flooding amplification attacks tcp/ip hijacking tcp/ip hijacking another way uses spoofed packets take connection victim host machine technique mainly used collect passwords host machine uses password connected type attack takes place victim attacker must network another form tcp/ip hijacking rst hijacking involves injecting fake reset packet port scanning port scanning simply way figure ports accepting listening connections hacker would use program lets know ports open scanning ports network trying open many type scans syn idle fin x-mas null scans reach hack someone part finding vulnerabilities typecasting network using debugger go lines code used network protocols efficient way accomplish shellcode used exploitation code like hacker code wants run gains control program usually hacker find exploit programs code able insert code shellcode found exploit assembly vs. c assembly differs c assembly low-level programming language processed communicate directly processor using c high-level programming language code must compiled sent kernel making system call making call processor words almost like taking system calling kernel picture using assembly path shellcode part shellcode inject program shellcode taken many examples code book ways accomplish task self-spawning shellcode spawning shellcode code enabled exploit found shellcode able run vulnerability found program best way accomplish shown book making sure code small port-binding shellcode type shellcode attaches network port bound port listen tcp connection finds tcp connection lot programming involved shown vividly book connect-back shellcode type shellcode mainly used getting around firewalls firewalls going block port-binding shellcode working set allow known services active ports connect-back shellcode initiates connection back hacker ip address coming firewall instead going code book depicts connect-back use shellcode ways accomplish part book defenses intrusion prevention systems stop known hacking exploits countermeasures detect administrator network aware exploit may occurring using certain tools like reading logs packet sniffing network ways catch exploits occur system daemons system daemon server program unix system receives accepts incoming connections daemon program runs background detaches controlling terminal certain way point book code shown run daemon program signals also used unix-based environment make operating system calls signal type terminal immediately send interrupt message complete task whatever signal typed uses signals displayed coding examples book tools trade hacker certain set tools needs help exploiting exploit script tool uses already written exploit code find holes system program using exploit scripts easy even non-hacker use code already written couple exams exploit tools shown book use log files stated earlier log files way check events happening computer network hacker ability change log file says help noticed code directions change log files book overlooking obvious another sign program hacked longer work correctly time programs work correctly hacker modified accomplish another task skilled hacker however modify program still works correctly wants program exploited ways tell happened finding program exploited tedious process since usually starts taking parts program looking individually putting exploited program back together see exploited shown book advanced camouflage hacker exploiting program ip address written log file camouflaging log files ip address detected shown book ip address hidden called spoofing ip address whole infrastructure use intrusion detection systems intrusion prevention systems greatly helps avoid risk exploited even firewalls routers log files show evidence hacking making sure outbound tcp connections processed one way limit found ways shown book use tcp connections easier go undetected payload smuggling using shellcode exploit programs caught intrusion detection systems usually intrusion detection system catch programs already written noticeable shell code exploit programs caught real hackers using ways hide shellcode harder detect couple examples hide shellcode found book buffer restrictions sometimes restrictions put buffers vulnerabilities exploited ways book depicts get around buffer restrictions hardening countermeasures exploits found book around long time took hackers figured take advantage vulnerabilities described book memory corruption change control use shellcode three easiest steps exploitation nonexecutable stack applications use stack type executing one defense make stack non-executable buffer overflows used exploitation program defense effective stopping use shellcode application however way get around use non-executable stack shown described book randomized stack space randomized stack type countermeasure used hacker unable tell shellcode implemented randomizes memory layout within stack also way get around countermeasure examples book cryptology use communicating secretly use ciphers cryptanalysis process cracking deciphering secret communications chapter offers information theory cryptology including work claude shannon concepts including unconditional security one-time pads quantum key distribution computational security using key encrypt decrypt messages symmetric encryption asymmetric encryption involves using different keys public private chapter gives examples kinds encryption use cipher encryption algorithm combining use symmetric cipher asymmetric cipher called hybrid cipher ways attack ciphers get around encryption methods shown described book chapter also shows methods figure encrypted passwords including brute-force attacks hash look-ups also offers methods get around wireless 802.11b wi-fi wired equivalent privacy wep encryption | [
5636,
7557,
8582,
3473,
8867,
9854,
939,
4140,
3629,
10924,
5040,
823,
5176,
1474,
4435,
10329,
8674,
5363,
5492,
9331,
2558,
4863
] | Validation |
7,136 | 6 | E2fsprogs:e2fsprogs e2fsprogs sometimes called e2fs programs set utilities maintaining ext2 ext3 ext4 file systems since file systems often default linux distributions commonly considered essential software included e2fsprogs ordered asciibetical order many utilities based codice_20 library despite name might suggest e2fsprogs works ext2 also ext3 ext4 although ext3 journaling capability reduce need use codice_7 sometimes still necessary help protect kernel bugs bad hardware ext4 e2fsck runtime come considerably userspace companion ext2 ext3 ext4 drivers linux kernel e2fsprogs commonly used gnu/linux however ported systems freebsd darwin | [
5256,
2197,
5397,
2199,
6808,
287,
10016,
9762,
7983,
823,
451,
8651,
4815,
7136,
10732,
2545,
5106,
8306,
246,
9335
] | Validation |
7,137 | 4 | John_A._Samford:john a. samford john alexander samford august 29 1905 – december 1 1968 lieutenant general united states air force served director national security agency samford born hagerman new mexico 1905 graduated high school 1922 spent one year columbia university new york city 1924 received senatorial appointment united states military academy graduated 1928 131st class 260 samford first assignment student officer brooks field texas 1929 received pilot wings kelly field eventually rated command pilot samford next assigned fort crockett located galveston texas 1930 returned kelly field served flying instructor 1934 ordered engineering armament school chanute field illinois 1935 1942 held various assignments panama virginia louisiana florida samford assistant chief staff g-1 headquarters third air force tampa florida appointed chief staff viii air force composite command located northern ireland 1943 samford appointed deputy chief staff eighth air force later chief staff viii bomber command 1944 samford promoted brigadier general appointed chief staff eighth air force october 1944 appointed deputy assistant chief staff a-2 headquarters u.s. army air forces january 1947 samford appointed commander 24th composite wing soon thereafter became antilles air division caribbean air command may 1949 samford appointed commandant air command staff school promoted major general 1950 held brief appointment commandant air war college appointed director intelligence united states air force samford tenure director air force intelligence project blue book investigated unidentified flying objects ufos started july 29 1952 stamford conducted press conference pentagon related ufos samford mentioned beginning 1956 film ufo examined phenomena unidentified flying objects samford served vice director national security agency june august 1956 november samford appointed director national security agency promoted lieutenant general held post retirement november 23 1960 successor nsa director admiral laurence h. frost died november 20 1968 washington dc | [
6017,
266,
6668,
9357,
8726,
2712,
289,
4898,
1189,
11302,
9517,
1838,
1714,
5308,
10305,
1986,
327,
6343,
6344,
11335,
7119,
7759,
2897,
3154,
7887,
8276,
7893,
4566,
10832,
6749,
991,
3305,
7145,
365,
4719,
2419,
6005,
6136,
766
] | Test |
7,138 | 5 | Interarchy:interarchy interarchy ftp client macos supporting ftp sftp scp webdav amazon s3 made nolobe supports many advanced features transferring syncing managing files internet interarchy created mac programmer peter n lewis 1993 macintosh system 7 lewis went form stairways software 1995 continue development interarchy 2007 lewis sold interarchy matthew drayton nolobe continues develop interarchy day drayton employee stairways software worked developer interarchy alongside lewis since 2001 interarchy originally called anarchie archie client name changed interarchy 2000 due conflict cybersquatter | [
6377,
9905,
11201,
7983
] | Test |
7,139 | 2 | LibreSSL:libressl libressl open-source implementation transport layer security tls protocol implementation named secure sockets layer ssl deprecated predecessor tls support removed release 2.3.0 openbsd project forked libressl openssl 1.0.1g april 2014 response heartbleed security vulnerability goals modernizing codebase improving security applying development best practices heartbleed security vulnerability discovered openssl openbsd team audited codebase decided necessary fork openssl remove dangerous code libressl.org domain registered 11 april 2014 project announced name 22 april 2014 first week development 90,000 lines c code removed unused code removed support obsolete operating systems removed libressl initially developed intended replacement openssl openbsd 5.6 ported platforms stripped-down version library stable project seeking stable commitment external funding 17 may 2014 bob beck presented libressl first 30 days future holds 2014 bsdcan conference described progress made first month 5 june 2014 several openssl bugs became public several projects notified advance libressl theo de raadt accused openssl developers intentionally withholding information openbsd libressl 20 june 2014 google created another fork openssl called boringssl promised exchange fixes libressl google already relicensed contributions isc license requested libressl developers 21 june 2014 theo de raadt welcomed boringssl outlined plans libressl-portable starting 8 july code porting macos solaris began initial porting linux began 20 june libressl default provider tls libressl selectable provider tls changes include replacement custom memory calls ones standard library example codice_1 codice_2 codice_3 codice_4 etc. process may help later catch buffer overflow errors advanced memory analysis tools observing program crashes via aslr use nx bit stack canaries etc. fixes potential double free scenarios also cited vcs commit logs including explicit assignments null pointer values extra sanity checks also cited commit logs related ensuring length arguments unsigned-to-signed variable assignments pointer values method returns order maintain good programming practice number compiler options flags designed safety enabled default help spotting potential issues fixed earlier -wall -werror -wextra -wuninitialized also code readability updates help future contributors verifying program correctness knf white-space line-wrapping etc. modification removal unneeded method wrappers macros also help code readability auditing error i/o abstraction library references changes made ensure libressl year 2038 compatible along maintaining portability similar platforms addition codice_5 codice_6 calls added prevent compiler optimizing prevent attackers reading previously allocated memory changes help ensure proper seeding random number generator-based methods via replacements insecure seeding practices taking advantage features offered kernel natively terms notable additions made openbsd added support newer reputable algorithms chacha stream cipher poly1305 message authentication code along safer set elliptic curves brainpool curves rfc 5639 512 bits strength initial release libressl added number features chacha poly1305 algorithm brainpool anssi elliptic curves aes-gcm chacha20-poly1305 aead modes later versions added following initial release libressl disabled number features default code features later removed including kerberos us-export ciphers tls compression dtls heartbeat ssl v2 ssl v3 later versions disabled features initial release libressl removed number features deemed insecure unnecessary deprecated part openbsd 5.6 dual ec drbg algorithm suspected back door cut along support fips 140-2 standard required unused protocols insecure algorithms also removed including support fips 140-2 md4/md5 j-pake srp one complaints openssl number open bugs reported bug tracker gone unfixed years older bugs fixed libressl | [
513,
2050,
4100,
517,
5636,
510,
9223,
9744,
8725,
7702,
2083,
9764,
6702,
5176,
7736,
576,
9281,
7238,
3657,
8778,
5710,
10831,
11345,
8283,
7264,
10850,
1637,
9318,
10341,
9320,
107,
5230,
7794,
5749,
2169,
3707,
1157,
4746,
8331,
6797,... | Test |
7,140 | 2 | Snappy_(package_manager):snappy package manager snappy software deployment package management system developed canonical linux operating system packages called snaps tool using snapd work across range linux distributions allowing distro-agnostic upstream software packaging snappy originally designed ubuntu touch system designed work internet things cloud desktop computing snapcraft tool developing snap packages snap application packages software self-contained work across range linux distributions unlike traditional linux package management approaches like apt yum require specifically adapted packages linux distribution therefore adding delay application development deployment end-users snaps dependency app store obtained source therefore used upstream software deployment snaps deployed ubuntu versions linux ubuntu app store used default back-end stores enabled well developers use snaps create command line tools background services well desktop applications snap application upgrades via atomic operation deltas possible june 2016 snapd ported wide range linux distributions enable snaps used across linux distribution all-snap ubuntu core snapd also available progress arch linux centos debian fedora solus manjaro linux linux mint openembedded raspbian openwrt opensuse distribution able interpret snap metadata implement security expectations snap distribution-specific fashion snapcraft tool developers package programs snap format snappy snap file format single compressed filesystem based squashfs format mounted dynamically host operating system together declarative metadata interpreted snap system set appropriately shaped secure sandbox container application file format extension .snap snappy packaging deployed internet things environments ranging consumer-facing products enterprise device management gateways snappy included default ubuntu desktop images version 16.04 onwards developer screen capture tool peek discontinued support snap packages continuing support flatpak appimage stating developers systems administrators voiced complaints snap highly unsuitable mission-critical applications since autoupdates turned basic feature missing design choice snap developers led unexpected downtime services restart buggy software enters snap distribution system red hat employee adam williamson acknowledging bias criticized snap keeping server side closed source mechanism using third party servers sign contributor license agreement contribute development | [
10760,
7181,
8213,
8214,
6680,
9762,
5670,
3131,
3649,
10817,
3654,
1107,
3667,
2645,
6227,
4192,
9324,
6257,
1138,
5755,
7293,
10900,
4775,
7847,
6828,
3245,
5819,
190,
6352,
6361,
741,
231,
7913,
9455,
7920,
9971,
6393,
5369,
11006,
115... | Train |
7,141 | 2 | Install_Party_des_Savoie:install party des savoie install party des savoie kind installfest social event aims popularize linux operating system libre software day people pays de savoie savoy upper savoy departements welcomed get familiar new desktop environment linux renowned ability reliable virus-free thus local public many ways discover concept free software traditionally install party des savoie takes place may various cities amongst two savoys instance annecy chambery 2010 edition local non-profit societies agu3l alpinux marmottux take active part organisation specific installfest 2011install party des savoie took place may 21 chambery jean-jacques rousseau media librairy lugs savoy gathered together linux mint debian edition lmde system adopted presented public live dvd installed computers first time france attempt visioconferencing made two different installfeists via videoconferencing tools ekiga xmpp protocol | [
10242,
7983,
823
] | Validation |
7,142 | 3 | Hardware_scout:hardware scout hardware scout technique uses otherwise idle processor execution resources perform prefetching cache misses thread stalled cache miss processor pipeline checkpoints register file switches runahead mode continues issue instructions thread waiting memory thread execution run-ahead mode known scout thread data returns memory processor restores register file contents checkpoint switches back normal execution mode computation run-ahead mode discarded processor nevertheless scouting provides speedup memory level parallelism mlp increased cache lines brought cache hierarchy often used processor switches back normal mode sun rock processor later canceled used form hardware scout however computations run-ahead mode depend cache miss may retired immediately allows prefetching traditional instruction-level parallelism scouting simultaneous multithreading smt use hardware threads fight memory wall scouting scout thread runs instructions instruction stream instruction causes pipeline stall case smt smt thread executes instruction another context thus smt increases throughput processor scouting increases performance lowering number cache misses | [
785,
4241,
7313,
7699,
6815,
2210,
5798,
9126,
2345,
7218,
10675,
5948,
4286,
2113,
8514,
5956,
4423,
1480,
7497,
330,
1866,
10706,
4308,
2008,
2264,
2394,
731,
2140,
4194,
11618,
3175,
2536,
5223,
8810,
4205,
10734,
1776,
6774,
7802,
508... | Test |
7,143 | 9 | Object_type_(object-oriented_programming):object type object-oriented programming computer science object type a.k.a wrapping object datatype used object-oriented programming wrap non-object type make look like dynamic object object-oriented programming languages make distinction reference value types often referred objects non-objects platforms complex value types n't exist reasons runtime efficiency syntax semantic issues example java primitive wrapper classes corresponding primitive type etc languages like c++ little notion reference type thus use object type little interest boxing otherwise known wrapping process placing primitive type within object primitive used reference object example java change size array must fixed size one might desire class lists references dynamic objects—it list primitive types value types circumvent boxed dynamic objects added using generic parameterized types introduced j2se 5.0 type represented hand c primitive wrapper classes allows boxing value type returning generic reference boxed object always copy value object usually immutable unboxing object also returns copy stored value repeated boxing unboxing objects severe performance impact boxing dynamically allocates new objects unboxing boxed value longer used makes eligible garbage collection however modern garbage collectors default java hotspot garbage collector efficiently collect short-lived objects boxed objects short-lived performance impact may bad direct equivalence unboxed primitive type reference immutable boxed object type fact possible substitute primitive types program boxed object types whereas assignment one primitive another copy value assignment one reference boxed object another copy reference value refer object first reference however cause problems objects immutable semantically real difference two references object different objects unless look physical equality operations assignment arithmetic comparison logical operators one unbox boxed type perform operation re-box result needed thus possible store primitive types autoboxing term getting reference type value type type conversion either implicit explicit compiler automatically supplies extra source code creates object example versions java prior j2se 5.0 following code compile compilers prior 5.0 would accept last line reference objects surface different forth convert one manually instantiate integer object j2se 5.0 compiler accept last line automatically transform integer object created store value means j2se 5.0 something like compile b unboxed integer values summed result autoboxed new finally stored inside variable equality operators used way equality operators already defined reference types equality references test equality value boxed type one must still manually unbox compare primitives use method another example j2se 5.0 allows programmer treat collection contained values instead objects contradict said collection still contains references dynamic objects list primitive types must instead however compiler automatically transforms code list silently receive objects source code mentions primitive values example programmer write think added list compiler actually transformed line unboxing refers getting value associated given object type conversion either implicit explicit compiler automatically supplies extra source code retrieves value object either invoking method object means example versions java prior j2se 5.0 following code compile c n't support automatic unboxing meaning java n't separate set primitive types object types types primitive object version java automatically implemented c compiler either primitive value types object reference types languages automatic boxing downcast automatically i.e following code wo n't compile c java modern object pascal yet another way perform operations simple types close boxing called type helpers freepascal record helpers delphi freepascal delphi mode. br dialects mentioned object pascal compile-to-native languages miss features c java implement notably run-time type inference strongly typed variables. br feature related boxing. br allows programmer use constructs like | [
2304,
7889,
3562,
5677
] | Test |
7,144 | 9 | LPC_(programming_language):lpc programming language lpc short lars pensjö c object-oriented programming language derived c developed originally lars pensjö facilitate mud building lpmuds though designed game development flexibility led used variety purposes evolution language pike lpc syntax places family c-like languages c c++ strongest influences almost everything lpc object however lpc precisely use concept class mudos something called class really struct instead lpc objects blueprint objects clones blueprint objects prototype-based programming model one treat blueprint object much class object-oriented languages object variables attributes functions methods variables store object state functions executable routines called object object uniquely defined name file comes plus clone numeric identifier typical implementation clone file codice_1 third clone created current run session codice_2 blueprint object corresponding codice_1 simply codice_4 mud game common objects include rooms weapons armor non-player character npcs mudlibs define inheritable objects common things lpmud 2.4.5 mudlib example parent object rooms codice_5 lpc possible syntactically declare class-only instance-only methods attributes functions variables may accessed identically blueprints clones example codice_6 would call codice_7 function directly blueprint instance codice_8 however controversial mechanism many drivers called shadowing allows instance methods emulated extent permitting one object overlay function set onto another effect interposing external function calls shadowed object direct external access variables also supported interaction objects carried function calls notwithstanding data structures pointed variables independent objects changes visible objects referencing data structures simultaneously drivers privileged functions allowing cumbersome form external variable access permits inspection mutation lpc generally used code muds 'rooms often created objects store information describing particular scene along exits point room objects common usage lpc uses game related possible following example shows simple traditional room leverages functions defined mudlib object codice_5 however mudlibs define determine rooms way method defining room first line tells object inherit functionality codice_5 object example assumes codice_5 object defines functions codice_12 codice_13 example contains single function codice_14 drivers call set call codice_14 allow object initialize startup values standard constructor case example calls functions set basic room attributes inherited codice_5 functions called highly dependent mudlib use since mudlib defines actual room parent drivers also support applying type modifiers inherit statements causing inherited object behave respect inheritor type modifier applied functions and/or variables appropriate term object variable used means variable element object i.e attribute opposed local variable exists within function block global variable nonexistent lpc — someone speaks global variable reference lpc probably mean object variable primitive lpc types int string status float etc passed value data structure types object array mapping class struct passed reference feature powerful also lead security holes muds people building world generally less trusted staff running game object passes mapping sensitive values like access control information author another object modify thus increase access rights mudlib developers server administrators thus careful passing complex types lower access objects lpc environments generally categorize functions several major types according implemented lpc implementations generally master object specific lpc object loaded first lpc driver essentially controls happen past point master object typically tell driver simul_efun object preload objects need present startup define functions called object loaded otherwise configure driver operation driver refer back master object needs interact central point reference running environment accepting network connections handling errors validating attempts perform privileged operations | [
9345,
8582,
5521,
1946,
4134,
5677,
11067,
5053,
8644,
7237,
8262,
7894,
7646,
6502,
11625,
7019,
5239,
11386,
2556,
2045
] | Test |
7,145 | 4 | Gordon_Blake:gordon blake gordon aylesworth blake july 22 1910 – september 1 1997 lieutenant general united states air force served director national security agency 1962 1965 gordon aylesworth blake born charles city iowa july 22 1910 son george cecelia blake graduated high school charles city appointed united states military academy late gilbert n. haugen 1927 graduating june 11 1931 commissioned second lieutenant coast artillery corps detailed student officer pilot training october 1932 blake completed primary advanced flying schools transferred air corps january 25 1933 assigned pursuit squadron barksdale field louisiana entering signal school fort monmouth new jersey july 1934 completed communications officers course following june assigned communications instructor air corps technical school chanute field illinois going hawaii february 1939 blake communications officer 18th composite wing september 1941 acted communications officer first land-based aircraft flight hawaii philippines flight made b-17 bombers sent philippines reinforcements flew pioneer route – midway island wake island port moresby new guinea darwin australia clark field philippine islands members flight awarded distinguished flying cross december 7 1941 blake base operations officer rank major hickam field japanese attack pearl harbor awarded silver star gallantry action day became operations officer seventh air force base command promoted lieutenant colonel spent first months world war ii supervising operation airplane ferry route australia via christmas island – canton island – fiji – new caledonia october 1942 blake shifted back communications work commanded army airways communications system pacific rest world war ii exception period october 1943 january 1944 temporary duty alaska established air communications office alaska promoted colonel november 1942 august 28 1945 accompanied special 150-man task force japan prepare airborne occupation troop landings august 30 work world war ii blake awarded legion merit admiral chester w. nimitz plus oak leaf cluster legion merit war department air medal oak leaf cluster battle stars participation following campaigns central pacific eastern mandates new guinea north solomons guadalcanal papua south philippines luzon western pacific returned overseas november 1945 january 1946 appointed deputy commander airways air communications service langley field virginia entering air war college maxwell air force base alabama august 1947 blake graduated following june went research development work wright-patterson air force base ohio 1948 1951 electronics subdivision engineering division served chief armament laboratory summer 1951 placed charge 12 development laboratories promoted brigadier general final assignment wright field vice-commander june 1952 january 1953 transferred air force headquarters january 1953 blake appointed deputy director communications office deputy chief staff operations becoming director communications following month many changes united states air force system global communications navigation including pioneer operational circuits using tropospheric scatter communications first time carried tour director communications blake named assistant deputy chief staff operations june 2 1956 capacity served permanent joint board defense canada — us many defense projects dewline radar network planned two countries latter part washington assignment given aeronautical rating command pilot promoted major general highest permanent rank regular service blake left washington january 4 1957 become commander united states air force security service major component united states air force headquarters san antonio texas awarded air force distinguished service medal exceptionally meritorious conduct performance outstanding service command september 1 1959 blake assigned vice-commander-in-chief chief staff pacific air forces air arm joint pacific command headquarters hawaii blake came headquarters continental air command july 1961 commander-designate assumed command continental air command september 30 1961 became lieutenant general october 1 1961 blake assumed position director national security agency fort george g. meade maryland july 1 1962 held retirement 1965 us air force aircraft save award named awarded action taken air traffic controller airfield manager results safe recovery imperiled airborne aircraft help given endangered aircraft ground | [
6017,
8726,
1189,
9517,
1838,
5308,
1986,
6343,
6344,
11335,
7119,
7759,
7887,
3154,
8276,
7893,
991,
7137,
3305,
2419,
6005,
6136,
766
] | Test |
7,146 | 3 | Java_bytecode_instruction_listings:java bytecode instruction listings list instructions make java bytecode abstract machine language ultimately executed java virtual machine java bytecode generated languages running java platform notably java programming language note referenced value refers 32-bit int per java instruction set | [
4358,
910,
10526,
5031,
5677,
6074,
10683,
5567,
9665,
6860,
3920,
4960,
2658,
3560,
3561,
3562,
5872,
9078,
3705,
6143
] | Test |
7,147 | 9 | Hack_(programming_language):hack programming language hack programming language hiphop virtual machine hhvm created facebook dialect php language implementation open-source licensed mit license hack allows programmers use dynamic typing static typing kind type system called gradual typing also implemented programming languages actionscript hack type system allows types specified function arguments function return values class properties however types local variables always inferred specified hack introduced march 20 2014 announcement new programming language facebook already implemented code battle tested large portion web site hack designed interoperate seamlessly php widely used open-source scripting language focus web development embedded html majority valid php scripts also valid hack however numerous less frequently used php features language constructs supported hack hack extends type hinting available php 5 introduction static typing adding new type hints example scalar types integer string well extending use type hints example class properties function return values however types local variables specified since hack uses gradual typing system default mode type annotations mandatory even places inferred type system assume author correct admit code however strict mode available requires annotations thus enforces fully sound code basic file structure hack script similar php script changes hack file n't include codice_1 opening markup tag forbids using top-level declarations thus would need write code within entrypoint function entrypoint functions automatically executed top-level file automatically executed file included via include require autoloader like functions hack function names must unique within project – i.e projects multiple entrypoints call main « __entrypoint » function main void script similar php executed following output sent browser hello world important point note unlike php hack html code mix normally mix php html code together file like html /html type code supported hack either xhp another template engine needs used hack allows types specified function arguments function return values functions hack thus annotated types like following // hack functions annotated types function negate bool x bool | [
3462,
8582,
11017,
1034,
6154,
6795,
10506,
9614,
10387,
1435,
6555,
9245,
7326,
2465,
3876,
4777,
2348,
5677,
9518,
7983,
9780,
5047,
6074,
10555,
190,
6718,
7359,
6338,
5059,
2372,
8644,
1222,
8262,
1353,
5833,
4171,
8524,
7292,
7889,
2... | Test |
7,148 | 9 | Fortress_(programming_language):fortress programming language fortress discontinued experimental programming language high-performance computing created sun microsystems funding darpa high productivity computing systems project one language designers guy l. steele jr. whose previous work includes scheme common lisp java name fortress intended connote secure fortran i.e. language high-performance computation provides abstraction type safety par modern programming language principles language features included implicit parallelism unicode support concrete syntax similar mathematical notation language designed similar fortran syntactically resembles scala standard ml haskell fortress designed outset multiple syntactic stylesheets source code rendered ascii text unicode prettied image would allow support mathematical symbols symbols rendered output easier reading emacs-based tool called fortify transforms ascii-based fortress source code latex output fortress also designed highly parallel rich functionality contained within libraries drawing java example codice_1 loop construct parallel operation would necessarily iterate strictly linear manner depending underlying implementation however codice_1 construct library function could replaced another version programmer liking rather built language fortress designers made syntax close possible pseudocode analyzed hundreds computer science mathematics papers courses books journals using pseudocode extract common usage patterns english language standard mathematical notation used represent algorithms pseudocode made compiler trying maintain one-to-one correspondence pseudocode executable fortress fortress one three languages created funding high productivity computing systems project others x10 ibm chapel cray inc november 2006 darpa approved funding third phase hpcs project x10 chapel funded fortress leading uncertainty future fortress january 2007 fortress transformed open-source project open-source community people outside sun write fortress code test using open-source fortress interpreter version 1.0 fortress language specification released april 2008 along compliant implementation targeting java virtual machine july 2012 steele announced active development fortress would cease brief winding-down period citing complications using fortress type system existing virtual machines fortress version archetypal hello world program presented fortress reference card export statement makes program executable every executable program fortress must implement run function file program saved compilation must name one specified initial component statement println function outputs hello world words screen | [
3328,
9731,
7301,
7432,
1801,
5129,
4235,
3980,
2062,
15,
8079,
1809,
9875,
2710,
5148,
7580,
7326,
9343,
7072,
8994,
1316,
3876,
10789,
1707,
5677,
7341,
3247,
7983,
9133,
6322,
6962,
2871,
11129,
6718,
7104,
9665,
2242,
6338,
10436,
583... | Test |
7,149 | 3 | Integration_platform:integration platform integration platform software integrates different applications services differentiates enterprise application integration focus supply chain management uses idea system integration create environment engineers integration platforms built components purchased pre-built product ready installation procured integration platform service ipaas offering integration platform tries create environment engineers integration platform typically contains set functional components integration platform focus designed helpful engineers intention map business processes integrate tools supply chain management therefore related systems | [
8581,
3878,
530,
10099,
6809
] | None |
7,150 | 5 | Voodoo_Chat:voodoo chat voodoo chat opened late december 2001 text-based chat program voice chat features created wake excite virtual places closure due company bankruptcy following acquisition home network impending closure excite virtual places new chat venue needed house soon displaced users service initially chief software engineer excite chat service tom lang proposed subscription based service using virtual places software received response lotus software regarding license two months without word subscription based service idea considered dead development alternative chat venue mike parniak using original software rather existing virtual places software began mid-2001 two months creation would later known voodoo chat lang finally received word would granted license use virtual places subscription based service development voodoo chat continued despite removal lang obstacles first version chat opened december 2001 originally voodoo chat run server hierarchy within overlay network today service works little differently voodoo chat apart text-based chatting system also avatars images representing oneself displayed top screen foreground web page said images size width height though programs defaults set 300x300 file size limit 15kb images also effects supported in-house flipping rotating turning black white inverting pixelating blur grow shrink october 9 2007 voice chat come current version voodoo sequenced voice chat works sending clips 20 seconds voice users chat room non-real-time even streamed voice chat 'realtime given high latency typically encountered 'seems likewise nobody tests expressed feeling things 'out sync problematic way voodoo chat uses two methods security first encryption second use system hashes voodoo method encryption encrypts transfers data program increase privacy deter hackers far according website none cracked protocol plenty tried voodoo client generates set system hashes pieces serial numbers within hardware users computer gathered program starts transmitted user attempts log users hashes checked global hash ban list king checked banned hash list specific server 're logging system hash matches either ban list user barred service | [
1632,
8998,
3629,
6797,
7983,
4472,
5435,
4956
] | Test |
7,151 | 3 | Motherboard:motherboard motherboard sometimes alternatively known mainboard main circuit board system board baseboard planar board logic board colloquially mobo main printed circuit board pcb found general purpose computers expandable systems holds allows communication many crucial electronic components system central processing unit cpu memory provides connectors peripherals unlike backplane motherboard usually contains significant sub-systems central processor chipset input/output memory controllers interface connectors components integrated general purpose use applications motherboard specifically refers pcb expansion capability name suggests board often referred mother components attached often include peripherals interface cards daughtercards sound cards video cards network cards hard drives forms persistent storage tv tuner cards cards providing extra usb firewire slots variety custom components similarly term mainboard applied devices single board additional expansions capability controlling boards laser printers televisions washing machines mobile phones embedded systems limited expansion abilities prior invention microprocessor digital computer consisted multiple printed circuit boards card-cage case components connected backplane set interconnected sockets old designs copper wires discrete connections card connector pins printed circuit boards soon became standard practice central processing unit cpu memory peripherals housed individual printed circuit boards plugged backplane ubiquitous s-100 bus 1970s example type backplane system popular computers 1980s apple ii ibm pc published schematic diagrams documentation permitted rapid reverse-engineering third-party replacement motherboards usually intended building new computers compatible exemplars many motherboards offered additional performance features used upgrade manufacturer original equipment late 1980s early 1990s became economical move increasing number peripheral functions onto motherboard late 1980s personal computer motherboards began include single ics also called super i/o chips capable supporting set low-speed peripherals keyboard mouse floppy disk drive serial ports parallel ports late 1990s many personal computer motherboards included consumer-grade embedded audio video storage networking functions without need expansion cards higher-end systems 3d gaming computer graphics typically retained graphics card separate component business pcs workstations servers likely need expansion cards either robust functions higher speeds systems often fewer embedded components laptop notebook computers developed 1990s integrated common peripherals even included motherboards upgradeable components trend would continue smaller systems introduced turn century like tablet computer netbook memory processors network controllers power source storage would integrated systems motherboard provides electrical connections components system communicate unlike backplane also contains central processing unit hosts subsystems devices typical desktop computer microprocessor main memory essential components connected motherboard components external storage controllers video display sound peripheral devices may attached motherboard plug-in cards via cables modern microcomputers increasingly common integrate peripherals motherboard important component motherboard microprocessor supporting chipset provides supporting interfaces cpu various buses external components chipset determines extent features capabilities motherboard modern motherboards include additionally nearly motherboards include logic connectors support commonly used input devices usb mouse devices keyboards early personal computers apple ii ibm pc included minimal peripheral support motherboard occasionally video interface hardware also integrated motherboard example apple ii rarely ibm-compatible computers ibm pc jr. additional peripherals disk controllers serial ports provided expansion cards given high thermal design power high-speed computer cpus components modern motherboards nearly always include heat sinks mounting points fans dissipate excess heat motherboards produced variety sizes shape called computer form factor specific individual computer manufacturers however motherboards used ibm-compatible systems designed fit various case sizes desktop computer motherboards use atx standard form factor — even found macintosh sun computers built commodity components case motherboard power supply unit psu form factor must match though smaller form factor motherboards family fit larger cases example atx case usually accommodate microatx motherboard.computers generally use highly integrated miniaturized customized motherboards one reasons laptop computers difficult upgrade expensive repair often failure one laptop component requires replacement entire motherboard usually expensive desktop motherboard cpu socket central processing unit slot electrical component attaches printed circuit board pcb designed house cpu also called microprocessor special type integrated circuit socket designed high pin counts cpu socket provides many functions including physical structure support cpu support heat sink facilitating replacement well reducing cost importantly forming electrical interface cpu pcb cpu sockets motherboard often found desktop server computers laptops typically use surface mount cpus particularly based intel x86 architecture cpu socket type motherboard chipset must support cpu series speed steadily declining costs size integrated circuits possible include support many peripherals motherboard combining many functions one pcb physical size total cost system may reduced highly integrated motherboards thus especially popular small form factor budget computers typical motherboard different number connections depending standard form factor standard modern atx motherboard typically two three pci-express 16x connection graphics card one two legacy pci slots various expansion cards one two pci-e 1x superseded pci standard eatx motherboard two four pci-e 16x connection graphics cards varying number pci pci-e 1x slots sometimes also pci-e 4x slot vary brands models motherboards two pci-e 16x slots allow 2 monitors without special hardware use special graphics technology called sli nvidia crossfire amd allow 2 4 graphics cards linked together allow better performance intensive graphical computing tasks gaming video editing etc motherboards generally air cooled heat sinks often mounted larger chips northbridge modern motherboards insufficient improper cooling cause damage internal components computer cause crash passive cooling single fan mounted power supply sufficient many desktop computer cpu late 1990s since required cpu fans mounted heat sinks due rising clock speeds power consumption motherboards connectors additional computer fans integrated temperature sensors detect motherboard cpu temperatures controllable fan connectors bios operating system use regulate fan speed alternatively computers use water cooling system instead many fans small form factor computers home theater pcs designed quiet energy-efficient operation boast fan-less designs typically requires use low-power cpu well careful layout motherboard components allow heat sink placement 2003 study found spurious computer crashes general reliability issues ranging screen image distortions i/o read/write errors attributed software peripheral hardware aging capacitors pc motherboards ultimately shown result faulty electrolyte formulation issue termed capacitor plague standard motherboards use electrolytic capacitors filter dc power distributed around board capacitors age temperature-dependent rate water based electrolytes slowly evaporate lead loss capacitance subsequent motherboard malfunctions due voltage instabilities capacitors rated 2000 hours operation expected design life roughly doubles every lifetime 3 4 years expected however many manufacturers deliver substandard capacitors significantly reduce life expectancy inadequate case cooling elevated temperatures around cpu socket exacerbate problem top blowers motherboard components kept effectively doubling motherboard lifetime mid-range high-end motherboards hand use solid capacitors exclusively every 10 °c less average lifespan multiplied approximately three resulting 6-times higher lifetime expectancy capacitors may rated 5000 10000 12000 hours operation extending projected lifetime comparison standard solid capacitors motherboards contain non-volatile memory initialize system load startup software usually operating system external peripheral device microcomputers apple ii ibm pc used rom chips mounted sockets motherboard power-up central processor would load program counter address boot rom start executing instructions rom instructions initialized tested system hardware displayed system information screen performed ram checks loaded initial program peripheral device none available computer would perform tasks memory stores display error message depending model design computer rom version example apple ii original ibm pc microsoft cassette basic rom would start program could loaded disk modern motherboard designs use bios stored eeprom chip soldered socketed motherboard boot operating system non-operating system boot programs still supported modern ibm pc-descended machines nowadays assumed boot program complex operating system microsoft windows linux power first supplied motherboard bios firmware tests configures memory circuitry peripherals power-on self test post may include testing following things recent motherboards bios may also patch central processor microcode bios detects installed cpu one errata published many motherboards use update bios called uefi | [
3586,
3588,
5642,
9739,
10260,
6165,
8730,
7712,
548,
2094,
5681,
7220,
11331,
3142,
7247,
11347,
4695,
9307,
10337,
7788,
8301,
2161,
7794,
1651,
8834,
3722,
4246,
6806,
8345,
4252,
4767,
2213,
4264,
4270,
5300,
9400,
698,
7354,
2237,
68... | None |
7,152 | 5 | Dillo:dillo dillo minimalistic web browser particularly intended older slower computers embedded systems supports plain html/xhtml css rendering images http scripting ignored entirely current versions dillo run linux bsd os x irix cygwin due small size browser choice several space-conscious linux distributions released gnu general public license dillo free software chilean software engineer jorge arellano cid conceived dillo project late 1999 publishing first version dillo december year primary goal creating dillo democratize access information arellano cid believed one buy new computer pay broadband order enjoy world wide web end designed dillo small fast efficient capable performing well even intel 80486 cpu dial-up internet access dillo originally written c programming language gtk+ gui toolkit first versions based earlier browser called armadillo hence name dillo 2 written c c++ components fast light toolkit fltk released october 14 2008 text antialiasing support character sets latin-1 http compression capability improved page rendering added move fltk gtk+ also removed many project dependencies reduced dillo memory footprint 50 2011 dillo-3.x released using fltk-1.3 according changelog change prompted part lack official release fltk-2 stopped dillo-2 inclusion lightweight distributions would otherwise suitable jorge arellano cid still dillo lead developer today dillo funded private donations efforts obtain public grants corporate sponsors unsuccessful lack funding led slowdown development 2006 complete stop 2007 project restarted 2008 two months later received €115 donation distrowatch features dillo include bookmarks tabbed browsing support jpeg png including alpha transparency gif images partial support css introduced release 2.1 settings default fonts background color downloads folder home page customizable configuration files cookies supported disabled default due privacy concerns web browsers retain web cache history program closed dillo automatically clears improve privacy performance developer tool called bug meter provided lower-right corner clicked displays information validation problems unclosed tags dillo found web page unlike browsers dillo quirks mode improve compatibility web pages use invalid html instead dillo processes web pages according published web standards 2003 two linux enthusiasts successfully ran dillo intel 486 processor demonstrated even meager hardware dillo could render http //news.bbc.co.uk/ 10–15 seconds furthermore dillo run variety software platforms including linux bsd solaris mac os x dos handheld devices however dillo developers made little effort make browser work microsoft windows arellano cid stated windows goes dillo goal democratization artificially increasing hardware requirements software costs nevertheless dillo reported work windows via cygwin additionally dillo-win32 project port dillo windows defunct d+ browser dplus continues dillo-win32 left forked final dillo-win32 release 3.0p9 attempt maintain upstream compatibility dillo last version 0.5b oct 15 2013 dillo support javascript java flash right-to-left text complex text layout support frames also limited dillo presents link frame allow user view one time plug-in add https support likewise development reviews dillo praised extraordinary speed noted speed comes price visible cost dillo inability display complex web pages meant 2008 review linux.com commented dillo user interface may intimidating new users pointed scarcity plug-ins dillo dillo global usage share less one hundredth one percent many deficiencies attributed simple lack manpower behind development dillo however browser choice several space-conscious linux distributions damn small linux feather linux vectorlinux antix mustang linux | [
513,
6657,
9736,
2579,
6171,
9757,
7713,
10791,
11305,
9770,
5677,
559,
4661,
3639,
10808,
3643,
9275,
64,
5707,
2125,
10834,
6231,
8281,
6747,
1642,
9834,
9841,
115,
9843,
119,
4728,
637,
1664,
2182,
6797,
10910,
8351,
7340,
9394,
9908,
... | None |
7,153 | 4 | Homeland_Open_Security_Technology:homeland open security technology homeland open security technology host five-year 10 million program department homeland security science technology directorate promote creation use open security open-source software united states government military especially areas pertaining computer security proponent david a. wheeler claims open-source security could also extend hardware written documents october 2011 project open source america 2011 government deployment open source award project contracted open technology research consortium consists georgia tech research institute primary center agile technology university texas austin open source software institute open information security foundation project contributed funding towards openssl software foundation open information security foundation october 2012 host hosted open cybersecurity summit washington d.c. one-day summit keynote stewart a. baker former assistant secretary policy department homeland security | [
420,
7813,
2558,
8764
] | Test |
7,154 | 2 | IAd:iad iad discontinued mobile advertising platform developed apple inc. iphone ipod touch ipad line mobile devices allowing third-party developers directly embed advertisements applications announced april 8 2010 iad part apple ios 4 originally slated release june 21 2010 actual date changed july 1 2010. iad announced apple june 7 2010 keynote ipad version appearing fall hosted sold apple iad platform expected compete google admob mobile advertising service similar admob iad facilitates integrating advertisements applications sold ios app store user tapped iad banner full-screen advertisement appeared within application unlike ads would send user safari web browser ads promised interactive advertising services users able close time returning left app former apple ceo steve jobs initially indicated apple would retain 40 ad revenue line called industry standard 60 going developers amount paid developers later increased 70 iad expected benefit free applications well iad app network discontinued june 30 2016 since technology lives apple news advertising app store search ads | [
10755,
9732,
1549,
5647,
7697,
11289,
6186,
4139,
6700,
1074,
8754,
9784,
8253,
576,
8783,
4180,
10838,
1623,
3672,
3681,
9826,
5733,
8806,
3691,
2673,
2676,
6264,
7292,
2686,
6783,
7806,
10878,
8842,
5784,
1177,
4251,
3228,
2207,
11430,
... | Validation |
7,155 | 1 | Hypertable:hypertable hypertable open-source software project implement database management system inspired publications design google bigtable hypertable runs top distributed file system apache hdfs glusterfs cloudstore kosmos file system kfs written almost entirely c++ developers believed significant performance advantages java hypertable software originally developed company zvents 2008 doug judd promoter hypertable january 2009 baidu chinese language search engine became project sponsor version 0.9.2.1 described blog february 2009 development ended march 2016 | [
7816,
11535,
7983,
5170,
823
] | Validation |
7,156 | 4 | Information_security_awareness:information security awareness information security awareness evolving part information security focuses raising consciousness regarding potential risks rapidly evolving forms information rapidly evolving threats information target human behavior threats matured information increased value attackers increased capabilities expanded broader intentions developed attack methods methodologies acting diverse motives information security controls processes matured attacks matured circumvent controls processes attackers targeted successfully exploited individuals human behavior breach corporate networks critical infrastructure systems targeted individuals unaware information threats may unknowingly circumvent traditional security controls processes enable breach organization response information security awareness maturing cybersecurity business problem dominated agenda chief information officers cio exposing need countermeasures today cyber threat landscape goal information security awareness make everyone aware susceptible opportunities challenges today ’ threat landscape change human risk behaviors create enhance secure organizational culture information security awareness one several key principles information security information security awareness seeks understand enhance human risk behaviors beliefs perceptions information information security also understanding enhancing organizational culture countermeasure rapidly evolving threats example oecd guidelines security information systems networks include nine generally accepted principles awareness responsibility response ethics democracy risk assessment security design implementation security management reassessment context internet type awareness sometimes referred cyber security awareness focus multiple initiatives including u.s. department homeland security national cyber security awareness month president obama 2015 white house summit cybersecurity consumer protection computer based crimes something new us viruses us well 20 years spyware clocked decade since earliest incidents large-scale use phishing traced back least 2003 one reasons researchers agreed upon pace information system evolving expanding security awareness program among employees falling way behind unfortunately however seems rapid adoption online services matched corresponding embrace security culture information security awareness evolving response evolving nature cyber attacks increased targeting personal information cost scale information security breaches furthermore many individuals think security terms technical controls realizing individuals targets behavior increase risks provide countermeasures risks threats determining measuring information security awareness highlighted need accurate metrics response need information security awareness metrics rapidly evolving order understand measure human threat landscape measure change human understanding behavior measure reduce organizational risk measure effectiveness cost information security awareness countermeasure organizations want invest money information security survey conducted pricewaterhousecoopers 2014 found current employees 31 former employees 27 still contribute information security incidents survey results indicated number actual incidents attributable employees risen 25 since 2013 survey security awareness program best solution organization adopt reduce security threats caused internal employees security awareness program helps employees understand information security individual ’ responsibility responsibility everyone program also explicitly mentions employees responsible activities performed identifications furthermore program enforces standard ways handling business computers although organizations adopted standard way providing security awareness program good program include awareness data network user conduct social media use mobile devices wifi phishing emails social engineering different types viruses malware effective employee security awareness program make clear everyone organization responsible security auditors pay close attention six areas covered program data networks user conduct social media mobile devices social engineering many organizations make privacy policies complicated diverse employees always fail understand regulations privacy policy something reminded employees whenever login business computer privacy policies clearer shorter standardized enable better comprehension comparison privacy practices organizations create interactive sessions employees attend every week speak security threats interactive sessions may include awareness newer threats best practices questions answers security awareness program may beneficial organization penalize violators employees found guilty violating program reported higher executives action otherwise program effective information security authorities may perform gap analysis find deficiencies program early 2015 cios rated information security awareness related issues top strategic priorities example february 2015 wall street journal cio network event convened create prioritized set recommendations drive business policy coming year consensus seemed form around cybersecurity delivering change effective communication rest business information security awareness high-profile breaches forefront organization agenda recent study 220 security awareness officers lance spritzner uncovered three related key findings first executive financial support necessary successful security awareness program second due technical nature traditional security controls countermeasures soft skills necessary understand change human behavior lacking finally terms maturity model security awareness still infancy effectively measuring human risk behavior difficult risky behaviors beliefs perceptions often unknown addition attacks phishing social engineering incidents data leakage sensitive data posted social media sites even breaches go undetected unknown making difficult determine measure points failure often attacks incidents breaches reacted reported outside compromised organization attackers covered tracks thus researched measured proactively addition malicious traffic often goes unnoticed attackers often spy mimic known behavior order prevent intrusion detection access monitoring alerts 2016 study developed method measuring security awareness specifically measured understanding circumventing security protocols disrupting intended functions systems collecting valuable information getting caught p. 38 researchers created method could distinguish experts novices people organize different security scenarios groups experts organize scenarios based centralized security themes novices organize scenarios based superficial themes simulated phishing campaigns run regularly provide measures user compliance | [
4448,
7084,
10102,
5373,
2558
] | Validation |
7,157 | 1 | Liquibase:liquibase liquibase open-source database-independent library tracking managing applying database schema changes started 2006 allow easier tracking database changes especially agile software development environment changes database stored text files xml yaml json sql identified combination id author tag well name file list applied changes stored database consulted database updates determine new changes need applied result database version number approach allows work environments multiple developers code branches liquibase automatically creates databasechangelog table databasechangeloglock table first execute changelog file datical largest contributor liquibase project developer datical db – commercial product provides core liquibase functionality plus additional features datical db used dbas release managers devops teams application owners architects developers involved application release process manages database schema changes together application code programmatic fashion eliminates errors delays enables rapid agile releases datical db builds upon liquibase data model approach managing data structure specific content across application versions advance development test production environments datical previews impact schema changes environment deployment thus mitigating risk resulting smoother faster application changes liquibase developer nathan voxland executive datical | [
5612,
5677,
3768,
7983,
10413,
4919,
1816,
479
] | Train |
7,158 | 9 | Mesa_(programming_language):mesa programming language mesa programming language developed late 1970s xerox palo alto research center palo alto california united states language name pun based upon programming language catchphrases time mesa high level programming language mesa algol-like language strong support modular programming every library module least two source files definitions file specifying library interface plus one program files specifying implementation procedures interface use library program higher-level library must import definitions mesa compiler type-checks uses imported entities combination separate compilation type-checking unusual time mesa introduced several innovations language design implementation notably handling software exceptions thread synchronization incremental compilation mesa developed xerox alto one first personal computers graphical user interface however alto system software written bcpl mesa system programming language later xerox star workstations globalview desktop environment xerox parc later developed cedar superset mesa mesa cedar major influence design important languages modula-2 java important vehicle development dissemination fundamentals guis networked environments advances xerox contributed field computer science mesa originally designed computer systems laboratory csl branch xerox palo alto research center alto experimental micro-coded workstation initially spread confined parc universities xerox donated altos mesa later adopted systems programming language xerox commercial workstations xerox 8010 xerox star dandelion xerox 6085 daybreak particular pilot operating system secondary development environment called xerox development environment xde allowed developers debug operating system pilot well viewpoint gui applications using world swap mechanism allowed entire state world swapped allowed low level system crashes paralyzed whole system debugged technique scale well large application images several megabytes pilot/mesa world later releases moved away world swap view micro-coded machines phased favor sparc workstations intel pcs running mesa princops emulator basic hardware instruction set mesa compiled stack-machine language purportedly highest code density ever achieved roughly 4 bytes per high-level language statement touted 1981 paper implementors xerox systems development department development arm parc tuned instruction set published paper resultant code density mesa taught via mesa programming course took people wide range technology xerox available time ended programmer writing hack workable program designed useful actual example hack bwsmagnifier written 1988 allowed people magnify sections workstation screen defined resizable window changeable magnification factor trained mesa programmers xerox well versed fundamental guis networking exceptions multi-threaded programming almost decade became standard tools trade within xerox mesa eventually superseded cedar programming language many mesa programmers developers left xerox 1985 went dec systems research center used experience mesa design modula-2+ later modula-3 mesa strongly typed programming language type-checking across module boundaries enough flexibility type system heap allocators could written mesa strict separation interface implementation mesa allows true incremental compilation encourages architecture- platform-independent programming also simplified source-level debugging including remote debugging via ethernet mesa rich exception handling facilities four types exceptions support thread synchronization via monitors mesa first language implement monitor broadcast concept introduced pilot operating system mesa imperative algebraic syntax based algol pascal rather bcpl c instance compound commands indicated keywords rather braces mesa keywords written uppercase due peculiarity ascii variant used parc alto character set included left-pointing arrow ← rather underscore result alto programmers including using mesa smalltalk etc conventionally used camelcase compound identifiers practice incorporated parc standard programming style hand availability left-pointing arrow allowed use assignment operator originally algol mesa designers wanted implement exception facility hired recent m.s graduate colorado written thesis exception handling facilities algorithmic languages led richest exception facility time primitives language type-safe checks verify full coverage signal handling uncaught exceptions common cause bugs released software xerox parc later developed cedar superset mesa number additions including garbage collection better string support called ropes later native compiler sun sparc workstations importantly cedar contained type-safe subset compiler subset-checking mode ensure deterministic execution memory leaks conformant cedar code mesa precursor programming language cedar cedar main additions garbage collection dynamic types limited form type parameterization special syntax identify type-safe parts multi-module software package | [
512,
2304,
11010,
2179,
2830,
6558,
1952,
1316,
428,
5677,
11574,
1213,
1349,
7494,
8262,
8524,
9932,
7775,
9441,
10981,
9330,
4341,
1399,
2045
] | Test |
7,159 | 1 | Apache_Calcite:apache calcite apache calcite open source framework building databases data management systems includes sql parser api building expressions relational algebra query planning engine framework calcite store data metadata instead allows external data metadata accessed means plug-ins several apache projects use calcite hive uses calcite cost-based query optimization drill kylin use calcite sql parsing optimization samza storm use calcite streaming sql apex phoenix flink projects development use calcite | [
10377,
8460,
7567,
1296,
6161,
1047,
8217,
11161,
6555,
8860,
3877,
10661,
11303,
5677,
10413,
1327,
7983,
4919,
5047,
4538,
1851,
6074,
7485,
7742,
9789,
7233,
6338,
4419,
1222,
1991,
4294,
7750,
5066,
8139,
4944,
1363,
8408,
9179,
7261,
... | Train |
7,160 | 4 | HashKeeper:hashkeeper hashkeeper database application value primarily conducting forensic examinations computers somewhat regular basis hashkeeper uses md5 file signature algorithm establish unique numeric identifiers hash values files known good known bad hashkeeper application developed reduce amount time required examine files digital media examiner defines file known good examiner need repeat analysis hashkeeper compares hash values known good files hash values files computer system values match known good files examiner say substantial certainty corresponding files computer system previously identified known good therefore need examined values match known bad files examiner say substantial certainty corresponding files system examined files bad therefore require scrutiny hash match known bad files relieve examiner responsibility verifying file files fact criminal nature created national drug intelligence center ndic —a component united states department justice—in 1996 first large scale source hash values known good known bad files hashkeeper still community effort based upon belief members state national international law enforcement agencies trusted submit properly categorized hash values one first community sources known good hash values united states internal revenue service first source known bad hash values luxembourg police contributed hash values recognized child pornography hashkeeper available free-of-charge law enforcement military government agencies throughout world available public sending freedom information act request ndic 2012 united states budget ndic de-funded closed doors june 16 2012 availability future hashkeeper uncertain hashkeeper overview national drug intelligence center http //www.justice.gov/archive/ndic/ndic-moved.html http //www.nsrl.nist.gov/nsrl-faqs.html faq12 | [
2432,
7968,
4834,
5475,
5284,
2437,
7525,
9319,
6475,
11182,
830,
3984,
4049,
2901,
4789,
8635,
2494
] | None |
7,161 | 4 | Interpolation_attack:interpolation attack cryptography interpolation attack type cryptanalytic attack block ciphers two attacks differential cryptanalysis linear cryptanalysis presented block ciphers new block ciphers introduced proven secure differential linear attacks among iterated block ciphers kn-cipher shark cipher however thomas jakobsen lars knudsen showed late 90 ciphers easy break introducing new attack called interpolation attack attack algebraic function used represent s-box may simple quadratic polynomial rational function galois field coefficients determined standard lagrange interpolation techniques using known plaintexts data points alternatively chosen plaintexts used simplify equations optimize attack simplest version interpolation attack expresses ciphertext polynomial plaintext polynomial relative low number unknown coefficients collection plaintext/ciphertext p/c pairs polynomial reconstructed polynomial reconstructed attacker representation encryption without exact knowledge secret key interpolation attack also used recover secret key easiest describe method example let iterated cipher given formula_2 plaintext formula_3 output formula_4 round formula_5 secret formula_4 round key derived secret key formula_7 key schedule formula_8-round iterated cipher formula_9 ciphertext consider 2-round cipher let formula_10 denote message formula_11 denote ciphertext output round 1 becomes output round 2 becomes expressing ciphertext polynomial plaintext yields formula_16 key dependent constants using many plaintext/ciphertext pairs number unknown coefficients polynomial formula_17 construct polynomial example done lagrange interpolation see lagrange polynomial unknown coefficients determined representation formula_17 encryption without knowledge secret key formula_7 considering formula_20-bit block cipher formula_21 possible plaintexts therefore formula_21 distinct formula_23 pairs let formula_24 unknown coefficients formula_17 since require many formula_23 pairs number unknown coefficients polynomial interpolation attack exist formula_27 assume time construct polynomial formula_17 using formula_23 pairs small comparison time encrypt required plaintexts let formula_24 unknown coefficients formula_17 time complexity attack formula_24 requiring formula_24 known distinct formula_23 pairs often method efficient done given formula_8 round iterated cipher block length formula_20 let formula_37 output cipher formula_38 rounds formula_39 express value formula_37 polynomial plaintext formula_10 polynomial ciphertext formula_11 let formula_43 expression formula_37 via formula_10 let formula_46 expression formula_37 via formula_11 polynomial formula_49 obtain computing forward using iterated formula cipher round formula_38 polynomial formula_51 obtain computing backwards iterated formula cipher starting round formula_8 round formula_53 hold formula_55 formula_56 polynomials low number coefficients solve equation unknown coefficients assume formula_49 expressed formula_58 coefficients formula_51 expressed formula_60 coefficients would need formula_61 known distinct formula_23 pairs solve equation setting matrix equation however matrix equation solvable multiplication addition make sure get unique non-zero solution set coefficient corresponding highest degree one constant term zero therefore formula_63 known distinct formula_23 pairs required time complexity attack formula_63 requiring formula_63 known distinct formula_23 pairs meet-in-the-middle approach total number coefficients usually smaller using normal method makes method efficient since less formula_23 pairs required also use interpolation attack recover secret key formula_7 remove last round formula_8-round iterated cipher block length formula_20 output cipher becomes formula_72 call cipher reduced cipher idea make guess last round key formula_73 decrypt one round obtain output formula_74 reduced cipher verify guess use interpolation attack reduced cipher either normal method meet-in-the-middle method done normal method express output formula_74 reduced cipher polynomial plaintext formula_10 call polynomial formula_77 express formula_17 formula_24 coefficients using formula_24 known distinct formula_23 pairs construct polynomial verify guess last round key check one extra formula_23 pair holds yes high probability guess last round key correct make another guess key meet-in-the-middle method express output formula_37 round formula_39 polynomial plaintext formula_10 polynomial output reduced cipher formula_74 call polynomials formula_49 formula_89 let expressed formula_58 formula_60 coefficients respectively formula_92 known distinct formula_23 pairs find coefficients verify guess last round key check one extra formula_23 pair holds yes high probability guess last round key correct make another guess key found correct last round key continue similar fashion remaining round keys secret round key length formula_20 formula_21 different keys probability formula_98 correct chosen random therefore average make formula_99 guesses finding correct key hence normal method average time complexity formula_100 requiring formula_101 known distinct formula_102 pairs meet-in-the-middle method average time complexity formula_103 requiring formula_104 known distinct formula_102 pairs meet-in-the-middle attack used variant attack s-boxes uses inverse function formula_20-bit s-box formula_107 formula_108 block cipher shark uses sp-network s-box formula_109 cipher resistant differential linear cryptanalysis small number rounds however broken 1996 thomas jakobsen lars knudsen using interpolation attack denote sharkformula_110 version shark block size formula_111 bits using formula_24 parallel formula_20-bit s-boxes formula_8 rounds jakobsen knudsen found exist interpolation attack sharkformula_115 64-bit block cipher using formula_116 chosen plaintexts interpolation attack sharkformula_117 128-bit block cipher using formula_118 chosen plaintexts also thomas jakobsen introduced probabilistic version interpolation attack using madhu sudan algorithm improved decoding reed-solomon codes attack work even algebraic relationship plaintexts ciphertexts holds fraction values | [
7556,
2567,
3084,
2957,
7056,
658,
660,
1173,
1941,
4128,
4389,
10662,
169,
11185,
8627,
8628,
2357,
10806,
1847,
9528,
2110,
9156,
9541,
10315,
6863,
8273,
7635,
212,
9556,
10963,
11349,
2265,
7643,
9697,
8674,
229,
618,
1898,
11119,
881... | None |
7,162 | 2 | SMF_120.9:smf 120.9 smf 120 subtype 9 new smf record made available ibm websphere application server z/os version 7 design based customer feedback regarding data required operating z/os previous z/os smf records subtypes 1 3 5 6 7 8 subtypes continue exist subtype 9 may viewed replacement shorthand way referring smf 120 subtype 9 smf 120.9 smf 120.9 provided address two shortcomings previous smf design z/os smf 120.9 activity record based per request design longer need correlate data points across records determine statistical information per request information contained smf 120.9 record contains data request overhead turning smf 120.9 measured approximately 1.5 system cpu basic activity records smf 120.9 record divided ten sections section number fields containing specific information request sections optional may turned based administrator need information ibm information center link referenced mapping sections data fields description data represents wp101342 techdoc referenced extensive description feature written architect developer new function z/os operating system allows started tasks modified operator command allows behavior started task dynamically altered degree modification permitted function started task program limits environment format modify command codice_1 z/os modify issued controller jobname smf 120.9 function z/os supports modify command following parameters sample java program available evaluate dumped smf 120.9 records provide detailed summary view information contain may obtained link registration required sample smf browser called intended replacement powerful smf record analysis products useful seeing format records verifying records written smaller scale analysis br | [
4906,
3323,
9838
] | None |
7,163 | 2 | System_Information_(Mac):system information mac system information previously known system profiler software utility derived field service diagnostics produced apple service diagnostic engineering team time located apple satellite buildings campbell california bundled classic mac os since mac os 7.6 name apple system profiler mac os x v10.0 first release macos renamed system profiler release mac os x 10.7 lion renamed system information new features lion ability look support information user hardware model well os x mountain lion later versions macos users also access system information holding option key system information ... replace mac apple menu compiles technical information installed hardware devices drivers applications system settings system software programs kernel extensions installed host computer export information plain text rtf plist xml format information used diagnose problems system profiler extremely useful attempting diagnose hardware problem user send information directly apple user desires support scripting automation applescript limited support automator system information also accessed using system_profiler command terminal application information execute man system_profiler system_profiler -h macos terminal application | [
1542,
4615,
3598,
5647,
1042,
6700,
4657,
1074,
1592,
576,
9802,
5713,
3670,
4184,
2141,
4702,
3167,
2149,
8303,
6771,
2676,
9343,
3719,
10888,
11402,
8852,
1686,
7318,
3228,
2207,
1699,
5292,
8877,
1710,
3766,
2232,
9912,
9406,
1729,
684... | None |
7,164 | 0 | Machine_translation:machine translation machine translation sometimes referred abbreviation mt confused computer-aided translation machine-aided human translation maht interactive translation sub-field computational linguistics investigates use software translate text speech one language another basic level mt performs simple substitution words one language words another alone usually produce good translation text recognition whole phrases closest counterparts target language needed solving problem corpus statistical neural techniques rapidly growing field leading better translations handling differences linguistic typology translation idioms isolation anomalies current machine translation software often allows customization domain profession weather reports improving output limiting scope allowable substitutions technique particularly effective domains formal formulaic language used follows machine translation government legal documents readily produces usable output conversation less standardised text improved output quality also achieved human intervention example systems able translate accurately user unambiguously identified words text proper names assistance techniques mt proven useful tool assist human translators limited number cases even produce output used e.g. weather reports progress potential machine translation debated much history since 1950s number scholars questioned possibility achieving fully automatic machine translation high quality first notably yehoshua bar-hillel critics claim in-principle obstacles automating translation process idea machine translation may traced back 17th century 1629 rené descartes proposed universal language equivalent ideas different tongues sharing one symbol field machine translation appeared warren weaver memorandum translation 1949 first researcher field yehosha bar-hillel began research mit 1951 georgetown university mt research team followed 1951 public demonstration georgetown-ibm experiment system 1954 mt research programs popped japan russia 1955 first mt conference held london 1956 researchers continued join field association machine translation computational linguistics formed u.s. 1962 national academy sciences formed automatic language processing advisory committee alpac study mt 1964 real progress much slower however alpac report 1966 found ten-year-long research failed fulfill expectations funding greatly reduced according 1972 report director defense research engineering ddr e feasibility large-scale mt reestablished success logos mt system translating military manuals vietnamese conflict french textile institute also used mt translate abstracts french english german spanish 1970 brigham young university started project translate mormon texts automated translation 1971 xerox used systran translate technical manuals 1978 beginning late 1980s computational power increased became less expensive interest shown statistical models machine translation various mt companies launched including trados 1984 first develop market translation memory technology 1989 first commercial mt system russian english german-ukrainian developed kharkov state university 1991 mt web started systran offering free translation small texts 1996 followed altavista babelfish racked 500,000 requests day 1997 franz josef och future head translation development google darpa speed mt competition 2003 innovations time included moses open-source statistical mt engine 2007 text/sms translation service mobiles japan 2008 mobile phone built-in speech-to-speech translation functionality english japanese chinese 2009 recently google announced google translate translates roughly enough text fill 1 million books one day 2012 idea using digital computers translation natural languages proposed early 1946 a. d. booth possibly others warren weaver wrote important memorandum translation 1949 georgetown experiment means first application demonstration made 1954 apexc machine birkbeck college university london rudimentary translation english french several papers topic published time even articles popular journals example article cleave zacharov september 1955 issue wireless world similar application also pioneered birkbeck college time reading composing braille texts computer human translation process may described behind ostensibly simple procedure lies complex cognitive operation decode meaning source text entirety translator must interpret analyse features text process requires in-depth knowledge grammar semantics syntax idioms etc. source language well culture speakers translator needs in-depth knowledge re-encode meaning target language therein lies challenge machine translation program computer understand text person create new text target language sounds written person general application beyond current technology though works much faster automated translation program procedure human participation produce output even close quality human translator produce however provide general though imperfect approximation original text getting gist process called gisting sufficient many purposes including making best use finite expensive time human translator reserved cases total accuracy indispensable problem may approached number ways evolution accuracy improved machine translation use method based linguistic rules means words translated linguistic way – suitable orally speaking words target language replace ones source language often argued success machine translation requires problem natural language understanding solved first generally rule-based methods parse text usually creating intermediary symbolic representation text target language generated according nature intermediary representation approach described interlingual machine translation transfer-based machine translation methods require extensive lexicons morphological syntactic semantic information large sets rules given enough data machine translation programs often work well enough native speaker one language get approximate meaning written native speaker difficulty getting enough data right kind support particular method example large multilingual corpus data needed statistical methods work necessary grammar-based methods grammar methods need skilled linguist carefully design grammar use translate closely related languages technique referred rule-based machine translation may used rule-based machine translation paradigm includes transfer-based machine translation interlingual machine translation dictionary-based machine translation paradigms type translation used mostly creation dictionaries grammar programs unlike methods rbmt involves information linguistics source target languages using morphological syntactic rules semantic analysis languages basic approach involves linking structure input sentence structure output sentence using parser analyzer source language generator target language transfer lexicon actual translation rbmt biggest downfall everything must made explicit orthographical variation erroneous input must made part source language analyser order cope lexical selection rules must written instances ambiguity adapting new domains hard core grammar across domains domain-specific adjustment limited lexical selection adjustment transfer-based machine translation similar interlingual machine translation creates translation intermediate representation simulates meaning original sentence unlike interlingual mt depends partially language pair involved translation interlingual machine translation one instance rule-based machine-translation approaches approach source language i.e text translated transformed interlingual language i.e language neutral representation independent language target language generated interlingua one major advantages system interlingua becomes valuable number target languages turned increases however interlingual machine translation system made operational commercial level kant system nyberg mitamura 1992 designed translate caterpillar technical english cte languages machine translation use method based dictionary entries means words translated dictionary statistical machine translation tries generate translations using statistical methods based bilingual text corpora canadian hansard corpus english-french record canadian parliament europarl record european parliament corpora available good results achieved translating similar texts corpora still rare many language pairs first statistical machine translation software candide ibm google used systran several years switched statistical translation method october 2007 2005 google improved internal translation capabilities using approximately 200 billion words united nations materials train system translation accuracy improved google translate similar statistical translation programs work detecting patterns hundreds millions documents previously translated humans making intelligent guesses based findings generally human-translated documents available given language likely translation good quality newer approaches statistical machine translation metis ii presemt use minimal corpus size instead focus derivation syntactic structure pattern recognition development may allow statistical machine translation operate monolingual text corpus smt biggest downfall includes dependent upon huge amounts parallel texts problems morphology-rich languages especially translating languages inability correct singleton errors example-based machine translation ebmt approach proposed makoto nagao 1984 example-based machine translation based idea analogy approach corpus used one contains texts already translated given sentence translated sentences corpus selected contain similar sub-sentential components similar sentences used translate sub-sentential components original sentence target language phrases put together form complete translation hybrid machine translation hmt leverages strengths statistical rule-based translation methodologies several mt organizations claim hybrid approach uses rules statistics approaches differ number ways recently advent neural mt new version hybrid machine translation emerging combines benefits rules statistical neural machine translation approach allows benefitting pre- post-processing rule guided workflow well benefitting nmt smt downside inherent complexity makes approach suitable specific use cases one proponents approach complex use cases omniscien technologies deep learning based approach mt neural machine translation made rapid progress recent years google announced translation services using technology preference previous statistical methods word-sense disambiguation concerns finding suitable translation word one meaning problem first raised 1950s yehoshua bar-hillel pointed without universal encyclopedia machine would never able distinguish two meanings word today numerous approaches designed overcome problem approximately divided shallow approaches deep approaches shallow approaches assume knowledge text simply apply statistical methods words surrounding ambiguous word deep approaches presume comprehensive knowledge word far shallow approaches successful claude piron long-time translator united nations world health organization wrote machine translation best automates easier part translator job harder time-consuming part usually involves extensive research resolve ambiguities source text grammatical lexical exigencies target language require resolved ideal deep approach would require translation software research necessary kind disambiguation would require higher degree ai yet attained shallow approach simply guessed sense ambiguous english phrase piron mentions based perhaps kind prisoner-of-war camp often mentioned given corpus would reasonable chance guessing wrong fairly often shallow approach involves ask user ambiguity would piron estimate automate 25 professional translator job leaving harder 75 still done human one major pitfalls mt inability translate non-standard language accuracy standard language heuristic statistical based mt takes input various sources standard form language rule-based translation nature include common non-standard usages causes errors translation vernacular source colloquial language limitations translation casual speech present issues use machine translation mobile devices name entities narrow sense refer concrete abstract entities real world including people organizations companies places etc also refers expressing time space quantity 1 july 2011 79.99 named entities occur text analyzed statistical machine translation initial difficulty arises dealing named entities simply identifying text consider list names common particular language illustrate – common names different language also constantly changing named entities recognized machine translator may erroneously translated common nouns would likely affect bleu rating translation would change text human readability also possible identified named entities omitted output translation would also implications text readability message another way deal named entities use transliteration instead translation meaning find letters target language closely correspond name source language attempts incorporate machine translation adding transliteration step translation procedure however attempts still problems even cited worsening quality translation named entities still identified incorrectly words transliterated transliterated n't example southern california first word translated directly second word transliterated however machines would often transliterate treated one entity words like hard machine translators even transliteration component process lack attention issue named entity translation recognized potentially stemming lack resources devote task addition complexity creating good system named entity translation one approach named entity translation transliterate translate words second create do-not-translate list end goal – transliteration opposed translation approaches still rely correct identification named entities however third approach successful named entity translation class-based model method named entities replaced token represent class belong example ted erica would replaced person class token way statistical distribution use person names general analyzed instead looking distributions ted erica individually problem class based model solves probability given name specific language affect assigned probability translation study stanford improving area translation gives examples different probabilities assigned david going walk ankit going walk english target language due different number occurrences name training data frustrating outcome study stanford attempts improve named recognition translation many times decrease bleu scores translation result inclusion methods named entity translation work done utilization multiparallel corpora body text translated 3 languages using methods text translated 2 languages may utilized combination provide accurate translation third language compared one source languages used alone ontology formal representation knowledge includes concepts objects processes etc domain relations stored information linguistic nature one speak lexicon nlp ontologies used source knowledge machine translation systems access large knowledge base systems enabled resolve many especially lexical ambiguities following classic examples humans able interpret prepositional phrase according context use world knowledge stored lexicons machine translation system initially would able differentiate meanings syntax change large enough ontology source knowledge however possible interpretations ambiguous words specific context reduced areas usage ontologies within nlp include information retrieval information extraction text summarization ontology generated pangloss knowledge-based machine translation system 1993 may serve example ontology nlp purposes compiled system provides holy grail fully automatic high-quality machine translation unrestricted text many fully automated systems produce reasonable output quality machine translation substantially improved domain restricted controlled despite inherent limitations mt programs used around world probably largest institutional user european commission project example coordinated university gothenburg received 2.375 million euros project support eu create reliable translation tool covers majority eu languages development mt systems comes time budget cuts human translation may increase eu dependency reliable mt programs european commission contributed 3.072 million euros via isa programme creation mt ec statistical machine translation program tailored administrative needs eu replace previous rule-based machine translation system 2005 google claimed promising results obtained using proprietary statistical machine translation engine statistical translation engine used google language tools arabic english chinese english overall score 0.4281 runner-up ibm bleu-4 score 0.3954 summer 2006 tests conducted national institute standards technology recent focus terrorism military sources united states investing significant amounts money natural language engineering in-q-tel venture capital fund largely funded us intelligence community stimulate new technologies private sector entrepreneurs brought companies like language weaver currently military community interested translation processing languages like arabic pashto dari within languages focus key phrases quick communication military members civilians use mobile phone apps information processing technology office darpa hosts programs like tides babylon translator us air force awarded 1 million contract develop language translation technology notable rise social networking web recent years created yet another niche application machine translation software – utilities facebook instant messaging clients skype googletalk msn messenger etc – allowing users speaking different languages communicate machine translation applications also released mobile devices including mobile telephones pocket pcs pdas etc due portability instruments come designated mobile translation tools enabling mobile business networking partners speaking different languages facilitating foreign language learning unaccompanied traveling foreign countries without need intermediation human translator despite labelled unworthy competitor human translation 1966 automated language processing advisory committee put together united states government quality machine translation improved levels application online collaboration medical field investigated application technology medical settings human translators absent another topic research difficulties arise due importance accurate translations medical diagnoses many factors affect machine translation systems evaluated factors include intended use translation nature machine translation software nature translation process different programs may work well different purposes example statistical machine translation smt typically outperforms example-based machine translation ebmt researchers found evaluating english french translation ebmt performs better concept applies technical documents easily translated smt formal language certain applications however e.g. product descriptions written controlled language dictionary-based machine-translation system produced satisfactory translations require human intervention save quality inspection various means evaluating output quality machine translation systems oldest use human judges assess translation quality even though human evaluation time-consuming still reliable method compare different systems rule-based statistical systems automated means evaluation include bleu nist meteor lepor relying exclusively unedited machine translation ignores fact communication human language context-embedded takes person comprehend context original text reasonable degree probability certainly true even purely human-generated translations prone error therefore ensure machine-generated translation useful human publishable-quality translation achieved translations must reviewed edited human late claude piron wrote machine translation best automates easier part translator job harder time-consuming part usually involves extensive research resolve ambiguities source text grammatical lexical exigencies target language require resolved research necessary prelude pre-editing necessary order provide input machine-translation software output meaningless addition disambiguation problems decreased accuracy occur due varying levels training data machine translating programs example-based statistical machine translation rely vast array real example sentences base translation many sentences analyzed accuracy jeopardized researchers found program trained 203,529 sentence pairings accuracy actually decreases optimal level training data seems 100,000 sentences possibly training data increases number possible sentences increases making harder find exact translation match although concerns machine translation accuracy dr. ana nino university manchester researched advantages utilizing machine translation classroom one pedagogical method called using mt bad model mt bad model forces language learner identify inconsistencies incorrect aspects translation turn individual hopefully possess better grasp language dr. nino cites teaching tool implemented late 1980s end various semesters dr. nino able obtain survey results students used mt bad model well models overwhelmingly students felt observed improved comprehension lexical retrieval increased confidence target language early 2000s options machine translation spoken signed languages severely limited common belief deaf individuals could use traditional translators however stress intonation pitch timing conveyed much differently spoken languages compared signed languages therefore deaf individual may misinterpret become confused meaning written text based spoken language researchers zhao et al 2000 developed prototype called team translation english asl machine completed english american sign language asl translations program would first analyze syntactic grammatical morphological aspects english text following step program accessed sign synthesizer acted dictionary asl synthesizer housed process one must follow complete asl signs well meanings signs entire text analyzed signs necessary complete translation located synthesizer computer generated human appeared would use asl sign english text user works original subject copyright protection scholars claim machine translation results entitled copyright protection mt involve creativity copyright issue derivative work author original work original language lose rights work translated translator must permission publish translation | [
5122,
2054,
10,
2059,
3085,
1044,
2582,
3608,
538,
8748,
4662,
2103,
3127,
8759,
11318,
3646,
6208,
5187,
4676,
9796,
5197,
2126,
6223,
10320,
3668,
8803,
7780,
8297,
4092,
3698,
116,
2680,
133,
4744,
3721,
6798,
5781,
3743,
9375,
3748,
... | Test |
7,165 | 5 | Extensible_Name_Service:extensible name service extensible name service often shortened xns open protocol universal addressing automated data exchange xml-based digital identity architecture development xml 1998 led xns project establishment international non-profit governance organization xns public trust organization xnsorg early 2000 2002 xns specifications contributed xnsorg oasis became part xri extensible resource identifier xdi xri data interchange technical committees together two standards xri xdi form basis formation dataweb xnsorg since evolved xdi.org offers community-based xri/xdi infrastructure | [
4979,
479
] | None |
7,166 | 3 | Final_Fantasy_VI:final fantasy vi final fantasy vi released critical acclaim seen landmark title role-playing genre instance ranked 2nd best rpg time ign 2017 snes playstation versions sold 3.48 million copies worldwide date stand-alone game well 750,000 copies part japanese final fantasy collection north american final fantasy anthology final fantasy vi numerous awards considered many one greatest video games time ported tose minor differences sony playstation 1999 nintendo game boy advance 2006 released wii virtual console 2011 nintendo re-released final fantasy vi united states september 2017 part company super nes classic edition game known final fantasy iii first released north america original final fantasy ii final fantasy iii final fantasy v released outside japan time leaving iv second title released outside japan vi third however later localizations use original title like previous final fantasy installments final fantasy vi consists four basic modes gameplay overworld map town dungeon field maps battle screen menu screen overworld map scaled-down version game fictional world player uses direct characters various locations games series three primary means travel across overworld foot chocobo airship plot-driven exceptions enemies randomly encountered field maps overworld traveling foot menu screen player makes decisions characters traveling party equipment wield magic learn configuration gameplay also used track experience points levels game plot develops player progresses towns dungeons town citizens offer helpful information residents item equipment shops later game visiting certain towns activate side-quests dungeons appear variety areas including caves forests buildings dungeons often treasure chests containing rare items available stores dungeons may feature puzzles mazes dungeons requiring player divide characters multiple parties must work together advance dungeon combat final fantasy vi menu-based player selects action list options fight magic item maximum four characters may used battles based series traditional active time battle atb system first featured final fantasy iv system character action bar replenishes rate dependent speed statistic character action bar filled player may assign action addition standard battle techniques character possesses unique special ability example locke possesses ability steal items enemies celes runic ability allows absorb magical attacks cast next turn another element powerful attack substitution occasionally appears character health low similar features appear later final fantasy titles variety different names including limit breaks desperation moves trances overdrives characters rewarded victorious battles experience points money called gil gold piece gp original north american localization characters attain certain amount experience points gain level increases statistics additional player may play battle scenarios control individual characters assigned configuration menu characters final fantasy vi equipped variety weapons armor particular entry powerful accessories known relics weapons armor increase combat capability mostly increasing statistics adding beneficial effects attacks comparison relics variety uses effects almost entirely interchangeable among party members extended sophistication alter basic battle commands exceed normal limitations game systems although final fantasy vi two playable characters start game ability use magic magic may later taught almost playable characters games introduction magicite espers magicite shards contain espers game incarnation series trope summons powerful monstrous beings several recurring series history ifrit shiva bahamut odin besides reappear final fantasy vi approximately two dozen total added later versions game critically game uses setting plot feature heavily around espers remains deceased referred magicite equipped playable characters menu magicite specific set magic spells teach character additionally magicite grant statistical bonus character equipped character gains level finally character equips piece magicite character may summon esper corresponds piece magicite contrast medieval settings featured previous final fantasy titles final fantasy vi set world prominent steampunk influences structure society parallels latter half 19th century opera fine arts serving recurring motifs throughout game level technology comparable second industrial revolution first half game planet referred world balance divided three lush continents northern continent punctuated series mountain ranges southern continent mostly subjugated cruel gestahl empire eastern continent home veldt massive wilderness inhabited monsters world apocalyptic event mid-game transforms planet world ruin withering landmasses fractured numerous islands surrounding larger continent game alludes conflict known war magi occurred one thousand years prior beginning game conflict three quarreling entities known warring triad used innocent humans soldiers transforming enslaved magical beings called espers triad realized wrongdoings freed espers sealed powers inside three stone statues precaution espers sealed statues realm humans concept magic gradually faded myth mankind built society extolling science technology game opening empire taken advantage weakening barrier human esper domains capturing several espers process using espers power source empire created magitek craft combines magic machinery including mechanical infantry infuses humans magical powers empire opposed returners rebel organization seeking free subjugated lands final fantasy vi features fourteen permanent playable characters game main series well several secondary characters briefly controlled player starting character terra branford reserved half-human half-esper girl spent life slave empire thanks mind-controlling device unfamiliar love primary characters include locke cole treasure hunter rebel sympathizer powerful impulse protect women celes chere former general empire joined returners jailed questioning imperial practices edgar roni figaro consummate womanizer king figaro claims allegiance empire secretly supplying aid returners sabin rene figaro edgar independent brother fled royal court hone martial arts skills cyan garamonde loyal knight kingdom doma lost family friends kefka poisoned kingdom water supply setzer gabbiani habitual gambler thrill seeker owner world known airship shadow ninja mercenary offers services empire returners relm arrowny young tough artistic girl magical powers strago magus relm elderly grandfather blue mage gau feral child surviving since infancy veldt mog pike-toting moogle mines narshe umaro savage loyal sasquatch also narshe talked joining returners mog persuasion gogo mysterious fully shrouded master art mimicry main characters game hold significant grudge empire particular kefka palazzo serves one game main antagonists along emperor gestahl clownish kefka became first experimental prototype line magically empowered soldiers called magitek knights rendering insane actions throughout game reflect demented nature supporting character ultros serves recurring villain comic relief handful characters reappeared later games final fantasy sgi short tech demo produced silicon graphics onyx workstation featured polygon-based 3d renderings locke terra shadow town narshe terra participates imperial mission seize powerful esper encased ice upon locating magical reaction occurs terra esper result soldiers accompanying terra killed terra knocked unconscious upon awakening terra informed empire using slave crown control actions crown removed terra remember anything name rare ability use magic unaided terra introduced organization known returners agrees help revolution empire returners learn imperial soldiers led kefka planning another attempt seize frozen esper repelling kefka attack terra experiences another magical reaction frozen esper transforms creature resembling esper flies another continent upon locating terra party confronted esper named ramuh informs group terra may require assistance another esper imprisoned imperial capital city vector vector party attempts rescue several espers however espers already dying magitek experiments choose instead offer lives party transforming magicite group returns terra observes reaction magicite maduin reaction calms terra restores memory reveals half-human half-esper child maduin human woman revelation returners ask terra convince espers join cause travels sealed gate human esper worlds however unbeknownst party empire also uses terra gain access esper world emperor gestahl kefka retrieve statues warring triad raising landmass called floating continent group confronts emperor gestahl kefka floating continent whereupon kefka murders gestahl kefka tampers alignment statues upsets balance magic destroys surface world one year later celes awakens deserted island learns kefka using three statues rule world god-like manner rule causing life slowly wither away celes finds lost comrades decide confront kefka end reign kefka killed statues destroyed magic espers disappear world terra able survive hanging onto human half existence group watches world rejuvenate final fantasy vi entered development release predecessor final fantasy v december 1992 development game took one year complete series creator director hironobu sakaguchi could intimately involved previous installments due projects promotion executive vice president company 1991 reason became producer split director responsibilities final fantasy vi yoshinori kitase hiroyuki ito kitase charge event production scenario ito handled battle aspects sakaguchi supervised kitase cutscene direction ensured project would coalesce whole idea behind story final fantasy vi every character protagonist members development team contributed ideas characters episodes overall plot kitase described hybrid process consequently terra locke conceived sakaguchi celes gau kitase shadow setzer graphic director tetsuya nomura edgar sabin field graphic designer kaori tanaka kitase task unite story premise provided sakaguchi individual ideas character episodes create cohesive narrative scenario final fantasy vi written group four five people among kitase provided key elements story opera scene celes suicide attempt well kefka appearances regular series character designer yoshitaka amano concept art became basis models full motion videos produced game playstation re-release tetsuya takahashi one graphic directors drew imperial magitek armors seen opening scene disregarded sakaguchi intention reuse regular designs elsewhere game sprite art characters in-game appearance drawn kazuko shibuya earlier installments sprites less detailed map battle final fantasy vi equally high resolution regardless screen enabled use animations depicting variety movements facial expressions though first game utilize super nes mode 7 graphics final fantasy vi made extensive use predecessors instance unlike final fantasy iv final fantasy v world map rendered mode 7 lends somewhat three-dimensional perspective otherwise two-dimensional game original north american localization release final fantasy vi square super nes featured several changes original japanese version obvious change game title final fantasy vi final fantasy iii two games series localized north america time final fantasy vi distributed final fantasy iii maintain naming continuity unlike final fantasy iv first released north america final fantasy ii major changes gameplay though several changes contents editorial adjustments exist english script january 1995 interview super play magazine translator ted woolsey explained certain level playfulness ... sexuality japanese games n't exist usa basically nintendo america rules guidelines consequently objectionable graphics e.g nudity censored building signs towns changed bar changed café well religious allusions e.g spell holy renamed pearl also direct allusions death killing actions violent expressions well offensive words replaced softer expressions example edgar locke terra flee chocobos figaro castle kefka orders two magitek armored soldiers chase shouting go kill japanese version translated go get also imperial troopers burn figaro castle edgar claims terra hidden inside castle kefka replies burn death japanese version replaced english version welcome barbecue similarly magitek soldiers watch edgar guests escape chocobos kefka swears japanese translated ted woolsey son submariner localization also featured changes several names tina changed terra finally dialogue text files shortened due limited data storage space available game cartridge read-only memory result additional changes rendered dialogue order compress available space playstation re-release featured minor changes english localization title game reverted final fantasy vi final fantasy iii unify numbering scheme series north america japan earlier release final fantasy vii item character names adjusted expansion fenix phoenix unlike playstation re-release final fantasy iv included later final fantasy chronicles compilation script left essentially unchanged game boy advance re-release featured new translation different translator tom slattery translation preserved character names location names terminology woolsey translation changed item spell names match conventions used recent titles series revised script preserved certain quirky lines original changing editing others cleared certain points confusion original translation wii virtual console release used final fantasy iii name snes game soundtrack final fantasy vi composed long-time series contributor nobuo uematsu score consists themes major character location well music standard battles fights boss enemies special cutscenes extensive use leitmotif one defining points audio tracks aria di mezzo carattere one latter tracks played cutscene involving opera performance track features unintelligible synthesized voice harmonizes melody technical limitations spc700 sound format chip prevented use actual vocal track although developers eventually figured overcome limitation years later orchestral album final fantasy vi grand finale features arranged version aria using italian lyrics performed svetla krasteva orchestral accompaniment version also found ending full motion video game sony playstation re-release lyrics different musical arrangement addition album orchestral game concert 4 includes extended version opera arranged conducted kōsuke onozaki performed tokyo symphony orchestra featuring wakako aokimi tetsuya ōno hiroshi kuroda vocals also performed friends concert gibson amphitheatre 2005 using new english translation lyrics album available dancing mad accompanying game final battle kefka 17 minutes long contains organ cadenza variations kefka theme ending theme combines every playable character theme one composition lasting 21 minutes original score released three compact discs japan final fantasy vi original sound version version album later released north america final fantasy iii kefka domain version album japanese counterpart except different packaging small differences translation track names album newer releases additionally final fantasy vi grand finale features eleven tracks game arranged shirō sagisu tsuneyoshi saito performed ensemble archi della scala orchestra sinfonica di milano milan symphony orchestra second arranged album features thirteen tracks game performed piano reiko nomura recently dancing mad final boss theme final fantasy vi performed play video game symphony stockholm sweden june 2 2007 group machinae supremacy nobuo uematsu former rock band black mages released progressive metal version dancing mad eponymous first album 2003 third album subtitled named premiere track rock opera version entire opera ffvi including aria di mezzo carattere performed etsuyo ota 2012 kickstarter campaign overclocked remix funded 153,633 creation multiple cd album remixes music final fantasy vi andrew aversa directed creation album balance ruin contains 74 tracks 74 artists unique style album free available overclocked remix website final fantasy vi ported sony playstation tose re-released square japan north america 1999 japan available part final fantasy collection north america available part final fantasy anthology europe sold fifty thousand limited-edition copies japanese version also released japan included final fantasy -themed alarm clock final fantasy vi playstation re-release similar original japanese release seen super famicom exception addition two full motion video opening ending sequences new screen-transition effects used start end battles graphics music sound left unchanged original version notable changes gameplay addition loading times present cartridge versions involve correction software bugs original addition new memo save feature allowing players quickly save progress playstation ram re-release included special features bestiary artwork gallery december 18 2012 port re-released part final fantasy 25th anniversary ultimate box japanese package final fantasy vi released psone classic japan april 20 2011 pal territories june 2 2011 released north america december 6 2011 final fantasy vi ported second time tose re-released final fantasy vi advance square enix japan november 30 2006 nintendo north america february 5 2007 europe july 6 2007 game boy advance last game boy advance game released asia includes additional gameplay features slightly better visuals new translation follows japanese naming conventions spells monsters however full-motion videos playstation version game four new espers re-release leviathan gilgamesh cactuar diabolos two new areas include dragons den dungeon includes kaiser dragon monster coded included original soul shrine place player fight monsters continuously three new spells also appear several bugs original fixed addition similarly handheld final fantasy re-releases bestiary music player included even japanese version music player english uses american names e.g strago stragus package features new artwork series veteran original character image designer yoshitaka amano original super famicom version released wii virtual console japan march 15 2011 pal territories europe australia march 18 2011 north america june 30 2011 game released west original north american title final fantasy iii super famicom version later released wii u virtual console japan december 22 2015 square enix released game boy advance version wii u virtual console japan nintendo re-released final fantasy vi worldwide september 2017 part company super nes/super famicom classic edition ports final fantasy vi android ios mobile operating systems announced 2013 mobile-optimized versions game released android january 15 2014 ios february 6 2014 mobile-adapted controls save features redrawn slightly blurry graphics windows pc port port android version released windows pc via steam december 16 2015 steam release featured controls optimized pc steam achievements trading cards final fantasy vi received critical acclaim commercially successful japan upon release mid-1994 square publicity department reported game sold 2.55 million copies japan united states went sale last quarter 1994 became year eighth best-selling snes cartridge despite commercial success region according sakaguchi march 31 2003 game shipped 3.48 million copies worldwide 2.62 million copies shipped japan 860,000 abroad final fantasy collection sold 400,000 copies 1999 making 31st-best-selling release year japan final fantasy anthology sold approximately 364,000 copies north america final fantasy vi advance sold 223,000 copies japan end 2006 one month release gamepro rated 5 5 stating characters plotlines multiple-choice scenarios combine form one fantastic game four reviewers electronic gaming monthly granted unanimous score 9 10 game month award commenting set new standard excellence rpgs particularly praised graphics music strong emotional involvement story several awards electronic gaming monthly 1994 video game awards including best role-playing game best japanese role-playing game best music cartridge-based game additionally later ranked game ninth 1997 list 100 greatest console games time famitsu scored 37 40 making one two highest-rated games 1994 along ridge racer part nintendo power declared game rpg hit decade noting improved sound graphics predecessors game broadened thematic scope moreover suggested much story variation play ... fans may become lost world months time nintendo power also opined game plot particularly inventive story often sappy–not written american audience 1997 nintendo power ranked eighth greatest nintendo game saying everything could want—heroes world-shattering events magic mindless evil—plus interceptor wonder dog 1996 next generation said scene terra cares village orphaned children perhaps safely named series finest hour ... game series tackled big issues reached level emotional depth complexity 2010 nintendo power listed ending final fantasy vi one best finales citing great character moments cement memorable final fantasy protagonists ever also listed opera scene demonstration touching emotional role-playing games release playstation version gamepro electronic gaming monthly rated 4 5 9.5 10 respectively final fantasy collection received 54 60 points weekly famitsu scored panel six reviewers 1999 ign described graphics playstation re-release beautiful stunning reflecting time release final fantasy iii ... represented everything rpg inspiring statistic growth systems would later influence titles like wild arms suikoden moreover praised gameplay storyline claiming aspects took ... preceding rpg concepts either came something completely new refined enough make creating atmosphere players wo n't find difficult get past simplistic graphics seemingly out-dated gameplay conventions become involved rpgamer gave perfect rating original game playstation re-release citing gameplay self-explanatory enough player could pick game customize characters equipment praising music 16-bit masterpiece alternatively describe game sound effects limited game lacking replay value due one ending one fundamental path plot ... mandatory sidequests additionally regarded game english translation unremarkable better worse others offered similar comments gameplay difficulty however referred game storyline unique aspect citing large cast characters nearly receive great deal development surprisingly large number real world issues vast majority addressed rpg since ranging teen pregnancy suicide overall rpgamer regarded game epic masterpiece truly one greatest games ever created game release game boy advance also garnered praise 2007 game boy advance re-release named eighth best game boy advance game time ign feature reflecting game boy advance long lifespan final fantasy vi often regarded one best titles series one best role-playing video games ever created 2005 ign placed final fantasy vi 56th list 100 greatest games second highest ranked final fantasy title list final fantasy iv 2006 nintendo power ranked 13th top 200 game nintendo platform suggesting might best final fantasy ever year readers japanese magazine famitsu voted 25th best game time 2008 final fantasy vi took 1 spot g4 tv top must rpgs list year screwattack named final fantasy vi third best snes game beaten super metroid 2009 final fantasy vi inducted ign videogame hall fame becoming second final fantasy game final fantasy original final fantasy 2012 also ign put final fantasy vi number one list top role-playing video games stating many moments final fantasy vi worthy celebration name biggs wedge leading terra snow poisoning doma sandy boots destruction world tragic opera ultros hold close hearts even including espers poignant character themes series date cheers final fantasy vi may name follow us tumble towards future art entertainment narrative everything keeps us gaming updated version top 100 list 2007 ign ranked final fantasy vi ninth top game time final fantasy games series continued cite game character development especially noted kefka one memorable bad guys rpg history 2009 game informer put snes version final fantasy iii eighth list top games time opining perfected 2d role-playing game fell seventh-place ranking staff gave 2001 2012 staff gamesradar ranked ninth best snes game stating remain effective moving long 1994 release means true work art demands sit high atop list regardless platform already name 14th best game time 2017 staff ign ranked second best rpg game time stating willingness explore heavy themes unthinkable outcomes — made poignant set dramatic set pieces soaring score — one biggest reasons squaresoft ’ 1994 magnum opus special final fantasy vi interactive cg game also known final fantasy sgi demo final fantasy x related actual 10th game final fantasy series final fantasy x short game demo produced square using characters settings final fantasy vi produced using new silicon graphics inc. sgi onyx workstations acquired square demo square first foray 3d graphics many assumed precursor new final fantasy title nintendo 64 video game console also used sgi hardware square however yet committed nintendo console time demo production much technology demonstrated demo later put use rendering fmv sequences final fantasy vii subsequent games playstation demo featured terra branford locke cole shadow series battles game controlled largely mouse gestures example moving cursor shape star would summon dragon attack april 27 2010 square enix producer shinji hashimoto stated development remake final fantasy vi nintendo ds undecided due technical issues later however square discussed remaking vi well v nintendo 3ds 2015 tetsuya nomura director final fantasy vii remake expressed interest remaking final fantasy v vi final fantasy vi included super nes classic edition listed final fantasy iii north american european release september 29 2017 | [
5762,
10051,
6797,
2383,
5436
] | None |
7,167 | 3 | Joe_Blade:joe blade joe blade title series budget-price platform games written colin swinbourne published players three titles flick-screen adventures player controls title character number rooms dispatching enemies rescuing innocent people manner varies three games first joe blade title portrayed blade lone commando sent evil mastermind complex release number diplomats one earliest video games placed index germany due accusations glorified war villains resembled ss troopers game still legally obtainable effectively banned game distribution technologies internet available time german publications permitted advertise titles joe blade 2 took rather different approach first game instead soldier blade time vigilante taking city rid streets criminals rescuing old-age pensioners along way blade longer armed gun jump villains touching feet dispatch almost surreal take game stark contrast comparatively gritty realism first installment game also known considerably easier first title almost point many players managed complete game one hour-long sitting spectrum version game featured version invade-a-load featuring pac man joe blade 3 returned first title formula arming blade machine gun exclusively released zx spectrum amstrad cpc included commodore 64 instructions inlay commodore 64 version ever released 1991 players game prison riot plays similarly joe blade titles hacked version identifies joe blade 4 distributed internet | [
9006
] | Validation |
7,168 | 1 | ER/Studio:er/studio er/studio data architecture database design software developed embarcadero technologies er/studio compatible multiple database platforms used data architects data modelers database administrators business analysts create manage database designs document reuse data assets 2015 embarcaero technologies acquired database infrastructure management software company idera inc since acquisition idera inc. er/studio renamed er/studio data architect updated features | [
8808,
479
] | Train |
7,169 | 9 | MIMIC:mimic mimic known capitalized form former simulation computer language developed 1964 h. e. petersen f. j. sansom l. m. warshawsky systems engineering group within air force materiel command wright-patterson afb dayton ohio united states expression-oriented continuous block simulation language capable incorporating blocks fortran-like algebra mimic development midas modified integration digital analog simulator represented analog computer design written completely fortran one routine compass ran control data supercomputers mimic capable solving much larger simulation models mimic ordinary differential equations describing mathematical models several scientific disciplines engineering physics chemistry biology economics well social sciences easily solved numerical integration results analysis listed drawn diagrams also enables analysis nonlinear dynamic conditions mimic software package written fortran overlay programs executes input statements mathematical model six consecutive passes simulation programs written mimic compiled rather interpreted core simulation package variable step numerical integrator fourth-order runge-kutta method many useful functions related electrical circuit elements exist besides mathematical functions found scientific programming languages need sort statements order dependencies variables since mimic internally parts software organized overlays consider predator-prey model field marine biology determine dynamics fish shark populations simple model choose lotka–volterra equation constants given tutorial wlth initial conditions problem constants given | [
1480,
9385,
7421
] | None |
7,170 | 3 | ARM7:arm7 arm7 group older 32-bit risc arm processor cores licensed arm holdings microcontroller use arm7 core family consists arm700 arm710 arm7di arm710a arm720t arm740t arm710t arm7tdmi arm7tdmi-s arm7ej-s arm7tdmi arm7tdmi-s popular cores family since arm7 cores released 1993 2001 longer recommended new ic designs instead arm cortex-m arm cortex-r cores preferred generation introduced thumb 16-bit instruction set providing improved code density compared previous designs widely used arm7 designs implement armv4t architecture implement armv3 armv5tej arm7tdmi 37 registers 31 gpr 6 spr designs use von neumann architecture thus versions containing cache separate data instruction caches arm7 cores obsolete one historically significant model arm7di notable introduced jtag based on-chip debugging preceding arm6 cores support represented jtag tap debugging denoted icebreaker debug module supporting hardware breakpoints watchpoints letting system stalled debugging subsequent cores included enhanced support versatile processor designed mobile devices low power electronics processor architecture capable 130 mips typical 0.13 µm process arm7tdmi processor core implements arm architecture v4t processor supports 32-bit 16-bit instructions via arm thumb instruction sets arm licenses processor various semiconductor companies design full chips based arm processor architecture arm holdings neither manufactures sells cpu devices based designs rather licenses processor architecture interested parties arm offers variety licensing terms varying cost deliverables licensees arm provides integratable hardware description arm core well complete software development toolset right sell manufactured silicon containing arm cpu integrated device manufacturers idm receive arm processor ip synthesizable rtl written verilog form ability perform architectural level optimizations extensions allows manufacturer achieve custom design goals higher clock speed low power consumption instruction set extensions optimizations size debug support etc determine components included particular arm cpu chip consult manufacturer datasheet related documentation original arm7 based earlier arm6 design used armv3 instruction set arm710 variant used cpu module acorn risc pc first arm based system chip designs arm7100 arm7500 used core arm7tdmi arm7 16 bit thumb jtag debug fast multiplier enhanced ice processor implements armv4 instruction set licensed manufacture array semiconductor companies 2009 one widely used arm cores found numerous deeply embedded system designs texas instruments licensed arm7tdmi designed nokia 6110 arm7tdmi-s variant synthesizable core arm7ej-s arm7 enhanced jazelle synthesizable version arm7 implementing armv5te instruction set originally introduced powerful arm9e core | [
11395,
3467,
11405,
398,
10767,
2704,
8720,
1170,
659,
5267,
7445,
9366,
5785,
666,
5786,
4508,
9371,
10784,
2979,
4773,
38,
6949,
6950,
8487,
682,
4139,
9638,
8237,
2862,
9391,
2224,
11054,
11314,
10548,
823,
11447,
1849,
8250,
6971,
991... | None |
7,171 | 2 | Apple_Color_Emoji:apple color emoji apple color emoji color typeface used apple platforms ios macos display emoji characters inclusion emoji iphone unicode standard credited promoting spreading use emoji outside japan many apple icons past present feature design based deep saturated colors gradual transitions color often incorporating subtle gloss effects first version apple color emoji released alongside iphone os 2.2 november 2008 contained 471 individual emoji glyphs originally limited japanese iphone models restriction later lifted designers first apple color emoji typeface raymond sepulveda angela guzman ollie wagner due iphone originally launching japan softbank network apple emoji designs may created resemble softbank phones example 💃 defined unicode 'dancer specified gender feminine apple softbank phones previously masculine gender-neutral others years 2011—2018 apple color emoji font expanded 471 2,776 emoji october 2018 updated emoji keyboard released ios version 8.3 update also added varied skin tones same-gender couples included unicode 6 result human emoji faces switched neutral yellow skin tone default similar smiley emoji majority apple color emoji designs updated release ios 10.2 december 2016 many appearing 3d-rendered according apple vice president user interface design alan dye emoji redesigns due advent animoji memoji higher resolution screens 157 new emoji added ios october 2018 designers apple color emoji typeface versions initial release publicly credited following apple standard practice crediting work individuals former apple employees offered accounts created various designs prior ios 5 softbank encoding used encoding emoji apple devices beginning ios 5 emoji encoded using unicode standard emoji glyphs stored png images several resolutions strikes 20 32 40 48 64 96 160 pixels squared using proprietary sbix table later standardized opentype version 1.8 font contains number easter eggs several glyphs contain portions text apple think different advertisement crazy ones ... including 1f4cb clipboard 📋 1f4c4 page facing 📄 1f4d1 bookmark tabs 📑 1f4d6 open book 📖 among others emoji specified generic objects appear apple products example 1f4bb personal computer 💻 appears modern macbook 231a wristwatch ⌚ shows apple watch 1f301 foggy 🌁 shows golden gate bridge behind san francisco fog reference apple california headquarters 1f4f0 newspaper 📰 headline reads apple times variety styles used original sets example 🐬 🐙 dolphin octopus quite stylized 'button eyes 🐈 🐀 cat rat realistic resembling watercolor paintings mixture styles creates range possible designs example 🐏 🐑 ram sheep look clearly different 🐫 🐪 bactrian camel dromedary calendar emoji 📅 showing july 17 date chosen annual world emoji day date originally referred day apple premiered ical calendar application 2002 although primarily intended onscreen display ios limited printing capabilities printed displays signs used apple color emoji designs new york magazine used apple color emoji printed feature growing use emoji | [
10432,
9539,
9732,
166,
9912,
8701
] | Test |
7,172 | 9 | ChucK:chuck chuck concurrent strongly timed audio programming language real-time synthesis composition performance runs linux mac os x microsoft windows ios designed favor readability flexibility programmer considerations raw performance natively supports deterministic concurrency multiple simultaneous dynamic control rates another key feature ability live code adding removing modifying code fly program running without stopping restarting highly precise timing/concurrency model allowing arbitrarily fine granularity offers composers researchers powerful flexible programming tool building experimenting complex audio synthesis programs real-time interactive control chuck created chiefly designed ge wang graduate student working perry r. cook chuck distributed freely terms gnu general public license mac os x linux microsoft windows iphone ipad chip chuck iphone distributed limited closed source license currently licensed public however core team stated would like explore ways open chip creating beneficial environment everyone chuck programming language loosely c-like object-oriented language strong static typing chuck distinguished following characteristics chuck standard libraries provide following simple chuck program generates sound music chuck used performances princeton laptop orchestra plork developing smule applications including ocarina emulator plork organizers attribute uniqueness performances live coding perform chuck | [
9345,
8964,
6797,
7571,
6933,
6810,
5037,
7983,
5680,
823,
9783,
10819,
8262,
3665,
7128,
7769,
9565,
7550,
5612,
7535,
9210,
8958
] | None |
7,173 | 3 | Microcode:microcode microcode computer hardware technique interposes layer organisation cpu hardware programmer-visible instruction set architecture computer microcode layer hardware-level instructions implement higher-level machine code instructions internal state machine sequencing many digital processing elements microcode used general-purpose central processing units although current desktop cpus fallback path cases faster hardwired control unit handle microcode typically resides special high-speed memory translates machine instructions state machine data input sequences detailed circuit-level operations separates machine instructions underlying electronics instructions designed altered freely also facilitates building complex multi-step instructions reducing complexity computer circuits writing microcode often called microprogramming microcode particular processor implementation sometimes called microprogram extensive microcoding allows small simple microarchitectures emulate powerful architectures wider word length execution units relatively simple way achieve software compatibility different products processor family hardware vendors especially ibm use term microcode synonym firmware way code within device termed microcode regardless microcode machine code example hard disk drives said microcode updated though typically contain microcode firmware lowest layer computer software stack traditionally raw binary machine code instructions processor microcode sits one level avoid confusion microprogram-related element differentiated micro prefix microinstruction microassembler microprogrammer microarchitecture etc engineers normally write microcode design phase processor storing read-only memory rom programmable logic array pla structure combination however machines also exist microcode stored sram flash memory traditionally denoted writeable control store context computers either read-only read-write memory latter case cpu initialization process loads microcode control store another storage medium possibility altering microcode correct bugs instruction set implement new machine instructions complex digital processors may also employ one possibly microcode-based control unit order delegate sub-tasks must performed essentially asynchronously parallel high-level programmer even assembly programmer normally see change microcode unlike machine code often retains backward compatibility among different processors family microcode runs exact electronic circuitry designed constitutes inherent part particular processor design microprograms consist series microinstructions control cpu fundamental level hardware circuitry example single typical horizontal microinstruction might specify following operations simultaneously control processor features one cycle microinstruction often wider 50 bits e.g. 128 bits 360/85 emulator feature microprograms carefully designed optimized fastest possible execution slow microprogram would result slow machine instruction degraded performance related application programs use instructions microcode originally developed simpler method developing control logic computer initially cpu instruction sets hardwired step needed fetch decode execute machine instructions including operand address calculations reads writes controlled directly combinational logic rather minimal sequential state machine circuitry efficient need powerful instruction sets multi-step addressing complex operations see made hard-wired processors difficult design debug highly encoded varied-length instructions contribute well especially irregular encodings used microcode simplified job allowing much processor behaviour programming model defined via microprogram routines rather dedicated circuitry even late design process microcode could easily changed whereas hard-wired cpu designs cumbersome change thus greatly facilitated cpu design 1940s late 1970s large portion programming done assembly language higher-level instructions mean greater programmer productivity important advantage microcode relative ease powerful machine instructions defined ultimate extension directly executable high level language designs statement high-level language pl/i entirely directly executed microcode without compilation ibm future systems project data general fountainhead processor examples 1970s cpu speeds grew quickly memory speeds numerous techniques memory block transfer memory pre-fetch multi-level caches used alleviate high-level machine instructions made possible microcode helped fewer complex machine instructions require less memory bandwidth example operation character string done single machine instruction thus avoiding multiple instruction fetches architectures instruction sets implemented complex microprograms included ibm system/360 digital equipment corporation vax approach increasingly complex microcode-implemented instruction sets later called cisc alternate approach used many microprocessors use plas roms instead combinational logic mainly instruction decoding let simple state machine without much microcode sequencing mos technology 6502 example microprocessor using pla instruction decode sequencing pla visible photomicrographs chip operation seen transistor-level simulation microprogramming still used modern cpu designs cases microcode debugged simulation logic functions substituted control store logic functions often faster less expensive equivalent microprogram memory processor microprograms operate primitive totally different much hardware-oriented architecture assembly instructions visible normal programmers coordination hardware microcode implements programmer-visible architecture underlying hardware need fixed relationship visible architecture makes easier implement given instruction set architecture wide variety underlying hardware micro-architectures ibm system/360 32-bit architecture 16 general-purpose registers system/360 implementations actually use hardware implemented much simpler underlying microarchitecture example system/360 model 30 8-bit data paths arithmetic logic unit alu main memory implemented general-purpose registers special unit higher-speed core memory system/360 model 40 8-bit data paths alu 16-bit data paths main memory also implemented general-purpose registers special unit higher-speed core memory model 50 full 32-bit data paths implements general-purpose registers special unit higher-speed core memory model 65 model 195 larger data paths implement general-purpose registers faster transistor circuits way microprogramming enabled ibm design many system/360 models substantially different hardware spanning wide range cost performance making architecturally compatible dramatically reduces number unique system software programs must written model similar approach used digital equipment corporation dec vax family computers result different vax processors use different microarchitectures yet programmer-visible architecture change microprogramming also reduces cost field changes correct defects bugs processor bug often fixed replacing portion microprogram rather changes made hardware logic wiring 1947 design mit whirlwind introduced concept control store way simplify computer design move beyond ad hoc methods control store diode matrix two-dimensional lattice one dimension accepts control time pulses cpu internal clock connects control signals gates circuits pulse distributor takes pulses generated cpu clock breaks eight separate time pulses activates different row lattice row activated activates control signals connected described another way signals transmitted control store played much like player piano roll controlled sequence wide words constructed bits played sequentially control store however song short repeated continuously 1951 maurice wilkes enhanced concept adding conditional execution concept akin conditional computer software initial implementation consisted pair matrices first one generated signals manner whirlwind control store second matrix selected row signals microprogram instruction word speak invoke next cycle conditionals implemented providing way single line control store could choose alternatives second matrix made control signals conditional detected internal signal wilkes coined term microprogramming describe feature distinguish simple control store microinstruction microprogram provides bits control functional elements internally compose cpu advantage hard-wired cpu internal cpu control becomes specialized form computer program microcode thus transforms complex electronic design challenge control cpu less complex programming challenge take advantage cpu divided several parts may also memory address register memory data register used access main computer storage together elements form execution unit modern cpus several execution units even simple computers usually one unit read write memory another execute user code elements could often brought together single chip chip comes fixed width would form slice execution unit known bit slice chips amd am2900 family one best known examples bit slice elements parts execution units execution units interconnected bundle wires called bus programmers develop microprograms using basic software tools microassembler allows programmer define table bits symbolically close relationship underlying architecture microcode several properties make difficult generate using compiler simulator program intended execute bits way electronics allows much freedom debug microprogram microprogram finalized extensively tested sometimes used input computer program constructs logic produce data program similar used optimize programmable logic array even without fully optimal logic heuristically optimized logic vastly reduce number transistors number required rom control store reduces cost producing electricity consumed cpu microcode characterized horizontal vertical referring primarily whether microinstruction controls cpu elements little decoding horizontal microcode requires extensive decoding combinatorial logic vertical microcode consequently horizontal microinstruction wider contains bits occupies storage space vertical microinstruction horizontal microcode several discrete micro-operations combined single microinstruction simultaneous operation horizontal microcode typically contained fairly wide control store uncommon word 108 bits tick sequencer clock microcode word read decoded used control functional elements make cpu typical implementation horizontal microprogram word comprises fairly tightly defined groups bits example one simple arrangement might type micromachine implement jump instruction address following opcode microcode might require two clock ticks engineer designing would write microassembler source code looking something like tick common find portions cpu used remaining groups bits microinstruction no-ops careful design hardware microcode property exploited parallelise operations use different areas cpu example case alu required first tick could potentially used complete earlier arithmetic instruction vertical microcode microinstruction significantly encoded bit fields generally pass intermediate combinatory logic turn generates actual control sequencing signals internal cpu elements alu registers etc. contrast horizontal microcode bit fields either directly produce control sequencing signals minimally encoded consequently vertical microcode requires smaller instruction lengths less storage requires time decode resulting slower cpu clock vertical microcode assembly language simple conventional computer emulating complex computer processors dec alpha processors cmos microprocessors later ibm system/390 mainframes z/architecture mainframes palcode term used alpha processors millicode term used ibm mainframe microprocessors form machine code access special registers hardware resources available regular machine code used implement instructions functions page table walks alpha processors another form vertical microcode two fields field select selects part cpu controlled word control store field value actually controls part cpu type microcode designer explicitly chooses make slower cpu save money reducing unused bits control store however reduced complexity may increase cpu clock frequency lessens effect increased number cycles per instruction transistors became cheaper horizontal microcode came dominate design cpus using microcode vertical microcode used less often vertical horizontal microcode used horizontal microcode may referred nanocode picocode computers built using writable microcode design rather storing microcode rom hard-wired logic microcode stored ram called writable control store wcs computer sometimes called writable instruction set computer wisc many experimental prototype computers use writable control stores also commercial machines use writable microcode burroughs small systems early xerox workstations dec vax 8800 nautilus family symbolics l- g-machines number ibm system/360 system/370 implementations dec pdp-10 machines data general eclipse mv/8000 many machines offer user-programmable writable control stores option including hp 2100 dec pdp-11/60 varian data machines v-70 series minicomputers ibm system/370 includes facility called initial-microprogram load iml impl invoked console part power-on reset por another processor tightly coupled multiprocessor complex commercial machines example ibm 360/85 read-only storage writable control store microcode wcs offers several advantages including ease patching microprogram certain hardware generations faster access roms provide user-programmable wcs allows user optimize machine specific purposes starting pentium pro 1995 several x86 cpus writable intel microcode example allowed bugs intel core 2 intel xeon microcodes fixed patching microprograms rather requiring entire chips replaced second prominent example set microcode patches intel offered processor architectures 10 years age bid counter security vulnerabilities discovered designs spectre meltdown went public start 2018 microcode update installed linux freebsd microsoft windows motherboard bios design trend toward heavily microcoded processors complex instructions began early 1960s continued roughly mid-1980s point risc design philosophy started becoming prominent cpu uses microcode generally takes several clock cycles execute single instruction one clock cycle step microprogram instruction cisc processors include instructions take long time execute variations interfere interrupt latency far important modern systems pipelining designing new processor hardwired control risc following advantages microcoded cisc counterpoints well many risc vliw processors designed execute every instruction long cache single cycle similar way cpus microcode execute one microinstruction per cycle vliw processors instructions behave similarly wide horizontal microcode although typically without fine-grained control hardware provided microcode risc instructions sometimes similar narrow vertical microcode microcoding popular application-specific processors network processors microcontrollers digital signal processors channel controllers disk controllers network interface controllers graphics processing units hardware modern cisc implementations x86 family decode instructions dynamically buffered micro-operations μops instruction encoding similar risc traditional microcode hardwired instruction decode unit directly emits μops common x86 instructions falls back traditional microcode rom complex rarely used instructions example x86 might look μops microcode handle complex multistep operations loop string instructions floating point unit transcendental functions unusual values denormal numbers special purpose instructions cpuid | [
4098,
9739,
4112,
2066,
7699,
5655,
10779,
10781,
5154,
6181,
8231,
3630,
6705,
7218,
2623,
2113,
7234,
1606,
3142,
10316,
2638,
6742,
7263,
1122,
7269,
3175,
8301,
8815,
7281,
9330,
630,
8822,
6268,
3197,
4742,
7305,
7313,
8851,
2201,
68... | Test |
7,174 | 4 | Kill_chain:kill chain term kill chain originally used military concept related structure attack consisting target identification force dispatch target decision order attack target finally destruction target conversely idea breaking opponent kill chain method defense preemptive action recently lockheed martin adapted concept information security using method modeling intrusions computer network cyber kill chain model seen adoption information security community however acceptance universal critics pointing believe fundamental flaws model one military kill chain model f2t2ea includes following phases integrated end-to-end process described chain interruption stage interrupt entire process four fs military term used united states military especially world war ii designed easy remember four fs follows new american military contingency plan called kill chain reportedly first step new strategy use satellite imagery identify north korean launch sites nuclear facilities manufacturing capability destroy pre-emptively conflict seems imminent plan mentioned joint statement united states south korea computer scientists lockheed-martin corporation described new intrusion kill chain framework model defend computer networks 2011 wrote attacks may occur phases disrupted controls established phase since cyber kill chain™ adopted data security organizations define phases cyber-attacks cyber kill chain reveals phases cyber attack early reconnaissance goal data exfiltration kill chain also used management tool help continuously improve network defense according lockheed martin threats must progress several phases model including defensive courses action taken phases u.s. senate investigation 2013 target corporation data breach included analysis based lockheed-martin kill chain framework identified several stages controls prevent detect progression attack among critiques lockheed martin cyber kill chain model threat assessment prevention tool first phases happen outside defended network making difficult identify defend actions phases similarly methodology said reinforce traditional perimeter-based malware-prevention based defensive strategies others noted traditional cyber kill chain n't suitable model insider threat particularly troublesome given likelihood successful attacks breach internal network perimeter organizations need develop strategy dealing attackers inside firewall need think every attacker potential insider ” unified version kill chain developed overcome common critiques traditional cyber kill chain uniting extending lockheed martin ’ kill chain mitre ’ att ck framework unified kill chain ordered arrangement 18 unique attack phases may occur end-to-end cyber attacks covers activities occur outside within defended network unified kill chain improves scope limitations traditional kill chain time-agnostic nature tactics mitre ’ att ck unified model used analyze compare defend end-to-end cyber attacks advanced persistent threats apts | [
4689,
5373,
2558
] | Validation |
7,175 | 7 | Multitier_architecture:multitier architecture software engineering multitier architecture often referred n -tier architecture multilayered architecture client–server architecture presentation application processing data management functions physically separated widespread use multitier architecture three-tier architecture n -tier application architecture provides model developers create flexible reusable applications segregating application tiers developers acquire option modifying adding specific layer instead reworking entire application three-tier architecture typically composed presentation tier domain logic tier data storage tier concepts layer tier often used interchangeably one fairly common point view indeed difference view holds layer logical structuring mechanism elements make software solution tier physical structuring mechanism system infrastructure example three-layer solution could easily deployed single tier personal workstation layers architectural pattern described various publications logical multilayered architecture information system object-oriented design following four common book domain driven design describes common uses four layers although primary focus domain layer application architecture explicit distinction business layer presentation layer i.e. presentation layer considered part business layer traditional client-server two-tier model implemented usual convention application layer service layer considered sublayer business layer typically encapsulating api definition surfacing supported business functionality application/business layers fact subdivided emphasize additional sublayers distinct responsibility example model–view–presenter pattern used presenter sublayer might used additional layer user interface layer business/application layer represented model sublayer also identify separate layer called business infrastructure layer bi located business layer infrastructure layer also sometimes called low-level business layer business services layer layer general used several application tiers e.g currencyconverter infrastructure layer partitioned different levels high-level low-level technical services developers often focus persistence data access capabilities infrastructure layer therefore talk persistence layer data access layer instead infrastructure layer technical services layer words kind technical services always explicitly thought part particular layer layer top another depends every layer exist without layers requires layers function another common view layers always strictly depend adjacent layer example relaxed layered system opposed strict layered system layer also depend layers three-tier architecture client-server software architecture pattern user interface presentation functional process logic business rules computer data storage data access developed maintained independent modules often separate platforms developed john j. donovan open environment corporation oec tools company founded cambridge massachusetts apart usual advantages modular software well-defined interfaces three-tier architecture intended allow three tiers upgraded replaced independently response changes requirements technology example change operating system presentation tier would affect user interface code typically user interface runs desktop pc workstation uses standard graphical user interface functional process logic may consist one separate modules running workstation application server rdbms database server mainframe contains computer data storage logic middle tier may multitiered case overall architecture called n -tier architecture web development field three-tier often used refer websites commonly electronic commerce websites built using three tiers data transfer tiers part architecture protocols involved may include one snmp corba java rmi .net remoting windows communication foundation sockets udp web services standard proprietary protocols often middleware used connect separate tiers separate tiers often necessarily run separate physical servers tier may run cluster end-to-end traceability data flows n -tier systems challenging task becomes important systems increase complexity application response measurement defines concepts apis measuring performance correlating transactions tiers generally term tiers used describe physical distribution components system separate servers computers networks processing nodes three-tier architecture three processing nodes term layers refers logical grouping components may may physically located one processing node | [
1280,
6403,
1801,
4233,
4107,
5257,
5772,
9225,
1808,
3733,
3990,
10518,
2456,
11413,
7708,
5537,
2596,
7461,
8100,
10020,
5034,
2603,
10925,
2222,
7983,
8751,
3388,
3133,
7100,
8640,
333,
11343,
337,
4817,
2901,
10581,
2011,
862,
734,
89... | Test |
7,176 | 9 | Java_3D:java 3d java 3d scene graph-based 3d application programming interface api java platform runs top either opengl direct3d version 1.6.0 runs top java opengl jogl since version 1.2 java 3d developed java community process java 3d scene graph directed acyclic graph dag compared solutions java 3d wrapper around graphics apis interface encapsulates graphics programming using true object-oriented approach scene constructed using scene graph representation objects shown scene graph structured tree containing several elements necessary display objects additionally java 3d offers extensive spatialized sound support java 3d documentation available download separately part java development kit jdk intel silicon graphics apple sun retained mode scene graph apis development 1996 since wanted make java version decided collaborate making project became java 3d development underway already 1997 public beta version released march 1998 first version released december 1998 mid-2003 summer 2004 development java 3d discontinued summer 2004 java 3d released community source project sun volunteers since continuing development january 29 2008 announced improvements java 3d would put hold produce 3d scene graph javafx javafx 3d support eventually released java 8 javafx 3d graphics functionality less come supersede java 3d since february 28 2008 entire java 3d source code released gpl version 2 license gpl linking exception since february 10 2012 java 3d uses jogl 2.0 hardware accelerated opengl rendering port initiated julien gouesse java 3d high-level api option render 3d java part due pause development 2003 2004 several competing java scene graph technologies emerged general purpose gaming visualization addition many c c++ scene graph apis offer java support jni lower level jogl jsr 231 opengl bindings java popular alternative scene graph apis java 3d lwjgl another binding | [
4358,
910,
10526,
5031,
5677,
7983,
6074,
10683,
5567,
9665,
10051,
6860,
3920,
4960,
2658,
3560,
3561,
3562,
5612,
5872,
9078,
3705,
6143
] | Test |
7,177 | 9 | XML_Object_Model:xml object model xom xml document object model processing xml java strives correctness simplicity | [
5677,
479
] | None |
7,178 | 7 | Artmotion:artmotion artmotion ltd. swiss based data housing provider operates two data centers near swiss alps designed security-seeking businesses favored country political neutrality ironclad privacy laws artmotion founded 2000 mateo meier also current ceo company 2003 artmotion acquired cyberhost swiss cloud hosting services provider 2004 became ltd. company since 2011 swiss datacenter provider everyware ltd. holds 25 percent artmotion shares artmotion increased capital 2015 2013 prism leak several cloud computing companies faced criticism lack security especially based us artmotion among swiss-based cloud computing providers gained scandal mostly due country stringent data privacy laws customer base increased company revenue 45 percent month following scandal according ceo mateo meier except european countries like luxembourg switzerland personal privacy difficult service modern world switzerland member european union hence exempt pan-european agreements share data member states well united states | [
6344
] | None |
7,179 | 8 | XMLVend:xmlvend xmlvend south african developed open interface standard facilitates sale prepaid electricity credit electricity utilities clients application web services facilitate trade various types devices utility prepayment vending server standard already introduced used prepaid water | [
10020,
119
] | None |
7,180 | 1 | Schema_matching:schema matching terms schema matching mapping often used interchangeably database process article differentiate two follows schema matching process identifying two objects semantically related scope article mapping refers transformations objects example two schemas db1.student name ssn level major marks db2.grad-student name id major grades possible matches would db1.student ≈ db2.grad-student db1.ssn db2.id etc possible transformations mappings would db1.marks db2.grades 100-90 90-80 b etc. automating two approaches one fundamental tasks data integration general possible determine fully automatically different correspondences two schemas — primarily differing often explicated documented semantics two schemas among others common challenges automating matching mapping previously classified especially relational db schemas – fairly comprehensive list heterogeneity limited relational model recognizing schematic vs semantic differences/heterogeneity heterogeneities exist schemas use different representations definitions represent information schema conflicts different expressions units precision result conflicting representations data data conflicts research schema matching seeks provide automated support process finding semantic matches two schemas process made harder due heterogeneities following levels discusses generic methodology task schema integration activities involved according authors one view integration approaches schema integration broadly classified ones exploit either schema information schema instance level information schema-level matchers consider schema information instance data available information includes usual properties schema elements name description data type relationship types part-of is-a etc constraints schema structure working element atomic elements like attributes objects structure level matching combinations elements appear together structure properties used identify matching elements two schemas language-based linguistic matchers use names text i.e. words sentences find semantically similar schema elements constraint based matchers exploit constraints often contained schemas constraints used define data types value ranges uniqueness optionality relationship types cardinalities etc constraints two input schemas matched determine similarity schema elements instance-level matchers use instance-level data gather important insight contents meaning schema elements typically used addition schema level matches order boost confidence match results information available schema level insufficient matchers level use linguistic constraint based characterization instances example using linguistic techniques might possible look dept deptname empname instances conclude deptname better match candidate dept empname constraints like zipcodes must 5 digits long format phone numbers may allow matching types instance data hybrid matchers directly combine several matching approaches determine match candidates based multiple criteria information sources techniques also employ additional information dictionaries thesauri user-provided match mismatch information reusing matching information another initiative re-use previous matching information auxiliary information future matching tasks motivation work structures substructures often repeat example schemas e-commerce domain reuse previous matches however needs careful choice possible reuse makes sense part new schema domains example salary income may considered identical payroll application tax reporting application several open ended challenges reuse deserves work sample prototypes typically implementation matching techniques classified either rule based learner based systems complementary nature different approaches instigated number applications using combination techniques depending nature domain application consideration relationship types objects identified end matching process typically set semantics overlap disjointness exclusion equivalence subsumption logical encodings relationships mean among others early attempt use description logics schema integration identifying relationships presented several state art matching tools today benchmarked ontology alignment evaluation initiative capable identifying many simple 1:1 1 n n:1 element level matches complex matches n:1 n element structure level matches objects quality schema matching commonly measure precision recall precision measures number correctly matched pairs pairs matched recall measures many actual pairs matched | [
10795,
3146,
8979,
2901
] | Train |
7,181 | 2 | Apper:apper apper originally named kpackagekit free open source linux front-end application packagekit package management service kde apper also one main difference compared old kpackagekit apper list applications instead listing packages makes much user-friendly allows user search install applications without added complexity dealing packages dependencies besides installation new applications also allows easy removal updates compared ubuntu software center well appstream project apper adopted distributions fedora debian opensuse 12.1 | [
11525,
2310,
10760,
2955,
7435,
7947,
2448,
1813,
6680,
8476,
5670,
4775,
6694,
7847,
6828,
8621,
6446,
7983,
1842,
823,
2872,
6583,
3131,
10172,
3649,
10817,
9671,
5067,
3407,
6991,
6227,
4951,
7384,
2010,
9564,
7140,
5096,
9324,
7920,
6... | Test |
7,182 | 2 | Transformers_G1:_Awakening:transformers g1 awakening transformers g1 awakening turn-based tactics mobile game transformers franchise developed published glu mobile originally released feature phones november 12 2008 ported ios 2010 game redrawn applestore due licence reasons transformers g1 awakening announced botcon 2008 worldwide release set fall year second transformers game glu mobile released platform game mobile phones based michael bay 2007 live-action transformers film next transformers film would released 2009 glu decided maximize licensing agreement producing game n't tied major release unlike film adaptations awakening planned turn-based tactics game role-playing elements story set early days 1980s animated series interview fan site tformers.com glu mobile emea studio head chris white awakening product manager martin edelman explained desire make game based admiration well marvel comics series compared game advance wars series explained differed units expendable cannon fodder instead unit unique character franchise individual strengths attributes based existing personas game developed glu uk office previously company macrospace previous experience turn-based tactics games developed ancient empires series like turn-based tactics games player controls units case cast 23 transformers characters across small-scale grid-based levels order encourage much transforming possible player given option turn robot vehicle form end turn vehicle mode transformers travel receive reduced damage attack robot mode gain ability attack transformers capture structures necessary produce energy like pylons energy sources provide energon acts currency game energon allows player upgrade repair units summon additional characters play main campaign players control heroic autobots battling megatron forces villainous decepticons starting game bumblebee ratchet additional characters added story progresses unique abilities characteristics autobot leader optimus prime gives moral boost friendly units adjacent spaces increases battle performance ratchet turns ambulance game medic survival key robots survival city-sized metroplex serves autobot mobile base used summon supporting characters like prowl ironhide sideswipe trypticon serves function decepticons boombox blaster able summon minicassettes eject rewind goes decepticon soundwave underlings frenzy rumble cartoon jetfire must converted decepticon transforming tyrannosaur grimlock crushes decepticons ease initial release non-smart mobile phones 2008 drew positive attention based concept alone commenting announcement september release date pocket gamer spanner spencer said glad hear game based original series live-action film latter described pile rust cleverly disguised cgi extravaganza kotaku luke plunkett impressed early trailer game hoping developers would realize value port nintendo ds later repeated sentiment announcing playable java-based demo saying game looked surprisingly fantastic reviewers actually able play game equally positive early hands-on preview pocket gamer keith andrew claimed never previously understood appeal transformers said game bursting fun though felt game objectives challenging may require several play-throughs master also felt controls simple enough newcomers would daunted commended glu mobile creating game caters fan base appeals wider audience later full review described gameplay resource management meets chess felt game made trial-and-error puzzle-like nature levels somehow enjoyable rather frustrating gave game score 8/10 awarded pocket gamer silver award 2008 mobile release awakening featured retrospective titled visual history optimus prime video games ign jack devries brian altano felt awakening addition pretty good strategy game first game perfect appearance optimus prime supplanted later felt cel-shaded graphics colorful flat textures made optimus pop screen like action figure 2010 ports smartphone operating systems met similar enthusiasm initial announcement kotaku mike fahey wrote eagerly awaited game featured g1 transformers michael bay-bots later full review kotaku luke plunkett called game surprisingly authentic regards animated series also felt game could stand well made turn-based strategy game said 3d rendered battle sequences looked glorious iphone felt downside simplistic graphics animation outside battle showed game roots mobile game concluded recommending game anyone either long-suffering fan animated transformers fan turn-based strategy games stating easily one best games genre available ios ign levi buchanan felt although lifelong affinity transformers inclined judge poorly made adaptations harshly awakening disappoint transformers fans lauded thoughtful merger advance wars -style gameplay classic transformers fiction stating game great story strength transformers expertly woven entire production felt mission goals completely inline advancing story nothing arbitrary also felt glu choice transformers characters excellent thought cel-shading dynamic camera battle sequences made robot models look terrific gave game score 8.5 10 concluded stating transformers g1 awakening quite simply best transformers game ever played | [
1083,
9732,
2259
] | None |
7,183 | 2 | Need_for_Speed:_Undercover:need speed undercover need speed undercover 2008 racing video game twelfth instalment need speed series developed ea black box published electronic arts released november 18 2008 playstation 2 playstation 3 xbox 360 wii microsoft windows playstation portable nintendo ds number mobile phone platforms edition game ios later released april 27 2009 game sees players conducting illegal street races within fictional tri-city area main mode story focused player operating undercover police officer investigate links criminal syndicate stolen cars street racers gameplay operates manner previous entries though included larger selection licensed real-world cars rpg-styled system game main mode upon release game received mixed reviews many criticised game difficulty setting repetitive elements editions receiving lower scores due severe issues undercover later succeeded 2009 2010 game players take part illegal street races focus different styles races utilizing variety licensed real-world cars available time game development release upgraded customized new parts contending involvement police efforts impede player racing events featured game include series standard circuit point-to-point checkpoint races alongside return police pursuit events featured wanted addition undercover includes new events outrun players must overtake rival stay ahead period time highway battle similar carbon duel event players attempt stay ahead rival highway battling local traffic winning instantly pull far ahead losing exact opposite game modes consisting career single event multiplayer playstation 2 wii editions also feature fourth mode challenge series operates similar function wanted carbon career mode players take role undercover police officer seeking break syndicate operating within underground street race world like wanted players achieve completing racing events pursuit events majority events mode include opportunity dominate completing faster specified time record domination undercover progress story involves completing events earn money also experience wheelman rep special performance bonus bonuses either improve player driving abilities cars provide bonuses player playthrough i.e increase race earnings earning enough experience levels player wheelman level unlocking larger performance bonus new cars upgrade parts well additional events including jobs special story-based missions player must complete specific task taking criminal car police pursuits mode function like previous editions though player wheelman level directly impacts aggressive police pursuit player higher level tactics vehicle types used pursuit players freely select event game map using hotkey move highlighted event completing current one able replay previous events reduced amount cash game features wide variety licensed real-world cars divided three tiers performance four classes exotic tuner muscle sport players begin career mode limited selection cars use purchase unlock level earn additional cars defeating criminals story cars upgrades customisation done visiting player safehouse rather separate stores fine-tuning car performance also conducted manner nintendo ds playstation 2 playstation portable wii editions game players also use police vehicles upon unlocking main mode cars receive cosmetic damage game except highway battles job events possible total car event latter per specific parameters assigned job player undertaking multiplayer mode varies across platforms game launched online multiplayer possible windows playstation 3 xbox 360 editions playstation 2 wii editions feature split-screen multiplayer mobile phone platforms include game mode online multiplayer events consist multiplayer versions sprint racing highway battle along team-based event entitled cops robbers two teams players compete score points across two rounds first round robbers collect flags deliver specified areas score points cops attempt arrest earn points whereupon second round teams switch roles team highest score winning match playstation 2 wii features cops robbers multiplayer mode albeit fewer players allowed also feature two exclusive events lap knockout players compete across circuit last player end lap knocked winner remaining player end timed circuit players compete across circuit predetermined length laps time player first place end winning event game story events take place fictional region tri-city bay name influenced real-life city tri-city oregon mainly daytime sunrise sunset region consists four borough palm harbor downtown city district port crescent industrial port also houses naval base gold coast mountains mountainous region observatories wind farms sunset hills suburban town rural farms borough linked series highways region design heavily influenced real-life city miami alongside locations visited development team across gulf coast california coast setting open world map consisting around road nintendo ds edition boroughs named metropolis north port crescent south port crescent riverton wii playstation 2 editions game setting takes place within carbon-copy two boroughs taken wanted setting player undercover police officer tri-city bay police department tcbpd called palm harbor police station superior lt. jack keller paul pape player informed current investigation region underground street racing world joined inspector chase linh maggie q federal agent fbi wants bring international criminal syndicate operating region involved smuggling stolen cars player instructed pose new street racer join major illegal street races along gaining infamy tcbpd order secure entry syndicate player achieves recruited gang works syndicate run hector maio kurt caceres brother zack joshua alba time befriend carmen mendenz christina milian member gang brothers quickly assign player steal cars racing activities upon completing jobs chase instructs player arrest gang including brothers hector gang action player sent sunset hills order get recruited crew operated gmac david rees snell former tcbpd police officer rose largo heather fox honor student turned crime brad nickel rogers lawrence b. adisa former boxer whilst conducting races along jobs crew player instructed gmac steal car chau wu daniel d. lee leader syndicate player investigating player finds confronted chau offers overlook theft exchange player help recovering car lost needs back believing stolen gmac crew meeting carmen suggests theft likely committed someone else eventually player instructed arrest gmac crew though unable locate stolen car possession shortly arresting gmac crew carmen contacts players requests meeting upon reaching reveals zack hector unknowingly stole missing car chau asks get rid chau quickly contacts player moment take possession receive instructions deliver warehouse learning knows police officer kidnapped chase coerce compliance upon delivering car chase reveals corrupt federal agent working chau recover car possessed vital evidence activities sizeable quantity cash chau dispose player chase betrays murdering henchman framing player murder escaping money evidence player forced flee tcbpd upon wanted killings finds support keller instructions proceed take chase flee region way clear name successfully arresting chase keller commends player hard work recovering evidence managing forget undercover work informing carmen made plea bargain exchange testimony arrested crews time later player meets carmen give ride local university studying med student electronic arts ceo john riccitiello stated previous release series prostreet okay game ... good undercover would much better game stated undercover would considerably longer development cycle predecessors need speed development team split two teams would work two-year development cycle future titles alternating releases riccitiello stated torturing development team tight development cycle past change implemented mid-summer 2007 one team started working undercover giving 16.5 month development cycle team finished prostreet would start working next title riccitiello also stated undercover took inspiration action films transporter large embedded narrative frank gibeau president ea games label stated development due fact sales prostreet n't live ea hopes game need speed franchise would go back roots although undercover already developed prostreet john doyle developer ea black box said undercover would feature brand new game mechanic -ish sandbox style gameplay game also provided new damage system andy blackmore senior vehicle concept artist ea explained one porsche cars conceptualized game brought life game brief description approved porsche days undercover release ea revealed plot details video uploaded showed player evading capture tri-city police department tcpd reception undercover mixed complaints game easy difficulty repetitiveness poor texture maintenance ign review went far recommending game rivals rockstar games ea burnout paradise ign review critical ps3 version undercover giving 4/10 calling poor game ton problems practically redeeming qualities ign also commented reason open world environment lost player could start event map however xbox 360 pc versions received higher score contrast ps3 version ign review due fewer severe problems occurred 1up.com review called game fairly successful praised games selection cars tighter handling vehicles however leveling system unlocks cars upgrades criticized resembling grinding general sparse traffic wide-open roads poor ai led complaints extremely low difficulty however one reviewer commented may marketing ploy target wider audience reception live-action cutscenes almost universally negative many critics noting videos poorly acted lacked purpose compared cutscenes michael bay roland emmerich film lack connection crime fighting undercover cop story racing game play particularly criticized ign said ... run missions steal cars make 'special deliveries things like never actually see sequences show cops putting evidence together anything sort chase linh tell need get inside racing group order get dirt race 'll say 'we enough let move 're left asking help finally in-game frame rate received little praise gamespot particularly criticized ps3 version problem resulting lower score platform compared xbox 360 pc versions need speed undercover sold 1.4 million copies united states | [
8937,
10316,
6797
] | Test |
7,184 | 9 | TinyScheme:tinyscheme tinyscheme free software implementation scheme programming language lightweight scheme interpreter subset rrs standard meant used embedded scripting interpreter programs much functionality tinyscheme included conditionally allow developers balance features size/footprint tinyscheme used gnu image manipulation program gimp starting version 2.4 released 2007 gimp previously used siod tinyscheme used core direct revenue adware making world widely distributed scheme runtime | [
4992,
10752,
11269,
3334,
6919,
7562,
2062,
9231,
1301,
9749,
9877,
8728,
4633,
6556,
3869,
10012,
2335,
6047,
8226,
4516,
5031,
9128,
5803,
2225,
10547,
11255,
311,
2105,
7867,
6717,
4799,
5569,
6594,
8771,
4550,
8262,
7880,
8908,
1613,
... | Test |
7,185 | 9 | HOL_Light:hol light hol light member hol theorem prover family like members proof assistant classical higher order logic compared hol systems hol light intended relatively simple foundations hol light authored maintained mathematician computer scientist john harrison hol light released simplified bsd license hol light based formulation type theory equality primitive notion primitive rules inference following formulation type theory close one described section ii.2 | [
9320,
11028,
4791,
9816,
4446
] | None |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.