node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
7,386
9
ML_(programming_language):ml programming language ml meta language general-purpose functional programming language roots lisp characterized lisp types known use polymorphic hindley–milner type system automatically assigns types expressions without requiring explicit type annotations ensures type safetythere formal proof well-typed ml program cause runtime type errors ml provides pattern matching function arguments garbage collection imperative programming call-by-value currying used heavily programming language research one languages completely specified verified using formal semantics types pattern matching make well-suited commonly used operate formal languages compiler writing automated theorem proving formal verification features ml include call-by-value evaluation strategy first-class functions automatic memory management garbage collection parametric polymorphism static typing type inference algebraic data types pattern matching exception handling ml uses static scoping rules ml referred impure functional language although encourages functional programming allow side-effects like languages lisp unlike purely functional language haskell like programming languages ml uses eager evaluation meaning subexpressions always evaluated though lazy evaluation achieved use closures thus one create use infinite streams haskell expression indirect ml strengths mostly applied language design manipulation compilers analyzers theorem provers general-purpose language also used bioinformatics financial systems ml developed robin milner others early 1970s university edinburgh whose syntax inspired iswim historically ml conceived develop proof tactics lcf theorem prover whose language pplambda combination first-order predicate calculus simply-typed polymorphic lambda calculus ml metalanguage today several languages ml family three prominent standard ml sml ocaml f ideas ml influenced numerous languages like haskell cyclone nemerle ats elm following examples use syntax standard ml ml dialects ocaml f differ small ways factorial function expressed pure ml describes factorial recursive function single terminating base case similar descriptions factorials found mathematics textbooks much ml code similar mathematics facility syntax part definition shown optional describes types function notation e read expression e type instance argument n assigned type integer int fac n int result applying fac integer n also type integer function fac whole type function integer integer int int fac accepts integer argument returns integer result thanks type inference type annotations omitted derived compiler rewritten without type annotations example looks like function also relies pattern matching important part ml programming note parameters function necessarily parentheses separated spaces function argument 0 zero return integer 1 one cases second line tried recursion executes function base case reached implementation factorial function guaranteed terminate since negative argument causes infinite descending chain recursive calls robust implementation would check nonnegative argument recursing follows problematic case n negative demonstrates use ml exception system function improved writing inner loop tail-recursive style call stack need grow proportion number function calls achieved adding extra accumulator parameter inner function last arrive following function reverses elements list precisely returns new list whose elements reverse order compared given list implementation reverse correct clear inefficient requiring quadratic time execution function rewritten execute linear time following efficient though less easy-to-read style notably function example parametric polymorphism consume lists whose elements type return lists type modules ml system structuring large projects libraries module consists signature file one structure files signature file specifies api implemented like c header file java interface file structure implements signature like c source file java class file example following define arithmetic signature implementation using rational numbers imported interpreter 'use command interaction implementation allowed via signature functions example possible create 'rat data object directly via code 'structure block hides implementation detail outside ml standard libraries implemented modules way
[ 512, 2304, 9345, 5623, 7558, 6536, 8587, 397, 10510, 6160, 3601, 11028, 2069, 5783, 8088, 2585, 11032, 3613, 5920, 10145, 8738, 3876, 4134, 5031, 2216, 5033, 5040, 1333, 11574, 2617, 9914, 10043, 10555, 10049, 963, 8262, 3144, 7627, 10571, ...
Test
7,387
3
MultiProcessor_Specification:multiprocessor specification multiprocessor specification mps x86 architecture open standard describing enhancements operating systems firmware allow work x86-compatible processors multi-processor configuration mps covers advanced programmable interrupt controller apic architectures version 1.1 specification released april 11 1994 version 1.4 specification released july 1 1995 added extended configuration tables improve support multiple pci bus configurations improve expandability linux kernel freebsd known support intel mps utility called 'mptable used examine mps table motherboards since newer machines support advanced configuration power interface acpi subsumes mps functionality mps part supplanted acpi mps still useful machines operating systems support acpi
[ 833, 9541, 7783, 4491, 9582, 7983, 3537, 2514, 7313, 2516, 9500, 10620, 9369, 4444, 8125, 3294 ]
Test
7,388
7
Global_Information_Grid:global information grid global information grid gig all-encompassing communications project united states department defense defined globally interconnected end-to-end set information capabilities collecting processing storing disseminating managing information demand warfighters policy makers support personnel gig includes owned leased communications computing systems services software including applications data security services associated services national security systems non-gig information technology includes stand-alone self-contained embedded connected enterprise network new definition removes references national security systems defined section 5142 clinger-cohen act 1996 new definition removes references gig providing capabilities operating locations bases posts camps stations facilities mobile platforms deployed sites lastly definition removes part definition discusses interfaces coalition allied non-department defense users systems dod use term gig undergoing changes department deals new concepts cyberspace operations gig 2.0 joint staff j6 initiative department defense information enterprise die gig managed construct known netops netops defined operational framework consisting three essential tasks situational awareness sa command control c2 commander cdr united states strategic command usstratcom coordination dod global netops community employs operate defend gig ensure information superiority department defense information enterprise defined dod information resources assets processes required achieve information advantage share information across department defense mission partners includes network-centric warfare ncw doctrine represents fundamental shift military culture away compartmentalized war machines toward interconnected units operating cohesively tenets network centric warfare enterprise level forging new paths components military communicate ease logistics burdens improve communication combat effectiveness war fighter decrease instances confusion-related fratricide accelerate trend minimizing collateral damage hasten flow business warfighter situational awareness would improved tremendously linking sees overhead satellite sees fog war would lifted seamless communication unit members site detection devices commanders operating behind line improved coordination may also assist delivering appropriate firepower tangible assets first responders domestic attacks natural disasters worldwide
[ 774, 7528, 8968, 9480, 6861, 2607, 8091, 9725, 1567 ]
Validation
7,389
7
Wolf_Frameworks:wolf frameworks wolf frameworks web application designing development platform service based india united states represented via partners worldwide founded 2006 cloud computing infrastructure offered company enables users design deliver cross platform saas applications without writing technical code wolf 100 ajax xml .net based enables building mashable interoperable web applications using browser internet connection knowledge modelling business
[ 4194, 10020, 4107, 467, 3573, 2901, 479 ]
Train
7,390
4
Geospatial_authentication:geospatial authentication software package designed allow authentication determining rover is/are within set boundaries specific area access critical geospatial information using gps signal structures means authenticate mobile devices network wirelessly real-time developed advantage lies system allows designated geospatial boundaries areas server geospatial authentication software two parts — server client server software virtual private network vpn developed linux operating system using perl programming language server stand-alone vpn server combined applications services client software gui windows ce software mobile graphical software allows users authenticate network purpose client software pass needed satellite information server authentication work done stacey d. lyle geospatial research innovation design nasa ’ stennis space center
[ 5749 ]
Train
7,391
5
RTP_Control_Protocol:rtp control protocol rtp control protocol rtcp sister protocol real-time transport protocol rtp basic functionality packet structure defined rfc 3550 rtcp provides out-of-band statistics control information rtp session partners rtp delivery packaging multimedia data transport media data primary function rtcp provide feedback quality service qos media distribution periodically sending statistics information transmitted octet packet counts packet loss packet delay variation round-trip delay time participants streaming multimedia session application may use information control quality service parameters perhaps limiting flow using different codec typically rtp sent even-numbered udp port rtcp messages sent next higher odd-numbered port rtcp provide flow encryption authentication methods mechanisms may implemented example secure real-time transport protocol srtp defined rfc 3711 rtcp provides basic functions expected implemented rtp sessions rtcp reports expected sent participants even multicast session may involve thousands recipients traffic increase proportionally number participants thus avoid network congestion protocol must include session bandwidth management achieved dynamically controlling frequency report transmissions rtcp bandwidth usage generally exceed 5 total session bandwidth furthermore 25 rtcp bandwidth reserved media sources times large conferences new participants receive cname identifiers senders without excessive delay rtcp reporting interval randomized prevent unintended synchronization reporting recommended minimum rtcp report interval per station 5 seconds stations transmit rtcp reports often every 5 seconds rtcp distinguishes several types packets sender report receiver report source description goodbye addition protocol extensible allows application-specific rtcp packets standards-based extension rtcp extended report packet type introduced rfc 3611 large-scale applications internet protocol television iptv long delays minutes hours rtcp reports may occur rtcp bandwidth control mechanism required control congestion see protocol functions acceptable frequencies usually less one per minute affords potential inappropriate reporting relevant statistics receiver cause evaluation media sender inaccurate relative current state session methods introduced alleviate problems rtcp filtering rtcp biasing hierarchical aggregation hierarchical aggregation also known rtcp feedback hierarchy optimization rtcp feedback model aim shift maximum number users limit together quality service qos measurement rtcp bandwidth constant takes 5 session bandwidth therefore reporting interval qos depends among others number session members large sessions become high minutes even hours however acceptable interval 10 seconds reporting bigger values would cause time-shifted inaccurate reported status current session status optimization made sender could even negative effect network qos conditions hierarchical aggregation used source-specific multicast single source allowed i.e iptv another type multicast could any-source multicast suitable large-scale applications huge number users modern iptv systems use hierarchical aggregation feedback target new type member firstly introduced internet draft draft-ietf-avt-rtcpssm-13 hierarchical aggregation method extended functionality function member receive receiver reports rr see rtcp retransmit summarized rr packets so-called receiver summary information rsi sender case single level hierarchy
[ 10242, 3847, 649, 9868, 3218, 9365, 10005, 11413, 5402, 5531, 3742, 10270, 10271, 9380, 2085, 9381, 3751, 3752, 10924, 562, 2996, 9909, 10171, 4797, 5181, 3133, 3006, 5437, 7364, 2887, 8265, 2509, 4687, 6993, 5843, 2904, 5469, 5470, 5471, ...
Test
7,392
9
PicoLisp:picolisp picolisp programming language dialect language lisp runs operating systems including linux others portable operating system interface posix compliant prominent features simplicity minimalism built one internal data type cell language level programmer use three different data types numbers symbols lists represented cells differentiated bits end cell free open-source software released mit license x11 functions accept arbitrary types numbers arguments macros needed rare cases implemented using quote function picolisp include lisp lambda function quote function changed return arguments unevaluated codice_1 first special feature intrinsic create read update delete crud functioning persistent symbols first-class citizens objects loaded database files automatically accessed written back modified applications written using class hierarchy entities relations features include prolog engine database engine database queries distributed databases inlining c language functions native c function calls child process management interprocess communication browser graphical user interface gui internationalization localization 1980s picolisp began development macintosh used commercial application development since ported dos sco unix since 1993 used mainly linux mid-1990s database functions added first versions written mix c assembly language 1999 first rewrite scratch done fully c. 2002 version released gnu general public license gnu gpl 2010 changed mit/x11 license 2009 64-bit version released another rewrite time written generic assembly turn implemented picolisp version adds support coroutines december 2010 java version named ersatz picolisp released september 2014 burger announced pilmcu project picolisp development listserv effort george orais implement picolisp hardware directly summer 2016 development pilbox picolisp box – generic android app allowing write apps pure picolisp – started still developed maintained
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 2585, 4122, 4633, 8226, 5677, 3119, 2105, 3132, 6717, 8258, 8771, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 2666, 5751, 7805, 9345, 1159, 1673, 9865, 9877, 5803, 2225, 6840, 7...
None
7,393
7
Foundation_network:foundation network relayware formerly foundation network vendor partner relationship management prm solutions delivers businesses internet using software service model foundation network founded 1997 former business consultant technologist simon wallace-jones later year company secured first global customer 3com network infrastructure vendor april 2008 foundation network announced release relayware 8 next-generation prm software foundation network became relayware 2010 established headquarters redwood shores california usa
[ 467 ]
Validation
7,394
9
Robert_Harper_(computer_scientist):robert harper computer scientist robert william bob harper jr. computer science professor carnegie mellon university works programming language research harper made major contributions design standard ml programming language lf logical framework harper named acm fellow 2005 awarded honor contributions type systems programming languages 2003–2008 harper hosted progressive talk show left wrct-fm fellow host carnegie mellon university school computer science faculty member danny sleator
[ 7808, 10049, 11490, 3876, 8262, 6536, 1936, 5585, 6070, 7386 ]
None
7,395
9
Esoteric_programming_language:esoteric programming language esoteric programming language sometimes shortened esolang programming language designed test boundaries computer programming language design proof concept software art hacking interface another language particularly functional programming procedural programming languages joke use esoteric distinguishes languages programming languages working developers use write software usually esolang creators intend language used mainstream programming although esoteric features visuospatial syntax inspired practical applications arts languages often popular among hackers hobbyists usability rarely goal esoteric programming language designers—often design leads quite opposite usual aim remove replace conventional language features still maintaining language turing-complete even one computational class unknown earliest still canonical example esoteric language intercal designed 1972 woods james m. lyon stated intention unlike programming language authors familiar parodied elements established programming languages day fortran cobol assembly language many years intercal represented paper copies intercal manual language revival 1990 implementation c unix stimulated wave interest intentional design esoteric computer languages 1993 wouter van oortmerssen created false small stack-oriented programming language syntax designed make code inherently obfuscated confusing unreadable also compiler 1024 bytes inspired urban müller create even smaller language now-infamous brainfuck consists eight recognized characters along chris pressey befunge like false two-dimensional instruction pointer brainfuck one best-supported esoteric programming languages canonical examples minimal turing tarpits needlessly obfuscated language features brainfuck related p′′ family turing machines turing tarpit turing-complete programming language computable function could theoretically written impractically difficult esoteric languages may described turing tarpits especially aim minimize number language features method encoding programs substring encoding instruction single instruction always includes two sequential phases choosing operation executing list operations may either static—as remorse thrat—or dynamic—as remorse4ever example based remorse thrat paradigm language fall number categories categories used get general understanding way specific language operates include imperative languages brainfuck instructions describe change data functional languages unlambda data code less interchangeable execution repeated application functions results functions rewriting languages thue transformation functions applied initial state funge esoteric programming language models programs metric spaces coordinate systems often necessarily cartesian execute instructions located points program space moving instruction pointer position vector indicates currently executing instruction space different instructions determine direction instruction pointer moves consequently sequence instructions executed current official standard behaviour programming languages funge-98 specification specification generalisation semantics befunge programming language two-dimensional toroidal topology languages adhere closely standard unefunge one-dimensional trefunge three-dimensional sometimes called funges distant relatives differ significant respects referred fungeoids one instruction set computer machine supports one operation deterministic language one given current state program next state always predicted true nondeterministic language languages deterministic languages befunge supply built-in randomization instruction moreover languages java2k randomized instructions thus getting even trivial programs reliable output often monumental outright impossible task nondeterministic languages used explore large search spaces grammars exhaustive search impractical random text generators dada engine rmutt examples kind nondeterminstic language esoterically nondeterministic algorithms employed theoretical investigation hypercomputation characteristic examples esoteric programming languages arnoldc esoteric programming language based one-liners arnold schwarzenegger following hello world programmed arnoldc showtime talk hand hello world terminated asciidots esoteric programming language based ascii art language dots represented periods codice_1 travel ascii art paths undergo operations example code golf counter 1/ befunge allows instruction pointer roam multiple dimensions code example following program displays hello world pushing characters reverse order onto stack printing characters loop circulates clockwise instructions codice_2 codice_3 codice_4 codice_5 codice_6 codice_7 binary lambda calculus designed algorithmic information theory perspective allow densest possible code minimal means featuring 29 byte self interpreter 21 byte prime number sieve 112 byte brainfuck interpreter brainfuck designed extreme minimalism leads obfuscated code programs containing eight distinct characters following program outputs hello world chef david morgan-mar stack-oriented programming language designed make programs look like cooking recipes programs consist title list variables data values list stack manipulation instructions joking design principle states program recipes generate valid output easy prepare delicious morgan-mar notes example hello world program 101 eggs 111 cups oil would produce lot food one person false stack-based language single-character commands variables example 3 1 calculated evaluating λ x → x 1 3 fim++ object-oriented programming language based television show fim++ programs read like plain english style show 'friendship reports following program prints hello world fim++ supports many modern language features interfaces inheritance importing files uniquely variable names contain spaces fim++ dear princess celestia hello world today learned say hello world said hello world say hello world faithful student twilight sparkle fractran program ordered list positive fractions together initial positive integer input formula_1 program run multiplying integer formula_1 first fraction formula_3 list formula_4 integer integer formula_1 replaced formula_4 rule repeated fraction list produces integer multiplied formula_1 program halts fractran invented mathematician john conway .gertrude named gertrude stein designed gerson kurz enable programs vaguely resemble poetry programs golfscript consist lists items pushed onto stack encountered exception variables code blocks value case code executed grass functional programming language uses characters codice_8 codice_9 codice_4 thus programs grass said look like ascii art grass grass formal specification based untyped lambda calculus secd machine grass confused grass different programming language intercal short compiler language pronounceable acronym created 1972 parody satirize aspects various programming languages time jsfuck esoteric programming style javascript code written using six characters codice_11 codice_12 codice_13 codice_14 codice_15 codice_16 unlike brainfuck requires compiler interpreter jsfuck valid javascript code meaning jsfuck programs run web browser engine interprets javascript lolcode designed resemble speech lolcats following hello world example lolcode frequently criticized esoteric rather ordinary procedural language unusual vocabulary lollipop church esoteric programming language programs look like russian guide books lollipop church designed shakila tayefeh 7 april 2019 following hello world example gulfoffinland hello world malbolge 8th circle hell designed difficult esoteric programming language among features code self-modifying design effect instruction depends address memory modiscript esoteric programming language entirely consists quotes indian prime minister narendra modi speeches language follows many ideologies import rule importation code allowed consistent make india campaign following code prints mandir wahin banayenge mitrooon bjp governed state hai sp opposition hai agar ye sach hai nahi toh achhe din aa gaye piet language designed david morgan-mar whose programs bitmaps look like abstract art compilation guided pointer moves around image one continuous coloured region next procedures carried pointer exits region 20 colours behaviour specified 18 colourful colours ordered 6-step hue cycle 3-step brightness cycle black white ordered exiting colourful colour entering another one performed procedure determined number steps change hue brightness black entered pointer tries enter black region rules choosing next block changed instead possible rules tried program terminates regions outside borders image also treated black white perform operations allows pointer pass behaviour colours 20 specified left compiler interpreter variables stored memory signed integers single stack specified procedures deal operations stack others input/output rules compilation pointer moves piet named dutch painter piet mondrian originally intended name mondrian already taken pikachu esoteric programming language developed nilabhro datta whose programs look like dialect pikachu stated purpose easily usable pikachu programs written language readable writable pikachu end pikachu makes use 3 valid syntax elements codice_17 codice_18 codice_19 rockstar designed creating computer programs also song lyrics heavily influenced lyrical conventions 1980s hard rock power ballads dynamically typed turing-complete following example line code multiplies value codice_20 codice_21 stores codice_22 shakespeare designed make programs look like shakespearean plays example following statement declares point program reached via goto-type statement train completely visual programming language looks like wooden train set engines threads train cars memory cargo cars variables train contains multiple data types including blocks numbers colors dinosaurs stations operate cargo e.g increment decrement add subtract catapult type specific wyes direct flow trains include greater less prompt random magic tunnels allow creation functions unlike programming languages distinction code memory output train program state defined arrangement train pieces unlambda minimalist functional programming language based ski calculus combined first-class continuations imperative i/o input usually requiring use continuations whitespace uses whitespace characters space tab return ignoring characters reverse many traditional languages distinguish different whitespace characters treating tab space also allows whitespace programs hidden source code programs languages like c. ~ath esoteric programming language used humans trolls webcomic homestuck name spoken tilde ath pun til death known insufferable work despite relative simplistic syntax language compile using infinite loops context story capability import change objects wide library author universe wide range combined inability interact anything short lifespan leads files tied long-term events deaths characters universes ~ath also sensitive color text written accepts unusual characters one ~ath program shown story uses command called bifurcate split program red text blue text another ~ath program contains character appears animated flickering billiard ball ~ath code simplest language code deviating pattern compile cultural context esolangs studied people like geoff cox writes esolangs shift attention command control toward cultural expression refusal seeing esolangs similar code art code poetry mez breeze mezangelle daniel temkin describes brainfuck refusing ease boundary human expression assembly code thereby taking us ludicrous journey logic exposing inherent conflict human thinking computer logic connects programming within esolang performing event score fluxus movement playing rules logic code makes point view language clear
[ 9345, 2691, 3462, 9735, 9224, 9871, 5395, 5651, 5527, 9626, 3613, 4770, 10403, 5680, 9780, 1591, 4410, 1470, 191, 963, 10819, 8262, 9926, 10953, 4042, 5204, 5845, 477, 10335, 4838, 8171, 9330, 9331, 5492, 3960, 2556, 7421 ]
Test
7,396
9
WMLScript:wmlscript wmlscript procedural programming language dialect javascript used wml pages part wireless application protocol wap wmlscript client-side scripting language similar javascript like javascript wmlscript used tasks user input validation generation error message dialog boxes etc wmlscript based ecmascript european computer manufacturers association script javascript standardized version thus syntax wmlscript similar javascript fully compatible despite syntactical similarities two different languages wmlscript objects array javascript hand allows declare include external functions scripts wmlscript optimised low power devices compiled language
[ 1409, 259, 1285, 3462, 6791, 10507, 8854, 4378, 8605, 1695, 7455, 3761, 11060, 438, 5311, 2880, 7871, 9152, 4171, 11087, 339, 84, 4822, 4056, 9560, 603, 482, 5219, 487, 11240, 5483, 9195, 10991, 10097, 5875, 9207, 6143 ]
Test
7,397
7
Reval_(company):reval company reval software company reval ’ cloud-based software provides clients tools manage cash financial risks company headquartered new york city regional offices emea apac reval led ceo chairman co-founder jiro okochi reval founded 1999 jiro okochi woo song 2009 company acquired fxpress corporation leading treasury software provider fortune 1000 2011 acquired european treasury management provider ecofinance 2012 2013 reval global finance magazine treasury cash management award best financial risk management solution.in october 2016 reval acquired ion investment group little kids rock lkr leading nonprofit provider free musical instruments teacher trainings u.s. public schools appointed jiro okochi new york area board directors spearhead fundraising efforts lkr ’ new york metro area program
[ 4194 ]
None
7,398
9
Yoix:yoix computer programming yoix high-level general-purpose interpreted dynamic programming language yoix interpreter implemented using standard java technology without add-on packages requires sun-compliant jvm operate initially developed labs researchers internal use available free open source software since late 2000 1998 java technology still emerging swing toolkit add-on package interruptible i/o regular expressions printf capability yet features java web start developed moreover java scripting languages largely non-existent time groovy jruby yet invented jython created late 1997 browsers 1998 limited feature sets unstable production use 8-hour shift still fighting skirmishes browser wars environment yoix technology created response pressing need reliable easy distribute maintain gui front-end mission-critical application developed within namely global fraud management system day monitors tracks fraud activity related voice traffic expanding networks wireline wireless ip yoix technology first released public late 2000 open source initiative common public license v1.0 yoix name came partially fox hunting cry encouragement hounds partially echo another familiar four-letter name ends ix partially avoid many false-positives google search yoix technology provides pure java programming language implementation general purpose dynamic programming language developed researchers labs syntax grammar easy learn familiar c programming language java end-user yoix application indistinguishable java application application developer yoix provide simpler coding experience working java directly much like writing perl code simpler writing c code yoix language object oriented language makes use 165 object types provide access standard java classes yoix interpreter built entirely using java technology means yoix applications cross-platform gui-capable network thread friendly yet yoix developers find insulated complex error-prone parts coding functionality directly java use reflection access java functionality thus adds value simplifying access functionality also improving application reliability coding java glitches complicated java features one-time behind-the-scenes yoix language includes safe pointers addressing declarations global local variables addition supporting native user functions users add builtin functions written java two central elements yoix design borrowed postscript language dictionaries language components permissions-protected dictionaries exposed system components homage tcl language exposure philosophy also given though direct influence another key yoix design element involves pointers addressing pointers pointer arithmetic yoix language syntactically similar found c language yoix implementation prevents using pointer outside bounds addition address operator always produces valid usable result overall yoix design attempted make language easy learn programmers experienced c java languages yoix distribution includes yoix web application instant template ywait software framework building yoix web application yoix web application resides web server downloaded piecemeal run-time as-needed basis yoix interpreters running client machines model analogous familiar model client web browsers downloading website piecemeal as-needed run-time permits simple efficient distribution maintenance applications relies ubiquitous web server yoix interpreter building web application using ywait framework requires standard unix tools available modern operating systems linux mac os x microsoft windows help add-on packages u/win client side ywait-based application relies yoix interpreter thus platform independent running wherever java runs yoix software development philosophy aims keep things simple eschewing popular tendency multiple embedded specialized languages ywait framework permits easy incremental screen development simple logical source tree hierarchy development yoix web application reduced basics command prompt text editor ide enthusiasts may nonplussed small beautiful approach software development highly effective practice addition role tool building gui applications yoix technology supports several modes data visualization data visualization module called ydat yoix data analysis tool included public yoix distribution since release 2.1.2 ydat uses data manager component coordinate data display filtering among several visualization components include event plot graph drawing pane histogram filters tabular detail ydat able display graphs generated graphviz graph drawing layout tool another open source tool freely available labs ydat highly configurable yoix language level image screenshot yoix ydat instantiation example used analyze vehicle auction transactions yoix technology provides good support graph drawing addition graph display mentioned part ydat module data types yoix language support building manipulating traversing graph structures native yoix functions support dot language output built-in dot language parser facilitate interaction graphviz layout engines ychart data visualization toolkit added yoix distribution release 2.2.0 ychart allows one organize display cells data two interactive ychart applications contained yoix distribution periodic table elements unicode chart program demonstrate using ychart variable width cells might occur schedule also available yoix distribution yoix distribution also includes yoix package called byzgraf rendering basic data plots line charts histograms statistical box plots currently implemented yoix language interpreted means example probably right choice computationally intensive applications unless one codes computations java module extension similarly excessive looping also display limitations interpreted language focus language interactive standalone client/server gui data visualization applications yoix technology free software licensed open source initiative common public license yoix registered trademark inc.. 1 extract html directives home page write standard output 2 build display gui two buttons titled frame i.e. window also titled border one button pops message pressed quits example window sized automatically fit components additional code calculates location put center screen making visible 3 code shown used generate yoix logo image png format seen language description box near top page command-line arguments allow size image specified well select png image output display on-screen window
[ 1152, 9345, 8582, 4490, 6797, 5677, 7983, 8628, 823, 1591, 1343, 5059, 225, 5612, 9330, 9714, 5492, 2556, 2045 ]
Test
7,399
2
Nokia_N73:nokia n73 nokia n73 smartphone announced nokia 25 april 2006 part nseries started shipping 24 july n73 succeeded n70 packed numerous multimedia features features 3.2 megapixel autofocus camera front camera then-large 2.4 inch display stereo speakers relatively slim pocketable size form runs symbian v9.1 s60 3rd edition became one top selling nseries devices 2006 2007 high popularity helped nokia sales 'multimedia phones grow 28 year-on-year q3 2007 according nokia top selling line n70 n95 common nokia 'nseries 'eseries phones time late 2006 n73 comes loaded many software applications including contacts messaging picture video galleries music player visual fm radio realplayer im client wap browser full web browser based khtml/webkit microsoft office document viewer pdf viewer adobe flash lite viewer games majority applications support background execution example one may listen music browsing internet may switch write text message e-mail without close applications exception newer sony ericsson phones like k550 w610 smartphones typically limited way example music player run background java applications well symbian s60 release 3 applications installed removed phone user using either nokia pc suite software included phone installer application phone n73 uses database system supplied 'gallery applications permanently run background order reduce seek operation times databases updated locally device means supported image video audio files placed almost anywhere file system browsed easily case mp3 audio files id3 tag e.g 'album 'artist etc. notably nokia supports firmware upgrades n73 made user via module nokia pc suite directly over-the-air besides original edition nokia released three variants n73 addition basic n73 nokia subsequently released n73 'music edition 'multimedia button keypad replaced button starts music player phone music edition also includes 2gb memory card phone completely black music player music edition supports album art visualisations regular n73 music player application stays background time even music played later firmware versions application terminated prevents music edition remote control working application started using phone keypad 'n73 internet edition essentially music edition retaining 'multimedia button function rather dedicated 'music button 'n73 internet edition available middle east north africa nokia also released another model n73 called 'n73 special edition middle east north africa phone released muslim holy month ramadan 2007 phone hardware editions n73 comes pre-loaded islamic applications phone completely white nokia also released n73 special edition indonesia without pre-loaded islamic applications three versions n73 appear updated software update 26 june 2007 updates standard n73 music player version music edition enhanced music player detailed keeping 'multimedia button function essentially making internet edition 2008 updates standard features nokia maps application installed default requires external bluetooth gps receiver nokia lifeblog ptt search applications carried previous updates plus addition nokia mobile tv application also installed default requires external nokia mobile tv receiver su-33w application available n77 camera much improved earlier firmware update phone takes 27 seconds boot compared 42 previous versions also n73 20 mb ram available boot little change users may able install n-gage application modified work n73 making better compared multimedia keypad rather single usage button features music player like supports album art visualizations enhanced control interface also available start screen menu key pressed hold phone boots also recent uk nokia poster campaigns black version phone advertised without term 'music edition o2 uk shop sells n73 silver/plum black black version multimedia button rather music button
[ 1537, 8577, 3205, 11655, 4365, 9359, 1424, 529, 2449, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 9262, 10802, 8627, 7220, 821, 5175, 7866, 1083, 1728, 7617, 4291, 7877,...
Train
7,400
5
Modulation:modulation electronics telecommunications modulation process varying one properties periodic waveform called carrier signal modulating signal typically contains information transmitted radio systems 20th century used frequency modulation fm amplitude modulation radio broadcast modulator device performs modulation demodulator sometimes detector demod device performs demodulation inverse modulation modem modulator–demodulator perform operations aim analog modulation transfer analog baseband lowpass signal example audio signal tv signal analog bandpass channel different frequency example limited radio frequency band cable tv network channel aim digital modulation transfer digital bit stream analog communication channel example public switched telephone network bandpass filter limits frequency range 300–3400 hz limited radio frequency band analog digital modulation facilitate frequency division multiplexing fdm several low pass information signals transferred simultaneously shared physical medium using separate passband channels several different carrier frequencies aim digital baseband modulation methods also known line coding transfer digital bit stream baseband channel typically non-filtered copper wire serial bus wired local area network aim pulse modulation methods transfer narrowband analog signal example phone call wideband baseband channel schemes bit stream another digital transmission system music synthesizers modulation may used synthesize waveforms extensive overtone spectrum using small number oscillators case carrier frequency typically order much lower modulating waveform see frequency modulation synthesis ring modulation synthesis analog modulation modulation applied continuously response analog information signal common analog modulation techniques include digital modulation analog carrier signal modulated discrete signal digital modulation methods considered digital-to-analog conversion corresponding demodulation detection analog-to-digital conversion changes carrier signal chosen finite number alternative symbols modulation alphabet simple example telephone line designed transferring audible sounds example tones digital bits zeros ones computers may however communicate telephone line means modems representing digital bits tones called symbols four alternative symbols corresponding musical instrument generate four different tones one time first symbol may represent bit sequence 00 second 01 third 10 fourth 11 modem plays melody consisting 1000 tones per second symbol rate 1000 symbols/second 1000 baud since tone i.e. symbol represents message consisting two digital bits example bit rate twice symbol rate i.e 2000 bits per second similar technique used dial-up modems opposed dsl modems according one definition digital signal modulated signal digital signal according another definition modulation form digital-to-analog conversion textbooks would consider digital modulation schemes form digital transmission synonymous data transmission would consider analog transmission fundamental digital modulation techniques based keying qam in-phase signal one example cosine waveform quadrature phase signal q example sine wave amplitude modulated finite number amplitudes summed seen two-channel system channel using ask resulting signal equivalent combination psk ask methods phases frequencies amplitudes assigned unique pattern binary bits usually phase frequency amplitude encodes equal number bits number bits comprises symbol represented particular phase frequency amplitude alphabet consists formula_1 alternative symbols symbol represents message consisting n bits symbol rate also known baud rate formula_2 symbols/second baud data rate formula_3 bit/second example alphabet consisting 16 alternative symbols symbol represents 4 bits thus data rate four times baud rate case psk ask qam carrier frequency modulated signal constant modulation alphabet often conveniently represented constellation diagram showing amplitude signal x-axis amplitude q signal y-axis symbol psk ask sometimes also fsk often generated detected using principle qam q signals combined complex-valued signal jq j imaginary unit resulting called equivalent lowpass signal equivalent baseband signal complex-valued representation real-valued modulated physical signal so-called passband signal rf signal general steps used modulator transmit data receiver side demodulator typically performs common digital communication systems design modulator demodulator must done simultaneously digital modulation schemes possible transmitter-receiver pair prior knowledge data encoded represented communications system digital communication systems modulator transmitter demodulator receiver structured perform inverse operations non-coherent modulation methods require receiver reference clock signal phase synchronized sender carrier signal case modulation symbols rather bits characters data packets asynchronously transferred opposite coherent modulation common digital modulation techniques msk gmsk particular cases continuous phase modulation indeed msk particular case sub-family cpm known continuous-phase frequency shift keying cpfsk defined rectangular frequency pulse i.e linearly increasing phase pulse one-symbol-time duration total response signaling ofdm based idea frequency-division multiplexing fdm multiplexed streams parts single original stream bit stream split several parallel data streams transferred sub-carrier using conventional digital modulation scheme modulated sub-carriers summed form ofdm signal dividing recombining help handling channel impairments ofdm considered modulation technique rather multiplex technique since transfers one bit stream one communication channel using one sequence so-called ofdm symbols ofdm extended multi-user channel access method orthogonal frequency-division multiple access ofdma multi-carrier code division multiple access mc-cdma schemes allowing several users share physical medium giving different sub-carriers spreading codes different users two kinds rf power amplifier switching amplifiers class amplifiers cost less use less battery power linear amplifiers output power however work relatively constant-amplitude-modulation signals angle modulation fsk psk cdma qam ofdm nevertheless even though switching amplifiers completely unsuitable normal qam constellations often qam modulation principle used drive switching amplifiers fm waveforms sometimes qam demodulators used receive signals put switching amplifiers automatic digital modulation recognition intelligent communication systems one important issues software defined radio cognitive radio according incremental expanse intelligent receivers automatic modulation recognition becomes challenging topic telecommunication systems computer engineering systems many civil military applications moreover blind recognition modulation type important problem commercial systems especially software defined radio usually systems extra information system configuration considering blind approaches intelligent receivers reduce information overload increase transmission performance obviously knowledge transmitted data many unknown parameters receiver signal power carrier frequency phase offsets timing information etc. blind identification modulation made fairly difficult becomes even challenging real-world scenarios multipath fading frequency-selective time-varying channels two main approaches automatic modulation recognition first approach uses likelihood-based methods assign input signal proper class another recent approach based feature extraction term digital baseband modulation digital baseband transmission synonymous line codes methods transfer digital bit stream analog baseband channel a.k.a lowpass channel using pulse train i.e discrete number signal levels directly modulating voltage current cable serial bus common examples unipolar non-return-to-zero nrz manchester alternate mark inversion ami codings pulse modulation schemes aim transferring narrowband analog signal analog baseband channel two-level signal modulating pulse wave pulse modulation schemes also allow narrowband analog signal transferred digital signal i.e. quantized discrete-time signal fixed bit rate transferred underlying digital transmission system example line code modulation schemes conventional sense since channel coding schemes considered source coding schemes cases analog-to-digital conversion techniques analog-over-analog methods analog-over-digital methods
[ 4609, 3847, 2057, 10381, 1550, 7698, 2968, 2458, 5020, 9373, 5664, 11170, 11686, 7723, 2989, 1070, 1969, 2994, 5304, 1083, 7490, 67, 3140, 7108, 11591, 5321, 7498, 10833, 4691, 8287, 3040, 1121, 3168, 8160, 2920, 7400, 2802, 119 ]
Test
7,401
1
Diablo_Data_Systems:diablo data systems diablo data systems division xerox created acquisition diablo systems inc. us 29 million 1972 company founded 1969 george e. comstock charles l. waggoner others company best known hytype hytype ii diablo 630 daisywheel printers also produced hard disk drives resold dec rk02 rk03 removable disk drives used xerox manufactured xerox alto computer
[ 6741 ]
Test
7,402
4
Supplemental_access_control:supplemental access control supplemental access control sac set security features defined icao protecting data contained electronic travel documents e.g electronic passports sac specifies password authenticated connection establishment pace protocol supplements improves icao basic access control bac pace like bac prevents two types attacks implementation pace begins third generation electronic passports eu members must implement pace electronic passports end 2014 states sake global interoperability must implement pace without implementing bac inspection systems implement pace use supported mrtd chip thus important global interoperability achieved make enhancement reliable document verification process achieve interoperability called interoperability tests results last test focusing sac describe current state implementation field version 1.1 april 2014 icao supplemental access control technical report introduces chip authentication protocol alternative active authentication integrates pace achieving new protocol chip authentication mapping pace-cam allows faster execution separate protocols
[ 10685 ]
Validation
7,403
2
Transcendent_memory:transcendent memory transcedent memory linux kernel feature representing class memory unknown dynamically variable size addressable indirectly kernel configured either persistent ephemeral meaning around might disappear without warning still fast enough synchronously accessible
[ 3082, 5139, 6675, 7187, 10776, 25, 10780, 541, 4637, 10785, 9762, 6180, 5158, 7217, 8242, 9266, 9784, 10809, 576, 2625, 6213, 6730, 8268, 6221, 86, 10333, 97, 5222, 2152, 10856, 8298, 7285, 9335, 2168, 1147, 3197, 4734, 1150, 2179, 7812, ...
None
7,404
4
AppArmor_Mobile:apparmor mobile apparmor mobile division cutcom software inc. builds custom mobile safety apps emergency notification systems university college institutions canada united states australia company founded 2002 based toronto ontario canada apparmor partner institutions include university guelph university nevada reno queen university dalhousie university jacksonville university wilfrid laurier university apparmor safety apps include features push notifications location tracking click-to-call capability
[ 2558 ]
None
7,405
9
Programmable_Macro_Language:programmable macro language programmable macro language pml domain specific language developed aveva enable customisation plant marine design products pml file-based interpreted language enables application developer design microsoft windows form-based add-ins included within aveva product plant design management system pdms pml originated computer-aided design centre cadcentre established cambridge uk 1967 uk ministry technology cadcentre later became aveva carried great deal early pioneering cad research early staff members went become prominent worldwide cad community brothers dick martin newell cadcentre arguably important single factor transformation cambridge one world high technology centers within years late 1970s early 1980s pml language facilitates customisation plant design management system pdms system may used industries marine offshore onshore oil gas chemical process plants mining currently three iterations pml language following pml code prints classic hello world string pdms command window define function helloworld endfunction code defines new pml function called helloworld takes parameters returns value simply assigns string 'hello world local variable calls p command print text command window within pdms order example work code placed inside file called helloworld.pmlfnc extension mandatory filename function name pml case sensitive file placed inside directory pdms searches pml code initialization process
[ 6797, 8262 ]
Test
7,406
8
Yuuguu:yuuguu yuuguu desktop sharing web conferencing application software company behind yuuguu ltd. founded anish kapoor philip hemsted yuuguu acquired july 2010 via-vox ltd. holding company powwownow conference call company yuuguu offers cross network instant messaging real time collaboration instant screen sharing web conferencing remote support yuuguu desktop client cross-platform also web-based browser client may 2009 yuuguu added integration skype client
[ 10341, 5612, 4597, 119 ]
None
7,407
5
H.323:h.323 h.323 recommendation itu telecommunication standardization sector itu-t defines protocols provide audio-visual communication sessions packet network h.323 standard addresses call signaling control multimedia transport control bandwidth control point-to-point multi-point conferences widely implemented voice videoconferencing equipment manufacturers used within various internet real-time applications gnugk netmeeting widely deployed worldwide service providers enterprises voice video services ip networks part itu-t h.32x series protocols also address multimedia communications isdn pstn ss7 3g mobile networks h.323 call signaling based itu-t recommendation q.931 protocol suited transmitting calls across networks using mixture ip pstn isdn qsig isdn call model similar isdn call model eases introduction ip telephony existing networks isdn-based pbx systems including transitions ip-based pbxs within context h.323 ip-based pbx might gatekeeper call control element provides service telephones videophones device may provide facilitate basic services supplementary services call transfer park pick-up hold first version h.323 published itu november 1996 emphasis enabling videoconferencing capabilities local area network lan quickly adopted industry means transmitting voice communication variety ip networks including wans internet see voip years h.323 revised re-published enhancements necessary better enable voice video functionality packet-switched networks version backward-compatible previous version recognizing h.323 used communication lans wans within large carrier networks title h.323 changed published 1998 title since remained unchanged packet-based multimedia communications systems current version h.323 approved 2009 one strength h.323 relatively early availability set standards defining basic call model also supplementary services needed address business communication expectations h.323 first voip standard adopt internet engineering task force ietf standard real-time transport protocol rtp transport audio video ip networks h.323 system specification describes use several itu-t ietf protocols protocols comprise core almost h.323 system many h.323 systems also implement protocols defined various provide supplementary services support deliver functionality user recommendations addition itu-t recommendations h.323 implements various ietf request comments rfcs media transport media packetization including real-time transport protocol rtp h.323 utilizes itu-defined codecs codecs defined outside itu codecs widely implemented h.323 equipment include h.323 terminals providing video communications shall capable encoding decoding video according h.261 qcif h.323 terminals shall audio codec shall capable encoding decoding speech according itu-t rec g.711 terminals shall capable transmitting receiving a-law μ-law support audio video codecs optional h.323 system defines several network elements work together order deliver rich multimedia communication capabilities elements terminals multipoint control units mcus gateways gatekeepers border elements collectively terminals multipoint control units gateways often referred endpoints h.323 uses tcp port number 1720 elements required least two terminals required order enable communication two people h.323 deployments gatekeeper employed order among things facilitate address resolution terminals h.323 network fundamental elements h.323 system devices users would normally encounter might exist form simple ip phone powerful high-definition videoconferencing system inside h.323 terminal something referred protocol stack implements functionality defined h.323 system protocol stack would include implementation basic protocol defined itu-t recommendation h.225.0 h.245 well rtp protocols described diagram figure 1 depicts complete sophisticated stack provides support voice video various forms data communication reality h.323 systems implement wide array capabilities logical arrangement useful understanding relationships multipoint control unit mcu responsible managing multipoint conferences composed two logical entities referred multipoint controller mc multipoint processor mp practical terms mcu conference bridge unlike conference bridges used pstn today significant difference however h.323 mcus might capable mixing switching video addition normal audio mixing done traditional conference bridge mcus also provide multipoint data collaboration capabilities means end user placing video call h.323 mcu user might able see participants conference hear voices gateways devices enable communication h.323 networks networks pstn isdn networks one party conversation utilizing terminal h.323 terminal call must pass gateway order enable parties communicate gateways widely used today order enable legacy pstn phones interconnect large international h.323 networks presently deployed services providers gateways also used within enterprise order enable enterprise ip phones communicate service provider users pstn gateways also used order enable videoconferencing devices based h.320 h.324 communicate h.323 systems third generation 3g mobile networks deployed today utilize h.324 protocol able communicate h.323-based terminals corporate networks gateway devices gatekeeper optional component h.323 network provides number services terminals gateways mcu devices services include endpoint registration address resolution admission control user authentication forth various functions performed gatekeeper address resolution important enables two endpoints contact without either endpoint know ip address endpoint gatekeepers may designed operate one two signaling modes namely direct routed gatekeeper routed mode direct routed mode efficient widely deployed mode mode endpoints utilize ras protocol order learn ip address remote endpoint call established directly remote device gatekeeper routed mode call signaling always passes gatekeeper latter requires gatekeeper processing power also gives gatekeeper complete control call ability provide supplementary services behalf endpoints h.323 endpoints use ras protocol communicate gatekeeper likewise gatekeepers use ras communicate gatekeepers collection endpoints registered single gatekeeper h.323 referred “ zone ” collection devices necessarily associated physical topology rather zone may entirely logical arbitrarily defined network administrator gatekeepers ability neighbor together call resolution happen zones neighboring facilitates use dial plans global dialing scheme dial plans facilitate “ inter-zone ” dialing two endpoints separate zones still communicate border elements peer elements optional entities similar gatekeeper manage endpoints directly provide services described ras protocol role border peer element understood via definition administrative domain administrative domain collection zones control single person organization service provider within service provider network may hundreds thousands gateway devices telephones video terminals h.323 network elements service provider might arrange devices zones enable service provider best manage devices control logical arrangement city taken together zones within service provider network would appear another service provider administrative domain border element signaling entity generally sits edge administrative domain communicates another administrative domain communication might include things access authorization information call pricing information important data necessary enable communication two administrative domains peer elements entities within administrative domain less help propagate information learned border elements throughout administrative domain architecture intended enable large-scale deployments within carrier networks enable services clearinghouses diagram figure 2 provides illustration administrative domain border elements peer elements gatekeepers h.323 defined binary protocol allows efficient message processing network elements syntax protocol defined asn.1 uses packed encoding rules per form message encoding efficient message encoding wire overview various communication flows h.323 systems address remote endpoint resolved endpoint use h.225.0 call signaling order establish communication remote entity h.225.0 messages simplest form h.323 call may established follows figure 3 example endpoint ep left initiated communication gateway right gateway connected call called party reality call flows often complex one shown calls utilize fast connect procedures defined within h.323 established 2 3 messages endpoints must notify gatekeeper gatekeepers used call call concluded device send release complete message endpoints required notify gatekeeper gatekeepers used call ended endpoints use ras protocol order communicate gatekeeper likewise gatekeepers use ras communicate peer gatekeepers ras fairly simple protocol composed messages namely endpoint powered generally send gatekeeper request grq message discover gatekeepers willing provide service gatekeepers respond gatekeeper confirm gcf endpoint select gatekeeper work alternatively possible gatekeeper predefined system ’ administrative setup need endpoint discover one endpoint determines gatekeeper work try register gatekeeper sending registration request rrq gatekeeper responds registration confirm rcf point endpoint known network make place calls endpoint wishes place call send admission request arq gatekeeper gatekeeper resolve address either locally consulting another gatekeeper querying network service return address remote endpoint admission confirm message acf endpoint place call upon receiving call remote endpoint also send arq receive acf order get permission accept incoming call necessary example authenticate calling device ensure available bandwidth call figure 4 depicts high-level communication exchange two endpoints ep two gatekeepers gk call initiated necessarily fully connected endpoints may initiate h.245 call control signaling order provide extensive control conference h.245 rather voluminous specification many procedures fully enable multipoint communication though practice implementations implement minimum necessary order enable point-to-point voice video communication h.245 provides capabilities capability negotiation master/slave determination opening closing logical channels i.e. audio video flows flow control conference control support unicast multicast communication allowing size conference theoretically grow without bound functionality provided h.245 capability negotiation arguably important enables devices communicate without prior knowledge capabilities remote entity h.245 enables rich multimedia capabilities including audio video text data communication transmission audio video text h.323 devices utilize itu-defined codecs codecs defined outside itu codecs widely implemented h.323 equipment include h.245 also enables real-time data conferencing capability protocols like t.120 t.120-based applications generally operate parallel h.323 system integrated provide user seamless multimedia experience t.120 provides capabilities application sharing t.128 electronic whiteboard t.126 file transfer t.127 text chat t.134 within context conference h.323 device initiates communication remote h.323 device h.245 communication established two entities terminal capability set tcs message first message transmitted side sending tcs message h.323 entities h.245 exchanges attempt determine device master slave process referred master/slave determination msd important master call settles disputes two devices example endpoints attempt open incompatible media flows master takes action reject incompatible flow capabilities exchanged master/slave determination steps completed devices may open logical channels media flows done simply sending open logical channel olc message receiving acknowledgement message upon receipt acknowledgement message endpoint may transmit audio video remote endpoint typical h.245 exchange looks similar figure 5 exchange messages two endpoints ep figure would transmitting audio direction number message exchanges numerous important purpose nonetheless takes time reason h.323 version 2 published 1998 introduced concept called fast connect enables device establish bi-directional media flows part h.225.0 call establishment procedures fast connect possible establish call bi-directional media flowing two messages like figure 3 fast connect widely supported industry even devices still implement complete h.245 exchange shown perform message exchange parallel activities noticeable delay calling called party voice internet protocol voip describes transmission voice using internet packet switched networks itu-t recommendation h.323 one standards used voip voip requires connection internet another packet switched network subscription voip service provider client analogue telephone adapter ata voip phone soft phone service provider offers connection voip services pstn service providers charge monthly fee additional costs calls made using voip two enterprise locations would necessarily require voip service provider example h.323 widely deployed companies wish interconnect remote locations ip using number various wired wireless technologies videoconference videoteleconference vtc set telecommunication technologies allowing two locations interact via two-way video audio transmissions simultaneously basically two types videoconferencing dedicated vtc systems required components packaged single piece equipment desktop vtc systems add-ons normal pc transforming vtc devices simultaneous videoconferencing among three remote points possible means multipoint control unit mcu mcu bridges ip isdn-based videoconferencing due price point proliferation internet broadband particular strong spurt growth use h.323-based ip videoconferencing h.323 accessible anyone high speed internet connection dsl videoconferencing utilized various situations example distance education telemedicine video relay service business h.323 used industry enable large-scale international video conferences significantly larger typical video conference one widely attended annual event called megaconference
[ 7681, 10242, 3460, 1036, 2833, 531, 10271, 9381, 8998, 6567, 9131, 432, 7478, 1467, 10558, 5576, 4809, 10444, 6993, 4691, 5843, 5972, 5472, 6880, 614, 2150, 5225, 10349, 4590, 7407, 124, 3580 ]
None
7,408
8
Web_Services_Modeling_Language:web services modeling language wsml web service modeling language formal language provides syntax semantics web service modeling ontology wsmo words wsml provides means formally describe wsmo elements ontologies semantic web services goals mediators wsml based logical formalisms description logic first-order logic logic programming
[ 3000, 1481, 10452, 8070 ]
Test
7,409
3
Data_synchronization:data synchronization data synchronization process establishing consistency among data source target data storage vice versa continuous harmonization data time fundamental wide variety applications including file synchronization mobile device synchronization e.g. pdas synchronization also useful encryption synchronizing public key servers tools available file synchronization version control cvs subversion etc distributed filesystems coda etc mirroring rsync etc attempt keep sets files synchronized however version control file synchronization tools deal modifications one copy files several theoretical models data synchronization exist research literature problem also related problem slepian–wolf coding information theory models classified based consider data synchronized problem synchronizing unordered data also known set reconciliation problem modeled attempt compute symmetric difference formula_1 two remote sets formula_2 formula_3 b-bit numbers solutions problem typified case two remote strings formula_4 formula_5 need reconciled typically assumed strings differ fixed number edits i.e character insertions deletions modifications data synchronization process reducing edit distance formula_4 formula_5 ideal distance zero applied filesystem based synchronizations data ordered many practical applications discussed referenced sometimes possible transform problem one unordered data process known shingling splitting strings shingles fault-tolerant systems distributed databases must able cope loss corruption part data first step usually replication involves making multiple copies data keeping date changes made however necessary decide copy rely loss corruption instance occurs simplest approach single master instance sole source truth changes replicated instances one instances becomes new master old master fails paxos raft complex protocols exist solve problems transient effects failover two instances thinking master time secret sharing useful failures whole nodes common moves synchronization explicit recovery process part read read data requires retrieving encoded data several different nodes corrupt out-of-date data may present nodes approach may also benefit use error correction code dhts blockchains try solve problem synchronization many nodes hundreds billions
[ 1668, 9360, 7315, 1049, 10265, 5791, 9248, 3629, 4919, 3784, 7499, 8785, 11605, 11616, 8674, 362, 5482, 2285, 7789, 7409, 380 ]
None
7,410
7
Gestigon:gestigon gestigon stylized gestigon software development company founded september 2011 sascha klement erhardt barth thomas martinetz company develops software solutions gesture control body tracking based 3d depth data gestigon developing augmented reality automotive solutions audi renault volkswagen company also working ar/vr headsets well consumer electronics smart home devices march 2017 gestigon acquired valeo french automotive supplier sascha klement worked student assistant ph.d. student professors thomas martinetz erhardt barth developing software solutions based time-of-flight sensors university lübeck since 2002 together founded gestigon 2011 seed-funding high-tech gründerfonds mittelständische beteiligungsgesellschaft schleswig-holstein local business angels march 2012 moritz von grotthuss joined company advisor later became ceo considered late-founder month gestigon received innovation award cebit 2012 one 15 startups receive award 276 candidates january 2013 gestigon participated ces las vegas later year also techcrunch disrupt new york city next year visteon volkswagen used gestigon gestures solutions products presented ces 2014 cebit 2014 “ cebit innovation award ” public displays gestigon technologies include audi ces 2015 ces 2016 volkswagen infineon gestigon launched virtual reality solution carnival techcrunch disrupt san francisco september 2015 using oculus rift different depth sensors first demo using mobile device done ces 2015 gestigon partnered several companies develop hardware solutions especially depth sensors provide sensing solutions 2015 gestigon partnered inuitive 3d computer vision image processors developer create vr unit system presented ces 2016 assembled oculus rift development kit july 2015 gestigon closed series financing round nbr technology ventures gmbh primary investor headed fabian von kuenheim financing round company received additional investments high-tech gründerfonds vorwerk direct selling ventures march 2017 gestigon developed software recognizes driving gestures gestigon develops software works 3d sensors recognize human gestures poses biometrical features real time gecko feature tracker developed company tracks individual measuring biometric features flamenco software finger hand gesture control gestigon developed carnival sdk software augmented reality virtual reality allows users see use hands virtual interfaces gestigon solutions based skeleton recognition software recognizes body parts 3d data making recognition faster accurate software sensor agnostic work based data depth module using time-of-flight- stereo- structured light technologies
[]
Validation
7,411
5
MAC_address:mac address media access control address mac address device unique identifier assigned network interface controller nic communications within network segment used network address ieee 802 network technologies including ethernet wi-fi bluetooth within open systems interconnection osi model mac addresses used medium access control protocol sublayer data link layer typically represented mac addresses recognizable six groups two hexadecimal digits separated hyphens colons separator see notational conventions mac address may referred burned-in address also known ethernet hardware address hardware address physical address confused memory physical address network node multiple nics must unique mac address sophisticated network equipment multilayer switch router may require one permanently assigned mac addresses mac addresses often assigned manufacturer network interface cards stored hardware card read-only memory firmware mechanism mac address typically includes manufacturer organizationally unique identifier oui mac addresses formed according principles two numbering spaces based extended unique identifiers eui managed institute electrical electronics engineers ieee eui-48 replaces obsolete term mac-48 eui-64 original ieee 802 mac address comes original xerox network systems ethernet addressing scheme 48-bit address space contains potentially 2 281,474,976,710,656 possible mac addresses ieee manages allocation mac addresses originally known mac-48 refers eui-48 identifiers ieee target lifetime 100 years 2080 applications using eui-48 space restricts applications accordingly ieee encourages adoption plentiful eui-64 non-ethernet applications distinction eui-48 mac-48 identifiers name application mac-48 used address hardware interfaces within existing 802-based networking applications eui-48 used 802-based networking also used identify devices software example bluetooth ieee considers mac-48 obsolete term eui-48 used cases addition eui-64 numbering system originally encompassed mac-48 eui-48 identifiers simple translation mechanism translations since deprecated individual address block iab inactive registry activity replaced ma-s ma-s previously named oui-36 registry product january 1 2014 iab uses oui ma-l ma-l registry previously named oui registry term oui still use calling registry belonging ieee registration authority concatenated 12 additional ieee-provided bits total 36 bits leaving 12 bits iab owner assign 4096 individual devices iab ideal organizations requiring 4096 unique 48-bit numbers eui-48 unlike oui allows assignee assign values various different number spaces example eui-48 eui-64 various context-dependent identifier number spaces individual address block could used assign eui-48 identifiers potential uses based oui iabs allocated reserved remain property ieee registration authority also noted 2007 september 2012 oui value 00:50 c2 used iab assignments september 2012 value 40 d8:55 used owners already assigned iab may continue use assignment another registry called ma-m mac addresses medium ma-m assignment block provides 2 eui-48 identifiers 2 eui-64 identifiers means first 28 bits ieee assigned bits first 24-bits assigned ma-m block oui assigned ieee reassigned addresses either universally administered addresses uaa locally administered addresses laa universally administered address uniquely assigned device manufacturer first three octets transmission order identify organization issued identifier known organizationally unique identifier oui remainder address three octets eui-48 five eui-64 assigned organization nearly manner please subject constraint uniqueness locally administered address assigned device network administrator overriding burned-in address universally administered locally administered addresses distinguished setting second-least-significant bit first octet address bit also referred u/l bit short universal/local identifies address administered bit 0 address universally administered 1 address locally administered example address first octet 06 hex binary form 00000110 second-least-significant bit 1 therefore locally administered address another example uses locally administered addresses decnet protocol mac address ethernet interface changed decnet software reflects decnet network address xx.yy host eliminates need address resolution protocol since mac address decnet host simply determined least significant bit address first octet 0 zero frame meant reach one receiving nic type transmission called unicast unicast frame transmitted nodes within collision domain modern wired setting collision domain usually length ethernet cable two network cards wireless setting collision domain receivers detect given wireless signal switch know port leads given mac address switch forward unicast frame ports except originating port action known unicast flood node matching hardware mac address accept frame network frames non-matching mac-addresses ignored unless device promiscuous mode least significant bit first octet set 1 frame still sent however nics choose accept based criteria matching mac address example based configurable list accepted multicast mac addresses called multicast addressing ieee built several special address types allow one network interface card addressed one time examples group addresses opposed individual addresses least significant bit first octet mac address distinguishes individual addresses group addresses bit set 0 individual addresses set 1 group addresses group addresses like individual addresses universally administered locally administered following network technologies use eui-48 identifier format every device connects ieee 802 network ethernet wifi eui-48 address common networked consumer devices pcs smartphones tablet computers use eui-48 addresses eui-64 identifiers used broadcast networks ethernet mac address expected uniquely identify node segment allows frames marked specific hosts thus forms basis link layer osi layer 2 networking upon upper layer protocols rely produce complex functioning networks many network interfaces support changing mac address unix-like systems command utility ifconfig may used remove add link address aliases instance active ifconfig directive may used netbsd specify attached addresses activate hence various configuration scripts utilities permit randomization mac address time booting establishing network connection changing mac addresses necessary network virtualization mac spoofing practiced exploiting security vulnerabilities computer system modern operating systems apple ios android especially mobile devices designed randomize assignment mac address network interface scanning wireless access points avert tracking systems internet protocol ip networks mac address interface corresponding ip address may queried address resolution protocol arp ipv4 neighbor discovery protocol ndp ipv6 relating osi layer 3 addresses layer 2 addresses according edward snowden us national security agency system tracks movements mobile devices city monitoring mac addresses avert practice apple started using random mac addresses ios devices scanning networks vendors followed quickly mac address randomization scanning added android starting version 6.0 windows 10 linux kernel 3.18 actual implementations mac address randomization technique vary largely different devices moreover various flaws shortcomings implementations may allow attacker track device even mac address changed instance probe requests elements timing random mac addresses used researchers confirmed possible link real identity particular wireless mac address using wireless access points ssid-hidden mode network cloaking mobile wireless device may disclose mac address traveling even mac addresses associated ssids device already connected configured send part probe request packets alternative modes prevent include configuring access points either beacon-broadcasting mode probe-response ssid mode modes probe requests may unnecessary sent broadcast mode without disclosing identity previously-known networks standard ieee 802 format printing eui-48 addresses human-friendly form six groups two hexadecimal digits separated hyphens transmission order e.g form also commonly used eui-64 e.g conventions include six groups two hexadecimal digits separated colons e.g three groups four hexadecimal digits separated dots e.g transmission order standard notation also called canonical format mac addresses written transmission order least significant bit byte transmitted first used output codice_1 codice_2 codice_3 commands example however since ieee 802.3 ethernet ieee 802.4 token bus send bytes octets wire left-to-right least significant bit byte first ieee 802.5 token ring ieee 802.6 fddi send bytes wire significant bit first confusion may arise address latter scenario represented bits reversed canonical representation example address canonical form would transmitted wire bits codice_4 standard transmission order least significant bit first token ring networks would transmitted bits codice_5 most-significant-bit first order latter might incorrectly displayed referred bit-reversed order non-canonical form msb format ibm format token ring format explained
[ 11267, 2568, 6674, 8729, 8736, 10788, 10283, 4654, 8238, 11319, 11321, 4671, 6214, 7240, 4174, 1618, 4691, 614, 1647, 3702, 3703, 649, 6281, 651, 5270, 4248, 10905, 11426, 7847, 2221, 2739, 7863, 7865, 7356, 10428, 2244, 710, 8391, 1741, ...
Test
7,412
1
Comparison_of_object-relational_database_management_systems:comparison object-relational database management systems comparison object-relational database management systems ordbmss system least features object-relational database vary widely completeness approaches taken following tables compare general technical information please see individual products articles information unless otherwise specified footnotes comparisons based stable versions without add-ons extensions external programs information fundamental ordbmses features implemented natively information data types implemented natively
[ 5640, 8201, 10632, 270, 8979, 2068, 10389, 7446, 11030, 2456, 1049, 5658, 1307, 5403, 6809, 11674, 9631, 11552, 9634, 4263, 2344, 7080, 10413, 10286, 7983, 9397, 3004, 1215, 10048, 2369, 5953, 6850, 9286, 974, 595, 2901, 10326, 4056, 9177, ...
None
7,413
4
HijackThis:hijackthis hijackthis also hijackthis hjt free open-source tool detect malware adware microsoft windows originally created merijn bellekom later sold trend micro program notable quickly scanning user computer display common locations malware rather relying database known spyware hijackthis used primarily diagnosis malware remove detect spyware—as uninformed use removal facilities cause significant software damage computer browser hijacking cause malware installed computer february 16 2012 trend micro released hijackthis source code open source available sourceforge site hijackthis generate plain-text logfile detailing entries finds entries fixed hijackthis inexperienced users advised exercise caution seek help using latter option except small whitelist known safe entries hijackthis discriminate legitimate unwanted items hijackthis attempts create backups files registry entries fixes used restore system event mistake common use post logfile forum experienced users help decipher entries need removed automated tools also exist analyze saved logs attempt provide recommendations user clean entries automatically use tools however generally discouraged specialize manually dealing hijackthis logs consider tools dangerous inexperienced users neither accurate reliable enough substitute consulting trained human analyst later versions hijackthis include additional tools task manager hosts-file editor alternate-data-stream scanner 2002 2003 entrepreneur glenn bluff owner computer hope uk made several attempts buy hijackthis led joint development hijackpro professional version hijackthis built-in capabilities kill processes similar killbox hijackpro 2.3 million downloads illegal download site 2003 2004 found sites claiming hijackthis free hijackpro sold touchstone software phoenix technologies 2007 integrated driveragent.com along glenn bluff company drivermagic.com
[ 8971, 6797, 7983, 2901, 10392, 7098, 7515, 127 ]
Validation
7,414
1
Eighteenth_Century_Collections_Online:eighteenth century collections online eighteenth century collections online ecco digital collection books published great britain 18th century gale education publishing company united states assembled collection digitally scanning microfilm reproductions 136,291 titles documents scanned 2002 added second collection ecco ii january 2014 ecco ii comprises 46,607 titles far 2,231 texts released free public work university michigan ’ text creation partnership rather ocr rekey texts tag tei aim enable improved access fraction collection making sgml/xml text editions 10,000 books addition free version subscription access also offered text analytic tools available subset text analysis portal research project one text creation partners university oxford converted public domain texts free publicly accessible versions accordance text encoding initiative p5 guidelines makes available variety file formats including html epub via oxford text archive cross-search also available proquest subscribe early english books online ecco
[ 9072, 5857, 479 ]
Test
7,415
7
Fruux:fruux fruux cross-platform synchronization service operated fruux company behind popular open source project sabredav service enables users synchronize address book contacts calendar events tasks bookmarks notes apple computers devices web app also allows manage contacts calendars tasks browser fruux synchronization uses encrypted ssl transfers fruux supports conflict resolution helps users data changed one computer choose correct dataset fruux runs entirely amazon web services infrastructure company uses amazon elastic load balancing amazon elastic compute cloud amazon ec2 amazon elastic block store amazon ebs run nginx web servers amazon simple storage service amazon s3 fruux ’ choice versioned application code backup storage addition fruux uses amazon relational database service amazon rds manage central databases amazon simple email service ses highly scalable bulk transactional email-sending service service similar services icloud plaxo fruux supports synchronization mainly contacts calendar events items wide array devices services company recently announced launch calendar syncing ios caldav capable devices also offering contact synchronization ios carddav capable devices company released device management layer may 2012 working special offering teams another distinguishing feature recently released calendar sharing feature allows users invite people calendars possibility set individual permissions gives first glimpse future team offering fruux secured six-figure seed round march 2012 led high-tech gründerfonds
[ 11201, 3237, 2695, 590, 7983, 7248, 10681, 2686 ]
Test
7,416
4
John_Herivel:john herivel john william jamieson herivel 29 august 1918 – 18 january 2011 british science historian former world war ii codebreaker bletchley park codebreaker concerned cryptanalysis enigma herivel remembered chiefly discovery soon dubbed herivel tip herivelismus herivelismus consisted idea herivel tip method establishing whether applied using herivel square based herivel insight habits german operators enigma cipher machine allowed bletchley park easily deduce part daily key brief critical period may 1940 herivel tip conjunction cillies another class operator error main technique used solve enigma war herivel became academic studying history philosophy science queen university belfast particularly isaac newton joseph fourier christiaan huygens retirement wrote autobiographical account work bletchley park entitled herivelismus german military enigma john herivel born belfast attended methodist college belfast 1924 1936 1937 awarded kitchener scholarship study mathematics sidney sussex college cambridge supervisor gordon welchman welchman recruited herivel government code cypher school gc cs bletchley park welchman worked alan turing newly formed hut 6 section created solve army air force enigma herivel aged 21 arrived bletchley 29 january 1940 briefed enigma alan turing tony kendrick time herivel started work bletchley park hut 6 limited success enigma-enciphered messages mostly luftwaffe enigma network known red working alongside david rees another cambridge mathematician recruited welchman nearby elmers school testing candidate solutions working plugboard settings process slow however herivel determined find method improve attack would spend evenings trying think ways intercepted morse coded messages enciphered germans ’ enigma electro-mechanical rotor cipher machine implemented polyalphabetic cipher main model use 1940 three rotors set electrical pathway keyboard lampboard pressing key caused one lamp light right-most rotor advance one letter position changed electrical pathway pressing key caused different letter light one 26 positions notch right-most rotor engaged middle rotor two rotors advanced together similarly middle rotor would engage left-most rotor giving long period sequence repeated 26 × 26 × 26 17,576 ring rotor contained notch caused next rotor advance could set one 26 positions three rotors selected set five giving 60 different ways mounting rotors machine however germans laid rule rotor position successive days previous days rotors positions known number reduced 32 enigma machine worked reciprocally identical machine identical settings would fed enciphered letters show deciphered letters lampboard hut 6 enigma replica machines logically identical machines germans using decipher intercepted messages required selection rotors ring settings plugboard connections known time first three letters prelude message used indicator tell receiving operator letters appear windows particular message herivel insight february 1940 lazy german code clerks might give away enigma ring settings ringstellung first message day several lazy clerks first message grundstellung would random would clustering around ringstellung insight became known herivel tip needed time luftwaffe doubly-enciphering message keys techniques zygalski sheets could used may 1940 germans stopped doubly-enciphered keys methods becoming ineffective bletchley park started using herivel tip break luftwaffe traffic continued main method bombe delivered august 1940 rotors positioning ring containing notch changed daily settings defined codebook common operators network start day messages sent received enigma operators implemented day rotor selection ring settings selected three rotors adjusted ring settings could done rotors mounted axle inserted machine possible adjust ring settings loaded rotors moving spring-loaded retaining pin right turning rotor display specified letter herivel thought likely least operators would adjust rings mounted rotors machine set alphabet rings closed lid operator moved rotors well away positions displayed three letters ring setting windows operators herivel great insight came one evening february 1940 relaxing front landlady fire stressed lazy operators set rings rotors machine might left ring setting near top used three letters first message day transmitted message sending operator would follow standard procedure september 1938 would use initial position encrypt indicator send clear followed message key enciphered setting ground setting gkx example would use enigma rotors set gkx encrypt message setting might choose rtq might encrypt llp may 1940 encrypted message setting repeated makes difference herivel insight operator would turn rotors rtq encrypt actual message thus preamble message would unencrypted ground setting gkx followed encrypted message setting llp receiving enigma operator could use information recover message setting decrypt message ground setting gkx example chosen random herivel reasoned operators lazy hurry otherwise pressure might simply use whatever rotor setting currently showing machine first message day operator set ring settings rotors already inside machine rotor position currently showing machine could well ring setting close situation occurred example gkx would ring setting close polish cryptographers used idea pc bruno phoney war day insight herivel colleagues agreed idea possible way enigma hut 6 began looking effect predicted herivel tip arranged first messages day transmitting station sent early plotted indicators grid termed herivel square example shown rows columns grid labelled alphabet first indicator first message day received station network entered grid done finding column corresponding first letter row corresponding second letter entering third letter cell row column intersected example gkx would recorded entering x cell column g row k. herivel tip suggested would cluster entries close together cluster around gkx example would narrow options ring settings 17,576 small set possibilities perhaps 6 30 could tested individually effect predicted herivel immediately show enigma traffic however bletchley park continue rely different technique get enigma method perforated sheets passed polish cryptologists situation changed 1 may 1940 germans changed indicating procedure rendering perforated sheet method obsolete hut 6 suddenly unable decrypt enigma fortunately codebreakers pattern predicted herivel tip began manifest soon 10 may germans invaded netherlands belgium david rees spotted cluster indicators 22 may air force message sent 20 may decoded first since change procedure although herivel tip provided enigma ring settings provide parts enigma key rotor order plugboard settings luftwaffe key time chose 5 rotors 60 possible rotor orders addition might 8 10 plugboard connections means 6 26 letters permuted plugboard codebreakers use methods find remaining portions enigma key herivel tip used combination another class operator mistake known cillies solve settings decipher messages herivel tip used several months specialised codebreaking machines designed alan turing so-called bombes ready use gordon welchman wrote herivel tip vital part breaking enigma bletchley park importance contribution herivel singled introduced winston churchill visit bletchley park also taught enigma cryptanalysis party americans assigned hut 6 intensive two-week course herivel later worked administration newmanry section responsible solving german teleprinter ciphers using machine methods colossus computers assistant head section mathematician max newman 2005 researchers studying set enigma-encrypted messages world war ii noted occurrence clustering predicted herivel tip messages august 1941 end war herivel taught mathematics school year found could handle rumbustious boys joined queen university belfast became reader history philosophy science one students supervised actor simon callow said published books articles isaac newton joseph fourier christiaan huygens publications include 1978 retired oxford became fellow souls college retirement published died oxford 2011 survived daughter josephine herivel
[ 9156, 2341, 4595, 1941, 7416, 8318 ]
Validation
7,417
4
TIMEnavigator:timenavigator atempo time navigator also known tina backup recovery solution atempo major unix linux windows mac os platforms supported
[ 3366, 1801, 1358 ]
Test
7,418
4
Carbanak:carbanak carbanak apt-style campaign targeting limited financial institutions claimed discovered 2014 russian/uk cyber crime company kaspersky lab said used steal money banks microsoft windows malware said introduced targets via phishing emails hacker group said stolen 900 million dollars 140 billion dollars reports banks thousand private customers criminals able manipulate access respective banking networks order steal money variety ways instances atms instructed dispense cash without locally interact terminal money mules would collect money transfer swift network criminals ’ accounts kaspersky said carbanak group went far alter databases pump balances existing accounts pocketing difference unbeknownst user whose original balance still intact intended targets primarily russia followed united states germany china ukraine according kaspersky lab one bank lost 7.3 million atms programmed spew cash certain times henchmen would collect separate firm 10 million taken via online platform kaspersky lab helping assist investigations countermeasures disrupt malware operations cybercriminal activity investigations provide technical expertise analyzing infection vectors malicious programs supported command control infrastructure exploitation methods fireeye published research tracking activities referring group fin7 including sec-themed spear phishing campaign proofpoint also published research linking group bateleur backdoor expanded list targets u.s.-based chain restaurants hospitality organizations retailers merchant services suppliers others beyond initial financial services focus march 26th 2018 europol claimed arrested mastermind carbanak associated cobalt cobalt strike group alicante spain investigation led spanish national police cooperation law enforcement multiple countries well private cybersecurity companies group campaigns appear continued however hudson bay company breach using point sale malware recently attributed group controversy exists around carbanak attacks seemingly described several months earlier report internet security companies group-ib russia fox-it netherlands dubbed attack anunak anunak report shows also greatly reduced amount financial losses according statement issued fox-it release new york times article compromise banks outside russia match research also interview conducted russian newspaper kommersant controversy claims kaspersky lab group-ib come light group-ib claims banks outside russia ukraine hit activity outside region focused point sale systems reuters issued statement referencing private industry notification issued fbi usss united states secret service claiming received reports carbanak affected financial sector two representative groups us banking industry fs-isac aba american bankers association interview bank technology news say us banks affected
[ 1024, 7809, 8320, 3843, 5764, 10502, 2187, 6797, 4240, 11152, 10003, 10132, 535, 1688, 2717, 9375, 1440, 5024, 9761, 4644, 4133, 11175, 8489, 5547, 11052, 9518, 9904, 1970, 9395, 8886, 441, 1979, 4027, 5563, 10875, 1608, 3657, 8779, 3789, ...
Test
7,419
7
GlobalEnglish:globalenglish globalenglish corporation american technology company founded 1997 reece duca stephen patrick martin rice used owned pearson plc bought back management globalenglish provides on-demand enterprise solutions support global business performance effective business english communication company headquartered silicon valley california company announced pending acquisition pearson plc lse pson may 2012 all-cash transaction officially acquired pearson july 5 2012.. november 10 2016 company acquired pearson management
[ 467 ]
Test
7,420
4
Icy_(application):icy application icy discontinued package manager jailbroken iphone ipod touch originally created maintained ripdev allows users browse download mobile apps range sources apps available download free requiring purchase downloading including software created ripdev kate apps downloaded directly iphone ipod touch generally located codice_1 directory place apple native apps located icy project closed october 24 2009 source code released mit license icy installer taken two development teams weamdev infini-dev icy intended alternative cydia source unofficial apps since development installer.app created nullriver discontinued purpose developing icy create package manager used apt method used cydia therefore making icy compatible cydia sources faster lightweight cydia icy project closed october 24 2009 source code released mit license icy project picked weamdev latest version beta 2.3 support ios 7 group called infini dev also taken project reviving icy created version ripdev source code called icy version 1.5.1 icy 1.4.7 added support ipad development member sammy guichelaar icy development halted early 2014 support ios 9 infini-dev dropped icy support order support installer x package manager legacy devices
[ 10755, 9732, 5647, 7697, 5138, 6186, 6700, 1074, 8754, 9784, 8783, 4180, 10838, 1623, 3672, 3681, 9826, 8806, 3691, 2673, 7292, 2686, 6783, 10878, 4737, 5784, 1177, 3228, 2207, 11430, 2735, 3248, 4283, 3772, 7869, 3286, 8918, 9430, 3293, ...
Validation
7,421
3
Machine_code:machine code machine code computer program written machine language instructions executed directly computer central processing unit cpu instruction causes cpu perform specific task load store jump alu operation one units data cpu registers memory machine code strictly numerical language intended run fast possible may regarded lowest-level representation compiled assembled computer program primitive hardware-dependent programming language possible write programs directly machine code tedious error prone manage individual bits calculate numerical addresses constants manually reason programs rarely written directly machine code modern contexts may done low level debugging program patching especially assembler source available assembly language disassembly overwhelming majority practical programs today written higher-level languages assembly language source code translated executable machine code utilities compilers assemblers linkers important exception interpreted programs translated machine code however interpreter may seen executor processor performing instructions source code typically consists directly executable machine code generated assembly high-level language source code machine code definition lowest level programming detail visible programmer internally many processors use microcode optimise transform machine code instructions sequences micro-ops generally considered machine code per se every processor processor family instruction set instructions patterns bits physical design correspond different commands machine thus instruction set specific class processors using mostly architecture successor derivative processor designs often include instructions predecessor may add additional instructions occasionally successor design discontinue alter meaning instruction code typically needed new purposes affecting code compatibility extent even nearly completely compatible processors may show slightly different behavior instructions rarely problem systems may also differ details memory arrangement operating systems peripheral devices program normally relies factors different systems typically run machine code even type processor used processor instruction set may instructions length may variable-length instructions patterns organized varies strongly particular architecture often also type instruction instructions one opcode fields specifies basic instruction type arithmetic logical jump etc actual operation add compare fields may give type operand addressing mode addressing offset index actual value constant operands contained instruction called immediates machines individual instructions explicit operands accumulator machine combined left operand result implicit accumulator arithmetic instructions architectures 8086 x86-family accumulator versions common instructions accumulator regarded one general registers longer instructions stack machine operands implicit stack special purpose instructions also often lack explicit operands cpuid x86 architecture writes values four implicit destination registers instance distinction explicit implicit operands important code generators especially register allocation live range tracking parts good code optimizer track implicit well explicit operands may allow frequent constant propagation constant folding registers register assigned result constant expression freed replacing constant code enhancements computer program list instructions executed central processing unit program execution done order cpu executing solve specific problem thus accomplish specific result simple processors able execute instructions one another superscalar processors capable executing variety different instructions program flow may influenced special 'jump instructions transfer execution instruction numerically following one conditional jumps taken execution continues another address execution continues next instruction depending condition much readable rendition machine language called assembly language uses mnemonic codes refer machine code instructions rather using instructions numeric values directly example zilog z80 processor machine code codice_1 causes cpu decrement codice_2 processor register would represented assembly language codice_3 mips architecture provides specific example machine code whose instructions always 32 bits long general type instruction given op operation field highest 6 bits j-type jump i-type immediate instructions fully specified op r-type register instructions include additional field funct determine exact operation fields used types rs rt rd indicate register operands shamt gives shift amount address immediate fields contain operand directly example adding registers 1 2 placing result register 6 encoded load value register 8 taken memory cell 68 cells location listed register 3 jumping address 1024 computer architectures machine code implemented even fundamental underlying layer called microcode providing common machine language interface across line family different models computer widely different underlying dataflows done facilitate porting machine language programs different models example use ibm system/360 family computers successors dataflow path widths 8 bits 64 bits beyond nevertheless present common architecture machine language level across entire line using microcode implement emulator enables computer present architecture entirely different computer system/360 line used allow porting programs earlier ibm machines new family computers e.g ibm 1401/1440/1460 emulator ibm s/360 model 40 machine code generally different bytecode also known p-code either executed interpreter compiled machine code faster direct execution exception processor designed use particular bytecode directly machine code case java processors machine code assembly code sometimes called native code referring platform-dependent parts language features libraries harvard architecture computer architecture physically separate storage signal pathways code instructions data today processors implement separate signal pathways performance reasons implement modified harvard architecture support tasks like loading executable program disk storage data executing harvard architecture contrasted von neumann architecture data code stored memory read processor allowing computer execute commands point view process code space part address space code execution stored multitasking systems comprises program code segment usually shared libraries multi-threading environment different threads one process share code space along data space reduces overhead context switching considerably compared process switching pamela samuelson wrote machine code unreadable united states copyright office identify whether particular encoded program original work authorship however us copyright office allow copyright registration computer programs program machine code sometimes decompiled order make functioning easily understandable humans cognitive science professor douglas hofstadter compared machine code genetic code saying looking program written machine language vaguely comparable looking dna molecule atom atom
[ 7169, 5634, 1029, 7173, 5640, 6664, 9224, 8715, 8716, 9739, 2062, 10762, 4112, 5651, 8732, 3613, 9245, 5154, 10786, 6180, 7717, 10796, 5165, 3630, 5677, 5680, 9780, 1591, 2620, 6716, 6718, 7234, 10819, 8773, 8262, 585, 8280, 602, 6242, 57...
Test
7,422
2
Uniform_Type_Identifier:uniform type identifier uniform type identifier uti text string used software provided apple inc. uniquely identify given class type item apple provides built-in utis identify common system objects – document image file types folders application bundles streaming data clipping data movie data – allows third party developers add utis application-specific proprietary uses support utis added mac os x 10.4 operating system integrated spotlight desktop search technology uses utis categorize documents one primary design goals utis eliminate ambiguities problems associated inferring file content mime type filename extension type creator code utis use reverse-dns naming structure names may include ascii characters a-z a-z 0-9 hyphen period unicode characters u+007f colons slashes prohibited compatibility macintosh posix file path conventions utis support multiple inheritance allowing files identified number relevant types appropriate contained data one difficulties maintaining user-accessible operating system establishing connections data types applications processes effectively use data example file contains picture data particular compression format opened processed applications capable handling picture data applications must able identify compression type used order extract work data early computer systems – particularly dos variants versions windows – file associations maintained file extensions three four character code following file name instructs system open file particular applications beginning system 1 macintosh operating systems attached type codes creator codes part file metadata four-character codes designed specify application created file creator code specific type file type code applications could easily open process file data however type creator codes extended flexibility system — particular type file restricted opening particular application — suffered many problems file extensions type creator codes could lost files transferred across non-macintosh systems unix-based servers plethora type codes made identification problematic addition classic mac os recognize file extensions leading unrecognized file errors files transferred dos/windows systems openstep formed basis mac os x used extensions early versions mac os x followed suit led controversy users developers coming os x next windows origins advocating continued use file extensions coming classic mac os urging apple replace supplement file extensions type creators file identification types exist example mime types used identifying data transferred web however apple uti system designed create flexible file association system would describe data hierarchically allow better categorization searching standardize data descriptions across contexts provide uniform method expanding data types instance public.jpeg public.png utis inherit public.image uti allowing users search narrowly jpeg images png images broadly kind image merely changing specificity uti used search application developers design new data types easily extend utis available example new image format developed company may uti com.company.proprietary-image specified inherit public.image type apple macos continues support forms file association contains utilities translating use utis preference available apple maintains public domain set base data types utis utis associated base utis conformance system similar class inheritance utis conform utis share basic types general application works data general uti able work data uti conforms general uti basic public utis apple hierarchy follows utis even used identify file type identifiers dynamic utis created needed applications prefix dyn take form uti-compatible wrapper around otherwise unknown filename extension mime type ostype apple provides large collection system-declared uniform type identifiers third-party applications add utis database maintained macos exporting utis declared within application package new utis declared conform existing system utis declarations associate new utis file extensions exported declaration alone provide operating system enough information enable new functions enabling quick look new file types get uti given file use mdls meta data list part spotlight command terminal
[ 4615, 10765, 4111, 5647, 1042, 6700, 4657, 1074, 3126, 576, 9802, 5713, 3670, 4184, 2141, 4702, 2149, 10857, 8303, 6771, 2676, 9343, 3719, 10888, 11402, 8852, 1686, 7318, 3228, 2207, 1699, 5292, 8877, 1710, 3766, 2232, 9912, 9406, 1729, 6...
Train
7,423
6
Archivemount:archivemount archivemount fuse-based file system unix variants including linux purpose mount archives e.g tar tar.gz etc mount point read written file system makes accessing contents archive may compressed transparent programs without decompressing
[ 11568, 5397, 2045, 7983 ]
Test
7,424
4
Black_bag_operation:black bag operation black bag operations black bag jobs covert clandestine entries structures obtain information human intelligence operations usually entails breaking entering denied areas tactics techniques procedures associated black bag operations lock picking safe cracking key impressions fingerprinting photography electronic surveillance including audio video surveillance mail manipulation flaps seals forgery host related skills term black bag refers small bag burglars carry tools black bag operations federal bureau investigation fbi agents entered offices targeted individuals organizations photographed information found records practice used fbi 1942 1967 july 1966 fbi director j. edgar hoover ordered practice discontinued use black bag jobs fbi declared unconstitutional united states supreme court 19 june 1972 plamondon case united states v. u.s. district court 407 u.s. 297 fbi still carries numerous black bag entry-and-search missions search covert target investigation informed search took place investigation involves criminal matter judicial warrant required national security cases operation must approved foreign intelligence surveillance court example 1947 american spy elizabeth bentley defected soviet underground started talking fbi fbi broke brooklyn hotel black-bag job verify background – look anything otherwise found nothing ordinary bentley learned dodge intrusions earliest days underground learned determine enemy agents discovered secret documents possession leave apartment careful put black trunk tie thin black thread around would know tampered absence cia used black-bag operations steal cryptography secrets foreign government offices outside united states practice preceding u.s. intelligence organisations dates back least far 1916
[ 5986, 7652, 7527, 1544, 6344, 9289, 3372, 10963, 150 ]
Test
7,425
2
Geom_raid5:geom raid5 geom_raid5 storage module created freebsd operating system facilitates raid5 functionality without need hardware raid controller geom_raid5 allows storage large amounts data protected disk failure providing good throughput performance like freebsd storage modules geom_raid5 utilizes geom framework built kernel loadable module kld allows run inside freebsd kernel module compiled freebsd release 5 newer releases geom_raid5 also incorporated freenas operating system dedicated network attached storage author arne woerner released software bsd license making geom_raid5 osi-compliant open source software geom_raid5 distinguishes providing advanced features high performance theoretical maximum write speed speed slowest disk · number disks 1 latest version able achieve 80 theoretical maximum huge contrast software raid5 solutions sometimes achieve less 10 throughput combined significantly higher cpu utilization reason huge difference lies geom_raid5 design order write data raid5 volume data must often first read order calculate parity information protects data loss case single disk failure using request combining full stripe block 'collected read longer required means harddrive heads need change position every time write data contiguously theoretically full speed course works sequential transfers sometimes even filesystem write contiguously using request combining geom_raid5 manages outperform software raid5 solution date capable reaching write-speeds associated hardware raid5 budget-level x86 hardware currently module finalized stable version released author release information design disclose benchmarks particular benchmarks showing geom_raid5 performance versus zfs raid-z long-awaited users various incarnations geom raid5 exist trade speed memory usage stable version slower variants certain cases uses memory deliver better transfer rates memory usage speed tng pp uses less memory tng slower uses memory original geom_raid5 driver faster also claimed pp code best cleanest three
[ 1927, 274, 9625, 1946, 4636, 2338, 2212, 10535, 11698, 11573, 1718, 5177, 5819, 11459, 8266, 8395, 7249, 850, 10455, 6361, 9306, 6491, 7521, 1891, 998, 4073, 9201, 3058, 499, 7027, 2421, 9844, 2424, 1273, 9343 ]
None
7,426
4
Cain_and_Abel_(software):cain abel software cain abel often abbreviated cain password recovery tool microsoft windows recover many kinds passwords using methods network packet sniffing cracking various password hashes using methods dictionary attacks brute force cryptanalysis attacks cryptanalysis attacks done via rainbow tables generated winrtgen.exe program provided cain abel cain abel maintained massimiliano montoro sean babcock virus scanners browsers e.g chrome 20.0.1132.47 detect cain abel malware avast detects win32 cain-b tool classifies potentially dangerous program microsoft security essentials detects win32/cain 4_9_14 classifies tool program potentially unwanted behavior even cain install directory well word cain added avast exclude list real-time scanner known stop cain functioning however latest version avast longer blocks cain
[ 6916, 7556, 7557, 1417, 6797, 3984, 3477, 11030, 10135, 2716, 10908, 10271, 5284, 10788, 1064, 3752, 9640, 4140, 7983, 8513, 3394, 6345, 10058, 10329, 7515, 4956, 733, 9440, 3937, 2274, 3299, 4580, 7022, 8827, 11249, 6779, 6013 ]
Test
7,427
7
Ginga_(middleware):ginga middleware ginga middleware specification nipo-brazilian digital tv system sbtvd portuguese sistema brasileiro de tv digital ginga also itu-t recommendation iptv services also considered itu-t recommendations cable broadcast services itu-t j.200 recommendation series rec itu-t j.200 rec itu-t j.201 rec itu-t j.202 terrestrial broadcast services itu-r bt.1889 itu-r bt.1699 itu-r bt.1722 ginga developed based set standardized technologies mainly innovations developed brazilian researchers current reference implementation released gpl license ginga divided two main integrated subsystems allow development applications following two different programming paradigms subsystems called ginga-ncl declarative ncl applications ginga-j imperative java applications case brazilian terrestrial digital tv system digital tv systems following definitions abnt standards ginga middleware abnt 15606 ginga-j required supported fixed receivers optional portable receivers iptv services following h.761 itu-t recommendation ginga-ncl subsystem required terminal type ginga developed telemídia lab pontifical catholic university rio de janeiro puc-rio lavid federal university paraíba ufpb
[ 8122, 5677 ]
None
7,428
2
Asus_Zen_UI:asus zen ui asus zen ui stylized asus zenui front-end touch interface developed asus partners featuring full touch user interface current version zenui 6 zenui used asus android phones tablet computers available licensing external parties zenui also comes asus-made apps preloaded like zenlink pc link share link party link remote link zenui made debut asus zenfone series asus memopad 7 me176c asus padfone mini 2014 zenui asus made front-end interface android phones tablets called asus waveshare ui asus waveshare ui front-end touch interface developed asus partners waveshare ui used asus android phones tablet computers available licensing external parties waveshare ui originally released asus padfone hybrid smartphone/tablet later used asus products last gadget use waveshare ui asus memo pad hd 7 asus zenui updated google play store preloaded apps preloaded apps
[ 5637, 8719, 3600, 7700, 9244, 11294, 1578, 5677, 1083, 6212, 69, 8262, 4685, 3664, 8280, 8285, 2658, 11391, 1670, 5262, 10393, 7835, 673, 8870, 1191, 196, 8907, 2259, 8413, 9949, 1255, 8940, 5892, 2828, 280, 10009, 10525, 798, 288, 2852, ...
Validation
7,429
4
Kaō:kaō kaō huāyā stylized signature mark used east asia place true signature kaō first appeared china tang dynasty began used japan heian period though use became far less widespread edo period continue used even contemporary politicians famous people reading identification individual kaō often requires specialist knowledge whole books devoted topic published often used japanese swordsmith sword tang nakago
[ 9576 ]
Test
7,430
8
Mongrel_(web_server):mongrel web server mongrel open-source software http library web server written ruby zed shaw used run ruby web applications presents standard http interface makes layering servers front possible using web proxy load balancer combination instead use conventional methods employed run scripts fastcgi scgi communicate made possible integrating custom high-performance http request parser implemented using ragel mongrel first web server used twitter inspired node.js according ryan dahl shaw subsequently created mongrel2 open-source language agnostic web server successor mongrel server one popular configuration run apache http server 2.2 load balancer using mod_proxy_balancer conjunction several mongrel instances mongrel instance would run separate tcp port configured via mongrel_cluster management utility 2010 twitter notable instance configuration switched unicorn mongrel capable serving ruby rails powered sites without requiring web servers though single-threaded application configuration unsuitable light loads original author zed shaw left ruby rails-scene releases mongrel stopped current release 1.1.5 longer able install ruby versions higher 1.9.2 recommended rails 3 fix use much older 1.2.0-pre2 release mongrel n't stable new maintained server called thin uses mongrel parser mongrel also forked unicorn puma essentially parser
[ 1920, 4485, 9229, 2191, 7567, 1937, 7695, 7443, 1556, 10771, 5399, 9245, 8350, 7457, 3746, 8994, 2596, 3237, 9125, 11682, 7338, 9387, 44, 7983, 10800, 11439, 564, 4277, 9780, 5945, 6714, 1852, 1468, 5567, 6338, 8386, 10622, 1223, 1991, 11...
None
7,431
2
LinuxLive_USB_Creator:linuxlive usb creator linuxlive usb creator free microsoft windows program creates live usb systems installed images supported linux distributions
[ 3745, 9407, 6436, 3685, 5158, 6797, 7343, 7983, 3859, 6393, 6012, 4637, 5343 ]
Test
7,432
3
Cray:cray cray inc. american supercomputer manufacturer headquartered seattle washington also manufactures systems data storage analytics several cray supercomputer systems listed top500 ranks powerful supercomputers world cray manufactures products chippewa falls wisconsin founder seymour cray born raised company also offices bloomington minnesota numerous sales service engineering r locations around world company predecessor cray research inc. cri founded 1972 computer designer seymour cray seymour cray went form spin-off cray computer corporation ccc 1989 went bankrupt 1995 cray research bought sgi next year cray inc. formed 2000 tera computer company purchased cray research inc. business sgi adopted name acquisition may 17 2019 hewlett packard enterprise announced agreement buy cray inc. 1.3 billion seymour cray began working computing field 1950 joined engineering research associates era saint paul minnesota helped create era 1103 era eventually became part univac began phased left company 1960 years former era employees set control data corporation cdc initially worked cdc headquarters minneapolis grew upset constant interruptions managers eventually set lab home town chippewa falls wisconsin 85 miles east cray string successes cdc including cdc 6600 cdc 7600 cdc ran financial difficulties late 1960s development funds cray follow-on cdc 8600 became scarce told project would put hold 1972 cray left form company cray research inc copying previous arrangement cray kept research development facilities chippewa falls put business headquarters minneapolis company first product cray-1 supercomputer major success significantly faster computers time first system sold within month us 8.8 million seymour cray continued working time cray-2 though ended marginally faster cray x-mp developed another team company cray soon left ceo position become independent contractor started new vlsi technology lab cray-2 boulder colorado cray laboratories 1979 closed 1982 undaunted cray later headed similar spin-off 1989 cray computer corporation ccc colorado springs worked cray-3 project—the first attempt major use gallium arsenide gaas semiconductors computing however changing political climate collapse warsaw pact end cold war resulted poor sales prospects ultimately one cray-3 delivered number follow-on designs never completed company filed bankruptcy 1995 ccc remains began cray final corporation src computers inc. cray research continued development along separate line computers originally lead designer steve chen cray x-mp chen departure cray y-mp cray c90 cray t90 developed original cray-1 architecture achieved much greater performance via multiple additional processors faster clocks wider vector pipes uncertainty cray-2 project gave rise number cray-object-code compatible crayette firms scientific computer systems scs american supercomputer supertek perhaps one firm firms mean compete cray therefore attempted less expensive slower cmos versions x-mp release cos operating system scs cft fortran compiler also considered national labs lanl/llnl developed ctss operating system well joining broader trend toward adoption unixes series massively parallel computers thinking machines kendall square research intel supercomputing systems division ncube maspar meiko scientific took 1980s high performance market first cray research denigrated approaches complaining developing software effectively use machines difficult – true complaint era illiac iv becoming less day cray eventually realized approach likely way forward started five-year project capture lead area plan result dec alpha-based cray t3d cray t3e series left cray remaining supercomputer vendor market besides nec 2000 sites cray installation considered member exclusive club cray operators cray computers considered quite prestigious crays extremely expensive machines number units sold small compared ordinary mainframes perception extended countries well boost perception exclusivity cray research marketing department promotional neckties made mosaic tiny national flags illustrating club cray-operating countries new vendors introduced small supercomputers known minisupercomputers opposed superminis late 1980s early 1990s out-competed low-end cray machines market convex computer series well number small-scale parallel machines companies like pyramid technology alliant computer systems particularly popular one vendor supertek whose s-1 machine air-cooled cmos implementation x-mp processor cray purchased supertek 1990 sold s-1 cray xms machine proved problematic meanwhile not-yet-completed s-2 y-mp clone later offered cray y-mp el later becoming el90 series started sell reasonable numbers 1991–92—to mostly smaller companies notably oil exploration business line evolved cray j90 eventually cray sv1 1998 december 1991 cray purchased assets floating point systems another minisuper vendor moved file server market sparc-based model 500 line smp machines scaled 64 processors ran modified version solaris operating system sun microsystems cray set cray research superservers inc. later cray business systems division sell system cray s-mp later replacing cray cs6400 spite machines powerful available applied appropriate workloads cray never successful market possibly due foreign existing market niche ccc building cray-3/sss went chapter 11 march 1995 cray research merged silicon graphics sgi february 1996 time industry highly critical move noting little overlap two companies either markets technology founder seymour cray died result traffic accident later year sgi immediately sold superservers business sun quickly turned ultrasparc-based starfire project development extremely successful enterprise 10000 range servers sgi use number cray technologies attempt move graphics workstation market supercomputing key among use cray-developed hippi data-bus details interconnects used t3 series sgi long-term strategy merge high-end server line cray product lines two phases code-named sn1 sn2 sn standing scalable node sn1 intended replace t3e sgi origin 2000 systems later became sn-mips sgi origin 3000 architecture sn2 originally intended unify high-end/supercomputer product lines including t90 single architecture goal never achieved sgi divested cray business sn2 name later associated sn-ia sgi altix 3000 architecture sgi ownership one new cray model line sv1 launched 1998 clustered smp vector processor architecture developed j90 technology sgi set separate cray research business unit august 1999 preparation detachment march 2 2000 unit sold tera computer company tera computer company renamed cray inc. deal closed april 4 tera merger tera mta system relaunched cray mta-2 commercial success shipped two customers cray inc. also unsuccessfully badged nec sx-6 supercomputer cray sx-6 acquired exclusive rights sell sx-6 u.s. canada mexico 2002 cray inc. announced first new model cray x1 combined architecture vector mpp supercomputer previously known sv2 x1 end result earlier sn2 concept originated sgi years may 2004 cray announced one partners u.s. department energy fastest-computer-in-the-world project build 50 teraflops machine oak ridge national laboratory cray sued 2002 isothermal systems research patent infringement suit claimed cray used isr patented technology development cray x1 lawsuit settled 2003 november 2004 cray x1 maximum measured performance 5.9 teraflops 29th fastest supercomputer world since x1 superseded x1e faster dual-core processors october 4 2004 company announced cray xd1 range entry-level supercomputers use dual-core 64-bit amd opteron cpus running linux system previously known octigabay 12k cray acquisition company xd1 provided one xilinx virtex ii pro field-programmable gate array fpga node four opteron processors fpgas could configured embody various digital hardware designs could augment processing input/output capabilities opteron processors furthermore fpga contains pair powerpc 405 processors add already considerable power single node cray xd1 although moderately successful eventually discontinued 2004 cray completed red storm system sandia national laboratories red storm become jumping-off point string successful products eventually revitalized cray supercomputing red storm processors clustered 96 unit cabinets theoretical maximum 300 cabinets machine design speed 41.5 teraflops red storm also included innovative new design network interconnects dubbed seastar destined centerpiece succeeding innovations cray cray xt3 massively parallel supercomputer became commercialized version red storm similar many respects earlier t3e architecture like xd1 using amd opteron processors cray xt4 introduced 2006 added support ddr2 memory newer dual-core future quad-core opteron processors utilized second generation seastar2 communication coprocessor also included option fpga chips plugged directly processor sockets unlike cray xd1 required dedicated socket fpga coprocessor august 8 2005 peter ungaro appointed ceo ungaro joined cray august 2003 vice president sales marketing made cray president march 2005 november 13 2006 cray announced new system cray xmt based mta series machines system combined multi-threaded processors used original tera systems seastar2 interconnect used xt4 reusing asics boards cabinets system software used comparatively higher volume xt4 product cost making specialized mta system reduced second generation xmt scheduled release 2011 first system ordered swiss national supercomputing center cscs 2006 cray announced vision products dubbed adaptive supercomputing first generation systems dubbed rainier project used common interconnect network seastar2 programming environment cabinet design i/o subsystem systems included existing xt4 xmt second generation launched xt5h allowed system combine compute elements various types common system sharing infrastructure xt5h combined opteron vector multithreaded fpga compute processors single system april 2008 cray intel announced would collaborate future supercomputer systems partnership produced cray cx1 system launched september year deskside blade server system comprising 16 dual- quad-core intel xeon processors either microsoft windows hpc server 2008 red hat enterprise linux installed 2009 largest computer system cray delivered xt5 system national center computational sciences oak ridge national laboratories system 224,000 processing cores dubbed jaguar fastest computer world measured linpack benchmark speed 1.75 petaflops surpassed tianhe-1a october 2010 first system exceed sustained performance 1 petaflops 64-bit scientific application may 2010 cray xe6 supercomputer announced cray xe6 system core new gemini system interconnect new interconnect included true global-address space represented return t3e feature set successful cray research product successful follow-on xt3 xt4 xt5 products first multi-cabinet xe6 system shipped july 2010 next generation cascade systems designed make use future multicore and/or manycore processors vendors intel nvidia cascade scheduled introduced early 2013 designed use next-generation network chip follow-on gemini code named aries early 2010 cray also introduced cray cx1000 rack-mounted system choice compute-based gpu-based smp-based chassis cx1 cx1000 product lines sold late 2011 2011 cray announced cray xk6 hybrid supercomputer cray xk6 system capable scaling 500,000 processors 50 petaflops peak performance combines cray gemini interconnect amd multi-core scalar processors nvidia tesla gpgpu processors october 2012 cray announced cray xk7 supports nvidia kepler gpgpu announced ornl jaguar system would upgraded xk7 renamed titan capable 20 petaflops titan world fastest supercomputer measured linpack benchmark introduction tianhe-2 2013 substantially faster 2011 cray also announced awarded 188m us blue waters contract university illinois ibm pulled delivery system delivered 2012 largest system date terms cabinets general-purpose x86 processors cray ever delivered november 2011 cray sonexion 1300 data storage system introduced signaled cray entry high performance storage business product used modular technology lustre file system 2011 cray launched openacc parallel programming standard organization however 2019 cray announced deprecating openacc support openmp april 2012 cray inc. announced sale interconnect hardware development program related intellectual property intel corporation 140 million november 9 2012 cray announced acquisition appro international inc. california-based privately held developer advanced scalable supercomputing solutions currently 3 provider top100 supercomputer list appro builds world advanced high performance computing hpc cluster systems 2012 cray opened subsidiary china may 17 2019 hewlett packard enterprise hpe announced purchasing cray 1.4 billion approximately 35 per share deal expected close first quarter hpe fiscal year 2020 ends january 31 2020
[ 3328, 1795, 1400, 9095, 9863, 9991, 7820, 9363, 1823, 6179, 9126, 9391, 11697, 823, 8631, 58, 1724, 7615, 9665, 10051, 3142, 1480, 7497, 2135, 2650, 731, 6495, 1638, 7148, 3055, 1776, 4463, 5492, 6518, 1399, 3960, 3323, 8700, 11517 ]
None
7,433
4
Offline_private_key_protocol:offline private key protocol offline private key protocol opkp cryptographic protocol prevent unauthorized access back archive data protocol results public key used encrypt data offline private key later used decrypt data protocol based three rules regarding key offline private key comply rules offline private key protocol uses method asymmetric key wrapping protocol provide rules strength encryption methods keys used security protocol depends actual cryptographic implementation used combination strong encryption methods protocol provide extreme security initially archiving creating backup session file restore backed archived data
[ 7434, 9134, 3366 ]
Test
7,434
4
Offline_private_key:offline private key offline private key cryptographic key stored network-connected medium key used decrypt archive backup data key result offline private key protocol printed form key trusted paper key
[ 7433, 9134, 3366 ]
Test
7,435
2
Source_Mage:source mage source mage linux distribution package installed source code automatically downloaded compiled installed source mage descended sorcerer source mage name suggests source-based linux distribution instead delivering binaries users source code compiled method allows greater control software precompiled distributions ubuntu individual dependencies selected deselected saving valuable hard drive space freeing ram cpu cycles instance openssh compiled without support x11 sharing one choose set cflags cxxflags ldflags specific situation using source-based distribution one way unlock full performance computer many binary distros compile software wide audience particular group users specific processor source mage spell cast latest stable release downloaded developer site rather source mage allows up-to-date system unlike gentoo another popular source-based distribution maintains customized cache packages smgl changes little possible packages fit bare standards filesystem hierarchy standard immune kind errors resulting distribution developers tampering 2000 kyle sallee released linux distribution named sorcerer gnu/linux due several issues 2002 chuck s. mead forked sorcerer lunar linux soon afterwards kyle sallee took sorcerer gnu/linux offline remaining sorcerer gnu/linux development team brought back online continued development month later kyle sallee brought version sorcerer back online new license prevented forking dropping gnu/linux name consequently request sallee sorcerer gnu/linux team renamed project source mage source mage tagline linux advanced may well magic commands sorcerous theme package called spell package management program called sorcery install package user must cast spell casting spell consists downloading source code already downloaded checking dependencies casting necessary compiling program installing set available spells called grimoire uninstall package user must dispel spell source mage established distribution commitment source mage social contract establishes basic rules similar though identical debian first part contract ensures freedom source mage source mage restrict user choice software free software installing source mage involves first creating minimal installation kernel run gcc c compiler network connection basic tools support downloading compiling source code enables system download compile install components compilation results tailored specific system source mage-maintained code designed presume minimal system base system n't explicitly require c++ compiler gcc 4.x+ replaced besides posix-compliant tools core components require bash sed either gawk mawk instead heavyweight languages like perl python makes source mage suitable small installation
[ 515, 4611, 3079, 9735, 10760, 7181, 3089, 4113, 8209, 8213, 8727, 6680, 543, 11297, 7204, 9253, 5670, 11305, 56, 4153, 3129, 59, 3131, 8248, 9276, 3649, 4673, 10817, 3654, 5190, 3147, 2125, 1107, 3667, 6227, 1110, 89, 5721, 4192, 3685, ...
Test
7,436
4
Vulnerability_Discovery_Model:vulnerability discovery model vulnerability discovery model vdm uses discovery event data software reliability models predicting thorough presentation vdm techniques available numerous model implementations available mcmcbayes open source repository several vdm examples include
[ 3552, 612, 5636, 5373, 2558 ]
Test
7,437
4
Khalil_Sehnaoui:khalil sehnaoui khalil sehnaoui belgian-lebanese information security consultant specialises middle-east founder managing partner beirut-based krypton security also member chaos computer club ccc europe largest association hackers co-founded managing partner security firm krypton security helps test companies security strengths weaknesses potential loopholes online report published april 6 2016 sehnaoui listed one top 100 influencers information security sehnaoui often called upon comment media information security matters sehnaoui born beirut parents marwan sehnaoui mouna bassili sehnaoui 23 may 1975 grew living paris france beirut lebanon father president lebanese order malta mother middle-east painter attended college stanislas paris well collège louise wegman beirut following earned ba management universite saint joseph beirut well masters economics sehnaoui featured guardian video series power privacy 2015 may 2017 sehnaoui went viral twitter internet tweeting getting revenge loud rude customers coffee shop customers loud rude waiters voluble conversation perfect new business name retaliation sehnaoui registered domain name tweeted according mashable twitter users praised sehnaoui act digital savagery sehnaoui also featured national geographic 2017 series breakthrough produced ron howard brian grazer season 2 episode 2 cyber-terror episode offered exclusive look inside shadowy world hackers good battles evil security world stake episode follows “ white-hat ” hackers jayson street darren kitchen khalil sehnaoui security specialists combine clever coding “ mission impossible ” -style “ social engineering. ” 2019 sehnaoui featured amongst 70 information security professionals book called tribe hackers collection industry career personal insights cybersecurity luminaries book quickly rose 1 spot new releases amazon computer security encryption category 2015 controversy sehnaoui identified silent circle warrant canary removed site sehnaoui also prominently featured video series guardian privacy risks often called upon comment recent information security news founding information security firm attempted improve patient representation lebanese insurance industry starting january 2016 reports islamic state allegedly built new android app called alrawi exchanging encrypted messages based claims online counter-terrorism firm ghost security group gsg claim quickly reprinted newsweek fortune techcrunch among others sehnaoui one security specialists helped debunk myth tool showing bad media mock-up try get attention july 2018 arrested alleged piracy several lebanese companies government institutions detention illegal legal vacuum lebanese laws cybercrime released questioned charges brought
[ 3629, 2360, 4956, 5373, 2558 ]
Validation
7,438
9
Array_access_analysis:array access analysis computer science array access analysis compiler analysis used decide read write access patterns elements portions arrays major data type manipulated scientific programs array define/use analysis whole array insufficient aggressive compiler optimizations auto parallelization array privatization array access analysis aims obtain knowledge portions even elements array accessed given code segment basic block loop even procedure level array access analysis largely categorized exact reference-list-based summary methods different tradeoffs accuracy complexity exact methods precise costly terms computation space storage summary methods approximate computed quickly economically typical exact array access analysis include linearization atom images summary methods divided array sections bounded regular sections using triplet notation linear-constraint methods data access descriptors array region analysis
[ 7940, 8262, 7273, 3475, 2620 ]
Train
7,439
5
Light_(web_browser):light web browser light formerly known firefox light free open-source web browser based firefox light available windows os x linux operating systems differs firefox built performance achieves removing several firefox built components including crash reporter safe browsing spell checker development tools support various types video audio media
[ 9152, 6797, 7983, 119, 5078, 823 ]
Test
7,440
4
Byzantine_Foothold:byzantine foothold byzantine foothold unclassified code name related united states department defense effort within larger cyber initiative framework specifically aimed curbing preventing foreign intrusions computer networks us federal agencies said threat related ongoing efforts chinese hackers peoples liberation army public documentation available would prove case twenty largest american military-industrial contractors also invited participate program highly potent hacker attack detected booz allen corp although us government sees largest cyber espionage effort arrests made specific cyber intruder identified public information available state on-going investigation related intrusion
[ 3843, 7798, 5087 ]
Validation
7,441
4
MultigrainMalware:multigrainmalware new sophisticated point-of-sale memory-scraping malware called “ multigrain ” discovered april 17 2016 fireeye inc. security company multigrain malware comes family newposthings malware malware similar newposthings frameworkpos bernhardpos malware known previously notorious malware multigrain uses luhn algorithm validate credit debit card details pos malware infects computer blocks hypertext transfer protocol http file transfer protocol ftp traffic monitors data exfiltration exfiltrates scraped information credit debit card via domain name server dns sends collected payment card information 'command control server server multigrain targets specifically windows point sale system multi.exe executable file multigrain gets pos system multi.exe deletes without leaving trace
[ 3072, 6786, 7044, 10245, 10756, 9356, 9233, 8978, 4863, 4883, 278, 10392, 1690, 3867, 10141, 5281, 2213, 8998, 9256, 939, 1970, 3643, 5563, 4797, 6588, 7739, 1088, 9791, 3395, 4165, 10309, 2887, 6091, 2508, 6360, 7515, 4344, 3941, 107, 87...
None
7,442
3
S3_Graphics:s3 graphics s3 graphics ltd commonly referred s3 american computer graphics company company perhaps best known virge much improved successor savage 3d chrome series struggling competition 3dfx interactive ati nvidia height 3d accelerator wars graphics portion company spun new joint effort via technologies new company focused mobile graphics market became major player space company purchased htc 2011 although primarily mobile technology company still produce graphics accelerators home computers s3 chrome brand name s3 founded incorporated january 1989 dado banatao ronald yara march 5 1993 s3 began initial public offering 2,000,000 shares common stock nasdaq several profitable years independent startup company struggling transition integrated 3d cards s3 remodeled consumer electronics company sold core graphics division joint venture via technologies 323 million joint venture s3 graphics continues develop market chipsets based s3 graphics technology reformed company carried substantial cash pile profitable trio see days successful investment umc taiwanese semiconductor foundry november 15 2000 s3 changed name sonicblue nasdaq stock symbol sblu new business model focused digital media information appliance opportunities graphics division sold via technologies s3 graphics replaytv rio govideo brands developed sonicblue march 21 2003 sonicblue filed chapter 11 bankruptcy s3 graphics first developed graphic cores via igp chipset years later began produce graphics accelerators home computers chrome brand name include deltachrome gammachrome chrome s27 chrome 440gtx july 6 2011 announced htc corporation would buy via technologies stake s3 graphics thus becoming majority owner s3 graphics s3 produces graphics cards primarily pcs earlier products trio range 2d later 3d functionality added virge savage cards recently s3 chipsets sold integrated via northbridge parts however units also available pci-e chrome 440 series supports directx 10.1 hd blu-ray video 3d acceleration powerful enough run today games moderate settings latest graphics card chrome 530gt supports directx 10.1 opengl 3.0 hd-dvd hd blu-ray video playback gpgpu acceleration image processing using s3fotopro video color correction video encoding transcoding scientific research game physics engineering analysis financial analysis signal processing media chipsets formation 1989 took s3 two years develop world first single-chip graphical user interface gui accelerator integrated functionality enabled attractive pricing solid features competitive prices remained hallmark s3 strategy s3 notable product range s3 trio 2d chipset remains one best selling graphics chipsets time updated number timely revisions time s3 managed keep series one step ahead competition however trio 2d range mid 1990s consumers oems started demand 3d functionality graphics cards internally s3 failed recognise transition quickly enough rush s3 virge range 3d cards cheap popular oems reason performance drivers poor enthusiasts even nicknamed graphics decelerators integrated modern style 3d feature produced s3 savage series graphics cards notably pioneered s3tc proprietary metal api subsequently adopted microsoft royalty industry standard texture compression directx savage also introduced motion compensation engine quality video scaler well hardware alpha-blended sub-picture blending first however 3d performance savage cards never quite enough take significant market share poor yields meant actual clock speeds 30 lower projected development transform lighting engine implementation flawed became apparent s3 integrated 2d technology longer enough ensure overall success chipset s3 could continued development savage cards likely resolved outstanding issues instead 2001 s3 management decided sell core business via 323 million subsequently savage derived chips turned numerous via motherboard chipsets integrated north bridge solution twister unichrome recent discrete derivations carried brand names deltachrome gammachrome manner s3 derived chips held onto 10 share overall pc graphics market sonicblue american consumer electronics company resulting 1999 merger computer peripheral maker diamond multimedia graphics chipset maker s3 incorporated november 2000 combined company changed name sonicblue changed focus graphics chipsets computer peripherals consumer electronics rio line mp3 players january 2001 graphics chipset business sold joint venture sonicblue via called s3 graphics later year company bought replaytv maker pvr systems sensory science corporation company selling dual-deck dvd/vcr systems govideo brand name march 21 2003 sonicblue filed chapter 11 bankruptcy protection sold main product lines april 16 2003 holdings parent company denon ltd. marantz japan inc. purchased virtually operating assets sonicblue produces replaytv rio units new subsidiary digital networks north america dnna inc last piece company effectively sold late 2003 best data acquired diamond supra modem business along rights diamond multimedia name use new video card division august 2005 company said would discontinue making mp3 players licensed digital audio software technology chipmaker sigmatel month
[ 9057, 8514, 8035, 10658, 4902, 6570, 3883, 11627, 2925, 6797, 7215, 7309, 6879, 7442, 6069, 10971, 2943 ]
None
7,443
8
Mongrel2:mongrel2 mongrel2 open-source language agnostic web server written zed shaw successor shaw mongrel server server supports http flash xmlsockets websockets long polling connections mongrel2 described language agnostic meaning prefer specific programming language another server documentation says shaw began working server june 2010 released version 1.0 software september 1 2010 mongrel2 nothing common original mongrel webserver except using http parser
[ 1920, 4485, 7430, 9229, 7567, 7695, 1937, 8350, 7457, 3746, 8994, 2596, 3237, 9125, 11682, 7338, 9387, 44, 7983, 10800, 11439, 6714, 10622, 1991, 11134, 595, 1363, 4439, 3545, 225, 1250, 865, 2404, 4837, 9834, 6379, 5612, 9580, 2287, 1137...
Validation
7,444
2
Interpreter_directive:interpreter directive interpreter directive computer language construct systems better described aspect system executable file format used control interpreter parses interprets instructions computer program unix linux unix-like operating systems first two bytes file characters constitute magic number hexadecimal 23 21 ascii values often referred shebang prefix first line script remainder line command usually limited max 14 introduced usually 80 characters 2016 file system permissions script file include execute permission bit user invoking filename often found command search path used tell operating system interpreter usually program implements scripting language use execute script contents may batch commands might intended interactive use example would /bin/bash meaning run script bash shell found /bin directory systems files may use magic number interpreter directives
[ 8631, 1509, 2181, 7983, 10672, 11632, 9714, 10387, 5492, 5397, 8628, 823, 9780, 11442 ]
Test
7,445
3
PIC_microcontrollers:pic microcontrollers pic usually pronounced pick family microcontrollers made microchip technology derived pic1650 originally developed general instrument microelectronics division name pic initially referred peripheral interface controller currently expanded programmable intelligent computer first parts family available 1976 2013 company shipped twelve billion individual parts used wide variety embedded systems early models pic read-only memory rom field-programmable eprom program storage provision erasing memory current models use flash memory program storage newer models allow pic reprogram program memory data memory separated data memory 8-bit 16-bit latest models 32-bit wide program instructions vary bit-count family pic may 12 14 16 24 bits long instruction set also varies model powerful chips adding instructions digital signal processing functions hardware capabilities pic devices range 6-pin smd 8-pin dip chips 144-pin smd chips discrete i/o pins adc dac modules communications ports uart i2c even usb low-power high-speed variations exist many types manufacturer supplies computer software development known mplab x assemblers c/c++ compilers programmer/debugger hardware mplab pickit series third party open-source tools also available parts in-circuit programming capability low-cost development programmers available well high-production programmers pic devices popular industrial developers hobbyists due low cost wide availability large user base extensive collection application notes availability low cost free development tools serial programming re-programmable flash-memory capability original pic intended used general instrument new cp1600 16-bit central processing unit cpu whilst people considered cp1600 good cpu poor i/o performance 8-bit pic developed 1975 improve performance overall system offloading i/o tasks cpu pic used simple microcode stored rom perform tasks although term risc used time shares common features risc designs 1985 general instrument sold microelectronics division new owners cancelled almost everything time mostly out-of-date pic however upgraded internal eprom produce programmable channel controller 2001 microchip introduced flash programmable devices full production commencing 2002 today huge variety pics available various on-board peripherals serial communication modules uarts motor control kernels etc program memory 256 words 64k words word one assembly language instruction varying length 8 16 bits depending specific pic micro family pic picmicro registered trademarks microchip technology generally thought pic stands peripheral interface controller although general instruments original acronym initial pic1640 pic1650 devices programmable interface controller acronym quickly replaced programmable intelligent computer microchip 16c84 pic16x84 introduced 1993 first microchip cpu on-chip eeprom memory 2013 microchip shipping one billion pic microcontrollers every year pic micro chips designed harvard architecture offered various device families baseline mid-range families use 8-bit wide data memory high-end families use 16-bit data memory latest series pic32mz 32-bit mips-based microcontroller instruction words sizes 12-bit pic10 pic12 14-bit pic16 24-bit pic24 dspic binary representations machine instructions vary family shown pic instruction listings within families devices may designated picnncxxx cmos picnnfxxx flash c devices generally classified suitable new development actively promoted microchip program memory c devices variously described otp rom eeprom october 2016 otp product classified production pic16hv540 c devices quartz windows erasure general longer available devices feature 12-bit wide code memory 32-byte register file tiny two level deep call stack represented pic10 series well pic12 pic16 devices baseline devices available 6-pin 40-pin packages generally first 7 9 bytes register file special-purpose registers remaining bytes general purpose ram pointers implemented using register pair writing address fsr file select register indf indirect f register becomes alias addressed register banked ram implemented bank number selected high 3 bits fsr affects register numbers 16–31 registers 0–15 global affected bank select bits limited register space 5 bits 4 rarely read registers assigned addresses written special instructions codice_1 codice_2 rom address space 512 words 12 bits may extended 2048 words banking codice_3 codice_4 instructions specify low 9 bits new code location additional high-order bits taken status register note call instruction includes 8 bits address may specify addresses first half 512-word page lookup tables implemented using computed codice_4 assignment pcl register table codice_6 instructions baseline core support interrupts i/o must polled enhanced baseline variants interrupt support four-level call stack pic10f32x devices feature mid-range 14-bit wide code memory 256 512 words 64-byte sram register file 8-level deep hardware stack devices available 6-pin smd 8-pin dip packages two pins unused one input three i/o pins available complex set interrupts available clocks internal calibrated high-frequency oscillator 16 mhz choice selectable speeds via software 31 khz low-power source devices feature 14-bit wide code memory improved 8-level deep call stack instruction set differs little baseline devices two additional opcode bits allow 128 registers 2048 words code directly addressed additional miscellaneous instructions two additional 8-bit literal instructions add subtract mid-range core available majority devices labeled pic12 pic16 first 32 bytes register space allocated special-purpose registers remaining 96 bytes used general-purpose ram banked ram used high 16 registers 0x70–0x7f global important special-purpose registers including status register holds ram bank select bits global registers fsr indf low 8 bits program counter pcl pc high preload register pclath master interrupt control register intcon pclath register supplies high-order instruction address bits 8 bits supplied write pcl register 11 bits supplied codice_4 codice_3 instruction sufficient address available rom space 17 series never became popular superseded pic18 architecture however see clones 17 series recommended new designs availability may limited users improvements earlier cores 16-bit wide opcodes allowing many new instructions 16-level deep call stack pic17 devices produced packages 40 68 pins 17 series introduced number important new features significant limitation ram space limited 256 bytes 26 bytes special function registers 232 bytes general-purpose ram awkward bank-switching models supported 2000 microchip introduced pic18 architecture unlike 17 series proven popular large number device variants presently manufacture contrast earlier devices often programmed assembly c become predominant development language 18 series inherits features instructions 17 series adding number important new features ram space 12 bits addressed using 4-bit bank select register 8-bit offset instruction additional access bit instruction selects bank 0 =0 bank selected bsr =1 1-level stack also available status wreg bsr registers saved every interrupt may restored return interrupts disabled may also used subroutine call/return setting bit appending fast instruction auto increment/decrement feature improved removing control bits adding four new indirect registers per fsr depending indirect file register accessed possible postdecrement postincrement preincrement fsr form effective address adding w fsr advanced pic18 devices extended mode available makes addressing even favorable compiled code pic18 devices still developed 2017 fitted cip core independent peripherals 2001 microchip introduced dspic series chips entered mass production late 2004 microchip first inherently 16-bit microcontrollers pic24 devices designed general purpose microcontrollers dspic devices include digital signal processing capabilities addition although still similar earlier pic architectures significant enhancements features dspics programmed c using microchip xc16 compiler formerly called c30 variant gcc instruction rom 24 bits wide software access rom 16-bit words even words hold least significant 16 bits instruction odd words hold significant 8 bits high half odd words reads zero program counter 23 bits wide least significant bit always 0 22 modifiable bits instructions come two main varieties important operations add xor shifts etc allowing forms first like classic pic instructions operation specified f register i.e first 8k ram single accumulator w0 destination select bit selecting updated result w registers memory-mapped f operand may w register second form conventional allowing three operands may 16 w registers destination one sources also support addressing modes allowing operand memory pointed w register november 2007 microchip introduced pic32mx family 32-bit microcontrollers based mips32 m4k core device programmed using microchip mplab c compiler pic32 mcus variant gcc compiler first 18 models currently production pic32mx3xx pic32mx4xx pin pin compatible share peripherals set pic24fxxga0xx family 16-bit devices allowing use common libraries software hardware tools today starting 28 pin small qfn packages high performance devices ethernet usb otg full family range mid-range 32-bit microcontrollers available pic32 architecture brought number new features microchip portfolio including november 2013 microchip introduced pic32mz series microcontrollers based mips m14k core pic32mz series include 2015 microchip released pic32mz ef family using updated mips m5150 warrior m-class processor 2017 microchip introduced pic32mz da family featuring integrated graphics controller graphics processor 32mb ddr2 dram june 2016 microchip introduced pic32mm family specialized low-power low-cost applications pic32mm features core-independent peripherals sleep modes 500 na 4 x 4 mm packages pic32mm microcontrollers use mips technologies m4k 32-bit mips32 processor meant low power consumption limited 25 mhz key advantage support 16bits instructions mips making program size much compact 40 microchip introduced pic32mk family 2017 specialized motor control industrial control industrial internet things iiot multi-channel applications pic architecture characterized multiple attributes distinction memory space register space ram serves job memory registers ram usually referred register file simply registers pics set registers function general-purpose ram special-purpose control registers on-chip hardware resources also mapped data space addressability memory varies depending device series pic devices banking mechanism extend addressing additional memory later series devices feature move instructions cover whole addressable space independent selected bank earlier devices register move achieved accumulator implement indirect addressing file select register fsr indirect register indf used register number written fsr reads writes indf actually register pointed fsr later devices extended concept post- pre- increment/decrement greater efficiency accessing sequentially stored data also allows fsr treated almost like stack pointer sp external data memory directly addressable except pic18 devices high pin count code space generally implemented on-chip rom eprom flash rom general provision storing code external memory due lack external memory interface exceptions pic17 select high pin count pic18 devices pics handle address data 8-bit chunks however unit addressability code space generally data space example pics baseline pic12 mid-range pic16 families program memory addressable wordsize instruction width i.e 12 14 bits respectively contrast pic18 series program memory addressed 8-bit increments bytes differs instruction width 16 bits order clear program memory capacity usually stated number single-word instructions rather bytes pics hardware call stack used save return addresses hardware stack software-accessible earlier devices changed 18 series devices hardware support general-purpose parameter stack lacking early series greatly improved 18 series making 18 series architecture friendly high-level language compilers pic instructions vary 35 instructions low-end pics 80 instructions high-end pics instruction set includes instructions perform variety operations registers directly accumulator literal constant accumulator register well conditional execution program branching operations bit setting testing performed numbered register bi-operand arithmetic operations always involve w accumulator writing result back either w operand register load constant necessary load w moved another register older cores register moves needed pass w changed high-end cores pic cores skip instructions used conditional execution branching skip instructions skip bit set skip bit set cores pic18 unconditional branch instructions conditional jumps implemented conditional skip opposite condition followed unconditional branch skips also utility conditional execution immediate single following instruction possible skip instructions example instruction sequence skip skip b c execute c true b false 18 series implemented shadow registers registers save several important registers interrupt providing hardware support automatically saving processor state servicing interrupts general pic instructions fall five classes architectural decisions directed maximization speed-to-cost ratio pic architecture among first scalar cpu designs still among simplest cheapest harvard architecture instructions data come separate sources simplifies timing microcircuit design greatly benefits clock speed price power consumption pic instruction set suited implementation fast lookup tables program space lookups take one instruction two instruction cycles many functions modeled way optimization facilitated relatively large program space pic e.g 4096 × 14-bit words 16f690 design instruction set allows embedded constants example branch instruction target may indexed w execute retlw named return literal w. interrupt latency constant three instruction cycles external interrupts synchronized four-clock instruction cycle otherwise one instruction cycle jitter internal interrupts already synchronized constant interrupt latency allows pics achieve interrupt-driven low-jitter timing sequences example video sync pulse generator longer true newest pic models synchronous interrupt latency three four cycles following stack limitations addressed pic18 series still apply earlier cores paged program memory two page sizes worry one call goto another computed goto typically used table lookups example pic16 call goto 11 bits addressing page size 2048 instruction words computed gotos add pcl page size 256 instruction words cases upper address bits provided pclath register register must changed every time control transfers pages pclath must also preserved interrupt handler several commercial compilers available 2008 microchip released c compilers c18 c30 line 18f 24f 30/33f processors 2013 microchip offers xc series compilers use mplab x microchip eventually phase older compilers c18 recommends using xc series compilers new designs risc instruction set pic assembly language code make overall flow difficult comprehend judicious use simple macros increase readability pic assembly language example original parallax pic assembler spasm macros hide w make pic look like two-address machine macro instructions like codice_17 move data address address b codice_18 add data address data address b also hides skip instructions providing three-operand branch macro instructions codice_19 compare b jump dest equal pic devices generally feature within series still many device variants depending hardware resources chip features first generation pics eprom storage almost completely replaced chips flash memory likewise original 12-bit instruction set pic1650 direct descendants superseded 14-bit 16-bit instruction sets microchip still sells otp one-time-programmable windowed uv-erasable versions eprom based pics legacy support volume orders microchip website lists pics electrically erasable otp uv erasable windowed versions chips ordered f picmicro part number generally indicates picmicro uses flash memory erased electronically conversely c generally means erased exposing die ultraviolet light possible windowed package style used exception rule pic16c84 uses eeprom therefore electrically erasable l name indicates part run lower voltage often frequency limits imposed parts designed specifically low voltage operation within strict range 3 3.6 volts marked j part number parts also uniquely i/o tolerant accept 5 v inputs microchip provides freeware ide package called mplab x includes assembler linker software simulator debugger also sell c compilers pic10 pic12 pic16 pic18 pic24 pic32 dspic integrate cleanly mplab x free versions c compilers also available features free versions optimizations disabled 60 days several third parties develop c language compilers pics many integrate mplab and/or feature ide fully featured compiler picbasic language program pic microcontrollers available melabs inc. mikroelektronika offers pic compilers c basic pascal programming languages graphical programming language flowcode exists capable programming 8- 16-bit pic devices generating pic-compatible c code exists numerous versions free demonstration complete professional edition proteus design suite able simulate many popular 8 16-bit pic devices along circuitry connected pic schematic program simulated developed within proteus mplab development tool devices called programmers traditionally used get program code target pic pics microchip currently sells feature icsp circuit serial programming and/or lvp low voltage programming capabilities allowing pic programmed sitting target circuit microchip offers programmers/debuggers mplab pickit series mplab icd4 mplab real ice current programmers debuggers professional engineering pickit 3 low-cost programmer debugger line hobbyists students many higher end flash based pics also self-program write program memory process known bootloading demo boards available small bootloader factory programmed used load user programs interface rs-232 usb thus obviating need programmer device alternatively bootloader firmware available user load onto pic using icsp programming bootloader onto pic user reprogram device using rs232 usb conjunction specialized computer software advantages bootloader icsp faster programming speeds immediate program execution following programming ability debug program using cable many programmers pic microcontrollers ranging extremely simple designs rely icsp allow direct download code host computer intelligent programmers verify device several supply voltages many complex programmers use pre-programmed pic send programming commands pic programmed intelligent type programmer needed program earlier pic models mostly eprom type support in-circuit programming third party programmers range plans build self-assembly kits fully tested ready-to-go units simple designs require pc low-level programming signalling typically connect serial parallel port consist simple components others programming logic built typically use serial usb connection usually faster often built using pics control newer pic devices feature icd in-circuit debugging interface built cpu core allows interactive debugging program conjunction mplab ide mplab icd mplab real ice debuggers communicate interface using icsp interface debugging system comes price however namely limited breakpoint count 1 older devices 3 newer devices loss i/o exception surface mount 44-pin pics dedicated lines debugging loss on-chip features devices on-chip debug support due cost lack pins larger chips also debug module debug devices special -icd version chip mounted daughter board provides dedicated ports required debug chips able operate one type chip use selectable jumpers daughter board allows broadly identical architectures feature chip peripheral devices replaced single -icd chip example 12f690-icd function one six different parts features one five chip peripherals microchip offers three full in-circuit emulators mplab ice2000 parallel interface usb converter available newer mplab ice4000 usb 2.0 connection recently real ice usb 2.0 connection tools typically used conjunction mplab ide source-level interactive debugging code running target pic projects may utilize real time operating systems freertos avix rtos urtos salvo rtos similar libraries task scheduling prioritization open source project serge vakulenko adapts 2.11bsd pic32 architecture name retrobsd brings familiar unix-like operating system including onboard development environment microcontroller within constraints onboard hardware parallax produced series picmicro-like microcontrollers known parallax sx currently discontinued designed architecturally similar pic microcontrollers used original versions basic stamp sx microcontrollers replaced pic several subsequent versions product parallax sx 8-bit risc microcontrollers using 12-bit instruction word run fast 75 mhz 75 mips include 4096 12-bit words flash memory 262 bytes random access memory eight bit counter support logic software library modules emulate i²c spi interfaces uarts frequency generators measurement counters pwm sigma-delta a/d converters interfaces relatively easy write existing modules modified get new features russian pkk milandr produces microcontrollers using pic17 architecture 1886 series program memory consists 64kb flash memory 1886ve2u 8kb eeprom 1886ve5u 1886ве5у 1886ve5u 1886ве5у 1886ve7u 1886ве7у specified military temperature range -60 °c +125 °c hardware interfaces various parts include usb i2c spi well a/d d/a converters 1886ve3u 1886ве3у contains hardware accelerator cryptographic functions according gost 28147-89 even radiation-hardened chips designations 1886ve8u 1886ве8у 1886ve10u 1886ве10у elan microelectronics corp. taiwan make line microcontrollers based pic16 architecture 13-bit instructions smaller 6-bit ram address space holtek semiconductor make large number cheap microcontrollers low 8.5 cents quantity 14-bit instruction set strikingly similar pic16 many ultra-low-cost otp microcontrollers asian manufacturers found low-cost consumer electronics based pic architecture modified form clones target baseline parts pic16c5x/pic12c50x microchip attempted sue manufacturers copying particularly egregious without success
[ 4098, 7170, 1029, 7173, 8711, 9739, 10767, 4124, 1058, 10786, 10796, 11314, 6207, 7234, 7235, 1100, 2638, 10833, 7774, 10851, 7269, 1126, 6247, 6250, 6252, 6253, 11374, 6256, 7281, 5237, 9851, 11395, 8327, 1170, 4246, 1175, 9366, 9371, 4773...
Test
7,446
1
Concurrency_control:concurrency control information technology computer science especially fields computer programming operating systems multiprocessors databases concurrency control ensures correct results concurrent operations generated getting results quickly possible computer systems software hardware consist modules components component designed operate correctly i.e. obey meet certain consistency rules components operate concurrently interact messaging sharing accessed data memory storage certain component consistency may violated another component general area concurrency control provides rules methods design methodologies theories maintain consistency components operating concurrently interacting thus consistency correctness whole system introducing concurrency control system means applying operation constraints typically result performance reduction operation consistency correctness achieved good possible efficiency without reducing performance reasonable levels concurrency control require significant additional complexity overhead concurrent algorithm compared simpler sequential algorithm example failure concurrency control result data corruption torn read write operations comments concurrency control database management systems dbms e.g. bernstein et al 1987 weikum vossen 2001 transactional objects related distributed applications e.g. grid computing cloud computing ensures database transactions performed concurrently without violating data integrity respective databases thus concurrency control essential element correctness system two database transactions executed time overlap access data e.g. virtually general-purpose database system consequently vast body related research accumulated since database systems emerged early 1970s well established concurrency control theory database systems outlined references mentioned serializability theory allows effectively design analyze concurrency control methods mechanisms alternative theory concurrency control atomic transactions abstract data types presented lynch et al 1993 utilized theory refined complex wider scope less utilized database literature classical theory theory pros cons emphasis insight extent complementary merging may useful ensure correctness dbms usually guarantees serializable transaction schedules generated unless serializability intentionally relaxed increase performance cases application correctness harmed maintaining correctness cases failed aborted transactions always happen many reasons schedules also need recoverability abort property dbms also guarantees effect committed transactions lost effect aborted rolled back transactions remains related database overall transaction characterization usually summarized acid rules databases become distributed needed cooperate distributed environments e.g. federated databases early 1990 cloud computing currently effective distribution concurrency control mechanisms received special attention concept database transaction atomic transaction evolved order enable well understood database system behavior faulty environment crashes happen time recovery crash well understood database state database transaction unit work typically encapsulating number operations database e.g. reading database object writing acquiring lock etc abstraction supported database also systems transaction well defined boundaries terms program/code executions included transaction determined transaction programmer via special transaction commands every database transaction obeys following rules support database system i.e. database system designed guarantee transactions runs concept atomic transaction extended years become business transactions actually implement types workflow atomic however also enhanced transactions typically utilize atomic transactions components transactions executed serially i.e. sequentially overlap time transaction concurrency exists however concurrent transactions interleaving operations allowed uncontrolled manner unexpected undesirable results may occur high-performance transactional systems need run transactions concurrently meet performance requirements thus without concurrency control systems neither provide correct results maintain databases consistently main categories concurrency control mechanisms different categories provide different performance i.e. different average transaction completion rates throughput depending transaction types mix computing level parallelism factors selection knowledge trade-offs available category method chosen provide highest performance mutual blocking two transactions one blocks results deadlock transactions involved stalled reach completion non-optimistic mechanisms blocking prone deadlocks resolved intentional abort stalled transaction releases transactions deadlock immediate restart re-execution likelihood deadlock typically low blocking deadlocks aborts result performance reduction hence trade-offs categories many methods concurrency control exist implemented within either main category major methods many variants cases may overlap combined major concurrency control types utilized conjunction methods include common mechanism type database systems since early days 1970s strong strict two-phase locking ss2pl also called rigorous scheduling rigorous 2pl special case variant two-phase locking 2pl commitment ordering co pessimistic spite long name historical reasons idea ss2pl mechanism simple release locks applied transaction transaction ended ss2pl rigorousness also name set schedules generated mechanism i.e. ss2pl rigorous schedules ss2pl rigorousness property concurrency control mechanisms firstly need operate correctly i.e. maintain transaction integrity rules related concurrency application-specific integrity rule scope transactions running concurrently thus integrity entire transactional system correctness needs achieved good performance possible addition increasingly need exists operate effectively transactions distributed processes computers computer networks subjects may affect concurrency control recovery replication correctness common major goal concurrency control mechanisms generating schedules serializability property without serializability undesirable phenomena may occur e.g. money may disappear accounts generated nowhere serializability schedule means equivalence resulting database values serial schedule transactions i.e. transactions sequential overlap time thus completely isolated concurrent access two transactions data possible serializability considered highest level isolation among database transactions major correctness criterion concurrent transactions cases compromised relaxed forms serializability allowed better performance e.g. popular snapshot isolation mechanism meet availability requirements highly distributed systems see eventual consistency application correctness violated relaxation e.g. relaxation allowed money transactions since relaxation money disappear appear nowhere almost implemented concurrency control mechanisms achieve serializability providing conflict serializablity broad special case serializability i.e. covers enables serializable schedules impose significant additional delay-causing constraints implemented efficiently comment general area systems term recoverability may refer ability system recover failure incorrect/forbidden state within concurrency control database systems term received specific meaning concurrency control typically also ensures recoverability property schedules maintaining correctness cases aborted transactions always happen many reasons recoverability abort means committed transaction schedule read data written aborted transaction data disappear database upon abort parts incorrect database state reading data violates consistency rule acid unlike serializability recoverability compromised relaxed case since relaxation results quick database integrity violation upon aborts major methods listed provide serializability mechanisms none general form automatically provides recoverability special considerations mechanism enhancements needed support recoverability commonly utilized special case recoverability strictness allows efficient database recovery failure excludes optimistic implementations e.g. strict co sco optimistic implementation semi-optimistic ones comment note recoverability property needed even database failure occurs database recovery failure needed rather needed correctly automatically handle transaction aborts may unrelated database failure recovery fast technological development computing difference local distributed computing low latency networks buses blurring thus quite effective utilization local techniques distributed environments common e.g. computer clusters multi-core processors however local techniques limitations use multi-processes threads supported multi-processors multi-cores scale often turns transactions distributed ones need span multi-processes cases local concurrency control techniques scale well database systems become distributed started cooperate distributed environments e.g. federated databases early 1990s nowadays grid computing cloud computing networks smartphones transactions become distributed distributed transaction means transaction spans processes may span computers geographical sites generates need effective distributed concurrency control mechanisms achieving serializability property distributed system schedule see distributed serializability global serializability modular serializability effectively poses special challenges typically met regular serializability mechanisms originally designed operate locally especially due need costly distribution concurrency control information amid communication computer latency known general effective technique distribution commitment ordering disclosed publicly 1991 patented commitment ordering commit ordering co raz 1992 means transactions chronological order commit events kept compatible respective precedence order co require distribution concurrency control information provides general effective solution reliable high-performance scalable distributed global serializability also heterogeneous environment database systems transactional objects different concurrency control mechanisms co indifferent mechanism utilized since interfere transaction operation scheduling mechanisms control determines order commit events thus co enables efficient distribution mechanisms also distribution mix different local mechanisms achieving distributed global serializability existence solution considered unlikely 1991 many experts also later due misunderstanding co solution see quotations global serializability important side-benefit co automatic distributed deadlock resolution contrary co virtually techniques combined co prone distributed deadlocks also called global deadlocks need special handling co also name resulting schedule property schedule co property chronological order transactions commit events compatible respective transactions precedence partial order ss2pl mentioned variant special case co thus also effective achieve distributed global serializability also provides automatic distributed deadlock resolution fact overlooked research literature even co publication well strictness thus recoverability possessing desired properties together known efficient locking based implementations explains ss2pl popularity ss2pl utilized efficiently achieve distributed global serializability since 1980 become de facto standard however ss2pl blocking constraining pessimistic proliferation distribution utilization systems different traditional database systems e.g. cloud computing less constraining types co e.g. optimistic co may needed better performance comments unlike serializability distributed recoverability distributed strictness achieved efficiently straightforward way similarly way distributed co achieved database system applied locally employ vote ordering strategy two-phase commit protocol 2pc raz 1992 page 307 mentioned distributed ss2pl including distributed strictness recoverability distributed commitment ordering serializability automatically employs needed vote ordering strategy achieved globally employed locally local database system known utilized many years matter fact locality defined boundary 2pc participant raz 1992 design concurrency control mechanisms often influenced following subjects systems prone failures handling recovery failure must properties generated schedules dictated concurrency control mechanism may affect effectiveness efficiency recovery example strictness property mentioned section recoverability often desirable efficient recovery high availability database objects often replicated updates replicas database object need kept synchronized may affect way concurrency control done e.g. gray et al 1996 multitasking operating systems especially real-time operating systems need maintain illusion tasks running top running time even though one tasks really running given moment due limitations hardware operating system running multitasking fairly simple tasks independent however several tasks try use resource tasks try share information lead confusion inconsistency task concurrent computing solve problem solutions involve locks similar locks used databases risk causing problems deadlock solutions non-blocking algorithms read-copy-update
[ 9224, 8201, 2068, 1049, 5658, 9248, 9762, 6184, 10793, 10286, 1083, 11324, 9286, 2632, 9290, 8788, 10326, 7767, 4194, 9828, 10340, 8808, 2669, 5745, 11377, 7802, 1146, 3196, 10389, 9366, 4255, 4263, 10413, 9397, 7868, 6850, 2246, 4308, 2780...
Test
7,447
7
Global_Relay:global relay global relay technology services company providing software-as-a-service electronic message archiving e.g. email archiving instant messaging compliance supervision solutions focus highly regulated industries global relay privately held employee controlled outside venture funding global relay founded 1999 warren roy duff reid eric parusel company developed one first cloud email archiving services use records management tool architecture design construction industries several years later company realized perfect technology wrong industry company shifted focus financial sector began selling archiving services broker-dealers investment advisors hedge funds banks email electronic messages increasingly became standard methods business communication new market emerged secure way retain messages business legal regulatory purposes beginning 2001 accounting scandals major us corporations enron worldcom arthur andersen brought regulatory compliance issues sharper focus financial firms also public companies wake scandals regulators sec financial industry regulatory authority finra formerly nasd well newly introduced sarbanes-oxley legislation began requiring financial firms system electronic message recordkeeping supervision — paper records global relay built customer base combining technology compliance legal audit/ediscovery services company gained widespread adoption among banks investment advisors broker-dealers hedge funds private equity firms 2007 global relay entered worldwide exclusive partnership thomson reuters archiving compliance thomson reuters messenger eikon new message types adopted financial industry global relay developed ability capture retain compliance public instant messaging aol instant messenger yahoo messenger msn messenger googletalk first message type followed bloomberg messaging mobile messaging blackberry android sms blackberry pin call logs ice chat cme/pivot social media linkedin twitter facebook integrations well company archiving system built in-house global relay development teams global relay markets global relay archive compliance necessity tool boost end-user productivity since company acquisition mobile software firm 2008 released apps every major mobile platform including iphone ipad blackberry android — allowing users find retrieve archived messages location global relay strategy future centers upon transition offering back office tools message archiving also providing front office communication services global relay message company cloud-based enterprise platform instant messaging collaboration designed meet regulatory requirements finance industry global relay also process developing next generation core archiving product provide increased scalability capacity process index messaging data companies hundreds thousands users additional key component global relay competitive strategy construction data centers allowing global relay fully control components technology stack including software workstations servers data centers property global relay 4-megawatt west coast data center located north vancouver british columbia capacity 200 racks 5000 servers environmentally friendly facility employs evaporative cooling technology eliminate need mechanical air conditioning thereby dramatically reducing electricity usage global relay significant player cloud-based messaging archiving industries recent articles cite client base 18,000 including 22 world 25 biggest banks 61 us hedge funds.1,2 revenue growth last five years rapid global relay ranked 197th fastest-growing software company north america 2012 data security paramount global relay financial customer base company annually engages kpmg provide independent verification security reliability internal controls january 2012 global relay announced five-year 1-million commitment become title sponsor operator global relay gastown grand prix 2016 global relay gastown grand prix professional cycling criterium race vancouver british columbia november 2012 global relay introduced global relay bridge gap philanthropic fund support up-and-coming canadian cyclists global relay pledged 400,000 four years support cyclists ages 19 25 providing funding coaching travel equipment five veteran professional canadian riders board members global relay bridge gap ryan anderson andrew pinfold routley svein tuft erinne willock
[ 2208, 10090, 467 ]
None
7,448
2
Glyder_2:glyder 2 glyder 2 ios adventure game developed glu mobile released december 16 2009 game rating 93 metacritic based 5 critic reviews appsmile said replay value high game perfect killing minutes hours. slidetoplay wrote glyder 2 must flight game enthusiasts want take easy without pinned red-flashing control panel seating area full screaming passengers. pocketgameruk said glyder 2 one-way ticket fantastic gameplay combination self-motivated exploration dynamic goals ensuring first class flight. 148apps said technically game fantastic graphics great controls responsive well done soundtrack fantastic real hick-up found occasional heavy frame dropping mushroom world sporelle. toucharcade said glyder 2 delivers fanciful aerial questing experience iphone ipod touch like forerunner highly enjoyable game challenging time relaxing.
[]
None
7,449
4
Computer_security_conference:computer security conference computer security conference convention individuals involved computer security generally serve meeting places system network administrators hackers computer security experts common activities hacker conventions may include general security conferences might held non-profit/not-for-profit/for-profit professional associations individuals informal group individuals security product vendor companies hacker conference also known hacker con convention hackers serve meeting places phreakers hackers security professionals actual events time-spans details various themes conventions depends specific convention attended also perceived reputation typically actual details given convention couched mild secrecy due legality certain panels well willingness attendees explain law enforcement less computer-savvy individuals see hacker definition controversy common topics include wardriving lockpicking corporate network security personal rights freedoms new technologies well general 'geek motifs may also contests general collaborative events hackathons one facet hacker conferences tends differentiate many hackercons general computer security conferences evolution conference badge many conferences use fairly standard paper/plastic badge identify attendees name many hacker con evolved use non-traditional badges electronic pcb led lcd screens include wifi advanced often hidden functionality include games identify individual sometimes promoting group identity regional/local group affiliation spurred creation so-called badgelife different individuals organizations local hacker groups may design create sell otherwise distribute separate badge attendees wear addition conference badge badges may purchased may earned completing challenge conference one rarest desirable badges defcon black badge use badges traditionally associated defcon use spread conferences
[ 8320, 2690, 1540, 5636, 10756, 3342, 10894, 6040, 10392, 1182, 688, 10290, 5427, 7222, 3643, 6588, 10875, 9791, 7491, 5575, 6473, 9293, 9424, 9688, 3290, 7899, 4956, 4445, 8671, 2275, 8165, 10216, 1525, 7547, 5373, 2558 ]
None
7,450
2
Miguel_de_Icaza:miguel de icaza miguel de icaza born november 23 1972 mexican-american programmer best known starting gnome mono xamarin projects de icaza born mexico city studied mathematics national autonomous university mexico unam dropped getting degree work came family scientists father physicist mother biologist started writing free software 1992 one earliest pieces software wrote linux midnight commander file manager text-mode file manager also one early contributors wine project worked david s. miller linux sparc port wrote several video network drivers port well libc ports platform later worked extending linux mips run sgi indy computers wrote original x drivers system ingo molnar wrote original software implementation raid-1 raid-5 drivers linux kernel summer 1997 interviewed microsoft job internet explorer unix team work sparc port lacked university degree required obtain work h-1b visa said interview tried persuade interviewers free ie code even netscape browser de icaza started gnome project federico mena august 1997 create completely free desktop environment component model linux unix-like operating systems also created gnome spreadsheet program gnumeric 1999 de icaza along nat friedman co-founded helix code gnome-oriented free software company employed large number gnome hackers 2001 helix code later renamed ximian announced mono project led de icaza goal implement microsoft new .net development platform linux unix-like platforms august 2003 ximian acquired novell de icaza vice president developer platform may 2011 de icaza started xamarin replace monotouch mono android novell bought attachmate projects abandoned shortly afterwards xamarin novell reached agreement xamarin took development sales products february 2016 xamarin announced acquired microsoft one month later microsoft build conference announced mono project would relicensed mit visual studio would include xamarin even free versions without restrictions xamarin sdks would opensourced de icaza endorsed microsoft office open xml ooxml document standard disagreeing lot widespread criticism open source free-software community also developed mono – free open-source alternative microsoft .net framework – gnome raised much disagreement due patents microsoft holds .net framework de icaza criticized richard stallman software freedom day 2009 labeled traitor free software community icaza responded blog stallman remark believes world possibility open discussions ways improve pool open source free software august 2012 de icaza criticized linux desktop killed apple de icaza specifically criticized generally developer-focused culture lack backward compatibility fragmentation among various linux distributions march 2013 de icaza announced personal blog regularly used macos instead linux desktop computing 2014 joined anders hejlsberg stage announcements .net foundation open sourcing microsoft c compiler serves board directors .net foundation miguel de icaza received free software foundation 1999 award advancement free software mit technology review innovator year award 1999 named one time magazine 100 innovators new century september 2000 early 2010 received microsoft mvp award march 2010 named fifth powerful voices open source mindtouch de icaza cameo appearances 2001 motion pictures antitrust code married brazilian maria laura soares da silva maria laura de icaza 2003 de icaza critical actions state israel towards palestinians middle east blogged subject de icaza granted us citizenship january 2015
[ 1026, 11394, 2955, 5644, 6413, 10255, 4367, 8848, 657, 9872, 1939, 3859, 2581, 3478, 5397, 6808, 10642, 11155, 1822, 6302, 7584, 802, 5410, 6691, 6947, 6694, 8354, 11559, 2603, 5931, 8364, 8621, 1328, 4402, 9908, 1717, 823, 2109, 11069, 1...
None
7,451
3
Seqlock:seqlock seqlock short sequential lock special locking mechanism used linux supporting fast writes shared variables two parallel operating system routines semantics stabilized version 2.5.59 present 2.6.x stable kernel series seqlocks developed stephen hemminger originally called frlocks based earlier work andrea arcangeli first implementation x86-64 time code needed synchronize user space possible use real lock reader-writer consistent mechanism avoids problem writer starvation seqlock consists storage saving sequence number addition lock lock support synchronization two writers counter indicating consistency readers addition updating shared data writer increments sequence number acquiring lock releasing lock readers read sequence number reading shared data sequence number odd either occasion writer taken lock data read may changed sequence numbers different writer changed data read either case readers simply retry using loop read even sequence number reader never blocks may retry write progress speeds readers case data modified since acquire lock would traditional read-write lock also writers wait readers whereas traditional read-write locks leading potential resource starvation situation number readers writer must wait readers two factors seqlocks efficient traditional read-write locks situation many readers writers drawback much write activity reader slow might livelock readers may starve also noted technique work data contains pointers writer could invalidate pointer reader already followed case using read-copy-update synchronization preferred first applied system time counter updating time interrupt updates time day may many readers time operating system internal use applications writes relatively infrequent occur one time bsd timecounter code instance appears use similar technique one subtle issue using seqlocks time counter impossible step debugger retry logic trigger time debugger slow enough make read race occur always
[ 7992, 7983, 823 ]
Test
7,452
2
Can4linux:can4linux can4linux open source linux-kernel device driver development started mid 1990s philips 82c200 controller stand alone chip isa board at-can-mini 1995 first version created use bus linux laboratory automation project linux lab project fu berlin increasing spread field bus technology automation especially embedded devices growth linux area leads growing importance device drivers base higher layer protocols like canopen j1939 devicenet besides nxp sja1000 successor first supported controller philips 82c200 intel 82527 development powerful microcontrollers integrated controllers capable run linux operating system intensified since 2005 examples development serve freescale coldfire processors arm models atmel freescale also stand-alone controller mcp2515 connected via spi bus br list supported controllers available can4linux project site latest version virtual mode implemented allows applications communicate without hardware using device driver software layer mode already includes support new frame format called fd allows data frame length 64 byte application software opens device descriptor gets back file descriptor using file descriptor standard operating system functions like codice_1 codice_2 used exchange frames nodes bus following code example puts frame bus afterwards waits frame transmitted another node examples available can4linux project site can4linux compiled way allows one process access controller hardware reading writing frames bus beside real application processes like data loggers diagnosis processes access bus
[ 5368, 3467 ]
Test
7,453
1
TokuDB:tokudb tokudb open-source high-performance storage engine mysql mariadb achieves using fractal tree index scalable acid mvcc compliant provides indexing-based query improvements offers online schema modifications reduces slave lag hard disk drives flash memory tokudb included percona server mariadb nagios based opmon tokudb uses fractal tree index tree data structure keeps data sorted allows searches sequential access time b-tree insertions deletions asymptotically faster b-tree fractal trees also allow messages injected tree fashion schema changes adding dropping column adding index done online background result indexes maintained without drop performance adding data indexes tends stress performance b-trees performs well fractal tree indexes fractal tree indexes applied number applications characterized near-real time analysis streaming data used storage layer database storage layer file system used database used setting b-tree used improved performance examples include network event management online advertising networks clickstream analytics air traffic control management uses include accelerated crawler performance search engines social media sites also used create indexes columns online enabling query flexibility e-commerce personalization also suited improving performance reducing existing loads transactional websites general performs well applications must simultaneously store log file data execute ad hoc queries approach building memory-efficient systems originally jointly developed researchers massachusetts institute technology rutgers university stony brook university tokudb named one technologies enable big data mysql tokutek startup showcase finalist o'reilly strata conference 2012 big data
[ 11392, 8195, 10258, 2456, 1049, 1950, 9503, 7339, 9010, 2810, 1211, 10048, 6721, 6346, 5964, 5198, 7506, 9687, 10459, 6245, 8295, 8683, 2413, 7022, 113, 3188, 4598, 10873, 7802 ]
None
7,454
4
Mixed_threat_attack:mixed threat attack mixed threat attack attack uses different tactics infiltrate computer user environment mixed threat attack might include infected file comes way spam received way internet download mixed threat attacks generally try exploit multiple vulnerabilities get system launching multiple diverse attacks parallel attacker exploit entry points single attack threats based multiple single-attacks much harder detect firewalls help types attacks configured correctly somewhat effective type attack however attack embedded inside application longer able prevent attack typical techniques employed define multiple access threat signature represents identification virus removal software types techniques need employed host machine sometimes firewall intrusion detection system able detect attack
[ 612 ]
Test
7,455
9
JavaScript_Style_Sheets:javascript style sheets javascript style sheets jsss stylesheet language technology proposed netscape communications corporation 1996 provide facilities defining presentation webpages alternative cascading style sheets css technology although netscape submitted world wide web consortium w3c technology never accepted formal standard never gained much acceptance market netscape communicator 4 supported jsss rival internet explorer web browser choosing implement technology soon netscape communicator release 1997 netscape stopped promoting jsss instead focusing rival css standard also supported internet explorer much wider industry acceptance follow-up netscape communicator netscape 6 released 2000 dropped support jsss remains little historical footnote many web developers even aware existence proposed standard finished using javascript code stylesheet jsss styles individual element modifying properties document.tags object example css equivalent jsss jsss element names case sensitive jsss lacks various css selector features supporting simple tag name class id selectors hand since written using complete programming language stylesheets include highly complex dynamic calculations conditional processing practice however achieved dynamic css using javascript modify stylesheets applicable document runtime jsss often used creation dhtml following example shows part source code html-document style type= text/javascript tags.h1.color red tags.p.fontsize 20pt tags.h3 tags.h2 /style similar cascading style sheets jsss used tag example shows two different methods select tags javascript style sheets supported netscape 4.x 4.0–4.8 later versions web browser ever integrated jsss
[ 1409, 11650, 259, 3462, 6791, 7943, 8070, 10507, 5907, 8854, 4378, 8605, 10910, 4768, 8994, 803, 10791, 3761, 11060, 438, 5311, 2880, 7871, 9152, 8262, 4171, 11087, 3921, 339, 84, 4822, 4056, 9560, 603, 8923, 4189, 479, 4064, 482, 5219, ...
None
7,456
2
List_of_Windows_10_Mobile_devices:list windows 10 mobile devices list devices coming natively microsoft windows 10 mobile operating system list also includes devices running two additional flavours windows 10 mobile devices windows 10 mobile enterprise windows 10 iot mobile enterprise devices come sd card support processors supported qualcomm snapdragon 210 212 410 617 800 801 808 810 820 well rockchip rk3288
[ 4356, 11524, 9863, 6797, 782, 1935, 4624, 10388, 10900, 11549, 7970, 11559, 1832, 6827, 430, 3890, 6709, 8757, 4289, 582, 9033, 10957, 4051, 11221, 11605, 9434, 11103, 4704, 10338, 2788, 617, 8681, 10986, 7796 ]
Validation
7,457
8
Boa_(web_server):boa web server boa discontinued since 2005 open-source small-footprint web server suitable embedded applications originally written paul phillips previously maintained larry doolittle jon nelson slashdot fotolog use boa serve images january 2006 boa following limitations
[ 1920, 4485, 7430, 9229, 7567, 7695, 1937, 11154, 7443, 8350, 3746, 8994, 2596, 3237, 9125, 11682, 7338, 9387, 44, 7983, 10800, 11439, 6714, 10622, 1991, 11134, 595, 1363, 4439, 3545, 225, 1250, 865, 2404, 4837, 6379, 5612, 9580, 2287, 113...
Validation
7,458
4
Forensic_corporate_collections:forensic corporate collections forensic corporate collections refer type debt collection recovery tactics apply computer forensics scientific knowledge debt collection process engaging consistently updated computer software debt collection process forensic corporate collection agencies able identify retrieve protect electronic evidence fraud illegal means avoiding debt found computers use evidence case litigation order forensic collections agency used means recovering debt agency must compliant knowledgeable investigation basics federal state local policies standards laws legal processes must also working knowledge types crimes incidents debt deception fraud computing environment types evidence well investigative tools technical training use forensic recovery equipment order effectively recover locate debtors get pay owe client forensic collections agents become adept conversant evidence collection management managing incident scene investigation computer systems disks file structures extracting preserving computer electronic evidence e-mail internet investigations cell phone pda investigations digital footprints debtors invariably leave behind
[ 9319 ]
Test
7,459
2
TagSpaces:tagspaces tagspaces open-source data manager file navigator helps organize files local drives adding tags files users get user interface manage files different platforms tagspaces compatible windows linux mac android iphone firefox chrome application requires neither internet connection user registration run desktop portable devices tagspaces open source application file navigation data management helps users organize files photos documents local drives file management data associations occur labeling files tags tags may vary color may also differ purpose users create name edit sort group rename delete tags following logic file-tagging process tagspaces compatible currently widespread platforms users access information different devices single user interface responsive design adapts window size proportions device use tagspaces require internet connection access cloud services order run pc portable devices users sync files devices using platforms like google drive dropbox tagspaces requires registration remotely similar file tagging note taking services see similar products basis functionality differs mainly lack database general offline no-cloud vendor lock-in orientation tags added names tagged files example tagging file called “ img-9936.jpg ” tags “ lion ” “ zoo ” renamed “ img-9936 lion zoo .jpg ” tagspaces allows users create edit text markdown rich text html files directly within application firefox chrome versions save currently open webpage local mhtml file containing text pictures formatting enables users view webpage offline classify tags add local file structure supported file types viewing editing tagspaces listed application official documentation page along corresponding platforms alexandre borque reviews tagspaces medium.com independent user ’ cloud local file navigator data manager speculates alternative digital note organizers evernote onenote reviews users also found twitter hashtag tagspaces github repository company official webpage technical writer tatiana kochedykova describes tagspaces valuable instrument educational purposes claims “ tagspaces teachers create organize numerous notes webpages e-books tag group sort prioritize files quickly find necessary one ” tagspaces claims alternative open source world functional similarities note taking file managing data organizing services evernote onenote simplenote pocket picasa
[ 9732, 6797, 9455, 5489, 5078, 823 ]
None
7,460
2
UNIX_System_III:unix system iii unix system iii system 3 discontinued version unix operating system released unix support group usg announced system iii late 1981 first released outside bell labs 1982 unix system iii mix various unixes version 7 unix pwb/unix 2.0 cb unix 3.0 unix/rt unix/32v system iii supported dec pdp-11 vax computers system apparently called system iii considered outside release unix/ts 3.0.1 cb unix 3 internally supported bell labs unices manual refers unix release 3.0 unix versions called system system ii official release unix/ts 4.0 would system iv either system iii succeeded system v based unix/ts 5.0 system iii introduced new features named pipes uname system call command run queue also combined various improvements version 7 unix outside organizations however include notable additions made bsd c shell csh screen editing third-party variants system iii include early versions hp-ux irix is/3 pc/ix pc-ux pnx sinix venix xenix
[ 640, 7552, 2179, 6787, 6412, 4114, 5397, 1304, 3487, 3488, 8991, 7848, 3241, 7983, 3248, 2995, 9141, 823, 9784, 1595, 9151, 9027, 10436, 5831, 2132, 11604, 6369, 9444, 8553, 9452, 7666, 2035, 5492, 2424, 633 ]
Test
7,461
7
Database-centric_architecture:database-centric architecture database-centric architecture data-centric architecture several distinct meanings generally relating software architectures databases play crucial role often description meant contrast design alternative approach example characterization architecture database-centric may mean combination following
[ 1280, 2432, 2688, 7175, 9481, 10505, 10258, 10518, 4376, 2456, 5658, 5403, 9112, 7968, 290, 1314, 5029, 8742, 5550, 7983, 5808, 1841, 10418, 1591, 3768, 9527, 3004, 9661, 9663, 4416, 2369, 5441, 11457, 5956, 8518, 72, 853, 2901, 9942, 917...
Test
7,462
9
Translator_(computing):translator computing translator programming language processor generic term could refer compiler assembler interpreter anything converts code one language another include translations high-level human-readable computer languages c++ java intermediate-level languages java bytecode low-level languages assembly language machine code similar levels language different computing platforms well term also used translators software implementations hardware/asic microchip implementations program software descriptions microchip logic gates needed build examples widely used types computer languages translators include interpreters compilers decompilers assemblers disassemblers
[ 1409, 7173, 2440, 1552, 4112, 10013, 1952, 8609, 5154, 5677, 814, 2620, 8773, 6470, 6477, 10703, 3413, 8280, 9432, 477, 3553, 6242, 7780, 8037, 10470, 11625, 5355, 5872, 9714, 9331, 2808, 7164, 7421 ]
Test
7,463
3
Tickless_kernel:tickless kernel tickless kernel operating system kernel timer interrupts occur regular intervals delivered required linux kernel s390 2.6.6 i386 release 2.6.21 configured turn timer tick tickless dynamic tick idle cpus using codice_1 3.10 codice_2 extended non-idle processors codice_3 xnu kernel mac os x 10.4 nt kernel windows 8 also tickless solaris 8 kernel introduced cyclic subsystem allows arbitrary resolution timers tickless operation freebsd 9 introduced dynamic tick mode aka tickless
[ 5363, 3294, 7983 ]
Test
7,464
4
Anomaly_Detection_at_Multiple_Scales:anomaly detection multiple scales anomaly detection multiple scales adams 35 million darpa project designed identify patterns anomalies large data sets darpa information innovation office began 2011 project intended detect prevent insider threats soldier good mental health becoming homicidal suicidal innocent insider becoming malicious government employee nowiki /nowiki nowiki /nowiki abuses access privileges share classified information specific cases mentioned nidal malik hasan wikileaks source chelsea manning commercial applications may include finance intended recipients system output operators counterintelligence agencies proactive discovery insider threats using graph analysis learning part adams project georgia tech team includes noted high-performance computing researcher david a. bader
[ 612, 11473, 5589, 7322, 7741 ]
Test
7,465
4
Astalavista.box.sk:astalavista.box.sk astalavista.box.sk founded 1994 one first search engines computer security information practice turned used search engine security exploits software hacking cracking different keygenerators software cracks site also known referencing things spyware viruses website known possibly contain data links downloadable files information users would consider spyware adware unwanted programs astalavista.box.sk hosted slovakia astalavista pun spanish phrase said terminator hasta la vista baby meaning see later baby 90 web search engine altavista note altavista 1995 astalavista 1994 astalavista also used refer computer security related websites like astalavista security group
[ 6916, 877, 10392, 7739, 4956, 2558 ]
Test
7,466
9
CS-4_(programming_language):cs-4 programming language cs-4 programming language operating system interface developed early 1970s intermetrics cambridge massachusetts first published manual released december 1973 entitled cs-4 language reference manual operating system interface document three parts cs-4 base language capabilities cs-4 operating system interface overview full cs-4 capabilities little known cs-4 language developed united states navy 1970s ongoing research project continuing study extensibility abstraction techniques develop requirement language simple compact language first documented 1973 miller et al. revised 1975 allow data abstractions powerful extension facilities
[ 8262 ]
Test
7,467
4
Open_Vulnerability_and_Assessment_Language:open vulnerability assessment language open vulnerability assessment language oval international information security community standard promote open publicly available security content standardize transfer information across entire spectrum security tools services oval includes language used encode system details assortment content repositories held throughout community language standardizes three main steps assessment process repositories collections publicly available open content utilize language oval community developed three schemas written extensible markup language xml serve framework vocabulary oval language schemas correspond three steps assessment process oval system characteristics schema representing system information oval definition schema expressing specific machine state oval results schema reporting results assessment content written oval language located one many repositories found within community one repository known oval repository hosted mitre corporation central meeting place oval community discuss analyze store disseminate oval definitions definition oval repository determines whether specified software vulnerability configuration issue program patch present system information security community contributes development oval participating creation oval language oval developers forum writing definitions oval repository oval community forum oval board consisting representatives broad spectrum industry academia government organizations around world oversees approves oval language monitors posting definitions hosted oval web site means oval funded us-cert u.s. department homeland security benefit community reflects insights combined expertise broadest possible collection security system administration professionals worldwide oval used security content automation protocol scap oval language standardizes three main steps assessment process representing configuration information systems testing analyzing system presence specified machine state vulnerability configuration patch state etc reporting results assessment oval interpreter freely available reference implementation created show data collected computer testing based set oval definitions evaluated determine results definition oval interpreter demonstrates usability oval definitions used definition writers ensure correct syntax adherence oval language development draft definitions fully functional scanning tool simplistic user interface running oval interpreter provide list result values evaluated definition oval repository central meeting place oval community discuss analyze store disseminate oval definitions repositories community also host oval content include oval system characteristics files oval results files well definitions oval repository contains community-developed oval vulnerability compliance inventory patch definitions supported operating systems definitions free use implement information security products services oval repository top contributor award program grants awards quarterly basis top contributors oval repository repository community effort contributions new content modifications instrumental success awards serve public recognition organization ’ support oval repository incentive others contribute organizations receiving award also receive oval repository top contributor logo indicating quarter award e.g. 1st quarter 2007 may used see fit awards granted organizations made significant contribution new modified content quarter oval board advisory body provides valuable input oval moderator currently mitre important organizational support oval individuals sit oval board input activity truly make difference board ’ primary responsibilities work moderator community define oval provide input oval ’ strategic direction advocate oval community
[ 3086, 4081, 2709, 635, 479 ]
Validation
7,468
9
Divergence_(computer_science):divergence computer science computer science computation said diverge terminate terminates unobservable exceptional state otherwise said converge domains computations expected infinite process calculi computation said diverge fails productive always produces action within finite amount time various subfields computer science use varying mathematically precise definitions means computation converge diverge abstract rewriting abstract rewriting system called convergent confluent terminating notation ↓ n means reduces normal form n zero reductions ↓ means reduces normal form zero reductions ↑ means reduce normal form latter impossible terminating rewriting system lambda calculus expression divergent normal form denotational semantics object function f → b modelled mathematical function formula_1 ⊥ bottom indicates object function argument diverges calculus communicating sequential processes divergence drastic situation process performs endless series hidden actions example consider following process defined csp notation traces process defined consider following process conceals tick event clock process definition p called divergent process
[ 1936, 7468 ]
Test
7,469
8
Cadec-online.com:cadec-online.com cadec-online.com multilingual web application performs analysis composite materials used primarily teaching especially within disciplines aerospace engineering materials science naval engineering mechanical engineering civil engineering users navigate application tree view structures component chapters cadec-online engineering cloud application uses latex library render equations symbols sprites optimize delivery images page cadec-online.com implements micromechanics composites reinforced unidirectional fibers random fibers well plain weave twill satin textiles predicts lamina elastic moduli strength values coefficient thermal expansion cte moisture expansion micromechanical properties application conducts analysis several theoretical models including cadec-online.com calculate three-dimensional 3d stiffness compliance matrices two-dimensional 2d reduced stiffness compliance matrices lamina coordinate system cs also capable transforming composite laminates matrices coordinate system lamina types supported software include application carry laminate analyses including calculation laminate stiffness stress strain failure software supports intact damaged laminates see damage mechanics category cadec-online.com calculate laminate thermal stresses laminate coefficient thermal expansion laminate stiffness compliance matrices composite laminates also application predict laminate moduli orthotropic material equivalents stiffness laminate bending membrane modes deformation cadec-online.com predicts failures first ply failure fpf last ply failure lpf mechanical thermal moisture loads well situ effects using several failure criteria fc including uses discrete damage mechanics ddm predict crack density vs. strain symmetric laminate subjected membrane state strain results exported excel plotting state variable describing damage state material crack density ply thermodynamic force midsurface strain applied laminate relevant material properties fracture toughnesses modes opening ii shear ply application predict stiffness strength composite materials reinforced plain weave twill satin textile also called fabric textile lamina idealized transversely isotropic material calculated textile lamina used lamina rest application calculated properties include application able analyze laminated composite thin walled beams general cross sections beams asymmetric loaded general combinations forces three planes axial vertical horizontal well three moments torque two bending moments cadec-online.com computes section properties shear center cadec-online.com defines four different types loads cadec-online.com features api allows users access virtually capabilities present web version software software environments abaqus ansys matlab python .net framework mathematica etc
[ 3960, 4194, 3573, 8554 ]
None
7,470
2
Desktop_wars:desktop wars desktop wars may refer
[ 576, 6352, 8092, 823 ]
None
7,471
3
MMIX:mmix mmix pronounced em-mix 64-bit reduced instruction set computing risc architecture designed donald knuth significant contributions john l. hennessy contributed design mips architecture richard l. sites architect alpha architecture knuth said mmix computer intended illustrate machine-level aspects programming books art computer programming replaces mix 1960s-style machine formerly played role… strove design mmix machine language would simple elegant easy learn time careful include complexities needed achieve high performance practice mmix could principle built even perhaps competitive fastest general-purpose computers marketplace mmix big-endian 64-bit reduced instruction set computer risc 256 64-bit general-purpose registers 32 64-bit special-purpose registers fixed-length 32-bit instructions 64-bit virtual address space mmix instruction set comprises 256 opcodes one reserved future expansion mmix uses ieee 754 floating-point numbers instructions associated mnemonic example instruction 20 32 associated add instructions symbolic form op x z op specifies sort instruction x specifies register used store result instruction rest specify operands instruction fields eight bits wide example add 0 1,3 means set 0 sum 1 3 instructions take either immediate values register contents thus single instruction mnemonic may correspond one two opcodes mmix programs typically constructed using mmixal assembly language simple mmixal program prints string hello world 256 directly addressable general-purpose architectural registers mmix chip designated 0 255 32 special-purpose architectural registers special-purpose registers accessed get put instructions two special registers rl rg determine general registers local global registers 0 ... local registers represent window internal stack registers registers rl ... marginal registers always return 0 used source operation using marginal register destination operation cause machine automatically increase rl include register registers rg ... 255 called global registers part register stack local register stack provides subroutine rl local registers designated 0 whenever subroutine called number local registers pushed stack shifting start window arguments called subroutine left remaining local registers subroutine finishes pops previously pushed registers internal stack contain finite number registers may necessary store part stack memory implemented special registers ro rs record part local register stack memory part still local physical registers register stack provides fast subroutine linkage 32 special physical architectural registers follows like programs running almost cpus mmix programs interrupted several ways external hardware timers common source preemption computing interrupts many instructions cause interrupts certain exceptional cases memory protection page fault exceptions used implement virtual memory floating point exception handling mmix 2 kinds interrupts trips traps main difference trips traps traps send control trap handler program operating system trapping trips send control trip handler program user application tripping users also force interrupt handler run explicit software interrupt instructions trip trap similar kinds trap computer systems particular system call user program operating system uses trap instruction known hardware implementations mmix instruction set architecture exist however fpgammix project implements mmix verilog making possible implement using field-programmable gate array mmix instruction set architecture supported number software tools computer architecture research software development gnu compiler collection includes mmix back-end c/c++ compilers contributed hans-peter nilsson part main gcc distribution since late 2001. mmix back-end gcc continues actively developed maintained volunteers tools could theoretically used compile build bootstrap entire freebsd linux similar operating system kernel onto mmix hardware hardware exist
[ 898, 8450, 1798, 3615, 10786, 10796, 3886, 9391, 823, 9911, 7234, 3142, 6087, 5065, 9932, 4561, 5457, 3197, 7770, 219, 2653, 477, 8551, 2798, 11125, 2045 ]
Validation
7,472
4
GadgetTrak:gadgettrak gadgettrak company based portland oregon develops theft recovery data protection software name company founded february 2007 ken westin launch first theft recovery product usb mass storage devices tracked stolen devices including ipods flash drives digital cameras devices connected computer company issued patent technology february 24 2009 gadgettrak technology featured special segment dateline ipod theft tracked stolen ipods confronted thieves customized version technology embedded flir thermal imaging cameras part exclusive licensing agreement name thermatrak utilized theft recovery well export controls company issued two patents groundbreaking technologies patent 9,083,624 applies process tracking lost stolen computing devices use wi-fi and/or gps and/or cellular triangulation patent 7,496,201 applies process tracking recovering devices ipods flash drives digital cameras windows blackberry october 2008 company launched gadgettrak mobile security app blackberry windows mobile devices apple iphones november 4 2008 company launched first mobile security software app apple iphone year half apple launched find iphone android devices ces 2012 company launched version gadgettrak mobile security android devices along android release upgrades added including web based control panel activate tracking remotely wipe data device encrypt backup data well enterprise group management console launch application put test chain sprint stores installed software demo units one store tigard oregon several devices stolen help gadgettrak mobile security app able recover devices apprehend thieves mac laptops november 12 2008 company launched mac laptop version software utilizes web camera capture photo thief well utilization wi-fi positioning provide location within 10–20 meters shortly product launch number stolen laptop recoveries using software first brooklyn new york stolen imac tracked tattoo parlor police recovered stolen computer along stolen property windows laptops april 2009 company launched windows version laptop software expanding product offering gadgettrak claims many firsts regards devices recovered methods used
[ 10470, 5677, 6797, 7983, 823 ]
Test
7,473
4
MSAV:msav microsoft anti-virus msav antivirus program introduced microsoft ms-dos operating system program first appeared ms-dos version 6.0 last appeared ms-dos 6.22 first version antivirus program basic inbuilt update facility updates obtained bbs manually installed user could scan 1,234 different viruses microsoft anti-virus windows mwav included part package front end allowed msav run properly windows 3.1x microsoft anti-virus supplied central point software inc. later acquired symantec 1994 integrated symantec norton antivirus product stripped version central point anti-virus cpav product central point software inc. licensed carmel software engineering haifa israel carmel software sold product turbo anti-virus domestically abroad microsoft anti-virus windows also provided central point software msav featured detect clean strategy detection boot sector trojan horse-type viruses typical virus problems time program also anti-stealth check sum feature could used detect changes normal files technology intended make unavailability regular update packages final update msav released june 1996 symantec update added ability detect polymorphic viruses virus definitions updated scan total 2,371 viruses vsafe terminate stay resident component msav provided real-time virus protection default vsafe following features enabled vsafe vsafe number virus definitions embedded within executable capable loading additional signatures updates external definition file
[ 5380, 2309, 1417, 2443, 537, 3482, 2213, 5799, 5673, 3885, 7983, 5057, 10828, 9166, 5082, 9695, 3935, 9569, 4464, 11248, 6643 ]
Test
7,474
4
National_Infrastructure_Security_Co-ordination_Centre:national infrastructure security co-ordination centre national infrastructure security co-ordination centre niscc inter-departmental centre uk government set 1999 role niscc pronounced nicey minimise risk critical national infrastructure cni electronic attack niscc provided advice information computer network defence information assurance issues 1 february 2007 niscc merged national security advice centre nsac form centre protection national infrastructure cpni cpni provides integrated combining information personnel physical security advice businesses organisations make national infrastructure delivery advice protect uk national security helping reduce vulnerability national infrastructure terrorism threats
[ 9281, 4081 ]
None
7,475
8
DataNucleus:datanucleus datanucleus formerly known java persistent objects jpox open source project apache 2 license provides software products around data management java datanucleus project started 2008 jpox project started 2003 relaunched datanucleus 2008 broader scope datanucleus access platform fully compliant implementation java data objects jdo 1.0 2.0 2.1 2.2 3.0 3.1 3.2 specifications jsr 0012 jsr 0243 java persistence api jpa 1.0 2.0 2.1 2.2 specifications jsr 0220 jsr 0317 jsr 0338 providing transparent persistence java objects supports persistence widest range datastores java persistence software supporting main object-relational mapping orm patterns allows querying using either jdoql jpql sql comes byte-code enhancer allows persistence relational datastores rdbms object-based datastores db4o neodatis odb document-based storage xml excel opendocument spreadsheets web-based storage json google storage amazon simple storage service map-based datastores hbase google bigtable apache cassandra graph-based datastores neo4j document stores mongodb well types datastores e.g ldap plugins osgi-compliant used equally osgi environment datanucleus access platform also utilised persistence layer behind google app engine java vmforce cloud offering salesforce.com vmware
[ 5987, 1222, 3080, 7742, 7816, 10090, 6860, 5677, 10413, 10193, 3763, 5047, 9467, 7485, 3710, 479 ]
Test
7,476
4
KidGuard:kidguard kidguard parental monitoring application ios android mobile phones application uses proprietary software help parents monitor children ’ text messages browser history social media activity stored videos photos emails phone gps location kidguard developed los angeles-based team officially released 2016 kidguard launch application received coverage abc news inc. magazine 2017 kidguard partnered startup incubator onramp lab located taipei taiwan year international security consultant gene yu joined kidguard advisory board aid kidnapping response prevention measures following software service model kidguard run web application allows parent view activity child phone including kidguard also includes feature calls situation 360 report application automatically creates report aid law enforcement event child disappearance report includes full profile child recent locations behavior message history critics raised concerns potential capability kidguard competitors violate privacy laws used tool stalkers abusers may 2018 kidguard featured new york times article criticized application developers running advertisements aimed adults attempting spy spouses discover infidelity kidguard contacted comment spokesman responded advertisements developed marketing partner content relating infidelity subsequently removed kidguard website kidguard maintains annual kidguard education essay scholarship high school students united states scholarship awarded undisclosed number participants based results essay content whose topics concern online safety cyberbullying 2017 kidguard donated 25,000 grants 18 non-profit organizations focused child safety online threat prevention largest grant 5,000 awarded megan meier foundation
[ 467, 7983 ]
Train
7,477
2
CP-67:cp-67 cp-67 control program portion cp/cms virtual machine operating system developed ibm system/360-67 ibm cambridge scientific center reimplementation earlier research system cp-40 ran one-off customized s/360-40 cp-67 later reimplemented cp-370 ibm released vm/370 1972 virtual memory added system/370 series details development circumstances cp-67 found article history cp/cms
[ 6675, 7187, 10776, 25, 4637, 9762, 5158, 7217, 10803, 7733, 9784, 10809, 573, 576, 10333, 97, 9829, 6248, 8298, 6772, 7285, 9335, 2168, 1147, 2172, 3197, 1150, 2179, 10883, 6797, 9361, 9366, 6296, 9370, 7325, 9887, 8879, 3248, 6837, 1219,...
None
7,478
5
Generic_Framing_Procedure:generic framing procedure generic framing procedure gfp multiplexing technique defined itu-t g.7041 allows mapping variable length higher-layer client signals circuit switched transport network like otn sdh/sonet pdh client signals protocol data unit pdu oriented like ip/ppp ethernet media access control block-code oriented like fibre channel two modes gfp generic framing procedure framed gfp-f generic framing procedure transparent gfp-t gfp utilizes length/hec-based frame delineation mechanism robust used high-level data link control hdlc single octet flag based two types gfp frames gfp client frame gfp control frame gfp client frame classified either client data frame client management frame former used transport client data latter used transport point-to-point management information like loss signal etc client management frames differentiated client data frames based payload type indicator gfp control frame currently consists core header field payload area frame used compensate gaps client signal transport medium higher capacity client signal better known idle frame gfp frame consists
[ 9860, 3847, 1297, 8989, 2206, 2994, 7865, 10558, 4543, 11332, 5472, 1893, 4202, 2668, 7407, 8432, 5875, 5118, 2431 ]
None
7,479
9
Comparison_of_Pascal_and_C:comparison pascal c computer programming languages c pascal similar times origin influences purposes used design compile compilers early lifetimes original pascal definition appeared 1969 first compiler 1970 first version c appeared 1972 descendants algol language series algol introduced programming language support structured programming programs constructed single entry single exit constructs case pascal stems directly algol w shared new ideas algol 68 c language indirectly related algol originally b bcpl cpl later algol 68 example case codice_1 codice_2 also pascal example case enumerations codice_3 codice_4 booleans pascal dialects also incorporated traits c. documented pascal niklaus wirth standardized iso 7185 1982 c documented language brian kernighan dennis ritchie standardized 1989 reason versions represent mature version language also comparatively close time ansi c c99 later c standards features features later implementations pascal turbo pascal free pascal included comparison despite improvements robustness functionality conferred syntactically pascal much algol-like c. english keywords retained c uses punctuation symbols – pascal codice_5 codice_6 codice_7 c uses codice_8 codice_9 codice_10 example however c actually algol-like pascal regarding simple declarations retaining type-name variable-name syntax example c accept declarations start block outer block function another subtle difference role semicolon pascal semicolons separate individual statements within compound statement whereas terminate statement c. also syntactically part statement c transforming expression statement difference manifests primarily two situations superfluous semicolon put last line end thereby formally inserting empty statement traditional c codice_14 supported certain pascal dialects like midletpascal traditional pascal codice_15 codice_16 modern pascal like object pascal delphi fpc well modern c implementations allow c++ style comments codice_17 c pascal differ interpretation upper lower case c case sensitive pascal thus codice_18 codice_19 distinct names c identical pascal languages identifiers consist letters digits rule first character may digit c underscore counts letter even _abc valid name names leading underscore often used differentiate special system identifiers c. c pascal use keywords words reserved use language examples const goto keywords happen common languages c basic built-in type names also keywords e.g int char combinations keywords e.g unsigned char pascal built-in type names predefined normal identifiers pascal procedure definitions start keywords procedure function type definitions type c function definitions determined syntactical context type definitions use keyword codice_4 languages use mix keywords punctuation definitions complex types instance arrays defined keyword array pascal punctuation c enumerations defined keyword codice_21 c punctuation pascal pascal functions begin end delimit block statements proper c functions use delimit block statements optionally preceded declarations c c99 strictly defines declarations must occur statements within particular block allows blocks appear within blocks way go around pascal strict declarations must occur statements allows definitions types functions variable declarations encapsulated function definitions level depth grammars languages similar size implementation perspective main difference two languages parse c necessary access symbol table types pascal one construct assignment instance c fragment codice_22 could declaration codice_23 object whose type pointer codice_24 statement-expression multiplies codice_24 codice_23 contrast corresponding pascal fragment codice_27 inherently unambiguous correct parsing require symbol table pascal requires variable function declarations specify type explicitly traditional c type name may omitted contexts default type codice_28 corresponds codice_29 pascal implicitly assumed however defaults considered bad practice c often flagged warnings c accommodates different sizes signed unsigned modes integers using modifiers codice_30 codice_31 codice_32 codice_33 etc exact meaning resulting integer type machine-dependent however guaranteed codice_34 least 16 bits codice_35 shorter codice_28 codice_37 longer codice_28 pascal similar end performed declaring subrange integer compiler may choose allocate smaller amount storage declared variable type 1..100 subrange feature supported c. major subtle difference c pascal promote integer operations pascal result operation defined integer/subrange types even intermediate results fit integer result undefined fit integer/subrange left hand side assignment may imply artificial restriction range integer types may require slow execution handle intermediate results however compiler may take advantage restricted subranges produce efficient code c operands must first promoted size required result intermediate results undefined fit range promoted operands range required result greater range operands normally produces slow inefficient code even good optimising compiler however c compiler never required expected handle range intermediate results programmers responsibility ensure intermediate results fit operand range pre-standard implementation c well small-c et al allowed integer pointer types relatively freely intermixed c character type codice_39 kind integer longer codice_37 expressions codice_41 therefore perfectly legal declarations codice_42 codice_43 integer nature codice_39 one byte clearly illustrated declarations unsigned char uc 255 /* common limit */ signed char sc -128 /* common negative limit */ whether codice_39 type regarded codice_32 codice_33 default implementation pascal characters integers distinct types inbuilt compiler functions codice_48 codice_49 used typecast single characters corresponding integer value character set use vice versa e.g systems using ascii character set codice_50 codice_51 tab character pascal boolean enumerated type possible values boolean false true conversion integer ord used ord b standard function integer boolean however conversion simple practice b 0 c binary valued relational operators == may regarded boolean sense always give results either zero one tests || etc performed zero-checks false represented zero true represented value c allows using bitwise operators perform boolean operations care must taken semantics different operands make use one bit represent value pascal another abstract high level method dealing bitwise data sets sets allow programmer set clear intersect unite bitwise data values rather using direct bitwise operators available modern pascal well example pascal status status stickyflag status status stickyflag stickyflag status ... pascal status status stickyflag status status stickyflag stickyflag status stickyflag ... c status |= stickyflag status ~stickyflag status stickyflag ... although bit operations integers operations sets considered similar sets implemented using bits direct parallel uses unless non-standard conversion integers sets possible expression evaluation languages boolean value may internally stored single bit single byte full machine word position generated code condition code status register depending machine compiler situation factors usually important language compiled c less strict model floating point types pascal c integers may implicitly converted floating point numbers vice versa though possible precision loss may flagged warnings pascal integers may implicitly converted codice_52 conversion codice_52 codice_29 information may lost must done explicitly via functions codice_55 codice_56 truncate round fraction respectively c pascal include enumeration types pascal example type var c example enum color red green blue enum color behavior types two languages however different c codice_57 becomes synonym 0 codice_58 1 codice_59 2 nothing prevents value outside range assigned variable codice_60 furthermore operations like codice_61 strictly forbidden pascal instead would use codice_62 c enums freely converted ints pascal function ord must used convert enumerated types integers function convert integer enumerated types c pascal allow arrays complex types including arrays however similarity languages ends c arrays simply defined base type number elements int size always indexed 0 size-1 i.e modulo size pascal range indices often specified subrange introduced simple types ten elements var array 0..9 integer would indexed 0..9 c case array indices ordinal data type however ranges type var picture array 1..640 1..480 rgb var palette array byte 0..2 byte strings consisting n 1 characters defined packed arrays range 1..n. c expressions identifier representing array treated constant pointer first element array thus given declarations codice_63 codice_64 assignment codice_65 valid causes p point array identifier codice_60 represents constant address codice_67 valid however arrays c fixed pointers interchangeable flexibility allows c manipulate length array using code also leaves programmer responsibility write outside allocated array checks built language pascal arrays distinct type pointers makes bounds checking arrays possible compiler perspective practically pascal compilers support range checking compile option ability arrays change length runtime able check language control often termed dynamic arrays pascal number elements array type determined compile-time changed execution program hence possible define array whose length depends way program data c ability initialize arrays arbitrary length codice_68 operator used obtain size statically initialized array c code instance following code terminating index loop automatically adjusts list strings changed static char *wordlist static int listsize sizeof wordlist /sizeof wordlist 0 int i=0 listsize i++ i=listsize-1 =0 -- pascal neither array initialization outside case strings means determining arbitrary array sizes compile time one way implementing example pascal without automatic size adjustment const type var procedure createlist var w wordlist begin end begin end languages string primitive array characters pascal string literal length n compatible type codice_69 c string generally type codice_70 pascal support variable-length arrays set routines perform string operations dependent particular string size standardized pascal conformant array parameter extension solves great extent many even implementations pascal support strings native language c string literals null-terminated say trailing null character end-of-string sentinel const char *p p rain spain /* null-terminated */ null-termination must manually maintained string variables stored arrays often partly handled library routines c built-in string array assignment string actually transferred p rather p made point constant string memory pascal unlike c string first character element index 1 0 leading length-prefixed pascal stores length string 0th element character array difference well understood lead errors porting trying interface object code generated languages freebsd developer poul-henning kamp writing acm queue would later refer victory null-terminated strings length-prefixed strings expensive one-byte mistake ever c pascal declare record types c termed structures struct type record end pascal use sentence name_of_record order use directly fields record like local variables instead write name_of_record name_of_field example type var r1 r begin r1 begin end equivalent feature c. c exact bit length field specified struct much storage actually used depends traits e.g word-alignment target system feature available pascal using subrange construct 3 bits gives range 0 7 association keyword packed type packed record end c pascal support records include different fields overlapping union type record end language processors free allocate much space records needed contain largest type union/record biggest difference c pascal pascal supports explicit use tagfield language processor determine valid component variant record accessed type record end case tagfield q must set right state access proper parts record c pointers made point program entities including objects functions int int *b int *compare int c int int mycompare int c int b compare mycompare c since arrays pointers close equivalence following b 5 b+5 5+b 5 b thus pointers often used c another method access arrays create dynamic data library functions codice_71 codice_72 used obtain release dynamic blocks data thus dynamic memory allocation built language processor especially valuable c used operating system kernels embedded targets things platform architecture specific would require changing c compiler platform operating system would used pascal n't kind pointers c indirection operator covers common use c pointers pointer bound single dynamic data item moved assignment type ^integer var b c new b c b pointers pascal type safe i.e pointer one data type assigned pointer data type also pointers never assigned non-pointer variables pointer arithmetic common source programming errors c especially combined endianness issues platform-independent type sizes permitted pascal restrictions reduce possibility pointer-related errors pascal compared c prevent invalid pointer references pascal altogether example runtime error occur pointer referenced initialized disposed languages differ significantly comes expression evaluation all-in-all comparable pascal c operators serve several purposes pascal instance minus sign may used negation subtraction set difference depending type syntactical context codice_92 operator may used compare numbers strings sets c uses dedicated operator symbols greater extent two languages use different operators assignment pascal like algol uses mathematical equality operator codice_93 equality test symbol codice_94 assignment whereas c like b uses mathematical equality operator assignment c b new codice_95 symbol therefore introduced equality test common mistake c due either inexperience simple typing error accidentally put assignment expressions conditional statements codice_96 code braces always execute assignment expression codice_97 value 10 non-zero therefore considered true c part c algol allow multiple assignment form codice_98 supported pascal also note codice_60 value codice_100 may affect following code recent c compilers try detect cases warn user asking less ambiguous syntax like codice_101 kind mistake happen pascal assignments expressions value using wrong operator cause unambiguous compilation error also less likely anyone would mistake codice_94 symbol equality test notable algol conditional expression form codice_103 equivalent c pascal niklaus wirth designed pascal desire limit number levels precedence fewer parse routines exclusive operators treated like addop processed level math expression similarly treated like mulop processed term precedence levels notice one set syntax rules applying kinds operators according grammar expressions like perfectly legal fact far parser concerned pascal n't allow mixing arithmetic boolean variables things like caught semantic level comes time generate code rather syntax level authors c took diametrically opposite approach treat operators different fact c fewer 15 levels c also operators '= '+= kin « » '++ -- etc although c arithmetic boolean operators treated separately variables boolean test made integer value pascal boolean expression relies particular evaluation ordering possibly via side-effects function calls less regarded error pascal compiler freedom use whatever ordering may prefer must always evaluate whole expression even result determined partial evaluation c dependence boolean evaluation order perfectly legal often systematically employed using codice_8 codice_9 operators together operators codice_106 codice_107 comma operator etc codice_8 codice_9 operators thereby function combinations logical operators conditional statements short circuit expression evaluation commonly considered advantage c evaluation problem var integer seemingly straightforward search problematic pascal array access would invalid equal 11 however superscalar processors penalty jumps cause pipeline stalls programs created efficient jumps removed possible pascal ability evaluate using fixed formula without jumps advantage highly optimizing compilers whereas c effectively prevented requiring short circuit optimization statements building control structures roughly analogous relatively similar least first three pascal c pascal original form equivalent default equivalent else clause common extension pascal programmers otherwise guard case-statements expression c so-called early-out statements break continue pascals well c pascal goto statement however since pascal nested procedures/functions jumps done inner procedure function containing one commonly used implement error recovery c ability via ansi c setjmp longjmp equivalent arguably less safe since stores program specific information like jump addresses stack frames programmer accessible structure pascal routines return value called functions routines n't return value called procedures routines c called functions c functions return value declared return type void pascal procedures considered equivalent c void functions pascal functions equivalent c functions return value following two declarations c int f int x int void k int q equivalent following declarations pascal function f x integer integer procedure k q integer pascal two different types parameters pass-by-value pass-by-reference var function f var k integer integer x f c parameters passed value pass-by-reference simulated using pointers following segment similar pascal segment int f int *k //function accepts pointer parameter x f c allows functions accept variable number parameters known variadic functions int f int ... f 1 2 3 4 5 function codice_110 uses special set functions allow access parameters turn additionally pascal i/o statements built language handle variable amount parameters like codice_111 pascal allows procedures functions nested convenient allow variables local group procedures global c feature localization variables functions could done compilation module wherein variables functions would declared static c allows functions indirectly invoked function pointer following example statement codice_112 equivalent codice_113 int *cmpar const char *a const char *b const char *s1 hello const char *s2 world cmpar strcmp b *cmpar s1 s2 pascal also allows functions procedures passed parameters functions procedures procedure showhex integer end procedure showint integer end procedure demo procedure show integer var j integer begin end early c neither constant declarations type declarations c language originally defined needing preprocessor separate program pass handled constant include macro definitions keep memory usage later ansi c obtained constant type definitions features preprocessor also became part language leading syntax see today pascal constant type defines built programmers using preprocessor also pascal sometimes one used c certainly common c. although often pointed lack pascal technically c n't program modularity macros built either simple low level separate compilation facility however traditionally using generic linker used assembly language pascal c programmer may inspect byte-level representation object pointing codice_39 pointer int char *p char char c *p // first byte may possible something similar pascal using undiscriminated variant record var integer begin end although casting possible pascal compilers interpreters even code a2c.a a2c.b n't required pascal standardizations share address space niklaus wirth designer pascal written problematic nature attempting type escapes using approach implementors pascal decided checking would expensive enlarging code deteriorating program efficiency consequence variant record became favourite feature breach type system programmers love tricks usually turn pitfalls calamities several languages specifically exclude type escapes example java c wirth oberon c files exist built-in type defined system header i/o takes place via library calls pascal file handling built language typical statements used perform i/o language printf sum d\n x writeln 'the sum x main difference c uses format string interpreted find arguments printf function convert whereas pascal performs control language processor pascal method arguably faster interpretation takes place c method highly extensible popular pascal implementations incorporated virtually c constructs pascal examples include type casts able obtain address variable local global different types integers special promotion properties however incorporation c lenient attitude towards types type conversions result pascal loses type security example java c created part address perceived type security issues c managed pointers used create invalid references original form described niklaus wirth pascal qualifies managed pointer language 30 years either java c however pascal amalgamated c would lose protection definition general lower dependence pointers basic tasks makes safer c practice extended pascal standard extends pascal support many things c supports original standard pascal type safer manner example schema types support besides uses variable-length arrays keeping type-safety mandatory carrying array dimension array allowing automatic run-time checks out-of-range indices also dynamically sized arrays
[ 512, 1145, 5896, 1931, 6414, 9871, 6160, 5521, 8082, 10510, 11411, 5399, 3736, 1435, 155, 6558, 5663, 10143, 5796, 428, 2605, 5165, 5677, 5806, 9008, 3765, 10043, 10684, 8510, 6338, 963, 1349, 8262, 5961, 1610, 1611, 8524, 4173, 8397, 980...
None
7,480
3
CAP_computer:cap computer cambridge cap computer first successful experimental computer demonstrated use security capabilities hardware software developed university cambridge computer laboratory 1970s unlike research machines time also useful service machine sign currently front machine reads cap project memory protection ran 1970 1977 based capabilities implemented hardware m. wilkes r. needham d. wheeler responsible implementation r. needham awarded bcs technical award 1978 cap capability protection project cap designed access memory segment hardware required current process held necessary capabilities 32-bit processor featured microprogramming control two 256-entry caches 32-entry write buffer capability unit 64 registers holding evaluated capabilities floating point operations available using single 72-bit accumulator instruction set featured 200 instructions including basic alu memory operations capability- process-control instructions instead programmer-visible registers used chicago plessey system 250 designs cap would load internal registers silently program defined capability memory divided segments 64k 32-bit words segment could contain data capabilities hardware accessed via associated minicomputer procedures constituting operating system written algol 68c although number closely associated protected procedures paginator written bcpl cap first became operational 1976 fully functional computer featured complete operating system file system compilers os used process tree structure initial process called master coordinator removed need separate modes operation process could directly access resources children practice two levels ever used cap operation
[ 256, 2179, 2951, 6675, 6813, 3999, 1952, 9762, 10146, 7983, 10813, 4034, 1349, 4423, 1611, 7884, 11596, 10835, 728, 5853, 5483, 10734, 3700, 2422, 10614, 5503 ]
None
7,481
2
Opaque_binary_blob:opaque binary blob opaque binary blob obb term used network engineering computer science refer sizeable piece data looks like binary garbage outside entities know blob denotes carries make sense entities access permission access functions also pejorative term compiled code without source code made available see binary blob least one network protocol advanced message queuing protocol uses terminology obb android operating systems starting version 2.3 code named gingerbread use obbs refer one blob multiple files maybe even file system whole file system one file obbs available storage manager interface android done means abstraction multiple applications running operating system easily access obb example map database map obb multiple applications running android 2.3 access maps eliminates need maintain different map data different applications similar functions features many hd games android platform use obb files allow storage large files device external sd card tuxedo middleware also uses obbs mention c c++ arrays typed data buffers probably input needed experts oldest reference obbs used computer system vendor distributes software object binary form without mention inner workings code called 'proprietary obb 'proprietary blob binary blob practice protect company intellectual property probably keep competitive edge see proprietary software also prevents hackers improving system subverting example nvidia tegra 'proprietary obb
[ 1952, 2635, 2045, 7983 ]
Test
7,482
4
HoneyMonkey:honeymonkey honeymonkey short strider honeymonkey exploit detection system microsoft research honeypot implementation uses network computers crawl world wide web searching websites use browser exploits install malware honeymonkey computer snapshot memory executables registry honeypot computer recorded crawling site visiting site state memory executables registry recorded compared previous snapshot changes analyzed determine visited site installed malware onto client honeypot computer honeymonkey based honeypot concept difference actively seeks websites try exploit term coined microsoft research 2005 honeymonkeys possible find open security holes yet publicly known exploited attackers single honeymonkey automated program tries mimic action user surfing net series honeymonkeys run virtual machines running windows xp various levels patching — fully patched fully vulnerable others two extremes honeymonkey program records every read write file system registry thus keeping log data collected web-site software installed program leaves site log analyzed determine malware loaded cases log actions sent manual analysis external controller program logs exploit data restarts virtual machine allow crawl sites starting known uninfected state 10 billion plus web pages many legitimate sites use exploit browser vulnerabilities start crawling sites would waste resources initial list therefore manually created listed sites known use browser vulnerabilities compromise visiting systems malware honeymonkey system follows links exploit sites higher probability leading exploit sites honeymonkey system also records many links point exploit site thereby giving statistical indication easily exploit site reached honeymonkey uses black box system detect exploits i.e. use signature browser exploits detect exploits monkey program single instance honeymonkey project launches internet explorer visit site also records registry file read write operations monkey allow pop-ups allow installation software read write happens internet explorer temporary folder therefore must used browser exploits analyzed malware detection programs manually analyzed monkey program restarts virtual machine crawl another site fresh state
[ 4503, 5920, 5956, 9256, 7983, 113, 3922, 2358, 119, 6938, 7515, 2140 ]
Validation
7,483
3
Monolithic_kernel:monolithic kernel monolithic kernel operating system architecture entire operating system working kernel space monolithic model differs operating system architectures microkernel architecture alone defines high-level virtual interface computer hardware set primitives system calls implement operating system services process management concurrency memory management device drivers added kernel modules modular operating systems os-9 modern monolithic operating systems openvms linux bsd sunos aix multics dynamically load unload executable modules runtime modularity operating system binary image level architecture level modular monolithic operating systems confused architectural level modularity inherent server-client operating systems derivatives sometimes marketed hybrid kernel use microkernels servers mistaken modules daemons practically speaking dynamically loading modules simply flexible way handling operating system image runtime—as opposed rebooting different operating system image modules allow easy extension operating systems capabilities required dynamically loadable modules incur small overhead compared building module operating system image however cases loading modules dynamically as-needed helps keep amount code running kernel space minimum example minimize operating system footprint embedded devices limited hardware resources namely unloaded module need stored scarce random access memory
[ 6148, 6155, 6158, 2064, 4113, 8209, 25, 10273, 6180, 4151, 8248, 4153, 59, 69, 6221, 89, 10333, 4192, 97, 8298, 2168, 2178, 2179, 10382, 6296, 2201, 10394, 6301, 178, 4279, 6329, 6333, 8388, 10436, 2248, 4308, 6361, 8410, 6377, 242, 639...
Test
7,484
2
NTLMSSP:ntlmssp ntlmssp nt lan manager ntlm security support provider binary messaging protocol used microsoft security support provider interface sspi facilitate ntlm challenge-response authentication negotiate integrity confidentiality options ntlmssp used wherever sspi authentication used including server message block cifs extended security authentication http negotiate authentication e.g iis iwa turned msrpc services ntlmssp ntlm challenge-response protocol documented microsoft open protocol specification
[ 2083, 5225, 4435, 4439, 9114 ]
Test
7,485
1
Apache_OpenJPA:apache openjpa openjpa open source implementation java persistence api specification object-relational mapping orm solution java language simplifies storing objects databases open-source software distributed apache license 2.0 kodo java data objects implementation originally developed solarmetric inc 2001 bea systems acquired solarmetric 2005 kodo expanded implementation jdo jsr 12 jpa jsr 220 specifications 2006 bea donated large part kodo source code apache software foundation name openjpa donated source code core persistence engine bea weblogic server ibm websphere geronimo application server may 2007 openjpa graduated incubator top-level project also passed sun technology compatibility kit compliant java persistence api
[ 3080, 6161, 1047, 8217, 11303, 5677, 9789, 7742, 7233, 7750, 7261, 8799, 2658, 8294, 8810, 2163, 6774, 3705, 8825, 3710, 10377, 8860, 6338, 1222, 4294, 6860, 8408, 8425, 747, 5872, 9467, 4358, 8460, 1296, 10526, 3877, 1327, 7983, 7475, 49...
None