node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
7,686
7
Key_distribution:key distribution symmetric key cryptography parties must possess secret key must exchange prior using encryption distribution secret keys problematic recently involved face-to-face meeting use trusted courier sending key existing encryption channel first two often impractical always unsafe third depends security previous key exchange public key cryptography key distribution public keys done public key servers person creates key-pair keep one key private known public-key uploaded server accessed anyone send user private encrypted message ... secure sockets layer ssl uses diffie–hellman key exchange client public-private key pair published certificate public key infrastructure public key cryptography user keys credential key distribution important issue wireless sensor network wsn design many key distribution schemes literature designed maintain easy time secure communication among sensor nodes accepted method key distribution wsns key predistribution secret keys placed sensor nodes deployment nodes deployed target area secret keys used create network info see key distribution wireless sensor networks key distribution key storage problematic cloud due transitory nature agents secret sharing used store keys many different servers cloud secret sharing secret used seed generate number distinct secrets pieces distributed subset recipients jointly authenticate use secret information without learning rather store files different servers key parceled secret shares stored multiple locations manner subset shares regenerate key secret sharing used cases one wishes distribute secret among n shares n n regenerate original secret smaller group − 1
[ 8674, 10831 ]
None
7,687
3
Elbrus-8S:elbrus-8s elbrus-8s russian 28 nanometer 8-core microprocessor developed moscow center sparc technologies mcst first prototypes produced end 2014 serial production started 2016 elbrus-8s used servers workstations four elbrus processors server motherboard puts total 32 processor cores server blade 2018 mcst announced plans production updated version twice performance elbrus-8sv cpu features 576 gflops 1.5 ghz well ddr4 support instead ddr3 engineering samples already completed q3 2017
[ 4386, 6659, 6818, 7234, 2503, 6957, 5358, 1776, 1425, 499, 1399, 2490, 2523, 11580, 9309 ]
Test
7,688
4
Cloudbric_Labs:cloudbric labs cloudbric labs collection free web security resources tools provided cloud-based web security provider cloudbric ’ designed use developers webmasters end users interested achieving maintaining basic website security cloudbric labs composed api offered allow users integrate information cloudbric labs security platforms
[ 331, 1108 ]
Test
7,689
2
Woof_(software):woof software woof software application used build puppy linux distribution another linux distribution application must run inside puppy linux internet connection required order download linux distro binary packages cd-remaster program available puppy linux used build variants puppy linux distribution process used woof build puppy linux distribution another linux distribution linux distributions woof use foundation puppy linux distribution
[ 477, 6583, 10016, 10149, 5670, 8262, 5067, 5356, 9964, 6352, 499, 2195, 5363, 823, 6393, 7483, 2045 ]
Test
7,690
8
.NET_My_Services:.net services .net services codenamed hailstorm abandoned collection xml-based web services microsoft storing retrieving information net services announced march 19 2001 part microsoft .net initiative intended rely known microsoft passport single sign-in web service referred microsoft account .net services platform intended facilitate storage retrieval user-related information contacts calendar information e-mail messages allowing accessed centralized repository across various applications device types including traditional desktop pcs mobile devices laptops mobile phones pdas tablet pcs access stored information would based solely user discretion technology would rely subscription-based business model although technology required microsoft passport based cross-platform open standard web services including soap uddi ws-discovery enabled interoperability compatible systems without requiring microsoft windows .net services announced march 19 2001 microsoft intended reach broad developer availability year professional developers conference subsequent end-user release scheduled 2002 however due industry concerns related anti-competitive behavior end-user privacy company ultimately abandoned initiative could fully materialize
[ 425, 5612, 6797, 9328, 10486, 479 ]
None
7,691
9
Tiny_BASIC:tiny basic tiny basic dialect basic programming language fit little 2 3 kb memory small size made invaluable early days mid-1970s typical memory size 4 8 kb meet strict size limits math purely integer based lacked arrays language written part alternative microsoft basic ms basic would also run 4 kb machines left 790 bytes free programs free space significant advantage tiny basic another reason tiny basic popularity open letter published bill gates complaining users ripping ms basic tiny basic published openly later invented term copyleft describe made popular burgeoning early microcomputer market tiny basic published newsletter offshoot people computer company dozens versions created almost every platform era many variations additions published time newsletter eventually became dr. dobb journal long-lived computing magazine tiny basic example free software project existed free software movement dennis allison member computer science faculty stanford university wrote specification simple version basic programming language urged create standard bob albrecht homebrew computer club seen basic minicomputers felt would perfect match new machines like mits altair 8800 released january 1975 allison proposed design used integer arithmetic support arrays goal program fit 2 3 kilobytes memory first version published people computer company separate newsletter format known tiny basic journal full name dr. dobb tiny basic journal calisthenics orthodontia running light without overbyte first issue released january 1976 point programmers began modifying code sending results back published future issues sending magazines like interface age scope original newsletter expanded eventually became known simply dr. dobb journal dick whipple john arnold wrote interpreter required 3k ram middle 1976 tiny basic interpreters available intel 8080 motorola 6800 mos technology 6502 processors forerunner free software community collaborative development internet allowed easy transfer files example free software project free software movement computer hobbyists would exchange paper tapes cassettes even retype files printed listings jim warren editor dr. dobb wrote july 1976 acm programming language newsletter motivations methods successful project started viable alternative problems raised bill gates irate letter computer hobbyists concerning 'ripping software software free inexpensive easier pay duplicate wo n't 'stolen bill gates letter written make software products alternative method experienced professional overall design outline implementation strategy knowledgeable amateurs would implement design variety computer systems warren predicted strategy would continued expanded may 1976 issue dr. dobbs li-chen wang palo alto tiny basic intel 8080 microprocessor listing began usual title author name date also copyleft wrongs reserved fellow homebrew computer club member roger rauskolb modified improved li-chen wang program published december 1976 issue interface age magazine roger added name preserved copyleft notice versions tiny basic existed one written thomas f. waitman 1976 hewlett-packard hp-2640 hp-2645 terminals used intel 8008 8080 processors 8080 ran tiny basic interpreter thomas f. waitman wrote articles hewlett-packard journal 1977 radioshack released first computer trs-80 basic interpreter rom derived palo-alto tiny basic dr. wang version occupied less 2kb radioshack derivation replaced integer representation numbers floating point representation added i/o support e.g cassette tape interface version known level basic fit 4kb rom grammar listed backus-naur form listing asterisk denotes zero object left — except first asterisk definition term multiplication operator parentheses group objects epsilon ε signifies empty set common computer language grammar notation vertical bar distinguishes alternatives listed separate lines symbol cr denotes carriage return usually generated keyboard enter key break console interrupt execution program implementations including first tiny basic tom pittman tiny basic virtual machine used others palo alto tiny basic 6800 tiny basic direct interpreters virtual machine implementation tiny basic interpreter run virtual machine interpreter designer idea use application virtual machine goes back val schorre meta ii 1964 glennie syntax machine following table gives partial list commands virtual machine first tiny basic interpreter written length whole interpreter program 120 virtual machine operations thus choice virtual machine approach economized memory space implementation effort although basic programs run thereon executed somewhat slowly
[ 3718, 1805, 9997, 786, 11412, 22, 3736, 3481, 9881, 797, 3233, 9891, 7076, 5925, 8101, 11683, 4136, 10666, 5677, 8494, 303, 7343, 11315, 315, 7355, 7486, 7870, 4160, 4674, 8262, 10750, 712, 847, 5711, 1879, 92, 11229, 2915, 9188, 5733, ...
Test
7,692
4
Information_Systems_Security_Association:information systems security association information systems security association issa not-for-profit international professional organization information security professionals practitioners founded 1984 work establishment started 1982 issa promotes sharing information security management practices educational forums publications networking opportunities among security professionals issa members award winners include many industry ’ notable luminaries represents wide range industries – communications education healthcare manufacturing financial consulting well federal state local government departments agencies association publishes issa journal peer-reviewed publication issues trends industry also partners esg enterprise strategy group release yearly research report life times cyber security professional examine experiences cybersecurity professionals navigate modern threat landscape effects careers information systems security association board directors elected annually members set committees appointed headquarters issa located vienna virginia issa international board directors executive officers president candy alexander cissp cism vice president roy wilkinson phd cpcs chs-v cissp secretary/director operations anne rogers cissp cce pmp ence iam iem treasurer/chief financial officer pamela fusco cissp issa international membership base primary goal issa promote management practices ensure confidentiality integrity availability information resources issa facilitates interaction education create successful environment global information systems security professionals involved issa goals promote security education skills development encourage free information exchanges communicate current events within security industry help express importance security controls enterprise business management applicant membership individual expected bounded principle ethics related information security career applicants issa membership attest issa present one hundred countries including europe asia 10,000 members
[ 1312, 3552, 10717, 4435, 6773, 6648, 6842, 5373, 2558 ]
None
7,693
7
Epos_Now:epos epos cloud-based software provider specialising design manufacture electronic point sale commonly referred epos encompasses features including limited reporting stock control crm retail hospitality businesses epos software operated device platform web-browser using epos ios android app epos uk headquarters located norwich england us headquarters orlando florida founded june 2011 company pioneer cloud-technology epos industry notable first epos company introduce appstore customers allows users customise system epos appstore introduced december 2014 epos innovation recognised 2016 company queen award enterprise uk highest accolade business success epos uk 13th fastest growing private technology company fastest growing epos company uk epos founded jacyn heavens 2011 external investment ceo founder jacyn heavens identified gap market affordable epos system whilst managing bar searching epos system would suitable business started building software would suit business owners like epos appstore officially launched september 2015 making first appstore released within epos industry 30,000 businesses using epos 2015 epos awarded 'epos innovation year retail systems shortlisted edp business awards tech cities 2015 2016 epos shortlisted uk cloud awards innovative smb product year category engagement loyalty awards innovative technology category epos also finalist 2016 grocer gold awards technology supplier year category 21 april 2016 announced epos queen award enterprise innovation category epos named gold stevie award winners international business awards innovative company year 2016 epos three eastern daily press business awards 2016 categories employer year tech innovator year business year sponsored barclays company made tech track 100 three years running named 13th 32nd 53rd fastest growing tech company uk named 30th fastest growing company 2016 deloitte fast 50 growth 597 epos named 179th fastest growing tech company deloitte 2016 fast 500 emea epos named europes 46th fastest growing company financial times 1000 listing epos recognised commitment professional development employees winning princess royal training award 2017 epos noted 'best saas product small business/smbs 2017 saas awards
[]
Test
7,694
4
CDex:cdex cdex free software package digital audio extraction audio cd so-called cd ripper audio format conversion microsoft windows converts cdda tracks cd standard computer sound files wav mp3 ogg vorbis cdex previously released free software terms gnu general public license gpl however although website claims still case source code released since 2005 originally written albert l. faber developed maintained georgy berdyshev recent versions software may compromised security threat cdex able convert cd audio several formats including wav vorbis mp3 using lame encoder vqf musepack ape many others version 1.70b2 flac encoding native version 1.51 flac codecs used using external encoder supports cd-text allow ripped tracks reduced user effort names songs artists albums also automatically identify inserted audio cds look metadata means online database freedb automatic tagging naming sorting ripped files also includes cdparanoia robust cd reading cdex considered configurable relatively easy use 2000 start beta phase version 1.30 cdex turned free software project cdexos cdex open source hosted sourceforge.net january 2006 cdex homepage requested new project manager developer implying albert l. faber abandoned development cdex 5 june 2006 cdex 1.70 beta 1 released via sourceforge.net website ascribed georgy berdyshev first official update program almost three years cdex 1.70 beta 2 following soon 23 june 2006 2008 berdyshev joined ariane gomes project developers 18 november 2009 cdex 1.70 beta 4 released cdex 1.70 final released 29 june 2014 featuring unicode multibyte version 30 june 2007 one day release gplv3 license cdex updated however last version source code made available 1.70 beta 2 sourceforge project appears shut july 2015 shortly release version 1.79 version 1.76 installer includes adware opencandy november 2017 version 1.96 released clear current code maintainer contact details provided four versions released march 2018 recent reincarnation cdex seen number sponsored programs automatically selected installation little information nature scan results suggest may substantial risk system installed along source code longer publicly accessible preventing independent code review project considered exploited new maintainer trusted project trusted installed machine new maintainer taken new releases pushed showing activity support links broken ticketing system exist broken link contact details method interact developer installer installing adware without notifications new maintainer exploited strong reputation work project turned mechanism profit updates made application including installer hidden software installed later versions apparently also add artifacts ends certain tracks ripped program rolling back earlier version program eliminates issue
[ 8554, 877, 6797, 7983, 2045 ]
None
7,695
8
WEBrick:webrick webrick ruby library providing simple http web servers webrick primarily written masayoshi takahashi yuuzou gotou contributions developers via open-source model software development uses basic access authentication digest access authentication different kinds servers create http based server https server proxy server virtual-host server construction several non-http servers day time server uses daytime protocol rather http also facilitated webrick used ruby rails padrino frameworks test applications development environment well production mode small loads part ruby standard library webrick originated idea article named internet programming ruby open design japanese engineering magazine initially developed toolkit development http servers using ruby due nature open source model contributions several ruby developers across world webrick greatly augmented eventually bundled standard library ruby 1.8.0 webrick erb handler webrick proxy server first introduced ruby 1.9.3 webrick virtual host included ruby 2.0.0 webrick server understands language servlets uses multiple independent servlets joined together programmer handling cgi scripts erb pages ruby blocks directory listings provide web application service request uri per-host per-path basis example httpservlet :filehandler httpservlet :prochandler httpservlet :cgihandler httpservlet :erbhandler examples standard servlets webrick comes webrick included ruby hence available user additional cost webrick written completely ruby supports several standards http html even rhtml development stage necessity installation discrete web server since webrick already built rails framework default web server ruby application deployed without procfile rails furthermore since implemented entirely ruby direct calls made webrick rails application whole provides reliable low configuration option testing development following commands used start http server required port require 'webrick' root file.expand_path '/var/myapp/' server webrick :httpserver.new port 1234 documentroot root server.mount_proc '/ |request response| end trap 'int server.shutdown server.start servlets mounted provide advanced custom behavior compared proc increase modularity webrick creates listening port various ports ‘ virtual hosts ’ also created time listen shown vhost webrick :httpserver.new servername 'vhost.example vhost.mount '/ ... server.virtual_host vhost nowiki /nowiki documentroot provided instance servlet set service request uri otherwise 404 error returned enabling ssl providing ssl certificate name https server initiated self-signed certificate changes every restart server require 'webrick' require 'webrick/https' cert_name w cn localhost server webrick :httpserver.new port 1234 however pre-determined key certificate also provided instantiating https server shown require 'openssl' cert openssl :x509 :certificate.new file.read '/var/myapp/cert.pem' pkey openssl :pkey :rsa.new file.read '/var/myapp/pkey.pem' server webrick :httpserver.new port 1234 webrick also proxy get head post requests require 'webrick/httpproxy' proxy webrick :httpproxyserver.new port 1234 trap 'int proxy.shutdown end unlike servers used production webrick scalable since single threaded web server default hence multiple requests time handled subsequent requests would wait till previous requests handled incurring large delay hence developers prefer multi-threaded full-fledged web servers like lighttpd mongrel deploying rails applications
[ 1920, 4485, 7430, 9229, 2191, 1937, 7443, 10771, 9245, 8350, 7457, 3746, 8994, 11682, 3237, 9125, 7338, 9387, 44, 7983, 10800, 11439, 564, 2485, 4277, 5945, 6714, 1852, 5567, 6338, 1991, 11208, 5578, 11134, 595, 1363, 3545, 10973, 7264, 2...
Test
7,696
2
Gutenprint:gutenprint gutenprint formerly gimp-print collection free-software printer drivers use unix spooling systems cups lpr lprng drivers provide printing services unix-like systems including linux macos risc os haiku originally developed plug-in gimp later became general tool use programs operating systems macos windows apple introduced mac os x omitted printer drivers claiming printer manufacturer task produce many update drivers since apple chosen use cups core printing system gimp-print filled void gutenprint 1,300 drivers apollo apple brother canon citizen compaq dai nippon dec epson fujifilm fujitsu gestetner hp ibm infotec kodak kyocera lanier lexmark minolta nec nrg oki olivetti olympus panasonic pcpi raven ricoh samsung savin seiko sharp shinko sony star tally tektronix xerox printers many users incorrectly called gimp software renamed gutenprint clearly distinguish gimp name gutenprint recognizes johannes gutenberg inventor movable type printing press epson backend active development new printers bug fixes capability additions contributed new release backend active development new printers bug fixes capability additions contributed new release canon printers use intelligent printheads control quality final output given metadata sent printer driver consequence design print quality specified resolution alone via resolution mode quality setting 5 quality settings available time resolution parameter driver-output data meta-resolution typically either 300 600 dpi sometimes 1200 dpi certain monochrome high-quality photo modes limited number printers firmware controls printhead creates physical ink output marketed resolution available quality selections depends number parameters applicable media printed duplex simplex borderless bordered color monochrome printing inkset selection cartridge selection thus number available resolution modes per media available depending parameters set printjob since gutenprint options always available via ppd driver attempts select reasonable defaults cases user settings contradiction prioritization follows media type resolution mode cartridge selection inkset selection duplex selection parameter clash detected driver resolution mode parameters set according priority substitution resolution mode carried try maintain required quality initially requested borderless selection added version 5.2.9 currently part prioritization replacement algorithm small number printers analyzed discover appropriate modes media borderless printing pcl color laser lexmark backends currently unmaintained volunteers welcome fairly often printers would use backends emulation capability languages particular postscript case printer configured use standard postscript driver
[ 3974, 8360, 7626, 7983, 10960, 5397, 823, 2045 ]
Test
7,697
2
IPad_(3rd_generation):ipad 3rd generation third-generation ipad marketed new ipad colloquially referred ipad 3 tablet computer developed marketed apple inc third device ipad line tablets added retina display new apple a5x chip quad-core graphics processor 5-megapixel camera hd 1080p video recording voice dictation support lte networks north america shipped ios 5 also provides platform audio-visual media including electronic books periodicals films music computer games presentations web content united states canada nine variations third-generation ipad offered compared six rest world although countries wi-fi model variation available black white front glass panels options 16 32 64 gb storage north america connectivity options wi-fi wi-fi 4g lte verizon telus rogers bell rest world outside north america connectivity options wi-fi wi-fi model wi-fi 3g wi-fi cellular model latter unavailable countries 4g lte connectivity device available outside north america wi-fi cellular model includes gps capability initially cellular version titled marketed worldwide wi-fi 4g model due regional differences classification 4g lte connectivity outside north america apple later rebranded altered marketing call wi-fi cellular model tablet released ten countries march 16 2012 gained mostly positive reviews earning praise retina display processor 4g lte capabilities however controversy arose lte incompatibilities became known three million units sold first three days seven months 221 days official availability third-generation ipad discontinued october 23 2012 following announcement fourth-generation ipad third-generation ipad shortest lifespan ios product also last ipad support 30-pin dock connector fourth-generation ipad later use lightning connector speculation product began shortly apple released ipad 2 featured front back cameras well dual-core apple a5 processor speculation increased news 2,048-by-1,536 pixel screen leaked time tablet called ipad 3 colloquial name sometimes still used release february 9 2012 john paczkowski things digital stated apple ’ holding event february—strange unusual otherwise holding one march—to launch next ipad another common rumor time tablet would apple a6 processor february 29 2012 apple announced media event scheduled march 7 2012 yerba buena center arts company predisclose subject event analysts widely expected event announce new version ipad announcement affected tablet resale market positively event apple ceo tim cook introduced japanese version siri third-generation apple tv third-generation ipad cook claimed new product would one main contributors emerging post-pc world —a world digital life would tied pc march 16 2012 release included eight countries including australia canada japan singapore united kingdom united states march 23 2012 release included many european countries mexico macau april 20 2012 release added dozen countries including south korea malaysia april 27 2012 release added nine countries including india south africa may 2012 releases added 31 countries including brazil turkey october 23 2012 upon announcement fourth-generation ipad third-generation ipad discontinued response criticism owners return policy select apple stores briefly extended thirty days allow customers exchange third-generation model fourth-generation model third-generation ipad shipped ios 5.1 released march 7 2012 act hotspot carriers sharing internet connection wi-fi bluetooth usb providing wi-fi cellular model also access app store digital application distribution platform ios developed maintained apple service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available ipad comes several pre-installed applications including safari mail photos videos youtube music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed without computer although tablet designed make phone calls cellular network users use headset built-in speaker microphone place phone calls wi-fi cellular using voip application skype device dictation using voice recognition technology iphone 4s user speaks ipad types say screen provided ipad connected wi-fi cellular network third-generation device optional ibooks application displays books epub-format content downloaded ibookstore several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books device despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble offer e-reader apps ipad september 19 2012 ios 6 contains 200 new features released ios 6 update includes new features apple maps replaced mapping application operated google facebook integration ability operate siri third-generation ipad third-generation ipad compatible ios 7 released 2013 although complete support newer features airdrop released newer models supported similar support also given iphone 4s ios 8 also supported third-generation ipad however features stripped ios 9 supports third-generation ipad well fifth major ios release model supports ios 9 public beta also compatible model supported 3 years ios 9.3.5 latest final version support ipad 3rd generation wi-fi model wi-fi cellular version runs ios 9.3.6 researchers demonstrated within hours product release third-generation ipad jailbroken use applications programs authorized apple third-generation ipad jailbroken redsn0w 0.9.12 absinthe 2.0 jailbreaking violates factory warranty one main reasons jailbreaking expand feature set limited apple app store jailbreaking tools automatically install cydia native ios apt client used finding installing software jailbroken ios devices many apps unapproved apple extensions customizations ios apps users install programs personalize customize interface adding desired features fixing annoyances simplify app development providing access filesystem command-line tools however apple often patches exploits used jailbreaking teams ios updates ipad 3rd generation always jailbreakable device apple a5x soc 1 ghz dual-core 32-bit cortex-a9 cpu quad-core powervr sgx543mp4 gpu 1 gb ram 5-megapixel rear-facing camera capable 1080p video recording vga front-facing videophone camera designed facetime display resolution 2,048 1,536 qxga 3.1 million pixels—four times ipad 2—providing even scaling prior model new ipad thicker predecessor 0.6 mm heavier 51 grams wi-fi model 652 grams wi-fi cellular models 662 grams 49 grams heavier model 55 grams heavier verizon model compared respective ipad 2 3g models 3g ipad 2 613 grams verizon 3g ipad 2 607 grams four physical switches third-generation ipad including home button near display returns user home screen three plastic switches sides wake/sleep volume up/down plus software-controlled switch whose function varies software update display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes tablet manufactured either without capability communicate cellular network models connect wireless lan third-generation ipad optionally 16 32 64 gb internal flash memory expansion option apple sells camera connection kit sd card reader used transfer photos videos audio playback third-generation ipad frequency response 20 hz 20,000 hz without third-party software play following audio formats he-aac aac protected aac mp3 mp3 vbr audible formats 2 3 4 aea aax aax+ alac aiff wav preliminary tear-down third-generation ipad ihs isuppli showed likely costs 16 gb wi-fi cellular model 358.30 32 gb 375.10 64 gb 408.70 respectively ipad uses internal rechargeable lithium-ion polymer lipo battery batteries made taiwan simplo technology 60 dynapack international technology ipad designed charged high current 2 amps using included 10 w usb power adapter usb cord usb connector one end 30-pin dock connector end charged older usb port computer limited 500 milliamps 0.5 amps result ipad use powered computer may charge slowly high-power usb ports found newer computers accessories provide full charging capabilities apple claims battery provide 10 hours video 140 hours audio playback one month standby people say battery lasts 8 hours normal tasks like rechargeable battery ipad battery loses capacity time however ipad battery user-replaceable program similar ipod iphone battery-replacement programs apple promised replace ipad hold electrical charge refurbished unit fee us 99 plus 6.95 shipping user data preserved/transferred refurbished unit comes new case warranty refurbished unit may vary jurisdictions smart cover introduced ipad 2 screen protector magnetically attaches face ipad cover three folds allow convert stand also held together magnets smart cover also assume positions folding original ipad owners could purchase black case included similarly folding cover smart cover simpler easily detachable protects screen smart covers microfiber bottom cleans front ipad wakes unit cover removed comes five colors polyurethane expensive leather apple offers several accessories adapters proprietary 30-pin dock connector port besides headphone jack dock holds ipad upright angle dock connector audio line-out port ipad use bluetooth keyboards also work macs pcs ipad charged standalone power adapter wall charger compatible ipods iphones 10-watt charger included third-generation ipad received many positive reviews receiving praise retina display camera processor lte capabilities according walt mossberg things digital new model spectacular display ... seen mobile device holds crown best tablet planet jonathan spira writing frequent business traveler claimed seems make everything sharper clearer criticism followed news markets outside us tablet communicate lte due use 700 mhz 700/2,100 mhz frequencies respectively versus 800 mhz 1.8 ghz 2.6 ghz used elsewhere soon launch australian competition consumer commission accc took apple court breaking four provisions australian consumer law alleged apple promotion tablet australia 'ipad wi-fi 4g misled customers name indicates would work australia then-current 4g network apple responded offering full refund customers australia purchased wi-fi cellular model previously named wi-fi 4g ipad april 20 2012 apple stated hspa+ networks australia 4g even though speeds slower lte month later june 21 2012 apple sued 2.25 million false advertising australia advertisements apple claimed new ipad 4g lte compatible however n't work telstra lte mobile data network australia apple fined 2.25 million ordered pay 300,000 costs apple agreed remove references 4g lte capability uk advertising august done widespread 4g lte network uk time third-generation ipad would also incompatible future 4g lte networks roll-out advertising standards authority received consumer complaints matter apple offered refund customers bought device misled advertising result numerous complaints lawsuits apple regarding use term 4g advertisements prompted apple rename 4g service cellular change appearing apple website may 13 2012 many users reported abnormally high temperatures casing unit especially running 3d games used plugged rear new ipad became much hotter ipad 2 difference unplugged thermal imaging tests revealed ipad reach temperature warm touch uncomfortable held brief period follow-up report consumer reports said n't believe temperatures recorded tests new ipad represent safety concern claimed superiority a5x tegra 3 processor questioned around launch time competitor nvidia benchmarks later confirmed ipad superiority graphics performance benchmarks show tegra 3 greater performance areas consumer reports gave third-generation ipad top rating recommendation claiming tablet superb good fast 4g network retina display overall performance positive attributes elaborated display quality stating third-generation ipad best ’ seen ipad new display large enough improvement prompt consumer reports rate excellent consequently downgraded display tablets including ipad 2 excellent good preceding models see parent article ipad ios closed proprietary nature garnered criticism particularly digital rights advocates electronic frontier foundation computer engineer activist brewster kahle internet-law specialist jonathan zittrain free software foundation protested ipad introductory event targeted ipad defective design campaign pre-orders high third-generation ipad later orders quoted shipping times two three weeks order placed apple said customer response new ipad charts quantity available pre-order purchased despite delayed shipping many users chose purchase ipad online instead waiting line apple store approximately 750 people waited outside fifth avenue apple store new york city product release according apple press release three million units sold first three days ipad purchased mainly younger male demographic buyers either die-hard apple fans previously purchased ipad apple retailer dayton ohio claimed demand tablet chaotic claimed launch drastically significant ipad 2 launch q2 2012 apple would hit all-time high claiming 69.6 percent global tablet market
[ 10755, 9732, 1549, 5647, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 6186, 4139, 6700, 7211, 1074, 8754, 9784, 8253, 576, 1090, 8783, 4180, 10838, 1623, 3672, 10840, 9312, 3681, 9826, 8806, 3691, 2673, 6258, 10357, 6264, 4220, 7292, ...
None
7,698
5
Ethernet_physical_layer:ethernet physical layer ethernet physical layer physical layer functionality ethernet family computer network standards physical layer defines electrical optical properties physical connection device network network devices complemented mac layer logical link layer ethernet physical layer evolved existence starting 1980 encompasses multiple physical media interfaces several orders magnitude speed 1 mbit/s 400 gbit/s physical medium ranges bulky coaxial cable twisted pair optical fiber standardized reach 40 km general network protocol stack software work similarly physical layers many ethernet adapters switch ports support multiple speeds using autonegotiation set speed duplex best values supported connected devices practically relied ethernet twisted pair optical-fiber ports support multiple speeds autonegotiation fails multiple-speed devices sense speed used partner may result duplex mismatch rare exceptions 100base-tx port 10/100 also supports 10base-t 1000base-t port 10/100/1000 also supports 10base-t 100base-tx 10gbase-t port often also supports 1000base-t. 10 gigabit ethernet already used enterprise carrier networks 2007 40 gbit/s 100 gigabit ethernet ref name= 100 gbit/s ethernet /ref ratified 2017 fastest additions ethernet family 200 400 gbit/s generally layers named specifications 10 mbit/s encoding indicated variants use manchester code twisted pair layers use unique encoding often -t used reach especially optical connections defined maximum achievable link length guaranteed work channel parameters met modal bandwidth attenuation insertion losses etc better channel parameters often longer stable link length achieved vice versa link worse channel parameters also work shorter distance reach maximum distance meaning following sections provide brief summary official ethernet media types addition official standards many vendors implemented proprietary media types various reasons—often support longer distances fiber optic cabling early ethernet standards used manchester coding signal self-clocking adversely affected high-pass filters name standard clause common connectors link reach required cable description colspan=6 style= background-color f0f1f4 coaxial cable colspan=6 style= background-color f0f1f4 twisted-pair cable
[ 3847, 5384, 6670, 5270, 2968, 2989, 816, 6834, 2998, 5185, 7108, 5321, 10833, 4691, 2904, 6361, 3040, 2785, 8160, 7400, 5118 ]
None
7,699
3
Manycore_processor:manycore processor manycore processors specialist multi-core processors designed high degree parallel processing containing large number simpler independent processor cores tens cores thousands manycore processors used extensively embedded computers high-performance computing manycore processors distinct multi-core processors optimized outset higher degree explicit parallelism higher throughput lower power consumption expense latency lower single thread performance broader category multi-core processors contrast usually designed efficiently run parallel serial code therefore place emphasis high single thread performance e.g devoting silicon order execution deeper pipelines superscalar execution units larger general caches shared memory techniques devote runtime resources toward figuring implicit parallelism single thread used systems evolved continuously backward compatibility single core processors usually 'few cores e.g 2,4,8 may complemented manycore accelerator gpu heterogeneous system cache coherency issue limiting scaling multicore processors manycore processors may bypass tricks message passing scratchpad memory dma partitioned global address space read-only/non-coherent caches manycore processor using network chip local memories gives software opportunity explicitly optimise spatial layout tasks e.g seen tooling developed truenorth manycore processors may common conceptually technologies originating high performance computing clusters vector processors gpus may considered form manycore processor multiple shader processing units suitable highly parallel code high throughput extremely poor single thread performance number computers built multicore processors one million individual cpu cores examples include
[ 7173, 9739, 2066, 5655, 10779, 10781, 6181, 10277, 8231, 6184, 3630, 6705, 7218, 2623, 2113, 7234, 3142, 2638, 2140, 4188, 1122, 4194, 3175, 5223, 8810, 4205, 8815, 3698, 630, 6774, 8822, 7802, 9851, 6268, 3197, 7313, 6815, 8352, 5793, 22...
Test
7,700
2
Android_Auto:android auto android auto mobile app developed google mirror features android device smartphone car compatible in-dash information entertainment head unit android device paired head unit system mirrors qualified apps device vehicle display simple driver-friendly user interface supported apps include gps mapping/navigation music playback sms telephone web search system supports touchscreen button-controlled head unit displays although hands-free operation voice commands encouraged minimize driving distraction android auto part open automotive alliance announced june 25 2014 joint effort 28 automobile manufacturers nvidia tech supplier available 36 countries common way android auto deployed via android mobile device running android auto app acting master vehicle dashboard head unit supports functionality user android device connected vehicle head unit serve external display android device presenting supported software car-specific user interface provided android auto app android auto first iterations device required connected via usb car alternatively november 2016 google added option run android auto regular app android device i.e. tethered car head unit allows used android-powered head units simply personal phone tablet vehicle addition january 1 2018 announced jvckenwood would exhibiting wireless android auto-enabled head units ces 2018 would capable operating without need wired connection may 2019 android auto available 36 countries availability apps system varies android auto sdk released allowing third parties modify apps work android auto initially apis music messaging apps would available expected android auto mobile device access several automobile sensors inputs gps high-quality gps antennas steering-wheel mounted buttons sound system directional speakers directional microphones wheel speed compass mobile antennas etc also partial access car data feature still development ces 2018 google confirmed google assistant would coming android auto later year currently supported apps include google maps waze popular music players google play music youtube music amazon music apple music spotify messaging apps including whatsapp facebook messenger google hangouts skype telegram may 2015 hyundai became first manufacturer offer android auto support making available first 2015 hyundai sonata automobile manufacturers offer android auto support cars include abarth acura alfa romeo audi bentley buick cadillac chevrolet chrysler dodge fiat ford gmc genesis holden honda hyundai infiniti jaguar land rover jeep kia lamborghini lexus lincoln mahindra mahindra maserati mazda mercedes-benz mitsubishi nissan opel peugeot ram renault seat škoda ssangyong subaru suzuki tata motors cars toyota volkswagen volvo additionally aftermarket car-audio systems supporting android auto add technology host vehicles including pioneer kenwood panasonic sony may 2019 italy filed antitrust complaint targeting android auto citing google policy allowing third-party media messaging apps platform prevented enel offering app locating vehicle charging stations
[ 4096, 5637, 8719, 3600, 9244, 11294, 1578, 10284, 5677, 3633, 1083, 6212, 69, 8262, 6216, 4683, 4685, 11343, 3664, 8280, 8285, 2658, 8821, 11391, 1670, 7816, 5262, 6800, 11408, 10393, 8858, 7835, 673, 7841, 8870, 1191, 1203, 7359, 196, 32...
Test
7,701
2
Windows_Push_Notification_Service:windows push notification service windows push notification service commonly referred windows notification service wns notification service developed microsoft devices running microsoft windows platforms allows developers send push data toast tile updates windows universal windows platform applications implement feature designed successor microsoft push notification service first supported windows 8 subsequently windows phone 8.1 upon release windows push notification service wns designed successor microsoft push notification service mpns supported natively windows phone 8 operating system developers still use mpns apps installed newer versions windows mobile windows phone 8 windows phone 8.1 windows application already registered use mpns converted microsoft silverlight application modified re-target new platform 2015 microsoft announced wns would expanded utilize universal windows platform architecture allowing push data sent windows 10 windows 10 mobile xbox well supported platforms using universal api calls post requests 2015 build keynote microsoft announced universal windows platform bridge would allow android ios software ported windows 10 mobile published windows store august 2015 version microsoft android bridge toolset reported leaked available internet along documentation leaked toolset required developers register use wns send notification data ported applications would allow google cloud messaging used instead microsoft later discontinued android bridge project favor continuing support ios application porting instead 2016 build keynote microsoft announced update wns windows 10 operating system allow android ios devices forward push notifications received windows 10 viewed discarded architecture windows push notification service similar predecessor consists servers interfaces generate maintain store authenticate unique identifiers called channel uri identifiers devices register use service device enrolls receive data notification information using wns first sends device registration request wns network wns network acknowledges request responds device unique channel uri identifier typically device send identifier server owned developer stored used sending notifications app developer wishes transmit notification wns data device transmit post request wns network network acknowledge authenticate request authentication succeeds data transmitted enqueued sent device wns network using channel uri identifier windows 10 connected vpn disallows split tunneling wpnuserservice_ unique id process bypasses tunnel connecting directly microsoft behavior reveal real ip address host observed windows resource monitor
[ 8262, 11559, 3881, 6797, 7983, 5647, 9903, 10900 ]
None
7,702
2
OpenBSD_version_history:openbsd version history following table summarizes version history openbsd operating system
[ 6657, 9090, 1668, 9223, 10631, 2825, 3465, 8073, 1932, 274, 3603, 3222, 2584, 10105, 8863, 3237, 11563, 6702, 7983, 9520, 9137, 11698, 823, 5176, 9151, 6464, 9153, 9665, 2245, 841, 842, 1993, 3404, 5065, 8778, 11086, 4561, 5970, 4438, 508...
Test
7,703
4
Ehud_Tenenbaum:ehud tenenbaum ehud udi tenenbaum born august 29 1979 also known analyzer israeli cracker tenenbaum born hod hasharon 1979 known infamous hacker alias pink pony tenenbaum became widely famous 1998 aged 19 years head small group hackers arrested hacking computers belonging nasa pentagon u.s. air force u.s. navy knesset mit american israeli universities dharma comtec lawrence livermore national laboratory federally funded research sites computer israeli president ezer weizman well attempting infiltrate israel defense forces classified files also hacked computers palestinian groups claimed destroyed website hamas tenenbaum installed servers packet analyzer trojan horse software time then-us deputy defense secretary john hamre insisted organized systematic attack date us military systems military thought witnessing sophisticated iraqi 'information warfare effort stop supposed iraqi hackers united states government assembled agents fbi air force office special investigations nasa us department justice defense information systems agency nsa cia government worried warning briefings went way president united states investigation code-named solar sunrise eventually snared two california teenagers screen names mac stimpy iraqi infowarriors arrest subsequent probe led us investigators tenenbaum arrested israeli police given evidence tenenbaum activities later fbi sent agents israel question tenenbaum sentenced tenenbaum served briefly israel defense forces released soon thereafter involved traffic collision 2001 tenenbaum pleaded guilty stating n't attempting infiltrate computer systems get hold secrets rather prove systems flawed tenenbaum sentenced year half prison served 8 months following deri law attack fbi made short 18 minutes training video called solar sunrise dawn new threat sold part hacker defense course discontinued september 2004 2003 freed prison tenenbaum founded information security company called 2xs september 2008 following investigation canadian police us secret service tenenbaum three accomplices arrested montreal tenenbaum charged six counts credit card fraud sum approx us 1.5 million u.s. investigators suspected tenenbaum part scam hackers penetrated financial institutions around world steal credit card numbers sold numbers people used perpetrate massive credit card fraud later extradited united states stand trial custody us marshals year august 2010 released bond agreeing plead guilty july 2012 tenenbaum accepted plea bargain may involved cooperation investigation new york district judge edward korman sentenced tenenbaum time already served prison tenenbaum also ordered pay 503,000 given three years probation
[ 9440, 7887, 7798, 2135, 5373 ]
None
7,704
4
MyGreenElectronics:mygreenelectronics two main ways consumers use site aside immediate functional uses site educates public reduce energy usage rethink way consume electronics products order reduce amount electricity consumer products consume advises consumers look energy star logo products buy comprehensive list advice recommendations available reduce section site thus encourages consumers rethink ways make smarter environmentally friendlier choices purchasing electronics products entities united states abroad raise serious concerns electronics recycling groups concerned workers actual recycling exposed toxins harmful health mygreenelectronics represents consumer-driven voluntary approach recycling people believe government compel consumers pay advance fee future recycling cost product others believe manufacturers electronics take full responsibility recycling disposal products
[ 7579 ]
None
7,705
5
Authenticated_Identity_Body:authenticated identity body authenticated identity body aib method allowing parties network share authenticated identity thereby increasing integrity sip communications aibs extend authentication methods like s/mime provide specific mechanism introduce integrity sip transmissions parties transmitting aibs cryptographically sign subset sip message headers signatures assert message originator identity meet requirements reference integrity example defending replay attacks additional sip message headers 'date 'contact may optionally included aib aib described discussed rfc 3893 reasons end-to-end privacy may also desirable encrypt aibs ... encryption aibs entails holder specific key decrypt body single key could distributed throughout network hosts exist common policies security aib therefore predicated secure distribution key however networks federations trusted hosts common policy widespread distribution decryption key could appropriate telephone networks example might require model aib encrypted aib encrypted signed ... unless course signed mrs. l rin va
[ 10271 ]
None
7,706
5
LocalTalk:localtalk localtalk particular implementation physical layer appletalk networking system apple computer localtalk specifies system shielded twisted pair cabling plugged self-terminating transceivers running rate 230.4 kbit/s csma/ca implemented random multiple access method networking envisioned macintosh planning mac given expensive rs-422 capable serial ports ports driven zilog scc could serve either standard uart handle much complicated hdlc protocol packet oriented protocol incorporated addressing bit-stuffing packet checksumming hardware coupled together rs422 electrical connections provided reasonably high-speed data connection 230.4 kbit/s bit rate highest series standard serial bit rates 110 150 300 600 1200 2400 4800 9600 14400 19200 28800 38400 57600 115200 230400 derived 3.6864 mhz clock customary divide-by-16 clock frequency 3.6864 mhz chosen part support common asynchronous baud rates 38.4 kbit/s using scc internal baud-rate generator scc internal pll used lock clock embedded localtalk serial data stream using fm0 encoding method divide-by-16 setting pll yielded fastest rate available namely 230.4 kbit/s originally released appletalk personal network localtalk used shielded twisted-pair cable 3-pin mini-din connectors cables daisy-chained transceiver transceiver transceiver two 3-pin mini-din ports cable connect mac de-9 serial connector later mac plus introduced 8-pin mini-din serial connector transceivers updated well variation localtalk called phonenet introduced farallon computing used standard unshielded side-by-side telephone wire six-position modular connectors popular rj11 telephone connectors connected phonenet transceiver instead expensive shielded twisted-pair cable addition lower cost phonenet-wired networks reliable due connections difficult accidentally disconnect addition used outer pair modular connector could travel many pre-existing phone cables jacks inner pair use rj11 telephone service phonenet also able use office existing phone wire allowing entire floors computers easily networked farallon introduced 12-port hub made constructing star topology networks 48 devices easy adding jacks workstations jumpers phone closet factors led phonenet largely supplanting localtalk wiring low-cost networking useful life phonenet extended introduction localtalk switching technology tribe computer works introduced 1990 tribe localswitch 16 port packet switch designed speed overloaded phonenet networks widespread availability ethernet-based networking early 1990s led swift disappearance localtalk phonenet remained use time low-cost applications applications ethernet available ethernet became universal pc offices installing anyway early models power macintosh macintosh quadra supported 10base-t via apple attachment unit interface still supporting localtalk-based networking older macintosh computers built-in ethernet expansion options high speed scsi-to-ethernet adapter available particularly popular powerbooks enabled earliest macintosh models access high speed ethernet network release imac 1998 traditional mac serial port — thus ability use localtalk phonenet — disappeared new models macintosh localtalk-to-ethernet bridges introduced allow legacy devices especially printers function newer networks old macintosh computers localtalk remains option localtalk connector distinction first use apple unified appletalk connector family design created brad bissell frogdesign using rick meadows apple icon family designs localtalk connectors first released january 1985 connect laserwriter printer initially macintosh family computers integral part newly announced macintosh office however well past move ethernet connector design continued used apple peripherals cable connectors well influencing connectors used throughout industry whole
[ 9732, 7697, 4114, 6165, 11289, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 1090, 8783, 4180, 10838, 10840, 9312, 9826, 8806, 6258, 10357, 4220, 10365, 10878, 6783, 4741, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 2735, 7865, 4283, ...
None
7,707
9
Fuzzy_Control_Language:fuzzy control language fuzzy control language fcl language implementing fuzzy logic especially fuzzy control standardized iec 61131-7 domain-specific programming language features unrelated fuzzy logic impossible even print hello world therefore one write program fcl one may write part fcl rule 0 temperature cold output high fcl entirely complete fuzzy language instance support hedges adverbs modify set instance programmer write however programmer simply define new sets cold high fcl also lacks support higher-order fuzzy sets subsets none features essential fuzzy control although may nice iec 1131-7 cd1
[ 578, 8262 ]
None
7,708
4
Content_Security_Policy:content security policy content security policy csp computer security standard introduced prevent cross-site scripting xss clickjacking code injection attacks resulting execution malicious content trusted web page context candidate recommendation w3c working group web application security widely supported modern web browsers csp provides standard method website owners declare approved origins content browsers allowed load website—covered types javascript css html frames web workers fonts images embeddable objects java applets activex audio video files html5 features standard originally named content restrictions proposed robert hansen 2004 first implemented firefox 4 quickly picked browsers version 1 standard published 2012 w3c candidate recommendation quickly versions level 2 published 2014. draft level 3 developed new features quickly adopted web browsers following header names use part experimental csp implementations website declare multiple csp headers also mixing enforcement report-only ones header processed separately browser csp also delivered within html code using html meta tag although case effectiveness limited support sandbox directive also available internet explorer 10 internet explorer 11 using experimental codice_3 header number web application frameworks support csp example angularjs natively django middleware instructions ruby rails posted github web framework support however required csp contents somehow depend web application state—such usage codice_5 origin otherwise csp rather static delivered web application tiers application example load balancer web server december 2015 december 2016 methods bypassing codice_6 whitelisting origins published january 2016 another method published leverages server-wide csp whitelisting exploit old vulnerable versions javascript libraries hosted server frequent case cdn servers may 2017 one method published bypass csp using web application frameworks code codice_1 header present server response compliant client enforces declarative whitelist policy one example goal policy stricter execution mode javascript order prevent certain cross-site scripting attacks practice means number features disabled default using csp new application may quite straightforward especially csp-compatible javascript framework existing applications may require refactoring—or relaxing policy recommended coding practice csp-compatible web applications load code external source files codice_18 parse json instead evaluating use codice_19 set event handlers time requested resource script execution violates policy browser fire codice_20 request value specified codice_21 containing details violation csp reports standard json structures captured either application api public csp report receivers according original csp 1.0 processing model 2012–2013 csp interfere operation browser add-ons extensions installed user feature csp would effectively allowed add-on extension bookmarklet inject script web sites regardless origin script thus exempt csp policies however policy since modified csp 1.1 following wording note use word may instead prior absolute wording note user agents may allow users modify bypass policy enforcement user preferences bookmarklets third-party additions user agent mechanisms.the absolute wording used browser users request/demand adherence policy changes installed popular browsers firefox chrome safari support particularly contentious sites like twitter github started using strong csp policies 'broke use bookmarklets w3c web application security working group considers script part trusted computing base implemented browser however argued working group representative cox communications exemption potential security hole could exploited malicious compromised add-ons extensions
[ 10368, 7044, 3462, 7175, 8584, 9736, 6171, 5543, 10026, 11345, 11221, 5078, 2777, 8923, 5724, 225, 101, 4198, 487, 5622, 2169, 2558 ]
None
7,709
3
Torch_Triple_X:torch triple x torch triple x xxx unix workstation computer produced british company torch computers launched 1985 based motorola 68010 microprocessor ran version unix system v. triple x based 8 mhz 68010 cpu hitachi 6303 service processor cpu accompanied 68451 memory management unit 68450 dma controller vmebus bbc micro-compatible 1mhz bus expansion buses provided scsi host adapter optional ethernet interface rs-423 x.25-compatible synchronous serial ports provided latter feature made triple x attractive uk academic community x.25 networks prevalent time standard ram capacity 1 mb expandable 7 mb via vme cards 720 kb 5.25 floppy disk drive st-506-compatible 20 mb hard disk fitted standard interfaced scsi bus via omti adapter either 10 13 inch colour monitor supplied two graphics modes available 720 × 256 pixels four colours 720 × 512 two colours triple x novel touch-sensitive soft power switch switching commanded operating system shut gracefully powering triple x firmware called caretaker native operating system uniplus+ unix system v release 2 graphical user interface called opentop also included standard quad x enhanced version triple x 68020 processor three vme expansion slots produced small numbers torch became insolvent
[ 8900, 1158, 6187, 7983, 1776, 2995, 3350, 7286, 2073 ]
Test
7,710
8
Click_path:click path click path clickstream sequence hyperlinks one website visitors follows given site presented order viewed visitor click path may start within website separate 3rd party website often search engine results page continues sequence successive webpages visited user click paths take call data match ad sources keywords and/or referring domains order capture data clickstream analysis useful web activity analysis software testing market research analyzing employee productivity navigating world wide web user agent web browser makes requests another computer known web server every time user selects hyperlink web servers store information sequence links user clicks visiting websites host log files site operator ’ benefit information interest vary may include information downloaded webpage visited previously webpage visited afterwards duration time spent page etc information useful client/user identified done website registration record matching client ’ internet service provider isp storage also occur router proxy server ad server data mining column-oriented dbms integrated olap systems used conjunction clickstreams better record analyze data use clickstream data raise privacy concerns especially since internet service providers resorted selling users clickstream data way enhance revenue 10-12 companies purchase data typically 0.40/month per user practice may directly identify individual users often possible indirectly identify specific users example aol search data scandal consumers unaware practice potential compromising privacy addition isps publicly admit practice world online shopping grows becoming easier privacy individuals become exploited many cases email addresses phone numbers personal information stolen illegally shoppers clients many used third parties third parties range advertisers hackers consumers actually benefit gaining targeted advertising deals harmed lack privacy world technology grows consumers risk losing privacy clickstreams used allow user see allow easily return page already visited function already incorporated browsers clickstream display specific time position individuals browsed closed website web pages viewed duration spent page also show pages viewed frequently abundant information analyzed individuals check visitors clickstream association statistical information visiting length retrieval words isp countries explorers etc process enables individuals know visitors deeply webmasters gain insight visitors site using clickstream data neutral sense dataset neutral data used various scenarios one marketing additionally webmaster researcher blogger person website learn improve site growing e-commerce industry made necessary tailor needs preferences consumers click path data used personalize product offerings using previous click path data websites predict products user likely purchase click path data contain information user ’ goals interests knowledge therefore used predict future actions decisions using statistical models websites potentially increase operating profits streamlining results based user likely purchase analyzing data clients visit company website important order remain competitive analysis used generate two findings company first analysis user ’ clickstream using website reveal usage patterns turn gives heightened understanding customer behaviour use analysis creates user profile aids understanding types people visit company ’ website discussed van den poel buckinx 2005 clickstream analysis used predict whether customer likely purchase e-commerce website clickstream analysis also used improve customer satisfaction website company generate business advantage used assess effectiveness advertising web page site researchers stand behind click path analysis note path analytical method estimates system equations specify possible causal linkages among set variables click paths enable researchers break correlations among variables direct indirect spurious components finally click path analysis helps researchers disentangle complex interrelationships among variables identify significant pathways involved predicting outcome even advantages technique still critiqued many due large margin error model must assume variable exact manifestation theoretical concepts underlying reasonably free measurable error another casualty hypothesized model path must flow one direction feedback loops bidirectional causality otherwise model solved ordinary least squares regression techniques lastly models based correlations path analysis demonstrate causality direction causal effects ” due limitations many believe click path analysis tends waste time money resources websites store data visitors site click path information typically used improve website deliver personalized relevant content addition data results used designer review improve redesign website also used model user browsing behaviour online world e-commerce information collected click path allows advertisers construct personal profiles use individually target consumers much effectively ever result advertisers create relevant advertising efficiently spend advertising dollars meanwhile wrong hands click path data poses serious threat personal privacy unauthorized clickstream data collection considered spyware however authorized clickstream data collection comes organizations use opt-in panels generate market research using panelists agree share clickstream data companies downloading installing specialized clickstream collection agents number paths user potentially take greatly increases depending number pages particular website many tools determine path analysis linear account complexity internet usage cases less 5 users follow common path however even users used path still way tell page influential determining behavior even linear forms path analysis see customers drop website “ ” factor still missed main challenge path analysis lies fact tries regulate force users follow certain path reality users diverse specific preference opinions
[ 2016, 225, 2945, 7767, 4956, 6576, 8978, 4725, 6102, 119, 10392, 4732 ]
Test
7,711
1
African_Origins:african origins african origins project database run researchers emory university aims document known facts african diaspora including documentary material pertaining transatlantic slave trade sister project
[ 7716 ]
Validation
7,712
3
Slot_A:slot slot physical electrical specification 242-lead single-edge-connector used early versions amd athlon processor slot connector allows higher bus rate socket 7 super socket 7 slot motherboards use ev6 bus protocol technology originally developed digital equipment corporation dec alpha 21264 microprocessor slot mechanically compatible electrically incompatible intel slot 1 consequence slot motherboards designed connector installed orientation rotated 180 degrees relative slot 1 motherboards discourage accidental insertion slot 1 processor slot motherboard vice versa choice use mechanical connector intel slot 1 also allowed motherboard manufacturers keep costs stocking part slot 1 slot assemblies slot superseded socket
[ 3586, 9475, 3588, 8452, 3464, 4872, 7058, 10260, 4252, 4767, 2463, 7714, 9122, 1322, 11183, 1329, 3892, 8629, 9400, 7744, 6978, 11331, 9157, 3783, 7247, 9551, 7122, 9427, 3798, 7132, 2525, 4451, 5859, 1260, 1005, 7788, 7151, 1651 ]
Test
7,713
2
Internet_Explorer_8:internet explorer 8 windows internet explorer 8 ie8 eighth version internet explorer web browser microsoft released march 19 2009 successor internet explorer 7 released 2006 default browser windows 7 windows server 2008 r2 operating systems internet explorer 8 first version ie pass acid2 test last major browsers later acid3 test scores 24/100. according microsoft security ease use improvements rss css ajax support priorities ie8 internet explorer 8 last version internet explorer run windows server 2003 windows xp following version internet explorer 9 works windows vista later support internet explorer 8 bound lifecycle windows version installed considered os component thus unsupported windows xp due end extended support latter april 2014 effective january 12 2016 internet explorer 8 longer supported client server version windows due new policies specifying newest version ie available supported version windows supported however several windows embedded versions remain supported respective eol unless otherwise specified ie8 development started march 2006 february 2008 microsoft sent private invitations ie8 beta 1 march 5 2008 released beta 1 general public although focus web developers release launched windows internet explorer 8 readiness toolkit website promoting ie8 white papers related software tools new features addition download links beta microsoft developer network msdn added new sections detailing new ie8 technology major press focused controversy version targeting two new features called webslice activities readiness toolkit promoted something developers exploit make internet explorer 8 'light august 27 2008 microsoft made ie8 beta 2 generally available pc world noted various beta 2 features inprivate mode tab isolation color-coding improved standards compatibility compared internet explorer 7 two name changes included activities accelerators ie7 phishing filter renamed safety filter first beta smartscreen accompanied incremental technical changes well august 2008 new feature called inprivate taken spotlight first non-beta version released march 19 2009 january 5 2009 tool provided microsoft block automatic install internet explorer 8 via windows update may 20 2009 windows xpe embedded supported platform internet explorer 8 announcements planned support may 27 2010 microsoft released internet explorer 8 optimized bing msn file name boie8_enus_xp.exe support versions ie windows xp ended effective april 8 2014 due end-of-life january 12 2016 support ie8 supported windows operating systems ceased due new support policies dictating newest version ie available supported version windows supported internet explorer 11 supported except windows vista windows server 2008 internet explorer 9 supported windows server 2012 internet explorer 10 supported language support localization complete release ie8 released 25 languages grew 63 vista 32-bit june 2009 support additional languages come pre-installed based os downloaded installed via multilingual user interface mui packages ie8 contains many new features including webslices accelerators accelerators form selection-based search allow user invoke online service page using mouse actions selecting text objects give users access usable accelerator services blogging selected text viewing map selected geographical location invoked selected object according microsoft accelerators eliminate need copy paste content web pages ie8 specifies xml-based encoding allows web application web service invoked accelerator service service invoked categories content show specified xml file similarities drawn accelerators controversial smart tags feature experimented ie 6 beta withdrawn criticism though later included ms office address bar features domain highlighting added security top-level domain shown black whereas parts url grayed domain highlighting turned users web sites features address bar include support pasting multi-line urls improved model inserting selection caret selecting words entire urls address bar inline autocomplete feature dropped internet explorer 8 leading criticism beta users website add-on causes tab crash internet explorer 8 tab affected browser remains stable tabs remain unaffected thereby minimizing disruption browsing experience tab unexpectedly closes crashes automatically reloaded content crash developers internet explorer 8 includes tools allow debugging html css javascript vbscript within browser another new feature ie8 redesigned favorites bar host content web slices web feeds documents addition website links internet explorer 8 replaced find ... dialog box inline find toolbar activated pressing ctrl+f search box drop-down menu f3 kind keyboard-driven nextfind command gone internet explorer 8 highlights instances found words allowing user continue navigation normally new security mode called inprivate debuted ie8 consists two main features inprivate browsing inprivate filtering inprivate browsing described porn mode various news outlets similar feature first introduced safari 2005 later implemented firefox 3.5 opera 10.5 google chrome informationweek mentioned stealth privacy mode inprivate browsing internet explorer 8 helps prevent one browsing history temporary internet files form data cookies usernames passwords retained browser leaving easily accessible evidence browsing search history inprivate filtering provides users added level control choice information third party websites use track browsing activity inprivate subscriptions allow augment capability inprivate blocking subscribing lists websites block allow private browsing modes ways information browsing session recovered internet explorer 8 includes performance improvements across html parser css engine mark-up tree manipulation well jscript runtime associated garbage collector memory leaks due inconsistent handling circular references jscript objects dom objects corrected better security stability ie8 uses loosely coupled internet explorer lcie architecture runs browser frame tabs separate processes lcie prevents glitches hangs bringing entire browser leads higher performance scalability permissions activex controls made flexible instead enabling disabling globally allowed per-site basis smartscreen filter extended internet explorer 7 phishing filter include protection socially engineered malware every website download checked local list popular legitimate websites site listed entire address sent microsoft checks labeled impostor harmful internet explorer 8 show screen prompting site reported harmful n't visited user either visit homepage visit previous site continue unsafe page user attempts download file location reported harmful download cancelled effectiveness smartscreen filtering reported superior socially engineered malware protection browsers feature disabled enforced using group policy feature described microsoft tool suggest websites done browser sending information microsoft secure connection keeps information per-session uniquely generated identifier short time suggested sites feature turned default disabled user browsing inprivate enabled visiting ssl-secured intranet ip address idn address sites information could personally identifiable user ip address browser information sent microsoft artifact https protocol microsoft stated store information functionality defended microsoft itworld.com gregg keizer described phone home feature web slices snippets entire page user subscribe web slices kept updated browser automatically viewed directly favorites bar complete graphics visuals developers mark parts pages web slices using codice_1 codice_2 microformat web slices compared active desktop introduced internet explorer 4 1997 microsoft donated specification public domain creative commons public domain dedication also covered microsoft open specification promise windows rss platform also supports authenticated feeds beginning internet explorer 8 full-page zoom reflows text remove appearance horizontal scrollbars zooming image scaling done using bicubic interpolation resulting smoother looking images scaled using compatibility mode cause style issues select form elements changing zoom levels information bar lets users allow activex control run web sites current one users easily make changes behavior manage add-ons dialog box activex control list sites approved user internet explorer 8 main rendering mode known standards mode improved support various web standards especially css compared internet explorer 7 earlier versions web standards supported ie8 include following however ie8 support w3c standards ie8 passes acid2 test fails acid3 test score 20/100 development microsoft developed 7,000 tests css level 2 compliance submitted w3c inclusion test suite internet explorer 8 promoted microsoft stricter adherence w3c described web standards internet explorer 7 result every ie version percentage web pages coded behavior older versions would break ie8 would repetition situation ie7 fixed bugs ie6 broke pages used ie6-specific hacks work around non-compliance especially problem offline html documents may updatable e.g stored read-only medium cd-rom dvd-rom avoid situation ie8 implements form version targeting whereby page could authored specific version browser using codice_8 declaration either meta element http headers order maintain backwards compatibility sites opt-into ie7-like handling content inserting specially created meta element web page triggers compatibility mode browser using five weeks release ie 8 beta 2 august 2008 beta 1 market share grown 0.05 percent 0.61 percent according net applications july 2009 four months final release market share jumped 13 percent estimates ie8 global market share ranged 6.93 8.73 according net applications web analytics october 2014 internet explorer 8 accounts 17.31 web traffic overtaken ie11 usage march 19 2009 review benny har-even pro offered praise internet explorer 8 noting reliability good features concluding certainly best version internet explorer long time also yet anything make firefox users want jump ship offered praise microsoft paying attention competition producing better featured faster reliable browsing experience masses suggested microsoft continues improve product would become harder persuade unconverted switch away ie next month april 2 mark joseph edwards wrote newsletter windows secrets new edition internet explorer greatly improved security speed compatibility opined still lagged behind competitors three areas edwards noted time internet explorer 8 still underperforming relative browsers speed successful displaying webpages intended display browsers firefox opera terms security wrote continued reliance activex makes browser vulnerable foundation reasons suggested firefox remained better alternative internet explorer 8 even though much better browser ie 7 ie8 requires least
[ 6657, 9736, 2579, 6171, 9757, 10791, 9770, 10282, 559, 4661, 3639, 10808, 9275, 64, 3137, 1098, 5707, 10828, 9808, 10834, 6231, 8281, 603, 2139, 6747, 8797, 8798, 1642, 9834, 9328, 4722, 115, 9843, 119, 4728, 637, 1664, 5765, 134, 651, ...
Validation
7,714
3
Slot_2:slot 2 slot 2 refers physical electrical specification 330-lead single edge contact cartridge edge-connector used intel pentium ii xeon certain models pentium iii xeon first introduced slot 1 pentium iis intended replace pentium pentium pro processors home desktop low-end symmetric multiprocessing smp markets pentium ii xeon aimed multiprocessor workstations servers largely similar later pentium iiis based p6 deschutes core aside wider choice l2 cache ranging 512 2048 kb full-speed off-die l2 cache pentium 2 used cheaper third-party sram chips running 50 cpu speed reduce cost design 242-lead slot 1 connector support full-speed l2 cache xeon extended 330-lead connector developed new connector dubbed 'slot 2 used pentium ii xeon first two pentium iii xeon cores codenamed 'tanner 'cascades slot 2 finally replaced socket 370 pentium iii tualatin tualatin pentium iiis packaged 'pentium iii 'xeon though identical
[ 3588, 5901, 5523, 2455, 3992, 8855, 11417, 3995, 4252, 6175, 7712, 10019, 4523, 2604, 2350, 6192, 9649, 4537, 7105, 4805, 7110, 8394, 3403, 4427, 4179, 3798, 4185, 7002, 9945, 11484, 9570, 10468, 613, 8552, 1260, 4717, 10225, 371, 3317, 9...
Validation
7,715
4
Core_International:core international core international inc. commonly known core multinational computer technology corporation headquartered boca raton florida united states company part sony longer exists stand-alone identity company founded 1979 hal prewitt technology firm develop market support computer related products services best known supporting ibm first business microcomputers 5100 5110 5120 introduction ibm pc pc company provided extensive line disk drives backup personal computer products core became well known leading industry developer disk array computer data storage many core products first kind direct competition widely regarded superior performance reliability users computer press raved core products infoworld described core atplus built like sherman tank offering exceptional performance reliability pc magazine called workhorses performance computing high-quality construction..breaks speed barrier access times asked manufactures follow suit core known advertising perhaps produced pc industry greatest promotions 1985 1986 rebate recall ad ibm pc hard disk drives successful controversial rumor topic ibm board directors meeting time gave away free ibm pc purchasing one core atplus 72 mb drives core remained private company solely owned prewitt 1993 purchased aiwa wholly owned subsidiary sony business history pre-incorporation company built early work prewitt using business personal computer development experiences period creation first microcomputers launch altair 8800 founding microsoft selling programming minicomputers assembling microcomputers attaching computer peripherals programming building business computer systems core created different business model initially marketed association structured for-profit organization specifically users ibm 5100 series ibm system/23 objective sell mail-order computer supplies pre-developed off-the-shelf programs hardware maintenance service supplies included printer ribbons paper diskettes tape cartridges software ranged simple mortgage interest calculations word processing games utilities advanced payroll accounting industry specific applications users wanted readily available simple install support software also low cost core able fill niche ibm developed machines engineering scientific applications mind business programs construction agriculture manufacturing generally available computer maintenance insurance program provided on-site repairs replacement parts provided ibm service lower cost available directly ibm company successful attracting users ibm 5100 series many ibm sales representatives referred customers organization core grew profits used continuing development computer data storage ibm machines closed architecture design information unpublished held secret computer systems design extremely likely impossible ability swap components obtain support vendors upgrade better configuration/another model unless option available original manufacturer limitations make customer dependent one vendor products services software hardware parts system core sensed opportunity provide greater faster computer data storage five-year effort september 1982 announced availability first hard disk drives local area network lan ibm 5100 series ibm systems sold storage limited without network option 5100 tape 5110 5120 restricted 1.2 mb floppy disks core drives available starting 10 mb increased 160 mb removable fixed configurations corenet lan built core storage system allowed interconnection eight ibm 5100 series systems providing ability share storage data configuration pre-dated lans period ibm pc compatibles 1983 core introduced two major solutions ibm withdrawing marketing ibm 5100 series first software called pc51 would run allowed 5100 series computer programs written basic run unmodified ibm pc compatibles ms-dos second lan card ibm pc compatibles provided connection ibm 5100 series network solutions allowed ibm 5110/5120 series users add new technology increase productivity retaining investment equipment software core development storage systems lan pc51 software major technology engineering feat without rivals due complexity successful reverse engineering systems resulted captive market organization able provide upgrade path ibm owners 1984 core expanded product focus entered personal computer pc marketplace company first product introduced year called pc-51 completely new operating system language ibm pc compatibles enabled pc function like ibm 5110/5120 system demonstrating company strong software development capabilities allow users continue using application software already developed increased processing speed factor two ten times reduced maintenance cost 90 new product opened unexplored marketplace core allowing company become ibm value-added dealer vad sell ibm pc core products individually combined package ibm authorized promoted relationship provided upgrade path customers previously unavailable result early development effort ibm 5100 series core released family high-performance hard disk drives called atplus series better capacity reliability performance ibm drives weeks introduction new ibm august 1984 core discovered problems factory-issued hard disk drive media marketplace learned ibm disk problems core unique position capitalize opportunity without significant competition six months ibm model cmi short supply delays attributed lack drives technical problems machine undisclosed issues core desired major partner selected control data corporation cdc assist introduction drives pc marketplace announcement made february 1985 generated significant amount press coverage core discovered general lack understanding existed among news media users regarding technology different computer mass storage systems understood value different systems end-user rate many choices marketplace response core began placing considerable emphasis user education resulted major contribution computer industry directly efforts news media computer magazines product reviewers dealers computer manufactures started discussing providing promoting seek time access time transfer time value understand hard disk drives importance computer system company believed end-users learned computers engineering behind core products less users wanted product purchasers ibm reporting dealers installing inferior drives computer without disclosing fact help buyers industry education core developed diskp program later replaced coretest dos based identify sub-standard products providing visual demonstration speed comparative measurements hard disk drives controllers many computer publications hardware manufacturers distributors dealers independent evaluation firms relied coretest product comparison made coretest industry standard often quoted benchmark programs provide without charge freely available bbs computer magazines dealers believed installed base million copies worldwide promoting core technology education two years newspapers magazines computer publications ran stories ibm computer memories inc. cmi hard disk drives problems
[ 9025, 3366, 1801, 9166, 6129, 6003, 3323, 10173 ]
Validation
7,716
1
Voyages:_The_Trans-Atlantic_Slave_Trade_Database:voyages trans-atlantic slave trade database voyages trans-atlantic slave trade database database run researchers emory university aims present documentary material pertaining transatlantic slave trade sister project african origins
[ 7711 ]
None
7,717
4
Shellcode:shellcode hacking shellcode small piece code used payload exploitation software vulnerability called shellcode typically starts command shell attacker control compromised machine piece code performs similar task called shellcode function payload limited merely spawning shell suggested name shellcode insufficient however attempts replacing term gained wide acceptance shellcode commonly written machine code shellcode either local remote depending whether gives attacker control machine runs local another machine network remote local shellcode used attacker limited access machine exploit vulnerability example buffer overflow higher-privileged process machine successfully executed shellcode provide attacker access machine higher privileges targeted process remote shellcode used attacker wants target vulnerable process running another machine local network intranet remote network successfully executed shellcode provide attacker access target machine across network remote shellcodes normally use standard tcp/ip socket connections allow attacker access shell target machine shellcode categorized based connection set shellcode establishes connection called reverse shell connect-back shellcode shellcode connects back attacker machine hand attacker establishes connection shellcode called bindshell shellcode binds certain port victim machine third much less common type socket-reuse shellcode type shellcode sometimes used exploit establishes connection vulnerable process closed shellcode run shellcode re-use connection communicate attacker socket re-using shellcode elaborate since shellcode needs find connection re-use machine may many connections open firewall used detect outgoing connections made connect-back shellcode well incoming connections made bindshells therefore offer protection attacker even system vulnerable preventing attacker connecting shell created shellcode one reason socket re-using shellcode sometimes used create new connections therefore harder detect block download execute type remote shellcode downloads executes form malware target system type shellcode spawn shell rather instructs machine download certain executable file network save disk execute nowadays commonly used drive-by download attacks victim visits malicious webpage turn attempts run download execute shellcode order install software victim machine variation type shellcode downloads loads library advantages technique code smaller require shellcode spawn new process target system shellcode need code clean targeted process done library loaded process amount data attacker inject target process limited execute useful shellcode directly may possible execute stages first small piece shellcode stage 1 executed code downloads larger piece shellcode stage 2 process memory executes another form staged shellcode used attacker inject larger shellcode process determine process end small egg-hunt shellcode injected process predictable location executed code searches process address space larger shellcode egg executes type shellcode similar egg-hunt shellcode looks multiple small blocks data eggs recombines one larger block omelette subsequently executed used attacker inject number small blocks data process exploit commonly inject shellcode target process time exploits vulnerability gain control program counter program counter adjusted point shellcode gets executed performs task injecting shellcode often done storing shellcode data sent network vulnerable process supplying file read vulnerable process command line environment case local exploits processes filter restrict data injected shellcode often needs written allow restrictions includes making code small null-free alphanumeric various solutions found get around restrictions including since intrusion detection detect signatures simple shellcodes sent network often encoded made self-decrypting polymorphic avoid detection exploits target browsers commonly encode shellcode javascript string using percent-encoding escape sequence encoding \uxxxx entity encoding exploits also obfuscate encoded shellcode string prevent detection ids example ia-32 architecture two codice_1 no-operation instructions would look first unencoded encoded string using percent-encoding using codice_2 function decode next encoded string using \uxxxx -encoding finally encoded string using entity encoding shellcodes written without use null bytes intended injected target process null-terminated strings null-terminated string copied copied including first null subsequent bytes shellcode processed shellcode contains nulls injected way part shellcode would injected making incapable running successfully produce null-free shellcode shellcode contains null bytes one substitute machine instructions contain zeroes instructions effect free nulls example ia-32 architecture one could replace instruction contains zeroes part literal 1 expands 0x00000001 instructions effect take fewer bytes encode free nulls certain circumstances target process filter byte injected shellcode printable alphanumeric character circumstances range instructions used write shellcode becomes limited solution problem published rix phrack 57 showed possible turn code alphanumeric code technique often used create self-modifying code allows code modify bytes include bytes outside normally allowed range thereby expanding range instructions use using trick self-modifying decoder created initially uses bytes allowed range main code shellcode encoded also using bytes allowed range output shellcode run decoder modify code able use instruction requires function properly continues decode original shellcode decoding shellcode decoder transfers control executed normal shown possible create arbitrarily complex shellcode looks like normal text english modern programs use unicode strings allow internationalization text often programs convert incoming ascii strings unicode processing unicode strings encoded utf-16 use two bytes encode character four bytes special characters ascii string transformed utf-16 zero byte inserted byte original string obscou proved phrack 61 possible write shellcode run successfully transformation programs automatically encode shellcode alphanumeric utf-16-proof shellcode exist based principle small self-modifying decoder decodes original shellcode shellcode written machine code low level vulnerability exploited gives attacker access process shellcode therefore often created target one specific combination processor operating system service pack called platform exploits due constraints put shellcode target process specific shellcode must created however impossible one shellcode work multiple exploits service packs operating systems even processors versatility commonly achieved creating multiple versions shellcode target various platforms creating header branches correct version platform code running executed code behaves differently different platforms executes right part shellcode platform running shellcode executed directly order analyze shellcode attempts must loaded another process one common analysis technique write small c program holds shellcode byte buffer use function pointer use inline assembler transfer execution another technique use online tool shellcode_2_exe embed shellcode pre-made executable husk analyzed standard debugger specialized shellcode analysis tools also exist idefense sclog project originally released 2005 part malcode analyst pack sclog designed load external shellcode files execute within api logging framework emulation based shellcode analysis tools also exist sctest application part cross platform libemu package another emulation based shellcode analysis tool built around libemu library scdbg includes basic debug shell integrated reporting features
[ 642, 8066, 5380, 5636, 9739, 3473, 11537, 1429, 5531, 7325, 10786, 8998, 7851, 7855, 7856, 7983, 9393, 10420, 5176, 7228, 2878, 1474, 4562, 1113, 2138, 4956, 6754, 3555, 742, 8167, 1776, 499, 2804, 3708, 7421, 2558 ]
Validation
7,718
4
Cobian_Backup:cobian backup cobian backup free donation-supported backup software microsoft windows written delphi luis cobian umeå university cobian backup originally released 2000 program later rewritten released version 7 next version version 8 released 2006 source code later released mozilla public license late january 2007 however version 9 author cobian backup decided switch back completely closed source model older versions remain open source forever release program mozilla public license revoked development support original author discontinued version 11.2.0.582 source code since sold cobian backup supports unicode ftp compression zip sqx 7z encryption including blowfish rijndael des rsa-rijndael incremental differential backup example differential backup every night backs user files changed since last full backup full backup every seventh night backing full set user files backups saved cd dvd usb memory stick second hard drive internal external etc supports long file names 32,000 characters backup routines
[ 9025, 7364, 6280, 1801, 4845, 3629, 1358, 6797, 7983 ]
Train
7,719
3
Dynamite_Dan:dynamite dan dynamite dan platform game written rod bowkett zx spectrum published mirrorsoft 1985 ported amstrad cpc commodore 64 msx sequel dynamite dan 2 released following year gameplay similar jet set willy highly rated game time game starts dan lands airship top evil dr blitzen hideout aim game find eight sticks dynamite placed randomly around playing area whilst avoiding perils game moving monsters drowning falling great heights dan eight sticks dynamite player must make way central safe blow open steal plans evil doctor death ray escape airship playing area essentially one large building split multiple screens wrap around central elevator screen contains number moving monsters player moves destroyed take life return exception destroyed walked dr blitzen assistant donner donner blitzen located screen safe perils dan life include running energy caused collecting enough food falling heights hit laser beams dan also fall underground river flows beneath building player receive game unless dan picked oxygen case sent back start game completed game provides secret code deciphered telephone number call answer number longer works prize ride mirrorsoft blimp background music choosing game settings waiting game start third movement rondo alla turca wolfgang amadeus mozart piano sonata 11 major k. 331 readers crash magazine voted best platform game year zx spectrum version voted 24th best game time special issue sinclair magazine 2004
[ 9006, 1527 ]
Validation
7,720
6
Apple_ISO_9660_Extensions:apple iso 9660 extensions apple set iso 9660 extensions extends filesystem hfs properties primary file system apple macintosh computers hfs hfs+ hfs file system properties fat file systems primarily used windows 95 98 operating systems metadata properties include order allow non-macintosh systems access macintosh files cd-roms apple chose use extension standard iso 9660 format data apple specific metadata remains visible operating systems able read iso 9660
[ 5413, 5062, 1801, 8075, 6062, 5231, 7342, 7983, 8110, 8114, 5816, 5596 ]
Test
7,721
7
CallidusCloud:calliduscloud calliduscloud global enterprise software saas company headquartered dublin california company best known cloud-based solutions sales effectiveness sales performance management sales execution cpq clm software services callidus software inc. incorporated delaware september 6 1996 founders andrew swett scott kitayama company specializing providing enterprise incentive management eim application systems initial funding came onset ventures first hire former chief architect greg holmberg followed former president ceo reed d. taussig november 2003 company went public nasdaq national market stock symbol cald raising us 70 million following list acquisitions calliduscloud.com calliduscloud formerly callidus software 200m revenue 200m cash grows around 30 2014 total revenue 136.6 million increase 24.3 million 22 2013 2015 total revenue increased 27 173.1 million 2015 company added 900 customers take total number companies using one software products 4,600 report 5000 january 30 2018 announced sap company acquired calliduscloud 2.4 billion calliduscloud provides software service saas solutions marketing sales effectiveness suite solutions includes applications identify right leads ensure proper territory quota distribution enable sales forces automate quote proposal generation streamline sales compensation additionally offer applications customer experience monitoring sales gamification learning management including content authoring calliduscloud global alliance partners providing integrated solution complement calliduscloud products system integrators partners providing user companies wide range selections support different sales methodologies drive revenue technology partners provide functionality complements calliduscloud product capabilities partner companies include adobe accenture canidium llc deloitte lanshore llc netsuite opensymmetry oracle salesforce.com sap
[ 4194, 1539, 10090, 467, 5210 ]
Test
7,722
2
F-Droid:f-droid f-droid community-maintained software repository android similar google play store main repository hosted project contains free libre software apps applications browsed installed f-droid website client app without need register account anti-features advertising user tracking dependence nonfree software flagged app descriptions website also offers source code applications hosts well software running f-droid server allowing anyone set app repository f-droid founded ciaran gultnieks 2010 client forked aptoide source code project run english nonprofit f-droid limited replicant fully free software android operating system uses f-droid default recommended app store guardian project suite free secure android applications started running f-droid repository early 2012 2012 free software foundation europe featured f-droid free android campaign raise awareness privacy security risks proprietary software f-droid chosen part gnu project gnu day initiative 30th anniversary encourage use free software march 2016 f-droid partnered guardian project copperheados goal creating solution verifiably trusted operating system network network services way app stores apps f-droid repository contains growing number 2,600 apps compared 1.43 million google play store project incorporates several software sub-projects f-droid builds apps publicly available freely licensed source code project run entirely volunteers formal app review process new apps contributed user submissions developers requirement free proprietary software install f-droid client user allow installation unknown sources android settings retrieve apk installable file official site installation available google play store due non-compete clause google play developer distribution agreement client designed resilient surveillance censorship unreliable internet connections promote anonymity supports http proxies repositories hosted tor hidden services client devices function impromptu app stores distributing downloaded apps devices local wi-fi bluetooth android beam f-droid client app automatically offer updates installed f-droid apps f-droid privileged extension installed updates also conducted app background extension installed via rooting flashing zip file device android operating system checks updates signed key preventing others distributing updates signed different key originally google play store required applications signed developer application f-droid allowed signing keys apps previously installed another source reinstalled receive updates 2017 google play encourages developers let google play manage signing keys offering similar service f-droid offered since 2011 f-droid lets developers use keys via reproducible build process 2012 security researcher developer moxie marlinspike discouraged use f-droid particular criticised distributing outdated version textsecure contained known bug fixed recent version application f-droid announced removal textsecure repository noting removal requested marlinspike also pointing source code official textsecure binary bug question fixed published marlinspike later criticised project handling issue stating mischaracterized scope bug incredibly immature post announcing removal received email users view misled f-droid announcement
[ 10368, 5637, 9487, 788, 1813, 8213, 9365, 10900, 8476, 10270, 11680, 673, 9508, 4775, 6828, 5677, 9262, 7983, 823, 1083, 5819, 190, 9923, 9671, 5067, 4685, 3918, 463, 3152, 2001, 3667, 11606, 4951, 6361, 2010, 8413, 4063, 2401, 1379, 741,...
Validation
7,723
5
Space-division_multiple_access:space-division multiple access space-division multiple access sdma channel access method based creating parallel spatial pipes next higher capacity pipes spatial multiplexing and/or diversity able offer superior performance radio multiple access communication systems traditional mobile cellular network systems base station information position mobile units within cell radiates signal directions within cell order provide radio coverage method results wasting power transmissions mobile units reach addition causing interference adjacent cells using frequency called co-channel cells likewise reception antenna receives signals coming directions including noise interference signals using smart antenna technology differing spatial locations mobile units within cell space-division multiple access techniques offer attractive performance enhancements radiation pattern base station transmission reception adapted user obtain highest gain direction user often done using phased array techniques gsm cellular networks base station aware distance direction mobile phone use technique called timing advance ta base transceiver station bts determine far mobile station ms interpreting reported ta information along parameters used power bts ms power control feature implemented network power control either bts ms implemented modern networks especially ms ensures better battery life ms also bts close user results less exposure electromagnetic radiation manner 5th generation mobile networks focused using given position ms relation bts order focus ms radio frequency power bts direction vice versa thus enabling power savings mobile operator reducing ms sar index reducing em field around base stations since beam forming concentrate rf power used rather spread uniformly around bts reducing health safety concerns enhancing spectral efficiency decreased ms battery consumption
[ 10112, 4609, 2306, 388, 8708, 3847, 2057, 1550, 11288, 2458, 5020, 5664, 1192, 11560, 11181, 1969, 2994, 1083, 448, 7490, 3140, 7108, 9284, 11591, 5321, 7498, 9038, 3959, 9296, 2911, 3168, 1121, 2785, 4068, 5092, 5863, 7400, 1650, 2802, 1...
Test
7,724
0
Association_for_Computational_Linguistics:association computational linguistics association computational linguistics acl international scientific professional society people working problems involving natural language computation annual meeting held summer locations significant computational linguistics research carried founded 1962 originally named association machine translation computational linguistics amtcl became acl 1968 acl european eacl north american naacl chapter acl journal computational linguistics primary forum research computational linguistics natural language processing since 1988 journal published acl mit press acl large number special interest groups sigs focusing specific areas natural language processing current sigs within acl year acl elects distinguished computational linguist becomes vice-president organization next calendar year president one year later recent acl presidents
[ 1027, 6662, 2059, 2578, 5781, 2326, 4509, 4131, 11308, 9522, 1460, 11318, 3127, 8375, 10557, 4038, 9032, 1737, 9288, 4942, 3668, 11348, 2518, 10456, 1890, 7780, 8562, 3059, 7676 ]
Validation
7,725
4
Tarah_Wheeler:tarah wheeler tarah marie wheeler born february 12 1979 american technology cybersecurity executive author currently cybersecurity policy fellow d.c. policy think-tank new america former cybersecurity czar symantec author women tech founder infosec unlocked wheeler received bachelor degree carroll college master degree political science portland state university 2004 named national science foundation-funded fellow center study complex systems university michigan 2012 founded cloud computing company fizzmint 2014 wheeler founded infosec unlocked diversity non-profit whose goal help bring diverse voices infosec conferences across united states paper writing events scholarships extension youtube series discussed diversity topics def con unlocked series mostly covered topics relating diversity def con one world largest hacker conferences 2016 wheeler named cybersecurity passcode influencer christian science monitor 2016 spoke federal trade commission information security tech startups published women tech book dedicated teaching women succeed tech careers gave advice women technologists interview techniques salary negotiation systems architect mobile encryption firm silent circle fall 2016 university california berkeley taught class wheeler book necessities overcoming barriers entry technology industry requirements success woman trying enter field kickstarter campaign wheeler published women tech several contributors including esther dyson brianna wu one targets gamergate controversy experienced threats including wu retained coauthor due wu experience gaming industry wheeler experienced multiple death rape threats online activism august 2017 wheeler announced twitter left symantec work several books october awarded inaugural women leaders cybersecurity award nyu senior director data trust threat vulnerability management splunk currently cybersecurity policy fellow d.c. policy think-tank new america wheeler cited national media expert issues relating cybersecurity cyberterrorism malware data breaches written cyberwar policy wheeler plays poker competed world series poker
[ 5373, 11429, 3629, 9569 ]
Train
7,726
4
Sequence-related_amplified_polymorphism:sequence-related amplified polymorphism sequence related amplified polymorphism srap molecular technique developed g. li c. f. quiros 2001 detecting genetic variation open reading frames orfs genomes plants related organisms
[ 1582 ]
Test
7,727
2
Magic_Cap:magic cap magic cap short magic communicating applications platform discontinued object-oriented operating system pdas developed general magic tony fadell contributor platform darin adler architect magic cap incorporates room metaphor user navigates room room perform various tasks going home office perform word processing file room clean system files automation based mobile agents office assistant several electronic companies came market magic cap devices notable sony magic link motorola envoy released 1994 none devices commercial successes magic cap operating system includes new mobile agent technology named telescript conceptually agents would carry work orders travel place outside handheld device complete work return device results magic cap devices delivered place agents travel personalink service provided agents little access functionality since agent strictly authorized scope inquiry limited software modules installed personalink servers payload carried agents also hampered slow baud rate modems devices 2400 bit/s authentication/authorization system mobile agents telescript created high coupling device target place result deployment agent-based technology incredibly difficult never reached fruition personalink service shut
[ 2179, 6276, 11271, 4364, 3089, 10393, 6301, 5406, 4383, 673, 3626, 6827, 3248, 7857, 7991, 9784, 1083, 5824, 7492, 11079, 7246, 2001, 4305, 2259, 7253, 3542, 3162, 607, 10080, 2658, 8423, 10215, 3561, 10599, 6763, 6508, 2925, 495, 2160, 2...
Test
7,728
2
Memory-mapped_file:memory-mapped file memory-mapped file segment virtual memory assigned direct byte-for-byte correlation portion file file-like resource resource typically file physically present disk also device shared memory object resource operating system reference file descriptor present correlation file memory space permits applications treat mapped portion primary memory benefit memory mapping file increasing i/o performance especially used large files small files memory-mapped files result waste slack space memory maps always aligned page size mostly 4 kib therefore 5 kib file allocate 8 kib thus 3 kib wasted accessing memory mapped files faster using direct read write operations two reasons firstly system call orders magnitude slower simple change program local memory secondly operating systems memory region mapped actually kernel page cache file cache meaning copies need created user space certain application-level memory-mapped file operations also perform better physical file counterparts applications access update data file directly in-place opposed seeking start file rewriting entire edited contents temporary location since memory-mapped file handled internally pages linear file access seen example flat file data storage configuration files requires disk access new page boundary crossed write larger sections file disk single operation possible benefit memory-mapped files lazy loading thus using small amounts ram even large file trying load entire contents file significantly larger amount memory available cause severe thrashing operating system reads disk memory simultaneously writes pages memory back disk memory-mapping may bypass page file completely also allow smaller page-sized sections loaded data edited similarly demand paging used programs memory mapping process handled virtual memory manager subsystem responsible dealing page file memory mapped files loaded memory one entire page time page size selected operating system maximum performance since page file management one critical elements virtual memory system loading page sized sections file physical memory typically highly optimized system function two types memory-mapped files persisted files associated source file disk data saved source file disk last process finished memory-mapped files suitable working extremely large source files non-persisted files associated file disk last process finished working file data lost files suitable creating shared memory inter-process communications ipc major reason choose memory mapped file i/o performance nevertheless tradeoffs standard i/o approach costly due system call overhead memory copying memory-mapped approach cost minor page faults—when block data loaded page cache yet mapped process virtual memory space circumstances memory mapped file i/o substantially slower standard file i/o another drawback memory-mapped files relates given architecture address space file larger addressable space portions mapped time complicating reading example 32-bit architecture intel ia-32 directly address 4 gib smaller portions files even smaller amount addressable space available individual programs—typically range 2 3 gib depending operating system kernel i/o errors underlying file e.g removable drive unplugged optical media ejected disk full writing etc accessing mapped memory reported application sigsegv/sigbus signals posix execute_in_page_error structured exception windows code accessing mapped memory must prepared handle errors n't normally occur accessing memory hardware architectures mmu support memory-mapped files architectures without mmu operating system copy entire file memory request map made extremely wasteful slow little bit file accessed work files fit available memory perhaps common use memory-mapped file process loader modern operating systems including microsoft windows unix-like systems process started operating system uses memory mapped file bring executable file along loadable modules memory execution memory-mapping systems use technique called demand paging file loaded physical memory subsets one page page actually referenced specific case executable files permits os selectively load portions process image actually need execute another common use memory-mapped files share memory multiple processes modern protected mode operating systems processes generally permitted access memory space allocated use another process program attempt causes invalid page faults segmentation violations number techniques available safely share memory memory-mapped file i/o one popular two applications simultaneously map single physical file memory access memory example microsoft windows operating system provides mechanism applications memory-map shared segment system page file share data via section modern operating systems runtime environments support form memory-mapped file access function mmap creates mapping file given file descriptor starting location file length part posix specification wide variety posix-compliant systems unix linux mac os x openvms support common mechanism memory mapping files microsoft windows operating systems also support group api functions purpose createfilemapping free portable implementations memory-mapped files microsoft windows posix-compliant platforms java programming language provides classes methods access memory mapped files programming language supports memory mapped files standard library std.mmfile module ruby gem library called mmap implements memory-mapped file objects since version 1.6 python included mmap module standard library details module vary according whether host platform windows unix-like perl several modules available memory mapping files cpan sys :mmap file :map microsoft .net runtime p/invoke used use memory mapped files directly windows api managed access p/invoke necessary memory mapped files introduced version 4 runtime see memory-mapped files previous versions third-party libraries provide managed api php supported memory-mapping techniques number native file access functions file_get_contents removed 5.3 see revision log r programming language exists library cran called bigmemory uses boost library provides memory-mapped backed arrays directly r. package ff offers memory-mapped vectors matrices arrays data frames j programming language supported memory mapped files since least 2005 includes support boxed array data single datatype files support loaded 'data/jmf j jdb jd database engines use memory mapped files column stores early day implementation pmap system call dec-20 tops-20 operating system feature used software house system-1022 database system sunos 4 introduced unix mmap permitted programs map files memory two decades release tops-20 pmap windows nt given growable memory-mapped files gmmf since createfilemapping function requires size passed altering file size readily accommodated gmmf api developed use gmmf requires declaring maximum file size grow unused space wasted
[ 5380, 7684, 8582, 8966, 3725, 6797, 8080, 273, 8976, 11539, 5397, 10774, 6296, 11675, 6813, 9245, 3615, 3235, 10921, 5165, 5677, 7983, 1332, 10292, 823, 7351, 1593, 3386, 8379, 6087, 5840, 86, 10333, 1247, 486, 2281, 5356, 5492, 5754, 703...
None
7,729
4
Web_access_management:web access management web access management wam form identity management controls access web resources providing authentication management policy-based authorizations audit reporting services optional single sign-on convenience authentication management process determining user ’ application ’ identity normally done prompting user name password additional methods authentication also include access tokens generate one-time passwords digital certificates user process identity confirmed policy-based authorization comes play web resource one policies attached say e.g allow internal employees access resource and/or allow members admin group access resource requested resource used look policy policy evaluated user ’ identity user passes policy evaluation she/he granted access resource user fails evaluation access denied authentication authorization policy decision made outcome recorded auditing purposes benefit end user web access management product tie security together benefit administrative staff offer single sign process user logs web resource automatically logged related resources users inconvenienced attempting get authenticated multiple websites throughout course day potentially different user names passwords web access management product record initial authentication provide user cookie acts temporary token authentication protected resources thereby requiring user log web access management products originated late 1990s known single sign five original products hewlett-packard hp icewall sso ca technologies siteminder oblix access manager magnaquest technologies limited iam identity access management novell ichain products simple functional capabilities solved important issue time – share user credentials across multiple domains without forcing user log challenge stemmed fact cookies domain-specific simple way seamlessly transfer user one website another new term became known web access management products added functionality controlling resources web pages user could access addition authenticating three different types architectures comes web access management architectures plug-in web agent proxy tokenization plugins programs installed every web/application server register servers called every request web page intercept request communicate external policy server make policy decisions one benefits plugin agent based architecture highly customized unique needs particular web server one drawbacks different plugin required every web server every platform potentially every version every server technology evolves upgrades agents must distributed compatible evolving host software proxy-based architectures differ web requests routed proxy server back-end web/application servers provide universal integration web servers since common standard protocol http used instead vendor-specific application programming interfaces apis one drawbacks additional hardware usually required run proxy servers tokenization differs user receives token used directly access back-end web/application servers architecture authentication occurs web access management tool data flows around removes network bottlenecks caused proxy-based architectures one drawbacks back-end web/application server must able accept token otherwise web access management tool must designed use common standard protocols solutions like ca siteminder known ca single sign-on offer agent proxy based options including standards based federation maxecurity p2 security employs proxy approach netiq access manager offers hybrid solution consists proxy j2ee agent approaches telegrid smrte employs tokenization approach cases annual maintenance costs dwarf purchase price example policy servers used plugin proxy-based architectures high-end hardware needed order handle workload required run web access management infrastructure centralized administration additional hidden cost customers need hire train staff exclusively manage policy entitlements underlying web applications final hidden cost relates regulatory compliance since web access management similar concept firewall closely aligned application-layer firewall must able handle major audit requirements especially public companies subject sarbanes-oxley act mention bound health insurance portability accountability act pci cpni larger companies spend tremendous amounts time money auditing web access management infrastructures since enforcement points many internal external applications
[ 3521, 6563, 8998, 5384, 7368, 10673, 10804, 4725, 8471, 5433 ]
Test
7,730
4
Phone_hacking:phone hacking phone hacking practice manipulating gaining unauthorized access mobile phones intercepting telephone calls accessing voicemail messages unauthorized access phone user conversation commonly referred phone tapping term came prominence news international phone hacking scandal alleged cases proved court british tabloid newspaper news world involved interception voicemail messages british royal family public figures murdered schoolgirl named milly dowler although mobile phone users may targeted famous rich powerful whose prize important enough whatever reason devote time resources make concerted attack usually common real risks face unauthorised remote access voicemail systems exposed news international phone hacking scandal possible weaknesses implementations systems telcos pabx systems distant voicemail feature accessed entering password initial greeting played hacker call direct dial number voicemail try use default password guess select call back function enter premium rate number call back pabx calls back premium rate line confirming password hacker stop form hacking call back feature pabx turned strong password used mobile phone voicemail messages may accessed landline telephone entry personal identification number pin service provider commonly sets four digit default pin rarely changed phone owner hacker knows phone number default pin access voicemail messages associated service even default pin known social engineering used reset voicemail pin code default impersonating owner phone call call centre many people also use weak pins easy guess prevent subscribers choosing pins weak password strength mobile phone companies disallow use consecutive repeat digits voicemail pin codes mid-2000s discovered calls emanating handset registered voicemail account would put straight voicemail without need pin hacker could use caller id spoofing impersonate target handset caller id thereby gain access associated voicemail without pin following controversies phone hacking criticism leveled mobile service providers allowed access voicemail without pin many mobile phone companies strengthened default security systems remote access voicemail messages phone settings longer achieved even via default pin example announced august 2011 new wireless subscribers would required enter pin checking voicemail even checking phones t-mobile stated recommends turn voice mail password added security always choice analysis user-selected pin codes suggested ten numbers represent 15 iphone passcodes 1234 0000 common years birth graduation also common choices even four-digit pin randomly selected key space small formula_1 10,000 possibilities making pins significantly easier brute force passwords someone physical access handset secured pin therefore feasibly determine pin short time mobile phone microphones activated remotely security agencies telcos without need physical access long battery removed roving bug feature used law enforcement agencies intelligence services listen nearby conversations techniques phone hacking include tricking mobile phone user downloading malware monitors activity phone bluesnarfing unauthorized access phone via bluetooth flaws implementation gsm encryption algorithm allow passive interception equipment needed available government agencies built freely available parts december 2011 german researcher karsten nohl revealed possible hack mobile phone voice text messages many networks free decryption software available internet blamed mobile phone companies relying outdated encryption techniques 2g system said problem could fixed easily phone hacking form surveillance illegal many countries unless carried lawful interception government agency news international phone hacking scandal private investigator glenn mulcaire found violated regulation investigatory powers act 2000 sentenced six months prison january 2007 renewed controversy phone hacking claims led closure news world july 2011 december 2010 truth caller id act signed united states law making illegal cause caller identification service knowingly transmit misleading inaccurate caller identification information intent defraud cause harm wrongfully obtain anything value
[ 1601, 7556, 9732, 297, 9356, 8950, 8313, 7515 ]
Test
7,731
4
William_Coffee:william coffee william coffee 1917-1989 received commendation meritorious civilian service april 1946 role recruiting leading group african-american cryptographers signals intelligence service began career public service civilian conservation corps 1937 1940 soon began working signal intelligence service later known signal security agency despite hired janitor promoted messenger upon promoted assigned task hiring group black cryptologists arlington hall station success composing directing group elevated status previously unreached black cryptologists second world war coffee joined armed forces security agency later became national security agency coffee retired nsa 1972 inducted national security agency cryptologic hall honor 2011
[ 7887 ]
Test
7,732
9
Format_(Common_Lisp):format common lisp codice_1 function common lisp produce formatted text using format string similar printf format string provides functionality codice_2 allowing user output numbers english apply certain format specifiers certain conditions iterate data structures output tabular format functionally originates mit lisp machine lisp based multics codice_3 example c codice_2 call following using common lisp equivalent another example would print every element list delimited commas done using ~^ directives note list values iterated directly codice_5 commas correctly printed items yet complex example would printing list using customary english phrasing whilst codice_5 somewhat infamous tendency become opaque hard read provides remarkably concise yet powerful syntax specialised common need common lisp format summary table available
[ 8262, 2062, 5360, 6772, 4057 ]
Test
7,733
2
Z/VM:z/vm z/vm current version ibm vm family virtual machine operating systems z/vm first released october 2000 remains active use development directly based technology concepts dating back 1960s ibm cp/cms ibm system/360-67 see article history cp/cms historical details z/vm runs ibm system z family computers used support large numbers thousands linux virtual machines see linux z systems october 16 2018 ibm released z/vm version 7.1 requires z/architecture implemented ibm ec12 bc12 later models
[ 6150, 2058, 3082, 6675, 8737, 7217, 10803, 573, 5697, 5702, 7248, 9829, 6248, 6772, 118, 2168, 2172, 2179, 10883, 4238, 9361, 9370, 4255, 2212, 7848, 8879, 7349, 2236, 1219, 8388, 6342, 10438, 10962, 1235, 3816, 8439, 3323, 9468, 2813, 53...
Validation
7,734
4
Integer_overflow:integer overflow computer programming integer overflow occurs arithmetic operation attempts create numeric value outside range represented given number digits – either larger maximum lower minimum representable value common result overflow least significant representable digits result stored result said wrap around maximum i.e modulo power radix usually two modern computers sometimes ten another radix overflow condition may give results leading unintended behavior particular possibility anticipated overflow compromise program reliability security applications timers clocks wrapping overflow desirable c11 standard states unsigned integers modulo wrapping defined behavior term overflow never applies computation involving unsigned operands never overflow processors like graphics processing units gpus digital signal processors dsps support saturation arithmetic overflowed results would clamped i.e set minimum maximum value representable range rather wrapped around register width processor determines range values represented registers though vast majority computers perform multiple-precision arithmetic operands memory allowing numbers arbitrarily long overflow avoided register width limits sizes numbers operated e.g added subtracted using single instruction per operation typical binary register widths unsigned integers include arithmetic operation produces result larger maximum n-bit integer overflow reduces result modulo n-th power 2 retaining least significant bits result effectively causing wrap around particular multiplying adding two integers may result value unexpectedly small subtracting small integer may cause wrap large positive value example 8-bit integer addition 255 2 results 1 similarly subtraction 0 − 1 results 255 two complement representation −1 wraparound may cause security problems—if overflowed value used number bytes allocate buffer buffer allocated unexpectedly small potentially leading buffer overflow depending usage buffer might turn cause arbitrary code execution variable signed integer type program may make assumption variable always contains positive value integer overflow cause value wrap become negative violates program assumption may lead unexpected behavior example 8-bit integer addition 127 1 results −128 two complement 128 solution particular problem use unsigned integer types values program expects assumes never negative computers two dedicated processor flags check overflow conditions carry flag set result addition subtraction considering operands result unsigned numbers fit given number bits indicates overflow carry borrow significant bit immediately following add carry subtract borrow operation would use contents flag modify register memory location contains higher part multi-word value overflow flag set result operation signed numbers sign one would predict signs operands e.g negative result adding two positive numbers indicates overflow occurred signed result represented two complement form would fit given number bits unsigned type ideal result operation outside types representable range returned result obtained wrapping event commonly defined overflow contrast c11 standard defines event overflow states computation involving unsigned operands never overflow ideal result integer operation outside types representable range returned result obtained clamping event commonly defined saturation usage varies whether saturation overflow eliminate ambiguity terms wrapping overflow saturating overflow used term underflow commonly used floating-point math integer math many references found integer underflow term integer underflow used means ideal result closer minus infinity output type representable value closest minus infinity term integer underflow used definition overflow may include types overflows may include cases ideal result closer positive infinity output type representable value closest positive infinity ideal result operation exact integer meaning overflow ambiguous edge cases consider case ideal result value 127.25 output type maximum representable value 127 overflow defined ideal value outside representable range output type case would classified overflow operations well defined rounding behavior overflow classification may need postponed rounding applied c11 standard defines conversions floating point integer must round toward zero c used convert floating point value 127.25 integer rounding applied first give ideal integer output 127 since rounded integer outputs range c standard would classify conversion overflow several methods handling overflow programming languages implement various mitigation methods accidental overflow ada seed7 certain variants functional languages trigger exception condition overflow python since 2.4 seamlessly converts internal representation number match growth eventually representing codice_1 – whose ability limited available memory run-time overflow detection implementation codice_2 also available c compilers languages native support arbitrary-precision arithmetic type safety python common lisp numbers promoted larger size automatically overflows occur exceptions thrown conditions signaled range constraint exists using languages may thus helpful mitigate issue however languages situations still possible integer overflow occur example explicit optimization code path considered bottleneck profiler case common lisp possible using explicit declaration type-annotate variable machine-size word fixnum lower type safety level zero particular code block java 8 overloaded methods example like throw case overflow computer emergency response team cert developed as-if infinitely ranged air integer model largely automated mechanism eliminate integer overflow truncation c/c++ using run-time error handling computer graphics signal processing typical work data ranges 0 1 −1 1 example grayscale image 0 represents black 1 represents white values in-between represent varying shades gray one operation one may want support brightening image multiplying every pixel constant saturated arithmetic allows one blindly multiply every pixel constant without worrying overflow sticking reasonable outcome pixels larger 1 i.e brighter white become white values darker black become black unanticipated arithmetic overflow fairly common cause program errors overflow bugs may hard discover diagnose may manifest large input data sets less likely used validation tests taking arithmetic mean two numbers adding dividing two done many search algorithms causes error sum although resulting mean large represented hence overflows unhandled arithmetic overflow engine steering software primary cause crash 1996 maiden flight ariane 5 rocket software considered bug-free since used many previous flights used smaller rockets generated lower acceleration ariane 5 frustratingly part software overflow error occurred even required running ariane 5 time caused rocket fail—it launch-regime process smaller predecessor ariane 5 remained software adapted new rocket furthermore actual cause failure flaw engineering specification software dealt overflow detected diagnostic dump bus would connected test equipment software testing development connected rocket steering motors flight data dump drove engine nozzle hard one side put rocket aerodynamic control precipitated rapid breakup air 30 april 2015 federal aviation authority announced order boeing 787 operators reset electrical system periodically avoid integer overflow could lead loss electrical power ram air turbine deployment boeing deployed software update fourth quarter european aviation safety agency followed 4 may 2015 error happens 2³¹ centiseconds 2^31/100/3600/24 days indicating 32-bit signed integer overflow bugs evident computer games arcade game donkey kong impossible advance past level 22 due integer overflow time/bonus game takes level number user multiplies 10 adds 40 reach level 22 time/bonus number 260 large 8-bit 256 value register resets 0 gives remaining 4 time/bonus – short finish level donkey kong jr math trying calculate number 10000 shows first 4 digits overflow cause famous split-screen level pac-man nuclear gandhi civilization also caused far lands minecraft existed infdev development period beta 1.7.3 however later fixed beta 1.8 still exists pocket edition windows 10 edition versions minecraft super nintendo game lamborghini american challenge player cause amount money drop 0 race fined limit remaining money paying fee race glitches integer grants player 65,535,000 would going negative similar glitch occurs player drop negative amount fast travelling without sufficient funds proceeding event player gets robbed currency taken away game attempts take players money away amount 0 player granted 2147482963 game currency microsoft ibm macro assembler masm version 1.00 likely programs built pascal compiler integer overflow signedness error stack setup code prevented running newer dos machines emulators common configurations 512 kb memory program either hangs displays error message exits dos 2014 music video psy gangnam style received many views youtube breached maximum possible viewership number within signed 32-bit integer youtube subsequently amended maximum count 64-bit integer august 2016 casino machine resorts world casino printed prize ticket 42,949,672.76 result overflow bug casino refused pay amount calling malfunction using defense machine clearly stated maximum payout 10,000 prize higher result programming bug iowa supreme court ruled favor casino
[ 3462, 2062, 1936, 10644, 9244, 7326, 10658, 428, 5677, 1917, 1461, 1474, 8260, 8773, 5837, 10190, 9041, 4562, 4563, 4572, 3039, 10083, 6373, 4071, 8167, 10344, 8554, 1775, 1776, 3956, 7292, 2045 ]
Test
7,735
4
Minnie_M._Kenny:minnie m. kenny minnie m. kenny 1929–august 17 2005 cryptanalyst educator equal opportunity activist worked national security agency nsa served deputy commandant national cryptologic school responsible creating scholarships nsa employees recipient numerous awards including meritorious exceptional civilian service awards presidential meritorious executive award distinguished service award cia kenny inducted cryptologic hall honor 2009 minnie mcneal born 1929 philadelphia graduating philadelphia high school girls worked philadelphia commerce department united states census bureau washington d. c. hired 1951 work arlington hall army security agency part first group african americans allowed work upstairs operations division basement assigned u street school training training change organization military footing national security agency 1952 mcneal assigned communications clerk allo non-soviet linguistics unit particularly well known expertise cryptanalysis language traffic analysis worked elite think tank nsa develop programs cryptanalysis language serving chair agency language panel 1972 mcneal married herbert cornelius kenny one singers ink spots daughter daphne 1973 kenny became founding editor nsa group b journal dragon seeds pressed cryptanalyst personal computer necessary tool 1975 1981 served office techniques standards nsa chief language linguistics 1980 recipient meritorious civilian service award beginning 1982 kenny served deputy commandant national cryptologic school worked traditional black colleges universities increase diversity introduced computer assisted teaching techniques founded computer assisted learning instruction consortium calico bring professional language teachers use language together international association 1984 kenny awarded second civilian honor exceptional civilian service award nsa presidents ronald reagan george h. w. bush awarded meritorious executive award decade working improve school kenny served department defense congressional task force women minorities handicapped science technology nsa director equal employment opportunity 1993 retirement recipient central intelligence agency distinguished service award kenny served congressional fellow staff congressman louis stokes worked drafting underground railroad act 1997 designed preserve protect history significant buildings associated historic organization kenny died august 17 2005 columbia maryland buried st. john cemetery ellicott city maryland posthumously 2009 inducted cryptologic hall honor
[ 1941, 7887 ]
Test
7,736
4
FREAK:freak freak factoring rsa export keys security exploit cryptographic weakness ssl/tls protocols introduced decades earlier compliance u.s. cryptography export regulations involved limiting exportable software use public key pairs rsa moduli 512 bits less so-called rsa_export keys intention allowing broken easily national security agency nsa organizations lesser computing resources however early 2010s increases computing power meant could broken anyone access relatively modest computing resources using well-known number field sieve algorithm using little 100 cloud computing services combined ability man-in-the-middle attack manipulate initial cipher suite negotiation endpoints connection fact finished hash depended master secret meant man-in-the-middle attack modest amount computation could break security website allowed use 512-bit export-grade keys exploit discovered 2015 underlying vulnerabilities present many years dating back 1990s flaw found researchers imdea software institute inria microsoft research freak attack openssl identifier vulnerable software devices included apple safari web browser default browser google android operating system microsoft internet explorer openssl microsoft also stated schannel implementation transport-layer encryption vulnerable version freak attack versions microsoft windows cve id microsoft vulnerability schannel cve id apple vulnerability secure transport sites affected vulnerability included us federal government websites fbi.gov whitehouse.gov nsa.gov around 36 https-using websites tested one security group shown vulnerable exploit based geolocation analysis using ip2location lite 35 vulnerable servers located us press reports exploit described effects potentially catastrophic unintended consequence us government efforts control spread cryptographic technology vendors process releasing new software would fix flaw march 9 2015 apple released security updates ios 8 os x operating systems fixed flaw march 10 2015 microsoft released patch fixed vulnerability supported versions windows server 2003 vista later google chrome 41 opera 28 also mitigated flaw mozilla firefox vulnerable flaw research paper explaining flaw published 36th ieee symposium security privacy awarded distinguished paper award
[ 513, 517, 1157, 6023, 1288, 8584, 6797, 9744, 1683, 2709, 1688, 3742, 2083, 8358, 11693, 11569, 9394, 9281, 9412, 3657, 5834, 7887, 10831, 11345, 5590, 474, 3805, 7264, 4194, 7139, 8674, 10341, 5107, 501, 1526, 2169, 3707, 510, 4863 ]
Test
7,737
8
Diffbot:diffbot diffbot developer machine learning computer vision algorithms public apis extracting data web pages web scraping company founded 2008 stanford university first company funded startx stanford student enterprises stanford on-campus venture capital fund company gained interest application computer vision technology web pages wherein visually parses web page important elements returns structured format 2015 diffbot announced working version automated knowledge graph crawling web using automatic web page extraction build large database structured web data company products allow software developers analyze web home pages article pages extract important information ignoring elements deemed core primary content august 2012 company released page classifier api automatically categorizes web pages specific page types part diffbot analyzed 750,000 web pages shared social media service twitter revealed photos followed articles videos predominant web media shared social network company raised 2 million funding may 2012 investors including andy bechtolsheim sky dayton diffbot customers include adobe aol cisco duckduckgo ebay instapaper microsoft onswipe springpad
[ 488, 113 ]
Train
7,738
9
Oriel_(scripting_language):oriel scripting language oriel scripting language released power tools series instructional books written leblond group described documentation graphics-based batch language originally designed microsoft windows 3.0 released book windows 3 power tools 1991 however versions language also bundled windows 3.1 power tools 1992 windows nt power tools 1994 suggested extension oriel script file orl oriel distributed two executables oriel.exe mkruntim.exe former oriel interpreter invoked would prompt user choose script file execution latter gave user ability create custom executables bundling script within copy interpreter way oriel program could distributed run way windows exe language named oriel style bay window window style depicted icon distributed runtime following program displays modal dialog box containing hello world message oriel program always possess main window dialog box type would appear following code gives window title maximizes instructs remain open user closes code also demonstrates retrieval window information use string variables function call setwindow maximize could replace second third lines
[ 9345, 9780, 6797, 7983 ]
None
7,739
4
Computer_virus:computer virus computer virus type malware executed replicates modifying computer programs inserting code replication succeeds affected areas said infected computer virus virus writers use social engineering deceptions exploit detailed knowledge security vulnerabilities initially infect systems spread virus vast majority viruses target systems running microsoft windows employing variety mechanisms infect new hosts often using complex anti-detection/stealth strategies evade antivirus software motives creating viruses include seeking profit e.g. ransomware desire send political message personal amusement demonstrate vulnerability exists software sabotage denial service simply wish explore cybersecurity issues artificial life evolutionary algorithms computer viruses currently cause billions dollars worth economic damage year due causing system failure wasting computer resources corrupting data increasing maintenance costs stealing personal information etc response free open-source antivirus tools developed industry antivirus software cropped selling freely distributing virus protection users various operating systems even though currently existing antivirus software able uncover computer viruses especially new ones computer security researchers actively searching new ways enable antivirus solutions effectively detect emerging viruses already become widely distributed term virus also misused extension refer types malware malware encompasses computer viruses along many forms malicious software computer worms ransomware spyware adware trojan horses keyloggers rootkits bootkits malicious browser helper object bhos malicious software majority active malware threats actually trojan horse programs computer worms rather computer viruses term computer virus coined fred cohen 1985 misnomer viruses often perform type harmful activity infected host computers acquisition hard disk space central processing unit cpu time accessing private information e.g. credit card numbers corrupting data displaying political humorous messages user screen spamming e-mail contacts logging keystrokes even rendering computer useless however viruses carry destructive payload attempt hide themselves—the defining characteristic viruses self-replicating computer programs modify software without user consent first academic work theory self-replicating computer programs done 1949 john von neumann gave lectures university illinois theory organization complicated automata work von neumann later published theory self-reproducing automata essay von neumann described computer program could designed reproduce von neumann design self-reproducing computer program considered world first computer virus considered theoretical father computer virology 1972 veith risak directly building von neumann work self-replication published article selbstreproduzierende automaten mit minimaler informationsübertragung self-reproducing automata minimal information exchange article describes fully functional virus written assembler programming language siemens 4004/35 computer system 1980 jürgen kraus wrote diplom thesis selbstreproduktion bei programmen self-reproduction programs university dortmund work kraus postulated computer programs behave way similar biological viruses first known description self-reproducing program short story occurs 1970 story gregory benford describes computer program called virus installed computer telephone modem dialling capability randomly dials phone numbers hit modem answered another computer attempts program answering computer program second computer also begin dialling random numbers search yet another computer program program rapidly spreads exponentially susceptible computers countered second program called vaccine idea explored two 1972 novels harlie one david gerrold terminal man michael crichton became major theme 1975 novel shockwave rider john brunner 1973 michael crichton sci-fi movie westworld made early mention concept computer virus central plot theme causes androids run amok alan oppenheimer character summarizes problem stating ... clear pattern suggests analogy infectious disease process spreading one ... area next replies stated perhaps superficial similarities disease must confess find difficult believe disease machinery creeper virus first detected arpanet forerunner internet early 1970s creeper experimental self-replicating program written bob thomas bbn technologies 1971 creeper used arpanet infect dec pdp-10 computers running tenex operating system creeper gained access via arpanet copied remote system message 'm creeper catch displayed reaper program created delete creeper 1982 program called elk cloner first personal computer virus appear wild —that outside single computer computer lab created written 1981 richard skrenta ninth grader mount lebanon high school near pittsburgh attached apple dos 3.3 operating system spread via floppy disk 50th use elk cloner virus would activated infecting personal computer displaying short poem beginning elk cloner program personality 1984 fred cohen university southern california wrote paper computer viruses – theory experiments first paper explicitly call self-reproducing program virus term introduced cohen mentor leonard adleman 1987 fred cohen published demonstration algorithm perfectly detect possible viruses fred cohen theoretical compression virus example virus malicious software malware putatively benevolent well-intentioned however antivirus professionals accept concept benevolent viruses desired function implemented without involving virus automatic compression instance available windows operating system choice user virus definition make unauthorised changes computer undesirable even damage done intended page one dr solomon virus encyclopaedia undesirability viruses even nothing reproduce thoroughly explained article describes useful virus functionalities published j b. gunn title use virus functions provide virtual apl interpreter user control 1984 first ibm pc virus wild boot sector virus dubbed c brain created 1986 farooq alvi brothers lahore pakistan reportedly deter unauthorized copying software written first virus specifically target microsoft windows winvir discovered april 1992 two years release windows 3.0 virus contain windows api calls instead relying dos interrupts years later february 1996 australian hackers virus-writing crew vlad created bizatch virus also known boza virus first known virus target windows 95 late 1997 encrypted memory-resident stealth virus win32.cabanas released—the first known virus targeted windows nt also able infect windows 3.0 windows 9x hosts even home computers affected viruses first one appear commodore amiga boot sector virus called sca virus detected november 1987 viable computer virus must contain search routine locates new files new disks worthwhile targets infection secondly every computer virus must contain routine copy program search routine locates three main virus parts infection mechanism also called 'infection vector virus spreads propagates virus typically search routine locates new files new disks infection trigger also known logic bomb compiled version could activated time within executable file virus run determines event condition malicious payload activated delivered particular date particular time particular presence another program capacity disk exceeding limit double-click opens particular file payload actual body data performs actual malicious purpose virus payload activity might noticeable e.g. causes system slow freeze time payload harmful activity times non-destructive distributive called virus hoax virus phases life cycle computer virus described using analogy biology life cycle divided four phases virus program idle stage virus program managed access target user computer software stage virus take action virus eventually activated trigger states event execute virus date presence another program file capacity disk exceeding limit user taking certain action e.g. double-clicking certain icon opening e-mail etc. viruses stage virus starts propagating multiplying replicating virus places copy programs certain system areas disk copy may identical propagating version viruses often morph change evade detection professionals anti-virus software infected program contain clone virus enter propagation phase dormant virus moves phase activated perform function intended triggering phase caused variety system events including count number times copy virus made copies actual work virus payload released destructive deleting files disk crashing system corrupting files relatively harmless popping humorous political messages screen computer viruses infect variety different subsystems host computers software one manner classifying viruses analyze whether reside binary executables .exe .com files data files microsoft word documents pdf files boot sector host hard drive combination memory-resident virus simply resident virus installs part operating system executed remains ram time computer booted shut resident viruses overwrite interrupt handling code functions operating system attempts access target file disk sector virus code intercepts request redirects control flow replication module infecting target contrast non-memory-resident virus non-resident virus executed scans disk targets infects exits i.e remain memory done executing many common applications microsoft outlook microsoft word allow macro programs embedded documents emails programs may run automatically document opened macro virus document virus virus written macro language embedded documents users open file virus code executed infect user computer one reasons dangerous open unexpected suspicious attachments e-mails opening attachments e-mails unknown persons organizations help reduce likelihood contracting virus cases virus designed e-mail appears reputable organization e.g. major bank credit card company boot sector viruses specifically target boot sector and/or master boot record mbr host hard disk drive solid-state drive removable storage media flash drives floppy disks etc. email viruses viruses intentionally rather accidentally uses email system spread virus infected files may accidentally sent email attachments email viruses aware email system functions generally target specific type email system microsoft outlook commonly used harvest email addresses various sources may append copies email sent may generate email messages containing copies attachments order avoid detection users viruses employ different kinds deception old viruses especially dos platform make sure last modified date host file stays file infected virus approach fool antivirus software however especially maintain date cyclic redundancy checks file changes viruses infect files without increasing sizes damaging files accomplish overwriting unused areas executable files called cavity viruses example cih virus chernobyl virus infects portable executable files files many empty gaps virus 1 kb length add size file viruses try avoid detection killing tasks associated antivirus software detect example conficker 2010s computers operating systems grow larger complex old hiding techniques need updated replaced defending computer viruses may demand file system migrate towards detailed explicit permission every kind file access kinds antivirus software employ various techniques counter stealth mechanisms infection occurs recourse clean system unreliable microsoft windows operating systems ntfs file system proprietary leaves antivirus software little alternative send read request windows os files handle requests viruses trick antivirus software intercepting requests operating system os virus hide intercepting request read infected file handling request returning uninfected version file antivirus software interception occur code injection actual operating system files would handle read request thus antivirus software attempting detect virus either given permission read infected file read request served uninfected version file reliable method avoid stealth viruses reboot medium known clear security software used check dormant operating system files security software relies virus signatures employ heuristics security software may also use database file hashes windows os files security software identify altered files request windows installation media replace authentic versions older versions windows file cryptographic hash functions windows os files stored windows—to allow file integrity/authenticity checked—could overwritten system file checker would report altered system files authentic using file hashes scan altered files would always guarantee finding infection modern antivirus programs try find virus-patterns inside ordinary programs scanning so-called virus signatures unfortunately term misleading viruses possess unique signatures way human beings virus signature merely sequence bytes antivirus program looks known part virus better term would search strings different antivirus programs employ different search strings indeed different search methods identifying viruses virus scanner finds pattern file perform checks make sure found virus merely coincidental sequence innocent file notifies user file infected user delete cases clean heal infected file viruses employ techniques make detection means signatures difficult probably impossible viruses modify code infection infected file contains different variant virus one method evading signature detection use simple encryption encipher encode body virus leaving encryption module static cryptographic key cleartext change one infection next case virus consists small decrypting module encrypted copy virus code virus encrypted different key infected file part virus remains constant decrypting module would example appended end case virus scanner directly detect virus using signatures still detect decrypting module still makes indirect detection virus possible since would symmetric keys stored infected host entirely possible decrypt final virus probably required since self-modifying code rarity may reason virus scanners least flag file suspicious old compact way use arithmetic operation like addition subtraction use logical conditions xoring byte virus constant exclusive-or operation repeated decryption suspicious code modify code encryption/decryption may part signature many virus definitions simpler older approach use key encryption consisted operations parameters like incrementing decrementing bitwise rotation arithmetic negation logical viruses called polymorphic viruses employ means encryption inside executable virus encrypted certain events virus scanner disabled updates computer rebooted called cryptovirology said times executable decrypt virus execute hidden runtimes infecting computer sometimes disabling antivirus software polymorphic code first technique posed serious threat virus scanners like regular encrypted viruses polymorphic virus infects files encrypted copy decoded decryption module case polymorphic viruses however decryption module also modified infection well-written polymorphic virus therefore parts remain identical infections making difficult detect directly using signatures antivirus software detect decrypting viruses using emulator statistical pattern analysis encrypted virus body enable polymorphic code virus polymorphic engine also called mutating engine mutation engine somewhere encrypted body see polymorphic code technical detail engines operate viruses employ polymorphic code way constrains mutation rate virus significantly example virus programmed mutate slightly time programmed refrain mutating infects file computer already contains copies virus advantage using slow polymorphic code makes difficult antivirus professionals investigators obtain representative samples virus bait files infected one run typically contain identical similar samples virus make likely detection virus scanner unreliable instances virus may able avoid detection avoid detected emulation viruses rewrite completely time infect new executables viruses utilize technique said metamorphic code enable metamorphism metamorphic engine needed metamorphic virus usually large complex example w32/simile consisted 14,000 lines assembly language code 90 part metamorphic engine software often designed security features prevent unauthorized use system resources many viruses must exploit manipulate security bugs security defects system application software spread infect computers software development strategies produce large numbers bugs generally also produce potential exploitable holes entrances virus order replicate virus must permitted execute code write memory reason many viruses attach executable files may part legitimate programs see code injection user attempts launch infected program virus code may executed simultaneously operating systems use file extensions determine program associations microsoft windows extensions may hidden user default makes possible create file different type appears user example executable may created named picture.png.exe user sees picture.png therefore assumes file digital image likely safe yet opened runs executable client machine vast majority viruses target systems running microsoft windows due microsoft large market share desktop computer users diversity software systems network limits destructive potential viruses malware open-source operating systems linux allow users choose variety desktop environments packaging tools etc. means malicious code targeting systems affect subset users many windows users running set applications enabling viruses rapidly spread among microsoft windows systems targeting exploits large numbers hosts linux unix general always natively prevented normal users making changes operating system environment without permission windows users generally prevented making changes meaning viruses easily gain control entire system windows hosts difference continued partly due widespread use administrator accounts contemporary versions like windows xp 1997 researchers created released virus linux—known bliss bliss however requires user run explicitly infect programs user access modify unlike windows users unix users log administrator root user except install configure software result even user ran virus could harm operating system bliss virus never became widespread remains chiefly research curiosity creator later posted source code usenet allowing researchers see worked many users install antivirus software detect eliminate known viruses computer attempts download run executable file may distributed email attachment usb flash drives example antivirus software blocks known malicious websites attempt install malware antivirus software change underlying capability hosts transmit viruses users must update software regularly patch security vulnerabilities holes antivirus software also needs regularly updated order recognize latest threats malicious hackers individuals always creating new viruses german av-test institute publishes evaluations antivirus software windows android examples microsoft windows anti virus anti-malware software include optional microsoft security essentials windows xp vista windows 7 real-time protection windows malicious software removal tool included windows security updates patch tuesday second tuesday month windows defender optional download case windows xp additionally several capable antivirus software programs available free download internet usually restricted non-commercial use free programs almost good commercial competitors common security vulnerabilities assigned cve ids listed us national vulnerability database secunia psi example software free personal use check pc vulnerable out-of-date software attempt update ransomware phishing scam alerts appear press releases internet crime complaint center noticeboard ransomware virus posts message user screen saying screen system remain locked unusable ransom payment made phishing deception malicious individual pretends friend computer security expert benevolent individual goal convincing targeted individual reveal passwords personal information commonly used preventative measures include timely operating system updates software updates careful internet browsing avoiding shady websites installation trusted software certain browsers flag sites reported google confirmed hosting malware google two common methods antivirus software application uses detect viruses described antivirus software article first far common method virus detection using list virus signature definitions works examining content computer memory random access memory ram boot sectors files stored fixed removable drives hard drives floppy drives usb flash drives comparing files database known virus signatures virus signatures strings code used identify individual viruses virus antivirus designer tries choose unique signature string found legitimate program different antivirus programs use different signatures identify viruses disadvantage detection method users protected viruses detected signatures recent virus definition update protected new viruses see zero-day attack second method find viruses use heuristic algorithm based common virus behaviors method ability detect new viruses antivirus security firms yet define signature also gives rise false positives using signatures false positives disruptive especially commercial environment may lead company instructing staff use company computer system services checked system viruses slow productivity regular workers one may reduce damage done viruses making regular backups data operating systems different media either kept unconnected system time hard drive read-only accessible reasons using different file systems way data lost virus one start using backup hopefully recent backup session optical media like cd dvd closed becomes read-only longer affected virus long virus infected file copied onto cd/dvd likewise operating system bootable cd used start computer installed operating systems become unusable backups removable media must carefully inspected restoration gammima virus example propagates via removable flash drives many websites run antivirus software companies provide free online virus scanning limited cleaning facilities purpose websites sell antivirus products services websites—like google subsidiary virustotal.com—allow users upload one suspicious files scanned checked one antivirus programs one operation additionally several capable antivirus software programs available free download internet usually restricted non-commercial use microsoft offers optional free antivirus utility called microsoft security essentials windows malicious software removal tool updated part regular windows update regime older optional anti-malware malware removal tool windows defender upgraded antivirus product windows 8 viruses disable system restore important windows tools task manager cmd example virus ciadoor many viruses removed rebooting computer entering windows safe mode networking using system tools microsoft safety scanner system restore windows windows xp windows vista windows 7 restore registry critical system files previous checkpoint often virus cause system hang freeze subsequent hard reboot render system restore point day corrupted restore points previous days work provided virus designed corrupt restore files exist previous restore points microsoft system file checker improved windows 7 later used check repair corrupted system files restoring earlier clean virus-free copy entire partition cloned disk disk image backup copy one solution—restoring earlier backup disk image relatively simple usually removes malware may faster disinfecting computer—or reinstalling reconfiguring operating system programs scratch described restoring user preferences reinstalling operating system another approach virus removal may possible recover copies essential user data booting live cd connecting hard drive another computer booting second computer operating system taking great care infect computer executing infected programs original drive original hard drive reformatted os programs installed original media system restored precautions must taken avoid reinfection restored executable files computer networks became widespread viruses spread removable media particularly floppy disks early days personal computer many users regularly exchanged information programs floppies viruses spread infecting programs stored disks others installed disk boot sector ensuring would run user booted computer disk usually inadvertently personal computers era would attempt boot first floppy one left drive floppy disks fell use successful infection strategy boot sector viruses common wild many years traditional computer viruses emerged 1980s driven spread personal computers resultant increase bulletin board system bbs modem use software sharing bulletin board–driven software sharing contributed directly spread trojan horse programs viruses written infect popularly traded software shareware bootleg software equally common vectors viruses bbss viruses increase chances spreading computers infecting files network file system file system accessed computers macro viruses become common since mid-1990s viruses written scripting languages microsoft programs microsoft word microsoft excel spread throughout microsoft office infecting documents spreadsheets since word excel also available mac os could also spread macintosh computers although viruses ability send infected email messages viruses take advantage microsoft outlook component object model com interface old versions microsoft word allow macros replicate additional blank lines two macro viruses simultaneously infect document combination two also self-replicating appear mating two would likely detected virus unique parents virus may also send web address link instant message contacts e.g. friends colleagues e-mail addresses stored infected machine recipient thinking link friend trusted source follows link website virus hosted site may able infect new computer continue propagating viruses spread using cross-site scripting first reported 2002 academically demonstrated 2005 multiple instances cross-site scripting viruses wild exploiting websites myspace samy worm yahoo
[ 3072, 5636, 10245, 10756, 5131, 9227, 9233, 9242, 8735, 9761, 3106, 9762, 2084, 37, 3620, 4648, 4649, 9256, 43, 9771, 3629, 46, 9775, 6707, 5173, 8247, 10297, 3643, 575, 1088, 9791, 10816, 4165, 8774, 9800, 81, 4689, 10835, 8789, 2654, ...
Test
7,740
4
Infosec_Standard_5:infosec standard 5 hmg infosec standard 5 is5 data destruction standard used british government is5 part larger family security standards published cesg referred general infosec standard no.1 is5 similar dod 5220.22-m used usa is5 sets wide range requirements—not technical detail overwriting data also policies processes organisations place ensure media disposed securely is5 also touches risk management accreditation secure reuse disposal media important control organisations handling high-impact data sufficient sanitise media sanitisation also auditable records must kept is5 defines two different levels overwriting regardless level used verification needed ensure overwriting successful apart overwriting methods could used degaussing physical destruction media inexpensive media destruction replacement may cheaper sanitisation followed reuse ata secure erase approved different methods apply different media ranging paper cds mobile phones choice method affects reusability four different outcomes considered stricter requirements apply data stronger protective marking il cases media il4 confidential may handled secure site list x site
[ 11172 ]
Test
7,741
4
Cyber_Insider_Threat:cyber insider threat cyber insider threat cinder digital threat method 2010 darpa initiated program name cyber insider threat cinder program develop novel approaches detection activities within military-interest networks consistent activities cyber espionage cinder threat unlike vulnerability based attacks action taken initiator based unauthorized access unauthorized objects authorized objects based concept authorized access authorized objects normally occur along subsequent actions within security boundary object action viewed attack normal use analyzed standard ids-ips logging expert systems cinder mission seen unauthorized disclosure data exfiltration realized time resultant cinder case would change object actions related disclosure authorized use authorized object unauthorized use authorized object note initial cinder case controlling agent still seen authorized object based fact security system passed evaluation assurance functionality cyber insider threat continued known issue since mid-1980s following nist material dated march 1994 internal threats shows defined infancy system controls well matched average organization security policy direct result typical user permitted circumvent policy frequent basis administrator unable enforce policy weak access controls detect violation policy weak audit mechanisms even audit mechanisms place daunting volume data produced makes unlikely administrator detect policy violations ongoing research integrity intrusion detection promise fill gap research projects become available products systems remain vulnerable internal threats many prerequisite dimensions cinder activity one primary dimension must always met one system ownership prerequisite principles system ownership information dominance within area object action must part cinder mission cinder action mission dimension resulting case issue distilled one entity one agent one action specific time agent completes action entity agent action owns environment transiting using successful committing specific transaction interrupted least measured monitored owner entity moment time dominance ownership object detect past cinder activity exposure realized one must reconcile object actions exchange transaction two agents measured logged analyze result present concepts one detects current future cinder activity followed path detecting past cinder activity reconciliation data object action application heuristics expert system logic mining models data aggregated building automated logic analysis models proved difficult since insider attack use authorized access authorized objects breaking use use system low assurance low percentage reconciliation always cause system produce far many false positives method acceptable true cinder security solution one main tenet cinder detection become system high assurance high reconciliation controlled owned extent current future cinder actions identified monitored terminated darpa ongoing cyber insider threat cinder program detect insider threats computer systems darpa strategic technology office sto project timed begin around 2010/2011 comparison traditional computer security cinder assumes malicious insiders already access internal network thus attempts detect threat mission analysis behavior rather seeking keep threat government documentation uses analogy tell idea card game poker according ackerman wired impetus program came wikileaks disclosures afghan war documents leak robert gates philosophy information military emphasize access frontline soldiers face mass-leaking cinder type response allows military continue philosophy rather simply cutting access information en masse project started peiter zatko former member l0pht cdc left darpa 2013
[ 8135, 6344, 7464, 5589, 9214, 7322, 2558 ]
None
7,742
1
Apache_Cayenne:apache cayenne apache cayenne open source persistence framework licensed apache license providing object-relational mapping orm remoting services cayenne binds one database schemas directly java objects managing atomic commit rollbacks sql generation joins sequences cayenne remote object persistence java objects even persisted clients via web services native xml serialization objects persisted non-java clients—such ajax-capable browser cayenne supports database reverse engineering generation well velocity-based class generation engine functions controlled directly cayennemodeler fully functional gui tool xml- annotation-based configuration required entire database schema mapped directly java objects quickly comfort gui-based cayennemodeler things together make cayenne interesting user new enterprise world cayenne supports features including caching complete object query syntax relationship pre-fetching on-demand object relationship faulting object inheritance database auto-detection generic persisted objects importantly cayenne scale virtually project size cayenne started project run objectstyle led andrus adamchik released apache license first release july 2002 early 2006 project moved objectstyle apache software foundation december 2006 promoted top level project apache notable milestones cayenne history include release apache cayenne 3.0 may 2010 release apache cayenne 3.1 fall 2014
[ 3080, 10377, 8460, 7567, 1296, 6161, 1047, 8217, 11161, 6555, 8860, 10020, 3877, 10661, 11303, 5677, 10413, 1327, 7983, 3763, 7475, 4919, 5047, 4538, 1851, 6074, 7485, 9789, 10173, 7233, 6338, 4419, 1222, 1991, 4294, 7750, 5066, 8139, 6860,...
None
7,743
4
Take-back_system:take-back system take-back system one primary channels waste collection especially e-waste besides municipal sites take-back split take-back retailers usually free dependent upon purchase new product producer take-back systems may apply larger commercial equipment usually rely upgrade new product european example maltesian weee take back system
[]
Test
7,744
3
Slotket:slotket computer hardware terminology slotkets also known slockets short slot socket adapter adapters allow socket-based microprocessors used slot-based motherboards slotkets first created allow use socket 8 pentium pro processors slot 1 motherboards later became popular inserting socket 370 intel celerons slot 1 based motherboards lowered costs computer builders especially dual processor machines high-end motherboards accepting two slot 1 processors usually pentium 2 widely available double-socketed motherboards less expensive socket 370 celerons slotkets remained popular transition period slot socket-based pentium iii processors allowing cpu upgrades existing slot 1 motherboards slotkets never introduced take advantage amd athlon processors transition slot form factor socket form factor today slotkets largely disappeared neither intel amd currently manufacture cpus slot form factors
[ 7712, 10468, 1260, 1005, 3892, 3798, 4185 ]
Validation
7,745
3
ARM_Cortex-A9:arm cortex-a9 arm cortex-a9 mpcore 32-bit processor core licensed arm holdings implementing armv7-a architecture multicore processor providing 4 cache-coherent cores key features cortex-a9 core arm states tsmc 40g hard macro implementation typically operating 2 ghz single core excluding caches occupies less 1.5 mm designed tsmc 65 nanometer nm generic process clocked speeds 1 ghz consuming less 250 mw per core several system chip soc devices implement cortex-a9 core including
[ 6659, 8196, 9732, 11282, 9235, 11289, 1057, 10277, 38, 4139, 8237, 9774, 2097, 5681, 8250, 8253, 6207, 7747, 2635, 8783, 10838, 99, 8812, 8815, 630, 10361, 638, 644, 7300, 8842, 11405, 146, 659, 5267, 7833, 666, 5786, 4258, 4773, 9913, ...
Test
7,746
7
Project_Kusu:project kusu project kusu open source base designed ground basis platform computing open cluster stack 5 project kusu built objective simplified cluster management operation deployment source kit supports range different linux distributions red hat enterprise linux centos fedora suse linux enterprise server opensuse ubuntu linux addition also standards-based open vendor certified modular hybrid stack transparently integrates open source commercial software single consistent cluster operating environment
[ 2834, 7983, 823 ]
None
7,747
3
InfoTM:infotm infotm chinese technology company founded 2008 infotm microelectronics co. ltd
[ 11282, 9235, 11289, 1057, 38, 4139, 3117, 8237, 9774, 2097, 8250, 8253, 7745, 7747, 2635, 99, 8812, 10361, 638, 644, 8842, 146, 659, 7833, 666, 5786, 4258, 4773, 9913, 8383, 10945, 4821, 2788, 3301, 9964, 1776, 6391, 3835, 2814, 781, 28...
Test
7,748
2
PicoBSD:picobsd picobsd single-floppy disk version freebsd one bsd operating system descendants different variations picobsd allows one secure dial-up access small diskless router dial-in server one standard floppy disc runs minimum 386sx cpu ram hard disk required picobsd freely available bsd license main developer andrzej bialecki latest version 0.42 dinesh nair backported picobsd build scripts freebsd 2.2.5 allowing addition binaries dial-up flavor due freebsd 2.2.5 smaller binary executable format flexibility freebsd gives along full source code available one build small installation performing various tasks including picobsd included freebsd source files used embedded system developers create system images used recent versions freebsd located /usr/src/release/picobsd/ freebsd 5 superseded nanobsd framework
[ 7552, 5506, 1927, 4745, 10761, 2061, 9743, 8725, 5534, 1316, 684, 4908, 10926, 1839, 7983, 1718, 9151, 9153, 3651, 10436, 9927, 8395, 2383, 850, 6361, 9306, 10202, 3551, 607, 9320, 873, 9452, 1776, 633, 8316 ]
None
7,749
9
Little_b_(programming_language):little b programming language little b domain-specific programming language specifically modeling language designed build modular mathematical models biological systems designed authored aneil mallavarapu little b developed virtual cell program harvard medical school headed mathematician jeremy gunawardena language based lisp meant allow modular programming model biological systems allow flexibility facilitate rapid change required accurately capture complex biological systems language draws techniques artificial intelligence symbolic mathematics provides syntactic conveniences derived object-oriented languages language originally denoted lowercase b distinguishing b predecessor widely used c programming language name eventually changed little b avoid confusion pay homage smalltalk first object-oriented programming language
[ 9345, 8262, 6502, 9926, 11625, 6797, 823, 2045 ]
Test
7,750
7
Apache_ZooKeeper:apache zookeeper apache zookeeper software project apache software foundation essentially service distributed systems offering hierarchical key-value store used provide distributed configuration service synchronization service naming registry large distributed systems zookeeper sub-project hadoop top-level apache project right zookeeper architecture supports high availability redundant services clients thus ask another zookeeper leader first fails answer zookeeper nodes store data hierarchical name space much like file system tree data structure clients read write nodes way shared configuration service zookeeper viewed atomic broadcast system updates totally ordered zookeeper atomic broadcast zab protocol core system zookeeper used companies including yelp rackspace yahoo odnoklassniki reddit netapp solidfire facebook twitter ebay well open source enterprise search systems like solr zookeeper originally developed yahoo streamlining processes running big-data clusters storing status local log files zookeeper servers servers communicate client machines provide information zookeeper developed order fix bugs occurred deploying distributed big-data applications prime features apache zookeeper common terminologies regarding zookeeper architecture services cluster replicated stored set servers called ensemble maintains in-memory database containing entire data tree state well transaction log snapshots stored persistently multiple client applications connect server client maintains tcp connection sends requests heartbeats receives responses watch events monitoring addition client libraries included zookeeper distribution number third-party libraries apache curator kazoo available make using zookeeper easier add additional functionality additional programming languages etc etc
[ 6161, 1047, 8217, 8735, 11303, 5677, 9789, 7742, 7233, 7261, 8799, 2658, 8294, 8810, 2163, 6774, 3705, 10377, 8860, 6338, 1222, 4294, 6860, 5332, 8408, 8425, 747, 3819, 5872, 3326, 4358, 8460, 1296, 10526, 3877, 1327, 7983, 4919, 1851, 74...
Test
7,751
3
Industrial_Technology_Research_Institute:industrial technology research institute industrial technology research institute itri technology research development institution taiwan founded 1973 itri played vital role transforming taiwan industries labor-intensive innovation-driven focuses fields smart living quality health sustainable environment years itri incubated 270 innovative companies including well-known names umc tsmc addition headquarters hsinchu taiwan itri branch offices u.s. europe japan effort extend r scope promote opportunities international cooperation around world since founding 1973 itri significant driver taiwan ’ economy especially tech industry 2019 itri banned smartphones computers made china huawei internal network security reasons china ’ taiwan affairs office reacted negatively decision spokesperson saying decision “ jeopardizes mainland taiwan ’ regular economic cooperation political purposes 1973 founding itri 1976 transferring ic manufacturing processes taiwan 1977 establishment first ic demonstration foundry taiwan foundation nation semiconductor industry 1980 origination umc spinoff itri 1983 development ibm-compatible pc leading prosperity industry 1985 innovating carbon fiber bicycles giant bicycles 1986 unveiling photoresist dry film 1987 creation tsmc world largest oem ic foundry spinoff itri 1987 establishment national measurement laboratory nml 1989 creation mirle automation corp. spinoff itri 1990 establishment taiwan notebook pc consortium 1990 development 3-inch tft-lcd displays breakthrough large size display r 1991 introduction taiwan first fire explosion laboratory 1993 establishment 8-inch wafer laboratory accelerated upgrading semiconductor industry 1993 commencement manufacturing 8-inch silicon wafers securing taiwan place semiconductor manufacturing powerhouse 1995 development first common car engine establishment automobile engine enterprise cec 1995 becoming world third-largest wire cutting machine producer 1995 breaking barrier taiwan cd-rom industry 1996 establishment epistar corp. complete supply chain led industry 1996 launching openlab project 1997 innovation first inkjet printing head taiwan 1999 establishment emergency response information center 2001 development first linear motor machine tool taiwan 2002 institution phalanx biotech group spinoff itri 2002 discovery type 21 human collagen 2002 introduction cgmp chinese herbal medicinal plant 2004 establishment delsolar co. joint venture delta electronics itri 2005 establishment itri southern region campus 2007 opening taiwan first flexible display production development laboratory 2008 building first wimax applications lab world 2009 introduction world first usb 3.0 thin memory card 2009 setting first solar power lab taiwan 2010 designing pavilion dreams taipei international flora exposition integration applied sciences arts focus humanism 2010 establishing asia first three-dimensional integrated circuit 3d ic r laboratory new milestone taiwan ic chip technology 2011 launch new venture capital industrial technology investment corporation itic mitsubishi ufj capital mucap 2011 initiating green campus program promoting sustainable living lab green technologies 2011 building taiwan first led ergonomic lighting laboratory assist led industry developing high-value products 2012 signing mou energy research center netherlands develop green energy applications 2012 signing mou kosbi korea promotion bilateral smes economic development 2012 establishing commercialization advisory committee cac promote venture capitals startups 2013 signing memorandum cooperation pact vtt technical research centre finland marking first step innovation-oriented r cooperation taiwan finland 2013 creation itri techventure club foster entrepreneurship taiwan high-tech industries 2013 building itri central taiwan innovation campus drive industrial development central taiwan 2014 partnership laser source companies taiwan japan golden asia fund ventures 2014 granting taiwan mitsui chemicals exclusive license manufacture sell stoba 2015 launching new machine tools technology center forge cnc industry clusters 2015 formulation taiwan innovation entrepreneurship center tiec silicon valley linking taiwan startups global chain technology innovations 2015 receiving underwriters laboratories ul witness test data program certification ensuring itri fuel cell testing lab asia first ul-certified lab 2015 creation smart microsystems technology center laser additive manufacturing technology center bolster iot 3d printing 2016 launch golden asia fund ii industrial technology investment corporation itic itri mitsubishi ufj capital mucap enhance bilateral cooperation taiwan japan 2016 inauguration innovation campus strengthen academia-industry ties 2017 launch itri-aist r collaboration space 2017 opening itri guangfu innovation campus 2018 establishment taiwan-merck biopharma r training collaboration program itri guangfu innovation campus 2018 signing mou malaysian investment development authority mida build industrial technology demonstration site malaysia 2018 establishment industry science technology international strategy center 2019 self driving cars designed itri accumulated 2,000km testing changhua coastal industrial park starfab tech accelerator founded itri focusing innovation fields smart manufacturing smart medical care smart finance smart agriculture headquartered taipei office tainan science park see honors information order recognize outstanding individuals contributions technology advancement industrial development betterment humankind itri inaugurated honorary itri laureates
[ 10303 ]
None
7,752
5
Demand_priority:demand priority demand priority media-access method used 100basevg 100 megabit per second mbit/s ethernet implementation proposed hewlett-packard hp microelectronics later standardized ieee 802.12 demand priority shifts network access control workstation hub access method works star topology method node wishes transmit indicates wish hub also requests high- regular-priority service transmission obtains permission node begins transmitting hub hub responsible passing transmission destination node hub responsible providing access network hub pass high priority transmissions immediately pass regular-priority transmissions opportunity arises letting hub manage access architecture able guarantee required bandwidths requested service priority particular applications nodes also guarantee network scaled enlarged without loss bandwidth demand priority helps increase bandwidth following ways node need keep checking whether network idle transmitting current ethernet implementations wire pair dedicated task making network checking unnecessary demand priority frees wire pair fortunate 100basevg specifications use quartet signalling needs four available wire pairs heavy traffic effectively bring standard ethernet networks standstill nodes spend time trying access network demand priority hub needs pass transmission destination overall network traffic decreased means bandwidth available heavy network traffic
[ 5384, 5490 ]
None
7,753
8
Service-oriented_architecture_implementation_framework:service-oriented architecture implementation framework service-oriented architectures soa based notion software services high-level software components include web services implementation soa requires tools well run-time infrastructure software collectively referred service-oriented architecture implementation framework soaif soaif envisions comprehensive framework provides technology enterprise might need build run soa soaif includes design-time run-time capabilities well software functionality enterprise needs build operate soa including service-oriented vendors race provide possible solutions three different approaches emerging integrating disparate heterogeneous information systems enterprise implementation frameworks meet requirements loosely coupled coarse grained asynchronous services packaged enterprise applications perform well streamlining processes related standard tasks however performance rapidly deteriorates automating streamlining customized processes encompass multiple enterprise applications process difficult time-consuming expensive implement maintain soaif infrastructure addresses issue allowing definition process network topology spanning multiple enterprise boundaries accomplished via peer-to-peer messaging infrastructure distributed security mechanisms allow efficient data exchanges easy implementation enabling enterprise enforce security policies allows soaif increase operational efficiency across entire value chain soa works standard protocols existing packaged application integration solutions complex require significant implementation effort often including extensive manual coding deployment purposes soaif provides native support run time deployment services across network dramatically reduces overall costs application integration deployment automating time-consuming processes also allows extension integration across business boundaries traditional software development process translating requirements working distributed systems time-consuming difficult requiring several stages manual development deployment complex error-prone task effectively streamlined using higher-level component-based soaif soaif incorporates tools let processes developed using standards business process execution language bpel easily translated distributed high-level services easier develop manipulate debug services easily composed implementation-level data flows without user developer track complex middleware concepts topics queues implementation-level services run machine across network virtue built-in dynamic deployment support soaif provides combination service-oriented tools built-in support distributed debugging run-time tracing logging dynamic deployment allows soaif dramatically reduce time taken implement deliver working processes soaif general-purpose infrastructure platform lets developers business analysts create deploy manage change processes within across enterprise soaifs unique requirements tools infrastructure levels typically provided single current technology platform include addressing requirements soaif lets users quickly respond changes integrate operations efficiently regardless platform language database application enterprise processes usually distributed across multiple applications hardware/software systems processes also event-based sense subprocesses linked series events example depletion inventory manufacturer may lead event-trigger automatically generated propagated one suppliers replenish depleted inventory items current bpm solutions control processes centralized hub changes applications additions new applications require modifications centralized hub data exchanged applications needs traverse central hub type topology restriction inefficient inflexible leads bottlenecks overcome limitation framework tries integrate enterprise processes needs fully distributed across network within enterprise framework must also symmetric implies event-based infrastructure software tools need run machines within enterprise support data exchange messaging existing enterprise standards becomes essential soaif since content needs exchanged partners xml messages documents desired format since businesses want leverage existing infrastructures soaif needs easily support multiple standards soaif able offer high degree reliability platform support broad range processes span increasing number applications corporations partners eliminate single points failure maximize performance fully distributed architecture becomes essential soaif needs fully distributed maximum performance scalability distributed computing environment becomes necessary restrict scope interactions partners conduct corporate infrastructure becomes necessary allow customization interactions partner providing different security roles per-user per-service basis requires security model incorporates users web services general enterprise services ’ fully distributed fault-tolerant soaif infrastructure security model needs based existing standards tools support certificate authentication user services level soaif needs provide single dashboard visibility organization ’ entire distributed computing environment platform incorporate visual implementation-process-composition tools together infrastructure-level support instantly deploy modeled implementation-level processes across distributed enterprise network visual composition tools need service-oriented sense able directly manipulate higher-level coarse-grained implementation processes first-class objects also provide visual display programming constructs able map directly naturally deployable processes critical problem deploying distributed systems monitoring debugging concurrently running processes soaif provide native support tracing logging monitoring process service across distributed environment another challenge responding changing requirements soaif provide support incremental on-the-fly modification service-based flows implement processes among critical features expected soaif since lets analysts visually change instantly redeploy processes address dynamic requirements changes implemented within soaif abstracting concepts relating lower-level middleware tools applications levels users simply specify service replaced another running service often another machine soaif dynamically reroutes data new service setting new underlying middleware constructs topics queues example on-the-fly allows implementation changed without stopping current process much way hardware upgraded mainframe system without interruption operations essential elements soaif include design-time run-time infrastructure together service-oriented tools deploying distributed processes implementation flows core infrastructure soaif typically provided enterprise service bus esb addresses challenges composing deploying managing distributed service-based enterprise applications esb incorporates standards-based enterprise-class messaging backbone together enhanced systems connectivity using web services java ee .net framework standards one approach contributes optimal soa implementation use enterprise service bus esb provide infrastructural element distributed services network esb approach integration considers systems discrete distributed services connect via asynchronous message-oriented communications infrastructure message-oriented infrastructure allows loosely coupled document-oriented exchanges independent systems esbs provides critical infrastructure components simplify scale integration approaches esbs however provide required integration meet high-level business requirements esbs also provide guarantees loose coupling coarse granularity meet evolving service-oriented needs implementing esbs meet soa requirements require addition extra functionality compose fine-grained atomic services coarse-grained business services provide policy-driven managed secure service interactions esb links individual enterprises together extended process efficiency across supply chain allowing become flexible adaptable rapidly changing requirements esb lets enterprise leverage previous investments supporting deployment processes existing software hardware infrastructure core underlying infrastructure soaif esbs offer several unique business technical advantages business process management bpm considers systems assets activities tasks participate well-coordinated centrally orchestrated business processes traditionally challenge bpm possible construct processes achieve integration goals enterprises typically use bpm tools design time modeling processes used processes rarely processes actually environment bpm solutions craft orchestrated processes composed fine-grained services ’ contain runtime environment necessary loosely coupled asynchronous service interactions least bpm solution must used conjunction loosely coupled integration approach make business processes runtime activities coordinate integration thus bpm solutions sufficient meet soa requirements service-oriented integration soi approach uses architectural guiding principles services orientation construct ecosystem services business users dynamically combine compose higher-level processes meet continuously evolving changing business requirements soi approaches transcend brittle tightly coupled eai business-to-business integration approaches mandating separation consumer service producer service thus enforcing critical aspect loose coupling required allow integration scenario evolve automatically meet business requirements soi provides guidance build right services meet current business requirements provide means execute services effective scalable manner guarantee long-running interactions esbs implement standardized interfaces communication connectivity transformation security portability supported standards include modern esb implementations typically support development multiple languages combined inherently portable esb infrastructure makes esb true multi-language multiplatform enterprise backbone ideal foundation soaif several modern esbs implement symmetric distributed architecture peer-messaging servers run multiple nodes enterprise network providing highly scalable reliable distributed messaging platform single point failure modern esb architectures combine benefits centralized control distributed parallel data flow giving application developers ultimate flexibility defining network topology choice route data directly optimally services ensuring data flowing services always traverse central point network optimizes peer-to-peer network performance instance one process requires data exchanges new york boston well san francisco los angeles two flows data ’ necessarily traverse messaging hub located chicago often case enterprise cross-enterprise deployments instead efficiency dictates setting direct data flow connections peer nodes network service-oriented tools enable composition distributed applications one services web services general enterprise services typically runs separate process services may written language communicate via xml messages allows service-oriented tools within soaif compose flexible easy-to-modify systems service-oriented processes deployed soaif composed coarse-grained web services ideally suited easy change replacement abstracting details message routing service implementations service-oriented tools decouple enable running processes modified on-the-fly simple service replacement addition tools framework within soaif supports run-time deployment services allowing changed processes deployed instantly across network experience significantly reduces solution deployment costs compared traditional broker-based solutions esb defines comprehensive security system giving administrators full control services executed esbs provide ability set several security attributes service provide administrative tools configure security settings distributed esb infrastructure across network esbs include native service-level support run-time monitoring tracing logging services monitored instantly using visual tools within soaif trace levels dynamically changed within existing services running across network debug logs routed software tools node features greatly simplify development deployment debugging distributed applications running across soaif
[ 2501, 9285, 4107, 9677, 3573, 3413, 502, 8597, 7802, 6651, 5373 ]
Test
7,754
2
Security_Account_Manager:security account manager security account manager sam often security accounts manager database file windows xp windows vista windows 7 8.1 10 stores users passwords used authenticate local remote users beginning windows 2000 sp4 active directory authenticates remote users sam uses cryptographic measures prevent unauthenticated users accessing system user passwords stored hashed format registry hive either lm hash ntlm hash file found codice_1 mounted codice_2 attempt improve security sam database offline software cracking microsoft introduced syskey function windows nt 4.0 syskey enabled on-disk copy sam file partially encrypted password hash values local accounts stored sam encrypted key usually also referred syskey enabled running codice_3 program since hash function one-way provides measure security storage passwords case online attacks possible simply copy sam file another location sam file moved copied windows running since windows kernel obtains keeps exclusive filesystem lock sam file release lock operating system shut blue screen death exception thrown however in-memory copy contents sam dumped using various techniques including pwdump making password hashes available offline brute-force attack lm hash compromised protocol replaced ntlm hash versions windows configured disable creation storage valid lm hashes user changes password windows vista later versions windows disable lm hash default note enabling setting immediately clear lm hash values sam rather enables additional check password change operations instead store dummy value location sam database lm hash otherwise stored dummy value relationship user password value used user accounts windows nt 3.51 nt 4.0 2000 attack devised bypass local authentication system sam file deleted hard drive e.g mounting windows os volume alternate operating system attacker could log account password flaw corrected windows xp shows error message shuts computer however exist software utilities aforementioned methodology using either emulated virtual drive boot disk usually unix/linux another copy windows like windows preinstallation environment based environment mount local drive housing active ntfs partition using programmed software routines function calls within assigned memory stacks isolate sam file windows nt system installation directory structure default codice_1 depending particular software utility used removes password hashes stored user accounts entirety cases modify user account passwords directly environment software highly pragmatic beneficial use password clearing account recovering utility individuals lost forgotten windows account passwords well possible use malicious software security bypassing utility essentially granting user enough ability experience familiarity cracking utility software security routines windows nt kernel well offline immediate local access target computer capability entirely bypass remove windows account passwords potential target computer recently microsoft released utility called locksmith part msdart msdart freely available end-users however
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 1671, 8841, 6797, 2193, 9874, 1...
Test
7,755
2
IA-32_Execution_Layer:ia-32 execution layer ia-32 execution layer ia-32 el software emulator form software driver improves performance 32-bit applications running 64-bit intel itanium-based systems particularly running linux windows server 2003 included windows 2003 sp1 later linux distributions itanium ia-32 el bypasses slow x86 hardware emulation available pre-montecito itanium models ia-32 el used two-phase later three-phase approach initially quickly translated every piece code basic block level adding certain instrumentation detecting hot code hot code dynamically optimized super-block level optimized translated code replaced cold code fly later interpretation engine added allowed avoid altogether translation code executed times cold non-optimized translation became thus second phase hot optimized translation became third phase ia-32 execution layer supported self-modified code could even optimize quite well part software lgpl part intel proprietary license
[ 704, 7941, 9959, 6730, 8315, 4622, 7983, 499, 1972, 5523, 7134, 823, 8795, 6971, 1085, 3294, 6911 ]
None
7,756
9
List_of_abstractions_(computer_science):list abstractions computer science list contains abstractions used computer programming
[ 655, 10737, 10581, 2901, 3767, 11674, 2780 ]
None
7,757
5
NISO_Circulation_Interchange_Protocol:niso circulation interchange protocol niso circulation interchange protocol ncip protocol limited exchange messages among computer-based applications enable perform functions necessary lend borrow items provide controlled access electronic resources facilitate cooperative management functions released may 2001 approved october 17 2002 ansi/niso z39.83-2002 ncip niso draft standard trial use protocol defines repertoire messages associated rules syntax semantics use applications perform functions necessary lend items provide controlled access electronic resources facilitate co-operative management functions intended address conditions application applications initiate lending items control access must acquire transmit information user items and/or access essential successful conclusion function
[]
Validation
7,758
3
Woody_Poco:woody poco player controls old wooden figure named poco hero lived harmony humans many years poco journey find fairy teaches people get back friendly wooden dolls enemies encountered game strange creatures bothersome old men player attacks using fists players steal items store stealing player appearance changed resemble thief hotels pawn shops longer admit player remainder game theft taken place player equip one hand weapon passive tool lamp dark areas player buy gear sleep hotels gamble steal bribe non-player characters player needs eat prevent hunger recharging health based food level features in-game clock day/night cycles four seasons color changes reflect time day season
[ 10931, 9006 ]
None
7,759
4
Keith_B._Alexander:keith b. alexander keith brian alexander born december 2 1951 retired four-star general united states army served director national security agency dirnsa chief central security service chcss commander united states cyber command previously served deputy chief staff g-2 united states army 2003 2005 assumed positions director national security agency chief central security service august 1 2005 additional duties commander united states cyber command may 21 2010 alexander announced retirement october 16 2013 retirement date march 28 2014 may 2014 alexander founded ironnet cybersecurity private-sector cybersecurity firm based fulton maryland alexander born december 2 1951 syracuse new york son charlotte l. colvin donald henry alexander raised onondaga hill new york suburb syracuse paperboy post-standard attended westhill senior high school ran track alexander attended united states military academy west point class three future four-star generals david petraeus martin dempsey walter l. sharp graduation april 1974 alexander married deborah lynn douglas classmate high school grew near family onondaga hill four daughters alexander entered active duty west point intending serve five years alexander military education includes armor officer basic course military intelligence officer advanced course united states army command general staff college national war college alexander worked signals intelligence number secret national security agency bases united states germany earned master science business administration 1978 boston university master science systems technology electronic warfare master science physics 1983 naval postgraduate school master science national security strategy national defense university rose quickly military ranks due expertise advanced technology competency administration alexander assignments include deputy chief staff dcs g-2 headquarters department army washington d.c. 2003 2005 commanding general united states army intelligence security command fort belvoir virginia 2001 2003 director intelligence j-2 united states central command macdill air force base florida 1998 2001 deputy director intelligence j-2 joint chiefs staff 1997 1998 alexander served variety command assignments germany united states include tours commander border field office 511th mi battalion 66th mi group 336th army security agency company 525th mi group 204th mi battalion 525th military intelligence brigade additionally alexander held key staff assignments deputy director operations officer executive officer 522nd mi battalion 2nd armored division g-2 1st armored division germany gulf war operation desert shield operation desert storm saudi arabia also served afghanistan peace keeping mission army deputy chief staff intelligence alexander headed army intelligence security command 2001 charge 10,700 spies eavesdroppers worldwide words james bamford wrote biography wired alexander rest american intelligence community suffered devastating defeat surprised attacks 9/11 alexander reaction order intercept operators begin monitor email phone calls american citizens unrelated terrorist threats including personal calls journalists 2003 alexander named deputy chief staff intelligence united states army 205th mi brigade involved abu ghraib torture prisoner abuse baghdad iraq part v corps us alexander command testifying senate armed services committee alexander called abuse totally reprehensible described perpetrators group undisciplined mp soldiers mary louise kelly interviewed later npr said outside chain command oversaw interrogations iraq alexander able survive reputation intact 2004 along alberto gonzales others george w. bush administration alexander presented memorandum sought justify treatment deemed unlawful enemy combatants june 2013 national security agency revealed whistle-blower edward snowden secretly spying american people fisa-approved surveillance programs prism xkeyscore october 16 2013 publicly announced alexander deputy chris inglis leaving nsa april 13 2016 president obama announced alexander member commission enhancing national cybersecurity alexander became three-star general 2005 donald rumsfeld secretary defense named director national security agency according bamford alexander deceived house intelligence committee agency involved nsa warrantless wiretapping also period alexander oversaw implementation real time regional gateway iraq nsa data collection program consisted gathering electronic communication storing searching otherwise analyzing former senior u.s. intelligence agent described alexander program rather look single needle haystack approach 'let collect whole haystack collect tag store ... whatever want go searching 2008 regional gateway effective providing information iraqi insurgents eluded less comprehensive techniques collect strategy introduced keith alexander believed glenn greenwald guardian model comprehensive world-wide mass archiving communications nsa become engaged 2013 according siobhan gorman wall street journal government official stated alexander offered resign 2013 global surveillance disclosures first broke june 2013 obama administration asked alexander confirmed united states senate appointment rank general may 7 2010 officially promoted rank ceremony may 21 2010 alexander assumed command united states cyber command ceremony made four-star general alexander delivered keynote address black hat usa july 2013 organizers describe alexander advocate battlefield visualization 'data fusion useful intelligence provided quote alexander gave comprehensive interview career spanned 17,000 words 8 may 2014 australian financial review journalist christopher joye subsequently cited edward snowden full transcript covers nsa operations snowden metadata debates encryption controversies chinese russian spying published online snowden alexander told joye suspect russian intelligence driving understand well 're going let things benefit russia stand help improve snowden credibility wired magazine said afr interview alexander showed defending stock-piling zero-days wall street journal media focused alexander claims snowden working russian intelligence july 2012 response question jeff moss founder def con hacker convention ... nsa really keep file everyone alexander replied n't absolutely anybody would tell 're keeping files dossiers american people knows true march 2012 response questions representative hank johnson united states congress hearing allegations made former nsa officials nsa engages collection voice digital information u.s. citizens alexander said despite allegations james bashford wired magazine nsa collect data july 9 2012 asked member press large data center utah used store data american citizens alexander stated ca n't go details utah data center n't hold data u.s citizens def con 2012 alexander keynote speaker question answers session response question nsa really keep file everyone see mine alexander replied job foreign intelligence would want weave story millions hundreds millions dossiers people absolutely false ... perspective absolute nonsense june 6 2013 day snowden revelations then-director national intelligence james clapper released statement admitting nsa collects telephony metadata millions americans telephone calls metadata information included originating terminating telephone number telephone calling card number imei number time duration phone calls andy greenberg forbes said nsa officials including alexander years 2012 2013 publicly denied—often carefully hedged words—participating kind snooping americans since become nearly undeniable september 2013 alexander asked senator mark udall goal nsa collect phone records americans alexander replied alexander announced retirement october 16 2013 retirement date march 28 2014 replacement u.s. navy vice admiral michael s. rogers may 2014 retirement nsa alexander founded ironnet cybersecurity ironnet provides cybersecurity coverage private-sector companies using irondefense program team cybersecurity analysts experts company headquartered fulton maryland offices frederick maryland mclean virginia new york city october 2015 ironnet received 32.5 million funding trident capital cybersecurity forgepoint capital kleiner perkins caufield byers series investment may 2018 ironnet raised additional 78 million round led c5 capital alongside existing investors forgepoint capital kleiner perkins caufield byers alexander maintains role ceo ironnet today alexander inducted nps hall fame 2013 fall 2014 alexander told public forum someone else claimed 9,000 irs refund name thieves used identity apply 20 credit cards
[ 6017, 3843, 1930, 766, 1169, 9233, 8726, 1189, 3495, 9517, 1838, 1330, 10935, 5308, 10305, 1986, 6343, 6344, 11335, 4813, 7119, 7887, 3154, 8276, 7893, 4566, 9688, 991, 7137, 2275, 3305, 7145, 2419, 6005, 6136, 2558 ]
Test
7,760
2
Win32_Thread_Information_Block:win32 thread information block computing win32 thread information block tib data structure win32 x86 stores information currently running thread structure also known thread environment block teb tib officially undocumented windows 9x windows nt series ddk includes struct nt_tib winnt.h documents subsystem independent part wine includes header declarations extended subsystem-specific part tib yet many win32 programs use undocumented fields effectively part api first field particular directly referenced code produced microsoft compiler tib used get lot information process without calling win32 api examples include emulating getlasterror getversion pointer peb one obtain access import tables iat process startup arguments image name etc accessed fs segment register operating 32 bits gs 64 bits fs 32-bit gs 64-bit maps tib embedded data block known tdb thread data base tib contains thread-specific exception handling chain pointer tls thread local storage thread local storage c local storage tib current thread accessed offset segment register fs x86 gs x64 common access tib fields offset fs 0 rather first getting linear self-referencing pointer stored fs 0x18 pointer used pointer arithmetics cast struct pointer example c inlined-assembly 32-bit x86
[ 1632, 3235, 5040, 499, 6868, 3990, 9911, 5176, 6751 ]
Test
7,761
5
Bitflu:bitflu bitflu open-source bittorrent client adrian ulrich available unix-like systems written perl bitflu received good reviews open-source software sites blogs praising lightweight feature-complete even bitflu seems largely unknown reportedly commanding 0.000025 total bittorrent traffic according one reviewer could due non-automated relatively elaborated install procedure could putting majority users ca n't anything complicated click-next-until-finish install
[ 4229, 8582, 4490, 5397, 11029, 11413, 10522, 3366, 10924, 7983, 3770, 708, 3792, 3676, 5085, 3428, 3813, 7921, 10995, 5749 ]
Validation
7,762
4
Polyinstantiation:polyinstantiation polyinstantiation computer science concept type class database row otherwise instantiated multiple independent instances objects copies may also indicate case database polyinstantiation two different instances name identifier primary key operating system security polyinstantiation concept creating user process specific view shared resource i.e process affect process b writing malicious code shared resource unix directory /tmp polyinstantiation shared resources similar goals process isolation application virtual memory processes assigned isolated virtual address space prevent process writing memory space process b databases polyinstantiation database-related sql structured query language terminology allows relation contain multiple rows primary key multiple instances distinguished security levels occurs mandatory policy depending security level established one record contains sensitive information one user see record information depending his/her level confidentiality previously dictated company policy consider following table primary key name λ x security level although useful security standpoint polyinstantiation raises several problems cryptography polyinstantiation existence cryptographic key one secure physical location
[ 6087, 4075, 10413, 7983, 11539, 2901 ]
Test
7,763
4
Spam_Reader:spam reader spam reader free anti-spam add-on microsoft outlook produced shareware license program uses content filtering based bayesian spam filtering algorithm whitelist blacklist techniques additional spam signs like embedded images internet attached executed files junk text program supports pop3 imap http microsoft exchange microsoft exchange program works default mailbox also http mailboxes limited supported outlook program add-on automatically integrates outlook workspace white list program uses white list technology guarantees messages user regular correspondents blocked spam even contents look like spam white list may include names addresses entire domains list automatically created first program execution scanning user address book contacts folder saved sent messages program automatically updates white list adding information recipients outgoing messages black list program contains contacts email addresses receive spam unwanted messages spam reader consider message sender list spam black list items may names email addresses entire domains contain wildcards safe recipients list list contains email address user ca n't receive spam messages sent addresses always treated legitimate messages bayesian spam filter spam filtering based bayesian approach using algorithm program determines score corresponding probability particular message spam score used decide whether message spam regular updates self-training option make filtering algorithm flexible custom filter adjust filtering rules user personal needs possible define custom spam not-spam dictionaries message contains word phrase spam dictionary considered spam messages containing word phrases not-spam dictionary directed inbox without anti-spam filtering program uses special algorithm interaction microsoft outlook rules algorithm allows user set order executing outlook rules spam reader prevents chaotic movement spam messages spam folder destination folder outlook rule case spam messages match rule
[ 8747, 6797, 7983 ]
None
7,764
4
Anti-Spam_SMTP_Proxy:anti-spam smtp proxy anti-spam smtp proxy assp open-source perl based platform-independent transparent smtp proxy server assp features
[ 5249, 5253, 8582, 3988, 10906, 8224, 10276, 6313, 8747, 1837, 4398, 7983, 4272, 9014, 4294, 10696, 11610, 6492, 7518, 11492, 2281, 6762, 5612, 8941, 3837 ]
Test
7,765
5
MMS_Architecture:mms architecture mms architecture set standards used multimedia messaging service mobile networks standards prepared 3gpp standard consists number interfaces components found mobile network mm1 interface mobile station ms mmsc mm1 used following actions mm1 interface based wap protocol includes pap notifications transformed sms wap gateway notifications mm2 interface mms relay mms-r mms storage database two components mmsc platform mm3 interface mmsc external servers email server sms centers smsc interface typically uses tcp/ip based protocols e.g simple mail transfer protocol smtp generally responsibility mmsc transformation mms multi-part binary data mime format email direction mm3 used following actions mm4 interface used exchange messages two different mmscs mmscs generally located two distinct mobile networks interface also known mms interface wireless application protocol wap open mobile alliance oma standards mm5 interface mmsc network elements like hlr domain name server communication mm5 interface generally fetch routing information mm5 defined 3gpp ts 23.140 simple reference mobile application part mm7 interface mmsc value-added service provider vasp mm7 interface used send mms 3rd party providers e.g. bank sending statement advertiser sending publicity based soap attachments using http transport protocol http request shall post message mime encapsulates soap envelope encoded attachments soap envelope xml tags mm7 protocol data mm11 specified oma sti standard transcoding interface 1.0 mm11 designed ensure compatibility transcoders mmscs integration transcoder without using mm11 possible implementing transcoder proxy server placing transcoder mm1 interface user equipment mmsc messages transparently transcoded possible disadvantage implementation transcoders typically licensed transactions per second transactions sent transcoder rather marked allow adaptations
[ 5704, 5875, 10486, 479 ]
Train
7,766
9
David_H._Munro:david h. munro david herbert munro born april 29 1955 oakland california physicist lawrence livermore national laboratory llnl created programming language yorick well scientific graphics library gist munro earned b.s caltech 1976 ph.d. massachusetts institute technology 1980 joined llnl 1980 primarily focused research laser fusion received excellence plasma physics award american physical society 1995
[ 8262, 2135 ]
Validation
7,767
1
Column-oriented_DBMS:column-oriented dbms column-oriented dbms columnar database management system database management system dbms stores data tables column rather row practical use column store versus row store differs little relational dbms world columnar row databases use traditional database query languages like sql load data perform queries row columnar databases become backbone system serve data common extract transform load etl data visualization tools however storing data columns rather rows database precisely access data needs answer query rather scanning discarding unwanted data rows query performance increased certain workloads relational database management system provides data represents two-dimensional table columns rows example database might table simple table includes employee identifier empid name fields lastname firstname salary salary two-dimensional format abstraction actual implementation storage hardware requires data serialized one form another expensive operations involving hard disks seeks order improve overall performance related data stored fashion minimize number seeks known locality reference basic concept appears number different contexts hard disks organized series blocks fixed size typically enough store several rows table organizing table data rows fit within blocks grouping related rows onto sequential blocks number blocks need read sought minimized many cases along number seeks survey pinnecke et al covers techniques column-/row hybridization 2017 common method storing table serialize row data like data inserted table assigned internal id codice_1 used internally system refer data case records sequential codice_1s independent user-assigned codice_3 example dbms uses short integers store codice_1s practice larger numbers 64-bit 128-bit normally used row-based systems designed efficiently return data entire row record operations possible matches common use-case system attempting retrieve information particular object say contact information user rolodex system product information online shopping system storing record data single block disk along related records system quickly retrieve records minimum disk operations row-based systems efficient performing set-wide operations whole table opposed small number specific records instance order find records example table salaries 40,000 50,000 dbms would fully scan entire table looking matching records example table shown likely fit single disk block table even hundred rows would multiple disk operations would needed retrieve data examine improve performance sorts operations common generally point using dbms dbmss support use database indexes store values set columns along codice_1 pointers back original table index salary column would look something like store single pieces data rather entire rows indexes generally much smaller main table stores scanning smaller set data reduces number disk operations index heavily used dramatically reduce time common operations however maintaining indexes adds overhead system especially new data written database records need stored main table attached indexes updated well main reason indexes dramatically improve performance large datasets database indexes one columns typically sorted value makes range queries operations like find records salaries 40,000 50,000 example fast lower time-complexity number row-oriented databases designed fit entirely ram in-memory database systems depend disk operations equal-time access entire dataset reduces need indexes requires amount operations fully scan original data complete index typical aggregation purposes systems may therefore simpler smaller manage databases fit memory column-oriented database serializes values column together values next column example table data would stored fashion layout one columns closely matches structure index row-based system may cause confusion lead mistaken belief column-oriented store really row-store index every column however mapping data differs dramatically row-oriented indexed system primary key rowid mapped indexed data column-oriented system primary key data mapped rowids may seem subtle difference seen common modification store whether column-oriented system efficient operation depends heavily workload automated operations retrieve data given object entire row slower row-based system retrieve row single disk read whereas numerous disk operations collect data multiple columns required columnar database however whole-row operations generally rare majority cases limited subset data retrieved rolodex application instance collecting first last names many rows build list contacts far common reading data single address even true writing data database especially data tends sparse many optional columns reason column stores demonstrated excellent real-world performance spite many theoretical disadvantages partitioning indexing caching views olap cubes transactional systems write-ahead logging multiversion concurrency control dramatically affect physical organization either system said online transaction processing oltp -focused rdbms systems row-oriented online analytical processing olap -focused systems balance row-oriented column-oriented comparisons row-oriented column-oriented databases typically concerned efficiency hard-disk access given workload seek time incredibly long compared bottlenecks computers example typical serial ata sata hard drive average seek time 16 22 milliseconds dram access intel core i7 processor takes average 60 nanoseconds nearly 400,000 times fast clearly disk access major bottleneck handling big data columnar databases boost performance reducing amount data needs read disk efficiently compressing similar columnar data reading data necessary answer query practice columnar databases well-suited olap-like workloads e.g. data warehouses typically involve highly complex queries data possibly petabytes however work must done write data columnar database transactions inserts must separated columns compressed stored making less suited oltp workloads row-oriented databases well-suited oltp-like workloads heavily loaded interactive transactions example retrieving data single row efficient data located single location minimizing disk seeks row-oriented architectures however column-oriented systems developed hybrids capable oltp olap operations oltp constraints column-oriented systems face mediated using amongst qualities in-memory data storage column-oriented systems suitable olap oltp roles effectively reduce total data footprint removing need separate systems column data uniform type therefore opportunities storage size optimizations available column-oriented data available row-oriented data example many popular modern compression schemes lzw run-length encoding make use similarity adjacent data compress missing values repeated values common clinical data represented two-bit marker techniques may used row-oriented data typical implementation achieve less effective results improve compression sorting rows also help example using bitmap indexes sorting improve compression order magnitude maximize compression benefits lexicographical order respect run-length encoding best use low-cardinality columns first sort keys example given table columns sex age name would best sort first value sex cardinality two age cardinality 150 name columnar compression achieves reduction disk space expense efficiency retrieval greater adjacent compression achieved difficult random-access may become data might need uncompressed read therefore column-oriented architectures sometimes enriched additional mechanisms aimed minimizing need access compressed data column stores transposed files implemented early days dbms development taxir first application column-oriented database storage system focus information-retrieval biology 1969 clinical data patient records many attributes could analyzed processed 1975 time-oriented database system tods statistics canada implemented rapid system 1976 used processing retrieval canadian census population housing well several statistical applications rapid shared statistical organizations throughout world used widely 1980s continued used statistics canada 1990s another column-oriented database scss later column-oriented database packages included since 2004 additional open source commercial implementations monetdb released open-source license september 30 2004 followed closely defunct c-store c-store university project eventually team member michael stonebraker staying led vertica co-founded 2005 monetdb-related x100 project evolved vectorwise druid column-oriented data store open-sourced late 2012 used numerous organizations
[ 5632, 3, 8201, 2068, 1049, 5658, 7710, 5151, 10286, 10294, 4155, 11324, 9286, 10326, 4696, 8291, 9828, 10340, 2669, 2163, 1142, 1146, 3196, 2688, 3219, 10389, 1178, 1697, 5794, 9893, 4263, 4781, 10413, 9397, 7868, 11457, 5320, 4811, 2780, ...
Test
7,768
9
SIM.JS:sim.js sim.js event-based discrete-event simulation library based standard javascript library written order enable simulation within standard browsers utilizing web technology sim.js supports entities resources facility buffers stores communication via timers events messages statistics data series time series population statistics sim.js distribution contains tutorials in-depth documentation large number examples sim.js released open source software lgpl license first version released january 2011 several examples bundled library download trafficlight simulation standard simulation problem may simulated within example
[ 5612, 3462, 7983 ]
None
7,769
9
Pure_Data:pure data pure data pd visual programming language developed miller puckette 1990s creating interactive computer music multimedia works puckette main author program pd open-source project large developer base working new extensions released license similar bsd license runs gnu/linux ios android windows ports exist freebsd irix pd similar scope design puckette original max program developed ircam degree interoperable max/msp commercial predecessor max language may collectively discussed members patcher family languages addition graphics environment multimedia gem external externals designed work like pure data packet pidip linux framestein windows gridflow n-dimensional matrix processing linux windows possible create manipulate video opengl graphics images etc. realtime extensive possibilities interactivity audio external sensors etc pd natively designed enable live collaboration across networks internet allowing musicians connected via lan even disparate parts globe create music together real time pd uses fudi networking protocol pure data max examples dataflow programming languages languages functions objects linked patched together graphical environment models flow control audio unlike original version max however pd always designed control-rate audio processing host central processing unit cpu rather offloading sound synthesis signal processing digital signal processor dsp board ariel ispw used max/fts pd code forms basis david zicarelli msp extensions max language software audio processing like max pd modular code base externals objects used building blocks programs written software makes program arbitrarily extensible public api encourages developers add control audio routines c programming language help externals python scheme lua tcl many others however pd also programming language modular reusable units code written natively pd called patches abstractions used standalone programs freely shared among pd user community programming skill required use pd effectively like max pd dataflow programming language dsp software two primary rates data passed sample audio rate usually 44,100 samples per second control rate 1 block per 64 samples control messages audio signals generally flow top screen bottom objects connected via inlets outlets pd supports four basic types text entities messages objects atoms comments atoms basic unit data pd consist either float symbol pointer data structure pd numbers stored 32-bit floats messages composed one atoms provide instructions objects special type message null content called bang used initiate events push data flow much like pushing button pd native objects range basic mathematical logical bitwise operators found every programming language general specialized audio-rate dsp functions designated tilde symbol wavetable oscillators fast fourier transform fft~ range standard filters data loaded file read audio board midi via open sound control osc firewire usb network connection generated fly stored tables read back used audio signals control data one key innovations pd predecessors introduction graphical data structures used large variety ways composing musical scores sequencing events creating visuals accompany pd patches even extending pd gui living pd name data structures enable pd users create arbitrarily complex static well dynamic animated graphical representations musical data much like c structs pd structs composed combination floats symbols array data used parameters describe visual appearance data structure conversely control messages audio signals pd patch puckette words though powerful language pd certain limitations implementation object-oriented concepts example difficult create massively parallel processes instantiating manipulating large lists objects spawning etc impossible due lack constructor function pd arrays entities susceptible namespace collisions passing patch instance id extra step sometimes difficult accomplish pure data used basis number projects prototyping language sound engine table interface called reactable abandoned iphone app rjdj embed pd sound engine pd used prototyping audio video games number audio designers example eapd internal version pd used electronic arts ea also embedded ea spore pd also used networked performance networked resources collaborative improvisation nrci library
[ 9345, 2691, 7172, 8958, 7571, 6933, 6810, 4777, 5037, 7983, 7347, 692, 823, 9783, 4417, 3910, 3665, 7128, 9565, 10083, 3046, 9320, 8554, 2667, 5612, 7535, 1776, 8051, 9210, 2045, 7550 ]
Test
7,770
3
Register_window:register window computer engineering register windows feature instruction set architectures improve performance procedure calls common operation register windows one main features berkeley risc design would later commercialized amd am29000 intel i960 sun microsystems sparc intel itanium cpu designs include small amount high-speed memory known registers registers used cpu order hold temporary values working longer strings instructions considerable performance added design registers however since registers visible piece cpu instruction set number typically changed design released registers almost universal solution performance drawback different parts computer program use temporary values therefore compete use registers since good understanding nature program flow runtime difficult easy way developer know advance many registers use many leave aside parts program general sorts considerations ignored developers likely compilers use attempt use registers visible case processors registers begin also reasonable course action register windows aim solve issue since every part program wants registers use several sets registers provided different parts program registers visible would registers compete i.e made invisible rendering registers invisible implemented efficiently cpu recognizes movement one part program another procedure call accomplished one small number instructions prologue ends one similarly small set epilogue berkeley design calls would cause new set registers swapped point marked dead reusable call ends berkeley risc design eight registers total 64 visible programs complete set registers known register file particular set eight window file allows eight procedure calls register sets long program call chains longer eight calls deep registers never spilled i.e saved main memory cache slow process compared register access comparison sun microsystems sparc architecture provides simultaneous visibility four sets eight registers three sets eight registers windowed eight registers i0 i7 form input registers current procedure level eight registers l0 l7 local current procedure level eight registers o0 o7 outputs current procedure level next level called procedure called register window shifts sixteen registers hiding old input registers old local registers making old output registers new input registers common registers old output registers new input registers used parameter passing finally eight registers g0 g7 globally visible procedure levels amd 29000 improved design allowing windows variable size helps utilization common case fewer eight registers needed call also separated registers global set 64 additional 128 windows similarly ia-64 itanium architecture used variable-sized windows 32 global registers 96 windows register windows also provide easy upgrade path since additional registers invisible programs additional windows added time instance use object-oriented programming often results greater number smaller calls accommodated increasing windows eight sixteen instance approach used sparc included register windows newer generations architecture end result fewer slow register window spill fill operations register windows overflow less often register windows way improve register performance group stanford university designing mips saw berkeley work decided problem shortage registers poor utilization existing ones instead invested time compiler register allocation making sure wisely used larger set available mips resulted reduced complexity chip one half total number registers offering potentially higher performance cases single procedure could make use larger visible register space end modern compilers mips makes better use register space even procedure calls
[ 1798, 1952, 10669, 7471, 4144, 9391, 9911, 9665, 9547, 4172, 7134, 8671, 3175, 3431, 5358, 1776, 11636, 757, 1399, 3451 ]
None
7,771
9
DataFlex:dataflex dataflex formerly known visual dataflex visual tool developing windows web mobile software applications one framework-based platform dataflex produced data access worldwide located miami company founded 1976 called data access corporation product available least 1982 started relatively early example fully fledged commercially used fourth-generation programming language 4gl early forms dataflex available cp/m ms-dos turbodos novell netware os/2 unix vax/vms ibm aix operating systems dataflex lasted many years niche application development environment dataflex product supports many database environments oracle database microsoft sql server ibm db2 mysql postgresql pervasive psql well odbc database dataflex applications used around 3 million users july 2017 version 19.0 dataflex language differentiates programming languages following ways dataflex programming language used following development environments
[ 3426, 8584, 2345, 4042, 8393, 6797, 7022, 847, 7983, 9166, 5875, 5492, 10899, 11030, 823, 4409, 8539 ]
None
7,772
3
TI-89_series:ti-89 series ti-89 ti-89 titanium graphing calculators developed texas instruments ti differentiated ti graphing calculators computer algebra system allows symbolic manipulation algebraic expressions—equations solved terms variables whereas ti-83/84 series give numeric result ti-89 graphing calculator developed texas instruments 1998 unit features 160×100 pixel resolution lcd screen large amount flash memory includes ti advanced mathematics software ti-89 one highest model lines ti calculator products along ti-nspire summer 2004 standard ti-89 replaced ti-89 titanium ti-89 runs 16-bit microprocessor motorola 68000 nominally runs 10 12 mhz depending calculator hardware version texas instruments allocated 256 total kb ram unit 190 kb available user 2 mb flash memory 700 kb available user ram flash rom used store expressions variables programs tables text files lists ti-89 essentially ti-92 plus limited keyboard smaller screen created partially response fact calculators allowed many standardized tests ti-92 considered computer due qwerty layout keyboard additionally people found ti-92 unwieldy overly large ti-89 significantly smaller—about size graphing calculators flash rom feature present ti-92 plus original ti-92 major advantage ti-89 lower-model ti calculators built-in computer algebra system cas calculator evaluate simplify algebraic expressions symbolically example entering codice_1 returns formula_1 answer prettyprinted default displayed would written hand e.g aforementioned formula_1 rather codice_1 ti-89 abilities include addition standard two-dimensional function plots also produce graphs parametric equations polar equations sequence plots differential equation fields three-dimensional two independent variable functions ti-89 directly programmable language called ti-basic ti derivative basic calculators use pc also possible develop complex programs motorola 68000 assembly language c translate machine language copy calculator two software development kits c programming available one ti flash studio official ti sdk tigcc third-party sdk based gcc since ti-89 release 1998 thousands programs math science entertainment developed many available games generic clones tetris minesweeper classic games programs advanced example zx spectrum emulator chess-playing program symbolic circuit simulator clone link awakening one popular well-known games phoenix many calculator games useful programs found ti-program sharing sites ticalc.org major one offers thousands calculator programs four hardware versions ti-89 versions normally referred hw1 hw2 hw3 hw4 released may 2006 entering key sequence f1 displays hardware version older os versions 2.00 n't display anything hardware version unless calculator hw2 later differences hardware versions well documented texas instruments hw1 hw2 correspond original ti-89 hw3 hw4 present ti-89 titanium significant difference hw1 hw2 way calculator handles display hw1 calculators video buffer stores information displayed screen every time screen refreshed calculator accesses buffer flushes display direct memory access hw2 later calculators region memory directly aliased display controller memory-mapped i/o allows slightly faster memory access hw1 dma controller used 10 bus bandwidth however interferes trick programs use implement grayscale graphics rapidly switching two displays page-flipping hw1 dma controller base address changed single write memory-mapped hardware register screen automatically use new section memory beginning next frame hw2 new page must written screen software effect cause increased flickering grayscale mode enough make 7-level grayscale supported hw1 unusable although 4-level grayscale works calculators hw2 calculators slightly faster ti increased nominal speed processor 10 mhz 12 mhz believed ti increased speed hw4 calculators 16 mhz though many users disagree finding another difference hw1 hw2 calculators assembly program size limitations size limitation hw2 calculators varied ams version calculator ams 2.09 limit 24k earlier versions limited assembly programs 8k earliest ams versions limit hw1 calculators hardware enforce limits easy bypass software unofficial patches kernels installed hw2 calculators remove limitations ti-89 titanium released summer 2004 largely replaced popular classic ti-89 ti-89 titanium referred hw3 uses corresponding ams 3.x 2006 new calculators upgraded hw4 supposed offer increases ram speeds 16 mhz benchmarks made users reported speeds 12.85–14.1 mhz touted advantages ti-89 titanium original ti-89 include two times flash memory three times much available user ti-89 titanium essentially voyage 200 except n't integrated keyboard ti-89 titanium also usb on-the-go port connectivity ti-89 titanium calculators computer store programs update operating system ti-89 titanium also features pre-loaded applications cellsheet spreadsheet program also offered ti calculators titanium slightly updated cas adds mathematical functions notably implicit differentiation titanium also slightly differing case design ti-89 titanium case design similar ti-84 plus minor compatibility issues c assembly programs developed original ti-89 recompiled work titanium due various small hardware changes though cases problems fixed using utility ghostbuster olivier armand kevin kofler option generally preferred requires knowledge program works without need program source code automated n't require additional computer software cases one character needs changed rom base ti-89 0x200000 whereas ti-89 titanium 0x800000 hand patcher problems caused mirror memory ghost space lack thereof joint council qualifications publish examination instructions behalf main examination boards england wales northern ireland instructions state calculator used examination must designed offer symbolic algebra manipulation symbolic differentiation integration precludes use ti-89 ti-89 titanium examinations may used part classroom study sqa give instructions examinations scotland united states ti-89 allowed college board calculator-permitted tests including sat sat subject tests ap calculus physics chemistry statistics exams however calculator banned use act plan classrooms ti-92 series otherwise comparable features qwerty keyboard results classified computer device rather calculator
[ 1952, 477, 7269, 966, 10855, 797, 9964, 2383, 7983, 6129, 2226, 9463, 2045 ]
Test
7,773
3
The_Duel:_Test_Drive_II:duel test drive ii duel test drive ii racing video game developed distinctive software published accolade amiga amstrad cpc apple iigs commodore 64 ms-dos msx zx spectrum atari st sega genesis snes like original test drive focus duel driving exotic cars dangerous highways evading traffic trying escape police pursuits first game series player simply racing time single scenario test drive ii improves upon predecessor introducing varied scenery giving player option racing clock competing computer-controlled opponent player initially given opportunity choose car drive level difficulty turn determines whether car use automatic manual transmission—the number difficulty options varies gaming platforms levels begin player car computer opponent selected idling roadway primarily two four lane public highways many turns level different include obstacles bridges cliffs tunnels addition cars already road level also one police cars along course goal level reach gas station end course least amount time stopping gas station mandatory one could drive past inattentive consequence stopping results running gas thus losing car life player begins game 5 lives one lost time player crashes something player completes level without crashing running gas awarded bonus life addition losing life crashing adds thirty seconds player time cars could crash traffic off-road obstacles trees could crash falling cliff one mountain levels could sustain much damage staying roadway long flatland levels players could also lose life using manual transmission redlining consequently blowing engine crashing police car instantly ends game regardless number lives player left police cars appear every level player driving faster speed limit encountering one police car follow pursuit point pursued police car able pass player car player forced pull receives ticket stating offense speed vehicle n't cost player life take away valuable time players avoid pursued police slowing encountering anticipating aid radar detector comes standard vehicles game standard version test drive ii player option using one two vehicles three 1992 console versions game vehicles presented beginning game technical specifications including top speed torque acceleration rates cars included porsche 959 ferrari f40 third car lamborghini diablo non-console versions accolade later released two data disks included playable cars released many platforms computer versions game provided one course referred game “ master scenery ” consisting several stages stage one three possible locations desert cacti along side road mountain sheer rock wall one side highway cliff occasionally tunnel mountain grassy area trees later two scenery disks released containing additional course four available courses snes version game varying length difficulty route public highway different part continental united states courses included three cars chosen version game technically stopped law point animated female police officer smiles character character smiles return apprehended law enforcement various infractions including evasion police course end sequence shows female police officer placing player arrest virtually impossible complete given course without police confrontation end game due fact must maintain high speeds evade police cars highways computer gaming world stated liked test drive would like version like predecessor steering system avoid compute favorably reviewed game realism especially joystick stated installation overly difficult frustrating
[ 9166, 9006 ]
Validation
7,774
2
QP_(framework):qp framework qp quantum platform family lightweight open source software frameworks building responsive modular real-time embedded applications systems cooperating event-driven active objects actors qp family consists qp/c qp/c++ qp-nano frameworks quality controlled documented commercially licensable qp frameworks run bare-metal single-chip microcontrollers completely replacing traditional real-time operating system rtos ports ready-to-use examples provided major cpu families qp/c qp/c++ also work traditional os/rtos posix linux qnx windows vxworks threadx microc/os freertos etc behavior active objects actors specified qp means hierarchical state machines uml statecharts frameworks support manual coding uml state machines c c++ well fully automatic code generation means free graphical qm modeling tool qp frameworks qm modeling tool used medical devices defense aerospace robotics consumer electronics wired wireless telecommunication industrial automation transportation many active objects inherently support automatically enforce following best practices concurrent programming active objects dramatically improve ability reason concurrent software contrast using raw rtos tasks directly trouble number reasons particularly raw tasks let anything offer help automation best practices good patterns active objects raise level abstraction naked threads let express intent directly thus improving productivity active objects operate vacuum require software infrastructure framework provides minimum execution thread active object queuing events event-based timing services resource-constrained embedded systems biggest concern always scalability efficiency frameworks especially frameworks accompanying various modeling tools traditionally built top conventional rtos adds memory footprint cpu overhead final solution qp frameworks designed efficiency minimal footprint ground need rtos stand-alone configuration fact compared conventional rtoses qp frameworks provide smaller footprint especially ram data space also rom code space possible active objects n't need block blocking mechanisms e.g. semaphores conventional rtos needed characteristics make event-driven active objects perfect fit single-chip microcontrollers mcus get productivity boost working higher level abstraction raw rtos tasks get lower resource utilization better power efficiency event-driven systems use cpu processing events otherwise put chip low-power sleep mode qp consists universal uml-compliant event processor qep portable event-driven real-time framework qf tiny run-to-completion kernel qk software tracing system qs qep quantum event processor universal uml-compliant event processor enables direct coding uml state machines uml statecharts highly maintainable c c++ every state machine element mapped code precisely unambiguously exactly traceability qep fully supports hierarchical state nesting enables reusing behavior across many states instead repeating actions transitions qf quantum framework highly portable event-driven real-time application framework concurrent execution state machines specifically designed real-time embedded systems qk quantum kernel tiny preemptive non-blocking run-to-completion kernel designed specifically executing state machines run-to-completion rtc fashion qs quantum spy software tracing system enables live monitoring event-driven qp applications minimal target system resources without stopping significantly slowing code types qp frameworks qp/c qp/c++ qp-nano easily adapted various microprocessor architectures compilers adapting qp software called porting qp frameworks designed ground make porting easy currently bare-metal qp ports exist following processor architectures qp/c qp/c++ frameworks also work traditional operating systems rtoses currently qp ports exist following oses/rtoses qp framework types dual-licensed open source gplv2 traditional closed-source license users want distribute qp e.g embedded inside user upgradable devices retain proprietary status code fee several types commercial royalty-free closed-source licenses available
[ 7235, 4773, 8262, 682, 9964, 6797, 2383, 7983, 2517, 7445, 823, 9366, 2045, 6207 ]
Test
7,775
9
Niklaus_Wirth:niklaus wirth niklaus emil wirth born 15 february 1934 swiss computer scientist designed several programming languages including pascal pioneered several classic topics software engineering 1984 turing award generally recognized highest distinction computer science developing sequence innovative computer languages wirth born winterthur switzerland 1934 1959 earned degree electronics engineering swiss federal institute technology zürich eth zürich 1960 earned m.sc université laval canada 1963 awarded ph.d. electrical engineering computer science eecs university california berkeley supervised computer designer pioneer harry huskey 1963 1967 served assistant professor computer science stanford university university zurich 1968 became professor informatics eth zürich taking two one-year sabbaticals xerox parc california 1976–1977 1984–1985 wirth retired 1999 2004 made fellow computer history museum seminal work programming languages algorithms including euler algol-w pascal modula oberon wirth chief designer programming languages euler algol w pascal modula modula-2 oberon oberon-2 oberon-07 also major part design implementation team lilith oberon operating systems lola digital hardware design simulation system received association computing machinery acm turing award development languages 1984 1994 inducted fellow acm book written jointly kathleen jensen pascal user manual report served basis many language implementation efforts 1970s 1980s united states across europe article program development stepwise refinement teaching programming considered classic text software engineering 1975 wrote book algorithms data structures programs gained wide recognition major revisions book new title algorithms data structures published 1985 2004 examples first edition written pascal replaced later editions examples written modula-2 oberon respectively textbook systematic programming introduction considered good source students wanted coding regarded challenging text work sought imperative reading interested numerical mathematics 1992 published together jürg gutknecht full documentation oberon os.. second book together martin reiser intended programmer guide 1995 popularized adage known wirth law states software getting slower rapidly hardware becomes faster 1995 paper plea lean software attributes martin reiser
[ 512, 9345, 2179, 4483, 4998, 9351, 7048, 9224, 4107, 11020, 8973, 6414, 6160, 6801, 8082, 9107, 11411, 8219, 6558, 7071, 1952, 1956, 7076, 8868, 10617, 10668, 5677, 7983, 2482, 6454, 7479, 1976, 9019, 4412, 6652, 4799, 4800, 10049, 4930, ...
Test
7,776
2
Address_Windowing_Extensions:address windowing extensions address windowing extensions awe microsoft windows application programming interface allows 32-bit software application access physical memory virtual address space even excess 4 gb limit process mapping application virtual address space physical memory awe known windowing similar overlay concept environments awe beneficial certain data-intensive applications database management systems scientific engineering software need manipulate large data sets minimizing paging application reserves region window virtual address space allocates one regions physical memory using awe api application map virtual window one physical regions application reserve one virtual address space map allocated regions physical memory long number bytes reserved virtual address space matches physical memory region application must lock pages memory privilege use awe 32-bit systems awe depends physical address extension support reserving memory 4 gb awe first introduced windows 2000 new api superseding pse36 method windows nt 4.0 enterprise edition accessing 4 gb memory longer supported windows 2000 among first applications make use awe oracle 8.1.6 microsoft sql server 2000 /3gb boot flag used repartition 32-bit virtual address space 2 gb kernel 2 gb userland 3 gb userland awe limited accessing 16 gb physical memory limitation one gb reserved kernel n't enough memory page table entries map 16 gb memory additional restrictions maximum amount memory addressable thorough awe imposed windows licensing scheme example windows 2000 advanced server limited 8 gb windows 2000 data center server supported 64 gb article published dr. dobb journal 2004 noted memory allocated using address windowing extensions written pagefile suggested awe regions could therefore used way protecting sensitive application data encryption keys
[ 10340, 6797, 5840, 8080, 3250, 2901, 11030, 7032 ]
Test
7,777
9
Xtext:xtext xtext open-source software framework developing programming languages domain-specific languages dsls unlike standard parser generators xtext generates parser also class model abstract syntax tree well providing fully featured customizable eclipse-based ide xtext developed eclipse project part eclipse modeling framework project licensed eclipse public license first version xtext published 2006 openarchitectureware project last version released oaw project version 4.3 since beginning 2008 xtext developed eclipse eclipse modeling project joining eclipse annual simultaneous release xtext released version 0.7.0 june 2009 1.0 june 2010 2.0 june 2011 2.3 june 2012 2.5 december 2013 2.6 may 2014 2.7 september 2014 framework mainly developed german company itemis specify language developer write grammar xtext grammar language grammar describes ecore model derived textual notation definition code generator derives antlr parser classes object model used independently eclipse xtext includes features integrate well eclipse-based ide xtext languages ide highly configurable language infrastructure ide wired using dependency injection guice default components easily replaced binding customized ones instead since version 2.0 xtext facilitated development domain-specific languages java virtual machine referring compiling java artifacts tight integration eclipse java development toolkit reusable expression languages library enables rich behavior within dsl code generator written xtend hooked language jvm languages enough map dsl concepts java artifacts get holistic java integration alternative interpreter also available time writing article xtext homepage listed around 40 commercial non-commercial projects several application domains using xtext general-purpose language xtend also built xtext
[ 9926, 2537, 16, 1552, 5872, 6581, 3545, 3710 ]
Test
7,778
4
SCADA_Strangelove:scada strangelove scada strangelove independent group information security researchers founded 2012 focused security assessment industrial control systems ics scada main fields research include scada strangelove interests expand classic ics components covers various embedded systems however encompass smart home components solar panels wind turbines smartgrid well areas group members continue develop publish numerous open source tools scanning fingerprinting security evaluation password bruteforcing ics devices devices work industrial protocols modbus siemens s7 mms iso ec 60870 profinet 2014 shodan used published tools building map ics devices publicly available internet open source security assessment frameworks thc hydra metasploit digitalbond redpoint used shodan-developed tools techniques group published security-hardening guidelines industrial solutions based siemens simatic wincc wincc flexible guidelines contain detailed security configuration walk-throughs descriptions internal security features appropriate best practices among group ’ noticeable projects choo choo pwn ccp also named critical infrastructure attack cia interactive laboratory built upon ics software hardware used real world every system connected toy city infrastructure includes factories railroads facilities laboratory demonstrated various conferences including phdays power community 30c3 primarily laboratory used discovery new vulnerabilities evaluation security mechanisms however also used workshops educational activities positive hack days iv contestants found several 0-day vulnerabilities indusoft web studio 7.1 schneider electric specific ics hardware rtu pet-7000 ics vulnerability discovery challenge group supports secure open smartgrid scadasos project find fix vulnerabilities intellectual power grid components photovoltaic power station wind turbine power inverter 80 000 industrial devices discovered isolated internet 2015 group members frequently seen presenting conferences like ccc scada security scientific symposium positive hack days notable talks overview vulnerabilities discovered widely distributed siemens simatic wincc software tools implemented searching ics internet talk consisted overview vulnerabilities discovered various systems produced abb emerson honeywell siemens presented phdays iii phdays iv implications security research aimed realization various industrial network protocols profinet modbus dnp3 iec 61850-8-1 mms iec international electrotechnical commission 61870-5-101/104 fte fault tolerant ethernet siemens s7 presentations security research showing impact radio 3g/4g networks security mobile devices well industrial equipment analysis security architecture implementation wide spread platforms wind solar energy generation produce many gigawatts cybersecurity assessment railway signaling systems automatic train control atc computer-based interlocking cbi european train control system etcs greater china cyber threat landscape keynote sergey gordeychik overview vulnerabilities attacks cyber-security incidents greater china region presented talk hopeless relay protection substation automation kirill nesterov alexander tlyapov security analysis results key digital substation component relay protection terminals presented vulnerabilities including remote code execution siemens siprotec general electric line distance relay nari abb protective relays presented names catchwords graphical elements refer stanley kubrick ’ film dr. strangelove talks group members often refer cold war events caribbean crisis draw parallels nuclear arms race current escalation cyberwar group members follow approach “ responsible disclosure ” “ ready wait years vendor patching vulnerability ” public exploits discovered vulnerabilities published account longevity ics implication long process patching ics however conflicts still happen notably 2012 talk def con called due dispute persistent weaknesses siemens industrial software
[ 5373, 4445 ]
Test
7,779
8
Easyrec:easyrec easyrec open-source program provides personalized recommendations using restful web services integrated web enabled applications distributed gnu general public license studio smart agent technologies hosted sourceforge written java uses mysql database comes administration tool development easyrec implementation adaptive personalization approach started course several research development projects conducted studio smart agent technologies close cooperation international companies year 2008 core functionality easyrec developed forming basis research prototypes focusing music domain e.g musicexplorer june 2009 beta version easyrec containing basic administration features integrated movie streaming portal evaluation purposes furthermore september 2009 easyrec awarded special recognition category “ award innovations – innovations economic upswing ” jury austrian state prize multimedia e-business comprehensive refactoring phase integration evaluation results easyrec published sourceforge 18 february 2010 course cebit tradeshow 2011 hanover easyrec awarded german “ innovationspreis-it 2011 ” following five primary goals guided development easyrec although easyrec domain-agnostic general purpose personalization system current web service api customized providing online shops item recommendations especially small medium enterprises easyrec provides low barrier entrance personalization major feature easyrec set usage statistics business relevant information presented via administration management interface furthermore easyrec administrator supported variety administration configuration functions including manual import adaptation business rules integrators developers benefit lightweight web service apis rest soap well guided installation wizard concerning personalization functionality easyrec providing following services additionally integration showcase mediawiki extension developed bundled application currently additional features like recommender algorithms plugin-system evaluated prepared integration easyrec system underlying architecture easyrec designed robust scalable—separating time-consuming computations task online assembling recommendations easyrec designed multi-layer system consisting moreover generator server contains different item association generators create business rules define relation two items examples web sites using easyrec recommender system
[ 10020, 5677, 7022 ]
Validation
7,780
0
Natural_language_processing:natural language processing natural language processing nlp subfield linguistics computer science information engineering artificial intelligence concerned interactions computers human natural languages particular program computers process analyze large amounts natural language data challenges natural language processing frequently involve speech recognition natural language understanding natural language generation history natural language processing nlp generally started 1950s although work found earlier periods 1950 alan turing published article titled computing machinery intelligence proposed called turing test criterion intelligence georgetown experiment 1954 involved fully automatic translation sixty russian sentences english authors claimed within three five years machine translation would solved problem however real progress much slower alpac report 1966 found ten-year-long research failed fulfill expectations funding machine translation dramatically reduced little research machine translation conducted late 1980s first statistical machine translation systems developed notably successful natural language processing systems developed 1960s shrdlu natural language system working restricted blocks worlds restricted vocabularies eliza simulation rogerian psychotherapist written joseph weizenbaum 1964 1966 using almost information human thought emotion eliza sometimes provided startlingly human-like interaction patient exceeded small knowledge base eliza might provide generic response example responding head hurts say head hurts 1970s many programmers began write conceptual ontologies structured real-world information computer-understandable data examples margie schank 1975 sam cullingford 1978 pam wilensky 1978 talespin meehan 1976 qualm lehnert 1977 politics carbonell 1979 plot units lehnert 1981 time many chatterbots written including parry racter jabberwacky 1980s natural language processing systems based complex sets hand-written rules starting late 1980s however revolution natural language processing introduction machine learning algorithms language processing due steady increase computational power see moore law gradual lessening dominance chomskyan theories linguistics e.g transformational grammar whose theoretical underpinnings discouraged sort corpus linguistics underlies machine-learning approach language processing earliest-used machine learning algorithms decision trees produced systems hard if-then rules similar existing hand-written rules however part-of-speech tagging introduced use hidden markov models natural language processing increasingly research focused statistical models make soft probabilistic decisions based attaching real-valued weights features making input data cache language models upon many speech recognition systems rely examples statistical models models generally robust given unfamiliar input especially input contains errors common real-world data produce reliable results integrated larger system comprising multiple subtasks many notable early successes occurred field machine translation due especially work ibm research successively complicated statistical models developed systems able take advantage existing multilingual textual corpora produced parliament canada european union result laws calling translation governmental proceedings official languages corresponding systems government however systems depended corpora specifically developed tasks implemented systems often continues major limitation success systems result great deal research gone methods effectively learning limited amounts data recent research increasingly focused unsupervised semi-supervised learning algorithms algorithms able learn data hand-annotated desired answers using combination annotated non-annotated data generally task much difficult supervised learning typically produces less accurate results given amount input data however enormous amount non-annotated data available including among things entire content world wide web often make inferior results algorithm used low enough time complexity practical 2010s representation learning deep neural network-style machine learning methods became widespread natural language processing due part flurry results showing techniques achieve state-of-the-art results many natural language tasks example language modeling parsing many others popular techniques include use word embeddings capture semantic properties words increase end-to-end learning higher-level task e.g. question answering instead relying pipeline separate intermediate tasks e.g. part-of-speech tagging dependency parsing areas shift entailed substantial changes nlp systems designed deep neural network-based approaches may viewed new paradigm distinct statistical natural language processing instance term neural machine translation nmt emphasizes fact deep learning-based approaches machine translation directly learn sequence-to-sequence transformations obviating need intermediate steps word alignment language modeling used statistical machine translation smt early days many language-processing systems designed hand-coding set rules e.g writing grammars devising heuristic rules stemming however rarely robust natural language variation since so-called statistical revolution late 1980s mid 1990s much natural language processing research relied heavily machine learning machine-learning paradigm calls instead using statistical inference automatically learn rules analysis large corpora typical real-world examples corpus plural corpora set documents possibly human computer annotations many different classes machine-learning algorithms applied natural-language-processing tasks algorithms take input large set features generated input data earliest-used algorithms decision trees produced systems hard if-then rules similar systems hand-written rules common increasingly however research focused statistical models make soft probabilistic decisions based attaching real-valued weights input feature models advantage express relative certainty many different possible answers rather one producing reliable results model included component larger system systems based machine-learning algorithms many advantages hand-produced rules following list commonly researched tasks natural language processing tasks direct real-world applications others commonly serve subtasks used aid solving larger tasks though natural language processing tasks closely intertwined frequently subdivided categories convenience coarse division given first published work artificial intelligence published 2018 1 road marketed novel contains sixty million words
[ 8705, 5122, 2059, 4624, 1044, 538, 4635, 3617, 4131, 5667, 2602, 10794, 7724, 8748, 11308, 1072, 4662, 2103, 3127, 8759, 11318, 3646, 6208, 8257, 1098, 5197, 6223, 10320, 5203, 6745, 5218, 8291, 9830, 1129, 8297, 3698, 119, 5248, 9345, 62...
Test
7,781
4
Data_anonymization:data anonymization data anonymization type information sanitization whose intent privacy protection process either encrypting removing personally identifiable information data sets people data describe remain anonymous european union new general data protection regulation demands stored data people eu undergo either anonymization pseudonymization process data anonymization defined process personal data irreversibly altered way data subject longer identified directly indirectly either data controller alone collaboration party data anonymization enables transfer information across boundary two departments within agency two agencies reducing risk unintended disclosure certain environments manner enables evaluation analytics post-anonymization context medical data anonymized data refers data patient identified recipient information name address full post code must removed together information conjunction data held disclosed recipient could identify patient.. de-anonymization reverse process anonymous data cross-referenced data sources re-identify anonymous data source generalization perturbation two popular anonymization approaches relational data.. process obscuring data ability re-identify later also called pseudonymization one way companies store data way hipaa compliant ordered alphabetically
[ 4232, 9036, 3629, 9901, 11695, 10134, 3323 ]
Test
7,782
3
Howard_the_Duck_(video_game):howard duck video game howard duck also known howard duck adventure volcano island action video game released 1986 activision zx spectrum commodore 64 apple ii game tie-in film howard duck came year game involves players controlling howard duck save best friends phil beverly parachuted volcano island howard needs find backpack proceed search game consists four levels last howard armed neutron gun finally face overlord game received fairly negative reviews computer gamer gave overall 55 stating beautifully presented well programmed rates one activision better recent releases deserves consideration outside unfortunate tie-in predicting however low longevity aktueller software markt described game fulfilling expectancies worth money
[ 10931, 9006 ]
None
7,783
3
Bit_Manipulation_Instruction_Sets:bit manipulation instruction sets bit manipulation instructions sets bmi sets extensions x86 instruction set architecture microprocessors intel amd purpose instruction sets improve speed bit manipulation instructions sets non-simd operate general-purpose registers two sets published intel bmi referred bmi1 bmi2 introduced haswell microarchitecture another two sets published amd abm advanced bit manipulation also subset sse4a implemented intel part sse4.2 bmi1 tbm trailing bit manipulation extension introduced piledriver-based processors extension bmi1 dropped zen-based processors abm implemented single instruction set amd amd processors support instructions neither intel considers codice_1 part sse4.2 codice_2 part bmi1 codice_1 separate cpuid flag however intel uses amd codice_4 flag indicate codice_2 support since codice_2 completes abm codice_2 almost identical bit scan reverse codice_8 instruction sets zf result zero cf source zero flags rather produces defined result source operand size bits source operand zero instructions enabled codice_9 bit cpuid intel officially considers codice_2 part bmi advertises codice_2 support using codice_4 cpuid feature flag bmi1 available amd jaguar piledriver newer processors intel haswell newer processors intel introduced bmi2 together bmi1 line haswell processors amd produced processors supporting bmi1 without bmi2 bmi2 supported amds excavator architecture newer codice_13 codice_14 instructions new generalized bit-level compress expand instructions take two inputs one source selector selector bitmap selecting bits packed unpacked codice_14 copies selected bits source contiguous low-order bits destination higher-order destination bits cleared codice_13 opposite selected bits contiguous low-order bits copied selected bits destination destination bits cleared used extract bitfield input even lot bit-level shuffling previously would expensive instructions similar bit level gather-scatter simd instructions codice_13 codice_14 instructions like rest bmi instruction sets operate general-purpose registers 16-bit examples operations tbm consists instructions complementary instruction set started bmi1 complementary nature means necessarily need used directly generated optimizing compiler supported amd introduced tbm together bmi1 piledriver line processors amd jaguar zen-based processors support tbm
[ 9092, 2821, 1798, 10375, 4491, 6924, 4237, 5645, 7313, 4886, 6038, 9369, 7963, 9500, 2719, 5541, 2088, 2094, 9391, 9911, 8120, 8506, 2237, 1085, 8125, 8126, 833, 6978, 6339, 5444, 7234, 3142, 9541, 11080, 2764, 5326, 977, 2514, 3537, 2516...
Validation
7,784
9
Java_Portlet_Specification:java portlet specification java portlet specification defines contract portlet container portlets provides convenient programming model java portlet developers portlets pluggable user interface software components managed displayed web portal example enterprise portal web cms portlet aggregate integrate personalize content different sources within web page portlet responds requests web client generates dynamic content portlets produce fragments markup html xhtml wml aggregated portal typically following desktop metaphor portal page displayed collection non-overlapping portlet windows portlet window displays portlet hence portlet collection portlets resembles web-based application hosted portal examples portlet applications e-mail weather reports discussion forums news portlet managed portlet container portlet standards platform independent application programming interfaces intended enable software developers create portlets plugged portal supporting standards example java portlet specification java portlet resembles java servlet produces fragments rather complete documents bound url portlet container runs portlets provides required runtime environment portlet container contains portlets manages life cycles also provides persistent storage mechanisms portlet preferences portlet container receives requests portal execute requests portlets hosted portlet container responsible aggregating content produced portlets portal handles aggregation portal portlet container built together single component application suite two separate components portal application java portlet specification v1.0 developed java community process java specification request jsr 168 released final form october 2003 java portlet specification v1.0 introduces basic portlet programming model initially java portal vendors portlet development framework thus portlets confined specific portal servers could n't deployed rest java portals jsr 168 inception java portlets may deployed java portal servers adhering jsr 168 specifications portlets catalog set portlets ready-to-use components enterprise portals want adopt portals certainly need many variety portlets deploy run portlets catalog use jsr 168 portlets catalog makes sure portlets catalog may run standards–compliant java portal server types portlet solution vertical domains technology like collaboration social networking community content management utility calendaring hrm available catalogs many open source commercial portlets catalog available jsr 168 based solutions rare jsr 168 specifications offer suitability developers reuse code maintain set jsr 168 compliant portlets deployers easy keep single set solution deploy many jsr-286 java portlet specification v2.0 developed jcp created alignment updated version 2.0 wsrp released june 2008 developed improve short-comings version 1.0 specification jsr-168 major features include jsr-362 java portlet specification v3.0 released april 2017 major features include
[ 1802, 10506, 9229, 11154, 1556, 10020, 10026, 7212, 10284, 4658, 2485, 1468, 4797, 8644, 11466, 3920, 5849, 5593, 6366, 4960, 865, 9834, 8689, 3966, 9841, 10486, 124, 9726 ]
Test
7,785
9
Codelobster:codelobster codelobster portable integrated development environment ide primarily php also supports html css javascript development plug-ins available drupal wordpress smarty joomla jquery facebook codeigniter yii cakephp free registration email required 30 days use program paid versions also lite professional additional features program missing help system latest version program features syntax highlighting auto-completion sql php html css javascript xml well automatic syntax checking html css inspector like firebug also includes drupal support plugins paid offer trial periods varying length
[ 3462, 1034, 6154, 6797, 9614, 10910, 2465, 2348, 10413, 7983, 7346, 190, 6338, 2372, 8644, 1353, 4171, 6231, 10587, 11357, 479, 3553, 7658, 7147, 11503, 4853, 11259, 7293 ]
Test