node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
7,286
3
Motorola_68020:motorola 68020 motorola 68020 sixty-eight-oh-twenty sixty-eight-oh-two-oh six-eight-oh-two-oh 32-bit microprocessor motorola released 1984 successor motorola 68010 succeeded motorola 68030 lower cost version also made available known 68ec020 keeping naming practices common motorola designs 68020 usually referred 020 pronounced oh-two-oh oh-twenty 68020 32-bit internal external data address buses compared early 680x0 models 16-bit data 24-bit address buses 68020 alu also natively 32-bit could perform 32-bit operations one clock whereas 68000 took two clocks minimum due 16-bit alu newer packaging methods allowed '020 feature external pins without large size earlier dual in-line package method required 68ec020 lowered cost 24-bit address bus 68020 produced speeds ranging 12 mhz 33 mhz 68020 added many improvements 68010 including 32-bit arithmetic logic unit alu 32-bit external data address buses extra instructions additional addressing modes 68020 68030 proper three-stage pipeline though 68010 loop mode sped loops effectively tiny instruction cache held two short instructions thus little used 68020 replaced proper instruction cache 256 bytes first 68k series processor feature true on-chip cache memory previous 68000 68010 processors could access word 16-bit long word 32-bit data memory word-aligned located even address 68020 alignment restrictions data access naturally unaligned accesses slower aligned accesses required extra memory access 68020 coprocessor interface supporting eight coprocessors main cpu recognizes f-line instructions four significant opcode bits one uses special bus cycles interact coprocessor execute instructions two types coprocessors defined floating point units mc68881 mc68882 fpus paged memory management unit mc68851 pmmu one pmmu used cpu principle multiple fpus could used cpu commonly done coprocessor interface asynchronous possible run coprocessors different clock rate cpu multiprocessing support implemented externally use rmc pin indicate indivisible read-modify-write cycle progress processors hold memory accesses cycle complete software support multiprocessing included tas cas cas2 instructions multiprocessor system coprocessors could shared cpus avoid problems returns coprocessor bus error address error exceptions generally necessary multiprocessor system cpus model fpus model well new instructions included minor improvements extensions supervisor state several instructions software management multiprocessing system removed 68060 support high-level languages get used much removed future 680x0 processors bigger multiply 32×32→64 bits divide 64÷32→32 bits quotient 32 bits remainder instructions bit field manipulations 68000 'supervisor mode meet popek goldberg virtualization requirements due single instruction 'move sr unprivileged sensitive 68010 later made privileged better support virtualization software new addressing modes added scaled indexing another level indirection many pre-existing modes added quite bit flexibility various indexing modes operations though intended new modes made 68020 suitable page printing laser printers early 1990s 68ec020 core 68020 small 256-byte direct-mapped instruction cache arranged 64 four-byte entries although small still made significant difference performance many applications resulting decrease bus traffic particularly important systems relying heavily dma 68020 used apple macintosh ii macintosh lc personal computers sun 3 workstations commodore amiga 1200 hewlett-packard 8711 series network analyzers later members hp 9000/300 family alpha microsystems am-2000 also 68020 alternative upgrade sinclair ql computer 68008 super gold card interface miracle systems amiga 2500 a2500ux shipped a2620 accelerator using 68020 68881 floating point unit 68851 memory management unit 2500ux shipped amiga unix requiring '020 '030 processor number digital oscilloscopes mid-80s late-90s used 68020 including lecroy 9300 series higher end models including c suffix models used powerful 68ec030 9300 models 68020 processor upgraded 68ec030 change cpu board earlier lecroy 9400 series models excluding 9400/9400a used 68000 along certain tektronix tds series models.. hp 54520 54522 54540 54542 also use 68020 together 68882 math coprocessor also processor used board tgv trains decode signalling information sent trains rails used flight control radar systems eurofighter typhoon combat aircraft nortel networks dms-100 telephone central office switch also used 68020 first microprocessor supernode computing core information instructions architecture see motorola 68000 68ec020 lower cost version motorola 68020 main difference two 68ec020 24-bit address bus rather 32-bit address bus full 68020 thus able address 16 mb memory commodore amiga 1200 computer amiga cd32 games console used cost-reduced 68ec020 namco system 22 taito f3 arcade boards also used processor atari jaguar ii prototype also featured replace 68000 original atari jaguar console also found use laser printers apple used laserwriter iiɴᴛx kodak used ektaplus 7016ps dataproducts used lzr 1260 2014 rochester electronics re-established manufacturing capability 68020 microprocessor still available today
[ 5378, 7299, 3844, 4741, 1158, 4868, 5384, 137, 7302, 3467, 1548, 7305, 10501, 6415, 5264, 7830, 11286, 921, 3098, 2073, 7065, 7709, 2334, 8480, 7842, 6821, 8102, 1576, 4144, 5297, 11314, 1461, 11447, 1592, 8761, 2874, 6715, 1983, 576, 710...
None
7,287
5
Address_Book_Server:address book server address book server dates back several years inclusion feature share contacts 10.6 server product based sync services synchronised contacts network macintosh computers thus allowing contacts present local address book manner contacts server friendly web interface used provide access windows linux remote users product confused address book server included snow leopard server 10.6 unlike apple offering address book server offers features web interface supports 10.4 10.5 10.6 10.7 address book server consists two separate components one server side package requires installation dedicated server client components installs panel system preferences installed server publish presence local network using bonjour accessed via safari bookmarks client requires basic configuration enabled contacts calendar events synchronised published server published records accessed via server web interface stage clients also enabled synchronise local records server basic setup address book server consist clients periodically synchronising server synchronisation changes entire data set fetched form server via sync services compared local records present server differences local records received form server sent back server update central database details address book server available website project abandoned 2010 longer undergoing development
[ 823 ]
None
7,288
1
CrateDB:cratedb cratedb distributed sql database management system integrates fully searchable document oriented data store open-source written java based shared nothing architecture designed high scalability includes components facebook presto apache lucene elasticsearch netty cratedb project started jodok batlogg open source contributor creator contributed open source initiative vorarlberg lovely systems dornbirn software open source clustered database used fast text search analytics company called crate.io raised first round financing april 2014 4m round march 2016 2.5m round january 2017 dawn capital draper esprit speedinvest sunstone capital june 2014 crate.io judge choice award gigaom structure launchpad competition october 2014 win techcrunch disrupt europe london cratedb 1.0 released december 2016. reported one million downloads cratedb 2.0 enterprise edition released may 2017 cratedb language sql uses document-oriented approach nosql style databases software uses sql parser facebook presto query analysis distributed query engine elasticsearch lucene used transport protocol cluster discovery netty asynchronous event driven network application framework cratedb offers automatic data replication self-healing clusters high availability cratedb includes built-in administration interface command line interface crate shell – crash allows interactive queries python client advanced features sqlalchemy integration
[ 3, 9828, 5034, 5612, 5677, 7983, 4817, 6458, 6943 ]
Train
7,289
4
Digital_self-defense:digital self-defense digital self-defense use self-defense strategies internet users ensure digital security say protection confidential personal electronic information internet security software provides initial protection setting firewall well scanning computers malware viruses trojan horses worms spyware however information risk includes personal details birthdates phone numbers bank account schooling details sexuality religious affiliations email addresses passwords information often openly revealed social networking sites leaving internet users vulnerable social engineering possibly internet crime mobile devices especially wi-fi allow information shared inadvertently digital self-defense requires internet users take active part guarding personal information four key strategies frequently suggested assist protection computer security context referring internet security software ongoing security private information requires frequent updating virus spyware definitions ongoing developments malicious software interfere copy private information practice utilising one email account separate personal business usage recreational usage strategy commonly used manage personal privacy free ready availability email accounts sites yahoo google hotmail allows protection personal identity use different names identify email account throw-away accounts discarded replaced providing another level protection username required set email accounts open accounts various official commercial recreational social networking sites many cases email address may also utilised username usernames correlate personal information names nicknames risk ones cryptic anonymous particularly social recreational sites password mandatory security measure accompanies usernames use personal data construct passwords i.e family members ’ names pet ’ names birth dates increases risk confidential information easier crack long complicated passwords password strength key strategy protecting personal information password weak strong weak password cutekittens strong password lacpas56ikms according microsoft ideal password least 14 characters length letters punctuation symbols numbers complexity added inclusion uppercase letters social networking sites offer greater security risks personal electronic information sensitive private confidential information personal identifiers routinely used create public profiles many websites give options suppress amount personal information revealed customisation privacy settings however privacy settings reset changes website occur
[ 3941, 8998, 10392, 2041, 7515 ]
None
7,290
2
Windows_DVD_Maker:windows dvd maker windows dvd maker dvd authoring utility developed microsoft first released 2007 windows vista utility allows users create dvd slideshows videos playback media devices dvd player comparable apple idvd released 2001 dvd maker removed windows 8 windows dvd maker first reported paul thurrott windows hardware engineering conference 2003 thurrott stated windows vista known codename longhorn would support dvd movie creation independent application shell information accompanied additional reports windows vista would support major dvd packet writing formats mount rainier would also eliminate staging burning steps writing optical media—files copied recordable media would instead written immediately latter functionality exposed via live file system windows dvd maker available home premium enterprise ultimate editions windows vista well home premium professional enterprise ultimate editions windows 7 simple aero wizard-style user interface takes user process creating dvd-video first step involves importing video files arranging play proper order windows dvd maker automatically splits videos scenes accessed special scene selection page dvd menu next step animated dvd menus added compilation windows dvd maker also add slide show pictures musical accompaniment transition effects many similar transition effects available windows movie maker users also customize font button styles application show interactive preview dvd look act like burned example users navigate dvd menus testing windows dvd maker designed encode video background process reduced scheduling priority ensure computer remains responsive compilation process
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 1656, 6265, 4731, 10879, 8841, 6797, 9869, 2193, 9874, 1...
Test
7,291
3
HP_Integral_PC:hp integral pc hp integral pc hp 9807a portable unix workstation computer system produced hewlett-packard launched 1985 based motorola 68000 microprocessor running 8 mhz ran early version hp-ux operating system integral pc mains-powered portable computer 9-inch amber electroluminescent display resolution 512×255 pixels 80×28 characters also incorporated 710 kb 3.5 floppy disk drive hp thinkjet ink-jet printer standard memory capacity 256 kb rom plus 512 kb ram expandable 1.5 mb expansion slots hp-ib bus also included mechanical design based ideas de facto standard hp-85 concept upright portable computer system integrated printer floppy screen followed several companies century within integral pc cpu ram rom memory management i/o buffering system timing keyboard interface integrated single logic-board peripheral units 14 connections built using independent boards board smaller letter sized sheet make easier check boards board contains timer i/o-board two connections optional addons keyboard-interface human interface link hp-hil power supply checked tested independently graphics processor integral pc gpu custom made could drive electroluminescence display nearly every kind monitor processor provides graphical subsystem simple use drive bitmapped display gpu able draw lines rectangles alphanumerical characters hardware additionally provides hardware cursor display-ram-interface electroluminescence-display based thin-film-technique developed hp companies integral pc unusual hp-ux operating system kernel resided rom also included hp windows graphical user interface personal applications manager pam hp-ux commands utilities supplied separately floppy disk add rom provides hp-basic using rom integral pc ready run basic simply switching system
[ 7269, 5384, 7983, 3350, 1304 ]
None
7,292
9
Swift_(programming_language):swift programming language swift general-purpose multi-paradigm compiled programming language developed apple inc. ios macos watchos tvos linux z/os swift designed work apple cocoa cocoa touch frameworks large body existing objective-c code written apple products built open source llvm compiler framework included xcode since version 6 released 2014 apple platforms uses objective-c runtime library allows c objective-c c++ swift code run within one program apple intended swift support many core concepts associated objective-c notably dynamic dispatch widespread late binding extensible programming similar features safer way making easier catch software bugs swift features addressing common programming errors like null pointer dereferencing provides syntactic sugar help avoid pyramid doom swift supports concept protocol extensibility extensibility system applied types structs classes apple promotes real change programming paradigms term protocol-oriented programming similar traits swift introduced apple 2014 worldwide developers conference wwdc underwent upgrade version 1.2 2014 major upgrade swift 2 wwdc 2015 initially proprietary language version 2.2 made open-source software apache license 2.0 december 3 2015 apple platforms linux version 3.0 syntax swift went significant evolution core team making source stability focus later versions first quarter 2018 swift surpassed objective-c measured popularity swift 4.0 released 2017 introduced several changes built-in classes structures code written previous versions swift updated using migration functionality built xcode swift 5 released march 2019 introduced stable binary interface apple platforms allowing swift runtime incorporated apple operating systems source compatible swift 4 development swift started july 2010 chris lattner eventual collaboration many programmers apple swift took language ideas objective-c rust haskell ruby python c clu far many others list june 2 2014 apple worldwide developers conference wwdc application became first publicly released app written swift beta version programming language released registered apple developers conference company promise final version swift would source code compatible test version apple planned make source code converters available needed full release swift programming language free 500-page manual also released wwdc available ibooks store official website swift reached 1.0 milestone september 9 2014 gold master xcode 6.0 ios swift 1.1 released october 22 2014 alongside launch xcode 6.1 swift 1.2 released april 8 2015 along xcode 6.3 swift 2.0 announced wwdc 2015 made available publishing apps app store september 21 2015 swift 3.0 released september 13 2016 swift 4.0 released september 19 2017 swift 4.1 released march 29 2018 swift first place loved programming language stack overflow developer survey 2015 second place 2016 december 3 2015 swift language supporting libraries debugger package manager open sourced apache 2.0 license runtime library exception swift.org created host project source code hosted github easy anyone get code build even create pull requests contribute code back project december 2015 ibm announced swift sandbox website allows developers write swift code one pane display output another swift sandbox deprecated january 2018 wwdc 2016 apple announced ipad exclusive app named swift playgrounds intended teach people code swift app presented 3d video game-like interface provides feedback lines code placed certain order executed january 2017 chris lattner announced departure apple new position tesla motors swift project lead role going team veteran ted kremenek wwdc 2019 apple announced swiftui provides framework declarative ui structure design across apple platforms swift alternative objective-c language employs modern programming-language theory concepts strives present simpler syntax introduction described simply objective-c without c default swift expose pointers unsafe accessors contrast objective-c uses pointers pervasively refer object instances also objective-c use smalltalk-like syntax making method calls replaced dot-notation style namespace system familiar programmers common object-oriented oo languages like java c swift introduces true named parameters retains key objective-c concepts including protocols closures categories often replacing former syntax cleaner versions allowing concepts applied language structures like enumerated types enums cocoa cocoa touch environments many common classes part foundation kit library included nsstring string library using unicode nsarray nsdictionary collection classes others objective-c provided various bits syntactic sugar allow objects created on-the-fly within language created objects manipulated object calls instance objective-c concatenating two nsstrings required method calls similar swift many basic types promoted language core manipulated directly instance strings invisibly bridged nsstring foundation imported concatenated codice_1 operator allowing greatly simplified syntax prior example becoming swift supports five access control levels symbols codice_2 codice_3 codice_4 codice_5 codice_6 unlike many object-oriented languages access controls ignore inheritance hierarchies codice_6 indicates symbol accessible immediate scope codice_5 indicates accessible within file codice_4 indicates accessible within containing module codice_3 indicates accessible module codice_2 classes methods indicates class may subclassed outside module important new feature swift option types allow references values operate manner similar common pattern c pointer may refer value may null implies non-optional types result null-pointer error compiler ensure possible optional types created codice_12 mechanism—to make integer nullable one would use declaration similar codice_13 c swift also includes syntactic sugar allowing one indicate variable optional placing question mark type name codice_14 variables constants marked optional either value underlying type codice_15 optional types wrap base type resulting different instance codice_16 codice_17 fundamentally different types latter common codice_18 codice_16 access value inside assuming nil must unwrapped expose instance inside performed codice_20 operator case codice_20 operator unwraps codice_22 expose instance inside allowing method call made codice_22 nil null-pointer error occurs annoying practice swift also includes concept optional chaining test whether instance nil unwrap non-null case runtime calls codice_24 codice_22 nil suppressing error normally requires programmer test whether codice_26 nil proceeding origin term chaining comes common case several method calls/getters chained together instance reduced codice_27 syntax circumvents pyramid doom swift 2 introduced new keyword codice_28 cases code stop executing condition unmet using codice_28 three benefits syntax act codice_30 statement primary benefit inferring non-nullability codice_30 statement requires case codice_28 assumes case based condition provided also since codice_28 contains scope exception codice_34 closure codice_35 presented unwrapped optional guard super-scope lastly codice_28 statement test fails swift requires codice_34 exit current method loop ensuring codice_35 never accessed codice_15 performed keywords codice_40 codice_41 codice_42 codice_43 objective-c weakly typed allowed method called object time method call failed default handler runtime returned nil meant unwrapping testing needed equivalent statement objective-c would return nil could tested however also demanded method calls dynamic introduces significant overhead swift use optionals provides similar mechanism testing dealing nils way allows compiler use static dispatch unwrapping action called defined instance wrapper versus occurring runtime dispatch system many object-oriented languages objects represented internally two parts object stored block data placed heap data structure |heap name handle object represented pointer computer programming |pointer objects passed methods copying value pointer allowing underlying data heap accessed anyone copy contrast basic types like integers floating point values represented directly handle contains data pointer data passed directly methods copying styles access termed pass-by-reference case objects pass-by-value basic types concepts advantages disadvantages objects useful data large like description window contents document cases access data provided copying 32- 64-bit value versus copying entire data structure however smaller values like integers size pointers typically one word computer architecture |word advantage passing pointer versus passing value also pass-by-reference inherently requires dereferencing operation produce noticeable overhead operations typically used basic value types like mathematics similarly c contrast oo languages swift offers built-in support objects using either pass-by-reference pass-by-value semantics former using codice_44 declaration latter using codice_45 structs swift almost features classes methods implementing protocols using extension mechanisms reason apple terms data generically instances versus objects values structs support inheritance however programmer free choose semantics appropriate data structure application larger structures like windows would defined classes allowing passed around pointers smaller structures like 2d point defined structs pass-by-value allow direct access internal data dereference performance improvement inherent pass-by-value concept swift uses types almost common data types including codice_46 codice_47 types normally represented objects like codice_16 codice_49 using value types result significant performance improvements user applications well ensure even largest structs cause performance penalty handed swift uses copy write objects copied program attempts change value means various accessors effect pointer data storage data physically stored one instance memory level application values separate physical separation enforced copy write needed key feature objective-c support categories methods added extend classes runtime categories allow extending classes in-place add new functions need subclass even access original source code example might add spell checker support base codice_50 class means instances nsstring application gain spell checking system also widely used organizational technique allowing related code gathered library-like extensions swift continues support concept although termed extensions declared keyword codice_51 unlike objective-c swift also add new properties accessors types enums extant instances another key feature objective-c use protocol_ object-oriented_programming protocols known modern languages interfaces protocols promise particular class implements set methods meaning objects system call methods object supporting protocol often used modern oo languages substitute multiple inheritance although feature sets entirely similar common example protocol cocoa codice_52 protocol defines one method codice_53 implements object copying deep copy|deep copying objects objective-c languages implementing protocol concept programmer ensure required methods implemented class swift adds ability add methods using extensions use generic programming generics implement combined allow protocols written support wide variety instances also extension mechanism used add protocol conformance object list protocol definition example protocol might declared called codice_54 ensures instances conform protocol implement codice_55 method returns codice_16 swift declared code like protocol added string access base class source swift like many modern languages supporting interfaces protocols used types means variables methods defined protocol instead specific type matter sort instance codice_57 compiler ensure conforms protocol thus code safe syntax also means collections based protocols also like codice_58 swift treats structs classes similar concepts extensions protocols extensively used swift runtime provide rich api based structs instance swift uses extension add codice_59 protocol many basic types like strings arrays allowing compared codice_60 operator concrete example features interact seen concept default protocol implementations function defines method works instance conforming codice_59 providing equals function instance class struct automatically gains implementation simply conforming codice_59 many instances gain codice_59 base implementations generic extensions basic objects runtime gain equals equals code combination protocols defaults protocol inheritance extensions allows many functions normally associated classes inheritance implemented value types properly used lead dramatic performance improvements significant limits api concept widely used within swift apple begun calling protocol-oriented programming language suggest addressing many problem domains normally solved though classes inheritance using protocols structs instead swift uses runtime extant objective-c system requires ios 7 macos 10.9 higher swift objective-c code used one program extension c c++ also contrast c c++ code used directly swift objective-c c wrapper must created swift c++ case objective-c swift considerable access object model used subclass extend use objective-c code provide protocol support converse true swift class subclassed objective-c. aid development programs re-use extant code xcode 6 higher offers semi-automated system builds maintains bridging header expose objective-c code swift takes form additional header file simply defines imports objective-c symbols needed project swift code point swift refer types functions variables declared imports though written swift objective-c code also use swift code directly importing automatically maintained header file objective-c declarations project swift symbols instance objective-c file mixed project called myapp could access swift classes functions code codice_64 symbols available mechanism however—use swift-specific features like generic types non-object optional types sophisticated enums even unicode identifiers may render symbol inaccessible objective-c swift also limited support attributes metadata read development environment necessarily part compiled code like objective-c attributes use codice_65 syntax currently available set small one example codice_66 attribute marks given value code outlet available use within interface builder ib outlet device binds value on-screen display object code swift uses automatic reference counting arc memory management|manage memory apple used require manual memory management objective-c introduced arc 2011 allow easier memory allocation deallocation one problem arc possibility creating reference counting reference cycle|strong reference cycle objects reference way reach object started following references e.g references b b references causes become leaked memory never released swift provides keywords codice_67 codice_68 prevent strong reference cycles typically parent-child relationship would use strong reference child-parent would use either codice_67 reference parents children unrelated codice_68 child always parent parent may child weak references must optional variables since change become codice_15 closure within class also create strong reference cycle capturing self references self references treated weak unowned indicated using capture list key element swift system ability cleanly debugged run within development environment using read–eval–print loop repl giving interactive properties common scripting abilities python traditional system programming languages repl enhanced new concept swift playgrounds|playgrounds interactive views running within xcode environment respond code debugger changes on-the-fly swift playgrounds|playgrounds allow programmers add swift code along markdown documentation code changes time regard ranged input value view used timeline assistant demonstrate output animated way addition xcode debugging features swift development including breakpoints step step statements well ui element placement breakdowns app developers apple says swift industrial-quality programming language expressive enjoyable scripting language many features introduced swift also well-known performance safety trade-offs apple implemented optimizing compiler|optimizations reduce overhead swift similar c various ways also similarities objective-c differences objective-c include since language open-source prospects ported web web frameworks already developed ibm kitura perfect server framework |perfect vapor server-side swift |vapor official server apis work group also started apple members swift developer community playing central role second free implementation swift targets cocoa api |cocoa microsoft common language infrastructure .net framework|.net java software platform |java android operating system |android platform exists part elements compiler remobjects software category apple inc. software category computer-related introductions 2014 category object-oriented programming languages category pattern matching programming languages category programming languages category programming languages created 2014 category software using apache license category statically typed programming languages category systems programming languages
[ 10755, 9732, 1549, 4111, 5647, 7697, 2585, 11289, 3613, 9245, 5154, 6186, 2603, 4139, 5165, 5677, 6700, 2045, 1074, 8754, 5684, 7734, 9784, 2617, 3642, 2620, 8253, 6718, 576, 5696, 8771, 10819, 8773, 8262, 8783, 4180, 6228, 10838, 1623, 3...
Test
7,293
2
Composer_(software):composer software composer application-level package manager php programming language provides standard format managing dependencies php software required libraries developed nils adermann jordi boggiano continue manage project began development april 2011 first released march 1 2012 composer strongly inspired node.js npm ruby bundler project dependency solving algorithm started php-based port opensuse libzypp satsolver composer runs command line installs dependencies e.g libraries application also allows users install php applications available packagist main repository containing available packages also provides autoload capabilities libraries specify autoload information ease usage third-party code composer offers several parameters including example composer.json generated following command different authorized versions libraries defined
[ 10760, 1034, 6154, 8213, 6680, 9245, 5155, 5670, 7722, 5677, 10817, 8262, 4171, 3667, 6227, 11357, 7785, 9324, 1138, 2168, 6797, 10900, 10394, 4775, 6828, 5819, 190, 6338, 4302, 2259, 6361, 8413, 741, 231, 2281, 2804, 4853, 6393, 11525, 7...
Train
7,294
7
VOMS:voms voms acronym used virtual organization membership service grid computing structured simple account database fixed formats information exchange features single login expiration time backward compatibility multiple virtual organizations database manipulated authorization data defines specific capabilities roles users administrative tools used administrators assign roles capability information database command-line tool allows users generate local proxy credential based contents voms database credential includes basic authentication information standard grid proxy credentials contain also includes role capability information voms server voms-aware applications use voms data make authentication decisions regarding user requests voms originally developed european datagrid enabling grids e-science projects maintained italian national institute nuclear physics infn voms also acronym voucher management system used providing recharge management services prepaid systems telecom service providers typically external voucher management systems used intelligent network based prepaid systems
[ 160, 3331, 5956, 2558, 7935 ]
Train
7,295
4
NitroSecurity:nitrosecurity nitrosecurity inc. privately held united states-based provider security information event management siem technology nitrosecurity headquarters located portsmouth new hampshire usa sales offices throughout united states united kingdom primary software engineering development siem products idaho falls idaho acquired mcafee 2011 engineering siem products continue developed mcafee idaho falls 2010 inc. magazine rated nitrosecurity 523 inc. 5,000 list fastest-growing companies nitrosecurity develops security information event management siem tools identify correlate remediate information security threats product names nitroview esm nitroview elm nitroview adm nitroview dbm nitroguard ips
[ 704, 11611, 2656 ]
None
7,296
2
Modern_Operating_Systems:modern operating systems modern operating systems book written andrew tanenbaum version target implementation book 4th edition published march 2014 modern operating systems mostly known mos popular book across globe includes fundamentals operating system small amounts code written autonomous c language mos describes many scheduling algorithms
[ 7983, 2045, 7279 ]
Test
7,297
4
Fabrik_Inc.:fabrik inc. fabrik inc. manufacturer external hard drives digital content management software services fabrik said third largest supplier external storage products north america 2007 headquartered san mateo offices santa ana culver city california company sells external hard drives online backup software bundled product consumers small business users audio/video a/v content creation professionals company also hosts free online digital content management sharing site joggle fabrik product lines include simpletech g-technology joggle fabrik ultimate backup fabrik founded web-based software company august 2005 former maxtor executives mike cordano keyur patel anaal udaybabu designed brand identity on-the-web storage following month company disclosed completion series funding 4.1 million followed 8 million series b funding july 2006 14.3 million february 2007 may 2007 company received 24.9 million funding bringing total 51.3 million funding february 2006 fabrik partnered maxtor acquired seagate 2005 develop maxtor fusion network-attached storage nas device built organizing sharing digital files late 2006 company launched myfabrik.com organized stored digital media online february 2007 company acquired consumer business simpletech inheriting simpletech product line external hard drives consumers small businesses january 2008 fabrik acquired g-technology inherited suite external hard drives mac creative pro photography a/v markets including firewire esata usb scsi fibre channel storage products fabrik acquisitions introduction joggle demo conference january 2008 created four brands simpletech g-technology joggle fabrik ultimate backup simpletech g-technology products still branded maintained separate online website entities february 23 2009 hitachi global storage technologies announced agreed acquire fabrik point fabrik revenue year 2009 estimated 350m 400m range growing 40 yearly basis april 6 2009 hitachi global storage technologies completed acquisition formed core hitachi gst new branded business division following acquisition subsidiary branded g-technology hitachi company simpletech products external hard drives mainstream consumers small business users includes portable external hard drives desktop external hard drives simpletech products come bundled free local backup software online backup capabilities simpletech drive 100 percent recyclable enclosure several energy resource efficiency features company claims drive world eco-friendly resource conscious external hard drive original design simpletech portable external storage product line inspired ferrari design team pininfarina fabrik started free online digital content management site called joggle early 2008 web site searches video photos music user computer external hard drive online communities networking sites automatically consolidates single online organizing sharing tool company also pure online backup approach fabrik ultimate backup data backed remote servers using 128-bit ssl blowfish encryption
[ 2432, 8900, 3366, 3629, 1298 ]
Test
7,298
4
Kemp_Inc:kemp inc kemp inc. founded 2000 bethpage new york operates application delivery controller industry company builds load balancing products balances user traffic multiple application servers physical virtual cloud environment 2010 kemp opened european headquarters limerick ireland edison ventures kennet partners orix venture finance invested 16 million company research development sales marketing early 2012 april 2014 kemp announced investment limerick operations expand 30 positions 80 kemp recognized visionary 2015 gartner magic quadrant application delivery controllers 2016 2019 kemp purchased private equity firm mill point capital kemp software company develops load balancing application delivery software built linux operating system sold loadmaster brand 2017 40,000 customer deployments loadmaster need high availability scalability security visibility applications enables customers scale operations delivering applications layer 4 7 load balancing enhanced performance secure access loadmaster software-based load balancer adc available virtualized appliance well cloud including azure aws others kemp main product loadmaster load balancer built proprietary software platform called lmos enables run almost platform kemp loadmaster appliance virtual loadmaster vlm deployed hyper-v vmware bare metal public cloud kemp available azure top 15 deployed applications well aws vmware vcloud air 2013 kemp announced adding pre-authorization single sign-on sso persistent logging product range tmg alternative kemp ’ dns based global site load balancer gslb enables customers provide availability scaling resilience applications geographically distributed including data center environments private clouds multi-public cloud environments azure aws well hybrid environments applications deployed across public private cloud capabilities provided geo loadmaster similar hosted services dyn dns march 2014 kemp announced availability microsoft azure cloud platform first 3rd party load balancer available vlm azure loadmaster virtual load balancer may 2016 kemp launched centralized application monitoring reporting product called kemp 360 central™ allows network application administrators view state different load balancers application delivery controllers views include throughput users transactions per second product allows users connect 3rd party devices like f5 nginx haproxy time launching kemp 360 central kemp also announced general release 360 vision monitors health applications 360 vision monitors patterns application data statistics able provide pre-emptive health alerts designed prevent application outages march 2015 kemp launched free version loadmaster software called free loadmaster fully featured load balancer shares commercial product features including full layer 4 layer 7 load balancing reverse proxy web content caching compression non-commercial waf web application firewall 20mbps kemp announced launched world first software defined network sdn ready adaptive load balancer september 2014 kemp announced joining opendaylight open source sdn project kemp introduced service mesh part offering 2018 listed company watch techtarget
[ 8204, 277 ]
Test
7,299
3
Motorola_68030:motorola 68030 motorola 68030 sixty-eight-oh-thirty 32-bit microprocessor motorola 68000 family released 1987 68030 successor motorola 68020 followed motorola 68040 keeping general motorola naming cpu often referred 030 pronounced oh-three-oh oh-thirty 68030 features 273,000 transistors on-chip instruction data caches 256 bytes also on-chip memory management unit mmu built floating-point unit fpu 68881 faster 68882 floating point unit chips could used 68030 lower cost version 68030 motorola 68ec030 also released lacking on-chip mmu commonly available 132 pin qfp 128 pin pga packages poorer thermal characteristics qfp package limited full 68030 qfp variant 33 mhz pga 68030s included 40 mhz 50 mhz versions also small supply qfp packaged ec variants microarchitecture 68030 basically 68020 core additional 256 byte data cache process shrink added burst mode caches four longwords placed cache without cpu intervention motorola used process shrink pack hardware die case mmu mostly completely compatible external 68851 integration mmu made cost-effective 68020 external mmu also allowed 68030 access memory one cycle faster 68020/68851 combo however 68030 switch synchronous asynchronous buses without reset 68030 also lacks 68020 instructions increases performance ≈5 reducing power draw ≈25 compared 68020 68030 used 68020 bus case performance similar 68020 derived however 68030 provides additional synchronous bus interface used accelerates memory accesses 33 compared equally clocked 68020 finer manufacturing process allowed motorola scale full-version processor 50 mhz ec variety topped 40 mhz 68030 used many models apple macintosh ii commodore amiga series personal computers next cube later alpha microsystems multiuser systems descendants atari st line atari tt atari falcon also used unix workstations sun microsystems sun-3x line desktop workstations earlier sun3 used 68020 laser printers nortel networks dms-100 telephone central office switch recently 68030 core also adapted freescale microcontroller embedded applications lecroy used 68ec030 certain models 9300 series digital oscilloscopes including “ c ” suffix models high performance 9300 series models along mega waveform processing hardware option 68020-based 9300 series models 68ec030 low cost version 68030 difference two 68ec030 omits on-chip memory management unit mmu thus essentially upgraded 68020 68ec030 used cpu low-cost model amiga 4000 number cpu accelerator cards commodore amiga line computers also used cisco systems 2500 series router small-to-medium enterprise computer internetworking appliance 50 mhz speed exclusive ceramic pga package plastic '030 stopped 40 mhz
[ 3844, 4741, 1158, 4868, 7302, 7305, 10501, 3467, 1548, 11013, 6415, 7824, 147, 7830, 6807, 11286, 2073, 7065, 8480, 7842, 7844, 8102, 6183, 1576, 7211, 5297, 6834, 11314, 1461, 11447, 8761, 11066, 6715, 8893, 1983, 576, 7104, 1090, 5058, ...
Train
7,300
3
Arch_Linux_ARM:arch linux arm arch linux arm port arch linux arm processors design philosophy simplicity full control end user like parent operating system arch linux aims unix-like goal minimalism complete user control however make arch linux difficult linux beginners requires knowledge responsibility operating system arch linux arm based arch linux minimalist linux distribution first released march 11 2002 idea making single official port arch linux devices arm processors born members arch linux plugapps archmobile development teams notably mike staszel went found arch linux arm project kevin mihelich currently arch linux arm primary developer arch linux arm community-developed software development user support provided fully volunteer effort donations also unlike community-supported operating systems ubuntu arch linux arm relatively small user base making user participation development especially important arch linux arm rolling release cycle i.e new software packaged released bleeding edge release cycle small frequent package updates differs release cycles linux distributions debian focus large scheduled releases packages proven stable unlike arch linux aimed x86-64 cpus arch linux arm aimed low- high-end arm cpus low end support armv5 platforms like plug computers oxnas-based armv6 pogoplugs arch linux arm also supports many single-board computers raspberry pi beagleboard higher end support however arch linux arm run device supports armv5te armv6h armv7 armv8 instruction sets list officially supported platforms see archlinuxarm.org platforms page list unofficial community-supported devices see archlinuxarm.org community-supported devices forum arch linux arm gained popularity lightweight linux distribution 2014 growing popularity among single-board computer hobbyists arch linux arm also known good community support
[ 4673, 7745, 644, 11396, 392, 4841, 5067, 5356, 9964, 7833, 5397, 11062, 1849, 6618, 3835 ]
None
7,301
9
Euler_(software):euler software euler euler mathematical toolbox eumatht free open-source numerical software package contains matrix language graphical notebook style interface plot window euler designed higher level math calculus optimization statistics software handle real complex interval numbers vectors matrices produce 2d/3d plots uses maxima symbolic operations software compilable windows unix linux versions contain computer algebra subsystem euler math toolbox originated 1988 program atari st. time title program simply euler turned unspecific internet main aim program create tool testing numerical algorithms visualize results demonstrate mathematical content classroom euler math toolbox uses matrix language similar matlab system development since 1970s main developer euler rené grothmann mathematician catholic university eichstätt-ingolstadt germany 2007 euler married maxima computer algebra system symbolic expressions functions added communicate maxima reach good degree integration numerical euler core euler core numerical system written c/c++ handles real complex interval values matrices types available data types sparse compressed matrices long accumulator exact scalar product strings strings used expressions file names etc based core additional functions implemented euler matrix language interpreted programming language style advanced basic dialect euler contains libraries statistics exact numerical computations interval inclusions differential equations stiff equations astronomical functions geometry clean interface consists text window graphics window text window contains fully editable notebooks graphics window graphics output graphics added notebook window exported various formats png svg wmf clipboard graphic types include line bar point plots 2d 3d including anaglyph plots 3d surfaces 3d plots euler api use open raytracer pov-ray euler handles symbolic computations via maxima loaded separate process communicating euler pipes two programs exchange variables values indeed maxima used various euler functions e.g newton method assist computation derivatives taylor expansions integrals moreover maxima called definition time euler function latex used within euler display formulas export formulas html either generated latex images mathjax used special export option exports graphics svg euler also includes tiny c compiler allows subroutines c compiled included via windows dll euler lot similarity matlab free clones gnu octave compatible
[ 5129, 3980, 6797, 15, 8079, 5148, 7580, 7326, 10142, 7341, 9133, 7983, 6962, 823, 6718, 2242, 5830, 5703, 5833, 11239, 4840, 363, 7148, 5741, 5492, 2045 ]
Test
7,302
3
Motorola_68060:motorola 68060 motorola 68060 sixty-eight-oh-sixty 32-bit microprocessor motorola released 1994 successor motorola 68040 highest performing member 68000 series two derivatives produced 68lc060 68ec060 lc low-cost version without fpu ec embedded controller without mmu fpu 68060 design led joe circello 68060 shares architectural features p5 pentium similar superscalar in-order dual instruction pipeline configuration instruction decoder breaks complex instructions simpler ones execution however significant difference 68060 fpu pipelined therefore three times slower pentium floating point applications contrast integer multiplications bit shifting instructions significantly faster 68060 68060 ability execute simple instructions address generation unit agu thereby supply result two cycles alu development 68060 large amounts commercial compiled code analyzed clues instructions would best candidates performance optimization pentium 68060 perform better mixed code pentium decoder issue fp instruction every opportunity hence fpu superscalar alus 68060 non-pipelined fpu accept instruction issued one decoder means optimizing 68060 easier rules prevent fp instructions issued whenever convenient programmer well understood instruction latencies however properly optimized scheduled code pentium fpu capable double clock clock throughput 68060 fpu 68060 last development 68000 family general purpose use abandoned favor powerpc chips saw use late-model amiga machines amiga accelerator cards well atari st clones falcon accelerator board ct60/ct63/ct60e latter created 2015 late models alpha microsystems multiuser computers migration x86 apple inc. unix world moved onto various risc platforms time 68060 available 68060 introduced 50 mhz motorola 0.6 µm manufacturing process years later shrunk 0.42 µm clock speed raised 66 mhz 75 mhz developments basic core continue intended embedded systems combined number peripheral interfaces reduce overall complexity power requirements design number chips different sets interfaces sold names coldfire dragonball model numbers even second-to-last digit 68000 68020 68040 68060 reserved major revisions 680x0 core architecture model numbers odd second-to-last digit 68010 68030 reserved upgrades architecture previous chip 68050 68070 ever produced motorola example motorola 68010 obscure 68012 68000 improvements loop instruction ability suspend continue instruction event page fault enabling use virtual memory appropriate mmu hardware however major overhauls core architecture similarly motorola 68030 represents process improvement 68020 mmu small data cache 256 bytes moved on-chip 68030 released speed ratings 50 mhz jump 68000/68010 68020/68030 however represents major overhaul innumerable individual changes time 68060 production motorola abandoned development 68000 family favor powerpc 68060 last 68000 family processor motorola signetics philips produced 68000-based variant somewhat confusingly named 68070 contains modestly-improved 68000 cpu simple on-chip mmu i²c bus controller came long 68060 used principally embedded processor consumer electronics items notably cd-i consoles 68060 history american broadcast television graphics chyron max maxine series television character generators use 68060 main processor character generators fixture many american television networks affiliate stations desktops 68060 used variants amiga 4000t produced amiga technologies available third party upgrade amiga models also used amiga clone draco non-linear video system q60 extended sinclair ql design similarly slowest start ultimate pace 68k architecture capabilities 68060-based motherboards—at 66 mhz full 68060 non-fpu 68lc060 option overclocked 80 mhz—are 100 times faster sinclair ql running operating systems 68060 used nortel meridian 1 option 51 61 81 large office pbx systems powering cp3 cp4 core processor boards pair boards sporting 68060 could used make pbx fault tolerant logical application previous meridian 1 cores used motorola chips nortel later changed architecture use intel processors motorola vanguard 6560 multiprotocol router uses 50 mhz 68ec060 processor motorola mvme-17x force computer sys68k vmebus systems use 68060 cpu 68ec060 version motorola 68060 microprocessor intended embedded controllers ec differs 68060 neither fpu mmu makes less expensive draws less power 68lc060 low cost version motorola 68060 microprocessor fpu makes less expensive draws less power atc address translation cache
[ 7299, 3844, 4868, 1158, 7302, 10501, 7305, 3467, 1548, 6415, 8851, 11539, 2073, 7065, 6815, 8102, 6187, 5297, 11314, 1461, 1463, 11447, 8761, 6715, 1983, 10945, 3017, 2638, 4046, 336, 8530, 3540, 3932, 3936, 7269, 10601, 9964, 10734, 1776, ...
None
7,303
7
History_of_computer_clusters:history computer clusters history computer clusters best captured footnote greg pfister search clusters “ virtually every press release dec mentioning clusters says ‘ dec invented clusters ... ’ ibm invent either customers invented clusters soon could fit work one computer needed backup date first unknown would surprising 1960s even late 1950s. ” formal engineering basis cluster computing means parallel work sort arguably invented gene amdahl ibm 1967 published come regarded seminal paper parallel processing amdahl law amdahl law describes mathematically speedup one expect parallelizing given otherwise serially performed task parallel architecture article defined engineering basis multiprocessor computing cluster computing primary differentiator whether interprocessor communications supported inside computer example customized internal communications bus network outside computer commodity network consequently history early computer clusters less directly tied history early networks one primary motivations development network link computing resources creating de facto computer cluster packet switching networks conceptually invented rand corporation 1962 using concept packet switched network arpanet project succeeded creating 1969 arguably world first commodity-network based computer cluster linking four different computer centers something cluster right probably commodity cluster arpanet project grew internet—which thought mother computer clusters union nearly compute resources including clusters happen connected also established paradigm use computer clusters world today—the use packet-switched networks perform interprocessor communications processor sets located otherwise disconnected frames development customer-built research clusters proceeded hand hand networks unix operating system early 1970s tcp/ip xerox parc project created formalized protocols network-based communications hydra operating system built cluster dec pdp-11 minicomputers called c.mmp carnegie mellon university 1971 however circa 1983 protocols tools easily remote job distribution file sharing defined largely within context bsd unix implemented sun microsystems hence became generally available commercially along shared filesystem first commercial clustering product arcnet developed datapoint 1977 arcnet commercial success clustering per se really take digital equipment corporation released vaxcluster product 1984 vax/vms operating system arcnet vaxcluster products supported parallel computing also shared file systems peripheral devices idea provide advantages parallel processing maintaining data reliability uniqueness vaxcluster vmscluster still available openvms systems hp running alpha itanium systems two noteworthy early commercial clusters tandem himalaya circa 1994 high-availability product ibm s/390 parallel sysplex also circa 1994 primarily business use history commodity computer clusters would complete without noting pivotal role played development parallel virtual machine pvm software 1989 open source software based tcp/ip communications enabled instant creation virtual supercomputer—a high performance compute cluster—made tcp/ip connected systems free-form heterogeneous clusters built top model rapidly achieved total throughput flops greatly exceeded available even expensive big iron supercomputers pvm advent inexpensive networked pcs led 1993 nasa project build supercomputers commodity clusters 1995 beowulf cluster—a cluster built top commodity network specific purpose supercomputer capable performing tightly coupled parallel hpc computations—was invented spurred independent development grid computing named entity although grid-style clustering around least long unix operating system arpanet whether clusters used named
[ 9665, 9762, 5956, 1606, 5384, 330, 10733, 5492, 11604, 2422, 3323, 9151 ]
None
7,304
4
Malvertising:malvertising malvertising portmanteau malicious advertising use online advertising spread malware typically involves injecting malicious malware-laden advertisements legitimate online advertising networks webpages online advertisements provide solid platform spreading malware significant effort put order attract users sell advertise product advertising content inserted high-profile reputable websites malvertising provides malefactors opportunity push attacks web users might otherwise see ads due firewalls safety precautions like malvertising attractive attackers 'can easily spread across large number legitimate websites without directly compromising websites malvertising fairly new concept spreading malware even harder combat work way webpage spread system unknowingly interesting thing infections delivered malvertising require user action like clicking compromise system exploit vulnerabilities website server hosted ... infections delivered malvertising silently travel web page advertisements able expose millions users malware even cautious growing rapidly 2012 estimated nearly 10 billion ad impressions compromised malvertising attackers wide reach able deliver attacks easily advertisement networks companies websites difficulty diminishing number malvertising attacks suggests attack vector ’ likely disappear soon websites web publishers unknowingly incorporate corrupted malicious advertisement page computers become infected pre-click post click misconception infection happens visitors begin clicking malvertisement examples pre-click malware include embedded main scripts page drive-by-downloads malware also auto-run case auto redirects user automatically taken different site could malicious malware also found delivery ad – clean ad malware pre post click build design still infected whilst called malicious code hide undetected user idea coming way post-click malvertisement example user clicks ad visit advertised site instead directly infected redirected malicious site sites trick users copying viruses spyware usually disguised flash files popular web redirection often built online advertising spread malware often successful users expect redirection happen clicking advertisement redirection taking place needs co-opted order infect user computer malvertising often involves exploitation trustworthy companies attempting spread malware place clean advertisements trustworthy sites first order gain good reputation later insert virus spyware code behind ad mass virus infection produced remove virus thus infecting visitors site time period identities responsible often hard trace making hard prevent attacks stop altogether ad network infrastructure complex many linked connections ads click-through destinations malvertisements infect vulnerable computer even user never clicks normal-appearing advertisement 2007/2008 first recorded sighting malvertising late 2007 early 2008 threat based vulnerability adobe flash something continued day – see later affected number platforms including myspace excite rhapsody 2009 online edition new york times magazine found serving ad part larger click fraud scam created botnet network malware infected computers nicknamed bahama botnet went used carry click fraud pay per click ads web banner feed new york times hacked weekend september 11 14 causing readers see advertisements telling systems infected trying trick installing rogue security software computers according spokeswoman diane mcnulty culprit approached newspaper national advertiser provided apparently legitimate ads week ads switched virus alert malvertisement afterwards new york times suspended third-party advertisements address problem even posted advice readers regarding issue technology blog 2010 malvertising takes marketing analysts clickz noted online trust alliance ota identified billions display ads across 3500 sites carrying malware year online trust alliance formed cross industry anti-malvertising task force 2011 spotify malvertising attack used blackhole exploit kit – one first instances drive-by download user ’ even click ad become infected malware according bluecoat security systems report 2011 saw increase 240 malvertising based malicious sites 2012 symantec includes malvertising section internet security threat report 2013 looked back landscape 2012 symantec used scanning software across series websites detected half infected malvertising 2012 la times hit massive malvertising attack used blackhole exploit kit infect users seen part general campaign malvertising hit large news portals – strategy carried subsequent years attacks huffingtonpost.com ny times 2013 major malvertising campaign waged yahoo.com one largest ad platforms monthly visits 6.9 billion malware exploit based commonly used web attack cross-site scripting xss number three top ten web attacks types identified open web application security project owasp attack infected users machines ransomware ‘ cryptowall ’ type malware extorts money users encrypting data placing ransom 1000 bitcoins paid 7 days decrypt data 2014 2014 major malvertising campaigns doubleclick zedo ad networks various news portals including times israel hindustan times affected previous attacks cybercrime involved cryptowall malware infection spate malvertising believed brought 1 million ransom money infecting 600,000 computers 2015 mcafee threat report february 2015 said malvertising growing quickly mobile platforms 2015 malvertising campaigns ebay answers.com talktalk.co.uk wowhead.com among others campaigns involved breaches ad networks including doubleclick engage bdr also report possibly first political malvertising campaign pro-russian activists based botnet forced users machines visit bogus sites generated ad revenue activists users also ended several pro-russian propaganda videos several popular websites news sources victims malvertising malicious advertisements placed webpages widgets unknowingly including horoscope.com new york times london stock exchange spotify onion visiting websites affected malvertising users risk infection many different methods used injecting malicious advertisements programs webpages several precautions people take lessen chances getting tricked advertisements commonly used programs adobe flash player adobe reader flaws exploited become vulnerable attacks important avoid least keep date users also download anti-virus software protects threats removes malicious software systems users also push companies websites scan advertisements making active webpages users also use ad blocking software avoid downloading malware contained advertisements specific browser extension alerting malvertising campaigns
[ 704, 5536, 9922, 3555, 8387, 4165, 4198, 10368, 877, 1970, 2611, 5012, 11159, 7515 ]
Test
7,305
3
Motorola_68040:motorola 68040 motorola 68040 sixty-eight-oh-forty 32-bit microprocessor motorola released 1990 successor 68030 followed 68060 68050 keeping general motorola naming 68040 often referred simply '040 pronounced oh-four-oh oh-forty apple macintosh computers 68040 introduced macintosh quadra named chip fastest 68040 processor clocked 40 mhz used quadra 840av expensive models short-lived macintosh centris line also used 68040 cheaper quadra centris macintosh performa used 68lc040 68040 also used personal computers amiga 4000 amiga 4000t well number workstations alpha microsystems servers hp 9000/400 series later versions next computer 68040 first 680x0 family member on-chip floating-point unit fpu thus included functionality previously required external chips namely fpu memory management unit mmu added 68030 also split instruction data caches 4 kilobytes fully pipelined six stages unfortunately 68040 ran transistor budget limit early design mmu take many transistors—indeed die cpu actually saved transistors—the fpu certainly motorola 68882 external fpu known high performance unit motorola wish risk integrators using lc version 68882 instead profitable full rc unit information motorola multiprocessing model 680x0 series see motorola 68020 fpu 68040 thus made incapable ieee transcendental functions supported 68881 68882 used popular fractal generating software time little else motorola floating point support package fpsp emulated instructions software interrupt exception handler heavy use transcendental functions caused severe performance penalties heat always problem throughout 68040 life delivered four times per-clock performance 68020 68030 chip complexity power requirements came large die large caches affected scaling processor never able run clock rate exceeding 40 mhz 50 mhz variant planned canceled overclocking enthusiasts reported success reaching 50 mhz using 100 mhz oscillator instead 80 mhz part novel technique adding oversized heat sinks fans 68040 offered features intel 80486 clock-for-clock basis could significantly outperform intel chip integer floating point instructions however 80486 ability clocked significantly faster without suffering overheating problems late 1991 higher-end macintosh desktop lineup transitioned '040 apple unable offer newer processor top-of-the-line powerbooks early 1994 powerbooks restricted 68030s several years macworld reviewers conceded best choice power users pc-compatible texas instruments 80486 notebook rather top-of-the-line powerbook 180 versions 68040 created specific market segments including 68lc040 removed fpu 68ec040 removed fpu mmu motorola intended ec variant embedded use embedded processors 68040 time need power 68040 ec variants 68020 68030 continued common designs motorola produced several speed grades 16 mhz 20 mhz parts never qualified xc designation used prototyping samples 25 mhz 33 mhz grades featured across whole line around 2000 40 mhz grade full 68040 planned 50 mhz grade canceled exceeded thermal design envelope information instructions architecture see motorola 68000 68ec040 version motorola 68040 microprocessor intended embedded controllers ec differs 68040 neither fpu mmu makes less expensive draws less power 68ec040 used cisco switch supervisor engine heart models 2900 2948g 2980g 4000 4500 5000 5500 6000 6500 7600 68lc040 low cost version motorola 68040 microprocessor fpu makes less expensive draws less power although cpu fits feature chart like motorola 68030 continues include 68040 caches pipeline thus significantly faster 68030 mask revisions 68lc040 contained bug prevents chip operating correctly software fpu emulator used according motorola errata chip mask set 2e71m later contain bug new mask introduced mid-1995 converted 68lc040 chip mc status buggy revisions typically found 68lc040-based apple macintosh computers chips mask set 2e23g used lc 475 confirmed faulty fault relates pending writes lost f-line exception triggered 68040 update microcode manner modern x86 chips means way use software requires floating-point functionality replace buggy 68lc040 later revision full 68040 atc address translation cache
[ 7299, 3844, 4868, 1158, 7173, 7302, 3977, 7305, 3467, 1548, 6283, 10501, 4879, 5264, 6415, 2839, 2073, 7065, 8222, 7842, 8102, 5297, 11314, 1461, 10365, 11447, 1592, 8761, 6715, 8893, 1983, 576, 10945, 5058, 3017, 8523, 2638, 336, 8530, 3...
Test
7,306
4
BigFix_Inc:bigfix inc bigfix inc. american company focusing managing networked desktop mobile server computers origins personal computer self-help application company ’ products expanded on-demand endpoint management services include asset inventory/discovery security vulnerability detection remediation software distribution information technology compliance reporting patch management software license management security policy enforcement endpoint device power consumption management founded 1997 bigfix inc. headquartered emeryville california july 1 2019 hcl technologies completed acquisition bigfix ibm previously acquired bigfix undisclosed amount ibm changed name bigfix product ibm tivoli endpoint manager tem shortened name ibm endpoint manager iem 2013 ibm changed name back ibm bigfix july 7 2015 bigfix inc. founded david hindawi david donoho april 1997 emeryville california company ’ initial product user self-service system management application marketed oem pc manufacturers 2002 company developed bigfix software company-wide networked desktop mobile server computer management shifted focus company consumer enterprise markets initial uses centered security patch management identified significant pain point time enterprise departments 2007 bigfix expanded specific management areas security threat suppression bigfix endpoint protection enterprise security configuration management bigfix security configuration vulnerability management enterprise systems management bigfix systems lifecycle management 2009 bigfix entered exclusive partnership trend micro markets included banking financial services manufacturing government education healthcare customers included pitney bowes stanford university suntrust bank miami-dade county public schools us department energy july 20 2010 ibm acquired bigfix inc. approximately 400 million integrated bigfix product tivoli software portfolio new name ibm tivoli endpoint manager tem march 5 2013 ibm tivoli endpoint manager renamed ibm became ibm endpoint manager iem july 7 2015 ibm changed name ibm endpoint manager back ibm bigfix december 7 2018 hcl technologies announced acquisition ibm bigfix acquisition closed july 1 2019
[ 1282, 3323, 9850, 127 ]
None
7,307
2
OpenStep:openstep openstep defunct object-oriented application programming interface api specification legacy object-oriented operating system basic goal offering nextstep-like environment non-nextstep operating systems openstep principally developed next sun microsystems allow advanced application development sun operating systems specifically solaris next produced version openstep mach-based unix stylized openstep well version windows nt software libraries shipped openstep superset original openstep specification including many features original nextstep taligent considered venerable competitor operating system object markets microsoft cairo least consideration even without product releases either taligent theoretical newness often compared next older mature commercially established platform sun microsystems held exploratory meetings taligent deciding upon building object application framework openstep partnership next preemptive move taligent cairo bud tribble founding designer macintosh nextstep sunsoft vice president object products lead decision included 10 million investment sun next deal described first unadulterated piece good news next community last four years openstep api created result 1993 collaboration next sun microsystems allowing cut-down version nextstep operating system object layers run sun solaris operating system specifically solaris sparc-based hardware openstep effort strip away portions nextstep depended mach next-specific hardware present resulted smaller system consisted primarily display postscript objective-c runtime compilers majority nextstep objective-c libraries included basic operating system lower-level display system steve jobs said ahead today race far ... 1996 cairo close behind taligent far behind sun ceo scott mcnealy said insurance policy made firm one-company one-architecture decision like taligent getting trophy spouse signing hp first draft api published next mid 1994 later year released openstep compliant version nextstep openstep supported several platforms well sun sparc systems next submitted openstep specification industry object standards bodies official openstep api published september 1994 first split api foundation application kit first use ns prefix early versions nextstep use nx prefix contain application kit relying standard unix libc types low-level data structures openstep remained next primary operating system product purchased apple computer 1997 openstep combined technologies existing classic mac os produce mac os x. iphone ipad ios also descendant openstep targeted touch devices sun originally adopted openstep environment intent complementing sun corba-compliant object system solaris neo formerly known project doe providing object-oriented user interface toolkit complement object-oriented corba plumbing port involved integrating openstep appkit display postscript layer sun x11 server making appkit tolerant multi-threaded code project doe inherently heavily multi-threaded implementing solaris daemon simulate behavior mach ports extending sunpro c++ compiler support objective-c using next objc runtime writing x11 window manager implement nextstep look feel much possible integrating next development tools project builder interface builder sunpro compiler order provide complete end-user environment sun also ported nextstep-3.3 versions several end-user applications including mail.app preview.app edit.app workspace manager dock openstep corba parts products later split neo released late 1995 without openstep environment march 1996 sun announced joe product integrate neo java sun shipped beta release openstep environment solaris july 22 1996 made freely available download august 1996 non-commercial use sale september 1996 openstep/solaris shipped sparc architecture openstep differs nextstep various ways openstep api specification defines three major components foundation kit software framework application kit gui graphics front-end display postscript 2d graphics system drawing windows graphics screen standardization openstep also allowed creation several new library packages delivered openstep platform unlike operating system whole packages designed run stand-alone practically operating system idea use openstep code basis network-wide applications running across different platforms opposed using corba system primary among packages portable distributed objects pdo pdo essentially even stripped version openstep containing foundation kit technologies combined new libraries provide remote invocation little code unlike openstep defined operating system applications would run pdo libraries compiled application creating stand-alone native application particular platform pdo small enough easily portable versions released major server vendors mid-1990s next staff took writing solutions various corba magazine articles lines code whereas original article would fill several pages even though using pdo required installation considerable amount supporting code objective-c libraries pdo applications nevertheless considerably smaller similar corba solutions typically one-half one-third size similar d'ole provided types services presented resulting objects com objects goal allowing programmers create com services running high-powered platforms called microsoft windows applications instance one could develop high-powered financial modeling application using d'ole call directly within microsoft excel d'ole first released ole communicated applications running single machine pdo enabled next demonstrate excel talking microsoft applications across network microsoft able implement functionality dcom another package developed openstep enterprise objects framework eof tremendously powerful time object-relational mapping product eof became popular enterprise market notably financial sector openstep caused something minor revolution next first operating system nextstep sophisticated mach-unix based operating system originally ran next motorola 68k-based workstations ported run 32-bit intel x86-based ibm-compatible personal computers pa-risc-based workstations hewlett-packard sparc-based workstations sun microsystems next completed implementation openstep existing mach-based os called openstep mach 4.0 july 1996 4.1 december 1996 4.2 january 1997 intents nextstep 4.0 still retained flagship nextstep technologies dps unix underpinnings user interface characteristics like dock shelf retained classic nextstep user interface styles openstep mach improved comparison nextstep 3.3 vastly improved driver support – however environment actually write drivers changed introduction object-oriented driverkit openstep mach supported intel x86-based pc sun sparc workstations next 68k-based architectures hp pa-risc version dropped versions continued run underlying mach-based os used nextstep openstep mach became next primary os 1995 used mainly intel platform addition complete openstep implementation system delivered complete set nextstep libraries backward compatibility easy thing openstep due library versioning openstep suffer bloat addition openstep mach port sparc sun next developed openstep compliant set frameworks run sun solaris operating system developing solaris openstep sun lost interest openstep shifted attention toward java virtual machine development environment java served direct competitor openstep next also delivered implementation running top windows nt 4.0 called openstep enterprise often abbreviated ose unintentional demonstration true nature portability programs created openstep specification programs openstep mach could ported ose little difficulty allowed existing customer base continue using tools applications running windows many process switching never clean match ui perspective probably due openstep routing window graphics display postscript server—which also ported windows—ose nevertheless managed work fairly well extended openstep commercial lifespan openstep ose two revisions one major one never released next purchased apple 1997 acquiring next apple intended ship rhapsody reworked version openstep mach mac standard pcs rhapsody openstep mach copland appearance mac os 8 support java apple technologies including colorsync quicktime could regarded openstep 5 two developer versions rhapsody released known developer preview 1 2 ran limited subset intel powerpc hardware mac os x server 1.0 first commercial release operating system delivered exclusively powerpc mac hardware replacing display postscript windowserver quartz responding developers including better backward compatibility classic mac os applications addition carbon apple released mac os x mac os x server starting version 10.0 mac os x named macos macos primary programming environment essentially openstep certain additions xml property lists url classes internet connections macos ports development libraries tools called cocoa macos since become single popular desktop unix-like operating system world although macos longer openstep compliant operating system gnustep free software implementation next libraries began time nextstep predating openstep openstep ose purchased apple effectively ended commercial development implementing openstep platforms gnustep ongoing open source project aiming create portable free software implementation cocoa/openstep libraries gnustep also features fully functional development environment reimplementations newer innovations macos cocoa framework well extensions api
[ 9732, 5677, 8754, 9784, 8767, 576, 8774, 6234, 9308, 3167, 8303, 8304, 2676, 7806, 1666, 2179, 8844, 6797, 11420, 11426, 10406, 168, 3241, 5292, 5294, 3248, 11440, 3250, 11447, 3286, 4310, 10470, 6377, 2282, 9452, 8944, 242, 2804, 11513, ...
Validation
7,308
9
PLEXIL:plexil plexil plan execution interchange language open source technology automation created currently development nasa plexil programming language representing plans automation 2006 vandi verma one several co-writers plexil used automation technologies nasa k10 rover mars curiosity rover percussion drill deep space habitat habitat demonstration unit edison demonstration smallsat networks ladee autonomy operating system aos procedure automation international space station plexil executive execution engine implements plexil interfaced using provided software framework external systems controlled and/or queried plexil used demonstrate automation technologies targeted future nasa space missions binaries documentation widely available open source sourceforge.net fundamental programming unit plexil node node data structure formed two primary components set conditions drive execution node another set specifies node accomplishes execution hierarchical composition nodes called plan plan tree divided nodes close root high level nodes leaf nodes represent primitive actions variable assignments sending commands external system node types september 2008 nasa implemented seven types nodes node states node one state nodes transitions
[ 9345, 8262, 11625, 4782, 7983, 5680, 823 ]
Test
7,309
5
Video_Acceleration_API:video acceleration api video acceleration api va api royalty-free api well implementation free open-source library libva distributed mit license va api implemented device drivers offer end-user software vlc media player gstreamer access available video acceleration hardware purevideo libva-vdpau driver implements va api terms vdpau unified video decoder api enables provides access hardware-accelerated video processing using hardware graphics processing units gpu accelerate video encoding decoding offloading processing central processing unit cpu va api video decode/encode interface platform window system independent primarily targeted direct rendering infrastructure dri x window system unix-like operating systems including linux freebsd solaris android however potentially also used direct framebuffer graphics sub-systems video output accelerated processing includes support video decoding video encoding subpicture blending rendering va api specification originally designed intel gma graphics media accelerator series gpu hardware specific purpose eventually replacing xvmc standard default unix multi-platform equivalent microsoft windows directx video acceleration dxva api today api longer limited intel-specific hardware gpus hardware manufacturers freely use open standard api hardware accelerated video processing hardware without paying royalty fee main motivation va api enable hardware-accelerated video decode various entry-points vld idct motion compensation deblocking prevailing coding standards today mpeg-2 mpeg-4 asp/h.263 mpeg-4 avc/h.264 h.265/hevc vc-1/wmv3 extending xvmc considered due original design mpeg-2 motioncomp made sense design interface scratch fully expose video decode capabilities today gpus january 17 2012 va api natively supported va api currently supports video codecs official mainline version note exactly video codecs supported depends hardware driver capabilities video decoding post-processing processes offloaded accelerated device drivers gpu hardware supports current interface window system independent potentially used graphics sub-systems dri direct rendering infrastructure x window system direct framebuffer work third-party drm direct rendering manager libraries nutshell scheme pass various types data buffers application gpu decoding encoding compressed bit-stream
[ 9223, 5386, 2955, 7442, 10658, 8995, 4902, 6694, 429, 8621, 7983, 1842, 3764, 823, 11322, 9151, 6981, 3537, 3033, 11485, 1770, 5867, 1644, 8682, 8685, 9579, 1776, 2804, 5492, 8438, 2045 ]
Test
7,310
1
Butler_SQL:butler sql butler sql now-defunct sql-based database server classic mac os everyware development much history partnered another everyware product tango built dynamic database pages sql data product eventually ended pervasive software although longer sold butler introduced take advantage new mac os component known data access manager dam similar concept odbc allowing end-user client programs access various data sources dam however worked lower level odbc contain inherent query language address concern single dam program might want work different back-end databases apple used second system known data access language dal variant sql included additional flow-control data manipulation instructions dal queries converted target database using adaptor server butler written natively support dal variant sql use dam internally support networking avoided several intermediary layers would required use queries database servers butler 2.0 released may 1996 added direct odbc links well butler suffered performance problems due single-user nature mac os particular file access single-threaded multitasking coordinated applications operating system
[ 10413, 10518 ]
None
7,311
3
SGI_Visual_Workstation:sgi visual workstation sgi visual workstation series workstation computers designed manufactured sgi unlike product lines used 64-bit mips risc architecture line used intel pentium ii iii processors shipped windows nt 4.0 windows 2000 operating system lieu irix however visual workstation 320 540 models deviated architecture ibm-compatible pcs using sgi arcs firmware instead traditional bios internal components adapted mips-based products proprietary components made incompatible internal hardware designed standard pcs hence unable run versions microsoft windows especially windows 9x contrast remaining models line standard pcs using via technologies chipsets nvidia video cards standard components two series visual workstations based intel processors first series 320 540 used sgi arcloader prom cobalt video chipset remainder essentially standard pc 320 540 use unified memory architecture uma memory system shares video system memory runs speed allows 80 percent system ram applied video memory allocation static however adjusted via profile 320 540 also use onboard cobalt video adapter sgi proprietary graphics chipset firmware used systems prom enables booting graphical subsystem os loaded regard resemble irix/mips line sgi computers sgi o2 320 540 also stand firewire ieee 1394 ports onboard composite/s-video capture usb keyboards mice differ 320 dual pentium ii/iii-capable 1gb maximum system ram 540 quad pentium iii xeon-capable 2gb maximum system ram computers use proprietary dimm module essentially ecc sdram pc-100 package one-half normal size maximum memory per module 96mb sgi 320 twelve memory slots firewire ports built 320 never functioned sgi distributed orange micro firewire cards year production commenced lieu fixing firewire ports 320 540 limited pci slots albeit two 66 mhz one 33 mhz slot operated 3.3v step 5v slots used manufacturers limits number accessories added visual workstations built compete new intel processor based workstations considerably cheaper sgi line mips workstations little standard pcs use many parts also available aftermarket 320 540 visual workstations shipped originally microsoft windows nt 4.0 due arcloader prom custom hardware abstraction layer hal windows necessary windows 2000 last release included required sgi-specific hal sgi ceased supporting visual workstation series installation later windows versions xp unsupported 230 330 550 also supported windows nt 2000 addition sgi offered systems pre-loaded release 6.2 red hat linux distribution systems letter l appended model numbers various sgi enhancements particular 320 540 visual workstations often out-perform intel pcs similar configuration graphically-intensive memory bound applications however due hefty upgrade costs non-standard components cost effective purchase entire new higher-spec non-sgi pc rather purchase upgrades visual workstation visual workstations support conventional crt monitors vga display connectors 230 330 550 models use nvidia quadro cards also support dvi sgi 320 540 models shipped groundbreaking stylistically matched 1600sw lcd display using openldi display connector requires accessory flat panel adapter sgi o2 also supports 1600sw adapter model numbers visual workstations visual workstations initially equipped either single pentium ii pentium iii processor dual smp pentium iii processors 540 550 models support xeon implementation pentium series could support four xeons smp configuration two 550 although sgi visual workstation ever released cpu running higher 700 mhz hobbyists able run faster processors sgi 320 limit dual 1 ghz pentium iii processors single 1.4 ghz celeron dual 1 ghz processors require specific model cpu intended intel servers voltage regulator prom revision motherboard also correct setup work single processors powerleap pl-ip3t slocket adapter tualatin 1.4 ghz celeron processor limit straight bolt-in installation tualatin core gives modern processor powerleap adapter handles voltage regulation cpu sgi 540 reported handle 900 mhz quad xeon processors fastest pentium 3 xeons 100 mhz front side bus speed 540 230 330 550 models essentially standard pcs capabilities upgrade limits pcs time 230 330 based via chipsets used socket 370 processors conventional sdram 550 used slot 2 xeon processors intel 840 chipset rdram three models generic pc bios generic pc memory non-differentiated parts video cards systems used nvidia agp cards based quadro 2 chipset differ aftermarket quadros drivers
[ 5380, 9353, 5898, 6797, 5523, 2452, 5272, 6942, 6697, 3883, 3250, 3764, 7093, 11447, 7234, 10051, 3911, 6858, 9932, 5076, 7001, 2909, 221, 6243, 1515, 108, 5356, 6129, 1398, 2811, 1149 ]
Test
7,312
2
Object_access_method:object access method object access method oam access method z/os designed storage large numbers large files images number distinguishing features e.g compared vsam oam used conjunction db2 example use case oam would storing medical images db2 database running z/os oam created 1980s prototype product insurance company replace microfiche initially oam supported optical storage magnetic disks 1990s support magnetic tape added 2011 support added storage objects z/os unix file system—either zfs nfs 1990s object access method used canadian intellectual property office store documents related patent processing
[ 868, 7272, 1801, 2616, 4586, 8393, 10094, 10958, 3669, 2168, 11131 ]
Validation
7,313
3
Hyper-threading:hyper-threading hyper-threading officially called hyper-threading technology ht technology abbreviated htt ht intel proprietary simultaneous multithreading smt implementation used improve parallelization computations multiple tasks performed x86 microprocessors first appeared february 2002 xeon server processors november 2002 pentium 4 desktop cpus later intel included technology itanium atom core series cpus among others processor core physically present operating system addresses two virtual logical cores shares workload possible main function hyper-threading increase number independent instructions pipeline takes advantage superscalar architecture multiple instructions operate separate data parallel htt one physical core appears two processors operating system allowing concurrent scheduling two processes per core addition two processes use resources resources one process available another process continue resources available addition requiring simultaneous multithreading smt support operating system hyper-threading properly utilized operating system specifically optimized furthermore intel recommends htt disabled using operating systems unaware hardware feature hyper-threading technology form simultaneous multithreading technology introduced intel concept behind technology patented sun microsystems architecturally processor hyper-threading technology consists two logical processors per core processor architectural state logical processor individually halted interrupted directed execute specified thread independently logical processor sharing physical core unlike traditional dual-processor configuration uses two separate physical processors logical processors hyper-threaded core share execution resources resources include execution engine caches system bus interface sharing resources allows two logical processors work efficiently allows logical processor borrow resources stalled logical core assuming logical cores associated physical core processor stalls waiting data sent finish processing present thread degree benefit seen using hyper-threaded multi core processor depends needs software well operating system written manage processor efficiently hyper-threading works duplicating certain sections processor—those store architectural state—but duplicating main execution resources allows hyper-threading processor appear usual physical processor extra logical processor host operating system htt-unaware operating systems see two physical processors allowing operating system schedule two threads processes simultaneously appropriately execution resources would used current task processor without hyper-threading especially processor stalled hyper-threading equipped processor use execution resources execute another scheduled task processor may stall due cache miss branch misprediction data dependency technology transparent operating systems programs minimum required take advantage hyper-threading symmetric multiprocessing smp support operating system logical processors appear standard separate processors possible optimize operating system behavior multi-processor hyper-threading capable systems example consider smp system two physical processors hyper-threaded total four logical processors operating system thread scheduler unaware hyper-threading treat four logical processors two threads eligible run might choose schedule threads two logical processors happen belong physical processor processor would become extremely busy would idle leading poorer performance possible scheduling threads onto different physical processors problem avoided improving scheduler treat logical processors differently physical processors sense limited form scheduler changes required numa systems first published paper describing known hyperthreading general purpose computer stanford ph.d. dissertation 1973 denelcor inc. introduced multi-threading heterogeneous element processor hep 1982 hep pipeline could hold multiple instructions process one instruction given process allowed present pipeline point time instruction given process block pipe instructions processes would continue pipeline drained us patent technology behind hyper-threading granted kenneth okin sun microsystems november 1994 time cmos process technology advanced enough allow cost-effective implementation intel implemented hyper-threading x86 architecture processor 2002 foster mp-based xeon also included 3.06 ghz northwood-based pentium 4 year remained feature every pentium 4 ht pentium 4 extreme edition pentium extreme edition processor since previous generations intel processors based core microarchitecture hyper-threading core microarchitecture descendant p6 microarchitecture used iterations pentium since pentium pro pentium iii celeron covington mendocino coppermine tualatin-based pentium ii xeon pentium iii xeon models intel released nehalem core i7 november 2008 hyper-threading made return first generation nehalem contained four cores effectively scaled eight threads since two- six-core models released scaling four twelve threads respectively earlier intel atom cores in-order processors sometimes hyper-threading ability low power mobile pcs low-price desktop pcs itanium 9300 launched eight threads per processor two threads per core enhanced hyper-threading technology next model itanium 9500 poulson features 12-wide issue architecture eight cpu cores support eight virtual cores via hyper-threading intel xeon 5500 server chips also utilize two-way hyper-threading according intel first hyper-threading implementation used 5 die area comparable non-hyperthreaded processor performance 15–30 better intel claims 30 performance improvement compared otherwise identical non-simultaneous multithreading pentium 4 tom hardware states cases p4 running 3.0 ghz ht even beat p4 running 3.6 ghz ht turned intel also claims significant performance improvements hyper-threading-enabled pentium 4 processor artificial-intelligence algorithms overall performance history hyper-threading mixed one beginning one commentary high-performance computing november 2002 notes hyper-threading improve performance mpi applications depending cluster configuration importantly nature application running cluster performance gains vary even negative next step use performance tools understand areas contribute performance gains areas contribute performance degradation result performance improvements application-dependent however running two programs require full attention processor actually seem like one programs slows slightly hyper-threading technology turned due replay system pentium 4 tying valuable execution resources equalizing processor resources two programs adds varying amount execution time pentium 4 prescott xeon nocona processors received replay queue reduces execution time needed replay system completely overcomes performance penalty according november 2009 analysis intel performance impacts hyper-threading result increased overall latency case execution threads result significant overall throughput gains vary application words overall processing latency significantly increased due hyper-threading negative effects becoming smaller simultaneous threads effectively use additional hardware resource utilization provided hyper-threading similar performance analysis available effects hyper-threading used handle tasks related managing network traffic processing interrupt requests generated network interface controllers nics another paper claims performance improvements hyper-threading used interrupt handling first ht processors released many operating systems optimized hyper-threading technology e.g windows 2000 linux older 2.4 2006 hyper-threading criticised energy inefficiency example specialist low-power cpu design company arm stated simultaneous multithreading smt use 46 power ordinary dual-core designs furthermore claimed smt increases cache thrashing 42 whereas dual core results 37 decrease intel disputed claim stating hyper-threading highly efficient uses resources would otherwise idle underutilised 2010 arm said might include simultaneous multithreading future chips however rejected favor 2012 64-bit design 2013 intel dropped smt favor out-of-order execution silvermont processor cores found gave better performance better power efficiency lower number cores smt 2017 revealed intel skylake kaby lake processors bug implementation hyper-threading could cause data loss microcode updates later released address issue 2019 coffee lake intel began move away including hyper-threading mainstream core i7 desktop processors except highest-end core i9 parts pentium gold gpus also started recommending disabling hyper-threading new cpu vulnerability attacks revealed could mitigated disabling ht may 2005 colin percival demonstrated malicious thread pentium 4 use timing attack monitor memory access patterns another thread shares cache allowing theft cryptographic information potential solutions include processor changing cache eviction strategy operating system preventing simultaneous execution physical core threads different privileges 2018 openbsd operating system disabled hyper-threading order avoid data potentially leaking applications software caused foreshadow/l1tf vulnerabilities 2019 set vulnerabilities led security experts recommending disabling hyperthreading devices
[ 7173, 9224, 9739, 4108, 5649, 2066, 7699, 5655, 10779, 10781, 6181, 8231, 6184, 3630, 6705, 7218, 2623, 2113, 7234, 3142, 2638, 8273, 2140, 1119, 1122, 4194, 3175, 7783, 4204, 8815, 8820, 630, 8822, 4217, 7802, 8315, 6268, 3197, 6804, 885...
None
7,314
3
The_Dam_Busters_(video_game):dam busters video game dam busters combat flight simulator set world war ii published u.s. gold 1984 loosely based real life operation chastise 1955 film game released 1984 colecovision commodore 64 1985 apple ii ms-dos msx zx spectrum 1986 amstrad cpc nec pc-9801 choose three different night missions increasingly difficult three goal successfully bomb dam practice run approach bomb dam without obstacles two missions feature various enemies overcome start either french coast british airfield flight control every aspect bomber seven crew positions pilot front gunner tail gunner bomb aimer navigator engineer squadron leader leaving positions unattended event could spell death person position rendering useless encounters must evade enemies plan approach set variables speed height timing etc execute successful bombing sometimes becomes necessary deal emergencies engine fires en route target expect encounter attacks enemy aircraft barrage balloons flak enemy searchlights events like flash along border screen indictating key press take station need assistance example flying enemy search lights 'll need man gunner station shoot lights ground left unattended expect flak enemy aircraft start damaging bomber begin final run target presented custom bombing sights made famous story toggle bomb shown animation bomb bouncing along lake hitting hitting target dam info rated dam busters commodore 64 three-plus stars five stating lacks depth variability game like silent service better average graphics play features computer gaming world gave dam busters two five points overview world war ii simulations stating product graphics 'feel make much game enough simulation
[ 2776, 10931, 9166, 9006 ]
None
7,315
3
Raft_(computer_science):raft computer science raft consensus algorithm designed alternative paxos meant understandable paxos means separation logic also formally proven safe offers additional features raft offers generic way distribute state machine across cluster computing systems ensuring node cluster agrees upon series state transitions number open-source reference implementations full-specification implementations go c++ java scala named reliable replicated redundant fault-tolerant raft byzantine fault tolerant algorithm nodes trust elected leader raft achieves consensus via elected leader server raft cluster either leader follower candidate precise case election leader unavailable leader responsible log replication followers regularly informs followers existence sending heartbeat message follower timeout typically 150 300 ms expects heartbeat leader timeout reset receiving heartbeat heartbeat received follower changes status candidate starts leader election raft implements consensus leader approach cluster one one elected leader fully responsible managing log replication servers cluster means leader decide new entries placement establishment data flow servers without consulting servers leader leads fails disconnects case new leader elected consensus problem decomposed raft two relatively independent subproblems listed existing leader fails start algorithm new leader needs elected case new term starts cluster term arbitrary period time server new leader needs elected term starts leader election election completed successfully i.e single leader elected term keeps going normal operations orchestrated new leader election failure new term starts new election leader election started candidate server server becomes candidate receives communication leader period called election timeout assumes acting leader anymore starts election increasing term counter voting new leader sending message servers requesting vote server vote per term first-come-first-served basis candidate receives message another server term number least large candidate current term candidate election defeated candidate changes follower recognizes leader legitimate candidate receives majority votes becomes new leader neither happens e.g. split vote new term starts new election begins raft uses randomized election timeout ensure split votes problem resolved quickly reduce chance split vote servers wo n't become candidates time single server timeout win election become leader sends heartbeat messages servers followers become candidates leader responsible log replication accepts client requests client request consists command executed replicated state machines cluster appended leader log new entry requests forwarded followers appendentries messages case unavailability followers leader retries appendentries messages indefinitely log entry eventually stored followers leader receives confirmation majority followers entry replicated leader applies entry local state machine request considered committed event also commits previous entries leader log follower learns log entry committed applies entry local state machine ensures consistency logs servers cluster ensuring safety rule log matching respected case leader crash logs left inconsistent logs old leader fully replicated cluster new leader handle inconsistency forcing followers duplicate log followers leader compare log log follower find last entry agree delete entries coming critical entry follower log replace log entries mechanism restore log consistency cluster subject failures raft guarantees safety properties first four rules guaranteed details algorithm described previous section state machine safety guaranteed restriction election process rule ensured simple restriction candidate ca n't win election unless log contains committed entries order elected candidate contact majority cluster given rules logs committed means every committed entry going present least one servers candidates contact raft determines two logs carried two distinct servers up-to-date comparing index term last entries logs logs last entry different terms log later term up-to-date logs end term whichever log longer up-to-date raft request candidate voter includes information candidate log log up-to-date candidate log voter denies vote candidate implementation ensures state machine safety rule follower crashes appendentries vote requests sent servers fail failures handled servers trying indefinitely reach downed follower follower restarts pending requests complete request already taken account failure restarted follower ignore timing critical raft elect maintain steady leader time order perfect availability cluster stability ensured respecting timing requirement algorithm broadcasttime « electiontimeout « mtbf typical number values 0.5ms 20ms broadcasttime implies set electiontimeout somewhere 10ms 500ms take several weeks months single server failures means values right stable cluster work https //groups.google.com/forum/ topic/raft-dev/95rzqptgpmu
[ 3267, 7499, 4781, 5677, 7085, 3705, 7409, 8025, 121, 1435, 11612, 2910 ]
Test
7,316
3
Bit_Test:bit test codice_1 x86 assembly language instruction stands bit test added x86 instruction set 80386 processor codice_1 copies bit given register carry flag example copy third least significant bit eax carry flag codice_3 bit test set operates also sets bit register codice_4 bit test reset resets codice_5 bit test complement flips
[ 1915, 6596, 9911 ]
Validation
7,317
2
Mark_Zbikowski:mark zbikowski mark zibo joseph zbikowski born march 21 1956 former microsoft architect early computer hacker started working company years inception leading efforts ms-dos os/2 cairo windows nt 2006 honored 25 years service company third employee reach milestone bill gates steve ballmer designer ms-dos executable file format headers file format start initials ascii characters 'mz 0x4d 0x5a zbikowski born detroit michigan 1956 attending roeper school known roeper city country school 1961 1974 developed interest mathematics computers 8th-grade performance michigan mathematics prize competition led invitation nsf-funded summer program oakland university became friends microsoft steve ballmer jeff sachs zbikowski pursued computer science harvard a.b 1978 yale s.m 1979 active universities gilbert sullivan performing groups ballmer recruited zbikowski joined microsoft 1981 march 1982 replaced tim paterson development lead manager microsoft ms-dos 2.0 position held dos 4.0 first major contributions addition hierarchical directory structure dos 2.0 installable device drivers march 1985 1991 architecture team os/2 development manager file systems device drivers technical advisor paul maritz breakthrough concept installable file system os/2 attributed following demise microsoft/ibm joint development agreement architect development manager key contributor cairo working jim allchin later anthony short led cairo object file system content index efforts 1996 cairo migrated standalone product technology source zbikowski worked lou perazzoli windows nt kernel focusing performance size becoming architect development manager nt file systems 1998 2001 zbikowski candidate director harvard alumni association zbikowski retired microsoft june 2006 due interest education became affiliated 2007 university washington lecturer computer science engineering department college engineering mark zbikowski affiliated following companies __notoc__
[ 5600, 9762, 3235, 6148, 2055, 6921, 9995, 8301, 9166, 3323, 8976, 8115, 9907, 8986, 2811, 2942, 1791 ]
Test
7,318
7
Xgrid:xgrid xgrid proprietary program distributed computing protocol developed advanced computation group subdivision apple inc allows networked computers contribute single task provides network administrators method creating computing cluster allows exploit previously unused computational power calculations divided easily smaller operations mandelbrot maps setup xgrid cluster achieved next cost xgrid client pre-installed computers running mac os x 10.4 mac os x 10.7 xgrid client included mac os x 10.8 xgrid controller job scheduler xgrid operation also included within mac os x server free download apple apple kept command-line job control mechanism minimalist providing api develop sophisticated tools built around program employs communication protocol layered top schema communicate nodes communication protocol interfaces beep infrastructure network application protocol framework computers discovered xgrid system computers mac os x xgrid service enabled automatically added list available computers use processing tasks initiating computer sends complete instructions job processing controller controller splits task small instruction packets known tasks design xgrid system consists small packets transferred xgrid-enabled computers network computers nodes execute instructions provided controller return results controller assembles individual task results whole job results returns initiating computer apple modeled design xgrid zilla program distributed next openstep operating system application programming interface api apple owned rights company also opted provide client version mac os x command-line functions little flexibility giving mac os x server version xgrid gui control panel full set features xgrid original concept traced back zilla.app found openstep operating system created next late 1980s zilla first distributed computing program released end-user operating system used idle screen-saver motif design feature since found widely used projects seti home distributed.net zilla national computerworld smithsonian award science category 1991 ease use good design apple acquired zilla along rest next 1997 later used zilla inspiration xgrid first beta version xgrid released january 2004 several organizations adopted xgrid large international computing networks one example xgrid cluster macresearch openmacgrid scientists request access large amounts processing power run tasks related research another defunct xgrid stanford project used range computers stanford university campus around world perform biochemical research pre-release promotional piece macworld cited xgrid among unix features 10 things know tiger calling handy work huge amounts experimental data render complex animations xgrid introduction 2004 infoworld noted 'preview grade technology would directly benefit xserve g5 launch later year infoworld commentator ephraim schwartz also predicted xgrid opening move apple entry enterprise computing market apple discontinued xgrid os x v10.8 mountain lion along dependent services podcast producer xgrid protocol uses beep network framework communicate nodes network system infrastructure includes three types computers communicate protocol one client communicates calculation next controller starts segregates calculation finally agents process allocated part calculation computer act one three components time xgrid protocol provides basic infrastructure computers communicate involved processing specified calculation xgrid targeted towards time consuming computations easily segregated smaller tasks sometimes called embarrassingly parallel tasks includes monte carlo calculations 3d rendering mandelbrot maps within xgrid protocol three types messages passed computers cluster requests notifications replies requests must responded recipient reply notifications require reply replies responses sent messages identified name type request/notification/reply contents message encapsulated beep message beep msg acknowledged receipt empty reply rpy xgrid leverage beeps message/reply infrastructure received message requires response merely generates independent beep message containing reply xgrid messages encoded dictionaries key/value pairs converted xml sent across beep network architecture xgrid system designed around job based system controller sends agents jobs agents return responses actual computation controller executes xgrid system known job job contains files required complete task successfully input parameters data files directories executables and/or shell scripts files included xgrid job must able executed either simultaneously asynchronously benefits running job xgrid lost job completes controller set notify client task completion failure example email client leave network tasks running also monitor job status demand querying controller although track ongoing progress individual tasks controller central correct function xgrid node responsible distribution supervision coordination tasks agents program running controller assign reassign tasks handle individual agent failures demand number tasks assigned agent depend two factors number agents xgrid number processors node number agents xgrid determines controller assign tasks tasks may assigned simultaneously large number agents queued small number agents node one processor detected xgrid controller may assign one task per processor occurs number agents network lower number tasks controller complete xgrid layered upon blocks extensible exchange protocol beep ietf standard comparable http focus two-way multiplexed communication found peer-to-peer networks beep turn uses xml define profiles communicating multiple agents single network internet connection possible access xgrid command line xgrid graphical user interface program bundled mac os x server march 2009 available online much efficient way administering xgrid system originally xgrid agent included mac os x version 10.4 installations gui reserved users mac os x server decision limited efforts computer community embrace platform eventually apple released mac os x server administration tools public included xgrid administration application bundled mac os x server despite lack graphical controller interface standard non-server mac os x distribution possible set xgrid controller via command line tools codice_1 codice_2 xgrid controller daemon running administration grid apple xgrid admin tool possible applications visualhub provided xgrid controller capability user interfaces
[ 4615, 5647, 1042, 6700, 4657, 1074, 9802, 5713, 3670, 4184, 2141, 4702, 2149, 8303, 6771, 2676, 7806, 9343, 3719, 10888, 11402, 10387, 8852, 1686, 3228, 2207, 1699, 168, 5292, 8877, 1710, 3766, 2232, 9912, 9406, 1729, 6849, 6855, 713, 941...
Test
7,319
2
PSOS_(real-time_operating_system):psos real-time operating system psos portable software silicon real time operating system rtos created 1982 alfred chao developed/marketed first part life company software components group scg 1980s psos rapidly became rtos choice embedded systems based motorola 68000 family architecture written 68000 assembler highly optimised start also modularised early support os-aware debugging plug-in device drivers tcp/ip stacks language libraries disk subsystems later came source-level debugging multi-processor support networking extensions 1991 software components group acquired integrated systems inc. isi developed psos restyled psos+ microprocessor families rewriting greater part c. attention also paid supporting successively integrated development environments culminating prism+ july 1994 integrated systems acquired digital research modular real-time multi-tasking operating system flexos novell 1995 integrated systems offered psosystem/nest package novell embedded systems technology nest february 2000 integrated systems inc. acquired wind river systems originators rival rtos vxworks despite initial reports psos support would continue development halted wind river announced plans 'convergence version vxworks support psos system calls releases psos made nxp semiconductors acquired psos trimedia wind river continued support os trimedia vliw core march 2000 rival company express logic released evaluation kit psos+ users designed provide migration path threadx rtos august 2000 mapusoft technologies inc. came psos os changer porting kit smoothly move software multiple os linux vxworks includes ide api optimization along profiling tool measure api timing target boards www.mapusoft.com august 2007 rowebots former partner scg isi open sourced psos+ compatible version called reliant available wish upgrade without applications changes xenomai project supports psos+ apis others traditional rtos apis linux-based real-time framework allow existing industrial applications migrate easily gnu/linux-based environment keeping stringent real-time guarantees another open sourced alternative rtems support various apis including classic api compatible psos posix api compared gnu/linux rtems closer match psos applications due lower memory footprint strict realtime behaviour popular ssl/tls libraries wolfssl still support psos
[ 2179, 6276, 10883, 9366, 7319, 2201, 9628, 10030, 11383, 6207, 321, 10561, 1221, 8262, 9927, 6985, 9162, 341, 10590, 6624, 5603, 5220, 1253, 1126, 7269, 4333, 10482, 5363, 6263 ]
Validation
7,320
8
SOAP-over-UDP:soap-over-udp soap-over-udp oasis standard covering publication soap messages udp transport protocol providing one-way request-response message patterns
[ 2501, 7878, 425, 8203, 10829, 4974, 4979, 11413, 10486, 6811, 2013, 7198 ]
Validation
7,321
8
Linked_data_page:linked data page linked data page web page explicitly describes one things objects via hyperdata links unlike traditional web page hypertext links hyperdata links expose properties attributes relationships property values associated things page linked data pages created hand generated dynamically via linked data server user agent single reference uri iri thing needed experience power serendipitous data discovery offered linked data page typical web page endowed links explicitly describe anything links simply expose unqualified associations documents web put differently linked data pages reveal explicit properties things basic web pages loosely anything requiring human interpretation reasoning order attain clarity
[ 53, 119 ]
Validation
7,322
4
PRODIGAL_(computer_system):prodigal computer system prodigal proactive discovery insider threats using graph analysis learning computer system predicting anomalous behavior among humans data mining network traffic emails text messages server log entries part darpa anomaly detection multiple scales adams project initial schedule two years budget 9 million uses graph theory machine learning statistical anomaly detection high-performance computing scan larger sets data quickly past systems amount data analyzed range terabytes per day targets analysis employees within government defense contracting organizations specific examples behavior system intended detect include actions nidal malik hasan wikileaks source chelsea manning commercial applications may include finance results analysis five serious threats per day go agents analysts operators working counterintelligence
[ 11330, 612, 7464, 5589, 7741 ]
Train
7,323
2
Zero_page:zero page zero page series memory addresses beginning computer address space page whose starting address zero size page depends context significance zero-page memory versus higher addressed memory highly dependent machine architecture example motorola 6800 mos technology 6502 processor families treat first 256 bytes memory specially whereas many processors actual size zero page bytes determined microprocessor design older designs often equal largest value referenced processor indexing registers example aforementioned 8-bit processors 8-bit index registers page size 256 bytes therefore zero page extends address 0 address 255 early computers including pdp-8 zero page special fast addressing mode facilitated use temporary storage data compensated relative shortage cpu registers pdp-8 one register zero page addressing essential unlike modern hardware 1970s computer ram fast faster cpu thus made sense registers use main memory extended pool extra registers since memory location within zero page 16-bit address bus computer may addressed single byte faster 8-bit data bus machines access location rather non-zero page location example mos technology 6502 one general purpose register accumulator result used zero page extensively many instructions coded differently zero page non-zero page addresses two instructions accomplish thing load value memory location 00 .a register accumulator however first instruction two bytes long requires three clock cycles complete second instruction three bytes length requires four clock cycles execute obviously difference execution time could significantly improve performance repetitive code zero page addressing mostly historical significance since developments integrated circuit technology made adding registers cpu less expensive cpu operations much faster ram accesses computer architectures still reserve beginning address space purposes though instance intel x86 systems reserve first 512 words address space interrupt table run real mode similar technique using zero page hardware related vectors employed arm architecture leading badly written programs infamous ofla behaviour program tries read information unintended memory area winds mistaking executable code text vice versa especially problem zero page area used store system jump vectors firmware tricked storing data fact quite contrary zero page original preferential use modern operating systems freebsd linux microsoft windows actually make zero page inaccessible trap uses null pointers useful null pointers method used represent value reference points nothing since code operating reference written assuming reference actually refers valid structure value catching case reference points nothing use since sure sign bug 8-bit cp/m zero page used communication running program operating system see zero page cp/m information
[ 11395, 1801, 6921, 6797, 8732, 5412, 6821, 7589, 2729, 9911, 823, 4409, 5457, 5080, 5598, 5862, 3050, 1776, 499 ]
Validation
7,324
4
HTTP_header_injection:http header injection http header injection general class web application security vulnerability occurs hypertext transfer protocol http headers dynamically generated based user input header injection http responses allow http response splitting session fixation via set-cookie header cross-site scripting xss malicious redirect attacks via location header http header injection relatively new area web-based attacks primarily pioneered amit klein work request/response smuggling/splitting
[ 10466, 5636, 4198, 7965, 5934, 119, 5724, 4797, 4095 ]
Test
7,325
2
Shell_(computing):shell computing computing shell user interface access operating system services general operating system shells use either command-line interface cli graphical user interface gui depending computer role particular operation named shell outermost layer around operating system kernel cli shells require user familiar commands calling syntax understand concepts shell-specific scripting language example bash also easily operated via refreshable braille display provide certain advantages screen readers graphical shells place low burden beginning computer users characterized easy use since also come certain disadvantages gui-enabled operating systems also provide cli shells operating systems provide various services users including file management process management running terminating applications batch processing operating system monitoring configuration operating system shells direct interfaces underlying kernel even shell communicates user via peripheral devices attached computer directly shells actually special applications use kernel api way used application programs shell manages user–system interaction prompting users input interpreting input handling output underlying operating system much like read–eval–print loop repl since operating system shell actually application may easily replaced another similar application operating systems addition shells running local systems different ways make remote systems available local users approaches usually referred remote access remote administration initially available multi-user mainframes provided text-based uis active user simultaneously means text terminal connected mainframe via serial line modem remote access extended unix-like systems microsoft windows unix-like systems secure shell protocol usually used text-based shells ssh tunneling used x window system–based graphical user interfaces guis microsoft windows remote desktop protocol used provide gui remote access since windows vista powershell remote used text-based remote access via wmi rpc ws-management operating system shells fall one two categories command-line graphical command line shells provide command-line interface cli operating system graphical shells provide graphical user interface gui possibilities although common include voice user interface various implementations text-based user interface tui cli relative merits cli- gui-based shells often debated command-line interface cli operating system shell uses alphanumeric characters typed keyboard provide instructions data operating system interactively example teletypewriter send codes representing keystrokes command interpreter program running computer command interpreter parses sequence keystrokes responds error message recognize sequence characters may carry program action loading application program listing files logging user many others operating systems unix large variety shell programs different commands syntax capabilities operating systems single style command interface commodity operating systems ms-dos came standard command interface third-party interfaces also often available providing additional features functions menuing remote program execution application programs may also implement command-line interface example unix-like systems telnet program number commands controlling link remote computer system since commands program made keystrokes data sent remote computer means distinguishing two required escape sequence defined using either special local keystroke never passed always interpreted local system program becomes modal switching interpreting commands keyboard passing keystrokes data processed feature many command-line shells ability save sequences commands re-use data file contain sequences commands cli made follow typed user special features cli may apply carrying stored instructions batch files script files used repeatedly automate routine operations initializing set programs system restarted batch mode use shells usually involves structures conditionals variables elements programming languages bare essentials needed purpose others sophisticated programming languages conversely programming languages used interactively operating system shell purpose-built program command-line shell may offer features command-line completion interpreter expands commands based characters input user command-line interpreter may offer history function user recall earlier commands issued system repeat possibly editing since commands operating system typed user short command names compact systems representing program options common short names sometimes hard user recall early systems lacked storage resources provide detailed on-line user instruction guide graphical shells desktop shells provide means manipulating programs based graphical user interface gui allowing operations opening closing moving resizing windows well switching focus windows graphical shells may included desktop environments come separately even set loosely coupled utilities graphical user interfaces develop metaphor electronic desktop data files represented paper documents desk application programs similarly graphical representations instead invoked command names graphical shells typically build top windowing system case x window system wayland shell consists x window manager wayland compositor respectively well one multiple programs providing functionality start installed applications manage open windows virtual desktops often support widget engine case macos quartz could thought windowing system shell consists finder dock systemuiserver mission control modern versions microsoft windows operating system use windows shell shell windows shell provides familiar desktop environment start menu task bar well graphical user interface accessing file management functions operating system older versions also include program manager shell 3.x series microsoft windows fact shipped later versions windows 95 nt types least windows xp interfaces windows versions 1 2 markedly different desktop applications also considered shells long use third-party engine likewise many individuals developers dissatisfied interface windows explorer developed software either alters functioning appearance shell replaces entirely windowblinds stardock good example former sort application litestep emerge desktop good examples latter interoperability programmes purpose-designed software lets windows users use equivalents many various unix-based guis discussed well macintosh equivalent os/2 presentation manager version 3.0 run os/2 programmes conditions using os/2 environmental subsystem versions windows nt shell also used loosely describe application software built around particular component web browsers email clients analogy shells found nature also sometimes referred wrappers expert systems shell piece software empty expert system without knowledge base particular application
[ 2560, 9223, 10761, 6155, 13, 7187, 532, 7188, 10771, 10776, 25, 8729, 4637, 9762, 4643, 6180, 7717, 6701, 4656, 5681, 7217, 10803, 564, 9780, 4151, 10809, 2621, 6718, 576, 2625, 5698, 6213, 6221, 1112, 3160, 10333, 607, 97, 1121, 11363, ...
Test
7,326
9
MATLAB:matlab matlab matrix laboratory multi-paradigm numerical computing environment proprietary programming language developed mathworks matlab allows matrix manipulations plotting functions data implementation algorithms creation user interfaces interfacing programs written languages including c c++ c java fortran python although matlab intended primarily numerical computing optional toolbox uses mupad symbolic engine allowing access symbolic computing abilities additional package simulink adds graphical multi-domain simulation model-based design dynamic embedded systems 2018 matlab 3 million users worldwide matlab users come various backgrounds engineering science economics cleve moler chairman computer science department university new mexico started developing matlab late 1970s designed give students access linpack eispack without learn fortran soon spread universities found strong audience within applied mathematics community jack little engineer exposed visit moler made stanford university 1983 recognizing commercial potential joined moler steve bangert rewrote matlab c founded mathworks 1984 continue development rewritten libraries known jackpac 2000 matlab rewritten use newer set libraries matrix manipulation lapack matlab first adopted researchers practitioners control engineering little specialty quickly spread many domains also used education particular teaching linear algebra numerical analysis popular amongst scientists involved image processing matlab application built around matlab scripting language common usage matlab application involves using command window interactive mathematical shell executing text files containing matlab code variables defined using assignment operator codice_1 matlab weakly typed programming language types implicitly converted inferred typed language variables assigned without declaring type except treated symbolic objects type change values come constants computation involving values variables output function example simple array defined using colon syntax initial codice_2 increment codice_2 terminator instance defines variable named codice_4 assigns new value existing variable name codice_4 array consisting values 1 3 5 7 9 array starts 1 initial value increments step previous value 2 increment value stops reaches avoid exceeding 9 terminator value increment value actually left syntax along one colons use default value 1. assigns variable named codice_6 array values 1 2 3 4 5 since default value 1 used incrementer indexing one-based usual convention matrices mathematics although programming languages c c++ java matrices defined separating elements row blank space comma using semicolon terminate row list elements surrounded square brackets parentheses used access elements subarrays also used denote function argument list sets indices specified expressions 2:4 evaluates 2 3 4 example submatrix taken rows 2 4 columns 3 4 written square identity matrix size n generated using function eye matrices size zeros ones generated functions zeros ones respectively transposing vector matrix done either function transpose adding prime dot matrix without dot matlab perform conjugate transpose matlab functions accept matrices apply element example codice_7 multiply every element j 2 reduce element modulo n matlab include standard loops similar applications r using vectorized notation often produces code faster execute code excerpted function magic.m creates magic square odd values n matlab function codice_8 used generate square matrices j containing 1 n matlab structure data types since variables matlab arrays adequate name structure array element array field names addition matlab supports dynamic field names field look-ups name field manipulations etc. unfortunately matlab jit support matlab structures therefore simple bundling various variables structure come cost creating matlab function name file match name first function file valid function names begin alphabetic character contain letters numbers underscores functions often case sensitive matlab supports elements lambda calculus introducing function handles function references implemented either .m files anonymous/nested functions matlab supports object-oriented programming including classes inheritance virtual dispatch packages pass-by-value semantics pass-by-reference semantics however syntax calling conventions significantly different languages matlab value classes reference classes depending whether class handle super-class reference classes value classes method call behavior different value reference classes example call method alter member object object instance reference class example simple class provided put file named hello.m executed following commands matlab supports developing applications graphical user interface gui features matlab includes guide gui development environment graphically designing guis also tightly integrated graph-plotting features example function plot used produce graph two vectors x code produces following figure sine function matlab program produce three-dimensional graphics using functions surf plot3 mesh matlab graphical user interfaces programmed gui design environment guide tool matlab call functions subroutines written programming languages c fortran wrapper function created allowing matlab data types passed returned mex files matlab executables dynamically loadable object files created compiling functions since 2014 increasing two-way interfacing python added libraries written perl java activex .net directly called matlab many matlab libraries example xml sql support implemented wrappers around java activex libraries calling matlab java complicated done matlab toolbox sold separately mathworks using undocumented mechanism called jmi java-to-matlab interface confused unrelated java metadata interface also called jmi official matlab api java added 2016 alternatives mupad based symbolic math toolbox available mathworks matlab connected maple mathematica libraries also exist import export mathml matlab proprietary product mathworks users subject vendor lock-in although matlab builder products deploy matlab functions library files used .net java application building environment future development still tied matlab language toolbox purchased separately evaluation license requested mathworks sales department requires detailed information project matlab evaluated granted often evaluation license valid two four weeks student version matlab available home-use license matlab simulink subset mathwork toolboxes substantially reduced prices reported european union eu competition regulators investigating whether mathworks refused sell licenses competitor regulators dropped investigation complainant withdrew accusation evidence wrongdoing found matlab number competitors commercial competitors include mathematica tk solver maple idl also free open source alternatives matlab particular gnu octave scilab freemat sagemath intended mostly compatible matlab language julia programming language also initially used matlab-like syntax among languages treat arrays basic entities array programming languages apl fortran 90 higher s-lang well statistical languages r s. also libraries add similar functionality existing languages it++ c++ perl data language perl ilnumerics .net numpy/scipy/matplotlib python scilua/torch lua sciruby ruby numeric.js javascript gnu octave unique alternatives treats incompatibility matlab bug see matlab compatibility gnu octave theory octave thus superset matlab language practice octave implement matlab functionality number release number version reported concurrent license manager program flexlm complete list changes matlab official toolboxes consult matlab release notes several easter eggs exist matlab include hidden pictures jokes example typing spy used generate picture spies spy vs spy displays image dog typing randomly outputs philosophical answer commands include penny toilet image life every easter egg appears every version matlab
[ 3076, 7684, 5129, 15, 10256, 5148, 9245, 5677, 5684, 7734, 1591, 6718, 2557, 7235, 68, 10819, 8262, 5703, 11343, 6228, 3159, 2652, 10848, 100, 1130, 1131, 5741, 623, 3705, 7292, 5759, 1152, 9345, 2181, 7301, 1673, 6797, 7825, 10387, 5783,...
Test
7,327
4
SafeNet:safenet safenet inc. information security company based belcamp maryland united states acquired august 2014 french security company gemalto safenet products marketed safenet product brand include solutions enterprise authentication data encryption key management safenet software monetization products sold gemalto sentinel brand safenet notably one largest suppliers encryption technology united states government 8 august 2014 gemalto announced signed definitive agreement acquire 100 share capital safenet vector capital us 890 million debt free/cash free basis subsequent acquisition gemalto french rival thales group completed 2 april 2019 former rainbow technologies subsidiary safenet government solutions llc formerly safenet mykotronx still based torrance california offices irvine california columbia maryland company founded 1979 myko enterprises changed name mykotronx inc 1987 merged safenet part safenet merger rainbow 2004 safenet government solutions llc operationally merged safenet lines two organizations intentionally blurred due financial reasons safenet government solutions longer considered subsidiary safenet government solutions llc provides infosec comsec technology us government firm indefinite-delivery indefinite-quantity contract kiv-7 line commercial off-the-shelf cryptographic devices provide protection digital voice communications top secret used agencies nsa nro products include kov-14 fortezza plus pc card developed part nsa nssi program used secure terminal equipment previously developed clipper chip 2009 vector capital acquired aladdin knowledge systems placed safenet annotation 'under common management 2010 two companies officially merged
[ 32, 9924, 838, 5433, 8330, 3629, 7887, 6993, 10801, 3573, 5621, 4760, 2425, 5373 ]
None
7,328
7
Caspio:caspio caspio privately held global software company headquartered santa clara california offices ukraine poland philippines founded frank zamani 2000 caspio provides non-technical business professionals ability create database-centric web applications without coding caspio founder ceo frank zamani worked microsoft developer late 1990s vision enable organizations build custom cloud applications ease fraction time cost versus traditional software development “ wanted build tool business users create applications without coding ” zamani said “ time lot people said ’ done ’ going stop me. ” today caspio powers 1 million applications 100 countries research projects global low-code development platform market size grow us 4.32 billion 2017 us 27.23 billion 2022 compound annual growth rate cagr 44.49 forecast period
[ 9901 ]
Validation
7,329
4
MTR_(software):mtr software traceroute originally named matt traceroute mtr computer program combines functions traceroute ping programs one network diagnostic tool mtr probes routers route path limiting number hops individual packets may traverse listening responses expiry regularly repeat process usually per second keep track response times hops along path original matt traceroute program written matt kimball 1997 roger wolff took maintaining mtr renamed traceroute october 1998 mtr licensed terms gnu general public license gpl works modern unix-like operating systems normally works text console also optional gtk+-based graphical user interface gui mtr relies internet control message protocol icmp time exceeded type 11 code 0 packets coming back routers icmp echo reply packets packets hit destination host mtr also user datagram protocol udp mode invoked -u command line pressing u key curses interface sends udp packets time live ttl field ip header increasing one probe sent toward destination host udp mode used mtr relies icmp port unreachable packets type 3 code 3 destination reached mtr also supports ipv6 works similar manner instead relies icmpv6 messages tool often used network troubleshooting showing list routers traversed average round-trip time well packet loss router allows users identify links two given routers responsible certain fractions overall latency packet loss network help identify network overuse problems example shows mtr running linux tracing route host machine example.lan web server yahoo p25.www.re2.yahoo.com across level 3 communications network additional example shows recent version mtr running freebsd mpls labels displayed default -e switch used command line e key pressed curses interface winmtr windows gui application functionally equivalent mtr originally developed appnor msp s.r.l maintained white-tiger although similar winmtr shares common code mtr console version mtr exist windows fewer features mtr platforms
[ 225, 1647, 7983, 8976, 11249, 11250, 8692, 5397, 11221, 823, 11413, 5402, 2045, 5470, 8735 ]
Test
7,330
1
Australian_Rock_Database:australian rock database australian rock database website searchable online database listed details australian rock music artists albums bands producers record labels established 2000 swedish national magnus holmgren developed interest australian music visiting exchange student information database entries initially gleaned chris spencer zbig nowara paul mchenry australian rock 3rd ed 1993 ian mcfarlane encyclopedia australian rock pop 1999 australian government former website culture recreation listed australian rock database resource australian rock music
[]
Test
7,331
0
Terminology-oriented_database:terminology-oriented database terminology-oriented database terminology-oriented database management system conceptual extension object-oriented database implements concepts defined terminology model compared object-oriented databases terminology-oriented database requires minor conceptual extensions schema level supporting set relations super-set subset intersection etc weak-typed collections shared inheritance data model terminology-oriented database high-level terminology-oriented database provides facilities transforming terminology model provided subject area experts completely database schema target schema might database schema object-oriented database well relational database schema even xml schema typically terminology-oriented databases bound specific database type since information content stored object-oriented databases relational databases identical data terminology-oriented database stored theoretically type database well xml file thus terminology-oriented databases may support several database systems storing application data terminology databases contain terms vocabularies become valuable ontologies turn ontologies help process associated triples complex predicates thus going deeper hierarchies keys rdbms semantic mapping also enhance performance
[ 2271, 2901, 9286, 479 ]
Test
7,332
2
LliureX:lliurex lliurex project generalitat valenciana whose objective introduction new technologies information communication based free software education system valencian community linux distribution used 110,000 pcs schools valencia region
[ 8837, 7435, 10127, 2321, 5397, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 2738, 4790, 439, 56, 59, 3903, 4673, 2375, 4039, 8907, 1110, 9693, 2914, 485, 3685, 9064, 4841, 6890, 7913, 7020, 10860, 7534, 2671, 7920, 8177, 9074,...
None
7,333
2
Haptik:haptik haptik enterprise conversational al platform based mumbai india founded 2013 platform reaches 30 million devices monthly processed billion messages far technology infrastructure employs blend artificial intelligence natural language processing machine learning haptik founded aakrit vaish swapan rajdev university illinois engineering alumni august 2013 march 2014 company launched first product haptik app chat-based personal assistant lets users get things done android ios platforms india september 2014 platform powered 125 chat experts helped users queries time evolved full-blown conversational commerce app 2 million downloads 15 million app installs company launched life insurance chat-bot hdfc life baap bot fathers day august 2015 dan roth university illinois joined haptik board advisers make platform underlying nlp technology layer smarter year haptik became official personal assistant mumbai city fc also provided customer support chat-bot swipe telecom may 2016 company growing 20 percent month-on-month chat volume downloads user addition put together technology perspective 25 percent responses already automated platform november 2017 company launched full-scale enterprise level bot management platform including analytics dashboard company partnered amazon pay hdfc life ola cabs uber times internet mumbai city fc coca-cola ziman zomato bookmyshow cleartrip goibibo urbanclap via.com dineout flipkart run campaigns haptik app march 2018 company partnered amazon web services aws offer al-enabled conversational solutions customers india haptik entered strategic partnership combinator-backed leena ai provide enterprises types bot solutions haptik repertoire chatbot customers india includes samsung future group kfc dream11 sharekhan edelweiss tokio club mahindra iifl among others haptik also built assistants toi samsung ziman akancha harassment online cyber safety initiative haptik one world largest conversational ai platforms october 2017 times india app incorporated haptik virtual personal assistant service sprite exclusive brand partner samsung second partner uses haptik power ‘ assistant ’ service pre-installed samsung galaxy s7 galaxy s7 edge india haptik built scalable support bot dream11 helped online handle 8x volume without large support staff ipl 2018 april times internet acquired majority stake company invested 11.2 million business haptik raised 11.2m series b funding round times internet april 2016 earlier company received funding 1 million kalaari capital september 2014 haptik app chat-based personal assistant allowing users set reminders book cab flight tickets recharge phones pay utility bills find places vicinity web check-in uses artificial intelligence ai machine learning deliver fast precise results platform successful forging alliances technology humans haptik utilizes skill set human resources customer service help train bots reported deccan chronicle platform app runs uses artificial intelligence al machine learning deliver fast precise results haptik open sourced proprietary named entity recognition system powers chatbots behind haptik app chatbot summit held berlin june 26 2017
[ 6208, 4995, 2059, 6827, 4624, 7248 ]
Train
7,334
4
Fail-stop:fail-stop fail-stop subset computer language one semantics original except case exceptional condition arises fail-stop subset must report exceptional condition whenever superset language reports one may additionally report exceptional condition cases fail-stop languages often used computer systems correctness important since easier make systems fail-fast example operator many programming languages associative possibility floating-point overflow repairing languages fail fast commonly assumed properties hold makes much easier write verify correct code many widely used programming languages code might reduce bank account value deposited amount old account value large causing overflowed value assigned new_bank_account_value fail-stop language treats overflow exceptional condition either correct terminate exceptional condition
[]
Test
7,335
3
Programmer's_key:programmer key programmer key interrupt button button switch macos-era macintosh systems jumps machine code monitor symbol button ⎉ 68000 family based macintosh computers interrupt request also sent holding command key striking power key keyboard effect also simulated 68000 environment mac os nanokernel powerpc machines classic environment plastic insert came macintosh 128k macintosh 512k macintosh plus computers could attached exterior case used press interrupt button located motherboard modern mac hardware longer includes interrupt button mac os x operating system integrated debugging options addition mac os x protected memory blocks direct patching system memory order better secure system
[ 8544, 10533, 4910, 5520, 5457, 10357, 5976, 8540 ]
None
7,336
4
Firewalk_(computing):firewalk computing firewalking technique developed mike schiffman david goldsmith utilizes traceroute techniques ttl values analyze ip packet responses order determine gateway acl access control list filters map networks active reconnaissance network security analysis technique attempts determine layer 4 protocols specific firewall allow firewalk software tool performs firewalking protect firewall gateway firewalking one block icmp time exceeded messages
[ 5472, 8998, 939, 9356, 11249, 11250, 1493, 5402, 8668, 2558 ]
Test
7,337
4
CERT_Coordination_Center:cert coordination center cert coordination center cert/cc coordination center computer emergency response team cert software engineering institute sei non-profit united states federally funded research development center cert/cc researches software bugs impact software internet security publishes research information findings works business government improve security software internet whole first organization kind cert/cc created pittsburgh november 1988 darpa direction response morris worm incident cert/cc part cert division software engineering institute 150 cybersecurity professionals working projects take proactive approach securing systems cert program partners government industry law enforcement academia develop advanced methods technologies counter large-scale sophisticated cyber threats cert program part software engineering institute sei federally funded research development center ffrdc carnegie mellon university main campus pittsburgh cert registered trademark carnegie mellon university 2003 department homeland security entered agreement carnegie mellon university create us-cert us-cert national computer security incident response team csirt united states america cooperation often causes confusion cert/cc us-cert related two organizations distinct entities general us-cert handles cases concern us national security whereas cert/cc handles general cases often internationally cert/cc coordinates information us-cert computer security incident response teams licensed use name “ cert. ” organizations license cert name carnegie mellon university organizations independent entities established countries operated cert/cc cert/cc established first organization promoting cooperating information exchange various national certs private product security psirts research work cert/cc split several different work areas key capabilities products listed cert/cc works directly software vendors private sector well government agencies address software vulnerabilities provide fixes public process known coordination cert/cc promotes particular process coordination known responsible coordinated disclosure case cert/cc works privately vendor address vulnerability public report published usually jointly vendor security advisory extreme cases vendor unwilling resolve issue contacted cert/cc typically discloses information publicly 45 days since first contact attempt software vulnerabilities coordinated cert/cc may come internal research outside reporting vulnerabilities discovered outside individuals organizations may reported cert/cc using cert/cc vulnerability reporting form depending severity reported vulnerability cert/cc may take action address vulnerability coordinate software vendor cert/cc regularly publishes vulnerability notes cert knowledgebase vulnerability notes include information recent vulnerabilities researched coordinated individuals organizations may mitigate vulnerabilities vulnerability notes database meant comprehensive cert/cc provides number free tools security research community tools offered include following cert/cc periodically offers training courses researchers organizations looking establish psirts cert coordination center summer 2014 cert research funded us federal government key de-anonymization tor anonymity network information subpoenaed cert fbi used take silkroad 2.0 fall fbi denied paying deanonymize users cmu denied receiving funding compliance government subpoena despite indirectly contributing taking numerous illicit websites arrest least 17 suspects research raised multiple issues cmu said statement november 2015 ... university time time served subpoenas requesting information research performed university abides rule law complies lawfully issued subpoenas receives funding compliance even though motherboard reported neither fbi cmu explained authority first learned research subpoenaed appropriate information past sei also declined explain nature particular research response press inquiries saying thanks inquiry practice comment law enforcement investigations court proceedings
[ 5636, 6916, 7561, 5002, 11, 9868, 4240, 7059, 2709, 5404, 413, 6177, 1965, 943, 10928, 10110, 8373, 10680, 4797, 8773, 2118, 3021, 10190, 4435, 5589, 2262, 5722, 4062, 5855, 2018, 10344, 107, 6382, 4081, 1912, 2041, 4092, 2558 ]
Test
7,338
8
Mongoose_(web_server):mongoose web server mongoose cross-platform embedded web server networking library functions including tcp http client server websocket client server mqtt client broker much small size software enables internet-connected device function web server mongoose available gpl v2 commercial licenses mongoose built top mongoose embedded library used implementation restful services serve web gui embedded devices create rpc frameworks e.g json-rpc mongoose cross-platform application used windows macintosh os linux qnx ecos free rtos android ios via application programming interface api mongoose embedded programs mongoose written c. mongoose used several companies various industries functions mongoose include august 2013 license changed mit license dual gplv2/commercial licensing scheme license change mongoose forked different forks eventually diverged significantly new features added
[ 1920, 4485, 7430, 9229, 7567, 7695, 1937, 11154, 7443, 9365, 8350, 7457, 3746, 8994, 2596, 3237, 9125, 11682, 9387, 44, 7983, 6064, 10800, 11439, 2485, 6714, 4797, 10622, 1991, 11134, 595, 1363, 4439, 3545, 225, 865, 1250, 2404, 4837, 944...
None
7,339
1
Comparison_of_MySQL_database_engines:comparison mysql database engines comparison available database engines mysql database management system dbms database engine storage engine underlying software component dbms uses create read update delete crud data database
[ 11392, 8195, 10628, 10258, 2197, 7453, 1950, 9503, 9010, 1594, 10048, 6721, 5964, 5198, 2130, 7506, 2901, 9687, 10459, 6245, 8295, 8683, 2413, 7022, 3188, 246, 9335, 10873, 2810 ]
Test
7,340
5
SpaceTime_(software):spacetime software spacetime also known spacetime3d 3d graphical user interface displays web pages 3d tabbed stack interface available online flash application free desktop software download microsoft windows operating system technology presented 2008 ces tradeshow ceo eddie bakhash began working spacetime 1993 product debuted beta june 4 2007 day release san jose mercury news noted software advanced 3-d navigation system 've seen n't make dizzy except thoughts could become software capabilities compared current browsing 3d technologies techcrunch comment spacetime pure eye candy sort like second life meets firefox online version spacetime features ability search google google images wikipedia youtube desktop application released beta form june 4 2007 currently available windows 2000 xp vista systems mac os x version planned 2008 yet come fruition spacetime developers currently working port product opengl framework order support linux unix operating systems using search engines including google google images yahoo yahoo image ebay flickr spacetime loads first ten results stack pages beta browser received mixed reviews katherine boehret wall street journal stated though ’ still rely google basic searches visual search save time turn searching fun process jack m. germain technewsworld described spacetime delivers promise save time provide revolutionary online searching stating continue use 3-d searching environment though fun work edward n. albro pcworld gave beta browser 2.5/5 stating visual results make searches easier basic browsing spacetime appeal browser buggy slow basic browsing
[ 513, 6657, 9736, 2579, 6171, 9757, 7713, 10791, 9770, 559, 4661, 3639, 10808, 3643, 9275, 64, 5707, 10834, 6231, 8281, 6747, 1642, 9834, 9841, 115, 9843, 4728, 637, 1664, 2182, 6797, 10910, 8351, 7340, 9394, 9908, 185, 11449, 4797, 11466,...
Test
7,341
9
LabVIEW:labview laboratory virtual instrument engineering workbench labview system-design platform development environment visual programming language national instruments graphical language named g confused g-code originally released apple macintosh 1986 labview commonly used data acquisition instrument control industrial automation variety operating systems oss including microsoft windows various versions unix linux macos latest versions labview labview 2019 labview nxg 3.1 released may 2019 programming paradigm used labview sometimes called g based data availability enough data available subvi function subvi function execute execution flow determined structure graphical block diagram labview-source code programmer connects different function-nodes drawing wires wires propagate variables node execute soon input data become available since might case multiple nodes simultaneously labview execute inherently parallel multi-processing multi-threading hardware exploited automatically built-in scheduler multiplexes multiple os threads nodes ready execution labview integrates creation user interfaces termed front panels development cycle labview programs-subroutines termed virtual instruments vis vi three components block diagram front panel connector pane last used represent vi block diagrams calling vis front panel built using controls indicators controls inputs allow user supply information vi indicators outputs indicate display results based inputs given vi back panel block diagram contains graphical source code objects placed front panel appear back panel terminals back panel also contains structures functions perform operations controls supply data indicators structures functions found functions palette placed back panel collectively controls indicators structures functions referred nodes nodes connected one another using wires e.g. two controls indicator wired addition function indicator displays sum two controls thus virtual instrument run either program front panel serving user interface dropped node onto block diagram front panel defines inputs outputs node connector pane implies vi easily tested embedded subroutine larger program graphical approach also allows nonprogrammers build programs dragging dropping virtual representations lab equipment already familiar labview programming environment included examples documentation makes simple create small applications benefit one side also certain danger underestimating expertise needed high-quality g programming complex algorithms large-scale code important programmer possess extensive knowledge special labview syntax topology memory management advanced labview development systems offer ability build stand-alone applications furthermore possible create distributed applications communicate client–server model thus easier implement due inherently parallel nature g. applications labview usually designed using well-known architectures known design patterns common design patterns graphical labview applications listed table labview includes extensive support interfacing devices instruments camera devices users interface hardware either writing direct bus commands usb gpib serial using high-level device-specific drivers provide native labview function nodes controlling device labview includes built-in support ni hardware platforms compactdaq compactrio large number device-specific blocks hardware measurement automation explorer max virtual instrument software architecture visa toolsets national instruments makes thousands device drivers available download ni instrument driver network idnet labview includes compiler produces native code cpu platform aids performance graphical code translated executable machine code compiler labview syntax strictly enforced editing process compiled executable machine code requested run upon saving latter case executable source code merged single file executable runs help labview run-time engine contains pre-compiled code perform common tasks defined g language run-time engine reduces compiling time provides consistent interface various operating systems graphic systems hardware components etc run-time environment makes code portable across platforms generally labview code slower equivalent compiled c code although differences often lie program optimization inherent execution speed many libraries large number functions data acquisition signal generation mathematics statistics signal conditioning analysis etc. along numerous functions integration filters specialized abilities usually associated data capture hardware sensors enormous addition labview includes text-based programming component named mathscript added functions signal processing analysis mathematics mathscript integrated graphical programming using script nodes uses syntax compatible generally matlab labview inherently concurrent language easy program multiple tasks performed parallel via multithreading example done easily drawing two parallel loops connecting two separate nodes great benefit test system automation common practice run processes like test sequencing data recording hardware interfacing parallel due longevity popularity labview language ability users extend functions large ecosystem third party add-ons developed via contributions community ecosystem available labview tools network marketplace free paid labview add-ons low-cost labview student edition aimed educational institutions learning purposes also active community labview users communicate several electronic mailing lists email groups internet forums national instruments provides low cost labview home bundle edition labview proprietary product national instruments unlike common programming languages c fortran labview managed specified third party standards committee american national standards institute ansi institute electrical electronics engineers ieee international organization standardization iso etc many users criticised tendency freeze crash simple tasks often requiring software shut restarted small applications still start run-time environment large slow task tends restrict labview monolithic applications examples might tiny programs grab single value hardware used scripting language overhead run-time environment render approach impractical labview g language non-textual software tools versioning side-by-side diff comparison version code change tracking applied manner textual programming languages additional tools make comparison merging code source code control versioning tools subversion cvs perforce ability zoom enlarge vi hard see large high-resolution monitor practice however n't problem good programming practice means creating subroutines sub-vis keeping block diagram uncluttered relatively small 2005 starting labview 8.0 major versions released around first week august coincide annual national instruments conference ni week followed bug-fix release following february 2009 national instruments began naming releases year released bug-fix termed service pack example 2009 service pack 1 released february 2010 2017 national instruments moved annual conference may released labview 2017 alongside completely redesigned labview nxg 1.0 built windows presentation foundation wpf openg well lava code repository lavacr serve repositories wide range open source labview applications libraries sourceforge labview listed one possible languages code written vi package manager become standard package manager labview libraries similar purpose ruby rubygems perl cpan although provides graphical user interface similar synaptic package manager vi package manager provides access repository openg libraries labview tools exist convert mathml g code national instruments also offers product named measurement studio offers many test measurement control abilities labview set classes use microsoft visual studio allows developers harness labview strengths within text-based .net framework national instruments also offers labwindows/cvi alternative ansi c programmers applications need sequencing users often use labview teststand test management software also national instruments ch interpreter c/c++ interpreter embedded labview scripting tril centre ireland biomobius platform dsp robotics flowstone dsp also use form graphical programming similar labview limited biomedical robotics industries respectively labview direct node modefrontier multidisciplinary multi-objective optimization design environment written allow coupling almost computer-aided engineering tool part process workflow description virtually driven optimization technologies available modefrontier
[ 2691, 11267, 7301, 9224, 5129, 3980, 6797, 15, 8079, 7825, 4885, 4121, 5148, 3613, 7326, 7580, 1952, 6184, 5546, 1917, 2222, 3886, 5680, 7341, 2994, 6962, 7983, 9133, 1462, 823, 6718, 321, 2242, 3649, 10819, 1221, 2117, 5703, 5830, 5833, ...
None
7,342
6
Mount_Rainier_(packet_writing):mount rainier packet writing mount rainier mrw format writable optical discs provides packet writing defect management goal replacement floppy disk named mount rainier volcano near seattle washington united states mount rainier used drives explicitly support part scsi/mmc work atapi works standard cd-r cd-rw dvd+/-r dvd+/-rw media physical format mrw disk managed drive firmware remaps physical drive blocks virtual defect-free space thus host computer see physical format disk sequence data blocks capable holding filesystem time needed disk formatting shortened one minute background formatting capabilities drive formatting allocates sectors end disk defect management defective sectors recorded table lead-in administrative area copy table lead-out host computer perspective mrw disc provides defect-free block-accessible device upon host supported filesystem may written filesystems may fat32 ntfs etc. preferred format usually udf 1.02 file format widely supported mrw-formatted cd-rw udf filesystem gives approximately 500 mb free space mt rainier allows write access disc within seconds insertion spin-up even background formatting sequence taking place technology user would wait formatting complete writing data new disc even possible read write mrw disks without mrw-compatible drive remapper device driver needed example easywrite reader windows alternative mrw physically format disc udf 1.5 higher using spared build achieved use specialized packet writing software operating systems support udf versions 1.5 mrw capabilities overlap somewhat udf 1.5+ advantages mrw udf 1.5+ include advantage udf 1.5+ mrw include mount rainier implemented natively windows vista windows 7 linux built-in mrw support since kernel version 2.6.2 2004 amiga os4 supports natively since first beta appeared 2004 support reading format also added mac os x operating systems n't support mrw natively notably windows xp prior versions need third-party software read write mrw-formatted discs tend packet writing utilities allow native udf filesystems written optical media optical disk software isobuster support mount rainier non-mr drives easywrite logo marketing symbol created philips cd drives mount rainier compatible cd-mrw stands compact disc – mount rainier read/write
[ 3841, 9762, 5413, 5062, 7720, 8075, 2221, 6062, 5231, 3760, 2193, 8110, 3315, 823, 5816, 6233, 7290, 5596 ]
Validation
7,343
9
AutoIt:autoit autoit freeware programming language microsoft windows earliest release primarily intended create automation scripts sometimes called macros microsoft windows programs since grown include enhancements programming language design overall functionality scripting language autoit 1 2 statement-driven designed primarily simulating user interaction version 3 onward autoit syntax similar found basic family languages form autoit general-purpose third-generation programming language classical data model variant data type store several types data including arrays autoit automation script converted compressed stand-alone executable run computers autoit interpreter installed wide range function libraries known udfs user defined functions also included standard available website add specialized functionality autoit also distributed ide based free scite editor compiler help text fully integrated provide de facto standard environment developers using autoit autoit typically used produce utility software microsoft windows automate routine tasks systems management monitoring maintenance software installation also used simulate user interaction whereby application driven via automated form entry keypresses mouse clicks things autoit script autoit also used low-cost laboratory automation applications include instrument synchronisation alarm monitoring results gathering devices cnc routers 3d-printers also controlled developers autoit originally released source code gnu general public license gpl practice discontinued beginning version 3.2.0 august 2006 following terms gpl code version 3.1 used create fork autohotkey project community continuing develop release code gpl
[ 9216, 9345, 9728, 5380, 3718, 7431, 7691, 8588, 1805, 6797, 9997, 786, 11412, 11413, 22, 3736, 3481, 537, 9881, 797, 3233, 11683, 5925, 8101, 4136, 5032, 5546, 7851, 10666, 10924, 8494, 303, 7983, 11315, 9780, 4410, 315, 7355, 7486, 7870,...
Test
7,344
6
Lnfs:lnfs lnfs plan 9 file system enabling use long filenames filesystems support similar umsdos file system linux
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 7225, 11323, 8772, 1109, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 5293, 2230, 5816, 1212, 8...
Test
7,345
4
Cybersecurity_Information_Sharing_Act:cybersecurity information sharing act cybersecurity information sharing act cisa 113th congress 114th congress united states federal law designed improve cybersecurity united states enhanced sharing information cybersecurity threats purposes law allows sharing internet traffic information u.s. government technology manufacturing companies bill introduced u.s. senate july 10 2014 passed senate october 27 2015 opponents question cisa value believing move responsibility private businesses government thereby increasing vulnerability personal private information well dispersing personal private information across seven government agencies including nsa local police text bill incorporated amendment consolidated spending bill u.s. house december 15 2015 signed law president barack obama december 18 2015 cybersecurity information sharing act introduced july 10 2014 113th congress able pass senate intelligence committee vote 12-3 bill reach full senate vote end congressional session bill reintroduced 114th congress march 12 2015 bill passed senate intelligence committee vote 14-1 senate majority leader mitch mcconnell r-ky attempted attach bill amendment annual national defense authorization act blocked 56-40 reaching necessary 60 votes include amendment mitch mcconnell hoped bring bill senate-wide vote week august 3–7 unable take bill summer recess senate tentatively agreed limit debate 21 particular amendments manager amendment set time limits debate october 2015 us senate took bill back following legislation concerning sanctuary cities main provisions bill make easier companies share personal information government especially cases cyber security threats without requiring information sharing bill creates system federal agencies receive threat information private companies respect privacy bill includes provisions preventing sharing personal data irrelevant cyber security personal information get removed sharing procedure used variety ways shared cyber threat indicators used prosecute cyber crimes may also used evidence crimes involving physical force sharing national intelligence threat data among public private partners hard problem one care national intelligence threat sharing nits project intended innovative solution hard problem altogether nits innovative useful first ensure nits trustworthy private partners must indemnified indemnification takes act congress literally underlying impediment fulsome cooperation among buyers sellers peers within supply chain indemnification indemnification needed secure industry partners legal responsibility actions unfortunately congressional refusal offer indemnification remains impediment real collaboration least qualified immunity accorded immunity individuals performing tasks part government actions cisa received support advocacy groups including united states chamber commerce national cable telecommunications association financial services roundtable number business groups also opposed bill including computer communications industry association well individual companies twitter yelp apple reddit bsa software alliance appeared initially supportive cisa sending letter july 21 2015 urging senate bring bill debate september 14 2015 bsa published letter support amongst things cyber threat information sharing legislation addressed congress signed board members adobe apple inc. altium autodesk ca technologies datastax ibm microsoft minitab oracle salesforce.com siemens symantec prompted digital rights advocacy group fight future organize protest cisa following opposition campaign bsa stated letter expressed support cyber threat sharing legislation general endorse cisa pending cyber threat sharing bill particular bsa later stated opposed cisa current form computer communications industry association another major trade group including members google amazon.com cloudflare netflix facebook red hat yahoo also announced opposition bill proponents cisa include bill main cosponsors senators dianne feinstein d-ca richard burr r-nc senators announced opposition cisa including ron wyden d-or rand paul r-ky bernie sanders i-vt senator ron wyden d-or objected bill based classified legal opinion justice department written early george w bush administration obama administration states rely legal justification laid memo wyden made repeated requests us attorney general declassify memo dating least far back 2010 office inspector general report cited memo legal justification fbi warrantless wire-tapping program august 4 2015 white house spokesman eric schultz endorsed legislation calling senate take bill soon possible pass united states department homeland security initially supported bill jeh johnson secretary dhs calling bill move forward september 15 however august 3 letter senator al franken d-mn deputy secretary dhs alejandro mayorkas expressed desire connections brokered dhs given department charter protect executive branch networks letter dhs found issue direct sharing information government agencies advocating instead dhs sole recipient cyberthreat information allowing scrub private information addition department homeland security published privacy impact assessment detailing internal review proposed system handling incoming indicators industry privacy advocates opposed version cybersecurity information sharing act passed senate october 2015 left intact portions law said made amenable surveillance actual security quietly stripping several remaining privacy protections cisa criticized advocates internet privacy civil liberties electronic frontier foundation american civil liberties union compared criticized cyber intelligence sharing protection act proposals 2012 2013 passed united states house representatives pass senate united kingdom government policy cyber security scottish government information sharing
[ 9569, 2148, 5002, 10090, 3759, 7887, 9455, 3858, 5780, 3323, 8956, 8735 ]
Test
7,346
8
Tkhtml:tkhtml tkhtml discontinued open-source browser engine written c using tk widget toolkit used primarily html viewer 3 hv3 minimalist web browser version 1 written using xf application builder functionality reasons part rewritten 2006 announced public build tkhtml alpha 10 passed acid2 test run tkhtml tcl/tk framework needed installed standard wish interpreter needed replaced wwwish interpreter use wysiwyg previewing function
[ 6154, 6797, 7951, 10910, 7983, 692, 10304, 6338, 4171, 3407, 4048, 6231, 11223, 2139, 487, 7785, 5612, 11503, 4728, 124, 2045 ]
None
7,347
7
Redis:redis redis remote dictionary server in-memory data structure project implementing distributed in-memory key-value database optional durability redis supports different kinds abstract data structures strings lists maps sets sorted sets hyperloglogs bitmaps streams spatial indexes project mainly developed salvatore sanfilippo sponsored redis labs open-source software released bsd 3-clause license name redis means remote dictionary server redis project began salvatore sanfilippo nicknamed antirez original developer redis trying improve scalability italian startup developing real-time web log analyzer encountering significant problems scaling types workloads using traditional database systems sanfilippo began prototype first proof concept version redis tcl later sanfilippo translated prototype c language implemented first data type list weeks using project internally success sanfilippo decided open source announcing project hacker news project began get traction among ruby community github instagram among first companies adopting sanfilippo hired vmware march 2010 may 2013 redis sponsored pivotal software vmware spin-off june 2015 development became sponsored redis labs.. october 2018 redis 5.0 released introducing redis stream new data structure allows storage multiple fields string values automatic time-based sequence single key redis made popular idea system considered time store cache using design data always modified read main computer memory also stored disk format unsuitable random access data reconstruct data back memory system restarts time redis provides data model unusual compared relational database management system rdbms user commands describe query executed database engine specific operations performed given abstract data types hence data must stored way suitable later fast retrieval without help database system form secondary indexes aggregations common features traditional rdbms redis implementation makes heavy use fork system call duplicate process holding data parent process continues serve clients child process creates copy data disk according monthly db-engines rankings redis often popular key-value database redis also ranked 4 nosql database user satisfaction market presence based user reviews popular nosql database containers 1 nosql database 2015 ranking website stackshare.io voted loved database stack overflow developer survey 2017 2018 2019 since version 2.6 redis features server-side scripting language lua many programming languages redis language bindings client side including actionscript c c++ c chicken clojure common lisp crystal dart elixir erlang go haskell haxe io java javascript node.js julia lua objective-c ocaml perl php pure data python r racket ruby rust scala smalltalk swift tcl several client software programs exist languages redis maps keys types values important difference redis structured storage systems redis supports strings also abstract data types type value determines operations called commands available value redis supports high-level atomic server-side operations like intersection union difference sets sorting lists sets sorted sets data types supported based redis modules api redis module redisjson implements ecma-404 javascript object notation json data interchange standard native data type redis typically holds whole dataset memory versions 2.4 could configured use refer virtual memory dataset stored disk feature deprecated persistence redis achieved two different methods first snapshotting dataset asynchronously transferred memory disk regular intervals binary dump using redis rdb dump file format alternatively journaling record operation modifies dataset added append-only file aof background process redis rewrite append-only file background avoid indefinite growth journal journaling introduced version 1.1 generally considered safer approach default redis writes data file system least every 2 seconds less robust options available needed case complete system failure default settings seconds data would lost redis supports master-replica replication data redis server replicate number replicas replica may master another replica allows redis implement single-rooted replication tree redis replicas configured accept writes permitting intentional unintentional inconsistency instances publish/subscribe feature fully implemented client replica may subscribe channel receive full feed messages published master anywhere replication tree replication useful read write scalability data redundancy durability data needed in-memory nature redis allows perform well compared database systems write every change disk considering transaction committed redis operates single process single-threaded double-threaded rewrites aof append-only file thus single redis instance use parallel execution tasks stored procedures redis introduced clustering april 2015 release version 3.0 cluster specification implements subset redis commands single-key commands available multi-key operations commands related unions intersections restricted keys belonging node commands related database selection operations unavailable redis cluster scale 1,000 nodes achieve acceptable write safety continue operations nodes fail due nature database design typical use cases session caching full page cache message queue applications leaderboards counting among others large companies twitter using redis amazon web services offering redis portfolio microsoft offering redis cache azure companies used redis created commercial offerings around february 21 2019 redis labs relicensed redis modules redis source available license source-available arrangement prohibits users selling software redis modules formerly licensed affero general public license
[ 5249, 8582, 5257, 6153, 9225, 5900, 2062, 1935, 19, 3219, 2966, 1047, 1049, 1435, 5403, 9245, 6943, 2339, 3876, 5031, 4777, 5034, 4781, 5165, 5677, 7983, 8495, 1203, 692, 2105, 6718, 5953, 8644, 10565, 8262, 8008, 5833, 9544, 5835, 10059,...
None
7,348
4
Guardian_Analytics:guardian analytics guardian analytics american privately held company headquartered mountain view california provides behavioral analytics machine learning technology preventing banking fraud established 2005 products based anomaly detection monitor financial transactions 2012 guardian analytics together mcafee dissected us 78 million cyber attack titled operation high roller 2013 guardian analytics listed among top 10 influencers banking information security september 2016 nearly 430 financial institutions using guardian analytics products mitigate fraud risk rely company stop sophisticated criminal attacks guardian analytics offers fraud prevention services financial institutions general architecture includes two main components first component risk engine merges analytics behavior-based models user create probabilistic profile individual recognizing anomalous behavior possible identify fraudulent activity loss occurs risk engine dynamically adapts user behavior able detect new fraud attacks second component visual analytics data browser used financial institutions monitor investigate resolve potential fraud accessing collected data visual interface shows risk scores underlying contextual information facilitate analysis investigation guardian analytics able detect fraudulent activities account takeover account reconnaissance fraudulent wire ach bill pay transactions guardian analytics specific type threat protect cyber attacks phishing vishing man browser software transparent account holders require action side guardian analytics markets several services targeting particular types financial interactions guardian analytics marketed software service deployed company sas 70 type ii certified environment frauddesk fraud monitoring managed service
[ 704, 5986, 11330, 1899, 467, 278, 5373 ]
Test
7,349
3
SIMMON:simmon simmon simulation monitor proprietary software testing system developed late 1960s ibm product test laboratory poughkeepsie n.y designed then-new line system/360 computers vehicle testing software ibm developing architecture simmon first described ibm simsymp 1968 symposium held rye new york simmon hypervisor similar ibm cp-40 system independently developed cambridge scientific center time chief difference cp-40 simmon supported single virtual machine testing single guest program running cp-40 supported many virtual machines time-sharing production work cp-40 evolved many stages present vm/cms operating system simmon useful test vehicle many years simmon designed dynamically include independently developed programs test tools testing target guest program simmon kernel maintained control hardware guest coordinated invocation test tools two modes operation provided mode instruction guest program simulated without ever passing control directly guest instruction set simulator simmon unusual simulated architecture running i.e ibm system/360/370 order magnitude slower interrupt mode allowed close attention operation guest would mode used various instruction trace test tools interrupt mode a/k/a bump mode constrained guest program run user program state simmon kernel handling hardware interrupts simulating privileged instructions guest attempted execute mode could used example test tool simulate hardware device test tools developed use simmon error generation test test tool developed test device support error recovery ibm pcp primary control program operating system developed used novel efficient table-driven finite state machine fsm inject simulated errors verify operating system followed detailed specifications actions taken attempt recovery table driven fsm aspect granted u.s. patent mapper confused unisys product name statistical performance analysis tool operated allowing program test run interrupt mode also used system timer periodically interrupt addresses tested program interrupted recorded later summarized tabulated form map showing density interrupts memory addresses result resembled nuclear scintigraphy images showing parts program frequently used test conditions hotspots instruction trace tool written help identify performance problem areas ibm mft operating system branch trace data written tape summarized report took form listing similar storage dump program entry points exit points identified including frequency use instruction sequence data identified memory management component consuming 20 cpu resources used justify task force try improve performance specific test tool distorted timing relationships running simmon found number problems particularly input/output sections unless simmon tool put place normalize delay i/o events would appear guest program happening unnaturally quickly programs test -- so-called guest programs -- capable stand-alone operation bare hardware simmon provided services test tools guest programs tested using simmon
[ 5378, 6150, 2058, 3082, 10508, 4238, 8466, 789, 2212, 6438, 295, 10537, 7217, 7733, 9525, 9655, 5049, 2236, 318, 5697, 11075, 5702, 7248, 5457, 1362, 7507, 2910, 1513, 8439 ]
None
7,350
5
RONJA:ronja ronja reasonable optical near joint access free-space optical communication system originating czech republic developed karel kulhavý twibright labs released 2001 transmits data wirelessly using beams light ronja used create 10 mbit/s full duplex ethernet point-to-point link estimated 1000 2000 links built worldwide range basic configuration device consists receiver transmitter pipe optical head mounted sturdy adjustable holder two coaxial cables used connect rooftop installation protocol translator installed house near computer switch range extended doubling tripling transmitter pipe building instructions blueprints schematics published gnu free documentation licence free software tools used development author calls level freedom user controlled technology ronja project twibright labs building instructions written inexperienced builder mind basic operations like drilling soldering etc. explained several techniques – drilling templates detailed checks soldering testing procedures – employed minimize errors critical places help speed work printed circuit boards downloadable ready manufacture instructions fabhouse people previous experience building electronics reported mailing list device ran first try 154 installations worldwide registered gallery technical data pictures brightest variant lumileds hpwt-bd00-f4000 led 130 mm diameter cheap chinese magnifying glass lenses range 1.4 km less bright easier buy e4000 variant hpwt-bd00 yields 1.3 km speed always 10 mbit/s full duplex regardless distance definition clear visibility transmitter receiver essential beam obscured way link stop working typically problems may occur conditions snow dense fog one device weighs 15.5 kg requires 70 hours building time requires ability set full duplex manually network card switch take advantage full duplex since n't support autonegotiation must plugged directly pc switch using integral 1 ethernet cable complete ronja system made 2 transceivers 2 optical transmitters 2 optical receivers assembled individually combination complete system layout shown block diagram usual approach fso free space optics preamplifiers employ transimpedance amplifier transimpedance amplifier sensitive broadband high-speed device featuring feedback loop fact means layout plagued stability problems special compensation pin diode capacitance must performed therefore n't allow selection wide range cheap pin photodiodes varying capacitances ronja however uses feedbackless design pin high working electrical resistance 100 kilohms together total input capacitance roughly 8 pf 5 pf pin 3 pf input mosfet cascode makes device operate passband 6 db/oct slope low pass formed pin working resistance total input capacitance signal immediately amplified remove danger contamination signal noise compensation 6 db/oct slope done derivator element programming pins ne592 video amplifier surprisingly flat characteristic obtained pin diode equipped 3 kω working resistor operate flat band mode range reduced 30 due thermal noise 3 kω resistor hsdl4220 infrared led originally unsuitable 10 mbit/s operation bandwidth 9 mhz 10 mbit/s manchester-modulated systems need bandwidth around 16 mhz operation usual circuit current drive would lead substantial signal corruption range reduction therefore twibright labs developed special driving technique consisting driving led directly 15-fold 74ac04 gate output parallel rf voltage applied current-unlimited directly led large capacitors voltage keep nominal led average current 100ma varies temperature component tolerances ac-bypassed current sense resistor put series led feedback loop measures voltage resistor keeps preset level varying supply voltage 74ac04 gates therefore nominally digital 74ac04 operating structured power cmos switch completely analog mode way led junction flooded cleared carriers quickly possible basically short circuit discharge pushes speed led maximum makes output optical signal fast enough range/power ratio faster red hpwt-bd00-f4000 led side effects brutal driving technique 1 led overshoots beginning longer 5 mhz/1 mhz impulses 2x brightness measured adverse effect range 2 blocking ceramic capacitor bank backing 74ac04 switching array crucial correct operation charging discharging led done short circuit dimensioning bank causes leading trailing edges optical output grow longer ronja twister electronic interface free space optical datalink based counter shift register chips part ronja design effectively optical ethernet transceiver without optical drive part original design superseded twister2 logic circuit remained one doctoral dissertation 10 master bachelor theses three high school graduation exams one high school vocational activity 18 master bachelor theses one university semester project cite ronja czech technical university built 120 educational link buildings two faculties teaching students practically fso one czech private university dedicates page textbook ronja additional 12 journal conference university articles based largely ronja soderberg studying ronja sociologically writes arguably first project vindicated methods licensing schemes free software development applied practices open hardware development pulled state-of-the-art technology without backing universities firms ronja project whole toolchain built strictly upon free tools source files provided free gpl allows anyone enter development start manufacture invest technology without entry costs costs normally include software licence costs time investment resolution compatibility issues proprietary applications costs intellectual property licence negotiations decision conceive project way inspired observed organizational efficiency free software christmas 2001 ronja became world first 10 mbit/s free space optics device free sources examples tools used development
[ 3040, 10102 ]
Test
7,351
2
Commit_charge:commit charge computing commit charge term used microsoft windows operating systems describe total amount virtual memory guaranteed processes fit physical memory page file systems pagefile may thought maximum potential pagefile usage systems pagefile still counted virtual address space must remain physical memory ram times accessed windows task manager utility windows xp server 2003 performance tab shows three counters related commit charge program process explorer reports set values labeling total current additionally providing percentages peak current towards limit value commit charge increases program opened used goes program closed also change already-running programs allocate free private virtual memory example virtualalloc virtualfree apis task manager utility windows xp windows server 2003 graphical displays labeled pf usage page file usage history despite labels reflect pagefile contents total current commit charge height graph area corresponds commit limit show much actually written pagefile maximum potential pagefile usage amount pagefile would used current contents ram removed windows 2000 windows nt 4.0 displays labeled mem usage actually show commit charge commit limit similar displays task manager windows vista later changed reflect usage physical memory task manager processes display process contribution total commit charge shown vm size column windows xp server 2003 value labeled commit size windows vista later total commit charge always larger sum values total includes system-wide allocations paged pool display mem usage column windows xp server 2003 working set memory column windows vista later shows process current working set count physical memory ram rather virtual address space represents subset process virtual address space valid meaning referenced without incurring page fault commit charge process include major contributions process virtual address space mapped files reason process working set portion address space referenced without incurring page fault may larger contribution total commit charge total commit charge inclusive total memory physical virtual actually use commit limit may increased either creating additional pagefiles pagefile expansion enabled expanding existing one operating system expand pagefile automatically possible total commit charge approaches limit event popup window displayed stating system running low virtual memory system ever runs completely commit charge total reaches limit popup window displayed stating system virtual memory may become extremely sluggish even nonresponsive closing programs user still able point decreases total commit charge may thereby free system
[ 5643, 4624, 537, 540, 3102, 3615, 9762, 8227, 8740, 10281, 7728, 2101, 10812, 3648, 7754, 10828, 4173, 4174, 9808, 9300, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 7290, 4731, 10879, 8841, 6797, 2193, 9874, 10900, 4248, 9377, 3235, 47...
Test
7,352
4
Security_as_a_service:security service security service secaas business model service provider integrates security services corporate infrastructure subscription basis cost effectively individuals corporations provide total cost ownership considered secaas inspired software service model applied information security type services require on-premises hardware avoiding substantial capital outlays security services often include authentication anti-virus anti-malware/spyware intrusion detection penetration testing security event management among others outsourced security licensing delivery boasting multibillion-dollar market secaas provides users internet security services providing protection online threats attacks ddos constantly searching access points compromise websites demand use cloud computing skyrockets users vulnerable attacks due accessing internet new access points secaas serves buffer persistent online threats cloud security alliance csa organization dedicated defining raising awareness secure cloud computing csa defined following categories secaas tools created series technical implementation guidance documents help businesses implement understand secaas categories include secaas typically offered several forms security service offers number benefits including secaas number deficiencies make insecure many applications individual security service request adds least one across-the-'net round-trip counting installer packages four opportunities hacker intercept conversation secaas makes security handling uniform security breach one request security broken requests broadest attack surface also multiplies rewards incentive hacker value gained effort dramatically increased factors especially tailored resources nation/state-sponsored hacker biggest challenge secaas market maintaining reputation reliability superiority standard non-cloud services secaas whole seemingly become mainstay cloud market cloud-based website security ’ cater businesses specific requirements must properly assessed individual needs business cater end consumers afford keep data loose vulnerable hacker attacks heaviest part secaas educating businesses since data biggest asset businesses cios ctos take care overall security company
[ 1539, 526, 4623, 10265, 5662, 5666, 2084, 9766, 39, 5159, 3629, 3121, 5681, 7739, 10820, 4683, 590, 1102, 7248, 5202, 1108, 4194, 5732, 2170, 4236, 10893, 6307, 2217, 9906, 4289, 3269, 1224, 6367, 2795, 3819, 10492, 8956, 253, 8446, 8451,...
Test
7,353
0
BulPosCor:bulposcor bulgarian part speech-annotated corpus bulposcor bulgarian български пос анотиран корпус булпоскор morphologically annotated general monolingual corpus written language item text assigned grammatical tag bulposcor created department computational linguistics institute bulgarian language bulgarian academy sciences consists 174 697 lexical items bulposcor compiled structured brown corpus bulgarian sampling 300+ word-excerpts expanded sentence boundary original bcb files way preserve bcb overall structure annotation process consists primary stage automatically assigning tags bulgarian grammar dictionary stage manual resolving morphological ambiguities.the disambiguated corpus consists 174,697 lexical units bulposcor search interface koeva sv gramatichen rechnik na balgarskiya ezik.opisanie na koncepciyata za organizaciyata na lingvistichnite danni grammatical dictionary bulgarian в български език 6 1998 с 49-58 koeva sv. sv leseva i. stoyanova e. tarpomanova m. todorova bulgarian tagged corpora proceedings fifth international conference formal approaches south slavic balkan languages 18–20 october 2006 sofia bulgaria pp 78–86 todorova maria rositsa dekova balgarski pos anotiran korpus – osobenosti na gramatichnata anotaciya bulgarian pos annoted corpus – specifics grammatical annotation в езикови ресурси и технологии за български език състав и научн ред св коева д. благоева т. тинчев софия академично издателство „ марин дринов “ 2014
[ 1890, 4469, 7599 ]
Test
7,354
4
Trusted_Platform_Module:trusted platform module trusted platform module tpm also known iso/iec 11889 international standard secure cryptoprocessor dedicated microcontroller designed secure hardware integrated cryptographic keys trusted platform module tpm conceived computer industry consortium called trusted computing group tcg standardized international organization standardization iso international electrotechnical commission iec 2009 iso/iec 11889 tcg continued revise tpm specifications last revised edition tpm main specification version 1.2 published march 3 2011 consisted three parts based purpose second major version tpm however tcg released tpm library specification 2.0 builds upon previously published tpm main specification latest edition released september 29 2016 several errata latest one dated january 8 2018 trusted platform module provides computer programs use tpm authenticate hardware devices since tpm chip unique secret rsa key burned produced pushing security hardware level provides protection software-only solution united states department defense dod specifies new computer assets e.g. server desktop laptop thin client tablet smartphone personal digital assistant mobile phone procured support dod include tpm version 1.2 higher required disa stigs technology available dod anticipates tpm used device identification authentication encryption device integrity verification primary scope tpm assure integrity platform context integrity means behave intended platform computer device regardless operating system ensure boot process starts trusted combination hardware software continues operating system fully booted applications running responsibility assuring said integrity using tpm firmware operating system example unified extensible firmware interface uefi use tpm form root trust tpm contains several platform configuration registers pcrs allow secure storage reporting security relevant metrics metrics used detect changes previous configurations decide proceed good examples found linux unified key setup luks bitlocker privatecore vcage memory encryption see example tpm use platform integrity trusted execution technology txt creates chain trust could remotely attest computer using specified hardware software full disk encryption utilities dm-crypt bitlocker use technology protect keys used encrypt computer storage devices provide integrity authentication trusted boot pathway includes firmware boot sector operating systems often require authentication involving password means protect keys data systems authentication mechanism implemented software access prone dictionary attacks since tpm implemented dedicated hardware module dictionary attack prevention mechanism built effectively protects guessing automated dictionary attacks still allowing user sufficient reasonable number tries without level protection passwords high complexity would provide sufficient protection application use tpm chip uses exist give rise privacy concerns physical presence feature tpm addresses concerns requiring bios-level confirmation operations activating deactivating clearing changing ownership tpm someone physically present console machine starting 2006 many new laptops sold built-in tpm chip future concept could co-located existing motherboard chip computers device tpm facilities could employed cellphone pc either lpc bus spi bus used connect tpm chip tcg certified tpm chips manufactured infineon technologies nuvoton stmicroelectronics assigned tpm vendor ids advanced micro devices atmel broadcom ibm infineon intel lenovo national semiconductor nationz technologies nuvoton qualcomm rockchip standard microsystems corporation stmicroelectronics samsung sinosun texas instruments winbond five different types tpm 2.0 implementations tpm 2.0 addresses many use cases similar features details different tpm 2.0 backward compatible tpm 1.2 tpm 2.0 policy authorization includes 1.2 hmac locality physical presence pcr adds authorization based asymmetric digital signature indirection another authorization secret counters time limits nvram values particular command command parameters physical presence permits anding oring authorization primitives construct complex authorization policies tcg faced resistance deployment technology areas authors see possible uses specifically related trusted computing may raise privacy concerns concerns include abuse remote validation software manufacturerand user owns computer systemdecides software allowed run possible ways follow actions taken user recorded database manner completely undetectable user truecrypt disk encryption utility well derivative veracrypt support tpm original truecrypt developers opinion exclusive purpose tpm protect attacks require attacker administrator privileges physical access computer attacker physical administrative access computer circumvent tpm e.g. installing hardware keystroke logger resetting tpm capturing memory contents retrieving tpm-issued keys condemning text goes far claim tpm entirely redundant veracrypt publisher reproduced original allegation changes replacing truecrypt veracrypt private endorsement key fundamental security tpm circuit never made available end-user private key must known hardware chip manufacturer manufacture time otherwise would able burn key circuit guarantees private key kept manufacturer shared government agencies anyone access private endorsement key would able forge chip identity break security chip provides thus security tpm relies entirely manufacturer authorities country hardware produced 2010 christopher tarnovsky presented attack tpms black hat briefings claimed able extract secrets single tpm able 6 months work inserting probe spying internal bus infineon sle 66 cl pc 2015 part snowden revelations revealed 2010 us cia team claimed internal conference carried differential power analysis attack tpms able extract secrets october 2017 reported code library developed infineon widespread use tpms contained vulnerability known roca allowed rsa private keys inferred public keys result systems depending upon privacy keys vulnerable compromise identity theft spoofing cryptosystems store encryption keys directly tpm without blinding could particular risk types attacks passwords factors would meaningless attacks extract encryption secrets currently tpm used nearly pc notebook manufacturers primarily offered professional product lines tpm implemented several vendors also hybrid types example tpm integrated ethernet controller thus eliminating need separate motherboard component
[ 7936, 4353, 7557, 9863, 6153, 5389, 11405, 8978, 1945, 5918, 4644, 1832, 10153, 7212, 1453, 9390, 7983, 8627, 3382, 5433, 6593, 7106, 8904, 7117, 7377, 851, 4820, 7893, 91, 4444, 2525, 3422, 8674, 2275, 2788, 229, 4067, 3304, 2027, 6509, ...
None
7,355
9
Liberty_BASIC:liberty basic liberty basic lb commercial computer programming language integrated development environment ide interpreter developed smalltalk recognizes dialect basic programming language runs 16- 32-bit windows os/2 liberty basic written carl gundel published first release company shoptalk systems 1992 progressed steadily since last published update software june 2018 current version v4.5.1 though liberty basic share limitations design advanced programming provides introductory integrated development environment ide moderate advanced users windows os/2 dlls available current version runs microsoft windows wine linux alpha testing liberty basic v5.0 underway versions run microsoft windows mac os x linux raspberry pi well liberty basic compile native code instead compiles code written ide encrypted file extension tkn file executed exe file carries file name although may change release version 5 liberty basic allows programming style similar dos basics run console mode using default main window displays formatted text accepts user input also supports gui-based event-driven programming using several types windows may contain standard controls buttons menus textboxes etc central idea creating liberty basic model handling windows syntax file handling example liberty basic help file open command opens communication device disk file window dynamic link library serial communications port “ device ” open data also commands control device “ printed ” type device set commands sent way recent versions lb word print may dropped print statement making syntax even simpler simplicity heart liberty basic beginning makes easier learn cost perhaps limiting functionality two data types supported lb4.03 numeric string type declarations required variable sign end name string variable otherwise numeric plan lb5 support types user defined types well purpose making calls api 3rd party dlls struct additional types necessary dll data structure currently supported array arrays one two dimensions supported lb5 may support arrays user-defined types examples language hello world program program display pop-up message box words hello world program display input box running another application using liberty basic printing multiplication table 5 form gnu/liberty basic compiler collection glbcc anthony liguori set tools compile liberty basic programs runs windows linux systems project updated since 2001 2011 alternative windows implementation liberty basic lb booster lbb became available although substantially compatible liberty basic 4 language syntax lbb developed entirely independently richard russell written bbc basic lbb offers typically increased execution speed smaller self-contained executables additional capabilities however lbb 100 compatible lb4 whilst many programs run without modification may need adapted even unsuitable running lbb
[ 9345, 3718, 1673, 6154, 7691, 1805, 6797, 9997, 786, 11412, 4885, 22, 3736, 3481, 9881, 797, 5663, 3233, 11683, 5925, 8101, 4136, 10666, 8494, 303, 7343, 7983, 11315, 823, 315, 7486, 7870, 4160, 4674, 6338, 8644, 8262, 10750, 712, 5833, ...
Test
7,356
6
Rmdir:rmdir computing codice_1 codice_2 command remove empty directory various operating systems available unix e.g macos solaris aix hp-ux unix-like e.g freebsd linux dos dr flexos ibm os/2 microsoft windows reactos operating systems ms-dos command available versions 2 later dr dos 6.0 also includes implementation command also available open source ms-dos emulator dosbox kolibrios numerical computing environments matlab gnu octave include codice_1 function similar functionality normal usage straightforward name_of_directory corresponds name directory one wishes delete options command -p unix removes parent directories also empty example first remove baz/ bar/ finally foo/ thus removing entire directory tree specified command argument rmdir remove directory empty unix rm command remove directory contents recursively example normal usage identical unix-like operating systems equivalent command ms-dos earlier non-nt-based versions microsoft windows deleting non-empty directories deltree later version windows windows based nt kernel xp vista 7 8 server 2003/2008 case insensitive like earlier predecessors unless two files name different case exist case sensitivity applies selecting file use case match either file one may chosen windows two files named different case sensitivity allowed either windows services unix installed windows registry settings set allow example security risk using rd/rmdir two directories name different case sensitivities exist one contains valid data and/or programs contains incriminating materials and/or malware rd/rmdir gets executed without regard case sensitivity windows chooses legitimate folder delete folder left undesired one windows uses folder instead previously legitimate one execute programs one may led believe contains legitimate data
[ 515, 516, 9733, 9735, 2568, 521, 6664, 8713, 6674, 532, 8729, 7196, 2599, 8236, 9780, 5703, 5706, 3659, 2637, 4174, 5220, 8301, 1647, 9839, 8306, 5759, 8834, 5256, 6281, 6797, 4750, 2198, 4248, 6812, 7326, 3235, 4771, 7847, 178, 10428, ...
Test
7,357
7
Cloudsoft_Monterey:cloudsoft monterey cloudsoft monterey platform service paas software developed cloudsoft corp provide intelligent application mobility across multiple cloud computing environments supported vcloud amazon ec2 gogrid well private clouds using jclouds cloud api application written java using equinox osgi framework configuration dsls written groovy main components eclipse based development studio tool plugin developers management console monterey management network nodes run mobile application logic
[ 4194, 6307, 9926, 5677, 7983, 1362, 823, 6074 ]
Validation
7,358
2
CSI-DOS:csi-dos csi-dos operating system created samara soviet elektronika bk-0011m elektronika bk-0011 microcomputers csi-dos support earlier bk-0010 csi-dos used unique file system supported color graphics video mode system supported hard floppy drives well ram disks computer memory also included software work ay-3-8910 ay-3-8912 music co-processors covox speech thing number games demos designed specially system system also included turbo vision-like application programming interface api allowing simpler design user applications graphical file manager called x-shell
[ 9762, 2179, 1253, 5359, 7983, 5043, 1853 ]
Train
7,359
3
Data_Transfer_Project:data transfer project data transfer project dtp open-source initiative features data portability multiple online platforms project launched introduced google july 20 2018 currently partnered facebook microsoft twitter apple project formed google data liberation front 2017 hoping provide platform could allow individuals move online data different platforms without need downloading re-uploading data ecosystem achieved extracting different files various available apis released online platforms translating codes could compatible platforms july 20 2018 joint project announced source code uploaded github mainly written google microsoft engineers july 30 2019 apple announced joining project allowing data portability icloud
[ 4096, 8719, 3600, 7700, 9244, 10284, 3633, 8757, 4683, 11343, 3664, 2130, 8285, 2658, 10338, 617, 8821, 7816, 6797, 5262, 6800, 11408, 10900, 10393, 8858, 7841, 6827, 1203, 4289, 9922, 196, 3269, 1222, 3782, 10445, 10957, 3795, 1240, 8413, ...
Test
7,360
5
Link_Access_Procedure_for_Frame_Relay:link access procedure frame relay wide area network computing link access procedure frame relay lapf part network communications protocol ensures frames error free executed right sequence lapf formally defined international telecommunication union standard q.922 derived ibm synchronous data link control protocol layer 2 protocol ibm systems network architecture developed around 1975 itu used sdlc basis develop lapf frame relay environment along equivalents lapb x.25 protocol stack lapm v.42 protocol lapd isdn protocol stack frame relay local management interface lmi messages carried variant lapf frames lapf corresponds osi model data link layer
[ 4546, 9860, 1893, 11332, 3847, 4543, 6544, 1297, 5875, 5118, 10647, 7865, 3323, 5021, 2206, 2431 ]
Test
7,361
5
Architecture_for_Control_Networks:architecture control networks architecture control networks acn suite network protocols control entertainment technology equipment particularly used live performance large-scale installations example lighting audio special effects equipment acn maintained entertainment services technology association first official release ansi standard e1.17-2006 entertainment technology architecture control networks standard subsequently revised released ansi e1.17-2010 acn initially designed layered top udp/ip therefore run ip transports including standard inexpensive ethernet 802.11 wi-fi networks acn defines common protocol architecture two major network protocols sdt dmp device description language ddl number ‘ e1.17 profiles interoperability ’ known epi interoperability profiles define elements acn architecture must used particular context achieve interoperability example providing specific values ranges timing parameters used particular network environment breakdown acn sub-protocols interoperability profiles small pieces criticized making acn hard read understand makes architecture highly modular cleanly layered allowed many pieces operated contexts replaced revised without changing pieces example dmp operated tcp well sdt defined initial standard ddl adapted little change describe devices accessed dmx512 ansi e1.31/streaming acn several interoperability profiles seen major revision replacement without disturbing parts standard common architecture specification defines format nested protocol data units pdus rather similar tlv encoding used main protocols defines minimal root layer protocol used splice higher level protocols lower level transport defines root layer protocol using pdu format use udp/ip session data transport sdt reliable multicast transport protocol operates udp/ip used group peers within network sessions deliver messages individually group messages delivery ordered messages may selectively sent reliably unreliably message-by-message basis reliability important data avoiding time resource overhead reliability mechanism beneficial others reliability mechanism also provides online status component detect connection broken sdt provides high degree fine tuning trade-off latency reliability levels resource requirements availability large numbers concurrent sessions means powerful tool grouping managing components whose functions related whose communication requirements similar device management protocol dmp represents device set addressable properties represent current desired state monitoring control controller achieved setting examining values properties avoid inefficiencies polling addition simply reading property values using get-property message dmp provides subscription mechanism whereby device asynchronously send event messages subscribed controllers value property changes dmp expects connections provide reliability set-property event messages form large part operational bandwidth show situation require explicit acknowledgement dmp level e1.17 standard majority systems sdt provides reliability dmp also operated using tcp provide reliable connections size bits representation read/write accessibility function property dmp device determined protocol defines mechanism read and/or write property value instead information must either provided externally device description written ddl limited cases may pre-programmed fore-knowledge specific device types device description language ddl allows machine parsable description interface capabilities device defined description interpreted controller may automatically configure controlling device description provides address property mapping information necessary dmp operate also contain huge amount information functionality capabilities semantics device extensible format allows controller extract features needs specific context skipping information relevant needs ddl xml based language descriptions contained small number xml documents normal acn systems description device may downloaded device however descriptions may also distributed ways internet download since description valid devices type controllers typically maintain cache descriptions devices commonly encounter interoperability profiles epis provided ansi e1.17 initial service discovery system allocation multicast addresses used udp ipv4 udp port allocation multicasting ip address assignment conformant systems protocol timeouts specific environments epis conform acn architecture developed outside ansi e1.17 standard see due modular nature acn easy extend major protocol ansi e1.31 known streaming acn sacn developed organization uses root layer pdu format acn transport data dmx512 data ip networks acn compatible transport number interoperability profiles developed standardized plasa include ansi e1.30-3-2009 time reference acn systems using sntp ntp ansi e1.30-4-2010 defines use ddl describe devices controlled using dmx512 streaming acn early open-source implementation acn released openacn available sourceforge ported wide range platforms limited scope implement ddl support recent much complete implementation c 'acacian includes features ddl support yet another open source acn project codeplex implemented c aims provide full managed code implementation includes code several related protocols e1.31 streaming dmx acn supported linux arm i386 x86-64 macintosh powerpc i386 x86-64 open lighting architecture rust implementation e1.31 found github acn deployed proprietary implementations number companies including use electronic theatre controls etc basis 'net3 branded networked control infrastructure shure inc. control wireless microphones
[ 5472, 514, 8386, 9734, 9127, 11210, 5356, 1197, 9964, 6993, 7889, 8700, 11221, 823, 11413, 5469, 2045, 479 ]
Test
7,362
4
AVG_Technologies:avg technologies avg technologies cz s.r.o czech security software company headquartered brno founded 1991 jan gritzbach tomáš hofer wholly owned subsidiary avast since 2016 company develops antivirus software internet security services avg antivirus corporate offices europe israel brazil canada united states 2 february 2015 200 million active users used avg software products services include internet security performance optimization personal privacy identity protection applications july 2016 avast announced intended acquire avg acquisition completed 30 september 2016 avast avg operated single company since 3 october 2016 retaining two separate brands company founded brno czech republic jan gritzbach tomáš hofer 1991 grisoft /c/ software spol r. o.. owned jan gritzbach 2001 jan gritzbach decided sell grisoft benson oak capital acquisitions holding company grisoft inc. based wilmington delaware used transaction 2002 company renamed grisoft s.r.o.. three years later benson oak sold 65 share company intel capital enterprise investors us 52 million holding company grisoft holdings b.v. based amsterdam netherlands later grisoft international b.v. gradually became main company 19 april 2006 grisoft acquired german company ewido networks anti-spyware software manufacturer incorporated ewido features new versions avg software 6 november 2006 microsoft announced avg security products would available directly windows security center windows vista since 7 june 2006 avg software also used optional component gfi mailsecurity produced gfi software 5 december 2007 grisoft announced acquisition exploit prevention labs developer linkscanner safe surfing technology 2008 grisoft s.r.o renamed avg technologies cz s.r.o grisoft international b.v. avg technologies n.v.. change made increase effectiveness marketing activities january 2009 avg announced plans acquire sana security finalized plans integrate sana technologies free consumer product avg anti-virus still consideration according jr smith avg chief executive sana security developed technologies currently licensed symantec 5 october 2009 ta associates announced bought minority stake avg technologies us 200 million april 2010 avg announced appointed security industry veteran yuval ben-itzhak senior vice president engineering ben-itzhak became chief technology officer later year 9 june 2010 avg announced acquisition north carolina-based walling data north america security software distribution distributed avg offerings across united states since 2001 10 november 2010 avg announced acquisition tel aviv-based droidsecurity company specializes field mobile security solutions android devices upon completion acquisition droidsecurity become wholly owned subsidiary avg droidsecurity ceo co-founder eran pfeffer become general manager avg ’ mobile solutions team december 2010 avg released mandatory-install update 2011 version antivirus software caused thousands 64 bit windows vista windows 7 computers become completely inoperable avg since released fix attempts repair computers bricked installing update affected users watch following video avg official youtube page resolve issue 28 january 2011 dangerous rogue appeared interface graphics resemble previous version software uses sophisticated social engineering deceive users infect systems malware also portrays so-called emergency mode internet explorer exist genuine application 1 december 2011 avg technologies announced acquisition bsecure technologies inc. bsecure leading provider proprietary cloud-based technology internet filtering industry since 2001 endorsed software provider family online safety 2011 group restructured avg technologies holdings b.v. founded avg technologies cz s.r.o avg technologies n.v. subsidiaries 7 february 2012 avg technologies n.v. listed new york stock exchange 12 june 2013 avg technologies announced acquisition level platforms 8 march 2013 jr smith ceo tendered resignation avg eight years ceo leading company successful ipo nyse delivering eight quarters successive high-growth 30 july 2013 avg technologies announced gary kovacs company new ceo november 2014 avg technologies announced acquisition norman safeground asa oslo-based company known norman suite security products avg technologies announced may 2015 acquisition privax uk based company owner hidemyass vpn service september 2015 company announced acquisition location labs company personal security products four major us cellular carriers 7 july 2016 avast announced intended acquire avg technologies purchase price 25.00 per share cash total around 1.3 billion acquisition completed 30 september 2016 avast avg operate single company monday 3 october 2016 company delisted new york stock exchange 20 august 2010 avg entered partnership moka5 secure desktop virtualisation solutions partnership adds critical security layer virtual desktop marketplace enterprise companies turning desktop virtualization secure solution bringing computer byoc work home initiatives employees 1 july 2010 avg partnered opera software provide malware security web browser opera protection added existing fraud protection technology netcraft phishtank haute secure july 2011 avg joined forces israeli company zbang launch multimi free windows ipad app integrates e-mail social media multimedia one interface avg provides linkscanner app checking link sent e-mail shared social network found via search december 2012 avg yahoo partnered secure search toolbar september 2013 avg partnered facebook launch facebook privacy application avg crowd control may 2012 avg technologies issued copyright claim referred 'takedown request youtube video 1987 pop song never gon na give performed british singer rick astley video october 2015 150 million views 300,000 comments uploaded 2007 restored within 24 hours youtube video name refers internet meme commonly referred 'rickrolling someone pranks others tricking going video avg browser add-on avg secure search criticized adware since frequently bundled software often mistakenly installed exhibits malware-like behavior avg secure search also advertised users free versions avg products although add-on offers legitimate malware-blocking capabilities default behavior changing internet browser default search engine homepage new tab page avg secure search reminiscent potentially unwanted program pup problems uninstalling add-on widely reported add-on could potentially make internet browser vulnerable attacks
[ 2049, 7809, 131, 5891, 8584, 1417, 7948, 3981, 10637, 9488, 8980, 4374, 10903, 1052, 156, 11166, 6431, 2721, 5924, 2213, 422, 550, 1318, 2601, 6823, 2859, 3243, 6699, 8614, 8615, 9771, 6834, 4403, 9523, 10166, 7103, 704, 9537, 10308, 4421...
Validation
7,363
9
Analytica_(software):analytica software analytica visual software package developed lumina decision systems creating analyzing communicating quantitative decision models modeling environment interesting way combines hierarchical influence diagrams visual creation view models intelligent arrays working multidimensional data monte carlo simulation analyzing risk uncertainty optimization including linear nonlinear programming design especially influence diagrams treatment uncertainty based ideas field decision analysis computer language notable combining declarative non-procedural structure referential transparency array abstraction automatic dependency maintenance efficient sequencing computation analytica models organized influence diagrams variables objects appear nodes various shapes diagram connected arrows provide visual representation dependencies analytica influence diagrams may hierarchical single module node diagram represents entire submodel hierarchical influence diagrams analytica serve key organizational tool visual layout influence diagram matches natural human abilities spatially level abstraction people able take far information model structure organization glance possible less visual paradigms spreadsheets mathematical expressions managing structure organization large model significant part modeling process substantially aided visualization influence diagrams influence diagrams also serve tool communication quantitative model created final results computed often case understanding results obtained various assumptions impact results far important specific numbers computed ability target audience understand aspects critical modeling enterprise visual representation influence diagram quickly communicates understanding level abstraction normally appropriate detailed representations mathematical expressions cell formulae detail desired users drill increasing levels detail speeded visual depiction model structure existence easily understandable transparent model supports communication debate within organization effect one primary benefits investing quantitative model building interested parties able understand common model structure debates discussions often focus directly specific assumptions cut cross-talk therefore lead productive interactions within organization influence diagram serves graphical representation help make models accessible people different levels analytica uses index objects track dimensions multidimensional arrays index object name list elements two multidimensional values combined example expression revenue expenses multidimensional analytica repeats profit calculation dimension recognizes dimension occurs values treats dimension calculation process called intelligent array abstraction unlike programming languages inherent ordering dimensions multidimensional array avoids duplicated formulas explicit loops common sources modeling errors simplified expressions made possible intelligent array abstraction allow model accessible interpretable transparent another consequence intelligent array abstraction new dimensions introduced removed existing model without requiring changes model structure changes variable definitions example creating model model builder might assume particular variable example discount_rate contains single number later constructing model user might replace single number table numbers perhaps discount_rate broken country economic_scenario new divisions may reflect fact effective discount rate international divisions company different rates applicable different hypothetical scenarios analytica automatically propagates new dimensions results depend upon discount_rate example result net present value become multidimensional contain new dimensions essence analytica repeats calculation using discount rate possible combination country economic_scenario flexibility important exploring computation tradeoffs level detail computation time available data overall size dimensionality parametric spaces adjustments common models fully constructed way exploring what-if scenarios overall relationships variables incorporating uncertainty model outputs helps provide realistic informative projections uncertain quantities analytica specified using distribution function evaluated distributions sampled using either latin hypercube monte carlo sampling samples propagated computations results sampled result distribution summary statistics viewed directly mean fractile bands probability density function pdf cumulative distribution function cdf analytica supports collaborative decision analysis probability management use sipmath tm standard system dynamics approach simulating behaviour complex systems time deals feedback loops time delays behaviour entire system dynamic function analytica allows definition variables cyclic dependencies feedback loops expands influence diagram notation normally allow cycles least one link cycle includes time lag depicted gray influence arrow distinguish standard black arrows without time lags analytica includes general language operators functions expressing mathematical relationships among variables users define functions libraries extend language analytica several features programming language designed make easy use quantitative modeling visual programming language users view programs models influence diagrams create edit visually adding linking nodes declarative language meaning model declares definition variable without specifying execution sequence required conventional imperative languages analytica determines correct efficient execution sequence using dependency graph referentially transparent functional language execution functions variables side effects i.e changing variables analytica array programming language operations functions generalize work multidimensional arrays analytica used policy analysis business modeling risk analysis areas analytica applied include energy health pharmaceuticals environmental risk emissions policy analysis wildlife management ecology climate change technology defense strategic financial planning r planning portfolio management financial services aerospace manufacturing environmental health impact assessment analytica software runs microsoft windows operating systems three editions professional enterprise optimizer functions cost purchased users interested building models free edition available called analytica free 101 allows build medium moderate sized models 101 user objects.. free 101 also allows view models 101 objects change inputs compute results enables free sharing models review capable non-free power player enables users save inputs utilize database connections analytica cloud player allows share models web lets users access run via web browser recent release analytica version 5.1 released may 2018 analytica predecessor called demos grew research tools policy analysis max henrion phd student later professor carnegie mellon university 1979 1990 henrion founded lumina decision systems 1991 brian arnold lumina continued develop software apply environmental public policy analysis applications lumina first released analytica product 1996
[ 2691, 5380, 8262, 6797, 7983 ]
Test
7,364
5
File_Transfer_Protocol:file transfer protocol file transfer protocol ftp standard network protocol used transfer computer files client server computer network ftp built client-server model architecture using separate control data connections client server ftp users may authenticate clear-text sign-in protocol normally form username password connect anonymously server configured allow secure transmission protects username password encrypts content ftp often secured ssl/tls ftps replaced ssh file transfer protocol sftp first ftp client applications command-line programs developed operating systems graphical user interfaces still shipped windows unix linux operating systems many ftp clients automation utilities since developed desktops servers mobile devices hardware ftp incorporated productivity applications html editors original specification file transfer protocol written abhay bhushan published 16 april 1971 1980 ftp ran ncp predecessor tcp/ip protocol later replaced tcp/ip version june 1980 october 1985 current specification several proposed standards amend example february 1994 enables firewall-friendly ftp passive mode june 1997 proposes security extensions september 1998 adds support ipv6 defines new type passive mode ftp may run active passive mode determines data connection established cases client creates tcp control connection random usually unprivileged port n ftp server command port 21 modes updated september 1998 support ipv6 changes introduced passive mode time updating extended passive mode server responds control connection three-digit status codes ascii optional text message example 200 200 ok means last command successful numbers represent code response optional text represents human-readable explanation request e.g need account storing file ongoing transfer file data data connection aborted using interrupt message sent control connection transferring data network four data representations used text files different format control record structure options provided features designed facilitate files containing telnet asa data transfer done three modes ftp software also implements deflate-based compressed mode sometimes called mode z command enables mode described internet draft standardized ftp login uses normal username password scheme granting access username sent server using user command password sent using pass command sequence unencrypted wire may vulnerable network sniffing attack information provided client accepted server server send greeting client session commence server supports users may log without providing login credentials server may authorize limited access sessions host provides ftp service may provide anonymous ftp access users typically log service 'anonymous lower-case case-sensitive ftp servers account prompted user name although users commonly asked send email address instead password verification actually performed supplied data many ftp hosts whose purpose provide software updates allow anonymous logins ftp normally transfers data server connect back client port command sent client problematic nats firewalls allow connections internet towards internal hosts nats additional complication representation ip addresses port number port command refer internal host ip address port rather public ip address port nat two approaches solve problem one ftp client ftp server use pasv command causes data connection established ftp client server widely used modern ftp clients another approach nat alter values port command using application-level gateway purpose http essentially fixes bugs ftp made inconvenient use many small ephemeral transfers typical web pages ftp stateful control connection maintains current working directory flags transfer requires secondary connection data transferred passive mode secondary connection client server whereas default active mode connection server client apparent role reversal active mode random port numbers transfers firewalls nat gateways hard time ftp http stateless multiplexes control data single connection client server well-known port numbers trivially passes nat gateways simple firewalls manage setting ftp control connection quite slow due round-trip delays sending required commands awaiting responses customary bring control connection hold open multiple file transfers rather drop re-establish session afresh time contrast http originally dropped connection transfer cheap http subsequently gained ability reuse tcp connection multiple transfers conceptual model still independent requests rather session ftp transferring data connection control connection idle transfer takes long firewall nat may decide control connection dead stop tracking effectively breaking connection confusing download single http connection idle requests normal expected connections dropped time-out common web browsers retrieve files hosted ftp servers although may support protocol extensions ftps ftp—rather http—url supplied accessible contents remote server presented manner similar used web content full-featured ftp client run within firefox form extension called fireftp ftp url syntax described taking form codice_1 bracketed parts optional example url nowiki ftp //public.ftp-servers.example.com/mydirectory/myfile.txt /nowiki represents file myfile.txt directory mydirectory server public.ftp-servers.example.com ftp resource url nowiki ftp //user001 secretpassword private.ftp-servers.example.com/mydirectory/myfile.txt /nowiki adds specification username password must used access resource details specifying username password may found browsers documentation e.g. firefox internet explorer default web browsers use passive pasv mode easily traverses end-user firewalls variation existed different browsers treat path resolution cases non-root home directory user ftp designed secure protocol many security weaknesses may 1999 authors listed vulnerability following problems ftp encrypt traffic transmissions clear text usernames passwords commands data read anyone able perform packet capture sniffing network problem common many internet protocol specifications smtp telnet pop imap designed prior creation encryption mechanisms tls ssl common solutions problem include ftp ssh practice tunneling normal ftp session secure shell connection ftp uses multiple tcp connections unusual tcp/ip protocol still use particularly difficult tunnel ssh many ssh clients attempting set tunnel control channel initial client-to-server connection port 21 protect channel data transferred ftp software either end sets new tcp connections data channels thus confidentiality integrity protection otherwise necessary ssh client software specific knowledge ftp protocol monitor rewrite ftp control channel messages autonomously open new packet forwardings ftp data channels software packages support mode include explicit ftps extension ftp standard allows clients request ftp sessions encrypted done sending auth tls command server option allowing denying connections request tls protocol extension defined implicit ftps outdated standard ftp required use ssl tls connection specified use different ports plain ftp ssh file transfer protocol chronologically second two protocols abbreviated sftp transfers files similar command set users uses secure shell protocol ssh transfer files unlike ftp encrypts commands data preventing passwords sensitive information transmitted openly network interoperate ftp software trivial file transfer protocol tftp simple lock-step ftp allows client get file put file onto remote host one primary uses early stages booting local area network tftp simple implement tftp lacks security advanced features offered robust file transfer protocols file transfer protocol tftp first standardized 1981 current specification protocol found simple file transfer protocol first protocol abbreviated sftp defined proposed unsecured file transfer protocol level complexity intermediate tftp ftp never widely accepted internet assigned historic status ietf runs port 115 often receives initialism sftp command set 11 commands support three types data transmission ascii binary continuous systems word size multiple 8 bits implementation binary continuous protocol also supports login user id password hierarchical folders file management including rename delete upload download download overwrite download append summary ftp reply codes may returned ftp server codes standardized ietf reply code three-digit value first digit used indicate one three possible outcomes — success failure indicate error incomplete reply second digit defines kind error third digit reply code used provide additional detail categories defined second digit
[ 10242, 6154, 8203, 8211, 6171, 10269, 10271, 6177, 35, 2085, 44, 6189, 46, 8238, 10297, 2107, 4158, 2112, 4163, 6212, 8265, 4171, 10325, 6231, 8281, 10341, 10344, 106, 2168, 152, 6297, 2206, 172, 2222, 6318, 6319, 10417, 6330, 8386, 6352,...
None
7,365
4
CastleCops:castlecops castlecops volunteer security community focused making internet safer place services public free including malware rootkit cleanup infected computers malware phish investigations terminations searchable database lists malware file hashes targeted spammers throughout existence fought back using legal means defeat education collaborative information sharing among castlecops formerly known computer cops name change 2005 highest priorities achieved training volunteer staff anti-malware phishing rootkit academies additional services including castlecops forums news reviews continuing education castlecops consistently worked industry experts law enforcement reach ultimate goal securing safe smart computing experience everyone online castlecops reached five-year anniversary february 2007 accolades well-known computer security industry pundits players december 24 2008 website announced things come end castlecops ceased exist yet undisclosed reason later reported founder paul laudanski offered job microsoft however domain name remained active ever since albeit content order prevent purchased criminals castlecops malware databases well known security circles already moved systemlookup.com demise site
[ 7515, 9791 ]
Validation
7,366
2
Jean-loup_Gailly:jean-loup gailly jean-loup gailly author gzip wrote compression code portable archiver info-zip tools compatible pkzip archiver ms-dos worked zlib collaboration mark adler prefers write hyphenated first name j l ell capitalized wrote chapter fractal image compression mark nelson data compression book 1990 1995 designed real-time executive chorusos microkernel 1999 2001 cto mandrakesoft 2006 2014 worked google tech lead manager
[ 3296, 10121, 4780, 9166, 4561, 7187 ]
Validation
7,367
9
Saber_(software):saber software saber general purpose simulation program synopsys inc originally developed analogy inc. bought avanti corporation 2000 bought synopsys inc. saber began single-kernel analog simulation technology brought vhdl-ams verilog-ams spice saber-mast language single environment saber coupled digital simulators via calaveris algorithm
[ 5881, 7819, 11333 ]
Train
7,368
4
Authorization:authorization authorization function specifying access rights/privileges resources related information security computer security general access control particular formally authorize define access policy example human resources staff normally authorized access employee records policy usually formalized access control rules computer system operation system uses access control rules decide whether access requests authenticated consumers shall approved granted disapproved rejected resources include individual files item data computer programs computer devices functionality provided computer applications examples consumers computer users computer software hardware computer access control computer systems networks rely access policies access control process divided following phases policy definition phase access authorized policy enforcement phase access requests approved disapproved authorization function policy definition phase precedes policy enforcement phase access requests approved disapproved based previously defined authorizations modern multi-user operating systems include access control thereby rely authorization access control also uses authentication verify identity consumers consumer tries access resource access control process checks consumer authorized use resource authorization responsibility authority department manager within application domain often delegated custodian system administrator authorizations expressed access policies types policy definition application e.g form access control list capability policy administration point e.g xacml basis principle least privilege consumers authorized access whatever need jobs older single user operating systems often weak non-existent authentication access control systems anonymous consumers guests consumers required authenticate often limited authorization distributed system often desirable grant access without requiring unique identity familiar examples access tokens include keys certificates tickets grant access without proving identity trusted consumers often authorized unrestricted access resources system must verified access control system make access approval decision partially trusted guests often restricted authorization order protect resources improper access usage access policy operating systems default grant consumers full access resources others opposite insisting administrator explicitly authorizes consumer use resource even access controlled combination authentication access control lists problems maintaining authorization data trivial often represents much administrative burden managing authentication credentials often necessary change remove user authorization done changing deleting corresponding access rules system using atomic authorization alternative per-system authorization management trusted third party securely distributes authorization information public policy authorization feature trusted systems used security social control banking authorization hold placed customer account purchase made using debit card credit card publishing sometimes public lectures freely available texts published without approval author called unauthorized texts example 2002 'the theory everything origin fate universe collected stephen hawking lectures published without permission per copyright law
[ 5636, 10756, 9745, 531, 2084, 3629, 7729, 10801, 4663, 7739, 3133, 9791, 10815, 10835, 9313, 6761, 107, 8302, 9336, 5245, 5246, 9356, 6805, 10392, 6811, 9884, 2213, 7846, 10918, 1709, 7855, 2737, 5812, 3262, 5325, 6350, 2262, 6360, 6373, ...
Test
7,369
4
Anti-computer_forensics:anti-computer forensics anti-computer forensics sometimes counter forensics general term set techniques used countermeasures forensic analysis anti-forensics recently recognized legitimate field study within field study numerous definitions anti-forensics abound one widely known accepted definitions comes marc rogers purdue university rogers uses traditional crime scene approach defining anti-forensics attempts negatively affect existence amount and/or quality evidence crime scene make analysis examination evidence difficult impossible conduct abbreviated definition given scott berinato article entitled rise anti-forensics anti-forensics technology approach criminal hacking summed like make hard find impossible prove found neither author takes account using anti-forensics methods ensure privacy one personal data anti-forensics methods often broken several sub-categories make classification various tools techniques simpler one widely accepted subcategory breakdowns developed dr. marcus rogers proposed following sub-categories data hiding artifact wiping trail obfuscation attacks cf computer forensics processes tools attacks forensics tools directly also called counter-forensics within field digital forensics much debate purpose goals anti-forensic methods common conception anti-forensic tools purely malicious intent design others believe tools used illustrate deficiencies digital forensic procedures digital forensic tools forensic examiner education sentiment echoed 2005 blackhat conference anti-forensic tool authors james foster vinnie liu stated exposing issues forensic investigators work harder prove collected evidence accurate dependable believe result better tools education forensic examiner also counter-forensics significance defence espionage recovering information forensic tools serves goals spies equally well investigators data hiding process making data difficult find also keeping accessible future use obfuscation encryption data give adversary ability limit identification collection evidence investigators allowing access use common forms data hiding include encryption steganography various forms hardware/software based data concealment different data hiding methods makes digital forensic examinations difficult different data hiding methods combined make successful forensic investigation nearly impossible one commonly used techniques defeat computer forensics data encryption presentation gave encryption anti-forensic methodologies vice president secure computing paul henry referred encryption forensic expert nightmare majority publicly available encryption programs allow user create virtual encrypted disks opened designated key use modern encryption algorithms various encryption techniques programs make data virtually impossible read without designated key file level encryption encrypts file contents leaves important information file name size timestamps unencrypted parts content file reconstructed locations temporary files swap file deleted unencrypted copies encryption programs ability perform number additional functions make digital forensic efforts increasingly difficult functions include use keyfile full-volume encryption plausible deniability widespread availability software containing functions put field digital forensics great disadvantage steganography technique information files hidden within another file attempt hide data leaving plain sight steganography produces dark data typically buried within light data e.g. non-perceptible digital watermark buried within digital photograph experts argued use steganography techniques widespread therefore n't given lot thought experts agree steganography capability disrupting forensic process used correctly according jeffrey carr 2007 edition technical mujahid bi-monthly terrorist publication outlined importance using steganography program called secrets mujahideen according carr program touted giving user capability avoid detection current steganalysis programs use steganography conjunction file compression forms data hiding involve use tools techniques hide data throughout various locations computer system places include memory slack space hidden directories bad blocks alternate data streams hidden partitions one well known tools often used data hiding called slacker part metasploit framework slacker breaks file places piece file slack space files thereby hiding forensic examination software another data hiding technique involves use bad sectors perform technique user changes particular sector good bad data placed onto particular cluster belief forensic examination tools see clusters bad continue without examination contents methods used artefact wiping tasked permanently eliminating particular files entire file systems accomplished use variety methods include disk cleaning utilities file wiping utilities disk degaussing/destruction techniques disk cleaning utilities use variety methods overwrite existing data disks see data remanence effectiveness disk cleaning utilities anti-forensic tools often challenged believe completely effective experts n't believe disk cleaning utilities acceptable disk sanitization base opinions current dod policy states acceptable form sanitization degaussing see national industrial security program disk cleaning utilities also criticized leave signatures file system wiped cases unacceptable widely used disk cleaning utilities include dban srm bcwipe total wipeout killdisk pc inspector cyberscrubs cybercide another option approved nist nsa cmrr secure erase uses secure erase command built ata specification file wiping utilities used delete individual files operating system advantage file wiping utilities accomplish task relatively short amount time opposed disk cleaning utilities take much longer another advantage file wiping utilities generally leave much smaller signature disk cleaning utilities two primary disadvantages file wiping utilities first require user involvement process second experts believe file wiping programs n't always correctly completely wipe file information widely used file wiping utilities include bcwipe r-wipe clean eraser aevita wipe delete cyberscrubs privacysuite disk degaussing process magnetic field applied digital media device result device entirely clean previously stored data degaussing rarely used anti-forensic method despite fact effective means ensure data wiped attributed high cost degaussing machines difficult average consumer afford commonly used technique ensure data wiping physical destruction device nist recommends physical destruction accomplished using variety methods including disintegration incineration pulverizing shredding melting purpose trail obfuscation confuse disorient divert forensic examination process trail obfuscation covers variety techniques tools include log cleaners spoofing misinformation backbone hopping zombied accounts trojan commands one widely known trail obfuscation tools timestomp part metasploit framework timestomp gives user ability modify file metadata pertaining access creation modification times/dates using programs timestomp user render number files useless legal setting directly calling question files credibility another well known trail-obfuscation program transmogrify also part metasploit framework file types header file contains identifying information .jpg would header information identifies .jpg .doc would information identifies .doc transmogrify allows user change header information file .jpg header could changed .doc header forensic examination program operating system conduct search images machine would simply see .doc file skip past anti-forensic tools focused attacking forensic process destroying data hiding data altering data usage information anti-forensics recently moved new realm tools techniques focused attacking forensic tools perform examinations new anti-forensic methods benefited number factors include well documented forensic examination procedures widely known forensic tool vulnerabilities digital forensic examiners heavy reliance tools typical forensic examination examiner would create image computer disks keeps original computer evidence tainted forensic tools hashes created forensic examination software verify integrity image one recent anti-tool techniques targets integrity hash created verify image affecting integrity hash evidence collected subsequent investigation challenged use chassis intrusion detection feature computer case sensor photodetector rigged explosives self-destruction anti-forensic methods rely several weaknesses forensic process including human element dependency tools physical/logical limitations computers reducing forensic process susceptibility weaknesses examiner reduce likelihood anti-forensic methods successfully impacting investigation may accomplished providing increased training investigators corroborating results using multiple tools
[ 2818, 2947, 3972, 2437, 1429, 7968, 675, 5284, 8997, 3629, 11182, 7983, 11695, 7090, 4789, 55, 8635, 2494, 830, 4032, 831, 5186, 1475, 9289, 6475, 7887, 4049, 10195, 6494, 4834, 5475, 7525, 2534, 9319, 11368, 9086 ]
Validation
7,370
8
URL_shortening:url shortening url shortening technique world wide web uniform resource locator url may made substantially shorter still direct required page achieved using redirect links web page long url example url shortened url shortened often redirect domain name shorter original one friendly url may desired messaging technologies limit number characters message example sms reducing amount typing required reader copying url print source making easier person remember intention permalink november 2009 shortened links url shortening service bitly accessed 2.1 billion times uses url shortening beautify link track clicks disguise underlying address although disguising underlying address may desired legitimate business personal reasons open abuse url shortening service providers found spam blacklists use redirect services sites trying bypass blacklists websites prevent short redirected urls posted several reasons use url shortening often regular unshortened links may aesthetically unpleasing many web developers pass descriptive attributes url represent data hierarchies command structures transaction paths session information result urls hundreds characters long contain complex character patterns urls difficult memorize type-out distribute result long urls must copied-and-pasted reliability thus short urls may convenient websites hard copy publications e.g printed magazine book latter often requiring long strings broken multiple lines case e-mail software internet forums truncated twitter instant-messaging services limit number characters message carry however twitter shortens links automatically using url shortening service need use separate url shortening service shorten urls tweet services using url shortener allow linking web pages would otherwise violate constraint shortening services generate urls human-readable although resulting strings longer generated length-optimized service finally url shortening sites provide detailed information clicks link receives simpler setting equally powerful server-side analytics engine unlike latter require access server urls encoded two-dimensional barcodes qr code often shortened url shortener order reduce printed area code allow printing lower density order improve scanning reliability websites create short links make sharing links via instant messaging easier make cheaper send via sms done online web pages url shortening service batch demand may require use api well-known websites set url shortening services use example twitter t.co google g.co godaddy x.co url shortening every long url associated unique key part top-level domain name example key redirection treated equally redirection instruction sent browser contain header http status 301 moved permanently 302 found 307 temporary redirect 308 permanent redirect several techniques implement url shortening keys generated base 36 assuming 26 letters 10 numbers case character sequence alternatively uppercase lowercase letters differentiated character represent single digit within number base 62 26 26 10 order form key hash function made random number generated key sequence predictable users may propose custom keys example shortened protocols capable shortened 2011 although protocols http https ftp ftps mailto mms rtmp rtmpt ed2k pop imap nntp news ldap gopher dict dns addressed services url shortener typically urls supported security reasons combat attacks like xss session hijacking url shortening services support forwarding mailto urls alternative address munging avoid unwanted harvest web crawlers bots may sometimes done using short captcha-protected urls common makers url shorteners usually register domain names less popular esoteric top-level domains order achieve short url catchy name often using domain hacks results registration different url shorteners myriad different countries leaving relation country domain registered url shortener shortened links top-level domains countries libya .ly samoa .ws mongolia .mn malaysia .my liechtenstein .li used well many others cases political cultural aspects country charge top-level domain may become issue users owners usually case services may record inbound statistics may viewed publicly others many providers shortened urls claim never expire always implied small print —there contract breached free service regardless promises — permanent url necessarily good thing security implications obsolete short urls remain existence may circulated long cease point relevant even extant destination sometimes short url useful simply give someone telephone conversation one-off access file download longer needed within couple minutes url shorteners offer time-limited service expire specified period services available include ordinary easy-to-say word url lifetime 5 minutes 24 hours creation url expire specified date specified period creation very-short-lived url 5 characters typing smartphone restriction creator total number uses url password protection microsoft security brief recommends creation short-lived urls reasons explicitly security rather convenience early reference us patent 6957224 describes ... system method computer program product providing links remotely located information network remotely connected computers uniform resource locator url registered server shorthand link associated registered url associated shorthand link url logged registry database request received shorthand link registry database searched associated url shorthand link found associated url url fetched otherwise error message returned patent filed september 2000 patent issued 2005 us patent applications made public within 18 months filing another reference url shortening 2001 first notable url shortening service tinyurl launched 2002 popularity influenced creation least 100 similar websites although simply domain alternatives initially twitter automatically translated urls longer twenty-six characters using tinyurl although began using bit.ly instead 2009 later developed url shortening service t.co 14 august 2009 wordpress announced wp.me url shortener use referring wordpress.com blog post november 2009 shortened links bit.ly accessed 2.1 billion times around time bit.ly tinyurl widely used url-shortening services one service tr.im stopped generating short urls 2009 blaming lack revenue-generating mechanisms cover costs twitter default use bit.ly shortener questioning whether shortening services could profitable url shortening longer term resumed time closed shortest possible long-term urls generated nanourl december 2009 2011 associated top-level .to tonga domain form represents sequence random numbers letters 14 december 2009 google announced service called google url shortener goo.gl originally available use google products google toolbar feedburner extensions google chrome 21 december 2009 google introduced youtube url shortener youtu.be september 2010 google url shortener became available via direct interface goo.gl service provides analytics details qr code generator 30 march 2018 google announced turning support goo.gl coming weeks replacing firebase dynamic links although existing goo.gl links continue function main advantage short link fact short looks neat clean easily communicated entered without error limited extent may obscure destination url though easily discoverable may advantageous disadvantageous irrelevant short link expires terminated security advantages short urls often circumvent intended use top-level domains indicating country origin domain registration many countries requires proof physical presence within country although redirected url guarantee url shortening may utilized spammers illicit internet activities result many removed online registries shut web hosts internet service providers according tonic corporation registry .to domains serious keeping domains spam free may remove url shortening services registry service abused addition u.nu made following announcement upon closing operations google url-shortener discussion group frequently included messages frustrated users reporting specific shortened urls disabled reported spam study may 2012 showed 61 url shorteners shut 614 1002 common cause cited abuse spammers convenience offered url shortening also introduces potential problems led criticism use services short urls example subject linkrot shortening service stops working urls related service become broken legitimate concern many existing url shortening services may sustainable business model long term late 2009 internet archive started 301 works projects together twenty collaborating companies initially whose short urls preserved project shortened internet links typically use foreign country domain names therefore jurisdiction nation libya instance exercised control .ly domain october 2010 shut vb.ly violating libyan pornography laws failure predict problems url shorteners investment url shortening companies may reflect lack due diligence websites prevent short redirected urls posted april 2009 tinyurl reported blocked saudi arabia yahoo answers blocks postings contain tinyurls wikipedia accept links url shortening services articles reddit community strongly discourages subreddits outright bans url shortening services link submissions disguise origin domain name whether link previously submitted reddit legitimate reasons use link shorteners reddit link submissions sites adf.ly use number advertising techniques including interstitial advertising generate revenue may deter readers short url obscures target address used redirect unexpected site examples rickrolling redirecting shock sites affiliate websites short url allow blacklisted urls accessed bypassing site blocks facilitates redirection user blacklisted scam pages pages containing malware xss attacks tinyurl tries disable spam-related links redirecting zonealarm however warned users tinyurl may unsafe website known distribute spyware tinyurl countered problem offering option view link destination using shortened url ability installed browser via tinyurl website requires use cookies destination preview may also obtained prefixing word preview tinyurl url example destination revealed entering url shortening services provide similar destination display security professionals suggest users check short url destination accessing following instance shortening service cli.gs compromised exposing millions users security uncertainties several web applications display destination url shortened url url shortening services filter links bad-site screening services google safe browsing many sites accept user-submitted content block links however certain domains order cut spam reason known url redirection services often added spam blacklists another privacy problem many services shortened url format small enough vulnerable brute-force search many people use url shorteners share links private content fact many web services like google maps offered automatic generation shortened links driving directions reveal personal information like home addresses sensitive destinations like clinics specific diseases including cancer mental diseases addiction treatment centers abortion providers correctional juvenile detention facilities payday car-title lenders gentlemen ’ clubs etc short urls although making easier access might otherwise long url user-space isp server add additional layer complexity process retrieving web pages every access requires requests least one dns lookup though may cached one http/https request thereby increasing latency time taken access page also risk failure since shortening service may become unavailable another operational limitation url shortening services browsers resend post bodies redirect encountered overcome making service reverse proxy elaborate schemes involving cookies buffered post bodies techniques present security scaling challenges therefore used extranets internet-scale services open source commercial scripts also available redirecting shortening links usually written php web application plugin one popular applications wordpress scripts avoid many issues shortening services keep domain name part shortened link made private
[ 2049, 519, 5641, 9737, 10103, 5012, 10390, 1959, 1206, 1083, 1723, 10815, 8644, 9039, 87, 8805, 362, 1643, 9712, 113, 6002, 245, 119 ]
Test
7,371
0
BulNet:bulnet bulgarian wordnet bulnet lexical semantic network bulgarian following princeton wordnet pwn framework implements traditional semantic networks whose structure consists nodes relations nodes bulnet started within eu-funded project balkanet multilingual semantic network balkan languages directed construction synchronized semantic databases following balkan languages bulgarian greek romanian serbian turkish expansion czech lexical-semantic network balkanet completion development bulgarian wordnet continued within nationally funded projects bulnet lexical-semantic network bulgarian 2005-2010 language e-resources processing tools 2011-2013 latter co-funded project cesar central south-east european resources information communication technologies policy support programme call cip ict-psp-2010-4 currently bulgarian wordnet comprises 80,000 april 15 2015 synonym sets distributed nine parts speech nouns verbs adjectives adverbs pronouns prepositions conjunctions particles interjections words included bulgarian wordnet selected according different criteria main ones frequency analysis word occurrences large text corpora taking account number occurrences citation forms wordforms well inclusion synsets already featuring wordnets languages synsets correspond high-frequency word senses found parallel corpora synonym set synset encodes relation equivalence number lexical items literals least one explicitly represented synset unique meaning specified value sense pertain one part speech specified value pos represent one lexical meaning specified value def synset linked counterpart pwn 3.0 means unique identification number id common synsets balkan languages marked common concepts subsets bcs monolingual database synset linked least one synset intralingual relation non-obligatory information may also encoded examples usage stylistic peculiarities morphological syntactic properties author last edit details large number relations encoded bulgarian wordnet effectively illustrates language semantic derivational richness offers diverse opportunities numerous applications multilingual database bulgarian electronic semantic database offers linguistic solutions semantic level options synonym selection queries semantic relations word language lexical system antonymy holonymy etc explanatory definition queries translation equivalents lexical item bulgarian wordnet electronic multilingual dictionary synonym sets along explanatory definitions sets semantic relations words language hydra os-independent system designed wordnet development validation exploration program enables users browse edit number monolingual wordnets time individual wordnets synchronised equivalent synonym sets synsets may viewed explored parallel
[ 416, 4469 ]
Validation
7,372
9
JavaPoly:javapoly javapoly library polyfills native jvm support within modern web browser allows websites import java libraries call directly javascript even user java installed computer unlike gwt teavm attempt compile subset java javascript javapoly actually executes java bytecode instructions means javapoly run almost java library including libraries use threads shared memory locking primitives 64-bit integers javapoly designed optimize performance taking advantage native jvms available running node.js javapoly always use native jvm thereby utilize native capabilities like multi-core support otherwise unavailable javascript applications similarly javapoly take advantage native java support within web browser support available suitable alternatives detected javapoly call doppio vm provides execution support legacy browsers
[ 803, 3462, 6797, 7983, 5872, 823 ]
Test
7,373
8
Open_Power_Template:open power template open power template web template engine written php 5 common strategy designing web application separation application logic i.e data processing presentation displaying data opt tool implementing separation presentation layer represented templates text files html code extra instructions controlling data substitution opt uses dedicated xml template language writing templates general-purpose domain-specific language primarily designed support simplify template-specific problems set declarative instructions instead implementing rendering algorithms statements like imperative programming template designer specifies expected result features aims ease costs efforts associated software development maintenance library provides object-oriented api based solutions popular frameworks first member bigger project open power libs built upon small opl core library provides basic features project started november 2004 template engine discussion board project inspired smarty later failed library became independent july 2006 version 1.0.0 released offered template language smarty-like syntax small set declarative instructions january 2007 developers release version 1.1.0 brings notable improvements pagination support tree rendering january 2008 developers form open-source programming team invenzzia develop opt php projects time development open power template 2.0 began last version 1.1 branch released may 2008 group focused opt 2.0 development new library went beta-stage december first stable version released july 2009 opt 2.0 template language xml application allows manipulate xhtml document structure features built-in xml parser reconfigured parse certain html documents plain text content since templates separated application logic need least two files first one contains presentation code xml template second one generates data configures library
[ 8644, 4198, 9926, 9320, 7658, 7627, 479 ]
Validation
7,374
9
PrimeFaces:primefaces primefaces open-source user interface ui component library javaserver faces-based applications created turkish company primetek informatics initial development primefaces started late 2008 predecessor primefaces yui4jsf library set jsf components based yui javascript library yui4jsf got cancelled favor primefaces early 2009 since release primefaces strongly supported oracle particularly within netbeans world packt publishing publish books technology
[ 6338, 1802, 5612, 5677, 7983, 1910, 10526 ]
Validation
7,375
2
Bootsplash:bootsplash bootsplash also known bootscreen graphical representation boot process operating system bootsplash simple visualisation scrolling boot messages console also present graphics combinations unlike splash screens bootsplash necessarily designed marketing purposes enhance experience user eye candy provide user messages added advantage color-coding facility diagnose state system versions microsoft windows feature boot screen loaded startup process extra third-party utilities possible replace default windows boot screen custom images text and/or animations windows vista default boot screen represented green indeterminate progress indicator boot screen changed displays static image aurora text starting windows vista enabling gui boot option within windows system configuration utility msconfig.exe microsoft would update aurora image throughout lifecycle operating system starting first service pack altered match image displayed operating system hibernation screen windows 7 change boot screen although possible third-party utilities extremely risky may cause system unable boot also hidden aurora bootscreen removed
[ 7106, 3109, 6055, 7983, 8112, 9455, 6771, 11095, 3033, 3867, 9693, 3550, 2811 ]
Test
7,376
5
FreeS/WAN:frees/wan frees/wan free secure wide-area networking free software project implemented reference version ipsec network security layer linux project goal ubiquitous opportunistic encryption internet traffic realized although contribute general internet encryption project founded john gilmore administered duration hugh daniel john ioannidis angelos keromytis started codebase outside united states america prior autumn 1997 technical lead project henry spencer later michael richardson ike keying daemon pluto maintained d. hugh redelmeier ipsec kernel module klips maintained richard guy briggs sandy harris main documentation person project later claudia schmeing final frees/wan version 2.06 released 22 april 2004 earlier version 2.04 forked form two projects openswan strongswan openswan since 2012 forked libreswan
[ 3206, 10889, 9722, 3731, 8211, 11162, 3742, 9764, 939, 4268, 7983, 10417, 7859, 2228, 823, 3777, 2884, 5959, 8265, 11468, 11606, 2136, 9048, 6490, 6364, 5084, 10210, 9318, 8039, 11248, 5749, 3322 ]
Test
7,377
4
System_Management_Mode:system management mode system management mode smm sometimes called ring -2 reference protection rings operating mode x86 central processor units cpus normal execution including operating system suspended alternate software system usually resides computer firmware hardware-assisted debugger executed high privileges first released intel 386sl initially special sl versions required smm intel incorporated smm mainline 486 pentium processors 1993 amd implemented intel smm am386 processors 1991 available later microprocessors x86 architecture smm special-purpose operating mode provided handling system-wide functions like power management system hardware control proprietary oem designed code intended use system firmware applications software general-purpose systems software main benefit smm offers distinct easily isolated processor environment operates transparently operating system executive software applications order achieve transparency smm imposes certain rules smm entered smi system management interrupt processor executes smm code separate address space made inaccessible operating modes cpu firmware initially system management mode used implementing advanced power management apm features however time bios manufacturers relied smm functionality like making usb keyboard work real mode uses system management mode system management mode also abused run high-privileged rootkits demonstrated black hat 2008 2015 smm entered via smi system management interrupt invoked entering smm processor looks first instruction address smbase smbase register content 8000h default 38000h using registers cs 3000h eip 8000h cs register value 3000h due use real mode memory addresses processor smm case cs internally appended 0h rightmost end design operating system override disable smi due fact target malicious rootkits reside including nsa implants individual code names specific hardware like souffletrough juniper networks firewalls j-series routers company dell hp proliant servers improperly designed insufficiently tested smm bios code make wrong assumptions work properly interrupting modes like pae 64-bit long mode according documentation linux kernel around 2004 buggy implementations usb legacy support feature common cause crashes example motherboards based intel e7505 chipset since smm code smi handler installed system firmware bios os smm code may expectations hardware settings incompatible different ideas advanced programmable interrupt controller apic set operations smm take cpu time away applications operating system kernel hypervisor effects magnified multicore processors since smi causes cores switch modes also overhead involved switching smm since cpu state must stored memory smram write-back caches must flushed destroy real-time behavior cause clock ticks get lost windows linux kernels define ‘ smi timeout ’ setting period within smm handlers must return control operating system ‘ hang ’ ‘ crash ’ smm may disrupt behavior real-time applications constrained timing requirements logic analyzer may required determine cpu entered smm checking state smiact pin cpu recovering smi handler code analyze bugs vulnerabilities secrets requires logic analyzer disassembly system firmware
[ 9366, 11550, 7983, 565, 7354, 2811, 9791, 6596, 6730, 9932, 4695, 5080, 4444, 3294, 1247, 2275, 1515, 1776, 499, 1143, 1915, 1660, 255 ]
None
7,378
6
Xsan:xsan xsan apple inc. storage area network san clustered file system macos xsan enables multiple mac desktop xserve systems access shared block storage fibre channel network xsan file system installed computers read write storage volume time xsan complete san solution includes metadata controller software file system client software integrated setup management monitoring tools xsan normal features expected enterprise shared disk file system including support large files file systems multiple mounted file systems meta data controller failover fault tolerance support multiple operating systems xsan based stornext file system made quantum corporation stornext file system xsan file system share file system layout protocol talking meta data server also seem share common code base close development based new features developed file systems xsan website claims complete interoperability stornext file system xsan completely interoperable quantum ’ stornext file system even provide clients windows linux unix platforms direct fibre channel block-level access data xsan-managed storage pool quantum corporation claims complete interoperability apple ’ xsan promise raid allows xsan xserve raid support aix hp-ux irix red hat linux suse linux mac os x solaris windows clients including support 64 bit windows windows vista command line tools xsan begin letters cv stand centravision – original name file system xsan clients use tcp ports 49152–65535 tcp/63146 frequently showing log files xsan file system uses several logical storages distribute information two main classes information appear xsan user data files file system metadata folders file names file allocation information configurations use different storages data metadata file system supports dynamic expansion distribution data metadata areas january 4 2005 apple announced shipping xsan may 2006 apple released xsan 1.2 support volume sizes nearly 2 petabytes august 7 2006 apple announced xsan 1.4 available intel-based macintosh computers universal binary supports file system access control lists december 5 2006 apple released xsan 1.4.1 october 18 2007 apple released xsan 1.4.2 resolves several reliability compatibility issues february 19 2008 apple released xsan 2 first major update introduces multisan completely redesigned administration tools 2.1 introduced june 10 2008 2.1.1 introduced october 15 2008 2.2 released september 14 2009 july 20 2011 apple released xsan 2.3 included mac os x lion first version xsan included macos august 25 2011 apple released xsan 2.2.2 brought along several reliability fixes july 25 2012 apple released xsan 3 included os x mountain lion october 17 2014 apple released xsan 4 os x yosemite september 20 2016 apple released xsan 5 macos sierra macos server 5.2
[ 5120, 10755, 9732, 1549, 3598, 4111, 6669, 10257, 6677, 5142, 8214, 9762, 5158, 6186, 6700, 8754, 9784, 11323, 576, 5696, 8772, 1623, 3167, 3681, 4708, 2149, 3691, 9836, 7789, 9333, 6263, 6264, 9335, 7292, 2686, 7806, 9343, 7818, 654, 219...
None
7,379
3
CDemu:cdemu cdemu free open-source virtual drive software designed emulate optical drive optical disc including cd-roms dvd-roms linux operating system cdemu available official repositories debian ubuntu fedora linux release available via official ppa ubuntu copr fedora linux cdemu consists software portable operating systems supported glib exceptions kernel module clients rely d-bus communication cdemu originally designed robert penz justus schwartz patch mplayer allowed mounting .cue/.bin files patch completed realized simplicity wrote module linux kernel originally cdemu named virtual cd name previously trademarked owners trademark requested use name june 2007 development cdemu 0.8 ceased rewrite developed instead work done rok mandeljc new version cdemu took another approach emulation much possible userspace june 2008 considered mostly stable version 2.0.0 cdemu supports following image formats emulator endeavors follow mmc-3 standard scsi optical drives closely possible ensuring realistic accurate emulation optical media emulated cdemu mounted within linux cdemu support cd subchannels cd-text isrc,mcn ecc/edc dpm/rmps also support limited number encrypted compressed image formats developers working supporting many major formats encourage users submit patches end alternative linux programs available repositories debian ubuntu fedora linux
[ 10016, 451, 4615, 10857, 5612, 6797, 6062, 7983, 3760, 10476, 11568, 5397, 823 ]
Test
7,380
4
Deep_Freeze_(software):deep freeze software deep freeze faronics software application available microsoft windows macos operating systems allows system administrators protect core operating system configuration files workstation server restoring computer back saved configuration time computer restarted also known reboot restore software deep freeze also protect computer harmful malware since automatically deletes rather longer sees downloaded files computer restarted advantage using deep freeze uses system resources thus slow computer performance greatly disadvantage provide real-time protection therefore infected computer would restarted order remove malware deep freeze protects workstations fresh-booted state deep freeze prevents permanent tampering protected hard drives/partitions across reboots user activity restarts limited program example deep freeze prevent application installation user install modified version web browser seemingly harmless unknowing user designed secretly send users passwords server connected internet workaround deep freeze configured restart user logout shutdown chosen period inactivity restart/shutdown scheduled time attempt ensure installations retained rebooting system returns system original unmodified state deep freeze protect operating system hard drive upon installed computer booted another medium another bootable partition internal hard drive external hard drive usb device optical media network server cases user would real access contents supposedly frozen system windows-based computer scenario may prevented configuring cmos nonvolatile bios memory workstation boot hard drive protected password-protecting cmos normal precaution public access computers precaution would lock pc case shut physical lock tiedown cable system prevent access motherboard jumpers deep freeze protect hard drive partitions larger 2 tb capacity using ntfs
[ 5411, 8197, 6797, 7983, 2193, 8572, 5018, 7515, 3484, 925 ]
Test
7,381
4
ElephantDrive:elephantdrive elephantdrive storage virtualization service used primarily online backup tool also remote access service/collaboration tool service runs windows mac platforms allows users create simple automated rules protecting data moving elephantdrive account elephantdrive makes use infrastructure-on-demand part architecture one first popular examples applications built amazon s3 simple storage service elephantdrive initially utilized amazon s3 tool datacenter migration quickly moved production infrastructure elephantdrive first major breakthrough came conjunction 2008 closing early cloud storage provider aol property xdrive service offered free tool migrating files xdrive platform simplifying process switching providers company turned focus network attached storage nas space designing deploying cloud storage optimized run natively nas devices series partnerships hardware makers initial partnership netgear storage product line readynas systems form co-branded embedded cloud backup service called readynas vault additional cloud storage nas integration launched hardware makers qnap thecus opted use elephantdrive brand opposed vault co-branding
[ 11201, 6565, 1801, 6797, 7983 ]
Test
7,382
2
Nemesis_(operating_system):nemesis operating system nemesis operating system designed university cambridge university glasgow swedish institute computer science citrix systems nemesis conceived multimedia uses mind microkernel environment application typically implemented number processes servers performing work behalf one client leads enormous difficulty accounting resource usage kernel-based system multimedia applications spend time kernel leading similar problems guiding principle design nemesis structure operating system way majority code could execute application process nemesis therefore extremely small lightweight kernel performed operating system functions shared libraries executed user process isas nemesis supports include x86 intel i486 pentium pentium pro pentium ii alpha arm strongarm sa-110 nemesis also runs evaluation boards 21064 21164
[ 2560, 6155, 6675, 7187, 10776, 25, 4637, 9762, 4643, 6180, 5158, 7217, 10803, 9784, 10809, 576, 2625, 3142, 6221, 3160, 10333, 97, 11363, 6760, 10856, 8298, 9835, 7285, 4727, 2168, 9335, 634, 1147, 3197, 1150, 5247, 11390, 2179, 10883, 10...
Test
7,383
2
Veriexec:veriexec veriexec file-signing scheme netbsd operating system introduces special device node /dev/veriexec signature list loaded kernel list contains file paths together hashes expected file type direct executables indirect scripts file shared libraries regular files kernel verifies contents signed files hashes opened exec open system call veriexec enabled level 0 kernel simply warn signature mismatches level 1 prevent access mismatched files level 2 prevents signed files overwritten deleted highest level 3 kernel allow unsigned files accessed
[ 1286, 1801, 10000, 274, 9762, 8998, 1071, 11184, 11698, 9671, 1993, 8909, 1361, 4571, 7907, 10851, 2415, 8816, 2545, 11506, 3571, 5492, 9343 ]
None
7,384
5
Konversation:konversation konversation internet relay chat irc client built kde platform free software released terms gnu general public license konversation currently maintained kde extragear network module means release cycle independent main kde applications default irc client many prominent linux distributions opensuse kde spin fedora kubuntu konversation supports ipv6 connections offers ssl server support supports blowfish encryption also supports identity management multiple server connections using separate identities different servers display multiple servers channels one window konversation features automatic utf-8 detection support different encodings different channels also features optional on-screen display osd message notifications save bookmarks channels servers konversation supports colors text decorations themable nicklist icons konversation also scriptable using shell scripts via d-bus includes support aliases action system automatic events also identifies different users conversation window choosing random color user
[ 5760, 5251, 6797, 7181, 10387, 5397, 543, 6694, 8621, 7861, 823, 10687, 5316, 3407, 5199, 6991, 2387, 3030, 5470, 2409, 5612, 6257, 2804, 3828, 6389, 3959 ]
Test
7,385
2
DAVIX:davix davix live cd based slackware purposes computer security operations distribution focuses data analysis visualization davix stands data analysis visualization linux first live cd integrate many visualization tools long-term goal distribution provide good set tools supporting complete process visual data analysis jan monsch began work cd december 2007 discussions raffael marty january 2008 jan agreed produce cd applied security visualization based list utilities raffael discussed book davix contains collection 25 free tools data processing visualization examples tools davix cd ships 15 chapter manual covers davix use customization examples screenshots additionally utilities system documentation pages davix cd based slax computer information security visualization form visualization computer graphics enterprise environments computer security information generated large volumes become difficult analyze without visual context using davix security engineer visually spot anomalies network traffic changes ip sources/destinations network protocols application protocols traffic patterns frequency volume davix released black hat briefings/def con august 2008
[ 8837, 7435, 10127, 2321, 5397, 4887, 1150, 10394, 3486, 673, 3745, 10530, 9253, 10149, 11305, 7854, 2738, 4790, 439, 56, 59, 7483, 3903, 4673, 2375, 4039, 842, 8907, 1110, 9693, 2914, 2275, 485, 3685, 9064, 4841, 6890, 7913, 7020, 10860, ...
Test