node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
7,586
3
Labyrinth:_The_Computer_Game:labyrinth computer game labyrinth computer game 1986 graphic adventure game developed lucasfilm games published activision based fantasy film labyrinth tasks player navigating maze solving puzzles evading dangers player goal find defeat main antagonist jareth within 13 real-time hours unlike adventure games period labyrinth feature command-line interface instead player uses two scrolling word wheel menus screen construct basic sentences labyrinth first adventure game created lucasfilm project led designer david fox invented word wheels avoid text parsers syntax guessing typical text-based adventure games early development team collaborated author douglas adams week-long series brainstorming sessions inspired much final product labyrinth received positive reviews united states bigger commercial success film upon based design influenced lucasfilm subsequent adventure title critically acclaimed maniac mansion labyrinth computer game graphic adventure game player maneuvers character maze solving puzzles evading dangers adaptation 1986 film labyrinth many whose events characters reproduced game however follow plot film beginning player enters name sex favorite color last two fields determine appearance player character afterward short text-based adventure sequence unfolds wherein player enters movie theater watch film labyrinth game changes graphic adventure format jareth main antagonist appears projection screen transports protagonist labyrinthine prison player goal locate destroy jareth within 13 real-time hours otherwise protagonist trapped maze forever traveling maze player passes series scrolling hallways contain doors enemies things radar bar screen allows player see hallway miniature form locations doorways items characters given hallway displayed unlike adventure games period labyrinth feature command-line interface instead typing commands player selects two scrolling word wheels one verbs one nouns example verb congratulate may selected one wheel noun jareth inputs command congratulate jareth based player items location available verbs nouns change context-sensitively lucasfilm games began design labyrinth computer game 1985 company head george lucas requested tie-in video game movie name production lucasfilm common lucasfilm games projects lucas provided little direction team labyrinth first licensed game developed company earlier products rescue fractalus eidolon original intellectual properties according project leader david fox working license frees ways restricts adaptation team pressured reuse events characters labyrinth film felt obligated follow source material saw film adventure story chose set adaptation adventure game genre however fox disliked genre then-reliance text parsers syntax guessing created word wheel menus replacement meant supply limited set words still let lot things order streamline game without hampering player freedom game visual design shared lucasfilm habitat massively multiplayer online game production time early development game team screened rough cut film afterward sent london lucasfilm management one-week brainstorming session douglas adams author hitchhiker guide galaxy adams worked previously infocom development book 1984 video game adaptation also present meetings writer christopher cerf friend film director jim henson brenda laurel activision game publisher team worked extensively adams period laurel later wrote every day fresh blast wild intelligent humor stoked creativity team view pinnacle meetings adams idea opening sequence suggested reference wizard oz famous transition black-and-white color transition text-based format graphical one fox given job taking notes trip although hoped complete design emerge meetings returned london sheets sheets ideas sifted find usable concepts however material influenced game many adams suggestions used retrospectively fox felt opening sequence mistake called tedious believed alienated potential fans labyrinth released 1986 commodore 64 apple ii msx united states labyrinth commercially successful film upon based commodore magazine mark cotone lauded game puzzle design detailed graphics newcomer-friendly interface believed experienced players would enjoy depth challenging puzzles keith campbell commodore user praised animation dubbed superb game —which found unusual given status tie-in product however campbell hesitated call adventure game wrote word wheels rather tedious genre veterans roy wagner computer gaming world summarized labyrinth well done game excellent user interface writing computer video games matthew woodley praised game variety interface disliked long loading times believed small price pay brilliant game however labyrinth criticized three reviewers zzap 64 although praised visuals co-reviewer paul sumner called game slow-paced action title simplistic adventure co-reviewer julian rignall considered boring real disappointment given lucasfilm strong track record labyrinth first adventure game produced lucasfilm became critically acclaimed commercially successful developer genre game technology mechanics influenced company subsequent title maniac mansion whose scumm engine reused many lucasfilm adventure games word wheels predecessor game point-and-click interface gary winnick artist labyrinth went lead production maniac mansion ron gilbert fox contributed maniac mansion well later directed lucasfilm zak mckracken alien mindbenders retrospectively writers australian broadcasting corporation regarded labyrinth solid first attempt inferior real classics made afterward lucasfilm
[ 9006, 707, 11700, 5083 ]
Train
7,587
1
International_Protein_Index:international protein index international protein index ipi defunct protein database launched 2001 european bioinformatics institute ebi closed 2011 purpose provide proteomics community resource enables last version ipi contained complete reference sets six animal species homo sapiens human mus musculus mouse rattus norvegicus rat bos taurus cattle gallus gallus chicken danio rerio zebrafish one plant species arabidopsis thaliana thale cress human mouse rat datasets first developed combining information taken swiss-prot trembl ensembl refseq databases 2001 ipi launched databases cataloguing human genes varied greatly links since much data produced giving complete picture databases collaborated synchronize data currently many model organisms reference set genes/proteins catalogued ensembl/uniprot respectively well species specific databases redundancy ipi retired 2011 ebi advised users services employ uniprotkb accession numbers protein identifiers
[ 2901 ]
None
7,588
1
ArcSDE:arcsde arcsde spatial database engine server-software sub-system produced marketed esri aims enable usage relational database management systems spatial data spatial data may used part geodatabase geographic technologies incorporated gti australia originally designed database software named spatial database engine sdbe development shifted salamanca software pvt ltd. developed first production version sdbe originally used interbase dbms president esri jack dangermond announced sde gis'95 conference vancouver british columbia esri purchased salamanca software 1996 esri rebranded software arcsde follow naming convention products arcsde grew meet need users geographic data robust multi-user editing storage access extremely large geospatial databases arcsde supports esri geodatabase implementation product began stand-alone software esri integrated arcgis version 9.2 2013 esri announced plans deprecate arcsde command line tools arcsde application server following forthcoming release arcgis 10.2. release 10.1 esri sells arcsde component arcgis server part arcgis family software products integrates geographic-information query mapping spatial analysis editing within multi-user enterprise dbms environment 2010 alternative tools connecting arcmap dbms postgres sql server.. st-links pgmap blue spatial server arcsde enables organizations move traditional approach — managing separate collections geographic data files — integrated environment one manage spatial data continuous database accessible entire organization simultaneously easily publishable web arcsde application server facilitates storing managing spatial data raster vector survey dbms makes data available many applications arcsde allows one manage spatial data four commercial databases ibm db2 informix microsoft sql server oracle starting 9.3 release esri added support open-source postgresql database arcsde serves data advanced arcgis desktop products arcview arceditor arcinfo arcgis development products arcgis engine arcgis server arcview 3.x well arcims key component managing multi-user esri-based gis traditional rdbms software keeps track tables records contained database arcsde pushes relational model higher client software manage geographic data comprise several tables seamlessly user need awareness dealings particulars rdbms gis environment routes connections database arcsde middleware manages storing retrieval data
[ 6850, 6797, 7983, 119, 11030, 823, 1304, 3096, 8122, 8539 ]
Test
7,589
3
MOS_Technology_6508:mos technology 6508 mos technology 6508 8-bit microprocessor designed mos technology based popular 6502 6508 augmented two additional features internal 8-bit digital i/o port 256 bytes internal static ram internal ram mapped cpu address space 0000- 00ff 0100- 01ff serve zero page stack space i/o port available location 0001 data-direction register 0000 layout used 6510 may different strapping/bonding variants chip datasheet lists pin 40 clock phase two cbm900 computer 6508 controlling floppydisk pin 40 set overflow pin also offered 40-pin 6502 omitted 28-pin 650x variants 6503–6507 pin 6500 family cpus sets overflow flag p register tested using bvc/bvs instructions using tight polling loop 3 machine cycles constructed tighter minimum two instructions test branch loop using pin functionality
[ 11395, 10767, 664, 7323, 10784, 4385, 11054, 435, 3010, 3157, 6485, 10969, 5598, 5862, 10351, 1776, 5617, 7281, 7282, 7284 ]
Test
7,590
4
Reception_and_criticism_of_WhatsApp_security_and_privacy_features:reception criticism whatsapp security privacy features article provides detailed historic account reception criticism security privacy features whatsapp messaging service may 20 2011 unconfirmed security researcher netherlands pseudonym whatsapphack published dutch websites tweakers.net geenstijl method whatsapp accounts could hijacked researcher noticed flaw authentication process allowed researcher hijack account trying login another phone number intercepting verification sms text message specific conditions remained outbox symbian phone whatsapp client would attempt send android verification message could obtained reading radio tool named logcat researcher would copy send intercepted verification message real number phone using sms gateway spoof sender phone number number researcher tried maliciously login method worked whatsapp issued patch within one day publication articles android symbian clients whatsapp security mechanism design would disable account phone original owner phone number whatsapp account may 2011 another security hole reported left communication whatsapp susceptible packet analysis whatsapp communications encrypted data sent received plaintext meaning messages could easily read packet traces available may 2012 security researchers noticed new updates whatsapp longer sent messages plaintext cryptographic method implemented subsequently described broken august 2012 whatsapp support staff said messages encrypted latest version whatsapp software ios android blackberry windows phone symbian without specifying cryptographic method january 6 2012 unknown hacker published website made possible change status arbitrary whatsapp user long phone number known make work required restart app according hacker one many security problems whatsapp january 9 whatsapp reported resolved problem although measure actually taken block website ip address reaction windows tool made available download providing functionality problem since resolved form ip address check currently logged-in sessions german tech site h demonstrated use whatsapi hijack whatsapp account september 14 2012 shortly legal threat whatsapi developers alleged characterized h apparent reaction security reports whatsapi source code taken days whatsapi team since returned active development march 31 2013 saudi arabian communications information technology commission citc issued statement regarding possible measures whatsapp among applications unless service providers took serious steps comply monitoring privacy regulations february 2014 public authority data privacy german state schleswig-holstein advised using whatsapp service lacked privacy protection end-to-end client side encryption technology whatsapp started implementing end-to-end encryption late 2014 finished april 2016 major privacy security problem subject joint canadian-dutch government investigation primary concern whatsapp required users upload mobile phone entire address book whatsapp servers whatsapp could discover among users contacts available via whatsapp fast convenient way quickly find connect user contacts also using whatsapp meant address book mirrored whatsapp servers including contact information contacts using whatsapp information consisted solely phone numbers without additional information name contact stored hashed though salted form late 2015 dutch government released press-statement claiming whatsapp changed hashing method making much harder reverse thus fully complies rules regulations user need send friend request send messages another user due contact discovery mentioned november 2014 whatsapp introduced feature named read receipts alerts senders messages read recipients within week whatsapp introduced update allowing users disable feature message recipients send acknowledgements december 1 2014 indrajeet bhuyan saurav kar 17 years old demonstrated whatsapp message handler vulnerability allows anyone remotely crash whatsapp sending specially crafted message 2kb size escape problem user receives specially crafted message delete his/her whole conversation start fresh chat opening message keeps crashing whatsapp unless chat deleted completely early 2015 whatsapp launched web client used browser bhuyan also found two security issues compromised user privacy whatsapp photo privacy bug whatsapp web photo sync bug february 2015 dutch university student named maikel zweerink published app set prove anyone could track whatsapp user status also keep eye changing profile pictures privacy settings status messages regardless privacy settings march 2 2016 whatsapp introduced document-sharing feature initially allowing users share pdf files contacts however whatsapp default state automatically downloading attachments raised concerns press risk security support document sharing expanded beyond pdf files august 2016 whatsapp announced start sharing account information facebook consisting phone number account owner aggregated analytical data address books metadata users shared according whatsapp account information shared track basic metrics often people use services better fight spam whatsapp connecting phone number facebook systems facebook offer better friend suggestions show relevant ads account means facebook target advertisements facebook platform better making links users based phone numbers make friend suggestions users based whatsapp data user data shared advertisers used internally facebook services whatsapp emphasizes content user messages still kept private thanks end-to-end encryption means whatsapp read content chats however users given choice opt sharing data facebook advertisement purposes october 2016 article 29 working party stated serious concerns regarding manner information relating updated terms service privacy policy provided users consequently validity users ’ consent april 5 2016 end-to-end encryption users communications including file transfers voice calls supported users latest client encryption enabled default uses curve25519 key exchange hkdf generation session keys aes-256 cbc mode encryption hmac-sha256 integrity verification sha512 generating two 30 digit fingerprints users identity keys verify needed even company would unable decrypt users communications amnesty international security professionals praised move us federal bureau investigation criticised threatening work law enforcement telegram another messaging service reported bbc used islamic state extremists whatsapp messaging service provides end-to-end encryption among others threema wickr signal silent phone line also provide encryption default imessage viber provide special circumstances telegram provides end-to-end encryption opt-in feature support end-to-end encrypted group messaging whatsapp score 6 7 points electronic frontier foundation secure messaging scorecard received points communications encrypted transit communications encrypted keys provider n't access allowing users verify contacts identities past messages secure encryption keys stolen completed recent independent security audit security designs properly documented missing point code open independent review january 13 2017 guardian reported security researcher tobias boelter found whatsapp policy forcing re-encryption initially undelivered messages without informing recipient constituted serious loophole whereby whatsapp could disclose compelled disclose content messages whatsapp open whisper systems officials disagreed assessment follow-up article boelter explained greater detail considered specific vulnerability article since removed guardian due inaccuracies boelter representation facts complaints 73 renowned security researchers guardian forced substantially revise correct articles well therefore june 2017 guardian readers ’ editor paul chadwick wrote guardian wrong report january popular messaging service whatsapp security flaw serious huge threat freedom speech chadwick also noted since guardian article whatsapp better secured introduction optional two-factor verification february however important note feature already introduced public beta versions whatsapp early november 2016 months guardian wrote alleged issue january 15 2017 research team ruhr university bochum published security analysis group messaging protocols whatsapp signal threema among deficiencies found whatsapp servers effectively control membership groups consequently server add arbitrary phone numbers groups including future communication becomes insecure even though manipulations could detected weakens end-to-end security guarantees october 2017 german software company open-xchange criticised whatapps slack using proprietary software stated plans create open source alternative may 2019 revealed security vulnerability whatsapp allowing remote person install spyware making call even need answered later june 2019 another vulnerability revealed allowing user transform audio call video call without victim consent without victim noticing bug bounty 5000 usd offered bug june 2019 whatsapp announced would take legal action users send disproportionately high number messages using communication platform company reiterated platform meant private messaging businesses interact customers business app notification website company stated beginning december 7 2019 whatsapp take legal action determine engaged assisting others abuse violates terms service automated bulk messaging
[ 9440, 2818, 9063, 711, 4318, 9055 ]
Test
7,591
3
Hotbit:hotbit hotbit hb-8000 msx home computer developed sold brazilian subsidiary sharp corporation epcom home computer division mid-1980s msx machines popular brazil time virtually killed competing 8 bit microcomputers brazilian market hotbit three versions 1.0 1.1 gray white case 1.2 black case rom slightly modified solve ascii table compatibility issue popular brazilian msx gradiente expert
[ 1121, 11462, 1194, 780, 3788, 9006, 7983, 1776, 4409, 1403 ]
Test
7,592
8
Web_Application_Description_Language:web application description language web application description language wadl machine-readable xml description http-based web services wadl models resources provided service relationships wadl intended simplify reuse web services based existing http architecture web platform language independent aims promote reuse applications beyond basic use web browser wadl submitted world wide web consortium sun microsystems 31 august 2009 consortium current plans standardize wadl rest equivalent soap web services description language wsdl also used describe rest web services service described using set resource elements resource contains param elements describe inputs method elements describe request response resource request element specifies represent input types required specific http headers required response describes representation service response well fault information deal errors following listing shows example wadl description yahoo news search application multiple tools generate java code existing wadl app xmlns= http //research.sun.com/wadl/2006/10 xmlns xs= http //www.w3.org/2001/xmlschema /app
[ 9665, 10465, 10020, 8070, 8425, 3952, 10486, 2106, 3323, 124, 4797, 479 ]
Test
7,593
9
EMSO_simulator:emso simulator emso simulator equation-oriented process simulator graphical interface modeling complex dynamic steady-state processes cape-open compliant emso stands environment modeling simulation optimization alsoc project portuguese acronym free environment simulation optimization control processes based ufrgs develops maintains distributes object-oriented software pre-built models available emso modeling library eml new models written emso modeling language user embed models coded c c++ fortran simulation environment
[ 9376, 587, 6797, 7983, 8113, 823, 3960, 9431, 9915, 2045, 7326 ]
Test
7,594
3
DB13W3:db13w3 db13w3 13w3 style d-subminiature connector commonly used analog video interfaces used primarily sun microsystems silicon graphics sgi ibm risc workstations well displays apple computer next computer intergraph corporation 13w3 connector longer used modern displays superseded use analog displays vga connector display market moved digital flat panel displays turn replaced almost entirely digital connections dvi hdmi displayport connector contains 10 standard signal pins 3 larger positions fitted either special pins two concentric contacts coaxial cable special high-current pins used video signals computer side pins female coaxial connectors large positions male coaxial connectors carry video signal split red green/gray blue standard signal pins carry four grounds three sense pins used communicate monitor vertical sync horizontal sync composite sync signal 13w3 connector converted standard vga connector using commonly available cables adapters allows multisync monitors became prevalent personal computing late 1980s used workstations long sync-on-green compatible likewise later-generation sun monitors began supporting multisync 1998 connected via similar cables personal computers even though 13w3 standard connector sync signals maintained different pins based display system sun intergraph ibm sgi use different pin configurations monitor sense id sync signals sun sgi even two different pin configurations without display data channel support sun ddc connector used least upa graphics adapters creator 3d expert 3d corresponding monitors gd5410 gd5510 make matching correct cable monitor virtually impossible many monitors 13w3 connectors support separate sync supplied pc systems converters exist allow connecting newer monitors vga connectors older systems workstations popular cable series dip switches built used set sync signals variant db13w3 connector high-current pins instead high-frequency pins used video applications also used 3com superstack ethernet switches carry dc power
[ 9057, 9665, 10051, 6854, 8007, 10982, 10954, 6575, 4567, 11129, 3453, 7806, 7647 ]
Test
7,595
2
Android_Lollipop:android lollipop android lollipop codenamed android l development fifth major version android mobile operating system developed google spanning versions 5.0 5.1.1 unveiled june 25 2014 google i/o 2014 conference became available official over-the-air ota updates november 12 2014 select devices run distributions android serviced google nexus google play edition devices source code made available november 3 2014 fifth major update twelfth version android one prominent changes lollipop release redesigned user interface built around design language known material design made retain paper-like feel interface changes include improvements notifications accessed lockscreen displayed within applications top-of-the-screen banners google also made internal changes platform android runtime art officially replacing dalvik improved application performance changes intended improve optimize battery usage statistics issued google indicate lollipop versions 14.5 share combined android devices accessing google play android lollipop succeeded android marshmallow released october 2015 release internally codenamed lemon meringue pie android 5.0 first unveiled codename android l june 25 2014 keynote presentation google i/o developers conference alongside lollipop presentation focused number new android-oriented platforms technologies including android tv in-car platform android auto wearable computing platform android wear health tracking platform google fit part presentation dedicated new cross-platform design language referred material design expanding upon card motifs first seen google design increased use grid-based layouts responsive animations transitions padding depth effects lighting shadows designer matías duarte explained unlike real paper digital material expand reform intelligently material physical surfaces edges seams shadows provide meaning touch material design language used android across google suite web software well providing consistent experience across platforms android 5.0 introduces refreshed notification system individual notifications displayed cards adhere material design language batches notifications grouped app produced notifications displayed lock screen cards heads notifications also displayed large banners across top screen along respective action buttons do-not-disturb feature also added notifications recent apps menu redesigned use three-dimensional stack cards represent open apps individual apps also display multiple cards recents menu web browser open tabs lollipop also contains major new platform features developers 5,000 new apis added use applications example possibility save photos raw image format additionally dalvik virtual machine officially replaced android runtime art new runtime environment introduced technology preview kitkat art cross-platform runtime supports x86 arm mips architectures 32-bit 64-bit environments unlike dalvik uses just-in-time compilation jit art compiles apps upon installation run exclusively compiled version technique removes processing overhead associated jit process improving system performance lollipop also aims improve battery consumption series optimizations known project volta among changes new battery saver mode job scheduling apis restrict certain tasks occur wi-fi batching tasks reduce overall amount time internal radios active new developer tool called battery historian used tracking battery consumption apps use android extension pack apis also provide graphics functions new shaders aiming provide pc-level graphics 3d games android devices number system-level enterprise-oriented features also introduced banner android work samsung knox security framework initially planned used foundation android work instead google opted use technology segregating personal work-oriented data device along accompanying apis managing environment smart lock feature devices also configured users perform device unlocking pin pattern trusted location proximity designated bluetooth device nfc tag lollipop additionally device encryption enabled default capable devices however due performance issues change held successor android marshmallow developer preview android l build lpv79 released nexus 5 2013 nexus 7 june 26 2014 form flashable images source code gpl-licensed components developer preview released via android open source project aosp july 2014 second developer preview build lpv81c released august 7 2014 alongside beta version google fit platform sdk previous build second developer preview build available nexus 5 2013 nexus 7 october 15 2014 google officially announced android l would known android 5.0 lollipop company also unveiled launch devices android5.0including motorola nexus 6 htc nexus 9for release november 3 2014 google stated nexus including nexus 4 5 7 10 google play edition devices would receive updates lollipop coming weeks one developer preview build nexus devices new sdk revision application developers would released october 17 2014 update schedules third-party android devices may vary manufacturer full source code android5.0 pushed aosp november 3 2014 allowing developers oems begin producing builds operating system december 2 2014 factory images nexus smartphones tablets updated 5.0.1 version introduces bug fixes serious bug affects nexus 4 devices prevents audio working phone calls device-specific lollipop 5.0.2 lrx22g version released first-generation nexus 7 december 19 2014 android5.1 updated version lollipop unveiled february 2015 part indonesian launch android one preloaded android one devices sold indonesia philippines google officially announced 5.1 releasing updates existing devices march 9 2015 2015 amazon.com forked lollipop produce fire os 5 bellini amazon fire hd-series devices
[ 5637, 8719, 3600, 7700, 9244, 11294, 1578, 10284, 5677, 1083, 7234, 6212, 69, 2630, 8262, 4683, 4685, 11343, 3664, 8280, 8285, 2658, 8821, 11391, 11396, 1670, 7816, 5262, 10393, 8858, 7835, 673, 8870, 1191, 1203, 7359, 196, 3269, 3782, 89...
Test
7,596
5
Synchronous_Serial_Interface:synchronous serial interface synchronous serial interface ssi widely used serial interface standard industrial applications master e.g controller slave e.g sensor ssi based rs-422 standards high protocol efficiency addition implementation various hardware platforms making popular among sensor manufacturers ssi originally developed max stegmann gmbh 1984 transmitting position data absolute encoders – reason servo/drive equipment manufacturers refer ssi port stegmann interface formerly covered german patent de 34 45 617 expired 1990 suitable applications demanding reliability robustness measurements varying industrial environments different serial peripheral interface bus spi ssi differential simplex non-multiplexed relies time-out frame data spi single-ended duplex multiplex uses select-line frame data however spi peripherals microcontrollers implement ssi external differential driver-ics program-controlled timing ssi synchronous point point serial communication channel digital data transmission synchronous data transmission one data transmitted synchronizing transmission receiving sending ends using common clock signal since start stop bits present allows better use data transmission bandwidth message bits makes whole transmission process simpler easier clock needs bandwidth included determining total bandwidth required communication two devices general mentioned earlier point point connection master e.g plc microcontroller slave e.g rotary encoders master controls clock sequence slave transmits current data/value shift register invoked master data clocked shift register master slave synchronized common clock controller clock data signals transmitted according rs-422 standards rs-422 also known ansi/tia/eia-422-b technical standard specifies electrical characteristics balanced voltage digital interface circuit data transmitted using balanced differential signalling i.e clock data lines basically twisted pair cables inputs use opto-coupler galvanic isolation details see driven rs-422/485 levels data output sensor driven rs-422/485 line driver differential signalling improves resistance electromagnetic interference emi hence making reliable communication channel long transmission lengths harsh external environments interface simple design illustrated figure consists 2 pairs wires one transmitting clock signals master transmitting data slave clock sequences triggered master need arises different clock frequencies used ranging 100 khz 2 mhz number clock pulses depends number data bits transmitted simplest ssi slave interface uses retriggerable monostable multivibrator monoflop freeze current value sensor current frozen values slave stored shift registers values clocked sequentially initiated controller design revolutionized integration microcontrollers fpgas asics interface data format designed way ensure proper communication data protocol data transmission based three different subsequent parts leading- ” 1 data-bits trailing- 0 main significance type format ensure proper working interface hence secure data transmission free hardware software errors idle state clock high level also sensor output high level used detecting broken wire contacts helps observing proper working condition interface n-clock pulses rising edges data completely transmitted next clock pulse rising edge n+1 sensor output goes low level used detect short circuit cable high even n+1 rising edges means interface short circuit readings multiple slaves three enabled time connecting common clock however avoid ground loops electrically isolate slave complete galvanic isolation opto-couplers needed following keywords useful understanding ssi data transmission procedure diagram illustrates single data transmission using ssi protocol ssi initially idle mode data clock lines stay high slave keeps updating current data transmission mode evoked master initiates train clock pulses slave receives beginning clock signal 1 automatically freezes current data first rising edge 2 clock sequence msb sensor ’ value transmitted consequent rising edges bits sequentially transmitted output transmission complete data word 3 i.e lsb transmitted additional rising edge clock sets clock line high data line set low remains period time tm recognize transfer timeout clock signal data-output request received within time data transmitted multiple transmission slave starts updating value data line set high idle mode clock pulses within time tm marks end single transmission data word slave receives clock signal time tp =tm updated position value frozen transmission value begins described earlier multiple transmissions data happens continuous clocking even transmission least significant bit i.e clock pulses allow monoflop go steady state illustrated initial sequences single transmission idle state clock data lines high arrival first falling edge transmission mode evoked similarly data bits transmitted sequentially starting msb every rising edge transmission lsb means transmission data completed additional rising edge pushes data line low signifying end transmission particular data continuous clock pulses even i.e next clock pulses comes time tw tm value slave updated monoflop still unsteady value shift register still contains value next rising edge i.e n+1 rising edge transmission data continues msb data transmitted earlier re-transmitted end tw follows procedure earlier transmissions leading multiple transmissions data value slave updated timing two clock pulses transfer timeout tm multiple transmission used check data integrity two consecutive received values compared transmission failures indicated differences two values transmission data controlled master transmission interrupted time stopping clock sequence period longer tm slave automatically recognize transfer timeout go idle mode since ssi based rs-422 standards necessary select appropriate cables stay within limits cabling length clock frequencies relation cable length clock frequency shown following figure used conservative guide curve based upon empirical data using 24 awg standard copper conductor unshielded twisted-pair telephone cable shunt capacitance 52.5 pf/meter 16 pf/foot terminated 100 ohm resistive load cable length restriction shown curve based upon assumed load signal quality requirements high data rates used application limited shorter cables possible use longer cables low data rates used dc resistance cable limits length cable low data rate applications increasing noise margin voltage drop cable increases ac effects cable limit quality signal limit cable length short distances high data rates used examples data rate cable length combinations vary 90 kbit/s 1.2 km 10 mbit/s 5m rs-422 cables characteristics different twisted pair 24 awg 52.5 pf/meter 16 pf/foot also employed within bounds mentioned first determine absolute loop resistance capacitance values typical 24 awg cable provided cable length associated data signalling rate desired figure convert values equivalent lengths cable actually used example longer distances would possible using 19 awg shorter distances would necessary 28 awg maximum permissible length cable separating master slave function data signalling rate influenced tolerable signal distortion amount longitudinally coupled noise ground potential differences introduced master slave circuit accordingly users advised restrict cable length minimum type length cable used must capable maintaining necessary signal quality needed particular application furthermore cable balance must maintain acceptable crosstalk levels generated received manufacturers organizations added additional information basic ssi protocol done mainly ensure proper data transmission secure transmission indicate end data transmission crc bits parity bits added simple words used identifying byte correctly interpreted received original specification multiple transmissions used ensure data integrity case two consecutive transmissions data initiated compared error transmission however reduces protocol efficiency 50 compared parallel data transmission limitations interface negligible applications industrial automation ssi handle short distance communication 1.2 km supports one master device 1.2 km rather good distance communication automation industry standards compared advanced communication systems based field buses ethernet ssi limited master slave architecture simple point point communication master slave another disadvantage hardware slave acknowledgment i.e detection slave communication
[ 2994 ]
None
7,597
0
EuroWordNet:eurowordnet eurowordnet system semantic networks european languages based wordnet language develops wordnet interconnected interlingual links stored interlingual index ili unlike original princeton wordnet wordnets freely available original eurowordnet project dealt dutch italian spanish german french czech estonian wordnets frozen wordnets languages developed varying degrees examples eurowordnet available free access full database however charged cases openthesaurus babelnet may serve free alternative
[ 416, 6145, 1890, 396 ]
Train
7,598
3
Scoreboarding:scoreboarding scoreboarding centralized method first used cdc 6600 computer dynamically scheduling pipeline instructions execute order conflicts hardware available scoreboard data dependencies every instruction logged instructions released scoreboard determines conflicts previously issued incomplete instructions instruction stalled unsafe continue scoreboard monitors flow executing instructions dependencies resolved stalled instruction issued instructions decoded order go following four stages control execution instructions scoreboard maintains three status tables detailed algorithm scoreboard control described scoreboarding method must stall issue stage functional unit available case future instructions could potentially executed wait structural hazard resolved techniques like tomasulo algorithm avoid structural hazard also resolve war waw dependencies register renaming
[ 10781, 6181, 508, 3470, 6926, 10779, 5948, 3421 ]
None
7,599
0
Text_corpus:text corpus linguistics corpus plural corpora text corpus large structured set texts nowadays usually electronically stored processed corpus linguistics used statistical analysis hypothesis testing checking occurrences validating linguistic rules within specific language territory corpus may contain texts single language monolingual corpus text data multiple languages multilingual corpus multilingual corpora specially formatted side-by-side comparison called aligned parallel corpora two main types parallel corpora contain texts two languages translation corpus texts one language translations texts language comparable corpus texts kind cover content translations exploit parallel text kind text alignment identifying equivalent text segments phrases sentences prerequisite analysis machine translation algorithms translating two languages often trained using parallel fragments comprising first language corpus second language corpus element-for-element translation first language corpus order make corpora useful linguistic research often subjected process known annotation example annotating corpus part-of-speech tagging pos-tagging information word part speech verb noun adjective etc added corpus form tags another example indicating lemma base form word language corpus working language researchers use interlinear glossing used make annotation bilingual corpora structured levels analysis applied particular number smaller corpora may fully parsed corpora usually called treebanks parsed corpora difficulty ensuring entire corpus completely consistently annotated means corpora usually smaller containing around one three million words levels linguistic structured analysis possible including annotations morphology semantics pragmatics corpora main knowledge base corpus linguistics analysis processing various types corpora also subject much work computational linguistics speech recognition machine translation often used create hidden markov models part speech tagging purposes corpora frequency lists derived useful language teaching corpora considered type foreign language writing aid contextualised grammatical knowledge acquired non-native language users exposure authentic texts corpora allows learners grasp manner sentence formation target language enabling effective writing text corpora also used study historical documents example attempts decipher ancient scripts biblical scholarship archaeological corpora short duration provide snapshot time one shortest corpora time may 15–30 year amarna letters texts 1350 bc corpus ancient city example kültepe texts turkey may go series corpora determined find site dates
[ 5122, 8323, 2440, 10634, 2059, 6798, 11538, 1044, 5781, 5399, 538, 3227, 3743, 5667, 3748, 5668, 2858, 5676, 10160, 3635, 4531, 4662, 3127, 2488, 7353, 7995, 10557, 6208, 11206, 2247, 3533, 5197, 3663, 6223, 9552, 2770, 10577, 11348, 11474,...
Test
7,600
4
Vincent_Moscaritolo:vincent moscaritolo vincent moscaritolo american computer security expert known work encryption applications mobile devices 2012 2015 distinguished member technical staff silent circle designed original messaging technologies silent circle uses 2015 left silent circle co-found 4th-a technologies llc robbie hanson 4th-a technologies develops technologies restore restore people inalienable right “ secure documents ” designed zerodark.cloud framework simplifies development apps interact cloud performs tasks syncing messaging collaboration uses zero-knowledge encryption ensuring data cloud compromised also produced storm4 secure cloud storage service vincent involved design invention production system software network applications 30 years addition producing cryptographic products concern use encryption technology criminal terrorist actors compelled offer assistance training law enforcement intelligence community cryptographic issues participated specialized venues fbi information technology study group drug enforcement administration office investigative technology infragard cloud security alliance vincent moscaritolo experience includes roles distinguished member technical staff silent circle principal cryptographic engineer pgp corporation senior operating system engineer apple computer principal software specialist digital equipment corporation vincent one co founders silent circle developer secure messaging technology used silent circle blackphone designed silent circle instant messaging protocol scimp inventor progressive encryption used silent text app pgp focused engineering cryptographic products os x platform including cross platform core crypto library secure file deletion virtual disk client network kernel engine redirection module also responsible obtaining maintaining nist fips-140 validation pgp cryptographic core apple notable founding mac-crypto conference key mac developers industry leaders legends met discuss topics ranging cryptosystems digital cash security issues feedback sessions developers able directly discuss requirements apple engineers also involved original cypherpunk group mid 1980s founded startup called datavox produced banktalk one first voice response systems financial marketplace included user-tailorable audio menu system provided general information balance account transactions able communicate bank mainframes existing atm network vincent latest project zerodark.cloud framework moscaritolo published article s4 open-source crypto library verifying authenticity public keys moscaritolo designed silent circle instant messaging protocol scimp uses new progressive encryption technology cryptographic projects include development public key authentication extension file servers authoring ietf draft secure authorization protocol distributed systems development code technotes pgp cryptographic toolkit number presentations tutorials modern cryptosystems security also contributor vanish self destructing data project university washington holds patents related cryptographic techniques designs pass laws could criminals avid outdoorsman vincent usually spends weekends hiking snowshoeing deep woods southern oregon daughter son background variety fields including motorcycle racing number martial arts trauma medicine
[ 10741, 3354, 3941, 997 ]
None
7,601
4
Row_hammer:row hammer row hammer also written rowhammer unintended undesirable side effect dynamic random-access memory dram memory cells leak charges interact electrically possibly leaking changing contents nearby memory rows addressed original memory access bypass isolation dram memory cells results high cell density modern dram triggered specially crafted memory access patterns rapidly activate memory rows numerous times row hammer effect used privilege escalation computer security exploits network-based attacks also theoretically possible fast network connection attacker victim different hardware-based techniques exist prevent row hammer effect occurring including required support processors types dram memory modules row hammer rarely never affects ddr ddr2 sdram modules affects many ddr3 ddr4 sdram modules dynamic ram dram bit stored data occupies separate memory cell electrically implemented one capacitor one transistor charge state capacitor charged discharged determines whether dram cell stores 1 0 binary value huge numbers dram memory cells packed integrated circuits together additional logic organises cells purposes reading writing refreshing data memory cells blue squares illustration organised matrices addressed rows columns memory address applied matrix broken row address column address processed row column address decoders illustration vertical horizontal green rectangles respectively row address selects row read operation selection also known row activation bits cells row transferred sense amplifiers form row buffer red squares illustration exact bit selected using column address consequently read operations destructive nature design dram requires memory cells rewritten values read transferring cell charges row buffer write operations decode addresses similar way result design entire rows must rewritten value single bit changed result storing data bits using capacitors natural discharge rate dram memory cells lose state time require periodic rewriting memory cells process known refreshing another result design dram memory susceptible random changes stored data known soft memory errors attributed cosmic rays causes different techniques counteract soft memory errors improve reliability dram error-correcting code ecc memory advanced variants lockstep memory commonly used increased densities dram integrated circuits ics led physically smaller memory cells capable storing smaller charges resulting lower operational noise margins increased rates electromagnetic interactions memory cells greater possibility data loss result disturbance errors observed caused cells interfering operation manifesting random changes values bits stored affected memory cells awareness disturbance errors dates back early 1970s intel 1103 first commercially available dram ic since dram manufacturers employed various mitigation techniques counteract disturbance errors improving isolation cells performing production testing however researchers proved 2014 analysis commercially available ddr3 sdram chips manufactured 2012 2013 susceptible disturbance errors using term row hammer name associated side effect led observed bit flips opportunity row hammer effect occur ddr3 memory primarily attributed ddr3 high density memory cells results associated interactions cells rapid dram row activations determined primary cause frequent row activations cause voltage fluctuations associated row selection lines observed induce higher-than-natural discharge rates capacitors belonging nearby adjacent cases memory rows called victim rows affected memory cells refreshed lose much charge disturbance errors occur tests show disturbance error may observed performing around 139,000 subsequent memory row accesses cache flushes one memory cell every 1,700 cells may susceptible tests also show rate disturbance errors substantially affected increased environment temperature depends actual contents dram certain bit patterns result significantly higher disturbance error rates variant called double-sided hammering involves targeted activations two dram rows surrounding victim row illustration provided section variant would activating yellow rows aim inducing bit flips purple row case would victim row tests show approach may result significantly higher rate disturbance errors compared variant activates one victim row neighbouring dram rows different methods exist less successful detection prevention correction mitigation row hammer effect tests show simple ecc solutions providing single-error correction double-error detection sec ded capabilities able correct detect observed disturbance errors include two flipped bits per memory word flipping three bits prevents ecc noticing modification effective solution introduce frequent memory refreshing refresh intervals shorter usual 64 ms technique results higher power consumption increased processing overhead vendors provide firmware updates implement type mitigation one complex prevention measures performs counter-based identification frequently accessed memory rows proactively refreshes neighbouring rows another method issues additional infrequent random refreshes memory rows neighbouring accessed rows regardless access frequency research shows two prevention measures cause negligible performance impacts since release ivy bridge microarchitecture intel xeon processors support so-called pseudo target row refresh ptrr used combination ptrr-compliant ddr3 dual in-line memory modules dimms mitigate row hammer effect automatically refreshing possible victim rows negative impact performance power consumption used dimms ptrr-compliant xeon processors default fall back performing dram refreshes twice usual frequency results slightly higher memory access latency may reduce memory bandwidth 2–4 lpddr4 mobile memory standard published jedec includes optional hardware support so-called target row refresh trr prevents row hammer effect without negatively impacting performance power consumption additionally manufacturers implement trr ddr4 products although part ddr4 memory standard published jedec internally trr identifies possible victim rows counting number row activations comparing predefined chip-specific maximum activate count mac maximum activate window values refreshes rows prevent bit flips mac value maximum total number row activations may encountered particular dram row within time interval equal shorter amount time neighbouring rows identified victim rows trr may also flag row victim row sum row activations two neighbouring rows reaches mac limit within time window due necessity huge numbers rapidly performed dram row activations row hammer exploits issue large numbers uncached memory accesses cause cache misses detected monitoring rate cache misses unusual peaks using hardware performance counters version 5.0 memtest86 memory diagnostic software released december 3 2013 added row hammer test checks whether computer ram susceptible disturbance errors works computer boots uefi without uefi boots older version hammer test memory protection way preventing processes accessing memory assigned one concepts behind modern operating systems using memory protection combination security-related mechanisms protection rings possible achieve privilege separation processes programs computer systems general divided parts limited specific privileges require perform particular task using privilege separation also reduce extent potential damage caused computer security attacks restricting effects specific parts system disturbance errors explained section effectively defeat various layers memory protection short circuiting low hardware level practically creating unique attack vector type allows processes alter contents arbitrary parts main memory directly manipulating underlying memory hardware comparison conventional attack vectors buffer overflows aim circumventing protection mechanisms software level exploiting various programming mistakes achieve alterations otherwise inaccessible main memory contents initial research row hammer effect published june 2014 described nature disturbance errors indicated potential constructing attack provide examples working security exploit subsequent october 2014 research paper imply existence security-related issues arising row hammer effect march 9 2015 google project zero revealed two working privilege escalation exploits based row hammer effect establishing exploitable nature x86-64 architecture one revealed exploits targets google native client nacl mechanism running limited subset x86-64 machine instructions within sandbox exploiting row hammer effect escape sandbox gain ability issue system calls directly nacl vulnerability tracked mitigated modifying nacl allow execution codice_1 cache line flush machine instruction previously believed required constructing effective row hammer attack second exploit revealed project zero runs unprivileged linux process x86-64 architecture exploiting row hammer effect gain unrestricted access physical memory installed computer combining disturbance errors memory spraying exploit capable altering page table entries ptes used virtual memory system mapping virtual addresses physical addresses results exploit gaining unrestricted memory access due nature inability x86-64 architecture make codice_1 privileged machine instruction exploit hardly mitigated computers use hardware built-in row hammer prevention mechanisms testing viability exploits project zero found half 29 tested laptops experienced disturbance errors occurring vulnerable laptops less five minutes running row-hammer-inducing code tested laptops manufactured 2010 2014 used non-ecc ddr3 memory july 2015 group security researchers published paper describes architecture- instruction-set-independent way exploiting row hammer effect instead relying codice_1 instruction perform cache flushes approach achieves uncached memory accesses causing high rate cache eviction using carefully selected memory access patterns although cache replacement policies differ processors approach overcomes architectural differences employing adaptive cache eviction strategy algorithm proof concept approach provided native code implementation pure javascript implementation runs firefox 39 javascript implementation called rowhammer.js uses large typed arrays relies internal allocation using large pages result demonstrates high-level exploit low-level vulnerability october 2016 researchers vusec systems network security group vu amsterdam published drammer android app uses rowhammer methods reliably gain root access several popular models smartphones vulnerability acknowledged cve-2016-6728 patch released google within month mitigate effect however due general nature possible implementations attack effective software patch difficult reliably implement fact june 2018 proposals made academia industry either impractical deploy insufficient stopping attacks mitigate attacks researchers vusec systems proposed lightweight defense prevents dma-based attacks isolating dma buffers guard rows software states vulnerable rowhammer attacks attacker thus needs find right target states order utilise rowhammer errors practice one main challenges identifying target states typically done domain experts mainstream fault tolerance community responded rowhammer attacks systematic methodology used identify validate evaluate rowhammer attack target states exploitability work based well-established fault injection-based experimental methodology generalised attack target states found practical target states previously unknown
[ 1024, 5636, 6675, 7187, 535, 10776, 25, 4637, 9761, 9762, 4644, 4133, 5158, 10284, 7217, 9784, 10809, 576, 1608, 3657, 8779, 10333, 4703, 8288, 97, 8292, 8298, 7285, 3702, 9335, 2168, 1147, 7804, 3197, 1150, 3711, 8320, 10875, 2179, 5764,...
Test
7,602
2
Tvheadend:tvheadend tvheadend sometimes tvh short server application reads video streams linuxtv sources publishes internet streams supports multiple inputs dvb-t usb tuner stick sat ip tuner instance combining together single channel listing tvh servers ip signal providers allowing networks tvh servers combined tvh typically used send video receiver devices like smart televisions set top boxes throughout household network also used forward signals long distance links even countries also includes electronic program guide information available ability record programs like dvr including ability transcode mpeg2 h264 h265
[ 1700, 6058, 1674, 6380, 4147, 1107, 8124 ]
None
7,603
6
File_system_API:file system api file system api application programming interface utility user program requests services file system operating system may provide abstractions accessing different file systems transparently file system apis may also include interfaces maintenance operations creating initializing file system verifying file system integrity defragmentation operating system includes apis needed file systems supports microsoft windows file system apis ntfs several fat file systems linux systems include apis ext2 ext3 reiserfs btrfs name early operating systems capable handling tape disk file systems provided basic interfaces coordination device allocation deallocation required addition file systems provided services interfaces defined additional file system types hierarchy structure supported media increased additional features needed specialized functions multi-user systems required apis writing user data file system provided use directly user program run-time library run-time library programming languages may provide type conversion formatting blocking file systems provide identification records key may include re-writing existing record operation sometimes called codice_1 record exists reading user data sometimes called get may include direction forward reverse case keyed file system specific key writing run-time libraries may intercede user program positioning includes adjusting location next record may include skipping forward reverse well positioning beginning end file open api may explicitly requested implicitly invoked upon issuance first operation process object may cause mounting removable media establishing connection another host validating location accessibility object updates system structures indicate object use usual requirements requesting access file system object include additional information may necessary example requested via programming language library may provide coordination among modules process addition forwarding request file system must expected something may go wrong processing open depending programming language additional specifications open may establish modules handle conditions libraries specify library module file system permitting analysis opening program unable perform meaningful action result failure example failure attempt open necessary input file action may report failure abort program languages simply return code indicating type failure always must checked program decides report continue close may cause dismounting ejecting removable media updating library file system structures indicate object longer use minimal specification close references object additionally file systems provide specifying disposition object may indicate object discarded longer part file system similar open must expected something may go wrong considerations handling failure similar open information data file called metadata metadata maintained file system example last-modification date various dates depending file system location beginning file size file file system backup utility saved current version files items usually altered user program additional meta data supported file systems may include owner file group file belongs well permissions and/or access control i.e access updates various users groups may perform whether file normally visible directory listed items usually modifiable file system utilities may executed owner applications store metadata images metadata may include camera model settings used take photo audio files meta data may include album artist recorded recording comments recording may specific particular copy file i.e different copies recording may different comments update owner file documents may include items like checked-by approved-by etc renaming file moving file subdirectory one directory another deleting file examples operations provide file system management directories metadata operations permitting restricting access directory various users groups users usually included filesystem used directories files records may added deleted modified usually causes inefficiencies underlying data structures things like logically sequential blocks distributed across media way causes excessive repositioning partially used even empty blocks included linked structures incomplete structures inconsistencies may caused device media errors inadequate time detection impending loss power actual power loss improper system shutdown media removal rare occasions file system coding errors specialized routines file system included optimize repair structures usually invoked user directly triggered within file system internal counters number levels structures number inserted objects may compared thresholds may cause user access suspended specific structure usually displeasure user users effected may started low priority asynchronous tasks may deferred time low user activity sometimes routines invoked scheduled system manager case defragmentation api kernel-level kernel provides interfaces filesystems developers also space filesystem code resides differs old schema kernel uses facilities talk filesystem driver vice versa contrary kernel one handles filesystem layout filesystem one directly access hardware cleanest scheme resolves difficulties major rewrite old scheme modular kernels allows adding filesystems kernel module even third party ones non-modular kernels however requires kernel recompiled new filesystem code closed-source kernels makes third party filesystem impossible unixes unix-like systems linux used modular scheme variation scheme used ms-dos dos 4.0 onward compatibles support cd-rom network file systems instead adding code kernel old scheme using kernel facilities kernel-based scheme traps calls file identifies redirected kernel equivalent function handled specific filesystem driver filesystem driver directly access disk contents using low-level bios functions api driver-based kernel provides facilities file system code resides totally external kernel even module modular kernel cleaner scheme filesystem code totally independent allows filesystems created closed-source kernels online filesystem additions removals system examples scheme windows nt os/2 respective ifss api filesystems kernel like kernel-based apis automatically trapped another api driver-based os scheme used windows 3.1 providing fat filesystem driver 32-bit protected mode cached vfat bypassed dos fat driver kernel msdos.sys completely later windows 9x series 95 98 vfat iso9660 filesystem driver along joliet network shares third party filesystem drivers well adding original dos apis lfn api ifs drivers intercept already existent dos file apis also add new ones within 32-bit protected mode executable however api completely documented third parties found make-it-by-yourself scenario even worse kernel-based apis api user space filesystem directly use kernel facilities accesses disks using high-level operating system functions provides functions library series utilities use access filesystem useful handling disk images advantage filesystem made portable operating systems high-level operating system functions uses common ansi c disadvantage api unique application implements one examples scheme hfsutils adflib filesystems least disk ones need equivalent functions provided kernel possible easily port filesystem code one api another even different types example ext2 driver os/2 simply wrapper linux vfs os/2 ifs linux ext2 kernel-based hfs driver os/2 port hfsutils os/2 ifs also exists project uses windows nt ifs driver making ntfs work linux
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 7225, 11323, 8772, 1109, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 6797, 654, 2193, 2194, 2197, 2199, 11419, 6813, 6309, 1190, 5286, 10405, 5293, 7344, 2...
Validation
7,604
3
Autonomous_peripheral_operation:autonomous peripheral operation computing autonomous peripheral operation hardware feature found modern microcontroller architectures off-load certain tasks embedded autonomous peripherals order minimize latencies improve throughput hard real-time applications well save energy ultra-low-power designs forms autonomous peripherals microcontrollers first introduced around 2005 allowing embedded peripherals work independently cpu even interact certain pre-configurable ways off-loads event-driven communication peripherals help improve real-time performance due lower latency allows potentially higher data throughput due added parallelism since 2009 scheme improved newer implementations continue functioning sleep modes well thereby allowing cpu remain dormant longer periods time order save energy partially driven iot market conceptually autonomous peripheral operation seen generalization mixture direct memory access dma hardware interrupts peripherals issue event signals called event generators producers whereas target peripherals called event users consumers implementations peripherals configured pre-process incoming data perform various peripheral-specific functions like comparing windowing filtering averaging hardware without pass data cpu processing known implementations include
[ 7235, 4773, 9638, 9928, 682, 3882, 11405, 5457, 2517, 10102, 7519 ]
Test
7,605
4
Memory_forensics:memory forensics memory forensics forensic analysis computer memory dump primary application investigation advanced computer attacks stealthy enough avoid leaving data computer hard drive consequently memory ram must analyzed forensic information prior 2004 memory forensics done ad hoc basis using generic data analysis tools like strings grep tools specifically created memory forensics therefore difficult use also provide limited information general primary usage extract text memory dump many operating systems provide features kernel developers end-users actually create snapshot physical memory either debugging core dump blue screen death purposes experience enhancement hibernation computing case microsoft windows crash dumps hibernation present since microsoft windows nt microsoft crash dumps always analyzable microsoft windbg windows hibernation files hiberfil.sys nowadays convertible microsoft crash dumps using utilities like moonsols windows memory toolkit designed matthieu suiche february 2004 michael ford introduced memory forensics security investigations article sysadmin magazine article demonstrated analysis memory based rootkit process utilized existing linux crash utility well two tools developed specifically recover analyze memory forensically memget mempeek 2005 dfrws issued memory analysis forensics challenge response challenge tools generation specifically designed analyze memory dumps created tools knowledge operating system internal data structures thus capable reconstructing operating system process list process information although intended research tools proved operating system level memory forensics possible practical subsequently several memory forensics tools developed intended practical use include commercial tools like memoryze moonsols windows memory toolkit winen belkasoft live ram capturer etc open source tools like volatility new features added analysis linux mac os x memory dumps substantial academic research carried unlike microsoft windows mac os x interest relatively new initiated matthieu suiche 2010 black hat briefings security conference currently memory forensics standard component incident response since 2010 started see utilities focusing visualization aspect memory analysis moonsols livecloudkd presented matthieu suiche microsoft bluehat security briefings inspired new feature microsoft livekd written mark russinovich allow virtual machines introspection accessing memory guest virtual machine host virtual machine order either analyze directly assistance microsoft windbg acquire memory dump microsoft crash dump file format
[ 7618, 2275, 1540, 3109, 3172, 4423, 5284, 10437, 6797, 7983, 8976, 1525, 2747 ]
Validation
7,606
4
Information_diving:information diving information diving practice recovering technical data sometimes confidential secret discarded material recent times chiefly data storage elements discarded computers notably recoverable data remaining hard drives charge discarding computers usually neglect erase hard drive often circumstances information diver copy installed software e.g. word processors operating systems computer games etc. data may also available credit card information stored machine companies claim especially careful customer data number data breaches type entity e.g. education health care insurance government ... suggest problems well uk information diving referred binology earlier times available discarded data included printed manuals design records famous case student jerry schneider discovered discarded manuals telephone system ordering shipping system able build business selling 'surplus gear ordered telephone company though internal company department today files letters memos photographs ids passwords credit cards found dumpsters many people consider sensitive information items discarded may recovered information recovered sometimes usable fraudulent purposes see also identity theft physical information security two mit students purchased large number obsolete computers yard sales like found everything credit card information tax return data published paper remembrance things past documenting discoveries supposedly information diving common 1980s due lax security businesses became aware need increased security early 1990s sensitive documents shredded placed dumpsters still considerable internet activity subject dumpster diving unlikely stopped widespread introduction document shredding security mythology curious hackers malicious crackers commonly use technique dumpster diving commonly practiced watchdog organizations seeking information groups investigating trinity foundation successfully used technique report activities televangelist robert tilton also obtained information benny hinn using practice also sometimes used attorneys agents seeking enforce court-ordered money judgments judgment debtor trash may contain information assets more-readily located levying
[ 3972, 2812, 2558, 4956 ]
Test
7,607
3
Z/Architecture:z/architecture z/architecture initially briefly called esa modal extensions esame ibm 64-bit instruction set architecture implemented mainframe computers ibm introduced first z/architecture-based system z900 late 2000 later z/architecture systems include ibm z800 z990 z890 system z9 system z10 zenterprise 196 zenterprise 114 zec12 zbc12 z13 z14 z/architecture retains backward compatibility previous 32-bit-data/31-bit-addressing architecture esa/390 predecessors way back 32-bit-data/24-bit-addressing system/360 ibm z13 last z systems server support running operating system esa/390 architecture mode however 24-bit 31-bit problem-state application programs originally written run esa/390 architecture unaffected change z/os address space called 64-bit address space 16 exabytes size z/os address space 8 billion times size former 2-gigabyte address space operating systems including z/os generally restrict code execution first 2 gb 31 address bits 2 addressable bytes virtual address space reasons efficiency compatibility rather architectural limits z/os implementation java programming language exception z/os virtual memory implementation supports multiple 2 gb address spaces permitting 2 gb concurrently resident program code 64-bit version linux system z allows code execute within 64-bit address ranges programmers need store large amounts data 64-bit address space usually suffices applications need 16 exabyte data address space employ extended addressability techniques using additional address spaces data-only spaces data-only spaces available user programs called spaces similar areas virtual storage program create 2 gigabytes unlike address space dataspace hiperspace contains user data contain system control blocks common areas program code run dataspace hiperspace dataspace differs hiperspace dataspaces byte-addressable whereas hiperspaces page-addressable traditionally ibm mainframe memory byte-addressable kind memory termed central storage ibm mainframe processors much 1980s 1990s supported another kind memory expanded storage expanded storage 4kb-page addressable application wants access data expanded storage must first moved central storage similarly data movement central storage expanded storage done multiples 4kb pages initially page movement performed using relatively expensive instructions paging subsystem code overhead moving single groups pages central expanded storage reduced introduction mvpg move page instruction admf asynchronous data mover facility capability mvpg instruction admf explicitly invoked—generally middleware z/os z/vm acp —to access data expanded storage uses namely mid-1990s central expanded storage physically different areas memory processor since mid-1990s central expanded storage merely assignment choices underlying processor memory choices made based specific expected uses example expanded storage required hiperbatch function uses mvpg instruction access hiperspaces addition hiperspace paging cases mentioned uses expanded storage including z/os removed support expanded storage memory z/os central storage z/vm continues support expanded storage ibm described mvpg moves single page central processor execute instructions page move completed mvpg mainframe instruction move page opcode x'b254 compared mvcl move character long instruction move 256 bytes within main memory using single instruction instructions comply definitions atomicity although used single instruction within documented timing non-overlap restrictions need move 256 bytes within main memory historically addressed software mvc loops mvcl introduced 1970 announcement system/370 mvpg patented announced ibm 1989 advantages admf asynchronous data mover facility introduced 1992 goes beyond capabilities mvpg move page instruction limited single page move groups pages central expanded storage macro instruction named iosadmf described api avoids direct low-level use admf used read write data hiperspace hiperspaces created using dspserv create provide reentrancy iosadmf used together list form execute form z/vse version 4 z/tpf version 1 z/vm version 5 operating systems presumably successors require z/architecture z/architecture supports running multiple concurrent operating systems applications even use different address sizes allows software developers choose address size advantageous applications data structures platform solutions inc. psi previously marketed itanium-based servers compatible z/architecture ibm bought psi july 2008 psi systems longer available flex-es zpdt hercules emulator also implement z/architecture hitachi mainframes running newer releases vos3 operating system implement esa/390 plus hitachi-unique cpu instructions including 64-bit instructions hitachi likely inspired z/architecture formally collaborated ibm z900-g2/z800 cpus introduced 2002 hitachi machines z/architecture-compatible july 7 2009 ibm occasion announcing new version one operating systems implicitly stated architecture level set 4 als 4 exists implemented system z10 subsequent machines als 4 also specified loadxx archlvl 3 whereas earlier z900 z800 z990 z890 system z9 specified archlvl 2 earlier announcements system z10 simply specified implements z/architecture additions 50+ new machine instructions 1 mb page frames hardware decimal floating point unit hdfu
[ 7173, 6664, 9739, 2066, 7699, 5655, 10779, 10781, 10786, 6181, 8231, 10796, 3630, 6705, 7218, 7733, 2623, 2113, 7234, 2638, 2138, 3175, 8815, 2168, 6268, 3197, 2179, 7313, 663, 1176, 4255, 6815, 5793, 6818, 6821, 7852, 9391, 2224, 2226, 7...
None
7,608
8
Tntnet:tntnet tntnet web server software coded c++ enables c++ programs bundle requests modules enables developing web applications c++ get post requests interpreted tntnet server sent web application program send reply back network tntnet free software released gnu lesser general public license lgpl tntnet provides many features script-based cgi different tradeoffs c++ based tntnet allows use methods object-oriented programming polymorphism also supported modern scripting languages tntnet web application compiled ahead time script-based cgis often interpreted compiled modules native generally faster scripts programs cgid fastcgi used improve performance script-based cgis tntnet directly integrates web application webserver webservers often apis apache http server uses module system internet information services iis uses internet server application programming interface isapi tntnet originally used apache module system changed due difficulty interfacing apache c api maintaining benefits using c++ situation tommi mäkitalo developed tntnet framework tntnet also webserver present source code way tntnet acts layer front actual web application use webserver part receives http requests interpretes sends binary web application part web application webserver communicate constantly extra libraries provide tools programmer tntnet uses library tools named cxxtools build applications written using tntnet cxxtools needed library tntdb database abstraction layer programs developed using tntdb depend specific type underlying database system tntdb handle following database systems
[ 225, 865, 10340, 9481, 5546, 7022, 7983, 4658, 1556, 1812, 5492, 823, 9780, 8539, 2045, 4439 ]
Test
7,609
9
Unspecified_behavior:unspecified behavior unspecified behavior behavior may vary different implementations programming language program said contain unspecified behavior source code may produce executable exhibits different behavior compiled different compiler compiler different settings indeed different parts executable respective language standards specifications may impose range possible behaviors exact behavior depends implementation may completely determined upon examination program source code unspecified behavior often manifest resulting program external behavior may sometimes lead differing outputs results potentially causing portability problems enable compilers produce optimal code respective target platforms programming language standards always impose certain specific behavior given source code construct failing explicitly define exact behavior every possible program considered error weakness language specification would infeasible c c++ languages non-portable constructs generally grouped three categories implementation-defined unspecified undefined behavior exact definition unspecified behavior varies c++ defined behavior well-formed program construct correct data depends implementation c++ standard also notes range possible behaviors usually provided unlike implementation-defined behavior requirement implementation document behavior similarly c standard defines behavior standard provides two possibilities imposes requirements chosen instance unspecified behavior different undefined behavior latter typically result erroneous program construct data requirements placed translation execution constructs c c++ distinguish implementation-defined behavior unspecified behavior implementation-defined behavior implementation must choose particular behavior document example c/c++ size integer data types choice behavior must consistent documented behavior within given execution program many programming languages specify order evaluation sub-expressions complete expression non-determinism allow optimal implementations specific platforms e.g utilise parallelism one sub-expressions side effects result evaluating full-expression may different depending order evaluation sub-expressions example given codice_1 codice_2 modify codice_3 result stored codice_4 may different depending whether codice_5 codice_6 evaluated first c c++ languages also applies function arguments example resulting program write two lines output unspecified order languages java order evaluation operands function arguments explicitly defined
[ 1952, 1316, 8773, 8262, 7627, 10571, 1613, 5677, 335, 4057 ]
Test
7,610
3
Feud_(video_game):feud video game feud 1987 computer game msx zx spectrum home computers among others player takes role sorcerer learic cursed aging must fight evil twin leanoric time runs first game mastertronic distributed bulldog software label countries distributed halloween learic leanoric twins powerful sorcerers hated one day leanoric cast aging curse learic learic player one day defeat leanoric dying real enemy leanoric achieve objective player must collect many herbs scattered across map mix cauldron make offensive defensive spells spells vary fireballs lightning invisibility even turning peaceful villagers zombies compass indicates leanoric location several herbs found garden tended gardener gardener though slow-moving also able inflict damage learic leanoric non-player character thing collecting herbs mix cauldron hunting order attack version game translated brazilian portuguese contains bug causes lock using sprites spell translated version devas
[ 9166, 10931, 4405, 9006 ]
None
7,611
9
MINC:minc minc minc c data specification language written mid-1980s princeton university graduate student named lars graf kind naming known recursive acronym contains many though syntactical capabilities c programming language used implement simple procedural programs executed runtime parser say minc need compiled way minc continues used handful programs written 1980s e.g real-time cmix intents purposes superseded modern scripting languages perl python tcl controversial aspect language whether pronounced mink min-see
[ 8582, 8554, 7535, 692, 2045 ]
None
7,612
9
Statement_(computer_science):statement computer science computer programming statement syntactic unit imperative programming language expresses action carried program written language formed sequence one statements statement may internal components e.g. expressions many imperative languages e.g c make distinction statements definitions statement containing executable code definition instantiating identifier expression evaluates value distinction also made simple compound statements latter may contain statements components following major generic kinds statements pseudocoded pseudocoded statements immediate corresponding syntax typical imperative language like pascal c fortran etc appearance statements shapes look programs programming languages characterized type statements use e.g curly brace language family many statements introduced identifiers like repeat often statement keywords reserved used names variables functions imperative languages typically use special syntax statement looks quite different function calls common methods describe syntax statements backus–naur form syntax diagrams semantically many statements differ subroutine calls handling parameters usually actual subroutine parameter evaluated subroutine called contrasts many statement parameters evaluated several times e.g condition loop e.g loop body loop technically statement parameters call-by-name parameters call-by-name parameters evaluated needed see also lazy evaluation call-by-name parameters available statement like behaviour implemented subroutines see lisp languages without call-by-name parameters semantic description loop conditional usually beyond capabilities language therefore standard documents often refer semantic descriptions natural language languages statements contrast expressions statements return results executed solely side effects expressions always return result often side effects among imperative programming languages algol 68 one statement return result languages mix imperative functional styles lisp family distinction expressions statements made even expressions executed sequential contexts solely side effects whose return values used considered 'expressions purely functional programming statements everything expression distinction frequently observed wording statement executed expression evaluated found codice_17 codice_18 functions found languages python found codice_17 applied statements codice_18 applied expressions languages fixed set statements defined language experiments extensible languages allow programmer define new statements
[ 5635, 3462, 6536, 6160, 155, 9245, 8226, 9634, 5415, 9385, 2105, 2620, 10560, 963, 5316, 8262, 10568, 1611, 7627, 8524, 9804, 9188, 8037, 6502, 7273, 8554, 9454, 240, 9714, 6775, 3960, 8188, 2045 ]
Test
7,613
8
GeoNames:geonames geonames geographical database available accessible various web services creative commons attribution license geonames database contains 25,000,000 geographical names corresponding 11,800,000 unique features features categorized one nine feature classes subcategorized one 645 feature codes beyond names places various languages data stored include latitude longitude elevation population administrative subdivision postal codes coordinates use world geodetic system 1984 wgs84 data accessible free charge number web services daily database export core geonames database provided official public sources quality may vary wiki interface users invited manually edit improve database adding correcting names move existing features add new features etc geonames feature represented web resource identified stable uri uri provides access content negotiation either html wiki page rdf description feature using elements geonames ontology ontology describes geonames features properties using web ontology language feature classes codes described skos language wikipedia articles url linked rdf descriptions geonames data linked dbpedia data rdf linked data crowdsourcing schemes geonames edit interface allows everyone sign edit database hence false information entered information remain undetected especially places accessed frequently studies inaccuracies classifies loss granularity coordinates e.g. due truncation low-resolution geocoding cases wrong feature codes near-identical places placement places outside designated countries manually correcting inaccuracies tedious error prone due database size may require experts literature provides works automatically resolving computing boundary information help detect inconsistencies near-identical places placement locations cities wrong parents provinces countries singh rafiei show boundary information derived work move 20 locations geonames better positions spatial hierarchy accuracy moves 90
[ 10020, 53 ]
None
7,614
2
IPhone_5C:iphone 5c iphone 5c marketed stylized lowercase c iphone 5c smartphone designed marketed apple inc sixth generation iphone device part iphone series unveiled september 10 2013 released september 20 2013 along higher-end counterpart iphone 5s iphone 5c variant iphone 5 similar hardware specifications hard-coated polycarbonate shell instead aluminium original iphone 5 iphone 5c available several color options shipped ios 7 iphone 5c sold discounted price point comparison 5s unlike apple usual practice lowering price previous model upon release new version iphone 5 explicitly discontinued replaced 5c september 9 2014 16 32 gb iphone 5c models replaced 8 gb model announcement iphone 6 iphone 6 plus september 9 2015 8 gb version discontinued iphone 6s announced iphone 5c redesigned using polycarbonate housing strengthened steel band however due material design changes phone weighs 132 grams 20 grams heavier 5 5s still lighter older iphone models design iphone 5c also considerably thicker closely similar design ipod touch 5th generation models also available variety colors different coating finish minor changes include different camera assembly design mute/ringer switch iphone received positive reviews design claiming durable iphone ever unlike subsequent models excluding iphone xr iphone 5c offered several colours blue green yellow coral pink white features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interlock control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode iphone 5c supplied ios 7 released september 20 2013 jony ive designer ios 7 new elements described update bringing order complexity highlighting features refined typography new icons translucency layering physics gyroscope-driven parallaxing major changes design design ios 7 os x mavericks version 10.9 noticeably depart skeuomorphic elements green felt game center wood newsstand leather calendar favor flatter graphic design phone act hotspot sharing internet connection wi-fi bluetooth usb also accesses app store online application distribution platform ios developed maintained apple service allows users browse download applications itunes store developed xcode ios sdk published apple ios 7 adds airdrop ad-hoc wi-fi sharing platform users share files iphone 5 onwards ipod touch 5th generation ipad 4th generation ipad mini operating system also adds control center gives ios users access commonly used controls apps swiping screen–including lock screen–users things switch airplane mode turn wi-fi adjust display brightness similar basic functions device also includes new integrated flashlight function operate reverse camera flash led flashlight functions media player includes apple maps passbook mapping application includes turn-by-turn navigation spoken directions 3d views major cities real-time traffic users rotate device horizontally landscape mode access collage album covers 5c includes siri intelligent personal assistant knowledge navigator application uses natural language user interface answer questions make recommendations perform actions delegating requests set web services apple claims software adapts user individual preferences time personalizes results ios 7 adds new male female voices new system setting functionalities redesign match rest operating system integration twitter wikipedia bing photos highest operating system supports currently ios 10 2016. ios 11 support iphone phone ceased production september 2015 also 32-bit iphone facebook comes integrated apple native apps facebook features directly accessed within native apps calendar sync facebook events use facebook like button within apple app store itunes radio internet radio service also included iphone 5c free ad-supported service available itunes users featuring siri integration ios users able skip tracks customize stations purchase station songs itunes store users also search history previous songs iphone 5c uses hardware iphone 5 minor changes iphone 5c uses system chip soc called apple a6 chip powered iphone 5 soc comprises 1.3 ghz dual-core processor 1 gb ram tri-core powervr sgx543mp3 running 266 mhz. ref name= geekbench test 28/9 /ref iphone 5c new lte antennas cover lte bands smartphone according apple device made unibody hard-coated polycarbonate body steel-reinforced frame also acts antenna iphone 5c available multiple bright colors back — blue green pink yellow white black glass front features 4-inch retina multi-touch display 640×1136 pixel resolution storage capacities available fixed 8 16 32 gb plug-in memory card supported iphone 5c retains 8 mp back camera similar iphone 5 different camera assembly front camera accessible facetime camera app lower resolution 1.2 megapixels rechargeable lithium-ion battery charge capacity 1510mah slightly improved upon iphone 5 1440mah battery integrated replaced user rated ≤225 hours standby time ≤8 hours talk time iphone 5c lacks major new features introduced iphone 5s iphone 5s touch id fingerprint scanner also 64-bit a7 soc m7 motion co-processor however iphone 5c support snapping still photos video recording 3x digital zooming iphone 5c uses nano sim card iphone 5s iphone 5 iphone media event apple announced case iphone 5c available six colors black white pink yellow blue green holes cut case show color iphone back case making almost two-tone looking device although resulted “ iphone ” inscription back appear “ hon. ” cases phone colors make thirty different color combinations inside case lined soft microfiber outside made silicone first time apple released case iphone since iphone 4 iphone 4 bumpers apple also released previously announced dock iphone 5c first time apple made dock since iphone 4 dock received overwhelmingly negative reviews apple online store due incompatibility phone cases iphone 5c received generally mixed reviews phone regarded solid polycarbonate shell considered downgrade lacked 'premium look feel compared aluminum bodies iphone 5 iphone 5s reviewers generally noted iphone 5s offered features thanks 64-bit a7 soc m7 motion co-processor storage space relatively small additional upfront cost 650 usd versus 550 usd march 2014 iphone 5c period phones sold side side 8 gb version iphone 5c released 2014 described unusable 4.9gb available user installing ios 8 contrast iphone 5s offers minimum 16 gb storage iphone 5c regarded expensive compete affordable flagship smartphones nexus 5 oneplus one smartphones designed developing markets moto g. iphone 5s 5c sold nine million units first three days set record first weekend smartphone sales 5s selling three times units iphone 5c first day release 1 iphone us iphone 5s 0.3 iphone 5c. ref name= cnet ip5s/c sales 1 /ref commentators viewed iphone 5c flop supply chain cuts signifying decline demand october 2013 apple ceo tim cook admitted company overstocked iphone 5c shortages iphone 5s result failing anticipate sales ratio phones six months release iphone 5c march 25 2014 apple announced sales iphone line crossed 500 million units break many units iphone 5c iphone 5c among top three best selling phones us three months launch
[ 10755, 9732, 1549, 5647, 7697, 4114, 11289, 7706, 1057, 1576, 6186, 4139, 6700, 1074, 8754, 9784, 1083, 8253, 576, 8783, 4180, 10838, 1623, 3672, 91, 3681, 9826, 8806, 3691, 2673, 6264, 7292, 2686, 6783, 7806, 10878, 8842, 5784, 1177, 425...
None
7,615
2
Windows_HPC_Server_2008:windows hpc server 2008 windows hpc server 2008 released microsoft 22 september 2008 successor product windows compute cluster server 2003 like wccs windows hpc server 2008 designed high-end applications require high performance computing clusters hpc stands high performance computing version server software claimed efficiently scale thousands cores includes features unique hpc workloads new high-speed networkdirect rdma highly efficient scalable cluster management tools service-oriented architecture soa job scheduler mpi library based open-source mpich2 cluster interoperability standards high performance computing basic profile hpcbp specification produced open grid forum ogf june 2008 system built collaboratively national center supercomputing applications ncsa microsoft ranked 23 top500 list ranking world fastest supercomputers linpack score 68.5 teraflops ncsa supercomputer uses windows server hpc red hat enterprise linux 4 november 2011 ranking dropped 253 since windows computers dropped top500 list linux also replaced operating systems list november 2008 rankings published top500 windows hpc system built shanghai supercomputer center achieved peak performance 180.6 teraflops ranked 11 list june 2015 last windows machine left list dropped later ranked 436 barely made top500 windows azure dropping earlier windows hpc server 2008 r2 based windows server 2008 r2 released 20 september 2010 windows hpc server 2008 r2 microsoft released hpc pack 2008 r2 four flavors express enterprise workstation cycle harvesting later simplified offer releasing hpc pack 2012 combined capabilities four versions hpc pack 2008 r2 hpc pack 2012 installed top windows server 2012 standard datacenter
[ 8576, 641, 10625, 3463, 7432, 651, 4107, 6797, 8080, 3857, 8976, 10896, 2196, 11283, 4505, 5273, 4515, 11301, 3496, 6441, 6697, 1581, 3250, 3890, 9910, 6462, 321, 7106, 582, 5830, 1098, 10957, 9173, 11605, 2391, 3289, 4316, 8798, 11103, 5...
Validation
7,616
9
RPL_(programming_language):rpl programming language /ref rpl derived reverse polish lisp according original developers whilst short 1987 hp marketing attempted coin backronym rom-based procedural language handheld calculator operating system application programming language used hewlett-packard scientific graphing rpn reverse polish notation calculators hp 28 48 49 50 series also usable non-rpn calculators 38 39 40 series rpl structured programming language based rpn equally capable processing algebraic expressions formulae implemented threaded interpreter rpl many similarities forth languages stack-based well list-based lisp contrary previous hp rpn calculators fixed four-level stack stack used rpl limited available calculator ram rpl originated hp corvallis oregon development facility 1984 replacement previous practice implementing operating systems calculators assembly language last pocket calculator supporting rpl hp 50g discontinued 2015 however multiple emulators emulate hp rpl calculators exist run range operating systems devices including ios android smartphones internal low- medium-level variant rpl called system rpl sysrpl used earlier hp calculators well aforementioned ones part operating system implementation language hp 48 series variant rpl accessible calculator user without use external tools hp 49/50 series compiler built rom use sysrpl possible cause serious crash coding sysrpl caution must used using high-level user rpl userrpl version language available said graphing calculators developing textual well graphical application programs userrpl programs internally represented sysrpl programs use safe subset available sysrpl commands error checking part userrpl commands however makes userrpl programs noticeably slower equivalent sysrpl programs userrpl command syseval tells calculator process designated parts userrpl program sysrpl code rpl control blocks strictly postfix although notable exceptions control block structures appear would standard infix language calculator manages allowing implementation blocks skip ahead program stream necessary rpl supports basic conditional testing if/then/else structure basic syntax block following example tests see number bottom stack 1 replaces equal one construct evaluates condition tests bottom stack result result rpl optionally support forth-style blocks allowing condition determined block leaving condition empty statement make changes stack condition execution use existing result bottom stack test postfix conditional testing may accomplished using ift if-then ifte if-then-else functions ift ifte pop two three commands stack respectively topmost value evaluated boolean true second topmost value pushed back stack ifte allows third else value pushed back stack boolean false following example uses ift function pop object bottom stack equal 1 replaces one following example uses ifte function pop object bottom stack equal 1 replaces one equal 1 replaces string one ift ifte evaluate program block given one arguments allowing compact form conditional logic if/then/else/end structure following example pops object bottom stack replaces one less depending whether equal less greater 1 support complex conditional logic rpl provides case/then/end structure handling multiple exclusive tests one branches within case statement executed basic syntax block following code illustrates use case/then/end block given letter bottom stack replaces string equivalent unknown letter code identical following nested if/then/else/end block equivalent rpl provides for/next statement looping one index another index loop stored temporary local variable accessed loop syntax for/next block following example uses loop sum numbers 1 10 index variable loop start/next block used simple block runs start index end index unlike for/next loop looping variable available syntax start/next block for/next start/next support user-defined step increment replacing terminating next keyword increment step keyword loop variable incremented decremented different value default +1 instance following loop steps back 10 2 decrementing loop index 2 while/repeat/end block rpl supports indefinite loop condition test start loop syntax while/repeat/end block do/until/end block rpl supports indefinite loop condition test end loop syntax do/until/end block
[ 4992, 9345, 10752, 11269, 3334, 6919, 5384, 7562, 2062, 9231, 1301, 9749, 9877, 8728, 4633, 6556, 797, 3869, 2335, 6047, 10012, 8226, 4516, 5031, 9128, 5803, 7983, 2225, 10547, 11255, 311, 2105, 7867, 6717, 4799, 3904, 5569, 6594, 8771, 4...
Validation
7,617
2
Nokia_5530_XpressMusic:nokia 5530 xpressmusic nokia 5530 xpressmusic smartphone nokia announced june 15 2009 part xpressmusic series phones emphasizes music multimedia playback nokia third touchscreen phone 5800 n97 based symbian os s60 5th edition platform terms specifications rests lower nokia 5230 higher 5800 bearing much lower price tag lacks 5800 3g capability gps receiver compact sleek design models well stereo speakers
[ 1537, 8577, 6276, 3205, 11271, 11655, 9359, 1424, 529, 2449, 659, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 1833, 3626, 5290, 10410, 9137, 10802, 7220, 821, 5175, 7866, 1083, 1216, 1728,...
Train
7,618
4
Volatility_(memory_forensics):volatility memory forensics volatility open-source memory forensics framework incident response malware analysis written python supports microsoft windows mac os x linux version 2.5 volatility created computer scientist entrepreneur aaron walters drawing academic research memory forensics volatility supports investigations following memory images windows mac osx linux volatility supports variety sample file formats ability convert formats
[ 3395, 2275, 5284, 8554, 6797, 7983, 7605, 823, 7515 ]
Validation
7,619
4
Alisa_Shevchenko:alisa shevchenko alisa shevchenko also known alisa esage шевченко russian hacker recognised working companies find vulnerabilities systems self-described “ offensive security researcher ” 2014 profile national geographic says shevchenko 'she drawn hacking programming dropping school worked virus analytics expert kaspersky labs five years 2009 founded company esage labs later known цои security russian acronym stands цифровое оружие и защита “ digital weapons defense. ” shevchenko company цои security placed list us sanctioned agents accused helping vladimir putin bid swing 2016 election trump regarding white house accusations shevchenko stated record authorities either misinterpreted facts deceived shevchenko winner phdays iv critical infrastructure attack contest successfully hacking fake smart city detecting several zero-day vulnerabilities indusoft web studio 7.1 schneider electric alisa also awarded zero day initiative zdi owned u.s. tech giant hp uncovering two vulnerabilities microsoft products 2014 work featured security industry publication virus bulletin regarding driving motivations alisa shevchenko said kinda ironic still aspiring inspire women obvious anti-hero wonder google government- ltd global player big gov'ts clashing absurdity show private security firm wapack labs part corporate/cyber intelligence sharing community red sky alliance claim former employee shevchenko company цои security responsible blackenergy virus blackenergy virus used targets georgia ukraine prior russian invasions nations poland belgium also targeted malware attacks using blackenergy virus malware thought created person persons connected persons linked using security services codename sandworm connections made instagram shevchenko software industry developer peter david carter
[ 7809, 4830 ]
None
7,620
4
Juliana_Mickwitz:juliana mickwitz juliana mickwitz 1889-1976 finnish-born russian became naturalized american citizen employed american military later national security agency translator linguist cryptanalyst inducted cryptologic hall honor 2012 juliane charlotte ernestine von mickwitz born elisabeth marie caroline née von dittmann ernst theodor leopold von mickwitz aka mikvits minckwitz 15 may 1889 vyborg grand duchy finland russian empire grandfather estate called halila oldest two children brother alexander would later join united states learning english german russian home tutor entered st ann gymnasium saint petersburg 1903 graduated gold medal excellence 1907 tutored students 1909 year began working secretary michael lazareff president russian unified oil company continued working widow eugenia lazareff death 1919 rise bolsheviks russian civil war mickwitz managed hide assets lazareff turn secured passage poland story mickwitz engaged polish doctor 15 april 1920 two women arrived warsaw mickwitz began trying preserve lazareff assets outside soviet union protect confiscation worked translator various organizations including american consulate warsaw british embassy canadian us timber corporation 1925 year began working foreign correspondent polish agricultural syndicate kooprolna cooperative year applied full-time position american military attaché office 1926 mickwitz became employed us military attaché office warsaw working major general william h. colbern colonel r. i. mckenney colonel john winslow general emer yeager thirteen years worked warsaw nazi invasion poland december 1939 transferred rest office hague netherlands taking lazareff aunt months germans invaded low countries office evacuated berlin three months august 1940 relocated athens germans followed july 1941 mickwitz lazareff fled lisbon assistance former employers able secure travel visas united states march 1942 arriving u.s. mickwitz began working war department military intelligence directorate translating german polish russian documents october 1946 released service awarded meritorious civilian service medal month hired army security agency stationed arlington hall 1952 transferred national security agency nsa founded linguistic unit managed translate plaintext voice remained agency 1963 retired receiving second meritorious service award continued consult nsa 1966 inducted cryptologic hall honor 2012 mickwitz member russian orthodox church helped founding construction russian orthodox cathedral st. john baptist washington dc served head parish many years worked establish congress russian americans virginia help russian immigrants became naturalized american citizen mickwitz died 21 august 1976 sacred heart nursing home hyattsville maryland suffering stroke previous november priest greece father nicolas pekatoros officiated funeral
[ 7887 ]
Validation
7,621
4
Active_hard-drive_protection:active hard-drive protection computer hardware active hard-drive protection refers technology attempts avoid reduce mechanical damage hard disk drives preparing disk prior impact approach mainly used laptop computers frequently carried around prone impacts desktop computers usually system consists accelerometers alert system excess acceleration vibration detected software tells hard disk unload heads prevent coming contact platter thus potentially preventing head crash many laptop vendors implemented technology different names hard-disk drives also include technology needing cooperation system
[]
None
7,622
3
Sokoban:sokoban sokoban created 1981 hiroyuki imabayashi published december 1982 thinking rabbit software house based takarazuka japan game played board squares square floor wall floor squares contain boxes floor squares marked storage locations player confined board may move horizontally vertically onto empty squares never walls boxes player also move box pushes square beyond boxes may pushed boxes walls pulled number boxes equal number storage locations puzzle solved boxes storage locations 1988 sokoban published us spectrum holobyte soko-ban ibm-pc compatible computers commodore 64 apple ii series game title screen text copyright 1984 ascii corp. reference copyrights publishing date review computer gaming world praised game pure simple playable mentally challenging citing addictive qualities also reviewed dragon giving 4½ 5 stars sokoban hit japan sold 400,000 units country time spectrum holobyte imported united states implementations sokoban written numerous computer platforms including almost home computer personal computer systems versions also exist video game consoles mobile phones graphic calculators digital cameras electronic organizers sokoban studied using theory computational complexity problem solving sokoban puzzles proven np-hard work showed significantly difficult np problems pspace-complete also interesting artificial intelligence researchers solving sokoban compared automated planning needs done robot moves boxes warehouse sokoban difficult due branching factor comparable chess also enormous search tree depth levels extended indefinitely iteration requiring exponentially growing number moves pushes skilled human players rely mostly heuristics usually able quickly discard futile redundant lines play recognize patterns subgoals drastically cutting amount search sokoban puzzles solved automatically using single-agent search algorithm ida* enhanced several techniques make use domain-specific knowledge method used rolling stone sokoban solver developed university alberta games group complex sokoban levels however reach even best automated solvers several puzzles considered variants original sokoban game sense make use controllable character pushes boxes around maze alternative tilings standard game mazes laid square grid several variants apply rules sokoban mazes laid tilings hexoban uses regular hexagons trioban uses equilateral triangles multiple pushers variants multiban interlock player control multiple characters alternative goals several variants adjust requirements completing level example block-o-mania boxes different colours goal push onto squares matching colours sokomind plus implements similar idea boxes target squares uniquely numbered interlock sokolor boxes also different colours goal move similarly coloured boxes adjacent cyberbox level designated exit square goal reach exit variant called beanstalk elements level must pushed onto goal fixed sequence additional game elements push crate sokonex xsok cyberbox block-o-mania add new elements basic puzzle examples include holes teleports moving blocks one-way passages character actions pukoban character pull boxes addition pushing destructible walls early sokoban 1982 nec pc-8801 game featured levels destructible walls order solve levels player make destructible wall elements disappear walking wall push certain side unwalkable targets variants make empty target tiles unwalkable becoming walkable occupied crate common sokoban-type levels lasertank chip challenge reverse mode player solves puzzle backwards end initial position pulling instead pushing boxes standard sokoban puzzles played reverse mode reverse mode solutions converted solutions standard-mode puzzles therefore reverse mode also instrumental solving standard sokoban puzzles
[ 9735, 7019, 6129, 6867, 1787 ]
None
7,623
4
Data_Protection_Act_2018:data protection act 2018 data protection act 2018 c 12 united kingdom act parliament updates data protection laws uk national law complements european union general data protection regulation gdpr updates data protection act 1998 data protection act 2018 achieved royal assent 23 may 2018 applies eu gdpr standards whereas gdpr gives member states limited opportunities make provisions applies country one element dpa 2018 details applying national law dpa 2018 however limited uk gdpr provisions act seven parts outlined section 1 act introduces new offences include knowingly recklessly obtaining disclosing personal data without consent data controller procuring disclosure retaining data obtained without consent selling offering sell personal data knowingly recklessly obtained disclosed would also offence essentially act implements eu law enforcement directive implements parts gdpr 'are determined member state law creates framework similar gdpr processing personal data outside scope gdpr includes intelligence services processing immigration services processing processing personal data held unstructured form public authorities section 3 european union withdrawal act 2018 gdpr incorporated directly domestic law immediately uk exits european union
[ 3858, 5133, 9901 ]
Test
7,624
4
Smudge_attack:smudge attack smudge attack method discern password pattern touchscreen device cell phone tablet computer method investigated team university pennsylvania researchers reported 4th usenix workshop offensive technologies smudge attack relies detecting oily smudges left behind user fingers operating device using simple cameras image processing software proper lighting camera settings finger smudges easily detected heaviest smudges used infer frequent user input pattern password researchers able break password 68 time proper conditions research widely covered technical press including reports pc pro zdnet engadget threat recognized least one product introduced whisper systems mitigate risk
[ 3810, 6916, 9356, 2558, 8671 ]
Validation
7,625
4
GoGuardian:goguardian goguardian founded 2014 based los angeles ca offer four core products including goguardian admin web filtering goguardian teacher classroom management goguardian fleet chrome device management goguardian beacon suicide self harm alerting services enable school administrators monitor student activity online filter potentially harmful distracting content help students need june 2018 goguardian claimed active 10,150 schools protect five million students 2018 goguardian named fastest growing education company inc 500 goguardian founded 2014 based los angeles ca feature set includes chromebook filtering monitoring management well usage analytics activity flagging theft recovery device running chrome operating system chrome os goguardian also offers filtering functionality third-party tools youtube services enable school administrators monitor student activity online filter potentially harmful distracting content recover lost stolen devices june 2015 goguardian claimed active 1,600 estimated 15,000 school districts united states january 2015 los angeles unified school district lausd chose goguardian support 1:1 device rollout program 661,000 students chromebooks one device options lausd 1:1 rollout partnership provides lausd device tracking grade-level-specific filtering capabilities facilitates compliance children internet protection act cipa september 2015 company unveiled goguardian teachers tool designed help teachers manage chromebook usage classrooms monitor student activity device goal tool help keep students on-task away inappropriate content january 2016 goguardian announced launch google classroom integration goguardian teachers january 2016 two company co-founders aza steel advait shinde named forbes magazine annual 30 30 list education category 2018 goguardian launched beacon suicide prevention tool aimed help school counselors discover students silently suffering based online activity behavior 2018 goguardian acquired private equity firm sumeru equity partners appointed tony miller board directors afsp 2018 goguardian partnered american foundation suicide prevention provide free prevention training schools https //www.businesswire.com/news/home/20180904005255/en/american-foundation-suicide-prevention-partners-goguardian-provide aas 2017 goguardian announced partnership american association suicidology help tackle youth suicide crisis every school purchases beacon receive on-site sad training free charge http //www.businesswire.com/news/home/20170911005211/en/goguardian-american-association-suicidology-join-forces-tackle google education partner https //edu.google.com/products/classroom/apps/ modal_active=none story-card_activeel=connect-with-school-systems global educator institute endorsed goguardian teacher http //geiendorsed.com/products/goguardian/
[]
Test
7,626
2
CUPS:cups cups formerly acronym common unix printing system modular printing system unix-like computer operating systems allows computer act print server computer running cups host accept print jobs client computers process send appropriate printer cups consists print spooler scheduler filter system converts print data format printer understand backend system sends data print device cups uses internet printing protocol ipp basis managing print jobs queues also provides traditional command line interfaces system v berkeley print systems provides support berkeley print system line printer daemon protocol limited support server message block smb protocol system administrators configure device drivers cups supplies editing text files adobe postscript printer description ppd format number user interfaces different platforms configure cups built-in web-based interface cups free software provided apache license michael sweet owned easy software products started developing cups 1997 first public betas appeared 1999 original design cups used line printer daemon protocol lpd protocol due limitations lpd vendor incompatibilities internet printing protocol ipp chosen instead cups quickly adopted default printing system linux distributions march 2002 apple inc. adopted cups printing system mac os x 10.2 february 2007 apple inc. hired chief developer michael sweet purchased cups source code cups provides mechanism allows print jobs sent printers standard fashion print-data goes scheduler sends jobs filter system converts print job format printer understand filter system passes data backend —a special filter sends print data device network connection system makes extensive use postscript rasterization data convert data format suitable destination printer cups offers standard modularised printing system process numerous data formats print server cups difficult find standard printer management system would accommodate wide variety printers market using printer languages formats instance system v berkeley printing systems largely incompatible required complicated scripts workarounds convert program data format printable format often could detect file format sent printer thus could automatically correctly convert data stream additionally data conversion performed individual workstations rather central server cups allows printer manufacturers printer-driver developers easily create drivers work natively print server processing occurs server allowing easier network-based printing unix printing systems samba installed users address printers remote windows computers generic postscript drivers used printing across network cups scheduler implements internet printing protocol ipp http/1.1 helper application cups-lpd converts line printer daemon protocol lpd requests ipp scheduler also provides web-based interface managing print jobs configuration server documentation cups authorization module controls ipp http messages pass system ipp/http packets authorized sent client module listens processes incoming connections client module also responsible executing external cgi programs needed support web-based printers classes job status monitoring administration module processed requests sends ipp module performs uniform resource identifier uri validation prevent client sidestepping access controls authentication http server uri text string indicates name address used refer abstract physical resource network scheduler allows classes printers applications send requests groups printers class allowing scheduler direct job first available printer class jobs module manages print jobs sending filter backend processes final conversion printing monitoring status messages processes cups scheduler utilizes configuration module parses configuration files initializes cups data structures starts stops cups program configuration module stop cups services configuration file processing restart service processing complete logging module handles logging scheduler events access error page log files main module handles timeouts dispatch i/o requests client connections watching signals handling child process errors exits reloading server configuration files needed modules used scheduler include cups process variety data formats print server converts print-job data final language/format printer via series filters uses mime types identifying file formats cups system assigned print job scheduler passed cups filter system converts data format suitable printer start-up cups daemon loads two mime databases codice_1 defines known file types cups accept data codice_2 defines programs process particular mime type codice_1 file syntax codice_4 example detect html file following entry would applicable codice_5 second line matches file contents specified mime type determining first kilobyte text file holds printable characters characters include html markup pattern matches filter system would mark file mime type text/html codice_2 file syntax codice_8 source field designates mime type determined looking codice_1 file destination field lists type output requested determines program used also retrieved codice_1 cost field assists selection sets filters converting file last field program determines filter program use perform data conversion examples filtering process works taking input data pre-formatted six arguments determines type data input filter used use mime databases instance image data detected processed particular filter html data detected processed another filter cups convert supplied data either postscript data directly raster data converted postscript data additional filter applied called prefilter runs postscript data another postscript converter add printer specific options like selecting page ranges print setting n -up mode device-specific things pre-filtering done data either sent directly cups backend using postscript printer passed another filter like foomatic linuxprinting.org alternatively passed ghostscript converts postscript intermediary cups-raster format intermediary raster format passed onto final filter converts raster data printer-specific format default filters included cups include however several alternatives integrate cups hplip previously known hp-ijs provides linux+cups drivers hp printers gutenprint previously known gimp-print range high-quality printer drivers mostly inkjet printers turboprint linux another range quality printer drivers wide range printers backends ways cups sends data printers several backends available cups parallel serial usb ports cups-pdf pdf virtual printing well network backends operate via ipp jetdirect appsocket line printer daemon lpd smb protocols new codice_11 backend cups 1.4 provides bonjour dns-sd based printer discovery cups 1.6 bonjour printer discovery sharing using avahi also supported cups provides system v berkeley printing commands users continue traditional commands printing via cups cups uses port 631 tcp udp standard ipp port optionally port 515 inetd launchd solaris service management facility xinetd use cups-lpd helper program support lpd printing cups installed codice_12 system v printing system command codice_13 berkeley printing system commands installed compatible programs allows standard interface cups allows maximum compatibility existing applications rely printing systems several tools exist help set cups platforms cups web-based administration interface runs port 631 particularly helps organisations need monitor print jobs add print queues printers remotely cups 1.0 provided simple class job printer-monitoring interface web browsers cups 1.1 replaced interface enhanced administration interface allows users add modify delete configure control classes jobs printers cups 1.2 later provide revamped web interface features improved readability design support automatically discovered printers better access system logs advanced settings gnome print settings formerly called cups manager add new cups printers manage cups printers queues gnome widget toolkit gtk+ included integrated printing support based cups version 2.10 released 2006 ubuntu accessed graphical menu system administration printing kdeprint framework kde contains various gui-tools act cups front-ends allows administration classes print queues print jobs includes printer wizard assist adding new printers amongst features kdeprint first appeared kde 2.2 kdeprint supports several different printing platforms cups one best-supported replaced previous version printing support kde qtcups backwards compatible module kde kprinter dialogue-box program serves main tool sending jobs print device also started command line kdeprint includes system pre-filter jobs handed cups handle jobs converting files pdf filters described pair desktop/xml files kdeprint main components include mac os x 10.5 printers configured print fax panel system preferences printer proxy applications display print queues allow additional configuration printers set earlier versions mac os x also included printer setup utility supplied configuration options missing earlier versions print fax preference pane printersetup system manage cups queues takes approach assigning text file describe print queue 'printersetupfiles may added text files called 'printersetuplists allows logical grouping printers printersetup project remains infancy starting red hat linux 9 red hat provided integrated print manager based cups integrated gnome allowed adding printers via user interface similar one microsoft windows uses new printer could added using add new printer wizard along changing default printer-properties window containing list installed printers jobs could also started stopped using print manager printer could paused using context menu pops printer icon right-clicked eric raymond criticised system piece luxury ignorance raymond attempted install cups using fedora core 1 print manager found non-intuitive criticised interface designers designing user point-of-view mind found idea printer queues obvious users create queues local computer queues actually created cups server also found plethora queue type options confusing could choose networked cups ipp networked unix lpd networked windows smb networked novell ncp networked jetdirect found help file singularly unhelpful largely irrelevant user needs raymond used cups general topic show user interface design linux desktops needs rethinking careful design stated meta-problem configuration wizard approved rituals gui standardized clicky buttons help popping browser etc etc n't central attribute supposed achieve discoverability quality every point interface prompts actions attached learn next project quality easy software products original creators cups created gui provided support many printers implemented postscript rip esp print pro ran windows unix linux longer available support product ended december 31 2007 cups initially called common unix printing system name shortened cups beginning cups 1.4 due legal concerns unix trademark
[ 8832, 3969, 514, 7554, 10885, 3974, 3976, 4490, 780, 6797, 10255, 7696, 8977, 5397, 1177, 2462, 546, 1699, 4002, 6693, 3750, 8360, 8877, 6830, 7983, 2864, 2737, 8627, 8628, 2485, 5433, 9418, 9035, 3916, 1101, 8909, 10960, 6993, 8147, 1877...
None
7,627
9
Expression_(computer_science):expression computer science expression programming language combination one constants variables operators functions programming language interprets according particular rules precedence association computes produce return stateful environment another value process mathematical expressions called evaluation simple settings resulting value usually one various primitive types numerical string logical complex data type many others example codice_1 arithmetic programming expression evaluates codice_2 variable expression denotes value memory codice_3 expression example relational expression codice_4 evaluates codice_5 c c-derived languages call function void return type valid expression type void values type void used value expression always thrown away many programming languages function hence expression containing function may side effects expression side effects normally property referential transparency many languages e.g c++ expressions may ended semicolon codice_6 turn expression expression statement asks implementation evaluate expression side-effects disregard result expression e.g x+1 unless part expression statement induces side-effects e.g y=x+1 func1 func2 note formal notion side effect change abstract state running program another class side effects changes concrete state computational system loading data cache memories languages often described side effect–free generally still concrete side effects exploited example side-channel attacks furthermore elapsed time evaluating expression even one apparent side effects sometimes essential correct operation system behaviour time easily visible outside evaluation environment parts system interacts might even regarded primary effect performing benchmark testing depends particular programming language specification whether expression abstract side effects legally eliminated execution path processing environment expression evaluated
[ 256, 3462, 8582, 6536, 9482, 10389, 3991, 2456, 9497, 8221, 9245, 1568, 10145, 8226, 4389, 5415, 9385, 944, 1841, 5168, 7609, 10043, 7612, 6718, 963, 8262, 10571, 7373, 7386, 4572, 477, 3045, 10469, 8554, 9454, 10097, 502, 6775, 2936, 204...
None
7,628
7
Cloudify:cloudify cloudify open source software cloud nfv orchestration product originally created gigaspaces technologies spun company cloudify uses oasis tosca technology written python programming language licensed apache license version 2.0 source files found forked github built yaml dsl domain specific language configuration files called blueprints define application configurations services tier dependencies cloudify automates deployment phases applications cloud computing virtualization infrastructure blueprints describe application interacts data center apis execute defined blueprint configurations blueprint files describe execution plans lifecycle application installing starting terminating orchestrating monitoring application stack cloudify uses blueprint input describes deployment plan responsible executing cloud environments blueprint also employs cloud driver configuration files well describe machines images chosen cloud making possible manage infrastructure code component describes location binaries installation monitoring configurations creating abstraction layer isolates code underlying infrastructure cloudify able support cloud cloudify also supports configuration management tools like chef puppet ansible application deployment phase method deploying configuring application services cloudify mentioned marketing publications including venturebeat cloudbeat showdown 2011 crn 20 coolest cloud platforms development vendors 2012 2014 2018 2012 sd times 100 software development superfecta cloud leader recognized frost sullivan 2015 global frost sullivan award new product innovation cloudify together vmware athonet 2016 “ best show ” award tokyo interop event demonstration fastest simplest cloud-based deployment virtualized lte mobile packet core volte service cloudify featured breakdown nfv orchestration platforms mirantis emerged mature orchestration solution among reviewed platforms agile reference implementation automation aria open source mano group spawned cloudify “ mano software year ” network virtualization industry 2016 awards cloudify awarded 2017 layer123 network transformation award best vcpe/ucpe enterprise service cloud carrier service category cloudify member various collaborative projects open source communities cloudify used open-o vmware deutsche telekom orange within opnfv metaswitch proximus telstra partner communications mavenir among others cloudify also founding platinum member onap
[ 11393, 4802, 4194, 6153, 8554, 4011, 2795, 11221, 253, 7198 ]
None
7,629
2
Windows_Runtime_XAML_Framework:windows runtime xaml framework 'windows runtime xaml framework code name jupiter user interface api part windows runtime winrt programming model forms backbone windows store apps formerly known metro-style immersive windows 8 windows 8.1 windows phone 8.1 operating systems enables declaring user interfaces using extensible application markup language xaml technology xaml framework one multiple ui apis windows runtime others html5 e.g. via winjs directx windows phone 8.0 windows runtime xaml framework supported xaml applications based silverlight xaml framework deployed xap format windows phone 8.1 windows runtime xaml available along improved windows runtime support convergence platforms enable universal apps target windows 8.1 windows phone 8.1 sharing code including user interface windows phone 8.1 still capable running silverlight based xaml apps new features api also added framework called silverlight 8.1 xaml framework related windows presentation foundation wpf silverlight—similar xaml-based ui frameworks used desktop applications portable applications respectively xaml framework uses lot names apis older technologies—especially silverlight use limited windows os specifically windows 8 later wpf major difference silverlight wpf largely based common language runtime clr require using programming languages c visual basic xaml framework part windows runtime written native code also available tools development c++ c++/cx
[ 10243, 2062, 10769, 9234, 1043, 9245, 3102, 1055, 2083, 8227, 1577, 2603, 5165, 5677, 3631, 4143, 9263, 11316, 1077, 8246, 576, 8771, 4174, 4178, 9813, 10841, 603, 2145, 2658, 5743, 8303, 2673, 8304, 1656, 9848, 5754, 7292, 9340, 1664, 57...
Test
7,630
9
Roger_Hui:roger hui roger hui born 1953 computer scientist codeveloper programming language j 1953 born hong kong 1966 immigrated canada whole family 1973 hui entered university alberta second year took course probability statistics students expected learn programming language apl little formal instruction used time could muster heavily-burdened computer benefited apl\360 user manual book apl language published march 1975 manual written adin falkoff kenneth e. iverson hui thinks reasonable say learned apl falkoff iverson summer student 1975 1976 hui worked i. p. sharp associates ipsa calgary workspaces statistical probability calculations major attraction job unrestricted computer time access apl receiving b.sc degree first class honors computer science 1977 hui worked two years full-time programmer analyst new edmonton office ipsa main duty support clients use apl time-sharing attended apl79 conference rochester new york iverson gave two papers role operators apl derivative operator way hui stopped ipsa toronto obtained copy operators functions ibm research report 7091 1978 studying paper successors ever since september 1979 hui entered department computer science university toronto received m.sc may 1981 thesis complexity decompositions matrix algebra completing master degree hui worked 1981 1985 apl systems analyst programmer alberta energy company edmonton february 1982 hui purchased source book apl 1981 memorable papers design apl 1973 evolution apl 1978 notation tool thought 1980 hui work described apl85 conference paper design financial modelling system written jointly supervisor fred appleyard basic objects system direct definition iverson 1976 1980 falkoff iverson design apl cited hui left alberta energy shortly promoted non-apl non-programming position work access computers september 1985 april 1986 gave plenty time intense study iverson rationalized apl 1983 dictionary apl language named early 1990s ken iverson hui began collaborating advanced continuation apl-like language named j improvements intended fix persistent character set issues plagued apl since inception add new advanced features support parallel multiple instruction multiple data mimd operations intended j language improvement extant apl j interpreter language continue evolve 1996 received kenneth e. iverson award outstanding contribution apl
[ 9993, 1178, 8987, 667, 10668, 4921, 9019, 11075, 8262, 1099, 2519, 1883, 11099, 9825, 11625, 4331, 2670, 9714, 8695, 505, 3323 ]
Test
7,631
3
List_of_ARM_microarchitectures:list arm microarchitectures list microarchitectures based arm family instruction sets designed arm holdings 3rd parties sorted version arm instruction set release name arm provides summary numerous vendors implement arm cores design keil also provides somewhat newer summary vendors arm based processors arm provides chart displaying overview arm processor lineup performance functionality versus capabilities recent arm core families dhrystone synthetic benchmark developed 1980s longer representative prevailing workloadsuse caution cores implement arm instruction set developed independently companies architectural license arm following table lists core year announced cores arm7 n't included table
[ 7170, 2574, 8720, 11282, 9235, 11289, 1057, 38, 4139, 8237, 9774, 2097, 7218, 8250, 8253, 7745, 7235, 7747, 2635, 99, 8812, 11374, 8815, 10361, 638, 644, 9863, 8842, 146, 659, 1170, 6296, 7833, 666, 5786, 6815, 4258, 4773, 9913, 1722, 8...
Validation
7,632
8
Path_analysis_(computing):path analysis computing path analysis analysis path portrayal chain consecutive events given user cohort performs set period time using website online game ecommerce platform subset behavioral analytics path analysis way understand user behavior order gain actionable insights data path analysis provides visual portrayal every event user cohort performs part path set period time possible track user ’ path site even show path visual representation real question gain actionable insights path analysis simply outputs pretty graph may look nice provide anything concrete act upon order get path analysis first step would determine needs analyzed goals analysis company might trying figure site running slow certain types users interested certain pages products user interface set logical way goal set ways performing analysis large percentage certain cohort people ages 18-25 logs online game creates profile spends next 10 minutes wandering around menu page may user interface logical seeing group users following path developer able analyze data realize creating profile “ play game ” button appear thus path analysis able provide actionable data company act fix error ecommerce path analysis help customize shopping experience user looking products customers certain cohort looked buying one company suggest “ items may also like ” next customer increase chances making purchase also path analysis help solve performance issues platform example company looks path realizes site freezes certain combinations events analyzing path progression events led error company pinpoint error fix historically path analysis fell broad category website analytics related analysis paths websites path analysis website analytics process determining sequence pages visited visitor session prior desired event visitor purchasing item requesting newsletter precise order pages visited may may important may may specified practice analysis done aggregate ranking paths sequences pages visited prior desired event descending frequency use idea determine features website encourage desired result fallout analysis subset path analysis looks black holes site paths lead dead end frequently paths features confuse lose potential customers advent big data along web-based applications online games ecommerce platforms path analysis come include much web path analysis understanding users move app game web platform part modern-day path analysis real world visit shop shelves products placed random order shop owner carefully analyzes visitors path walk shop especially selecting buying products next shop owner reorder shelves products optimize sales putting everything logical order visitors supermarket typically result wine shelf next variety cookies chips nuts etc simply people drink wine eat nuts web sites logic applied visitors questions product go product information support section web site make logical step frequently asked questions page specific question web site owner also wants analyze visitor behavior example web site offers products sale owner wants convert many visitors completed purchase sign-up form multiple pages web site owners want guide visitors final sign-up page path analysis answers typical questions like visitors go enter home page strong visitor relation product product b web site questions ca n't answered page hits unique visitors statistics google analytics provides path function funnels goals predetermined path web site pages specified every visitor walking path goal approach helpful analyzing many visitors reach certain destination page called end point analysis paths visitors walk web site lead endless number unique paths result point analyzing path look strongest paths strongest paths typically shown graphical map text like page -- page b -- page -- exit
[]
Validation
7,633
4
TeslaCrypt:teslacrypt teslacrypt ransomware trojan defunct master key released developers early forms teslacrypt targeted game-play data specific computer games newer variants malware also affect file types original game-player campaign upon infection malware searched 185 file extensions related 40 different games include call duty series world warcraft minecraft world tanks encrypted files files targeted involve save data player profiles custom maps game mods stored victim hard drives newer variants teslacrypt focused computer games alone also encrypted word pdf jpeg files cases victim would prompted pay ransom 500 worth bitcoins order obtain key decrypt files although resembling cryptolocker form function teslacrypt shares code cryptolocker developed independently malware infected computers via angler adobe flash exploit even though ransomware claimed teslacrypt used asymmetric encryption researchers cisco talos group found symmetric encryption used developed decryption tool deficiency changed version 2.0 rendering impossible decrypt files affected teslacrypt-2.0 november 2015 security researchers kaspersky quietly circulating new weakness version 2.0 carefully keeping knowledge away malware developer could fix flaw january 2016 new version 3.0 discovered fixed flaw full behavior report shows behaviorgraphs executiongraphs published joesecurity may 2016 developers teslacrypt shut ransomware released master decryption key thus bringing end ransomware days eset released public tool decrypt affected computers charge
[ 131, 10756, 6797, 7983, 1970, 535, 7515, 1087 ]
Test
7,634
9
Attribute_grammar:attribute grammar attribute grammar formal way define attributes productions formal grammar associating attributes values evaluation occurs nodes abstract syntax tree language processed parser compiler attributes divided two groups synthesized attributes inherited attributes synthesized attributes result attribute evaluation rules may also use values inherited attributes inherited attributes passed parent nodes approaches synthesized attributes used pass semantic information parse tree inherited attributes help pass semantic information across instance constructing language translation tool compiler may used assign semantic values syntax constructions also possible validate semantic checks associated grammar representing rules language explicitly imparted syntax definition attribute grammars also used translate syntax tree directly code specific machine intermediate language one strength attribute grammars transport information anywhere abstract syntax tree anywhere else controlled formal way attribute grammars invented donald knuth peter wegner donald knuth credited overall concept peter wegner invented inherited attributes conversation knuth embryonic ideas trace back work edgar t. ned irons author imp following simple context-free grammar describe language made multiplication addition integers following attribute grammar used calculate result expression written grammar note grammar uses synthesized values therefore s-attributed grammar synthesized attribute computed values attributes children since values children must computed first example bottom-up propagation formally define synthesized attribute let formula_1 formal grammar given string nonterminal symbols formula_6 attribute name formula_7 formula_8 synthesized attribute three conditions met inherited attribute node parse tree defined using attribute values parent siblings inherited attributes convenient expressing dependence programming language construct context appears example use inherited attribute keep track whether identifier appears left right side assignment order decide whether address value identifier needed contrast synthesized attributes inherited attributes take values parent and/or siblings following production get values b c. b take values c. likewise c take values b
[ 2307, 1672, 10762, 2316, 9871, 1552, 2065, 5399, 11679, 1952, 3876, 2086, 7876, 10703, 2256, 2650, 2144, 9062, 10474, 2798, 2675 ]
Validation
7,635
4
Acoustic_cryptanalysis:acoustic cryptanalysis acoustic cryptanalysis type side channel attack exploits sounds emitted computers devices modern acoustic cryptanalysis focuses sounds produced computer keyboards internal computer components historically also applied impact printers electromechanical deciphering machines victor marchetti john d. marks eventually negotiated declassification cia acoustic intercepts sounds cleartext printing encryption machines technically method attack dates time fft hardware cheap enough perform task—in case late 1960s mid-1970s however using primitive means acoustical attacks made mid-1950s book spycatcher former mi5 operative peter wright discusses use acoustic attack egyptian hagelin cipher machines 1956 attack codenamed engulf 2004 dmitri asonov rakesh agrawal ibm almaden research center announced computer keyboards keypads used telephones automated teller machines atms vulnerable attacks based sounds produced different keys attack employed neural network recognize key pressed analyzing recorded sounds able recover text data entered techniques allow attacker using covert listening devices obtain passwords passphrases personal identification numbers pins information entered via keyboards 2005 group uc berkeley researchers performed number practical experiments demonstrating validity kind threat also 2004 adi shamir eran tromer demonstrated may possible conduct timing attacks cpu performing cryptographic operations analyzing variations acoustic emissions analyzed emissions ultrasonic noise emanating capacitors inductors computer motherboards electromagnetic emissions human-audible humming cooling fan shamir tromer along new collaborator daniel genkin others went successfully implement attack laptop running version gnupg rsa implementation using either mobile phone located close laptop laboratory-grade microphone located 4 away published experimental results december 2013 acoustic emissions occur coils capacitors small movements current surge passes capacitors particular change diameter slightly many layers experience electrostatic attraction/repulsion piezoelectric size change coil capacitor emits acoustic noise conversely also microphonic high-end audio industry takes steps coils capacitors reduce microphonics emissions muddy hi-fi amplifier sound march 2015 made public inkjet printers using ultrasonic heads read back using high frequency mems microphones record unique acoustic signals nozzle using timing reconstruction known printed data confidential 12-point font thermal printers also read using similar methods less fidelity signals bursting bubbles weaker hack also involved implanting microphone chip storage ic burst transmitter long-life li+ battery doctored cartridges substituted genuine ones sent post target typically bank retrieved garbage using challenge-response rfid chip similar work reconstructing printouts made dot-matrix printers publicized 2011 kind cryptanalysis defeated generating sounds spectrum form keypresses sounds actual keypresses randomly replayed may possible totally defeat kinds attacks advisable use least 5 different recorded variations 36 x 5 180 variations keypress get around issue fft fingerprinting alternatively white noise sufficient volume may simpler generate playback also mask acoustic emanations individual keypresses
[ 2050, 7556, 2567, 3084, 2957, 7056, 658, 8978, 660, 1173, 4389, 10662, 169, 11185, 2357, 10806, 9528, 9541, 10315, 6863, 8273, 10963, 212, 9556, 2265, 7643, 9697, 7527, 618, 1898, 7151, 1776, 881, 7794, 1654, 7161, 7034, 3323, 892 ]
Test
7,636
3
Enterprise_interoperability:enterprise interoperability enterprise interoperability ability enterprise—a company large organization—to functionally link activities product design supply chains manufacturing efficient competitive way research interoperability enterprise practised various domains enterprise modelling ontologies information systems architectures platforms question positioning enterprise architecture ea presents high level design enterprise capabilities defines successful projects coherence enterprise principals business related requirements ea covers mainly business capabilities analysis validation ii development business application data technical architectures solutions finally iii control programme project implementation governance application ea methodology feeds enterprise repository reference frame sets building blocks used compose targeted system interoperability considered either principal requirement constraint impact definition patterns compose building blocks definition targeted architectural roadmap scope ea within togaf perspective aims reconcile interoperability requirements potential solutions make developed systems interoperable maintain interoperability challenge quite present next steps system ’ lifecycle several models frameworks developed topic enterprise interoperability preserve interoperability several enterprise interoperability frameworks identified literature majority frameworks considers enterprise several aspects viewpoints abstraction levels business process knowledge application technology data technic etc proposes guidelines support modeling connection capabilities levels semantic challenge considered transversal abstraction levels setting applying guidelines methodologies developed within frameworks requires modeling efforts identify connect artifacts evolution technologies aims outsource capabilities vendors manage use demand evolution pathway starts form packaged solutions goes infrastructure service iaas platform service paas software service saas recently cloud interoperability efforts still mainly expected among levels dealing business process definition alignment collaboration interoperability several international standards propose methodologies guidelines perspectives addition recent standards bpmn bpel etc implementation technologies propose relevant integration capabilities furthermore model driven-engineering provides capabilities connect transform refine models support interoperability following approaches propose metrics assess interoperability maturity several interoperability aspects identified previously listed maturity approaches define interoperability categories dimensions propose qualitative well qualitative cross cutting issues assess interoperability aspects covered single maturity approach propositions go deeply definition metric dimensions one interoperability aspect business interoperability measurement proposed aneesh
[ 2948, 5005 ]
Validation
7,637
7
Aventri:aventri aventri formerly known etouches cloud-based event management software company based norwalk connecticut best known integrated events management saas solutions company 1,200 users spanning 35 countries worldwide large corporations like coca-cola mastercard dell part client mix aventri five-time honoree inc. magazine inc. 5,000 ranking fastest-growing private companies america 2012 – 2016 annual ranking also places aventri among top companies connecticut aventri founded global executive business service 1998 leonora valvo tim cummins business operated fee-for-service event managing company 2008 company relaunched etouches year etouches introduced first event management solution 2010 company raised 2.5 million first round venture capital investments lead investor greycroft partners investors connecticut innovations cava capital growth continued 2012 company launched mobile application emobile enabling users create manage event scheduling smartphones application integrates etouches modules including ereg esocial also year etouches received 7.75 million series b financing led level equity etouches raised 6 million series c round investments 2013 september year company appointed oni chukwu president chief executive officer veteran software industry executive sits board directors connecticut technology council board governors university new haven.the momentum continued throughout 2015. etouches expanded operations middle east opening headquarters office dubai company raised 14 million series c funding investors including argentum group also year etouches expanded platform acquisition tapcrowd company creates mobile applications provides marketing data businesses associations worldwide new partnership integrated ingo social media marketing suite etouches event management platform company also acquired inevention venue sourcing platform estimating tool help planners manage cost offsite meetings events rapid growth earned etouches spot deloitte 2015 technology fast 500 list fastest-growing technology companies north america also year smartceo magazine honored chukwu new york future 50 award recognizing region fastest-growing mid-sized companies etouches continued develop end-to-end event management platform enterprise market throughout 2016 company closed 20 million funding round later year acquired venue sourcing booking platform zentila etouches also introduced event roi product etouches also integrates directly popular software including salesforce passkey march 2 2017 etouches acquired loopd leading onsite data-drive technology acquisition complements etouches focus data-driven approach enhance clients event success positions etouches full enterprise solution two months later may 9 2017 etouches acquired hggc leading middle market private equity firm hggc ’ investment helped etouches expand business invest market-leading cloud platform win greater share 6 billion event management software ems venue sourcing market july 12 2018 company rebranded aventri aventri headquartered norwalk connecticut offices throughout north america europe middle east asian pacific company offers multilingual multi-currency product versions accommodate global customer base
[ 1400, 467 ]
Test
7,638
7
OpenFog_Consortium:openfog consortium openfog consortium sometimes stylized open fog consortium consortium high tech industry companies academic institutions across world aimed standardization promotion fog computing various capacities fields consortium founded cisco systems intel microsoft princeton university dell arm holdings 2015 57 members across north america asia europe including forbes 500 companies noteworthy academic institutions openfog consortium merged industrial internet consortium january 31 2019 openfog created november 19 2015 arm holdings cisco systems dell intel microsoft princeton university idea consortium centered advancement dissemination fog computing thought helder antunes cisco executive history iot mung chiang princeton university professor dean purdue university college engineering tao zhang cisco distinguished engineer cio ieee communications society openfog released reference architecture fog computing 13 february 2017 fog world congress 2017 hosted october 2017 openfog conjunction ieee communications society first congress devoted fog computing openfog consortium governed board directors chaired cisco senior director helder antunes board directors made 11 seats representing one following companies institutions arm cisco dell intel microsoft princeton university ieee ge zte shanghai tech university consortium general membership currently comprises 13 academic members aalto university arizona state university california institute technology georgia state university national chiao tung university national taiwan university shanghai research centre wireless communication chinese university hong kong university colorado boulder university southern california university pisa vanderbilt university wayne state university 20 additional members hitachi internet initiative japan itochu kii nebbiolo prismtech nec ngd systems ntt communications osisoft real-time innovations relayr sakura internet stichting imec nederland toshiba ttt tech fujitsu foghorn systems tttech marsec february 2016 openfog consortium published white paper openfog reference architecture outlined eight pillars openfog architecture security scalability open autonomy programmability ras reliability availability serviceability agility hierarchy february 2017 openfog consortium published openfog reference architecture discusses eight technical pillars fog computing 2017 openfog consortium published industry glossary fog computing terms july 2018 ieee standards association announced adopted openfog reference architecture first standard fog computing
[ 8355, 8900, 4964, 9137, 6834, 1400 ]
None
7,639
4
DarkHotel:darkhotel darkhotel darkhotel targeted spear-phishing spyware malware-spreading campaign appears selectively attacking business hotel visitors hotel in-house wifi network characterized kaspersky lab advanced persistent threat attacks specifically targeted senior company executives using forged digital certificates generated factoring underlying weak public keys real certificates convince victims prompted software downloads valid uploading malicious code hotel servers attackers able target specific users guests luxury hotels primarily asia united states zetter 2014 explains group dubbed darkhotel tapaoux also actively infecting users spear-phishing peer-to-peer networks since 2007 key logging reverse engineering targets aimed primarily executives investments development government agencies defense industries electronic manufacturers energy policy makers large number victims located korea china russia japan attackers victim computer sensitive information passwords intellectual property quickly stolen attackers erase tools hopes getting caught july 2017 bitdefender published new research inexsmar another version darkhotel malware used target political figures instead business targets
[ 1024, 7809, 8320, 3843, 5764, 10502, 2187, 4240, 11152, 8978, 10003, 10132, 535, 1688, 10392, 2717, 9375, 1440, 5024, 9761, 4644, 4133, 11175, 8489, 5547, 11052, 9518, 9904, 1970, 9395, 8886, 10166, 441, 1979, 4027, 10173, 10875, 8640, 1608...
Validation
7,640
2
NeXT_Laser_Printer:next laser printer next laser printer next pn n2000 400 dpi postscript laser printer sold next late nextstation nextcube workstations manufactured canon inc included adjustable paper tray enabled print several paper sizes including a4 letter-size legal envelope varieties similar printers based canon sx engine apple laserwriter ii series hp laserjet ii/iii although printers printed 300x300 dpi parts toner cartridge input paper tray interchangeable laserjet ii/iii printer used proprietary high-speed serial interface essence predecessor software-rendering approach used displaypostscript renderer nextstep rather hardware postscript renderer regardless lack dedicated rendering hardware usually achieved close rated speed 8 ppm nextstation much faster cpu 25 33mhz 68040 greater memory capacity 128 mb turbo models rendering engines contemporary printers nextstep used displaypostscript extensively windowing system postscript rendering path optimized thus printed documents true output wysiwyg corresponding screen next also produced color inkjet printer scsi-i-connected tabloid-capable 360 dpi color bubblejet model next pn n2004 us n2005 uk based technology canon bubblejet
[ 10406, 2282, 7307, 7806, 6554, 8628, 6234, 11420, 350 ]
Train
7,641
5
Frequency_grid:frequency grid frequency grid table central frequencies corresponding wavelengths channels allowed communications system common frequency grid used fiber-optic communication used channel spacing dense wavelength division multiplexing dwdm wavelengths around 1550 nm defined itu-t g.694.1 grid defined relative 193.1 thz extends 191.7 thz 196.1 thz 100 ghz spacing defined frequency grid often expressed terms wavelength case covers wavelength range 1528.77 nm 1563.86 nm approximately 0.8 nm channel spacing practical purposes grid extended cover 186 thz 201 thz subdivided provide 50 ghz 25 ghz spaced grids
[ 5321 ]
Validation
7,642
8
FlexiScale:flexiscale flexiscale utility computing platform launched xcalibre communications summer 2007 subsequently acquired flexiant launched shortly amazon ec2 service europe first world second cloud computing platform users able create start stop servers require allowing rapid deployment needed windows linux supported flexiscale platform flexiscale uses open source xen hypervisor backend storage comes highly redundant san although level redundancy called question august 2008 2 days downtime resulting engineer mistake storage system previously consisted dual head netapp storage array disk shelves connected heads replaced launch flexiscale 2.0 june 2010 amber road based storage solution sun microsystems revisions flexiscale platform publicly available information first version based virtual iron vm management software second revision called flexiscale v1.5 platform based in-house developed vm control system known extility recent release called flexiscale v2.0 contributed extensively revised user interface
[ 9665, 4194, 39, 6856, 823 ]
None
7,643
4
Mod_n_cryptanalysis:mod n cryptanalysis cryptography mod n cryptanalysis attack applicable block stream ciphers form partitioning cryptanalysis exploits unevenness cipher operates equivalence classes congruence classes modulo n method first suggested 1999 john kelsey bruce schneier david wagner applied rc5p variant rc5 m6 family block ciphers used firewire standard attacks used properties binary addition bit rotation modulo fermat prime rc5p analysis conducted modulo 3 observed operations cipher rotation addition 32-bit words somewhat biased congruence classes mod 3 illustrate approach consider left rotation single bit follows thus left rotation single bit simple description modulo 3 analysis operations data dependent rotation modular addition reveals similar notable biases although theoretical problems analysing operations combination bias detected experimentally entire cipher kelsey et al. 1999 experiments conducted seven rounds based conjecture many 19 20 rounds rc5p distinguished random using attack also corresponding method recovering secret key m6 attacks mod 5 mod 257 even effective
[ 7556, 2567, 3084, 2957, 7056, 658, 660, 1173, 1941, 4128, 1315, 4389, 10662, 169, 11185, 8627, 8628, 2357, 10806, 1847, 9528, 2110, 9541, 10315, 6863, 8273, 7635, 212, 9556, 10963, 11349, 2265, 1114, 9697, 8674, 229, 618, 1898, 881, 1654,...
Train
7,644
4
Cookie_stuffing:cookie stuffing world wide web cookie stuffing also cookie dropping affiliate marketing technique result visiting website user receives third-party cookie website unrelated visited user usually without user aware user later visits target website completes qualifying transaction making purchase cookie stuffer paid commission target stuffer actually encouraged user visit target technique considered illegitimate many affiliate schemes websites run affiliate program pay commission affiliates introducing visitors complete one qualifying transactions website owners often join affiliate programs earn commission usually simply sending visitors site running affiliate program via special link advertisement user clicks special link single cookie usually placed user computer considered normal practice way affiliate marketers generate genuine income definition cookies considered stuffed one placed user computer purely result viewing page one added time result single click taken extreme dozens cookies stuffed scattergun approach hope user visit one several target affiliate sites complete qualifying transaction cookie stuffing often referred blackhat online marketing technique potential generate fraudulent affiliate income cookie stuffer may also overwrite legitimate affiliate cookies essentially stealing commission another affiliate perfectly normal user visit website click link directed target affiliate site complete qualifying transaction time user may revisit target affiliate website later time complete qualifying transaction original referring affiliate would credited transaction make commission however many affiliate programs award commission recent referring affiliate original referring affiliate problem occurs cookie stuffing site stuffs visitors batch cookies scattergun approach genuine affiliate cookie may get overwritten user visits target affiliate site completes qualifying transaction cookie stuffer gets credit instead original affiliate brought first genuine visit target site operators websites allow user-generated content forums allow users post content aware various cookie stuffing techniques combat order protect visitors type activity cookie stuffing accomplished something simple including image forum post signature image link compromised purpose cookie stuffer made simulate click forum visitors affiliate link techniques used accomplish cookie stuffing similar used cross-site request forgery csrf attacks pop-ups actually method cookie stuffing accepted affiliate networks pop-up gets website visitor visit site course gives affiliate cookie common place find happening review sites affiliate “ reviews ” product companies pay commission customers interested product still wanted information purchasing probably innocent form cookie stuffing still stuffing none-the-less method defeated utilizing pop-up blocking software iframes way embedding page within page webmaster embeds web page one simple line code affiliate embeds iframe onto page loads affiliate url frames work similar fashion frames deprecated modern browsers techniques longer prevalent codice_1 html tag suggests browser attempt retrieve image url ’ matter url supplied n't extension like .jpg .gif .png end instance codice_2 would actually get anyone visits page send visit google affiliate links put directly creating redirect .htaccess javascript used force user visit url end result visiting affiliate url cascading style sheets define web page displayed retrieved like image would – browser instructed visit url affiliate could put direct affiliate url style sheet image loaded way one harder methods detect adobe flash commonly used create interactive media web contains functionality allows developers force website user visit affiliate link removing spoofing referrer information affiliate network wo n't know traffic came common tactic spoofed referring site legitimate white hat affiliate site mask fact cookie stuffing carried 2008 ebay sued four successful affiliate marketers platform used cookie stuffing techniques brian dunning host skeptoid podcast sentenced fifteen months prison 100 fine five months prison 25,000 fine pleading guilty wire fraud
[ 4163, 3462, 2470, 119, 8923, 10815 ]
None
7,645
3
Codeplay:codeplay codeplay software limited privately owned software tools developer based edinburgh scotland codeplay produces compilers debuggers runtimes testing systems specialized tools aid software development heterogeneous systems special purpose processor architectures including gpus dsps codeplay contributing member multicore association khronos group hsa foundation codeplay founded 2002 andrew richards experienced games developer formerly head software development eutechnyx initial funding company provided jez san obe founder argonaut games arc international codeplay began business developing compilers aimed games programmers releasing vectorc compiler playstation 2 x86 windows pc 2005 codeplay shifted focus developing bespoke c/c++ compilers processor designers since expanded services include development debuggers runtimes testing tools 2011 codeplay announced provided real-time car damage system utilising offload technology 2013 codeplay formed r division received investors people accreditation 2014 codeplay announced working implementation khronos group new provisional standard heterogeneous computing sycl codeplay ceo andrew richards currently chairs working group standard within khronos group computeaorta codeplay multi-target multi-platform toolkit rapidly enabling delivery opencl spir vulkan compute standards currently supporting linux windows android operating systems across x86 arm powerpc mips targets computeaorta also easily customized support new novel hardware architectures opencl standard widely adopted programming model gpus cpus dsps fpgas used extensively professional graphics applications adobe photoshop premiere well wide range open-source software codeplay built proprietary bespoke implementations opencl several customers well significantly contributing development opencl related standards within khronos group codeplay computecpp implementation sycl open standard enabling single source c++ software high-level object-oriented programming codeplay extensive participation standards bodies ensure industry benefits extensive varied knowledge codeplay chairs following standards codeplay contributed following eu-funded research projects
[ 1952, 7234, 11333, 9255, 7978, 9964, 6797, 10316, 499, 3413, 8700, 823, 6268 ]
Test
7,646
9
Pike_(programming_language):pike programming language pike interpreted general-purpose high-level cross-platform dynamic programming language syntax similar c. unlike many dynamic languages pike statically dynamically typed requires explicit type definitions features flexible type system allows rapid development flexible code dynamically typed languages still providing benefits statically typed language pike features garbage collection advanced data types first-class anonymous functions support many programming paradigms including object-oriented functional imperative programming pike free software released gpl lgpl mpl licenses pike roots lpc language developed muds programmers lysator linköping sweden notably fredrik hübinette per hedbor separated language virtual machine rest mud driver used rapid prototyping language various applications calling lpc4 lpc license allow use commercial purposes new gpl implementation written 1994 called µlpc micro lpc 1996 µlpc renamed pike order provide commercially viable name although name company changed years company known roxen internet software employed many pike developers provided resources pike development roxen also name web server developed company pike 2002 programming environment laboratory linköping university took maintenance pike roxen several pike programmers found way linköping office opera software language plays central role server/gateway parts opera mini application int main syntax requires explanation familiar c c++ pick right away following list shows standard data types pike provides advanced data types sequences queues heaps stacks etc available adt module included pike basic data types container types types pike requires explicit type definitions variables uses information report type errors compile time following code cause compile error value variable number must integer code attempting assign floating point string values int number // integer variable accepts integers number 5.5 // 5.5 floating point value error number 5 // 5 string integer value 5 error kind behavior traditionally considered restrictive limiting proponents dynamically typed languages however unlike c c++ java pike uses flexible type system—specifically system tagged unions system allows programmers declare variables may contain values multiple types something impossible c-family languages without straying bounds safe usage following demonstrates variable hold either integer floating point number int|float number // integer float variable number 5 // legal number 5.5 // also legal variable declared holding many different data types functions provided determine type data currently stored functions form typenamep intp floatp stringp etc int|float number number 5 intp number // returns true number holds int floatp number // returns false number 5.5 floatp number // returns true number holds float additionally special mixed data type definition allows variable hold kind data type mixed anything anything 5 // anything integer value 5 anything 5.5 // anything float value 5.5 anything 5 // anything string value 5 order convert value one type another pike use explicit cast mixed anything anything int 5.5 // anything integer value 5 anything string anything // anything string value 5
[ 2304, 9345, 6797, 5521, 5395, 5397, 5546, 7983, 10800, 1591, 7237, 7500, 7144, 11625, 7019, 5612, 7919, 9330, 11386, 2045 ]
None
7,647
3
VESA_Enhanced_Video_Connector:vesa enhanced video connector vesa enhanced video connector vesa standard intended reduce number cables around computer incorporating video audio firewire usb single cable system intention system make monitor central point connection although specific idea find favour computer manufacturers evolved somewhat popular vesa plug display standard vesa evc connector capable carrying analog video vga-based output video input composite firewire audio analogue stereo usb signals pinout somewhat similar newer vesa plug display distinguished plug display connector shell shaped like isosceles trapezoid similar shell d-subminiature instead -shaped shell dvi connector
[ 9057, 10954, 7594, 6575, 11631, 3453 ]
Test
7,648
2
Global_Address_Space_Programming_Interface:global address space programming interface global address space programming interface gpi application programming interface api development scalable asynchronous fault tolerant parallel applications implementation partitioned global address space programming model gpi developed fraunhofer institute industrial mathematics itwm since 2005 initially known fvm fraunhofer virtual machine 2009 name changed global address programming interface gpi 2011 fraunhofer itwm partners fraunhofer scai tud t-systems sfr dlr kit fzj dwd scapos initiated launched gaspi project define novel specification api gaspi based gpi make novel specification reliable scalable universal tool hpc community gpi-2 first open source implementation standard software freely available application developers researchers licenses commercial use available scapos ag gpi completely replaced mpi fraunhofer itwm products research based new gpi-2 modern hardware typically involves hierarchy memory respect bandwidth latency read write accesses within hierarchy non-uniform memory access numa partitions solid state devices ssds graphical processing unit gpu memory many integrated cores mic memory memory segments supposed map variety hardware layers software layer spirit pgas approach gpi segments may globally accessible every thread every gpi process gpi segments also used leverage different memory models within single application even run different applications group subset ranks group members common collective operations collective operation group restricted ranks forming group initial group gaspi_group_all ranks members forming group involves 3 steps creation addition commit operations must performed ranks forming group creation performed using codice_1 operation successful ranks added created group using codice_2 able use created group ranks added must commit group performed using codice_3 collective operation ranks group one-sided asynchronous communication basic communication mechanism provided gpi-2 one-sided communication comes two flavors read write operations single list allocated segments moreover write operations extended notifications enable remote completion events remote rank react one-sided operations non-blocking asynchronous allowing program continue execution along data transfer mechanisms communication gpi-2 following codice_4 possibility use different queues communication requests request submitted one queues queues allow scalability used channels different types requests similar types requests queued get synchronised together independently ones separation concerns gpi-2 provides atomic operations variables manipulated atomically two basic atomic operations codice_5 codice_6 values used global shared variables synchronise processes events failure tolerant parallel programs require non-blocking communication calls gpi-2 provides timeout mechanism potentially blocking procedures timeouts procedures specified milliseconds instance gaspi_block pre-defined timeout value blocks procedure call completion gaspi_test another predefined timeout value blocks procedure shortest time possible i. e. time procedure call processes atomic portion work
[ 7983, 823 ]
Test
7,649
3
TruCluster:trucluster trucluster closed-source high-availability clustering solution tru64 unix operating system originally developed digital equipment corporation dec transferred compaq 1998 digital acquired company later merged hewlett-packard hp
[ 11136, 5384, 2986, 7983, 5492, 118, 3927 ]
Validation
7,650
1
Network_model:network model network model database model conceived flexible way representing objects relationships distinguishing feature schema viewed graph object types nodes relationship types arcs restricted hierarchy lattice hierarchical database model structures data tree records record one parent record many children network model allows record multiple parent child records forming generalized graph structure property applies two levels schema generalized graph record types connected relationship types called set types codasyl database generalized graph record occurrences connected relationships codasyl sets cycles permitted levels chief argument favour network model comparison hierarchical model allowed natural modeling relationships entities although model widely implemented used failed become dominant two main reasons firstly ibm chose stick hierarchical model semi-network extensions established products ims dl/i secondly eventually displaced relational model offered higher-level declarative interface early 1980s performance benefits low-level navigational interfaces offered hierarchical network databases persuasive many large-scale applications hardware became faster extra productivity flexibility relational model led gradual obsolescence network model corporate enterprise usage network model original inventor charles bachman developed standard specification published 1969 conference data systems languages codasyl consortium followed second publication 1971 became basis implementations subsequent work continued early 1980s culminating iso specification little influence products bachman influence recognized term bachman diagram diagrammatic notation represents database schema expressed using network model bachman diagram named rectangles represent record types arrows represent one-to-many relationship types records codasyl set types well-known database systems use network model include
[ 2688, 5632, 8201, 11024, 9631, 1697, 6831, 53, 9397, 4155, 7868, 9147, 11324, 2369, 11457, 6085, 9286, 2512, 2901, 7767, 11098, 8291, 9828, 10340, 10471, 3816, 6383, 1146, 6395, 3196 ]
Test
7,651
3
Penguin_Wars:penguin wars player controls one five animals choose cow rabbit bat rat penguin plays games animals nintendo entertainment system arcade editions game five animals penguin bear panda koala beaver game participating animals find opposite sides square table five balls side object game roll balls table soon ten balls one player side player loses game game also time limit 60 seconds reached player fewest balls side wins player hit one balls knocked unconscious certain amount time thus could also said part object game hit opponent otherwise would possible get ten balls side opponent roll back arrived different animals different strengths weaknesses trade-off example rat one move left right fastest return roll balls slowly cow hand slow walker return regains consciousness quickly thirty seconds playing jellybean-like obstacle appears middle table moves left right different kinds obstacles cause varying effects trajectory balls deflect start rolling diagonally players roll parallel sides table whereas others simply ball bounce straight back remake penguin wars announced nintendo switch july 25 2017 game released japan september 21 2017 playstation 4 xbox one versions announced november nintendo switch version released june 27 2019 north america europe
[ 5762, 3788, 9006, 1776, 10931 ]
None
7,652
4
Traffic_analysis:traffic analysis traffic analysis process intercepting examining messages order deduce information patterns communication performed even messages encrypted general greater number messages observed even intercepted stored inferred traffic traffic analysis performed context military intelligence counter-intelligence pattern-of-life analysis concern computer security traffic analysis tasks may supported dedicated computer software programs advanced traffic analysis techniques may include various forms social network analysis traffic analysis method used break anonymity anonymous networks e.g. tors two methods traffic-analysis attack passive active military context traffic analysis basic part signals intelligence source information intentions actions target representative patterns include close relationship traffic analysis cryptanalysis commonly called codebreaking callsigns addresses frequently encrypted requiring assistance identifying traffic volume often sign addressee importance giving hints pending objectives movements cryptanalysts traffic-flow security use measures conceal presence properties valid messages network prevent traffic analysis done operational procedures protection resulting features inherent cryptographic equipment techniques used include traffic-flow security one aspect communications security communications metadata intelligence comint metadata term communications intelligence comint referring concept producing intelligence analyzing technical metadata hence great practical example traffic analysis intelligence traditionally information gathering comint derived intercepting transmissions tapping target communications monitoring content conversations metadata intelligence based content technical communicational data non-content comint usually used deduce information user certain transmitter locations contacts activity volume routine exceptions example certain emitter known radio transmitter certain unit using direction finding df tools position emitter locatable hence changes locations monitored way 're able understand certain unit moving one point another without listening orders reports know unit reports back command certain pattern know another unit reports pattern command two units probably related conclusion based metadata two units transmissions content transmissions using much metadata available commonly used build electronic order battle eob – mapping different entities battlefield connections course eob could built tapping conversations trying understand unit using metadata automatic analysis tool enables much faster accurate eob build-up alongside tapping builds much better complete picture traffic analysis also concern computer security attacker gain important information monitoring frequency timing network packets timing attack ssh protocol use timing information deduce information passwords since interactive session ssh transmits keystroke message time keystroke messages studied using hidden markov models song et al claim recover password fifty times faster brute force attack onion routing systems used gain anonymity traffic analysis used attack anonymous communication systems like tor anonymity network adam back ulf möeller anton stiglic present traffic analysis attacks anonymity providing systems steven j. murdoch george danezis university cambridge presented research showing traffic-analysis allows adversaries infer nodes relay anonymous streams reduces anonymity provided tor shown otherwise unrelated streams linked back initiator remailer systems also attacked via traffic analysis message observed going remailing server identical-length anonymized message seen exiting server soon traffic analyst may able automatically connect sender ultimate receiver variations remailer operations exist make traffic analysis less effective difficult defeat traffic analysis without encrypting messages masking channel actual messages sent channel masked hard hide information size timing messages known solutions require alice send continuous stream messages maximum bandwidth ever use ... might acceptable military applications civilian applications military-versus-civilian problems applies situations user charged volume information sent even internet access per-packet charge isps make statistical assumption connections user sites busy 100 time user simply increase bandwidth link since masking would fill well masking often built end-to-end encryptors becomes common practice isps change traffic assumptions
[ 7424, 1169, 9233, 1941, 150, 1815, 9373, 3629, 6599, 6344, 7119, 208, 5986, 612, 3428, 10341, 7527, 11241, 9965, 4725, 2558 ]
None
7,653
3
Reservation_station:reservation station unified reservation station also known unified scheduler decentralized feature microarchitecture cpu allows register renaming used tomasulo algorithm dynamic instruction scheduling reservation stations permit cpu fetch re-use data value soon computed rather waiting stored register re-read instructions issued designate reservation station want input read multiple instructions need write register proceed logically last one need actually written checks operands available raw execution unit free structural hazard starting execution instructions stored available parameters executed ready results identified unit execute corresponding instruction implicitly register renaming solves war waw hazards since fully associative structure high cost comparators need compare results returned processing units stored addresses tomasulo algorithm instructions issued sequence reservation stations buffer instruction well operands instruction operand available reservation station listens common data bus operand become available operand becomes available reservation station buffers execution instruction begin functional units adder multiplier corresponding reservation station output functional unit connects common data bus reservation stations listening operands need
[ 7173, 9739, 7699, 5655, 10779, 10781, 8231, 7218, 2623, 2113, 7234, 3142, 2638, 1122, 3175, 8815, 630, 8822, 7313, 6815, 8352, 5793, 6818, 6821, 7852, 9391, 7858, 9911, 8890, 4286, 2241, 2243, 6339, 5329, 10966, 731, 7911, 10985, 9964, 53...
Test
7,654
1
Virtual_column:virtual column relational databases virtual column table column whose value automatically computed using columns values another deterministic expression virtual columns part sql standard implemented dbmss like mariadb sql server oracle firebird database server computed syntax two types virtual columns virtual columns values computed fly needed example returned select statement persistent column values computed row inserted table written like values change values change virtual persistent columns advantages disadvantages virtual columns n't consume space disk must computed every time query refers persistent columns n't require cpu time consume disk space however sometimes choice available dbms support one column type neither mariadb mysql fork virtual columns added 5.2 tree expressions used compute virtual columns following limitations persistent columns indexed part foreign key small limitations concerning constraint enforcement virtual columns used tables use storage engine supports storage engines supporting virtual columns mrg_myisam tables based myisam tables include persistent columns corresponding mrg_myisam column defined regular column create table alter table statement used add virtual column syntax used define virtual column following support virtual columns known mysql generated columns started becoming available v5.17.6 various limitations use relaxed subsequent versions since version 11g oracle supports virtual columns microsoft sql server supports virtual columns called computed columns sql server supports persisted non-persisted computed columns firebird always supported virtual columns precursor interbase supports called computed columns firebird supports virtual columns persistent ones allows sub-selects calling built functions external functions stored routines virtual column expression creating virtual column done table creation adding columns existing table syntax used define virtual column following industry standard
[ 10340, 10632, 8683, 9389, 7022, 10413, 10737, 7506, 9010, 2901, 11030, 3096, 5403, 9503 ]
Test
7,655
2
John_Lions:john lions john lions 19 january 1937 – 5 december 1998 australian computer scientist best known author lions commentary unix 6th edition source code commonly known lions book lions gained degree first-class honours university sydney 1959 applied received scholarship study university cambridge earned doctorate control engineering 1963 graduation worked consulting firm kcs ltd toronto ontario canada 1967 briefly took position dalhousie university halifax canada moving working burroughs los angeles systems analyst 1972 moved back sydney australia became senior lecturer department computer science university new south wales unsw 1980 promoted associate professor apart sabbaticals 1978 1983 1989 bell laboratories remained school retiring 1995 due bad health john lions married marianne two children katherine elizabeth death john o'brien steve jenkin chris maltby greg rose former students lions commenced campaign raise funds create chair name unsw john lions chair operating systems donations many unsw alumni corporations usenix linux australia chair created 2006 becoming first chair unsw funded contributions alumni 2009 gernot heiser became inaugural john lions chair 2002 unsw dedicated john lions garden front new computer science engineering building lions memory 2011 school computer science engineering unsw initiated john lions award contribution open software prize open high school undergraduate university students enrolled australian secondary tertiary institution full-time part-time students eligible well local internationals students annual prize valued 1,000
[ 3488, 1865, 7983, 5492, 8671 ]
Train
7,656
8
YaCy:yacy yacy pronounced ya see free distributed search engine built principles peer-to-peer p2p networks core computer program written java distributed several hundred computers so-called yacy-peers yacy-peer independently crawls internet analyzes indexes found web pages stores indexing results common database called index shared yacy-peers using principles p2p networks free search engine everyone use build search portal intranet help search public internet clearly compared semi-distributed search engines yacy-network decentralised architecture yacy-peers equal central server exists run either crawling mode local proxy server indexing web pages visited person running yacy computer several mechanisms provided protect user privacy access search functions made locally running web server provides search box enter search terms returns search results similar format popular search engines yacy available windows mac linux yacy created 2003 michael christen yacy search engine based four elements yacy uses combination techniques networking administration maintenance indexing search engine including blacklisting moderation communication community yacy performs operations
[ 8640, 11558, 488, 5612, 5677, 6797, 7276, 1520, 113, 7807, 7983, 9806, 4725, 823, 4472, 1274, 735 ]
Test
7,657
3
NetBurst_(microarchitecture):netburst microarchitecture netburst microarchitecture called p68 inside intel successor p6 microarchitecture x86 family cpus made intel first cpu use architecture willamette -core pentium 4 released november 20 2000 first pentium 4 cpus subsequent pentium 4 pentium variants also based netburst mid-2004 intel released foster core also based netburst thus switching xeon cpus new architecture well pentium 4-based celeron cpus also use netburst architecture netburst replaced core microarchitecture based p6 released july 2006 netburst microarchitecture includes features hyper-threading hyper pipelined technology rapid execution engine execution trace cache replay system introduced first time particular microarchitecture never appeared afterwards hyper-threading intel proprietary simultaneous multithreading smt implementation used improve parallelization computations multiple tasks performed x86 microprocessors intel introduced netburst processors 2002 later intel reintroduced nehalem microarchitecture absence core microarchitecture northwood willamette feature external front-side bus runs 100 mhz 64-bits wide also quad-pumped thus giving 3.2 gb/s memory bandwidth intel northwood i850 chipset dual-channel rd-ram provide 3.2 gb/s memory bandwidth presler 800 mhz front-side bus 64-bits wide capable transferring 6.4 gb/s 800 mhz ddr2 memory name given 20-stage instruction pipeline within willamette core significant increase number stages compared pentium iii 10 stages pipeline prescott core 31-stage pipeline stages moving data around cpu although deeper pipeline increased branch misprediction penalty greater number stages pipeline allow cpu higher clock speeds thought offset loss performance smaller instructions per clock ipc indirect consequence pipeline depth—a matter design compromise small number long pipelines smaller ipc greater number short pipelines another drawback stages pipeline increase number stages need traced back event branch predictor makes mistake increasing penalty paid mis-prediction address issue intel devised rapid execution engine invested great deal branch prediction technology intel claims reduces branch mispredictions 33 pentium iii technology two alus core cpu double-pumped meaning actually operate twice core clock frequency example 3.8 ghz processor alus effectively operating 7.6 ghz reason behind generally make low ipc count additionally considerably enhances integer performance cpu intel also replaced high-speed barrel shifter shift/rotate execution unit operates frequency cpu core downside certain instructions much slower relatively absolutely making optimization multiple target cpus difficult example shift rotate operations suffer lack barrel shifter present every x86 cpu beginning i386 including main competitor processor athlon within l1 cache cpu intel incorporated execution trace cache stores decoded micro-operations executing new instruction instead fetching decoding instruction cpu directly accesses decoded micro-ops trace cache thereby saving considerable time moreover micro-ops cached predicted path execution means instructions fetched cpu cache already present correct order execution intel later introduced similar simpler concept sandy bridge called micro-operation cache uop cache replay system little-known subsystem within intel pentium 4 processor primary function catch operations mistakenly sent execution processor scheduler operations caught replay system re-executed loop conditions necessary proper execution fulfilled intel netburst architecture allows branch prediction hints inserted code tell whether static prediction taken taken feature abandoned later intel processors according intel netburst branch prediction algorithm 33 better one p6 despite enhancements netburst architecture created obstacles engineers trying scale performance microarchitecture intel looked attain clock speeds 10 ghz rising clock speeds intel faced increasing problems keeping power dissipation within acceptable limits intel reached speed barrier 3.8 ghz november 2004 encountered problems trying achieve even intel abandoned netburst 2006 heat problems reached level severity developed core microarchitecture inspired p6 core pentium pro tualatin pentium iii-s directly pentium m. intel replaced original willamette core redesigned version netburst microarchitecture called northwood january 2002 northwood design combined increased cache size smaller 130 nm fabrication process hyper-threading technology although initially models 3.06 ghz model feature disabled produce modern higher-performing version netburst microarchitecture february 2004 intel introduced prescott radical revision microarchitecture prescott core produced 90 nm process included several major design changes including addition even larger cache 512 kb northwood 1 mb 2 mb prescott 2m much deeper instruction pipeline 31 stages compared 20 northwood heavily improved branch predictor introduction sse3 instructions later implementation intel 64 intel branding compatible implementation x86-64 64-bit version x86 microarchitecture hyper-threading prescott chips branded pentium 4 ht hardware support feature initially enabled high-end xeon processors officially introduced processors pentium trademark power consumption heat dissipation also became major issues prescott quickly became hottest-running power-hungry intel single-core x86 x86-64 processors power heat concerns prevented intel releasing prescott clocked 3.8 ghz along mobile version core clocked 3.46 ghz intel also released dual-core processor based netburst microarchitecture branded pentium d. first pentium core codenamed smithfield actually two prescott cores single die later presler consists two cedar mill cores two separate dies cedar mill 65 nm die-shrink prescott intel netburst based successors development called tejas jayhawk 40 50 pipeline stages ultimately decided replace netburst core microarchitecture released july 2006 successors directly derived 1995 pentium pro p6 microarchitecture august 8 2008 marked end intel netburst based processors reason netburst abandonment severe heat problems caused high clock speeds core- nehalem-based processors higher tdps processors multi-core core gives fraction maximum tdp highest-clocked core-based single-core processors give maximum 27 w heat fastest-clocked desktop pentium 4 processors single-core tdps 115 w compared 88 w fastest clocked mobile versions although introduction new steppings tdps models eventually lowered nehalem microarchitecture successor core microarchitecture actually supposed evolution netburst according intel roadmaps dating back 2000 due netburst abandonment nehalem completely different project similarities netburst nehalem reimplements hyper-threading technology first introduced 3.06 ghz northwood core pentium 4 nehalem also implements l3 cache processors based consumer processor implementation l3 cache first used gallatin core pentium 4 extreme edition oddly missing prescott 2m core brand
[ 3459, 5380, 3973, 8325, 9095, 5386, 9611, 4108, 9741, 6926, 5649, 7313, 5523, 6804, 8851, 4886, 9111, 3352, 3992, 3995, 5883, 6175, 8231, 10669, 9391, 7218, 10675, 4276, 1461, 8501, 10548, 2237, 5309, 8125, 8126, 7105, 6339, 5444, 9541, 7...
Test
7,658
8
Smarty_(template_engine):smarty template engine smarty web template system written php smarty primarily promoted tool separation concerns smarty intended simplify compartmentalization allowing front-end web page change separately back-end ideally lowers costs minimizes efforts associated software maintenance smarty generates web content placement special smarty tags within document tags processed substituted code tags directives smarty enclosed template delimiters directives variables denoted dollar sign functions logical loop statements smarty allows php programmers define custom functions accessed using smarty tags since smarty separates php html two files — one contains presentation code html template including smarty variables tags might look like business logic use smarty template could follows
[ 963, 8644, 7785, 6154, 4171, 9738, 7373, 8846, 3224 ]
None
7,659
4
XSS_worm:xss worm xss worm sometimes referred cross site scripting virus malicious sometimes non-malicious payload usually written javascript breaches browser security propagate among visitors website attempt progressively infect visitors first mentioned 2002 relation cross site scripting vulnerability hotmail xss worms exploit security vulnerability known cross site scripting xss short within website infecting users variety ways depending vulnerability site features profiles chat systems affected xss worms implemented improperly without regard security often worms specific single web site spreading quickly exploiting specific vulnerabilities cross-site scripting vulnerabilities commonly exploited form worms popular social commercial websites myspace yahoo orkut justin.tv facebook twitter worms used malicious intent giving attacker basis steal personal information provided web site passwords credit card numbers several xss worms affected popular web sites samy worm largest known xss worm infected 1 million myspace profiles less 20 hours virus author sued entered plea agreement felony charge justin.tv video casting website active user base approximately 20 thousand users cross-site scripting vulnerability exploited location profile field properly sanitized inclusion profile page location profile field sanitized included title profile page within actual field page body meant authors worm order achieve stealth boost lifetime spread worm automatically remove xss payload title page within worm code already hidden comments proper development worm executed approximately saturday 28 jun 2008 21:52:33 utc finished sun 29 jun 2008 21:12:21 utc since social website targeted particularly active compared popular xss worm targets worm infected total 2525 profiles within roughly 24 hours worm found hours successfully removed based data recorded due worm original intent research purposes worm able infect uninfected profiles sanitized forcefully developers justin.tv worm sanitized vulnerability patched able removed easily however shows ability worm adapt spread even counter-attack particular factors indicated graphs data released attackers include social activity lack new uninfected users periods time orkut social networking site also hit xss worm infected users receive scrap containing words bom sabado portuguese happy saturday google yet comment situation
[ 225, 3941, 3462, 4198, 7739, 8045, 2041, 3643, 8735 ]
None
7,660
7
Lunacloud:lunacloud lunacloud cloud computing infrastructure service provider based lisbon lunacloud founded 2011 antónio miguel ferreira charles nasser launched services general public provides cloud computing infrastructure service cloud servers cloud storage cloud jelastic hosting performance cost lunacloud offerings favourably rated techweekeurope techrepublic cloudspectator compared rackspace amazon ec2 lunacloud three base products — cloud servers cloud storage cloud jelastic lunacloud helps design build operate workloads across environments depending individual needs customer cloud servers provides scalable virtual servers using parallels vmware clouds servers deployed using control panel api api also compatible amazon s3 api cloud jelastic acronym java elastic unlimited paas container based iaas within single platform provides high availability applications automatic vertical horizontal scaling via containerization software development clients enterprise businesses devops system admins developers lunacloud headquarters lisbon lunacloud localized storefronts differ selection prices differentiated top-level domain country code
[ 6018, 1539, 8451, 6153, 6027, 4236, 10893, 526, 911, 272, 1935, 4623, 8592, 405, 2965, 2328, 4377, 8986, 10265, 5662, 11038, 5666, 6307, 9766, 39, 5159, 2217, 6444, 8495, 3121, 5681, 9906, 7352, 10681, 11070, 448, 2496, 4289, 8515, 10820,...
None
7,661
3
Ganbare_Goemon!_Karakuri_Dōchū:ganbare goemon karakuri dōchū game revolves around main character goemon exploits name suggests character based ishikawa goemon noble thief japanese folklore unlike sequels game still n't feature comic situation strange characters define series goemon portrayed noble thief rather plain hero game plays top view action/adventure game similar legend zelda though separated stages level goemon must find three passes order advance passes found boxes secret passages bought finishing stages game present new japanese province eight total levels remain ending however different like rest series goemon powered certain items found and/or bought lost hits msx version option played turns two players second player playing ninja named nezumi kozō basis goemon sidekick ebisumaru addition unlike family computer version game six provinces completely new levels finishing game
[ 9006 ]
Train
7,662
9
Convolution_(computer_science):convolution computer science computer science specifically formal languages convolution sometimes referred zip function maps tuple sequences sequence tuples name zip derives action zipper interleaves two formerly disjoint sequences reverse function unzip performs deconvolution given three words cat fish cat 3 fish 4 2 let formula_1 denote length longest word fish formula_2 convolution cat fish 4 tuples elements symbol original alphabet haskell truncates shortest sequence formula_4 formula_5 let σ alphabet symbol σ let x x ... x ... z z ... z ... n words i.e finite sequences elements σ let formula_1 denote length longest word i.e maximum x z ... convolution words finite sequence n -tuples elements σ ∪ i.e element formula_7 index w w convolution x z ... denoted conv x z ... zip x z ... x ⋆ ⋆ z ⋆ ... inverse convolution sometimes denoted unzip variation convolution operation defined formula_4 minimum length input words avoids use adjoined element formula_11 destroys information elements input sequences beyond formula_4 convolution functions often available programming languages often referred zip lisp-dialects one simply map desired function desired lists map variadic lisp take arbitrary number lists argument example clojure common lisp languages python provide zip function older version python 2 allowed mapping none lists get similar effect zip conjunction operator unzips list haskell method convolving sequences requires specific function arity zip two sequences zip3 three etc similarly functions unzip unzip3 available unzipping list languages support convolution
[ 3876, 6502, 5031, 8262, 8554, 5165, 2062, 9245, 5917 ]
Test
7,663
6
Extended_file_attributes:extended file attributes extended file attributes file system features enable users associate computer files metadata interpreted filesystem whereas regular attributes purpose strictly defined filesystem permissions records creation modification times unlike forks usually large maximum file size extended attributes usually limited size value significantly smaller maximum file size typical uses include storing author document character encoding plain-text document checksum cryptographic hash digital certificate discretionary access control information aix jfs2 v2 filesystem supports extended attributes accessible using getea command getea setea listea statea removeea apis support fetching setting listing getting information removing extended attributes support extended file attributes removed openbsd source code 2005 due lack interest access control lists freebsd 5.0 later ufs1 ufs2 zfs filesystems support extended attributes using extattr_ family system calls regular file may list extended attributes attribute consists name associated data name must null-terminated string exists namespace identified small-integer namespace identifier currently two namespaces exist user system user namespace restrictions regard naming contents system namespace primarily used kernel access control lists mandatory access control linux ext2 ext3 ext4 jfs squashfs yaffs2 reiserfs reiser4 xfs btrfs orangefs lustre ocfs2 1.6 zfs f2fs filesystems support extended attributes abbreviated xattr enabled kernel configuration regular file directory may extended attributes consisting name associated data name must null-terminated string prefixed namespace identifier dot character currently four namespaces exist user trusted security system user namespace restrictions regard naming contents system namespace primarily used kernel access control lists security namespace used selinux example support extended attribute concept posix.1e draft withdrawn 1997 added linux around 2002 2016 yet widespread use user-space linux programs used beagle openstack swift dropbox kde semantic metadata framework baloo chromium wget curl set recommendations using available freedesktop.org linux kernel allows extended attribute names 255 bytes values 64kib xfs reiserfs ext2/3/4 btrfs impose much smaller limits requiring attributes names values one file fit one filesystem block usually 4 kib extended attributes accessed modified using codice_1 codice_2 codice_3 commands codice_1 package distributions mac os x 10.4 later support extended attributes making use hfs+ filesystem attributes file b*-tree feature allows named forks although named forks hfs+ support arbitrarily large amounts data extents os support extended attributes supports inline attributes limiting size fit within single b*-tree node regular file may list extended attributes hfs+ supports arbitrary number named forks unknown macos imposes limit number extended attributes attribute consists name associated data name null-terminated unicode string macos apis support listing getting setting removing extended attributes files directories command line abilities exposed xattr utility recent versions macos files originating web marked codice_5 via extended file attributes older versions macos mac os x 10.6 user space extended attributes preserved save common cocoa applications textedit preview etc. os/2 version 1.2 later high performance file system designed extended attributes mind support also retro-fitted fat filesystem dos compatibility operating systems using fat partition os/2 attributes stored inside single file ea data sf located root directory file normally inaccessible operating system supporting extended attributes manages disk freely manipulated example dos files directories extended attributes use one clusters inside file logical cluster number first used cluster stored inside owning file directory directory entry two bytes used purposes fat32 filesystem hence os/2 extended attributes stored filesystem parts os/2 version 2.0 later workplace shell uses several standardized extended attributes also called eas purposes like identifying filetype comments computer icons keywords file programs written interpreted language rexx store already parsed version code extended attribute allow faster execution solaris version 9 later allows files extended attributes actually forks maximum size extended attribute maximum size file read written fashion files internally actually stored accessed like normal files names contain characters ownership permissions differ parent file version 4 network file system supports extended attributes much way solaris windows nt limited-length extended attributes supported fat hpfs ntfs implemented part os/2 subsystem notably used nfs server interix posix subsystem order implement unix-like permissions windows subsystem linux added windows 10 anniversary update uses similar purposes storing linux file mode owner device id applicable file times extended attributes additionally ntfs store arbitrary-length extended attributes form alternate data streams ads type resource fork plugins file manager total commander like ntfs descriptions quicksearch extended support filtering file list searching metadata contained ads streams
[ 5120, 6669, 3598, 4623, 10257, 6677, 5142, 8214, 10785, 9762, 5158, 52, 11323, 8772, 4708, 9836, 7789, 8303, 9839, 9840, 9842, 9333, 6263, 9335, 639, 9343, 5256, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6813, 3744, 6309, 1190, 5286, 1040...
None
7,664
7
Symphony_(software):symphony software ibm spectrum symphony previously known ibm platform symphony platform symphony high-performance computing hpc software system developed platform computing company developed load sharing facility lsf focusing financial services symphony designed deliver scalability enhances performance compute-intensive risk analytical applications product lets users run applications using distributed computing version 4.0 platform included developer edition restrictions time limits symphony developer edition free high-performance computing hpc grid computing software development kit middleware described first solution tailored developing testing grid-ready service-oriented architecture applications
[ 5956, 4107, 5677, 6797, 7983, 3573, 823, 8122 ]
Validation
7,665
3
TIM-001:tim-001 tim-001 application development microcomputer developed mihajlo pupin institute serbia 1983/84 1 dragoljub milićević dušan hristović ed računari tim naučna knjiga belgrade 1990 serbian language 2 dušan hristović razvoj računarstva u srbiji computing serbia phlogiston journal 18/19 pp.89-105 museum mnt-sanu belgrade 2010/2011 serbian 3 d.b.vujaklija n.markovic ed 50 years computing serbia pp.37-44 dis imp pc-press belgrade 2011
[ 6859, 10356, 9606, 10635 ]
Test
7,666
6
Source_Code_Control_System:source code control system source code control system sccs version control system designed track changes source code text files development piece software allows user retrieve previous versions original source code changes stored originally developed bell labs 1972 marc rochkind ibm system/370 computer running os/360 sccs also known codice_1 string example string contains file name date also contain comment compilation string found binary object files looking pattern used determine source code files used compilation command available automate search version strings 1972 marc rochkind developed sccs snobol4 bell labs ibm system/370 computer running os/360 mvt later rewritten c unix running pdp-11 first publicly released version sccs version 4 february 18 1977 available programmer workbench pwb edition operating system release 4 sccs first version used text-based history file format earlier versions use binary history file formats release 4 longer written maintained marc rochkind subsequently sccs included commercial system iii system v distributions licensed 32v ancestor bsd sccs command set part single unix specification sccs dominant version control system unix later version control systems notably rcs later cvs gained widespread adoption today early version control systems generally considered obsolete particularly open-source community largely embraced distributed version control systems however sccs file format still used internally newer version control programs including bitkeeper teamware latter frontend sccs sablime developed modified version sccs uses history file format incompatible sccs sccs file format uses storage technique called interleaved deltas weave storage technique considered many version control system developers foundational advanced merging versioning techniques precise codeville pcdv merge apart fixing year 2000 problems 1999 active development various unix vendor specific sccs versions 2006 sun microsystems today part oracle released solaris version sccs open-source cddl license part efforts open-source solaris source code control system sccs system controlling file history changes software typically upgraded new version fixing bugs optimizing algorithms adding extra functions changing software causes problems require version control solve sccs built solve problems sccs five major versions ibm os five major versions unix two specific implementations using sccs pdp 11 unix ibm 370 os sccs consists two parts sccs commands sccs files basic operations e.g. create delete edit realized sccs commands sccs files unique format prefix codice_2 controlled sccs commands sccs file composed three different parts sccs delta refers change sccs file deltas stored delta table sccs file record changes every operation sccs file tracked flags functions three types control records used keep track insertions deletions applied different deltas insertion control record deletion control record end control record whenever user changes part text control record inserted surrounding change control records stored body along original source code text records lots commands used sccs commands helps users finish want achieve without understanding worked also sccs allows users access history files moreover also provides commands allow edit monitor change source files sccs create command uses text source file create new history file example outputs name version lines create command macro expands admin create new history file followed get retrieve file edit specific file edit command macro expands get -e. check new version get new version sccs delget command macro expands delta check new version file followed get retrieve file outputs version lines want get specific file command produces report changes made unix versions include version sccs however often longer actively developed jörg schilling requested release sccs early days opensolaris project maintains fork sccs based opensolaris source code received major feature enhancements remains compatible original sccs versions unless using new project mode heirloom project includes version sccs derived opensolaris source code maintained december 2006 april 2007 gnu offers sccs compatible program gnu cssc compatibly stupid source control occasionally used convert sccs archives newer systems like cvs subversion complete sccs implementation recommended use new projects mostly meant converting modern version control system since 1990s many new version control systems developed become popular designed managing projects large number files offer advanced functionality multi-user operation access control automatic building network support release management distributed version control bitkeeper teamware use sccs file format internally considered successors sccs src version control system also use sccs file format internally rcs aims provide better user interface sccs still managing single-file projects
[ 9665, 11363, 1668, 7460, 5992, 10569, 2222, 7983, 2035, 2132, 2995, 5397, 4919, 9724, 2045, 9151 ]
Train
7,667
6
Pack_(compression):pack compression pack deprecated unix shell compression program based huffman coding unpack utility restore files original state compressed using pack utility files specified standard input uncompressed standard output although obsolete support packed files exists modern compression tools gzip 7-zip files compressed pack typically given extension .z confused .z compress files returned original state using unpack addition may also pcat command reads compressed file sends output stdout
[ 6022, 10121, 1420, 1940, 3222, 9880, 3114, 10027, 11442, 6713, 2755, 11076, 1352, 4296, 10317, 10575, 4561, 722, 8414, 1631, 3296, 9953, 5858, 11614, 6759, 7529, 4459, 237, 1646, 6389, 4089, 894, 10623 ]
Test
7,668
4
Humming_Heads:humming heads humming heads inc. eip enterprise information protection software developer based japan humming heads inc. founded 1999 focus computer security shipped first product security platform sep 2001 anti-virus software taking sox seriously humming heads introduced functionality preventing unauthorized access confidential information theft electronic systems humming heads came implementation desktop file manager 2017 firm entered us market sep prevents unauthorized information access pc well external devices sep client controlling storage devices automatically performs operations like encryption also keeps log user operations stored server side analyzed needed one important features sep marginal effect client pc performance originally sep available japanese language chinese english versions sep software development
[ 5373 ]
Validation
7,669
8
Mobile_web_analytics:mobile web analytics mobile web analytics studies behavior mobile website visitors similar way traditional web analytics commercial context mobile web analytics refers use data collected visitors access website mobile phone helps determine aspects website work best mobile traffic mobile marketing campaigns work best business including mobile advertising mobile search marketing text campaigns desktop promotion mobile sites services data collected part mobile analytics typically includes page views visits visitors countries well information specific mobile devices device model manufacturer screen resolution device capabilities service provider preferred user language data typically compared key performance indicators performance return investment used improve website mobile marketing campaign audience response majority modern smartphones able browse websites browsing experiences similar desktop computers w3c mobile web initiative identifies best practices help websites support mobile phone browsing many companies use guidelines mobile-specific code like wireless markup language html5 optimize websites viewing mobile devices begin way users interact cell phone tablet differs immensely way interact desktop laptop action clicking mouse replaced action swiping finger scrolling longer pages relevant information one place replaced top heavy navigation styles factors greatly influence click-through rates consequently way web analytics used collecting mobile web analytics data proven less straightforward traditional web analytics due defining factors traditional analytics software mobile website provides data http requests coming advanced mobile browsers found iphone smart phones pdas data mobile devices browsing site common web analytics software use server log parsing associate different ip addresses unique visits may fail actually identify unique visitors due ip addresses mobile device originating gateway ip address network access provider several dynamic server-side platforms used develop mobile sites server-side tracking code recommended accurate analytics reporting different tracking processes mechanisms available platforms unsupported/html sites javascript pixel tracking mechanism commonly used mobile websites typically open access kind network fixed wi-fi cellular wireless satellite wireless etc traditional web analytics solution could range fairly accurate mostly inaccurate depending http requests coming addition mobile web analytics involve metrics kpis associated mobile device information model manufacturer screen resolution data usually assembled combining device identification information taken special http headers user-agents device capabilities stored device information registry wurfl method provided traditional web analytics solutions mobile web-specific visitor identification important aspect usable mobile web analytics one hardest technical aspects accomplish primarily javascript http cookies unreliable mobile browsers result mobile web analytics solutions detect count user visits per day best solutions provide reliable persistent unique user identities allowing accurate measurement repeat visits long-term customer loyalty javascript-based page tagging notifies third-party server page rendered web browser method assumes end user browser javascript capabilities javascript enabled though possible neither may true time mobile web browsers support javascript sufficiently work http cookies commonly used mark identify visitors cookies standard capability desktop web browsers prevalence iphones androids http cookies supported smartphones default iphones android phones accept browser cookies web sites desktop browsers mobile device user may choose disable cookies http referrer information showing visitor navigated generally provided mobile web browsing either device manufacturer disabled sending information http request save bandwidth network usage mobile network operator internet gateway removes alters original http header due gateway software use mobile web transcoding software handset caching mechanisms impact use images page tagging cases image caching handsets performed regardless anti-caching headers output remote server desktop web browsing network address client machine usually gives form user identification location mobile web browsing client ip address refers internet gateway machine owned network operator devices blackberry phones using opera mini browser software ip address refers operator-owned internet gateway machine canada norway collection mobile web analytics data requires different approach collecting traditional web analytics data number solutions available best results obtained use one technology also known tagless data capture passive network capture technique uses tap mobile users web server capture full content client-server exchange tagless data capture techniques increasing popularity mobile web analytics capture users work devices require javascript cookies server logs plugins images forced work mobile web analytics provided transmitted image always unique level information recorded transmissions depends architecture provided supplier image beacon solutions link redirection important method tracking mobile visitor activities reliable way record clicks advertising search marketing activities also records visitors clicking links leave site method helps address lack http referrer information mobile tells number basic facts mobile phone browser used conjunction device database wurfl operator database used identify operators countries based ip addresses internet gateway devices ip addresses alone identify operators countries operators share mobile networks virtual network operators mvno boost wireless example uses sprint network two operators different customer demographics clear differentiation operators critical good mobile marketing campaigns carriers may also share mobile internet gateways sometimes across multiple countries many change add gateways regular basis wap gateway logs mine information analysed get relevant information mobile traffic goes servers companies like openwave tools analyse logs provide information required
[ 2208, 5536, 8644, 9732, 3462, 6, 8554, 6576, 3573, 5048, 1083, 7965, 8639 ]
Test
7,670
9
S-1_Lisp:s-1 lisp s-1 lisp lisp implementation written lisp 36-bit pipelined s-1 mark iia supercomputer computer architecture 32 megawords ram
[ 4992, 10752, 11269, 3334, 6919, 7562, 2062, 9231, 1301, 9749, 9877, 8728, 4633, 6556, 3869, 10012, 2335, 6047, 8226, 4516, 5031, 9128, 5803, 2225, 10547, 11255, 311, 2105, 7867, 6717, 4799, 5569, 6594, 8771, 4550, 8262, 1480, 7880, 8523, ...
Test
7,671
9
Whiley_(programming_language):whiley programming language whiley experimental programming language combines features functional imperative paradigms supports formal specification function preconditions postconditions loop invariants language uses flow-sensitive typing also known flow typing whiley project began 2009 response verifying compiler grand challenge put forward tony hoare 2003 first public release whiley june 2010 primarily developed david pearce whiley open source project contributions small community system used student research projects teaching undergraduate classes supported 2012 2014 royal society new zealand marsden fund whiley compiler generates code java virtual machine inter-operate java jvm based languages goal whiley provide realistic programming language verification used routinely without thought idea tool long history strongly promoted early 2000s hoare verifying compiler grand challenge purpose challenge spur new efforts develop verifying compiler roughly described follows primary purpose tool improve software quality ensuring program meets formal specification whiley follows many attempts develop tools including notable efforts spark/ada esc/java spec dafny why3 frama-c previous attempts develop verifying compiler focused extending existing programming languages constructs writing specifications example esc/java java modeling language add annotations specifying preconditions postconditions java likewise spec frama-c add similar constructs c c programming languages however languages known contain numerous features pose difficult insurmountable problems verification contrast whiley language designed scratch effort avoid common pitfalls make verification tractable syntax whiley follows general appearance imperative object-oriented languages indentation syntax chosen use braces delineate statement blocks given strong resemblance python however imperative look whiley somewhat misleading language core functional pure whiley distinguishes codice_1 pure codice_2 may side-effects distinction necessary allows functions used specifications familiar set primitive data types available including codice_3 codice_4 arrays e.g codice_5 records e.g codice_6 however unlike programming languages integer data type codice_4 unbounded correspond fixed-width representation 32-bit two complement thus unconstrained integer whiley take possible integer value subject memory constraints host environment choice simplifies verification reasoning modulo arithmetic known hard problem compound objects e.g arrays records references values heap languages java c instead immutable values whiley takes unusual approach type checking referred flow typing variables different static types different points function method flow typing similar occurrence typing found racket aid flow typing whiley supports union intersection negation types union types comparable sum types found functional languages like haskell whiley disjoint intersection negation types used context flow typing determine type variable true false branches runtime type test example suppose variable codice_8 type codice_9 runtime type test codice_10 true branch type codice_8 becomes codice_12 whilst false branch becomes codice_13 whiley uses structural rather nominal type system modula-3 go ceylon examples languages support structural typing form whiley supports reference lifetimes similar found rust lifetimes given allocating new objects indicate safely deallocated references objects must include lifetime identifier prevent dangling references every method implicit lifetime referred codice_14 variable type codice_15 represents reference object type codice_9 deallocated enclosing method subtyping lifetimes determined outlives relation thus codice_17 subtype codice_18 lifetime codice_19 statically outlives lifetime codice_20 lifetime whose scope encloses another said outlive lifetimes whiley differ rust currently include concept ownership whiley built-in support concurrency formal memory model determine reading/writing shared mutable state interpreted following example illustrates many interesting features whiley including use postconditions loop invariants type invariants union types flow typing function intended return first index integer codice_21 array integer codice_22 index exists codice_23 returned // define type natural numbers type nat int x x 0 public function indexof int items int item int|null index // int returned element position matches item ensures index int == items index == item // int returned element position first match // null returned element items matches item ensures index null == 0 .. |items| items == item function declared return type given union type codice_24 indicates either codice_4 value returned codice_23 returned function postcondition made three codice_27 clauses describe different properties must hold returned codice_28 flow typing employed clauses runtime type test operator codice_29 example first codice_27 clause variable codice_28 retyped codice_24 codice_4 right-hand side implication operator i.e codice_34 example also illustrates use inductive loop invariant loop invariant must shown hold entry loop given iteration loop loop exits case loop invariant states known elements codice_22 examined far — namely none matches given codice_21 loop invariant affect meaning program sense might considered unnecessary however loop invariant required help automated verifier using whiley compiler prove function meets specification example also defines type codice_37 appropriate type invariant type used declare variable codice_38 indicate never hold negative value case declaration prevents need additional loop invariant form codice_39 would otherwise necessary whiley began 2009 first public release codice_40 following june 2010 codice_41 september year language evolved slowly numerous syntactical changes made to-date versions prior codice_42 supported first-class codice_43 codice_44 data types removed favour representing strings constrained codice_5 arrays likewise versions prior codice_46 supported first-class set e.g codice_47 dictionary e.g codice_48 resizeable list codice_49 dropped favour simple arrays e.g codice_5 perhaps controversial removal codice_51 datatype version codice_52 many changes motivated desire simplify language make compiler development manageable another important milestone evolution whiley came version codice_53 inclusion reference lifetimes developed sebastian schweizer part master thesis university kaiserslautern
[ 9345, 1954, 3876, 8251, 2666, 2283, 8554, 5677, 10571, 5872, 7889, 4341, 10649, 2618, 1435, 2045 ]
Test
7,672
6
SuperCopier:supercopier supercopier file-copying software windows macos linux superseded ultracopier noted supercopier official website main features include normal vs ultimate version
[ 2406, 8524, 7983, 10101, 823, 10489 ]
Validation
7,673
8
URL_normalization:url normalization url normalization process urls modified standardized consistent manner goal normalization process transform url normalized url possible determine two syntactically different urls may equivalent search engines employ url normalization order reduce indexing duplicate pages web crawlers perform url normalization order avoid crawling resource web browsers may perform normalization determine link visited determine page cached several types normalization may performed always semantics preserving may following normalizations described rfc 3986 result equivalent urls http https urls following normalizations listed rfc 3986 may result equivalent urls guaranteed standards applying following normalizations result semantically different url although may refer resource normalization rules may developed specific websites examining url lists obtained previous crawls web server logs example url appears crawl log several times along may assume two urls equivalent normalized one url forms schonfeld et al 2006 present heuristic called dustbuster detecting dust different urls similar text rules applied url lists showed correct dust rules found applied normalization algorithm able find 68 redundant urls url list
[ 2016, 2945, 1802, 113, 6002, 6993, 5012, 10579, 119, 1723 ]
Test
7,674
1
TRICS:trics trics trip rate information computer system database trip rates developments used united kingdom transport planning purposes specifically quantify trip generation new developments trics consortium describes trics follows database established 1989 six county councils south east england county councils dorset east sussex hampshire kent surrey west sussex run trics consortium limited trics 7 major update released late 2013 trics includes following development categories trics also developed sam standard assessment methodology system measure effectiveness travel plans
[]
Validation
7,675
2
Mtrace:mtrace codice_1 memory debugger included gnu c library note codice_1 tool works single threaded applications one thread could temporarily remove hook another thread could malloc memory sametime leading missed allocations multithreaded application function codice_1 installs handlers codice_4 codice_5 codice_6 function codice_7 disables handlers prototypes defined header file codice_8 handlers log memory allocations frees file defined environment variable malloc_trace variable unset describes invalid filename describes filename user permissions handlers installed perl script called codice_1 confused function name also distributed gnu c library script parses output file reports allocations freed following example bad source code problem program allocates memory ’ free memory exiting mtrace command reports “ memory leaks ” memory allocated last execution program also released way hand mtrace gives output means programmer still work following example good source code releases memory allocated uses mtrace notify programmer memory leaks
[ 8582, 2045, 814, 7847 ]
Test
7,676
0
Eduard_Hovy:eduard hovy eduard hovy research professor language technologies institute carnegie mellon university one original 17 fellows association computational linguistics eduard hovy received m.s december 1982 ph.d. may 1987 degrees computer science yale university awarded honorary doctorates national university distance education uned madrid 2013 university antwerp 2015
[ 7724 ]
None
7,677
7
Halogen_Software:halogen software halogen software canadian company provides cloud-based talent management solutions customers 100 10,000 employees firm founded 1996 headquartered ottawa ontario canada firm formerly known manta corporation june 2001 changed name halogen software inc. halogen software backed jmi equity since 2008 les rechan became halogen software ’ new president ceo 2015 serving interim ceo halogen ’ board directors may 2015 halogen opened office united kingdom september 2011 created first australian office 2012 2013 2015 opened new offices san jose north carolina amsterdam dubai may 2013 halogen software debuted toronto stock exchange ticker symbol hgn company stock jumped 17 percent first day september 2013 halogen software launched two software modules implement one-on-one sessions managers employees workforce improve employee communication incorporating myers–briggs type indicator may 2017 halogen software acquired saba software 293 million
[ 4194 ]
None
7,678
4
Yalu_(iOS):yalu ios yalu formerly yalu mach portal jailbreaking tool created qwertyoruiop luca todesco marcograssi supports ios 10.1 10.1.1 ios 10.2 64-bit devices pre-iphone 7 ios 10.1 10.1.1 iphone 7 jailbreak semi-untethered requires rerun upon reboot however app certificate expires seven days sideloaded using cydia impactor jailbreak uses vulnerabilities released google project zero mach_portal intended developers final release mach_portal beta 4.1 developer reported broken initially saurik mobile substrate working later versions mach_portal attempted fix remained unstable developers launch app sideloaded using cydia impactor wait crash activate mach_portal supported iphone 7 iphone 6s ipad pro yalu successor mach_portal uses vulnerabilities patched ios 10.2.1 released 64-bit devices pre-iphone 7 beta 1 verifies mobile substrate works beta 2 added support iphone 5s/se 6 present mach_portal beta 3 fixes glitch users apple watch would experience beta 4 patches kernel forces dropbear use secure port instead 0.0.0.0 underneath beta 5 yalu download page qwertyoruiop writes placebo effect minor bug fixes patched release beta 7 adds support ios 10 64-bit devices jailbreakers reported final release stable
[ 5000, 6474, 4957, 1623 ]
Validation
7,679
3
King's_Valley:king valley king ’ valley platform game released konami msx 1985 game plays like lode runner takes place egyptian pyramids intrepid adventurer player goal collect various gems evading angry mummies monsters long enough find exit next level port ms-dos made korean company named aproman supports monochrome cga graphic cards sequel king valley ii released msx two versions specifically designed msx msx2 respectively
[ 4551, 9166, 9006, 10931, 6109 ]
Test
7,680
4
Malware_Bell:malware bell malware bell malware program made taiwan somewhere 2006 2007 malware bell tries install automatically upon visiting website promoting containing malware
[ 7515 ]
Validation
7,681
5
Media_gateway_control_protocol_architecture:media gateway control protocol architecture media gateway control protocol architecture methodology providing telecommunication services using decomposed multimedia gateways transmitting telephone calls internet protocol network traditional analog facilities public switched telephone network pstn architecture originally defined rfc 2805 used several prominent voice ip voip protocol implementations media gateway control protocol mgcp megaco h.248 successors obsolete simple gateway control protocol sgcp architecture divides functions required integration traditional telecommunication networks modern packet networks several physical logical components notably media gateway media gateway controller signaling gateways interaction media gateway controller defined media gateway control protocol media gateway protocols developed based internet model networking internet protocol suite referred device control protocols media gateway device offers ip interface legacy telephone interface converts media audio video streams legacy telephone interface may complex interface pstn switch may simple interface traditional telephone depending size purpose gateway may allow ip-originated calls terminate pstn vice versa may simply provide means connect telephone telecommunication system via ip network originally gateways viewed monolithic devices call control using protocols h.323 session initiation protocol hardware required control pstn interface 1998 idea splitting gateway two logical parts proposed one part contains call control logic called media gateway controller mgc call agent ca part interfaces pstn called media gateway mg functional split new interface existed mgc mg requiring framework communication elements resulting media gateway control protocol architecture sip h.323 signaling protocols media gateway control protocols device control protocols architectural difference sip h.323 media gateway control protocols relationships entities sip h.323 peer-to-peer relationships entities media gateway control protocols use master/slave technology model sip h.323 handle call setup connection management tear-down calls like interfaces whereas media gateway control protocols define mechanisms setup media paths streams ip networks several implementations media gateway control protocol common use names best-known protocols abbreviations protocol group although similar architecture mgcp h.248/megaco distinctly different protocols interoperable h.248/megaco mgcp protocols complementary h.323 sip may referred intelligent endpoint protocols h.248/megaco mgcp may referred device control protocols media gateway control protocols include predecessors mgcp namely simple gateway control protocol sgcp internet protocol device control ipdc proprietary protocol using similar architecture cisco skinny call control protocol sccp media gateway device converts media streams form digital data analog signals telecommunication services voice video fax applications two usually dissimilar interfaces using different technologies one technologies usually packet frame cell network example may convert voice telephone calls traditional analog telephone digital format transmission internet protocol ip network facilitate voice ip communications media gateway controller mgc also known call agent controls media gateways monitors gateways events off-hook state user intends initiate telephone call issues requests gateway initiate complete sessions alert called party terminate call protocols used interaction gateway controller evolved various types versions simple gateway control protocol sgcp internet protocol device control ipdc replaced media gateway control protocol mgcp megaco also known h.248 mgcs interface signaling protocols signalling system 7 ss7 interconnection traditional telephone system h.323 session initiation protocol sip device control protocols evolved several versions mgcp emerged group called international softswitch consortium group started early level 3 communications acquisition xcom telcordia bellcore july 1998 telcordia bellcore cisco systems created protocol called simple gateway control protocol sgcp controlling telephony gateways external call control elements meanwhile mid-1998 level 3 created technical advisory council tac composed dozen leading communications equipment manufacturers tac proposed device protocol called internet protocol device control ipdc august 1998 ipdc intended used media gateway media gateway controller media gateway capable acting voice ip gateway voice atm gateway dialup modem media gateway circuit switch cross- connect october 1998 simple gateway control protocol sgcp combined internet protocol device control ipdc resulting mgcp mgcp submitted ietf ’ megaco working group october 1998 november 1998 lucent technologies submitted draft third device protocol called media device control protocol mdcp use media gateways controllers ietf merged mgcp mdcp proposed new improved protocol named megaco protocol also known h.248 april 1999 first official version mgcp defined rfc 2705 informational rfc 3435 obsoleted rfc 2705 mgcp currently purely informational rather standard-track protocol although includes protocol specification even mgcp still internet draft many companies developed included mgcp development rather wait standardized protocol therefore decision made release mgcp informational rfc october 1999 ietf development mgcp stopped although companies continue implement mgcp driven efforts packetcable development network-based call signaling standardization mgcp effort pursued ietf megaco working group also itu-t/sg16 code name h.gcp rfc 3015 standard tracks megaco protocol also h.248 motivation megaco need satisfy various requirements addressed properly mgcp megaco evolution mgcp combination mgcp mdcp published standard rfc 3015 november 2000 megaco mgcp different interoperable h.248 h.248.1 gateway control protocol version 3 published international telecommunication union telecommunication itu-t protocol standard itu-t published three versions h.248.1 ietf published gateway control protocol version 1 informational rfc 3525 h.248 mgcp protocol controlling media gateways using media gateway controller call agent voip system h.248 mgcp used sip h.323 sip h.323 provide intercommunication gateway controllers mgcp used manage media establishment media gateways
[ 5472, 614, 5576, 9131, 7407, 9711, 6769, 6834, 5843, 8437, 10271 ]
Test
7,682
2
SUPER-UX:super-ux super-ux version unix operating system nec used sx series supercomputers initial version super-ux based unix system v version 3.1 features bsd 4.3 version nec sx-9 based svr4.2mp bsd enhancements super-ux 64-bit unix operating system supports supercomputer file system sfs earth simulator uses custom os called esos earth simulator operating system based super-ux many enhanced features custom designed earth simulator regular super-ux os
[ 2179, 6787, 6412, 5397, 2710, 1304, 3487, 8355, 3241, 7983, 3248, 2995, 9141, 823, 9784, 9151, 10436, 1480, 6369, 5492, 2424, 633 ]
Test
7,683
5
Obfuscated_TCP:obfuscated tcp obfuscated tcp obstcp proposal transport layer protocol implements opportunistic encryption transmission control protocol tcp designed prevent mass wiretapping malicious corruption tcp traffic internet lower implementation cost complexity transport layer security tls august 2008 ietf rejected proposal tcp option suggesting done application layer instead project inactive since months later 2010 june separate proposal called tcpcrypt submitted shares many goals obstcp transparent applications opportunistic low overhead requires even less configuration dns entries http headers unlike obstcp tcpcrypt also provides primitives application implement authentication prevent man-in-the-middle attacks mitm obstcp created adam langley concept obfuscating tcp communications using opportunistic encryption evolved several iterations experimental iterations obstcp used tcp options 'syn packets advertise support obstcp server responding public key 'synack ietf draft protocol first published july 2008 packets encrypted salsa20/8 signed packets md5 checksums present third iteration uses special dns records band methods advertise support keys without modifying operation underlying tcp protocol obstcp low cost protocol intended protect tcp traffic without requiring public key certificates services certificate authorities complex public key infrastructure intended suppress use undirected surveillance trawl unencrypted traffic rather protect man middle attack software presently supports salsa20/8 stream cipher curve25519 elliptic-curve diffie hellman function server using obstcp advertises public key port number dns record may used advertise server support obstcp dns 'cname record providing 'friendly name http header records cached/out band keyset information may also used instead client connecting obstcp server parses dns entries uses http header records uses cached/out band data obtain public key port number connecting server encrypting traffic
[ 517, 2887, 10924, 10831, 9744, 5078, 3742, 4863 ]
None
7,684
9
NumPy:numpy numpy pronounced sometimes library python programming language adding support large multi-dimensional arrays matrices along large collection high-level mathematical functions operate arrays ancestor numpy numeric originally created jim hugunin contributions several developers 2005 travis oliphant created numpy incorporating features competing numarray numeric extensive modifications numpy open-source software many contributors python programming language initially designed numerical computing attracted attention scientific engineering community early special interest group called matrix-sig founded 1995 aim defining array computing package among members python designer maintainer guido van rossum implemented extensions python syntax particular indexing syntax make array computing easier implementation matrix package completed jim fulton generalized jim hugunin become numeric also variously called numerical python extensions numpy hugunin graduate student massachusetts institute technology mit joined corporation national research initiatives cnri work jpython 1997 leaving paul dubois lawrence livermore national laboratory llnl take maintainer early contributors include david ascher konrad hinsen travis oliphant new package called numarray written flexible replacement numeric like numeric deprecated numarray faster operations large arrays slower numeric small ones time packages used different use cases last version numeric v24.2 released 11 november 2005 numarray v1.5.2 released 24 august 2006 desire get numeric python standard library guido van rossum decided code maintainable state early 2005 numpy developer travis oliphant wanted unify community around single array package ported numarray features numeric releasing result numpy 1.0 2006 new project part scipy avoid installing large scipy package get array object new package separated called numpy support python 3 added 2011 numpy version 1.5.0 2011 pypy started development implementation numpy api pypy yet fully compatible numpy numpy targets cpython reference implementation python non-optimizing bytecode interpreter mathematical algorithms written version python often run much slower compiled equivalents numpy addresses slowness problem partly providing multidimensional arrays functions operators operate efficiently arrays requiring rewriting code mostly inner loops using numpy using numpy python gives functionality comparable matlab since interpreted allow user write fast programs long operations work arrays matrices instead scalars comparison matlab boasts large number additional toolboxes notably simulink whereas numpy intrinsically integrated python modern complete programming language moreover complementary python packages available scipy library adds matlab-like functionality matplotlib plotting package provides matlab-like plotting functionality internally matlab numpy rely blas lapack efficient linear algebra computations python bindings widely used computer vision library opencv utilize numpy arrays store operate data since images multiple channels simply represented three-dimensional arrays indexing masking arrays efficient ways access specific pixels image numpy array universal data structure opencv images extracted feature points filter kernels many vastly simplifies programming workflow debugging core functionality numpy ndarray n -dimensional array data structure arrays strided views memory contrast python built-in list data structure despite name dynamic array arrays homogeneously typed elements single array must type arrays also views memory buffers allocated c/c++ cython fortran extensions cpython interpreter without need copy data around giving degree compatibility existing numerical libraries functionality exploited scipy package wraps number libraries notably blas lapack numpy built-in support memory-mapped ndarrays inserting appending entries array trivially possible python lists np.pad ... routine extend arrays actually creates new arrays desired shape padding values copies given array new one returns numpy np.concatenate a1 a2 operation actually link two arrays returns new one filled entries given arrays sequence reshaping dimensionality array np.reshape ... possible long number elements array change circumstances originate fact numpy arrays must views contiguous memory buffers replacement package called blaze attempts overcome limitation algorithms expressible vectorized operation typically run slowly must implemented pure python vectorization may increase memory complexity operations constant linear temporary arrays must created large inputs runtime compilation numerical code implemented several groups avoid problems open source solutions interoperate numpy include codice_1 numexpr numba cython pythran static-compiling alternatives
[ 5130, 11406, 7580, 7326, 1952, 8611, 9893, 10670, 7983, 7728, 2045, 10683, 462, 5588, 11221, 2135, 9320, 11625, 8554, 363, 5612, 2670, 9330, 6134, 3960, 1917 ]
Validation
7,685
4
LuckyBackup:luckybackup luckybackup free backup application provides gui based cross-platform qt framework fundamentally console based web based many clients list backup software shares data differencing copying tool rsync backuppc several others runs linux unix based system provides qt libraries rsync gui translated many languages available repositories major linux distributions including debian ubuntu opensuse fedora mandriva slackware gentoo
[ 9025, 11492, 10149, 3366, 6280, 5482, 5612, 1358, 7983, 10192, 5492, 823 ]
None