node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
7,786
4
Zealot_Campaign_(Malware):zealot campaign malware zealot campaign cryptocurrency mining malware collected series stolen national security agency nsa exploits released shadow brokers group windows linux machines mine cryptocurrency specifically monero discovered december 2017 exploits appeared zealot suite include eternalblue eternalsynergy apache struts jakarta multipart parser attack exploit cve-2017-5638 notable exploit within zealot vulnerabilities includes vulnerability cve-2017-9822 known dotnetnuke dnn exploits content management system user install monero miner software estimated usd 8,500 monero mined single targeted computer campaign discovered studied extensively f5 networks december 2017 many zealot exploits leaked nsa malware suite widely described “ unusually high obfuscated payload ” meaning exploit works multiple levels attack vulnerable server systems causing large amounts damage term “ zealot ” derived starcraft series namely type warrior multi-layered attack begins two http requests used scan target vulnerable systems network similar attacks past targeted either windows linux-based systems yet zealot stands prepared version apache struts exploit along using dnn operating system os identified via java script malware loads os-specific exploit chains targeted system runs either linux os x struts payload install python agent post-exploitation stage checking target system see already infected downloads crypto-miner software often referred “ mule ” obfuscates embedded python code process different botnet malware zealot campaigns request command control c c server-specific user-agent cookie headers meaning anyone malware receive different response due zealot encrypting via rc4 cipher see network inspection security software able see malware network able scan targeted os windows struts payload downloads encoded powershell interpreter decoded two times program runs another obfuscated script turn leads device url download files file known powershell script “ scv.ps1 ” heavily obfuscated script allows attacker deploy mining software targeted device deployed software also use dynamic-link library dll mining malware deployed using reflective dll injection technique attach malware powershell processing remain undetected prior moving onto next stage program also checks see firewall active yes pipe embedded base64 embedded python code circumvent firewall another possible solution known “ little snitch ” possibly terminate firewall active post-exploitation stage program scans target system python 2.7 higher found system download following downloads python module probe.py propagate network script highly obfuscated base encryption base64 zipped 20 times downloaded zip file could named several iterations derived starcraft game files included listed files run successfully miner software introduced known commonly “ mule ” malware powershell script named “ minerd_n.ps2 ” within compressed files downloaded executed via eternalsynergy exploit software utilizes target system ’ hardware process mining cryptocurrency mining software reportedly stolen close 8,500 one victim yet total amounts mined monero still speculated among researchers initially utilized wannacry ransomware attack 2017 exploit specifically utilized mining software zealot campaign much known exploit used cooperation eternalblue along exploits zealot campaign others notably eternalsynergy involved equifax hack wannacry ransomware cryptocurrency mining campaigns asp.net based content management system dnn sends serialized object via vulnerable dnnpersonalization cookie http request stage using “ objectdataprovider ” “ objectstateformatter ” attacker embeds another object victim ’ shell system invoked shell system deliver script delivered apache struts exploit dnn acts secondary backup attackers apache struts exploit fail used deliver powershell script initiate attack exploit one two http requests sent initial stage infection among first discovered exploits zealot campaign jakarta parser exploit allowed hackers exploit “ zero-day ” flaw software hack financial firm equifax march 2017 particular exploit notable public exploits utilized largely public case still utilized december 2017 exploit patched bangladeshi-based group utilized spear-phishing method known commonly business email compromise bce steal cryptocurrency unsuspecting employees lazarus primarily targeted employees cryptocurrency financial organizations executed via word document claiming legitimate-appearing european company document opened embedded trojan virus would load onto system computer begin steal credentials malware specific malware still unknown ties zealot malware among several exploits involved march 2017 equifax data breach jakarta parser eternalblue eternalsynergy heavily involved attacking servers instead software utilized mine cryptocurrency used mine data 130 million equifax customers
[ 9375, 5178, 10132, 7887 ]
Test
7,787
4
Email_injection:email injection email injection security vulnerability occur internet applications used send email messages email equivalent http header injection like sql injection attacks vulnerability one general class vulnerabilities occur one programming language embedded within another form added web page submits data web application malicious user may exploit mime format append additional information message sent new list recipients completely different message body mime format uses carriage return delimit information message raw message determines eventual destination adding carriage returns submitted form data allow simple guestbook used send thousands messages malicious spammer could use tactic send large numbers messages anonymously information topic including examples ways avoid vulnerability found securephp wiki however vulnerability limited php potentially affect application sends email messages based input arbitrary users
[ 899, 8644, 5636, 8262, 119 ]
Test
7,788
3
Socket_S1:socket s1 socket s1 cpu socket type used amd turion 64 athlon 64 mobile phenom ii mobile later sempron processors debuted dual-core turion 64 x2 cpus may 17 2006 socket s1 638 pin low profile zif 1.27mm pitch socket replaces existing socket 754 mobile computing segment e.g laptops socket s1 cpus include support dual-channel ddr2 sdram dual-core mobile cpus virtualization technology compete mobile intel core 2 processor series different generations processors used variant pinouts s1 socket processors necessarily compatible socket even fit mechanically
[ 3586, 8322, 3588, 8452, 9475, 3464, 4872, 7058, 10260, 4246, 4767, 2463, 7712, 9122, 1322, 11183, 1329, 10675, 3892, 8629, 9400, 6978, 11331, 9157, 3783, 7247, 9551, 7122, 9427, 7132, 2525, 4451, 5859, 1260, 7151, 1651 ]
Test
7,789
6
Coda_(file_system):coda file system coda distributed file system developed research project carnegie mellon university since 1987 direction mahadev satyanarayanan descended directly older version andrew file system afs-2 offers many similar features intermezzo file system inspired coda coda many features desirable network file systems several features found elsewhere coda uses local cache provide access server data network connection lost normal operation user reads writes file system normally client fetches hoards data user listed important event network disconnection network connection lost coda client local cache serves data cache logs updates operating state called disconnected operation upon network reconnection client moves reintegration state sends logged updates servers transitions back normal connected-mode operation also different afs coda data replication method afs uses pessimistic replication strategy files allowing one read/write server receive updates servers acting read-only replicas coda allows servers receive updates allowing greater availability server data event network partitions case afs handle unique features introduce possibility semantically diverging copies files directories known conflicts disconnected operation local updates potentially clash connected users updates objects preventing reintegration optimistic replication potentially cause concurrent updates different servers object preventing replication former case called local/global conflict latter case server/server conflict coda extensive repair tools manual automated handle repair types conflicts coda developed linux support appeared 2.1 linux kernel series also ported freebsd subsequently obsoleted efforts way bring back efforts made port coda microsoft windows windows 95/windows 98 era windows nt windows xp means open source projects like djgcc dos c compiler cygwin
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 7225, 11323, 8772, 1109, 4708, 9836, 9333, 6263, 9335, 9343, 7818, 6797, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 5293, 7344, 2230, 5816, 1...
Validation
7,790
7
Loader.io:loader.io loader.io cloud-based load scalability testing service saas allows developers test web applications api thousands concurrent connections loader.io cloud-based load testing service developers test performance scalability web applications apis provides simple cloud-based load testing born sendgrid labs late 2012
[ 170, 467, 101 ]
Test
7,791
4
Defense.Net:defense.net defense.net privately held american information technology services company company business protect internet-facing infrastructures – e-commerce web sites – forms distributed denial service ddos attacks network defense.net operates constellation ddos mitigation sites around internet capable filtering removing ddos attacks real-time defense.net founded barrett lyon 2012 lyon also pioneer ddos mitigation industry founder prolexic first ddos mitigation company 2014 company named one 100 hottest private companies north america red herring acquired shortly f5 networks purportedly 50 100 million 2012 bessemer venture partners lead series round funding total 9.5 million
[ 2409, 5178 ]
Test
7,792
2
Rpath:rpath computing rpath designates run-time search path hard-coded executable file library dynamic linking loaders use rpath find required libraries specifically encodes path shared libraries header executable another shared library rpath header value named executable linkable format header standards may either override supplement system default dynamic linking search paths rpath executable shared library optional entry codice_1 section elf executable shared libraries type codice_2 called codice_2 attribute stored link time linker tools codice_4 codice_5 create modify entry later different dynamic linkers elf implement use codice_2 attribute different ways dynamic linker gnu c library searches shared libraries following locations notes gnu linker gnu ld implements feature calls new-dtags used insert rpath lower precedence codice_9 environment variable new-dtags feature enabled linker codice_28 gnu codice_29 besides setting codice_2 attribute also sets codice_8 attribute string run time dynamic linker finds codice_8 attribute ignores value codice_2 attribute effect codice_9 checked first paths codice_8 attribute searched afterwards ld dynamic linker search dt_runpath locations transitive dependencies unlike dt_rpath instead specifying codice_36 linker environment variable codice_37 set effect dynamic linker solaris specifically codice_38 sunos 5.8 similar systems looks libraries directories specified ld_library_path variable looking codice_2 attribute sun microsystems first introduce dynamic library loading sun later added rpath option ld used essential libraries added security feature gnu ld support sun-style dynamic libraries example gnu sun ld ld.so refuse load termcap program needing unless file termcap.so /lib/ named termcap.so.4 ignored /lib/termcap.so.4 removed remediate shell dies one load alternate termcap.so rescue disk needed also new termcap.so.4 rpath /lib ld.so refuse use load unless clobbered /lib/termcap.so.4 another issue n't safe copy libs /lib use restricting would-be lib tester furthermore vs. means programs needing basic termcap.so denied library deleted abi access basic support old linux/sun used allows user direct program use termcap.so specify found /usr/local/lib n using search rules ld.so.conf however gnu ld always uses /lib /usr/lib regardless first /lib/termcap.so moved /usr/local/lib mentioned ld.so.conf enables use moving libs ld.so.conf use use preferred practice use programs check version libs support use features available often skipped old releases due slow computing speed lack time code correctly said test kind thing thoroughly given platform deciding rely release administrators today guaranteed respect past guidelines documentation unix varieties link load completely different way rpath specific ld shipped particular distribution lastly said rpath security feature however mandatory access control mac techniques effective effective rpath control lib reading writing control rpath using today compilers often nearly impossible given lengthy convoluted make 1 scripting worse build scripts ignore -- disable-rpath even though present option would time-consuming frustrating probably unfeasible fix build scripting every odd program compile simple sh 1 wrapper call real ld named ld.bin wrapper filter in/out option invoking ld however note builds incorrectly use rpath instead rpath-link locate intermediate products stay build directory thus backwardly demand rpath final product new issue concerning rpath
[ 10176, 10436, 3876, 8966, 2804 ]
None
7,793
2
Mary_Gardiner:mary gardiner mary gardiner australian linux programmer director operations ada initiative described non-profit organization dedicated increasing participation women open technology culture council member linux australia september 2011 2012 gardiner ada initiative co-founder valerie aurora named two influential people computer security sc magazine gardiner co-founder aussiechix later became oceania women open tech former coordinator linuxchix speaks social norms beliefs minority contributors interested women colleagues believe women capability successfully contribute gardiner involved drafting adopting anti-harassment policies technology conferences gardiner winner 2011 rusty wrench award given linux australia service linux programmers australia commended work improve gender diversity oppose sexual harassment open-source software community keynote speaker wikimania 2012 held 12–15 july 2012 washington dc 2012 gardiner listed one 10 women tech give back datamation one influential people computer security sc magazine
[ 1026, 5644, 4367, 8848, 657, 10642, 1939, 2581, 3478, 6808, 7450, 6302, 7584, 802, 5410, 6691, 6947, 8354, 5931, 8364, 1717, 823, 2109, 11069, 10687, 10822, 8263, 843, 589, 6352, 4177, 11602, 8787, 4437, 6489, 3802, 4831, 9696, 11232, 139...
None
7,794
6
Disk_encryption:disk encryption disk encryption technology protects information converting unreadable code deciphered easily unauthorized people disk encryption uses disk encryption software hardware encrypt every bit data goes disk disk volume used prevent unauthorized access data storage expressions full disk encryption fde whole disk encryption signify everything disk encrypted master boot record mbr similar area bootable disk code starts operating system loading sequence encrypted hardware-based full disk encryption systems truly encrypt entire boot disk including mbr transparent encryption also known real-time encryption on-the-fly encryption otfe method used disk encryption software transparent refers fact data automatically encrypted decrypted loaded saved transparent encryption files accessible immediately key provided entire volume typically mounted physical drive making files accessible unencrypted ones data stored encrypted volume read decrypted without using correct password/keyfile correct encryption keys entire file system within volume encrypted including file names folder names file contents meta-data transparent end user transparent encryption usually requires use device drivers enable encryption process although administrator access rights normally required install drivers encrypted volumes typically used normal users without rights general every method data seamlessly encrypted write decrypted read way user and/or application software remains unaware process called transparent encryption disk encryption replace file encryption situations disk encryption sometimes used conjunction filesystem-level encryption intention providing secure implementation since disk encryption generally uses key encrypting whole drive data decryptable system runs however disk encryption solutions use multiple keys encrypting different volumes attacker gains access computer run-time attacker access files conventional file folder encryption instead allows different keys different portions disk thus attacker extract information still-encrypted files folders unlike disk encryption filesystem-level encryption typically encrypt filesystem metadata directory structure file names modification timestamps sizes trusted platform module tpm secure cryptoprocessor embedded motherboard used authenticate hardware device since tpm chip unique particular device capable performing platform authentication used verify system seeking access expected system limited number disk encryption solutions support tpm implementations wrap decryption key using tpm thus tying hard disk drive hdd particular device hdd removed particular device placed another decryption process fail recovery possible decryption password token although advantage disk removed device might create single point failure encryption example something happens tpm motherboard user would able access data connecting hard drive another computer unless user separate recovery key multiple tools available market allow disk encryption however vary greatly features security divided three main categories software-based hardware-based within storage device hardware-based elsewhere cpu host bus adaptor hardware-based full disk encryption within storage device called self-encrypting drives impact performance whatsoever furthermore media-encryption key never leaves device therefore available virus operating system trusted computing group opal storage specification provides industry accepted standardization self-encrypting drives external hardware considerably faster software-based solutions although cpu versions may still performance impact media encryption keys well protected solutions boot drive require pre-boot authentication component available types solutions number vendors important cases authentication credentials usually major potential weakness since symmetric cryptography usually strong secure safe recovery mechanisms essential large-scale deployment disk encryption solutions enterprise solution must provide easy secure way recover passwords importantly data case user leaves company without notice forgets password challenge–response password recovery mechanism allows password recovered secure manner offered limited number disk encryption solutions benefits challenge–response password recovery emergency recovery information eri file provides alternative recovery challenge–response mechanism unfeasible due cost helpdesk operatives small companies implementation challenges benefits eri-file recovery full disk encryption schemes vulnerable cold boot attack whereby encryption keys stolen cold-booting machine already running operating system dumping contents memory data disappears attack relies data remanence property computer memory whereby data bits take several minutes degrade power removed even trusted platform module tpm effective attack operating system needs hold decryption keys memory order access disk full disk encryption also vulnerable computer stolen suspended wake-up involve bios boot sequence typically ask fde password hibernation contrast goes via bios boot sequence safe software-based encryption systems vulnerable various side channel attacks acoustic cryptanalysis hardware keyloggers contrast self-encrypting drives vulnerable attacks since hardware encryption key never leaves disk controller also full disk encryption schemes n't protect data tampering silent data corruption i.e bitrot means provide privacy integrity block cipher-based encryption modes used full disk encryption authenticated encryption concerns storage overhead needed authentication tags thus tampering would done data disk data would decrypted garbled random data read hopefully errors may indicated depending data tampered case os metadata – file system case file data – corresponding program would process file one ways mitigate concerns use file systems full data integrity checks via checksums like btrfs zfs top full disk encryption however cryptsetup started experimentally support authenticated encryption full disk encryption several benefits compared regular file folder encryption encrypted vaults following benefits disk encryption one issue address full disk encryption blocks operating system stored must decrypted os boot meaning key available user interface ask password full disk encryption solutions utilize pre-boot authentication loading small highly secure operating system strictly locked hashed versus system variables check integrity pre-boot kernel implementations bitlocker drive encryption make use hardware trusted platform module ensure integrity boot environment thereby frustrate attacks target boot loader replacing modified version ensures authentication take place controlled environment without possibility bootkit used subvert pre-boot decryption pre-boot authentication environment key used encrypt data decrypted external key input system solutions storing external key include possibilities varying degrees security however better unencrypted disk
[ 7040, 2050, 647, 10631, 4746, 5003, 8331, 4366, 9745, 1810, 9625, 9882, 9343, 672, 9762, 4389, 6309, 9894, 3880, 10405, 3629, 7983, 1456, 5552, 434, 10801, 52, 11568, 3382, 8119, 5433, 1978, 7354, 7229, 6975, 4032, 4801, 8640, 9281, 8772,...
Test
7,795
2
Abort,_Retry,_Fail?:abort retry fail abort retry fail abort retry ignore error message found dos operating systems prompts end-user course action follow message cited example poor usability computer user interfaces cp/m attempting read floppy disk drive door open would hang disk inserted disk drive door closed early disk hardware send kind signal disk spinning timeout detect lack signal required much code tiny systems many users cp/m became accustomed method managing multiple disks opening disk drive stop program reading writing file correct disk could inserted primary design consideration pc dos software written cp/m portable dos without changes even first ibm pc hardware told operating system disk drive door open returning error software trying read disk would break ability manage disks way without changes still desirable improve experience particular giving user way get hang without find disk insert drive prompt invented reason missing disk disk drive door opened defined dos critical error would call critical error handler default critical error handler part command.com printed abort retry ... prompt waited user input problems particular checksum error reading data disk also defined critical error thus causing prompt appear reasons missing disk opened disk drive users could press key indicate wanted happen available options included program could install critical error handler running many sophisticated programs particular full screen programs order avoid messages disturbing display programs faked missing fail response dos 2.0 jumping back calling program skipping return stack dos risky hack relied stack layout skipped cleanup operations operating system error messages described example poor user interface design users message appeared choice hit r'—which repeated message—or hit another letter caused program crash work lost one scholar described way hard disks larger removable media zip drives made need manage multiple disks obsolete thus made prompt useless gradually replaced code acted like fail immediately dos 3.3 command.com provided startup option codice_1 order force default critical error handler return fail errors starting version 4.0 alternative command line processors 4dos ndos supported codice_1 corresponding codice_3 directive codice_4/codice_5 well option also supported command.com pts-dos 6.51 s/dos 1.0 well dr-dos 7.02 higher opendos 7.01 command.com provides similar feature codice_6 described install critical error handler still supported newer versions operating systems linux always act like fail cases humorous variations edgar allen poe raven using abort retry ignore place nevermore written 1980s 1990s quite popular distributed bulletin board email original best known version credited cleveland poet marcus bales adapted numerous times attributed anonymous lucy blades rob collins others 1993 neil howe published 13th gen abort retry ignore fail sympathetic book culture generation x 1996 white town released ep entitled abort retry fail pc magazine used term title column highlighting humorous computer-related errors
[ 4870, 2571, 9166, 6319, 5520, 5744, 3474, 7983, 8852, 11444, 4409, 10333, 1694, 9919 ]
Test
7,796
2
Windows_Insider:windows insider windows insider open software testing program microsoft allows users valid license windows 10 windows server 2016 register pre-release builds operating system previously accessible software developers microsoft launched windows insider developers enterprise testers technically able test new developer features pre-release software builds given publicly released gather low level diagnostics feedback order identify investigate mitigate improve windows 10 os help support guidance insider program participants direct communication microsoft engineers via proprietary communication diagnostic channel announced september 30 2014 along windows 10 september 2015 7 million people took part windows insider program february 12 2015 microsoft started test previews windows 10 mobile microsoft announced windows insider program would continue beyond official release windows 10 future updates gabriel aul previous head charge windows insider program current head windows insider program dona sarkar similar windows insider program microsoft office bing xbox visual studio code teams set insider programs microsoft originally launched windows insider enterprise testers technically able test new developer features gather feedback improve features built windows 10 time official launch windows 10 pcs total 5 million volunteers registered windows 10 windows 10 mobile also among first people receive official update windows 10 release windows 10 windows insider app merged settings app made ability install windows insider preview builds optional feature could accessed directly within windows 10 may 2017 microsoft announced program would extend windows server 2016 first insider build operating system released 13 july 2017 windows 10 insider preview updates delivered testers different rings logical categories windows insiders fast ring receive updates prior windows insiders slow ring might experience bugs issues february 2016 microsoft introduced new rings windows insider preview july 17 2017 reports began come windows 10 creators update refused install pcs tablets sporting intel atom clover trail processors first appeared though might temporary block microsoft hardware partners work fix issues preventing operating system run well however microsoft later confirmed devices running clover trail intel atom processors would receiving creators update processors longer supported intel appropriate firmware properly run versions windows 10 newer anniversary update following processors longer supported remain windows 10 anniversary update pcs unsupported processors could receive new features updates microsoft agreed extend support pcs bug fixes security updates latest compatible version windows 10 versions windows 10 released microprocessor released also supported installations operating systems may actively blocked example windows 10 version 1507 ltsb install kaby lake processors microsoft initially launched windows 10 technical preview certain third-generation x30 series phones lumia family subsequently released second-generation x20 series devices throughout testing phase hacked non-lumia phones supported time download preview builds microsoft responded blocking unsupported models roll back installed technical preview back windows phone 8.1 microsoft launched windows device recovery tool removes windows 10 recovers latest officially released software firmware preview build 10080 released may 14 2015 first support non-lumia device htc one m8 windows followed xiaomi partnership microsoft released rom port windows 10 flagship mi 4 handset june 1 2015 time limited certain registered users china build 10080 follow-up build 10166 also added support fourth-generation lumia x40 series devices result compatible windows phone 8 later lumia phones support preview august 2015 microsoft stated windows phone devices including microsoft new hardware partners announced previous year would receive final version windows 10 mobile would receive preview builds insider program however company provide information time whether new devices would added preview program microsoft instead focused promoting new devices come windows 10 mobile including lumia 950 lumia 950 xl flagships low-cost lumia 550 lumia 650 since release new windows 10 devices became eligible receive future updates advance via insider program beginning build 10586 december 4 2015 windows-based lg lancet also received version upgraded since february 19 2016 microsoft released first windows 10 mobile redstone preview build 14267 starting build future preview versions became exclusively available devices already running non-insider preview os except mi4 rom version followed build 14291 released existing windows 10 devices march 17 2016 conjunction official rtm release windows 10 mobile third fourth-generation lumias following week became available newly upgraded older lumias addition several devices already windows 10 mobile time supported devices subsequently received insider preview builds far build 15063 creators update released march 20 2017 included official release build 14393 anniversary update august 2 2016 however announced april 2017 many devices including third-generation lumias would receive rtm version creators update redstone development builds following feedback users devices remain supported nearly except lumia 640 xl variant originally come windows 10 mobile instead windows phone 8.1
[ 11270, 5643, 4624, 11283, 537, 540, 3102, 9762, 8227, 8740, 11301, 1577, 6697, 10281, 7212, 1581, 2101, 8757, 10812, 3648, 582, 10310, 1098, 7754, 10828, 4173, 4174, 6221, 9808, 4178, 10839, 603, 9819, 8798, 3170, 10338, 8296, 617, 5225, ...
Test
7,797
9
MARK_IV_(software):mark iv software mark iv fourth-generation programming language created informatics inc. 1960s informatics took advantage ibm decision mark iv first software product cumulative sales 10 million mark iv developed ibm systems 360 370 rca spectra 70 main benefit allowing faster application development order 6 10 times faster system using 3gl cobol mark iv early 4gl allowed user development systems related business 1971 ad informatics several quotes customers mark iv went sterling software 1985 part company acquisition informatics general vision builder part product suite computer associates
[ 4042, 284 ]
Test
7,798
4
Reverse_Deception:reverse deception reverse deception organized cyber threat counter-exploitation textbook investigates two topics first provides methods criteria rectify advanced persistent threats secondly covers cyber deception ieee review noted masterful presentation deception details identity apts prioritize actions applying skilled field-tested private- government- sector processes methods often involves cyber deception identified richard austin ieee review masterful presentation deception clear work interest different governments several currently involved considering future actions weaponizing cyber capabilities appears recommended reading lists notable u.s. military institutions including u.s. navy war college counterintelligence cyber threat section joint special operations university site military organizations made efforts similar manner people republic china prc considered active apt market special military effort undertaken translate simplified chinese prc national defense university press authors introduce first theory model classifying threat opportunistic-apt continuum either persistent non-persistent widely used industry built evaluation following criteria apt criteria additional content includes beer p. d. basie s. v. 2013 case cyber counterintelligence 2013 international conference adaptive science technology doi:10.1109/icastech.2013.6707493 carli l. d. sommer r. jha s. 2014 beyond pattern matching proceedings 2014 acm sigsac conference computer communications security ccs 14. doi:10.1145/2660267.2660361 csanádi g. 2015 cyber war poor man weapon mass destruction new whip hands rich defence review central journal hungarian defence forces,143 2015th ser. 154-174 chung k. kamhoua c. a. kwiat k. a. kalbarczyk z. t. iyer r. k. 2016 game theory learning cyber security monitoring 2016 ieee 17th international symposium high assurance systems engineering hase doi:10.1109/hase.2016.48 conti g. weigand m. skoudis e. raymond d. cook t. t. a. ragsdale d. 2014 towards cyber leader course weak faint hearted 3rd ed. vol 1337 rep. west point ny army cyber institute department electrical engineering computer science united states military academy gardner b 2018 social engineering non-linear warfare journal applied digital evidence 1 1 heckman k. e. stech f. j. thomas r. k. schmoker b. tsow a. w. 2015 cyber denial deception counter deception framework supporting active cyber defense heginbotham e. nixon m. morgan f. e. heim j. l. hagen j. li s. morris l. j 2015 u.s.-china military scorecard forces geography evolving balance power 1996 2017 santa monica ca rand henderson b. t. 2018 honeypot spies understanding internet-based data theft unpublished master thesis naval postgraduate school holguín j. m. moreno m. merino b 2013 detección de apts p. 9 rep. jajodia s. subrahmanian v. s. swarup v. wang c. 2016 cyber deception building scientific foundation lucas e. 2017 cyberphobia identity trust security internet bloomsbury maozhi y. ziwei l. 2015 mission scale chinese communist party strategic support force 中共戰略支援部隊的任務與規模 y. lin trans. pavlíková m. 2016 cyber operations russia ukraine ukrainian conflict obrana strategie defence strategy ,16 1 77-94. doi:10.3849/1802-7199.16.2016.1.077-094 rowe n. c. rrushi j 2018 introduction cyberdeception springer saadawi t. n. jordan l. boudreau v. colwell j 2011 cyber infrastructure protection carlisle pa strategic studies institute u.s. army war college sowa 2019 it-revision bei betrugsaufdeckung investigation und prüfung doloser handlungen it-revision it-audit und it-compliance,95-121 doi:10.1007/978-3-658-23765-3_4 wrightson t. 2015 advanced persistent threat hacking art science hacking organization ny ny mcgraw-hill education
[ 3843, 4133, 357, 9256, 7440, 2324, 7703, 9688, 9950, 5087 ]
Validation
7,799
5
Comparison_of_T-carrier_and_E-carrier_systems:comparison t-carrier e-carrier systems ds designations used connection north american hierarchy strictly speaking ds1 data carried t1 circuit likewise ds3 t3 practice terms used interchangeably data rates use e.g. military systems operate six eight times ds1 rate least one manufacturer commercial system operates 90 mbit/s twice ds3 rate new systems take advantage high data rates offered optical communications links also deployed development higher data rates often achieved using synchronous optical networking sonet synchronous digital hierarchy sdh ds3 delivered native copper trunk ds3 may converted optical fiber run needing longer distances termination points ds3 delivered fiber still analog type trunk connection termination points delivering data oc3 greater sonet used ds3 transported sonet encapsulated sts-1 sonet channel oc-3 sonet link contains three sts-1s therefore may carry three ds3s likewise oc-12 oc-48 oc-192 may carry 12 48 192 ds3s respectively
[ 8192, 10100, 4963, 3156 ]
None
7,800
8
Link_contract:link contract link contract approach data control distributed data sharing network link contracts key feature xdi specifications development oasis xdi link contract machine-readable xdi document governs sharing xdi data unlike conventional web link essentially one-dimensional string pulls linked document browser link contract graph metadata typically json actively control flow data publisher subscriber either push pull flow controlled terms contract flexible extensible real-world contracts i.e. link contracts govern like real-world contracts link contracts also refer link contracts using design vast majority link contracts simple referring small number complex link contracts carefully designed reflect requirements common data exchange scenarios e.g. business cards mailing lists e-commerce transactions website registrations etc link contracts proposed key element digital trust frameworks published non-profit open identity exchange
[ 4979 ]
Test
7,801
3
Namco_System_11:namco system 11 namco system 11 arcade system board released namco 1994 actual hardware based sony playstation home console thus many games ported console major difference two system 11 used surface-mounted rom chips store game data whereas playstation used cd-rom meant system 11 games unique particular system board could swapped another game system 11 succeeded system 12 design although system 11 technically inferior sega model 2 arcade board lower price made attractive prospect smaller arcades according june 1995 issue edge psx based
[ 643, 9091, 3077, 11398, 10761, 6799, 9508, 6311, 9512, 684, 306, 1587, 7234, 1091, 9543, 10056, 6732, 10316, 6738, 6873, 859, 4060, 607, 359, 8937, 6250, 1776, 3824, 5746, 7028, 8316, 6781 ]
Test
7,802
3
Scalability:scalability scalability property system handle growing amount work adding resources system economic context scalable business model implies company increase sales given increased resources example package delivery system scalable packages delivered adding delivery vehicles however packages first pass single warehouse sorting system would scalable one warehouse handle limited number packages computing scalability characteristic computers networks algorithms networking protocols programs applications example search engine must support increasing numbers users number topics indexes incident command system ics emergency management system used across emergency response agencies united states ics scale resource coordination single-engine roadside brushfire interstate wildfire first resource scene establishes command authority order resources delegate responsibility managing five seven officers delegate seven incident grows incident expands senior officers assume command scalability measured multiple dimensions resources fall two broad categories horizontal vertical scaling horizontally out/in means adding nodes removing nodes system adding new computer distributed software application example might involve scaling one web server three high-performance computing applications seismic analysis biotechnology workloads scaled horizontally support tasks would required expensive supercomputers workloads large social networks exceed capacity largest supercomputer handled scalable systems exploiting scalability requires software efficient resource management maintenance scaling vertically up/down means adding resources removing resources single node typically involving addition cpus memory storage single computer larger numbers elements increases management complexity sophisticated programming allocate tasks among resources handle issues throughput latency across nodes applications scale horizontally note network function virtualization defines terms differently scaling out/in ability scale add/remove resource instances e.g virtual machine whereas scaling up/down ability scale changing allocated resources e.g memory/cpu/storage capacity scalability databases requires database system able perform additional work given greater hardware resources additional servers processors memory storage workloads continued grow demands databases followed suit algorithmic innovations include row-level locking table index partitioning architectural innovations include shared nothing shared everything architectures managing multi-server configurations context scale-out data storage scalability defined maximum storage cluster size guarantees full data consistency meaning ever one valid version stored data whole cluster independently number redundant physical data copies clusters provide lazy redundancy updating copies asynchronous fashion called 'eventually consistent type scale-out design suitable availability responsiveness rated higher consistency true many web file hosting services web caches want latest version wait seconds propagate classical transaction-oriented applications design avoided many open source even commercial scale-out storage clusters especially built top standard pc hardware networks provide eventual consistency idem nosql databases like couchdb others mentioned write operations invalidate copies often n't wait acknowledgements read operations typically n't check every redundant copy prior answering potentially missing preceding write operation large amount metadata signal traffic would require specialized hardware short distances handled acceptable performance i.e act like non-clustered storage device database whenever strong data consistency expected look indicators indicators eventually consistent designs suitable transactional applications often advised focus system design hardware scalability rather capacity typically cheaper add new node system order achieve improved performance partake performance tuning improve capacity node handle approach diminishing returns discussed performance engineering example suppose 70 program sped parallelized run multiple cpus instead one formula_1 fraction calculation sequential formula_2 fraction parallelized maximum speedup achieved using p processors given according amdahl law substituting value example using 4 processors get double compute power 8 processors get doubling processing power improved speedup roughly one-fifth whole problem parallelizable speed would also double therefore throwing hardware necessarily optimal approach context high performance computing two common notions scalability
[ 8706, 5, 9222, 9225, 4107, 6156, 8204, 7699, 8725, 1047, 1049, 2586, 7204, 39, 6184, 10792, 50, 7218, 9782, 10807, 2113, 1606, 7753, 4696, 2140, 4194, 9314, 4708, 10340, 5223, 8810, 4205, 9837, 3696, 11377, 6774, 3197, 9343, 10368, 11393,...
Test
7,803
9
Krypton_(programming_language):krypton programming language krypton styled krypton frame-based computer programming language
[ 8262 ]
Test
7,804
2
Privilege_(computing):privilege computing computing privilege defined delegation authority perform security-relevant functions computer system privilege allows user perform action security consequences examples various privileges include ability create new user install software change kernel functions users delegated extra levels control called privileged users lack privileges defined unprivileged regular normal users privileges either automatic granted applied automatic privilege exists requirement permission perform action example systems people required log system use logging require privilege systems implement file protection ms-dos essentially give unlimited privilege perform action file granted privilege exists result presenting credential privilege granting authority usually accomplished logging system username password username password supplied correct user granted additional privileges privilege applied either executed program issuing request advanced privileges running program apply additional privileges example user applying additional privileges provided sudo command run command root user kerberos authentication system modern processor architectures multiple cpu modes allows os run different privilege levels processors two levels user supervisor i386+ processors four levels 0 3 least privileges tasks tagged privilege level resources segments pages ports etc privileged instructions tagged demanded privilege level task tries use resource execute privileged instruction processor determines whether permission protection fault interrupt generated prevents user tasks damaging os computer programming exceptions related privileged instruction violations may caused array accessed bounds invalid pointer dereferenced invalid memory location referenced privileged location one controlling device input/output particularly likely occur programming languages c use pointer arithmetic check array bounds automatically unix-like systems superuser commonly known 'root owns privileges ordinary users granted enough permissions accomplish common tasks unix systems built-in security features users set new user account administrative procedures user “ root ” special user something called super-user anything system high degree power necessary fully administer unix system also allows user make mistake cause system problems unprivileged users usually windows nt-based systems privileges delegated varying degrees delegations defined using local security policy manager secpol.msc following abbreviated list default assignments windows defines number administrative privileges assigned individually users and/or groups account user holds privileges granted either directly indirectly group memberships upon installation number groups accounts created privileges granted however grants changed later time though group policy unlike linux privileges implicitly permanently granted specific account administrative privileges e.g taking ownership restoring arbitrary files powerful used malicious intent could allow entire system compromised user account control default since windows vista windows strip user token privileges login thus user logs account broad system privileges he/she still running system privileges whenever user wants perform administrative actions requiring system privileges he/she elevated process launching elevated process user made aware his/her administrative privileges asserted prompt requiring his/her consent holding privileges actually required keeping principle least privilege elevated processes run full privileges user full privileges system even privileges user may still required particular process thus completely least privilege dos-based windows windows 98 windows 95 previous versions non-nt windows operated fat filesystem support filesystem permissions. therefore privileges effectively defeated windows nt-based systems use ntfs file system names used windows source code end either privilege logonright led confusion full set rights privileges called microsoft currently uses term user rights past terms also used microsoft privilege rights logon user rights nt-rights
[ 8976, 2193, 3857, 2323, 5397, 8344, 537, 10392, 6812, 3873, 3366, 9640, 174, 11184, 2097, 5682, 7601, 3254, 700, 6078, 3395, 9540, 5325, 9166, 6098, 10835, 3542, 728, 8281, 3419, 7515, 1379, 1509, 8551, 8815, 2164, 7030, 9336, 10361, 8954...
Test
7,805
9
S-expression:s-expression computing s-expressions sexprs sexps symbolic expression notation nested list tree-structured data invented popularized programming language lisp uses source code well data usual parenthesized syntax lisp s-expression classically defined second recursive part definition represents ordered pair means s-expressions binary trees definition atom varies per context original definition john mccarthy assumed existed infinite set distinguishable atomic symbols represented strings capital latin letters digits single embedded blanks i.e. character string numeric literals modern sexpr notations addition use abbreviated notation represent lists s-expressions stands codice_4 special end-of-list object alternatively written codice_5 representation scheme lisp family programming languages s-expressions used represent source code data uses s-expressions lisp-derived languages dsssl mark-up communications protocols like imap john mccarthy cbcl details syntax supported data types vary different languages common feature among languages use s-expressions prefix notation many variants s-expression format supporting variety different syntaxes different datatypes widely supported character codice_15 often used prefix extensions syntax e.g codice_16 hexadecimal integers codice_17 characters representing source code lisp first element s-expression commonly operator function name remaining elements treated arguments called prefix notation polish notation example boolean expression written codice_18 c represented codice_19 lisp s-expr-based prefix notation noted precise definition atom varies across lisp-like languages quoted string typically contain anything quote unquoted identifier atom typically contain anything quote whitespace characters parenthesis brackets braces backslash semicolon either case prohibited character typically included escaping preceding backslash unicode support varies recursive case s-expr definition traditionally implemented using cons cells s-expressions originally intended data manipulated m-expressions first implementation lisp interpreter s-expression encodings m-expressions lisp programmers soon became accustomed using s-expressions code data means lisp homoiconic primary representation programs also data structure primitive type language nested lists written s-expressions codice_20 two-element s-expression whose elements also two-element s-expressions whitespace-separated notation used lisp article typical line breaks newline characters usually qualify separators simple context-free grammar tiny subset english written s-expression gazdar/melish natural language processing lisp s=sentence np=noun phrase vp=verb phrase v=verb program code written s-expressions usually using prefix notation example common lisp s-expressions read lisp using function read read reads textual representation s-expression returns lisp data function print used output s-expression output read function read printed data objects readable representation lisp readable representations numbers strings symbols lists many data types program code formatted pretty printed s-expressions using function pprint note two ps short pretty -print lisp programs valid s-expressions s-expressions valid lisp programs codice_21 valid s-expression valid lisp program since lisp uses prefix notation floating point number 1.0 valid operation first element expression s-expression preceded single quotation mark codice_22 syntactic sugar quoted s-expression case codice_23 s-expressions often compared xml key difference s-expressions far simpler syntax therefore much easier parse standards lisp-derived programming languages include specification s-expression syntax include common lisp ansi standard document ansi incits 226-1994 r2004 scheme r5rs r6rs islisp may 1997 ron rivest submitted internet-draft considered publication rfc draft defined syntax based lisp s-expressions intended general-purpose data storage exchange similar xml rather specifically programming never approved rfc since cited used rfcs e.g rfc 2693 several publications originally intended use spki rivest format defines s-expression either octet-string series bytes finite list s-expressions describes three interchange formats expressing structure one advanced transport flexible terms formatting syntactically similar lisp-style expressions identical advanced transport example allows octet-strings represented verbatim string length followed colon entire raw string quoted form allowing escape characters hexadecimal base64 placed directly token meets certain conditions rivest tokens differ lisp tokens former convenience aesthetics treated exactly like strings latter specific syntactical meaning rivest draft defines canonical representation digital signature purposes intended compact easier parse unique abstract s-expression allows verbatim strings prohibits whitespace formatting outside strings finally basic transport representation either canonical form encoded base64 surrounded braces latter intended safely transport canonically encoded s-expression system might change spacing e.g email system 80-character-wide lines wraps anything longer format widely adapted use outside spki users gnupg libgcrypt nettle gnu lsh rivest s-expressions web page provides c source code parser generator available mit license could adapted embedded programs addition restrictions independently implementing format
[ 10752, 2050, 5635, 4101, 11269, 2056, 2062, 9231, 7184, 2577, 5651, 9749, 8728, 4633, 4122, 8226, 3119, 2105, 3132, 6717, 8258, 8771, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 2666, 10868, 5751, 1159, 9865, 9871, 9877, 5803, 2225, ...
None
7,806
2
NeXT:next next inc. later next computer inc. next software inc. american computer software company founded 1985 apple computer co-founder steve jobs name usually pronounced next based redwood city california company developed manufactured series computer workstations intended higher education business markets next founded jobs fired apple along several co-workers next introduced first next computer 1988 smaller nextstation 1990 next computers experienced relatively limited sales estimates 50,000 units shipped total nevertheless innovative object-oriented nextstep operating system development environment interface builder highly influential first major outside investment ross perot invested seeing segment next entrepreneurs 1987 invested 20 million exchange 16 percent next stock subsequently joined board directors 1988 next later released much nextstep system programming environment standard called openstep next withdrew hardware business 1993 concentrate marketing openstep mach openstep implementation several original equipment manufacturers oems next also developed webobjects one first enterprise web application frameworks webobjects never became popular initial high price 50,000 remains prominent early example web server based dynamic page generation rather static content apple purchased next 1997 429 million equivalent million 1.5 million shares apple stock part agreement steve jobs chairman ceo next software returned apple company co-founded 1976 founder promised merge software next apple hardware platforms eventually resulting macos ios watchos tvos operating systems completely based upon nextstep openstep foundation 1985 apple co-founder steve jobs led apple supermicro division responsible development macintosh lisa personal computers macintosh successful university campuses partly apple university consortium allowed students institutions buy computers discount consortium earned 50 million computers february 1984 chairman jobs visited university departments faculty members sell macintosh jobs met paul berg nobel laureate chemistry luncheon held silicon valley honor françois mitterrand president france berg frustrated expense teaching students recombinant dna textbooks instead wet laboratories used testing analysis chemicals drugs materials biological matter wet labs prohibitively expensive lower-level courses complex simulated personal computers time berg suggested jobs use influence apple create 3m computer workstation higher education featuring least one megabyte random-access memory ram megapixel display megaflops performance hence name 3m jobs intrigued berg concept workstation contemplated starting higher education computer company fall 1985 amidst increasing turmoil apple jobs division release upgraded versions macintosh much macintosh office system result sales plummeted apple forced write millions dollars unsold inventory apple chief executive officer ceo john sculley ousted jobs day-to-day role apple replacing jean-louis gassée 1985 later year jobs began power struggle regain control company board directors sided sculley jobs took business visit western europe soviet union behalf apple several months sidelined jobs resigned apple september 13 1985 told board leaving set new computer company would taking several apple employees supermicro division also told board new company would compete apple might even consider licensing designs back market macintosh brand jobs named new company next inc. number former apple employees followed next including joanna hoffman bud tribble george crow rich page susan barnes susan kare dan l lewin consulting major educational buyers around country including follow-up meeting paul berg tentative specification workstation drawn designed powerful enough run wet lab simulations cheap enough college students use dormitory rooms specifications finished however apple sued next nefarious schemes take advantage cofounders insider information jobs remarked hard think 2 billion company 4,300-plus people could n't compete six people blue jeans suit eventually dismissed trial 1986 jobs recruited famous graphic designer paul rand create brand identity costing 100,000 jobs recalled asked would come options said 'no solve problem pay ’ use solution want options go talk people rand created 20-page brochure detailing brand including precise angle used logo 28° new company name spelling next next changed business plan mid-1986 company decided develop computer hardware software instead low-end workstation team led avie tevanian joined company working one mach kernel engineers carnegie mellon university develop nextstep operating system hardware division led rich page — one cofounders previously led apple lisa team — designed developed hardware next first factory completed fremont california 1987 capable producing 150,000 machines per year next first workstation officially named next computer although widely termed cube distinctive case 1 ft magnesium cube designed apple iic case designer frogdesign accordance edict jobs original design team anticipated releasing computer us 3,000 spring 1987 ready sale summer year next computer received standing ovations revealed lavish invitation-only gala event next introduction — introduction next generation computers education louise m. davies symphony hall san francisco california wednesday october 12 1988 following day selected educators software developers invited 100 registration fee attend first public technical overview next computer event called next day held san francisco hilton event gave developers interested developing next software insight software architecture object-oriented programming developing next computer luncheon speaker steve jobs first machines tested 1989 next started selling limited numbers universities beta version nextstep operating system installed initially next computer targeted u.s. higher education establishments base price 6,500 machine widely reviewed magazines generally concentrating hardware asked upset computer debut delayed several months jobs responded late computer five years ahead time next computer based new 25 mhz motorola 68030 central processing unit cpu motorola 88000 risc chip originally considered available sufficient quantities included 8 64 mb random-access memory ram 256 mb magneto-optical mo drive 40 mb swap-only 330 mb 660 mb hard disk drive 10base2 ethernet nubus 17-inch megapixel grayscale display measuring 1120 832 pixels 1989 typical new pc macintosh amiga computer included megabytes ram 640×480 16-color 320x240 4000-color display 10 20 megabyte hard drive networking capabilities also first computer ship general-purpose dsp chip motorola 56001 motherboard used support sophisticated music sound processing including music kit software magneto-optical drive manufactured canon inc. used primary mass storage device drives relatively new market next first computer use cheaper hard drives blank media especially though cost 150 canon jobs negotiations saw canon agree retail 50 apiece slower average seek time 96 ms design made impossible move files computers without network since next computer one mo drive disk could removed without shutting system storage options proved challenging first next computers magneto-optical media relatively expensive performance reliability problems despite faster floppy drive drive sufficient run primary medium running nextstep operating system terms speed capacity 1989 next struck deal former compaq reseller businessland sell next computers select markets nationwide selling retailer major change next original business model selling directly students educational institutions businessland founder david norman predicted sales next computer would surpass sales compaq computers 12 months 1989 canon invested us 100 million next giving 16.67 percent stake making next worth almost 600 million canon invested next condition would able use nextstep environment workstations would mean greatly expanded market software next exited hardware business canon produced line pcs called object.station including models 31 41 50 52 specifically designed run nextstep/intel canon also served next distributor japan next computers first released retail market 1990 9,999 next original investor ross perot resigned board directors june 1991 dedicate time perot systems plano texas-based systems integrator next released second generation workstations 1990 new range included revised next computer renamed nextcube nextstation nicknamed slab pizza box case form-factor jobs explicit ensuring next staff use latter terminology lest next machines compared competing sun workstations already nickname magneto-optical drive replaced 2.88 mb floppy drive 2.88 mb floppy disks expensive technology supplant 1.44 mb floppy realizing next utilized cd-rom drive eventually became industry standard storage color graphics available nextstation color nextdimension graphics processor hardware nextcube new computers cheaper faster predecessors new motorola 68040 processor 1992 next launched turbo variants nextcube nextstation 33 mhz 68040 processor maximum ram capacity increased 128 mb next sold 20,000 computers 1992 next counted upgraded motherboards back order system sales — small number compared competitors however company reported sales 140 million year encouraging canon invest 30 million keep company afloat total 50,000 next machines sold including thousands super secret national reconnaissance office located chantilly virginia next long-term aim migrate risc reduced instruction set computing architecture processor design strategy intended increase performance project known next risc workstation nrw initially nrw based motorola 88110 processor due lack confidence motorola commitment 88000-series architecture later redesigned around dual powerpc 601s next produced motherboards enclosures exited hardware business full production next computers delivered mathematica pre-installed several developers used next platform write pioneering programs tim berners-lee used next computer 1990 create first web browser web server accordingly next instrumental development world wide web next used professors scientific engineering applications developing finished newspaper layouts using news george mason university early 1990s set next workstations publishing well silicon graphics cad/gl mathematica astrophysics games doom quake developed id software next machines games based doom engine heretic raven software well strife rogue entertainment also developed next hardware using id tools commercial programs released next computers including altsys virtuoso vector drawing program page-layout features ported mac os microsoft windows aldus freehand v4 lotus improv spreadsheet program systems bundled number smaller built-in applications merriam-webster collegiate dictionary oxford quotations complete works william shakespeare digital librarian search engine access next started porting nextstep operating system ibm pc compatible computers using intel 80486 processor late 1991 change business strategy withdraw hardware business entirely demonstration port displayed nextworld expo january 1992 mid-1993 product complete version 3.1 also known nextstep 486 released prior release chrysler planned buy 3,000 copies 1992 nextstep 3.x later ported pa-risc sparc-based platforms total four versions nextstep/next next 68k black boxes nextstep/intel nextstep/pa-risc nextstep/sparc although ports widely used nextstep gained popularity institutions first chicago nbd swiss bank corporation o'connor company organizations owing programming model used many american federal agencies united states naval research laboratory national security agency advanced research projects agency central intelligence agency national reconnaissance office ibm pc clone vendors offered somewhat customized hardware solutions delivered running nextstep intel elonex nextstation canon object.station 41 next withdrew hardware business 1993 company renamed next software inc consequently 300 540 staff employees laid next negotiated sell hardware business including fremont factory canon later pulled deal work powerpc machines stopped along hardware production ceo sun microsystems scott mcnealy announced plans invest 10 million 1993 use next software future sun systems next partnered sun create openstep nextstep application layer hosted third party operating system exiting hardware business next focused operating systems effect returning original business plan new products based openstep released including openstep enterprise version microsoft windows nt company launched webobjects platform building large-scale dynamic web applications many large businesses including dell disney worldcom bbc used webobjects short time eventually webobjects used solely power apple itunes store corporate website discontinuing apple computer announced intention acquire next december 20 1996 apple paid 429 million cash went initial investors 1.5 million apple shares went steve jobs deliberately given cash part deal main purpose acquisition use nextstep foundation replace dated classic mac os instead beos in-development copland deal finalized february 7 1997 bringing jobs back apple consultant later appointed interim ceo 2000 jobs took ceo position permanent assignment holding position resignation august 24 2011 jobs died six weeks later october 5 2011 complications relapsed pancreatic neuroendocrine tumor several next executives replaced apple counterparts steve jobs restructured company board directors next five years nextstep operating system ported powerpc architecture time intel port openstep enterprise toolkit windows produced operating system code named rhapsody toolkit development platforms called yellow box backwards compatibility apple added blue box rhapsody allowing existing mac applications run self-contained cooperative multitasking environment server version new operating system released mac os x server 1.0 1999 first consumer version mac os x 10.0 2001 openstep developer toolkit renamed cocoa rhapsody blue box renamed classic environment changed run applications full-screen without requiring separate window apple included updated version original macintosh toolbox called carbon gave existing mac applications access environment without constraints blue box nextstep interface features used mac os x including dock services menu finder column view cocoa text system nextstep processor-independent capabilities retained mac os x leading powerpc intel x86 versions although powerpc versions publicly available 2006 apple moved intel processors august 2006 jobs created different corporate culture next terms facilities salaries benefits jobs experimented structural changes apple next abandoned conventional corporate structures instead making community members instead employees two different salaries next early 1990s team members joined 1986 paid 75,000 joined afterwards paid 50,000 caused awkward situations managers paid less employees employees given performance reviews raises every six months spartan salary plans foster openness employees full access payrolls although employees ever took advantage privilege next health insurance plan offered benefits married couples unmarried couples same-sex couples although latter privilege later withdrawn due insurance complications payroll schedule also different companies silicon valley time instead getting paid twice month arrears end pay period employees would get paid month advance beginning words jobs found office space palo alto california 3475 deer creek road occupying glass concrete building featured staircase designed architect i. m. pei first floor used hardwood flooring large worktables workstations would assembled avoid inventory errors next used just-in-time jit inventory strategy company contracted major components mainboards cases finished components shipped first floor assembly second floor office space open floor plan enclosed rooms jobs office conference rooms next expanded office space needed company rented office 800 900 chesapeake drive redwood city also designed pei architectural centerpiece floating staircase visible supports open floor plan retained although furnishings became luxurious 5,000 chairs 10,000 sofas ansel adams prints next first campus palo alto subsequently occupied sap ag second campus redwood city occupied apnicure oncomed pharmaceuticals inc first issue nextworld magazine printed 1991 published san francisco integrated media edited michael miley later dan ruby mainstream periodical discuss next computers operating system next software publication discontinued 1994 four volumes nextworld expo followed developer conference held 1991 1992 san francisco civic center 1993 1994 moscone center san francisco steve jobs keynote speaker though profitable company wide-ranging impact computer industry object-oriented programming graphical user interfaces became common 1988 release nextcube nextstep technologically successful platform often held trendsetter companies started emulate success next object-oriented system widely seen response next microsoft announced cairo project 1991 cairo specification included similar object-oriented user interface features coming consumer version windows nt although cairo ultimately abandoned elements integrated projects 1994 microsoft next collaborating windows nt port openstep never released 1993 taligent considered press competitor objects operating systems even without product release next main point comparison first years taligent theoretical newness often compared next older mature commercially established platform taligent debut release 1995 called little late especially compared next webobjects failed achieve wide popularity partly initial high price us 50,000 remains first prominent early example web application server enabled dynamic page generation based user interactions opposed static content webobjects bundled macos server xcode
[ 10755, 9732, 1549, 7697, 4114, 8725, 11289, 3107, 6186, 6700, 1074, 9784, 8253, 576, 5194, 8783, 9295, 4180, 10838, 5210, 6234, 9826, 1123, 5733, 8806, 3691, 8303, 8304, 5235, 2676, 3191, 6264, 124, 2686, 6783, 10878, 1666, 2179, 7299, 13...
Test
7,807
7
Seeks:seeks seeks free open-source project licensed affero general public license version 3 agplv3 exists create alternative current market-leading search engines driven user concerns rather corporate interests original manifesto created emmanuel benazera sylvio drouin published october 2006 project active development april 2014 stable releases engine revisions source code available public use september 2011 seeks innovation award open world forum innovation awards seeks source code updated since april 28 2014 seeks nodes usable since february 6 2016 seeks aims give control ranking results users search algorithms often less accurate humans relies distributed collaborative filter let users personalize share preferred results search also openness source code users verify modify collaborative filter fit needs currently seeks used three main forms
[ 8640, 7656, 7276, 7983, 113, 3573, 823, 1274 ]
Test
7,808
9
Greg_Morrisett:greg morrisett john gregory greg morrisett dean faculty computing information science cornell university morrisett allen b cutting professor computer science harvard school engineering applied sciences prior position cornell group cornell university created cyclone programming language current research interests applications programming language technology building secure reliable systems particular interested applications advanced type systems model checkers certifying compilers proof-carrying code inlined reference monitors building efficient provably secure systems also interested design application high-level languages new emerging domains sensor networks received phd jeannette wing robert harper carnegie mellon university 1995 2013 became fellow association computing machinery
[ 11505, 5074, 7394, 1783 ]
None
7,809
4
Kaspersky_Lab:kaspersky lab kaspersky lab russian лаборатория касперского laboratoriya kasperskogo multinational cybersecurity anti-virus provider headquartered moscow russia operated holding company united kingdom founded 1997 eugene kaspersky natalya kaspersky alexey de-monderik eugene kaspersky currently ceo kaspersky lab develops sells antivirus internet security password management endpoint security cybersecurity products services kaspersky expanded abroad 2005–2010 grew 698 million annual revenues 2017 8 2016 though annual revenues 8 north america due u.s. government security concerns 2016 software 400 million users largest market-share cybersecurity software vendors europe kaspersky lab ranks fourth global ranking antivirus vendors revenue first russian company included rating world leading software companies called software top 100 79th list 6/29/2012 kaspersky lab ranked 4th endpoint security segment according idc data 2010 according gartner kaspersky lab currently third largest vendor consumer security software worldwide fifth largest vendor enterprise endpoint protection kaspersky lab named leader gartner magic quadrant endpoint protection platforms kaspersky global research analysis team great led discovery sophisticated espionage platforms conducted nations equation group stuxnet worm various covert government-sponsored cyber-espionage efforts uncovered research kaspersky also publishes annual global security risks survey 2014 kaspersky research hubs analyze 350,000 malware samples per day kaspersky faced controversy allegations engaged russian federal security service fsb —ties company actively denied u.s. department homeland security banned kaspersky products government departments 13 september 2017 october 2017 subsequent reports alleged hackers working russian government stole confidential data home computer american national security agency contractor via kaspersky antivirus software kaspersky denied allegations reporting software detected equation group malware samples uploaded servers analysis normal course operation company since announced commitments increased accountability soliciting independent reviews verification software source code announcing would migrate core infrastructure foreign customers russia switzerland first version kaspersky lab antivirus software developed eugene kaspersky 1989 response cascade virus early versions 40 virus definitions mostly distributed friends family members eugene continued developing software kami resulting antiviral toolkit pro avp product released 1992 popularized 1994 competitive analysis hamburg university gave eugene software first place 1997 eugene kaspersky wife natalya kaspersky alexey de-monderik left kami form kaspersky lab continue developing antivirus product called avp product renamed kaspersky anti-virus american company registered avp trademark us 1998 taiwanese student released virus called cih first three weeks outbreak kaspersky lab avp software time able remove increased demand led deals antivirus companies japan finland germany integrate avp software according wired kaspersky software advanced time example first software monitor viruses isolated quarantine company revenue grew 280 percent 1998 2000 60 percent revenue coming foreign sales natalya worked broker deals abroad localize software opened offices uk poland holland china later expanded germany france us japan 2000 company 65 employees sales 40 countries kaspersky opened new offices south east asia middle east 2008 south africa 2009 also expanded india middle east africa 2010 2009 retail sales kaspersky lab antivirus products reached almost 4.5 million copies per year 2011 general atlantic bought 20 percent share kaspersky lab 200 million expectation helping company go public months later decision made keep firm private kaspersky re-purchased shares general atlantic followed numerous executive departures 2011 2014 regarding disputes going public eugene management style january 1 2012 kaspersky lab officially left business software alliance bsa sopa bsa supported controversial anti-piracy bill kaspersky lab support stating believe measures used contrary modern advances technology needs consumers show disapproval announced intent leave december 5 2011 2013 company unaudited 667 million annual revenues 2014 kaspersky lab signed distribution deal ingram micro significantly expanded reseller program august 2015 two former kaspersky employees alleged company introduced modified files virustotal antivirus database trick software kaspersky competitors triggering false positives virus malware scans possible motive eugene allegedly furious competitors perceived unfairly free-riding kaspersky malware discoveries via open-source virustotal database company denied allegations personal blog eugene kaspersky compared accusations unsubstantiated conspiracy theories reuters followed publishing leaked emails allegedly kaspersky alluding falsies rubbing foreign competitors kaspersky lab stated emails may legitimate obtained anonymous sources hidden agenda 2016 kaspersky executive ruslan stoyanov arrested russian authorities charges predating work kaspersky 2019 convicted treason kaspersky lab develops markets antivirus internet security password management endpoint security cybersecurity products services fourth fifth largest endpoint security vendor third largest consumer security software company sixth largest overall security company revenues 15 percent russian companies domestically one-third european organizations one-fourth u.s. organizations software 400 million users kaspersky consumer software include antivirus internet security total security products antivirus software includes malware protection monitors pc suspicious program behavior warns users potentially dangerous websites internet security software adds privacy features parental controls anti-phishing tools total security adds parental controls adult website filters diagnostic tools password manager application features kaspersky software available macs pcs android ios windows mobile blackberry symbian businesses company markets kaspersky endpoint security business suite includes centralized user interface management application called kaspersky security center cybersecurity software called kaspersky security network kaspersky administration kitsecurity center manages configuration installation remote use business suite also quarantine reporting features software product businesses 25 staff less called kaspersky small office security ksos within suite products specifically virtualization security mobile security fraud protection among others kaspersky also develops free tool helps businesses gain access windows devices infected ransomware kaspersky anti-virus engine also powers products solutions security vendors check point bluecoat juniper networks microsoft forefront netintelligence clearswift frontbridge netasq wedge networks others altogether 120 companies licensing technology kaspersky lab kaspersky lab also number partnerships various technology companies international multilateral partnership cyber threats datuk mohd noor amin acts chairman announced appointment harry cheung – managing director kaspersky lab apac – goodwill ambassador greater china kaspersky lab runs several global sponsorships example scuderia ferrari racing team geographical expeditions according pc magazine kaspersky antivirus competitor bitdefender consistently ranked top independent competitive tests pc magazine malware phishing tests similar results praised software bonus security tools cons magazine said took longer-than-expected complete scan magazine said kaspersky total security product impressive feature list praised extra features total security product like password management encryption parental controls pc magazine said product scored highly lab tests antivirus antiphishing features so-so scores antimalware tests n't able catch spam kaspersky 2013 endpoint security windows product top-ranked enterprise antivirus software competitive test dennis technology labs followed symantec endpoint protection av-comparatives awarded kaspersky product year 2015 based number high scores gotten throughout year wide range tests pc magazine praised software features said lacked policy management deployment options kaspersky parental controls software reviewed pc magazine reviewer said well-rounded affordable parental control monitoring praised software content filtering child profiles social media monitoring features criticize features available ios android anti-virus software testing group av-comparatives gave windows xp version kaspersky av advanced+ rating highest february 2008 on-demand detection test fourth highest detection rate among 16 products tested however retrospective/proactive test may 2008 kaspersky received standard rating detecting 21 new malware 1-month old signatures receiving substantial amount false positives firewall included kaspersky internet security 7.0 got good rating matousec firewall challenge result 85 kaspersky anti-virus 7.0 achieved 6.5 result 8 anti malware labs rootkit detection test also achieved 31 33 detection polymorphic viruses 97 result self-protection test 2007 kaspersky internet security 7 received award british magazine pc pro also place list kaspersky passed virus bulletin comparative tests since august 2003 2005 according pc world magazine kaspersky anti-virus software provided fastest updates new virus security threats industry pc world magazine march 2010 comparison consumer security suites kaspersky internet security 2010 scored 4.5/5 stars rated second overall december 2011 version av-comparatives annual reports kaspersky lab software achieved highest overall ranking earned av comparatives product year award 1 february 2012 kaspersky internet security earned av-test award best repair 2011 award field home user products av-test institute 28 january 2013 kaspersky endpoint security earned av-test award best protection 2012 av-test award best repair 2012 awards field corporate products av-test institute later 2013 kaspersky earned product year award av-comparatives highest score among enterprise solutions dennis technology labs report kaspersky also received certification products oesis ok certification program verifies applications interoperable third-party technology solutions like nac ssl vpn products cisco systems juniper networks f5 networks others kaspersky lab global research analysis team great established 2008 investigates cybersecurity threats work malware operations security companies often evaluated ability uncover previously unknown viruses vulnerabilities kaspersky reputation investigating cyber-security threats influential gaining sales prestige beginning around 2010 kaspersky exposed series government-sponsored cyber-espionage sabotage efforts include stuxnet duqu flame gauss regin equation group according wired many seemingly launched us uk israeli allies kaspersky especially well-known work uncovering stuxnet flame 2010 kaspersky lab worked microsoft counter-act stuxnet worm infected 14 industrial locations iran using four zero-day vulnerabilities microsoft windows according ieee spectrum circumstances strongly suggest worm developed united states israel damage centrifuges iran nuclear-enrichment program first discovery major government-sponsored cyber-attack may 2012 kaspersky lab identified malware flame researcher described potentially sophisticated cyber weapon yet unleashed according researchers kaspersky lab malware infected estimated 1,000 5,000 machines worldwide asked united nations international telecommunications union investigate reports virus affecting iranian oil ministry computers kaspersky lab investigated discovered md5 hash filename appeared customer machines middle eastern nations discovering pieces researchers dubbed program flame name one modules flame earlier variant stuxnet kaspersky never verified source software suspected developed national security agency nsa transmit keystrokes skype calls data kaspersky created algorithms find similar malware found gauss july collected transmitted data devices infected bluetooth usb drives january 2013 kaspersky discovered red october malware used widespread cyber-espionage five years targeted political targets like embassies nuclear sites mostly europe switzerland north america malware likely written russian-speaking hackers exploits chinese hackers june kaspersky discovered nettraveler said obtaining data emerging technology government targets oil companies kaspersky identify behind similar cyber-espionage coming beijing china later year kaspersky discovered hacker group called icefog investigating cybersecurity attack japanese television company kaspersky said hacker group possibly china unique targeted specific files seemed know planting malware extract february 2014 kaspersky identified malware mask infected 380 organizations 31 countries many organizations affected morocco files spanish group believed nation-state conducting espionage kaspersky speculate country may developed november 2014 symantec kaspersky authored papers contained first disclosure malicious software named regin according kaspersky regin similar qwerty malware program discovered next year regin used take remote control computer believed originated five eyes alliance month kaspersky reported darkhotel attack targeted users wireless networks hotels asia asked users update software downloaded malware gave passwords 2015 kaspersky identified highly sophisticated threat actor called equation group group incorporated sophisticated spying software firmware hard drives banks government agencies nuclear researchers military facilities countries frequent targets us intelligence efforts suspected developed national security agency nsa included many unique technical achievements better avoid detection day kaspersky announced discovery hacker group called carbanak targeting banks moving millions dollars fake accounts carbanak discovered one bank asked kaspersky investigate suspicious behavior atms similar malware using techniques carbanak discovered 2016 dubbed carbanak 2.0 june 2015 kaspersky reported network infiltrated government-sponsored malware evidence suggested malware created developers duqu stuxnet order get intelligence would help better avoid detection kaspersky future kaspersky called duqu 2.0 malicious software resided memory avoid detection hack believed done group duqu 2011 used exploits microsoft installer files june 2015 kaspersky lab citizen lab independently discovered software developed hacking team used 60 governments around world covertly record data mobile phones citizens software gave police enforcement menu features access emails text messages keystrokes call history data kaspersky also identified 37,000 attacks banking companies used modifications malware called asacub took control android devices asacub targeted mostly banking customers u.s. russia ukraine using sms message baited users installing trojan 2016 kaspersky discovered zero day vulnerability microsoft silverlight kaspersky identified string code often used exploits created suspected author used yara rules network kaspersky software users find string code uncover rest exploit afterwards microsoft issued critical software patch protect software vulnerability 2016 kaspersky uncovered poseidon group would infiltrate corporations malware using phishing emails get hired company security firm correct problem hired poseidon would install additional malware backdoors june 2016 kaspersky helped uncover russian hacking group leading 50 arrests since 2015 kaspersky alleged close ties russian government various western media outlets finally us government 2017 president trump signed legislation ban software kaspersky government computers us government institutions prohibited buying installing kaspersky software computers devices
[ 2049, 9750, 1052, 9761, 550, 2601, 6699, 3116, 5178, 10308, 6728, 7251, 2654, 2147, 9832, 10348, 10872, 4732, 9341, 1662, 127, 9346, 131, 5764, 6797, 10385, 150, 665, 3225, 3739, 156, 2717, 3742, 9375, 161, 2721, 675, 2213, 6823, 3243, ...
Validation
7,810
6
Ntfsresize:ntfsresize ntfsresize free unix utility non-destructively resizes ntfs filesystem used windows nt 4.0 2000 xp 2003 vista 7 8 10 typically hard-disk partition ntfs versions used 32-bit 64-bit windows supported defragmentation required prior resizing since version 1.11.2. ntfsresize included ntfsprogs package developed linux-ntfs project n't unix system installed still possible run ntfsresize using one many linux live cds
[ 3969, 546, 10851, 9320, 1801, 4074, 1101, 8909, 4815, 2864, 2193, 3250, 8147, 5492, 11667, 823, 10971, 1150 ]
None
7,811
5
INAP:inap inap stands intelligent network application protocol intelligent network application part signalling protocol used intelligent networking part signalling system 7 ss7 protocol suite typically layered top transaction capabilities application part tcap also termed logic controlling telecommunication services migrated traditional switching points computer based service independent platform international telecommunication union itu defines several capability levels protocol starting capability set 1 cs-1 typical application number translation service example united kingdom 0800 numbers freephone numbers translated geographic number using platform telephone exchanges decode 0800 numbers trigger exchange connects telephone exchange uses transaction capabilities application part tcap signaling connection control part sccp inap terms service switching point ssp sends inap initial detection point idp message service control point scp scp returns inap connect message contains geographic number forward call inap messages defined using asn.1 encoding sccp used routing extended form inap customised applications mobile networks enhanced logic camel tcap used separate transactions discrete units
[ 706, 5704, 7120, 10864, 11286, 7865, 1437 ]
None
7,812
2
Linux_range_of_use:linux range use linux kernel-based operating systems widely adopted wide range uses advantages benefits free open-source software apply linux kernel rest system software common human interface devices hids available desktop computers laptops similar devices determine design graphical human-computer interface implemented software software packages choose among building accordingly designed graphical user interface generic input driver linux kernel evdev several input methods implemented middleware i.e. atop part linux kernel adoption proving linux kernel suitable gaming platform course added software needed either augment typical desktop installation suitable gaming platform create linux-based operating system dedicated gaming platform abundance server software cf client–server model supporting various communications protocols http web server smtp mail transfer agents pop3 imap e-mail server lightweight directory access protocol ldap server message block smb-cifs samba simple network management protocol snmp system network monitoring session initiation protocol sip various routing protocols run partly exclusively linux kernel software bundles also called solution stacks widely adopted acronyms become well known examples include dynamic web pages cloud computing three types virtualization hardware-based software-based paravirtualization implemented projects run linux linux-exclusive linux kernel customized adapted hardened various scenarios especially operation bastion host already mainlined developed maintained out-of-tree linux kernel-based operating systems still employed routing servers server computers commodity hardware cases professional routing equipment cisco catalyst either overkill costly components linux kernel netfilter linux network scheduler along available free open-source routing daemons bird internet routing daemon bird b.a.t.m.a.n. quagga xorp fulfill task well low-cost low-performance routing performed wireless routers running openwrt anonymity routing solution tor cross-platform exclusive linux components linux kernel logical volume manager lvm well suited support computer clusters also software managing clusters e.g. pacemaker linux-ha drbd ovirt openqrm ganeti eucalyptus appscale opennebula single system image multi system image clusters least linuxpmi openssi open-sharedroot diskless shared-root cluster kerrighed available three solutions operating-system-level virtualization linux-vserver lxc openvz offer similarities freebsd jails solaris containers linux operating systems runs virtualized xen micro-kernel-type hypervisor published license linux kernel gnu gpl 2.0 kvm possible turn linux kernel hypervisor managing libvirt libguestfs several utilities building programs openstack controller nodes run exclusively linux compute nodes cross-platform software projects serving similar use-case openstack nimbus ganeti appscale opennebula eucalyptus openqrm one best known linux-based operating systems mobile devices smartphones android operating system android employs modified linux kernel combines libbionic instead glibc surfaceflinger display server replacements specifically written purpose many mobile devices touchscreen sole human interface device hid gui partly middleware operating system adapted enable software designers create according human-computer interface linux kernel gained wide use operating systems used embedded systems real-time non-real-time variants patches exist transform linux kernel real-time kernel termed real-time operating system rtos several actively maintained minimally operating system includes less modified linux kernel uclibc busybox non-rtos variants exist openwrt also linux distribution use customer-premises equipment cpe devices like wireless routers rockbox based μclinux operating system portable media players fastest supercomputers decade since earth simulator used linux linux also ran first teraflops supercomputer asci red 1997 ibm roadrunner 2008 first petascale computer 500 100 world fastest supercomputers run operating system based linux kernel world ’ fastest supercomputer china ’ sunway taihulight powered colossal 650,000+ cpus runs customised version linux called ‘ sunway raiseos ’ processing speed 93 petaflops
[ 2560, 516, 4616, 3082, 5644, 5139, 9237, 10780, 4637, 10271, 10785, 3618, 6180, 9257, 1584, 8242, 9266, 1083, 3133, 4161, 10817, 8772, 6213, 8262, 8268, 589, 7248, 593, 2134, 3162, 3677, 2658, 4194, 6244, 5222, 10856, 6763, 4207, 118, 524...
Test
7,813
4
Suricata_(software):suricata software suricata open source-based intrusion detection system ids intrusion prevention system ips developed open information security foundation oisf beta version released december 2009 first standard release following july 2010 third-party tools available snort compatible suricata like following
[ 3714, 8770, 4777, 6345, 6797, 8141, 7983, 4561, 5874, 7153, 7889, 5245, 823, 186, 2045, 3486, 6559 ]
Test
7,814
3
Kernel_preemption:kernel preemption kernel preemption method used mainly monolithic hybrid kernels device drivers run kernel space whereby scheduler permitted forcibly perform context switch i.e preemptively schedule behalf runnable higher priority process driver part kernel execution rather co-operatively waiting driver kernel function system call complete execution return control processor scheduler two main benefits method monolithic hybrid kernels answer one main criticisms monolithic kernels microkernel advocates
[ 2345, 7983, 7057, 7187, 1207, 7483, 3197 ]
None
7,815
5
Inverse_Multiplexing_for_ATM:inverse multiplexing atm inverse multiplexing atm ima standardized technology used transport atm traffic bundle t1 e1 lines called ima group allows gradual increase data link capacity implementing higher capacity solution like t3/e3 sonet/sdh deemed feasible maximum number lines ima group 32 bringing total data rate roughly 64 mbit/s standard specification initially approved atm forum july 1997 later updated version 1.1 march 1999 atm cell insertion happens round robin fashion transparent terminal equipment ends link ima inverse multiplexing functionality requires overhead icp ima control protocol cells typically one icp cell every ima frame—commonly 128 cells length—and ctc common transmit clock mode icp stuff cell must inserted every 2048 cells ima sublayer physical layer
[ 4963, 7815, 4202, 3156, 1977 ]
None
7,816
1
Bigtable:bigtable bigtable compressed high performance proprietary data storage system built google file system chubby lock service sstable log-structured storage like leveldb google technologies may 6 2015 public version bigtable made available service bigtable also underlies google cloud datastore available part google cloud platform bigtable development began 2004 used number google applications web indexing mapreduce often used generating modifying data stored bigtable google maps google book search search history google earth blogger.com google code hosting youtube gmail google reasons developing database include scalability better control performance characteristics google spanner rdbms layered implementation bigtable paxos group two-phase commits table google f1 built using spanner replace implementation based mysql bigtable one prototypical examples wide column store maps two arbitrary string values row key column key timestamp hence three-dimensional mapping associated arbitrary byte array relational database better defined sparse distributed multi-dimensional sorted map bigtable designed scale petabyte range across hundreds thousands machines make easy add machines system automatically start taking advantage resources without reconfiguration example google copy web stored bigtable row key domain-reversed url columns describe various properties web page one particular column holding page page column several timestamped versions describing different copies web page timestamped fetched cell bigtable zero timestamped versions data another function timestamp allow versioning garbage collection expired data tables split multiple tablets – segments table split certain row keys tablet hundred megabytes gigabytes size bigtable somewhat like mapreduce worker pool thousands hundreds thousands tablet shards may served hundreds thousands bigtable servers table size threaten grow beyond specified limit tablets may compressed using algorithm bmdiff zippy compression algorithm publicly known open-sourced snappy less space-optimal variation lz77 efficient terms computing time locations gfs tablets recorded database entries multiple special tablets called meta1 tablets meta1 tablets found querying single meta0 tablet typically resides server since often queried clients location meta1 tablet answer question actual data located like gfs master server meta0 server generally bottleneck since processor time bandwidth necessary discover transmit meta1 locations minimal clients aggressively cache locations minimize queries
[ 4096, 6156, 8719, 3600, 7700, 9244, 9245, 10284, 5677, 3633, 2612, 9782, 4683, 11343, 3664, 8285, 2658, 8821, 119, 5262, 6800, 11408, 10393, 8858, 7841, 10921, 1203, 7359, 196, 3269, 3782, 10445, 3795, 1240, 8413, 9949, 6367, 236, 9970, 7...
Train
7,817
5
Path_MTU_Discovery:path mtu discovery path mtu discovery pmtud standardized technique computer networking determining maximum transmission unit mtu size network path two internet protocol ip hosts usually goal avoiding ip fragmentation pmtud originally intended routers internet protocol version 4 ipv4 however modern operating systems use endpoints ipv6 function explicitly delegated end points communications session pmtud standardized ipv4 rfc 1191 ipv6 rfc 8201 obsoleted rfc 1981 previous ipv6 pmtud standard rfc 4821 describes extension techniques works without support internet control message protocol ipv4 packets path mtu discovery works setting n't fragment df flag bit ip headers outgoing packets device along path whose mtu smaller packet drop send back internet control message protocol icmp fragmentation needed type 3 code 4 message containing mtu allowing source host reduce path mtu appropriately process repeated mtu small enough traverse entire path without fragmentation ipv6 routers support fragmentation consequently n't support n't fragment option ipv6 path mtu discovery works initially assuming path mtu mtu link layer interface traffic originates similar ipv4 device along path whose mtu smaller packet drop packet send back icmpv6 packet big type 2 message containing mtu allowing source host reduce path mtu appropriately process repeated mtu small enough traverse entire path without fragmentation path mtu changes connection set lower previously determined path mtu first large packet cause icmp error new lower path mtu found conversely pmtud finds path allows larger mtu possible lower link os periodically reprobe see path changed allows larger packets linux windows timer set default ten minutes many network security devices block icmp messages perceived security benefits including errors necessary proper operation pmtud result connections complete tcp three-way handshake correctly hang data transferred state referred black hole connection implementations pmtud attempt prevent problem inferring large payload packets dropped due mtu rather link congestion however order transmission control protocol tcp operate efficiently icmp unreachable messages type 3 permitted robust method pmtud relies tcp another protocol probe path progressively larger packets standardized rfc 4821 workaround used routers change maximum segment size mss tcp connections passing links mtu lower ethernet default 1500 known mss clamping
[ 5472, 10115, 11461, 10924, 6797, 4687, 6992, 1618, 10005, 823, 5402, 5469, 5470 ]
Test
7,818
6
Flash_file_system:flash file system flash file system file system designed storing files flash memory–based storage devices flash file systems closely related file systems general optimized nature characteristics flash memory avoid write amplification use particular operating systems block device layer emulate disk drive general-purpose file system used flash-based storage device suboptimal several reasons log-structured file systems desirable properties flash file system file systems include jffs2 yaffs particular characteristics flash memory best used either controller perform wear leveling error correction specifically designed flash file systems spread writes media deal long erase times nand flash blocks basic concept behind flash file systems flash store updated file system write new copy changed data fresh block remap file pointers erase old block later time practice flash file systems used memory technology devices mtds embedded flash memories controller removable flash memory cards usb flash drives built-in controllers manage mtd dedicated algorithms like wear leveling bad block recovery power loss recovery garbage collection error correction use flash file system limited benefit flash-based memory devices becoming prevalent number mobile devices increasing cost per memory size decreases capacity flash memory chips increases earliest flash file system managing array flash freely writable disk trueffs m-systems israel presented software product pc-card expo santa clara california july 1992 patented 1993 one earliest flash file systems microsoft ffs2 use ms-dos released autumn 1992 ffs2 preceded earlier product called ffs however fell short flash file system managing flash array write read many worm space rather freely writable disk around 1994 pcmcia industry group approved flash translation layer ftl specification based design m-systems trueffs specification authored jointly proposed m-systems scm microsystems also provided first working implementations ftl endorsed intel ftl became popular flash file system design non-pcmcia media well overlayfs unionfs aufs union filesystems allow multiple filesystems combined presented user single tree allows system designer place parts operating system nominally read-only different media normal read-write areas openwrt usually installed raw flash chips without ftl uses overlayfs combine compressed read-only squashfs jffs2
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 4634, 3611, 5661, 9249, 9762, 5158, 3629, 7225, 11323, 8772, 1109, 4708, 1126, 9836, 7789, 9333, 6263, 9335, 9343, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 5293, 7...
Test
7,819
9
Electronic_circuit_simulation:electronic circuit simulation electronic circuit simulation uses mathematical models replicate behavior actual electronic device circuit simulation software allows modeling circuit operation invaluable analysis tool due highly accurate modeling capability many colleges universities use type software teaching electronics technician electronics engineering programs electronics simulation software engages user integrating learning experience kinds interactions actively engage learners analyze synthesize organize evaluate content result learners constructing knowledge simulating circuit ’ behavior actually building greatly improve design efficiency making faulty designs known providing insight behavior electronics circuit designs particular integrated circuits tooling photomasks expensive breadboards impractical probing behavior internal signals extremely difficult therefore almost ic design relies heavily simulation well known analog simulator spice probably best known digital simulators based verilog vhdl electronics simulators integrate schematic editor simulation engine on-screen waveform display see figure 1 allowing designers rapidly modify simulated circuit see effect changes output also typically contain extensive model device libraries models typically include ic specific transistor models bsim generic components resistors capacitors inductors transformers user defined models controlled current voltage sources models verilog-a vhdl-ams printed circuit board pcb design requires specific models well transmission lines traces ibis models driving receiving electronics strictly analog electronics circuit simulators popular simulators often include analog event-driven digital simulation capabilities known mixed-mode simulators means simulation may contain components analog event driven digital sampled-data combination entire mixed signal analysis driven one integrated schematic digital models mixed-mode simulators provide accurate specification propagation time rise/fall time delays event driven algorithm provided mixed-mode simulators general purpose supports non-digital types data example elements use real integer values simulate dsp functions sampled data filters event driven algorithm faster standard spice matrix solution simulation time greatly reduced circuits use event driven models place analog models mixed-mode simulation handled three levels primitive digital elements use timing models built-in 12 16 state digital logic simulator b subcircuit models use actual transistor topology integrated circuit finally c in-line boolean logic expressions exact representations used mainly analysis transmission line signal integrity problems close inspection ic ’ i/o characteristics needed boolean logic expressions delay-less functions used provide efficient logic signal processing analog environment two modeling techniques use spice solve problem third method digital primitives use mixed mode capability methods merits target applications fact many simulations particularly use a/d technology call combination three approaches one approach alone sufficient another type simulation used mainly power electronics represent piecewise linear algorithms algorithms use analog linear simulation power electronic switch changes state time new analog model calculated used next simulation period methodology enhances simulation speed stability significantly process variations occur design fabricated circuit simulators often take variations account variations small taken together change output chip significantly temperature variation also modeled simulate circuit performance temperature ranges
[ 7367, 3756, 7820, 9231, 3762, 4243, 5301, 11125, 3159, 4792, 5881 ]
Train
7,820
3
Analog_Devices:analog devices analog devices inc. adi also known simply analog american multinational semiconductor company specializing data conversion signal processing power management technology headquartered norwood massachusetts 2012 analog devices led worldwide data converter market 48.5 share according analyst firm databeans company manufactures analog mixed-signal digital signal processing dsp integrated circuits ics used electronic equipment technologies used convert condition process real-world phenomena light sound temperature motion pressure electrical signals analog devices approximately 100,000 customers following industries communications computer instrumentation military/aerospace automotive consumer electronics applications company founded two mit graduates ray stata matthew lorber 1965 year company released first product model 101 op amp hockey-puck sized module used test measurement equipment 1967 company published first issue technical magazine analog dialogue 1969 analog devices filed initial public offering became publicly traded company ten years later company listed new york stock exchange 1973 company first launch laser trim wafers first cmos digital-to-analog converter 1996 company reported 1 billion company revenue year jerald fishman named president ceo position held death 2013 see 2000 analog devices sales grew 75 2.578 billion company acquired five companies including bco technologies plc manufacturer thick film semiconductors 150 million january 2008 semiconductor completed acquisition cpu voltage pc thermal monitoring business analog devices. 184 million 2004 analog devices customer base 60,000 portfolio included 10,000 products july 2016 analog linear technology agreed analog would acquire linear approximately 14.8 billion cash stock deal analog devices headquartered norwood massachusetts regional headquarters located shanghai china munich germany limerick ireland tokyo japan analog devices fabrication plants located united states ireland company testing facility located philippines design centers located australia canada china egypt england germany india israel japan scotland spain taiwan turkey raymond stata founder analog devices responsible business strategy product roadmap founding company 1965 stata served company chairman board directors since 1973 executive officer since 1996 ceo 1973 1996 president 1971 1991 addition stata also trustee massachusetts institute technology alma mater awarded ieee founders medal 2003 stata received ee times lifetime achievement award 2008 stata served chairman semiconductor industry association year 2011 vincent roche became president ceo analog devices may 2013 first joined company 1988 marketing director limerick ireland barrie gilbert named first technology fellow analog devices 1979 addition gilbert ieee life fellow holds 65 patents gilbert best known gilbert cell – electronic multiplying mixer analog devices gilbert started company northwest labs design center oregon continued work rf products crafted high-speed nonlinear circuit techniques paul brokaw expert integrated circuit design spent career analog devices holds position analog fellow brokaw inventor many analog ic circuits including brokaw bandgap reference holds 100 patents also ieee life fellow robert adams technical fellow manager audio development analog devices inc. adams holds many patents related audio electronic field member ieee fellow audio engineering society adams received finalist ranking edn innovation innovator year award 1995 jerald g. fishman ceo president analog devices 1996 death march 2013 2004 fishman named ceo year electronic business 35-year veteran analog devices also served board directors analog devices cognex corporation xilinx analog devices products include analog signal processing digital signal processing technologies technologies include data converters amplifiers radio frequency rf technologies embedded processors digital signal processing dsp ics power management interface products data converters include analog-to-digital converters adcs digital-to-analog converters dacs convert electrical signal representations real-world analog phenomena light sound waveforms temperature motion pressure digital signals data back analog devices adc dac ics used medical systems scientific instrumentation wireless wired communications radar industrial process control audio video equipment digital-processing-based systems accurate signal conversion critical data converters account 50 adi revenue adi companion amplifier ics provide accurate high-speed precise signals driving data converters key applications digital audio current sensing precision instrumentation company data converter chips used national instruments high-precision measurement instrumentation systems data converters amplifiers also used scientists researchers project icecube – underground telescope uses digital optical modules doms detect subatomic particles south pole power management products customers industrial wireless infrastructure digital camera markets support signal chain design requirements dynamic range transient performance reliability interface products include broad range interface ic products offered company product categories controller area network digital isolators level translators lvds mobile i/o expander keyboard controller usb rs-232 amplifiers includes precision operational amplifiers instrumentation current sense differential amplifiers audio amplifiers video amplifiers/buffers/filters variable gain amplifiers comparators voltage specialty amplifiers products special linear functions radio frequency integrated circuits rfics address rf signal chain simplify rf system development company rf portfolio includes trupwr rms power detectors logarithmic amplifiers pll dds synthesizers rf prescalers variable gain amplifiers adc drivers gain blocks lnas rf amplifiers processors dsp programmable signal processing integrated circuits execute specialized software programs algorithms associated processing digitized real-time data analog devices processors dsps blackfin sharc sigmadsp tigersharc adsp-21xx precision analog microcontrollers make company embedded processing dsp portfolio multi-dsp signal processing analog devices line micro-electromechanical systems mems microphones sold business invensense 2013 analog devices mems microphones found smart phones tablet pcs security systems medical applications adi mems accelerometers designed game pad controllers microsoft logitech pellican analog devices sells linear mixed-signal mems digital signal processing technologies medical imaging patient monitoring medical instrumentation home healthcare company precision signal-processing components blackfin digital signal processors included karmelsonix wholter overnight pulmonary monitor wheezometer personal asthmatic assessment device accelerometers produced analog devices included zoll medical pocketcpr measures depth chest compressions provides audible visual feedback rescuer allow adjustment proper depth correct rate compression analog devices develops components safety systems stability control systems driver assistance systems infotainment interior applications powertrain systems hybrid electric vehicles use high-precision data conversion products battery monitoring control systems analog devices industrial market includes process control systems help drive productivity energy efficiency reliability analog devices technology consumer electronics includes signal processing circuits image processing auto focus image stabilization digital still cameras camcorders audio video processors home theater systems dvd recorders high-definition televisions advanced touch screen controllers portable media devices 2009 databeans published report top semiconductor analog suppliers analog devices named number two suppliers including texas instruments national semiconductor acquired texas instruments 2011 maxim integrated products linear technology collaborating analog devices since march 2017 competitors include infineon technologies stmicroelectronics intersil corporation 2011 analog devices third ranked analog semiconductor supplier 1967 analog devices first published analog dialogue dan sheingold took position editor two years later held four decades current editor scott wayne currently longest-running in-house publication electronics industry analog dialogue forum exchange circuits systems software real-world signal processing technical magazine published analog devices discusses products applications technology techniques analog digital mixed-signal processing analog dialogue published monthly web featured technical articles also compiled quarterly print editions 2009 analog devices announced engineerzone online technical support community engineerzone launched design engineering community customers prospects partners employees students ask questions share knowledge search answers questions open forum analog devices circuits lab reference circuits engineered tested quick system integration help solve design challenges ranging common complex reference circuits smaller modular designs broadly applicable application-specific reference designs reference circuit documented test data theory operation component selection decision criteria addition reference circuits tailored meet real-world system integration needs may also include board layout schematics cad tools models device drivers evaluation hardware
[ 1798, 9863, 7432, 7819, 11405, 2454, 8865, 4773, 3756, 8237, 6834, 10675, 1462, 9665, 10051, 1221, 11333, 3911, 9799, 8268, 3323, 8921, 8668, 6495, 9569, 11646, 9964, 1400, 5881, 5371, 6268, 638 ]
Validation
7,821
3
IP_Virtual_Server:ip virtual server ipvs ip virtual server implements transport-layer load balancing usually called layer 4 lan switching part linux kernel configured via user-space utility tool ipvs incorporated linux virtual server lvs runs host acts load balancer front cluster real servers ipvs direct requests tcp- udp-based services real servers make services real servers appear virtual services single ip address ipvs built top netfilter ipvs merged versions 2.4.x newer linux kernel mainline
[ 4616, 3082, 5139, 10780, 10785, 6180, 8242, 9266, 6213, 8268, 5222, 10856, 4734, 7812, 4238, 10382, 2195, 2711, 9882, 1694, 2723, 10933, 5815, 5822, 1736, 2762, 8909, 8410, 10971, 8928, 1761, 2278, 233, 10482, 2294, 8439, 2809, 4360, 792, ...
Validation
7,822
7
Internet_OS:internet os internet operating system internet os type operating system designed run applications services internet client generally web browser advantages os would would run thin client allowing cheaper easily manageable computer systems would require applications designed cross-platform open standards would tie user applications documents preferences single computer rather place internet cloud internet os also promoted perfect type platform software service talk internet os began surface 1995 browser war started heating microsoft netscape response limited capabilities html time microsoft began developing online content authoring platform would based distributed ole object linking embedding codenamed blackbird using ole applications put web would contain processing logic would act similar applications typical desktop environment immediately concerns would tie web proprietary microsoft technology would n't guaranteed run across different systems challenge marc andreessen netscape announced set new products would help transform browser called internet os would provide tools programming interfaces new generation internet-based applications so-called internet os would still run top regular os – based around netscape navigator – dismissed desktop operating systems like windows simply bag drivers reiterating goal would turn windows mundane collection entirely debugged device drivers andreessen explained newest versions navigator web browsers suites internet applications including programs mail ftp news would come viewers variety document types like adobe acrobat apple quicktime sun java applets would give programming interfaces publishing tools developers netscape also would continue sell server software java applets would run cross-platform clients servers scripting language form javascript would also provide facilities backend transaction processing elaborating client/server model navigating clients application servers database servers pointed – broad capabilities gave browser – difference technically netscape navigator traditional operating system navigator n't include device drivers technical problems blackbird growth web saw competitive statements netscape soon led microsoft rethink strategy began position ole primary tool within netscape proposed ecosystem ole would embeddable web pages using activex plug-in would easily integrated server side using asp active server pages development opposition industry microsoft began grow concept internet os led formation alliance around developing java alternative windows – chief partners netscape sun oracle ibm companies informally referred industry press gang four novell later joined alliance leading called gang five may 1997 group published position paper discussed integration software component models within corba – commonly used architecture allowing computer applications different vendors running different systems work together networks issued several rfps request proposals object management group omg standards body responsible managing corba meant help integrate different aspects java proposals included support javabeans – serialized component architecture java – javascript called java-tization corba group positioning java distributed object architecture similar microsoft intended ole blackbird ole would exist second-class technology would interface corba using javabeans group also promoted idea javaos – minimal java-based operating system – would turn run netscape web browser browser run javabeans components would front new ecosystem based open standards first html web browser second java hoped would become widely adopted corba javaos would hosted network computer nc concept long advocated oracle nc would thin client designed internet use leaving access applications documents stored entirely online oracle saw role providing tools server layer network-hosted applications would provided network application server turn would make use oracle7 relationship database management system oracle web server oracle also outlined referred network computing architecture nca would separate presentation application data access logic java applets nca cartridges microsoft intel response challenge put forward standard competing model called netpc diskless pc would primarily adapted web browser use would run simplified version windows 95 codenamed pegasus later road idea evolved netbook microsoft publicly criticized idea internet os instead argued traditional desktop os internet-enabled beginning idea active platform internet strategy culminated later release windows 98 strategy involved tightly bundling internet explorer windows became center united states anti-trust suit microsoft gang five – netscape sun ibm oracle novell – involved lobbying anti-trust action microsoft 1998 java alliance started fall apart oracle continued developing server-side java databases given idea network computer netscape given java browser efforts instead aiming position internet portal pressure investors given blame google revived idea internet os 2009 development chrome os linux-based operating system designed work exclusively ajax-based web applications operating system designed look operate like chrome web browser sold laptops developed partners called chromebooks also promoted g suite suite web applications alternative traditional desktop software microsoft office google tried address standard criticisms internet os concept development projects google native client allows browser run intel x86 native code sandbox complex programs could run fully take advantage system hardware google gears also created allow offline access online applications although deprecated favor web storage model process standardization world wide web consortium w3c
[ 3462, 10026, 10284, 5677, 10029, 7983, 5681, 823, 9665, 467, 3166, 6367, 3425, 4194, 4972, 5612, 9970, 3323, 124, 5375 ]
Test
7,823
2
IS-DOS:is-dos is-dos disk operating system russian zx spectrum clones is-dos developed 1990 1991 iskra soft leningrad ussr handles floppy disks double sided double density hard disks cd-rom maximum is-dos partition size hard disk 16 mib unlike tr-dos is-dos ram-based operating system reduces amount memory user programs is-dos chic version developed nemo kay provides memory user programs tasis modern version developed nedopc atm turbo 2+ 2006 supports text mode high memory machine based is-dos chic
[ 4039, 8713, 11145, 4076, 10156, 5359, 5267, 7959, 7224, 4409, 1853, 3129 ]
Test
7,824
3
Macintosh_IIvx:macintosh iivx macintosh iivx personal computer designed manufactured sold apple computer inc. october 1992 october 1993 last macintosh ii family macintosh computers iivx introduced time macintosh iivi performa 600 performa 600cd four models using new metal case design like performa 600cd iivx could equipped internal double-speed cd-rom drive iivx shares model designation macintosh ii computers apple considers iivx first computer macintosh centris line according apple lawyers unable complete trademark check centris name time iivx release machines bearing centris name introduced months later iivx described macworld magazine review best price-to-performance ratio computer apple ever built list price machine hard drive main memory video memory 2,949 usd adding cd-rom upgrading main memory video memory increased price 3,219 usd deemed best cd-rom drive bargain ever offered macworld much-more-powerful macintosh centris 650 released four months iivx 250 less immediately rendering iivx obsolete iivx base price slashed third increasing competition dell pc manufacturers prices iivx continued fall quickly end june 1993 price 5/80 cd-rom configuration dropped 1,799 half original price afterwards people bought expensive mac quickly became outdated said iivx-ed mac iivx began life development proof-of-concept see internal cd-rom drive could added mac apple ceo john sculley gave speech macworld tokyo promised mac cd-rom drive iivx rushed production several shortcuts taken design notably 32 mhz processor crippled 16 mhz bus making slightly slower popular aging macintosh iici serial port limited 57.6 kbit/s could cause problems serial connections midi hardware macintosh iivi slower version iivx 16 mhz processor introduced time markets though united states discontinued four months later high-end member original performa family performa 600 also based architecture iivx macintosh ii model 32k l2 cache iivx sold hard drives ranging 40 three nubus slots processor direct slot macintosh iivx uses case macintosh performa 600 reused centris 650 later known quadra 650 upgraded machine swapping logic board iivx case also used power macintosh 7100
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 1090, 4180, 10838, 10840, 9312, 8806, 6258, 10357, 4220, 10365, 10878, 6783, 7299, 4741, 8842, 6283, 147, 7830, 6807, 4258, 7842, 7844, 7869, 8893, 8896, 4807, 4810, ...
Test
7,825
9
Keysight_VEE:keysight vee keysight vee graphical dataflow programming software development environment keysight technologies automated test measurement data analysis reporting vee originally stood visual engineering environment developed hp designated hp vee since officially renamed keysight vee keysight vee widely used various industries serving entire stage product lifecycle design validation manufacturing optimized instrument control automation test measurement devices data acquisition instruments like digital voltmeters oscilloscopes source devices like signal generators programmable power supplies detailed list features version found references section vee program consists multiple connected vee objects sometimes called devices vee object consists different types pins namely data pins sequence pins execute pins xeq control pins error pins data pins govern data flow propagation sequence pins determine object execution order pins left side object called input pins whereas pins right output pins two objects b connected output pin object connected object b ’ input pin several connection lines emanate single output pin one connection line attached input pin data input pins execute pins must connected whereas control pins output pins left unconnected keysight vee dataflow programming language within vee program multiple connections objects data flows objects left right sequence flows top bottom object ’ execution order determined object connections data dependency rule general object unconnected data input sequence input pin operate first object sequence input pin connected execute soon data present data inputs hand sequence input pin connected although data present data input pins object hold execution sequence input pin pinged may applicable non-primitive objects like junction collector objects example object ’ sequence output pin connected fire object executed execution possible objects descended data output pins error pin object examples taken referred explanation keysight vee connect control variety keysight non-keysight instrumentation via multiple interfaces keysight vee supports following interfaces keysight vee interact programming languages using built-in activex automation server software development programs visual basic c/c++ visual c .net compliant languages call keysight vee userfunctions keysight vee also integrated microsoft .net framework common language runtime framework class libraries provides multitude functions controls used enhance program adding email capability accessing databases access 2500 matlab analysis visualization functions made possible built-in matlab signal processing toolbox built-in microsoft excel library provides direct access save retrieve generate reports spreadsheets keysight vee notable capability deploy unlimited number runtime programs time limitations extra cost runtime programs could contain gui panel allows interaction users presumably operators execute control program test execution
[ 2691, 6797, 7341, 7983, 7326 ]
Test
7,826
4
Gated_community:gated community modern form gated community walled community form residential community housing estate containing strictly controlled entrances pedestrians bicycles automobiles often characterized closed perimeter walls fences similar walls gates separated quarters cities centuries gated communities usually consist small residential streets include various shared amenities smaller communities amenities may include park common area larger communities may possible residents stay within community daily activities gated communities type common interest development distinct intentional communities given gated communities spatially type enclave setha m. low anthropologist argued negative effect net social capital broader community outside gated community gated communities usually called guard-gated communities staffed private security guards often home high-value properties and/or set retirement villages gated communities secure enough resemble fortresses intended besides services gatekeepers many gated communities provide amenities may depend number factors including geographical location demographic composition community structure community fees collected subassociations belong master associations master association may provide many amenities general larger association amenities provided amenities also depend type housing example single-family-home communities may common-area swimming pool since individual home-owners ability construct private pools condominium hand may offer community pool since individual units option private pool installation typical amenities offered include one brazil widespread form gated community called condomínio fechado closed housing estate object desire upper classes place small town infrastructure reserve power supply sanitation security guards purpose community protect residents exterior violence philosophy seen closed buildings shopping centres many accessed inside parking lot garage pakistan gated communities located big well small cities considered standard high quality living defence housing authority bahria town major private gated community developers administrators one largest world assets bahria town worth 30 billion gated communities pakistan public parks schools hospitals shopping malls gymnasiums country clubs argentina called barrios privados literal translation private neighborhoods countries often seen symbol wealth however gated communities enjoy dubious social prestige many members middle upper middle class regard gated community dwellers nouveaux riches snobs gated communities houses bigger ones nordelta hospital school shopping mall post-segregation south africa gated communities mushroomed response high levels violent crime commonly referred complexes also broadly classified security villages large-scale privately developed areas enclosed neighborhoods newest neighborhoods developed almost entirely composed security villages malls essential services hospitals part property developers adopted response counter squatting local residents fear due associated crime often results protracted eviction process popular southern china namely pearl river delta region famous clifford estates saudi arabia gated communities existed since discovery oil mainly accommodate families europe north america threat levels increased since late 1990s foreigners general u.s. citizens particular gates become armed sometimes heavily vehicles inspected marksmen saudi arabian national guard armored vehicles appeared certain times markedly recent terrorist attacks areas near-by targeting people european north american countries gated communities rare continental europe japan proponents gated communities lesser degree cul-de-sac maintain reduction exclusion people would passing generally non-local people makes stranger much recognisable closed local environment thus reduces crime danger since small proportion non-local people passing area potential criminals increased traffic increase rather decrease safety people around whose presence could deter criminal behaviour could provide assistance incident another criticism gated communities offer false sense security studies indicate safety gated communities may illusion reality gated communities suburban areas united states less crime similar non-gated neighborhoods commentary new york times specifically blames gated communities shooting death trayvon martin columnist states gated communities churn vicious cycle attracting like-minded residents seek shelter outsiders whose physical seclusion worsens paranoid groupthink outsiders influential paper vanessa watson includes gated communities within class african urban fantasies attempts remake african cities vein dubai singapore watson analysis kind urban planning prizes exclusionary self-contained spaces limit opportunities interaction different classes worsening marginalization urban poor closed cities russia different gated communities limited number gated communities long established foreigners various regions world many gated communities argentina especially greater buenos aires suburb pilar 60 km n buenos aires city suburban areas nordelta tortugas country club first gated community developed argentina dating 1930s/1940s date 1990s liberal reforms consolidated since buenos aires traditionally regarded socially integrated city gated communities subject research sociologists gated communities important way middle upper-class people cope high levels violent criminal activity greater buenos aires although gated communities rare australia since 1980s built well-known hope island particular sanctuary cove gold coast queensland similar projects built area victoria first development sanctuary lakes local government area wyndham 16 km south west melbourne new south wales macquarie links gated community well southgate estate gated community many australian gated communities built within private golf courses act example uriarra village based around community horse paddocks dwellings jointly managed strata title brazil also many gated communities particularly metropolitan regions rio de janeiro são paulo example one são paulo suburbs least 6 compounds known tamboré 1 2 3 consists generously spaced detached houses little separate front gardens one first big-scale gated community projects são paulo city region barueri alphaville planned constructed 1970s military dictatorship big cities brazil faced steep increases car ownership middle higher-classes rural exodus poverty crime urban sprawl downtown decay neighbourhoods physical explicit gating security checkpoints patrols extremely rare absent even canada richest neighbourhoods bridle path toronto furthermore municipal planning laws many canadian provinces ban locked gates public roads public health issue since deny emergency vehicles quick access noted exception canada arbutus ridge age-restricted community constructed 1988 1992 southeastern coast vancouver island common canadian neighbourhoods especially largest cities implicit symbolic gating effectively partitions private infrastructure amenities communities surrounding neighbourhoods classic example affluent montreal suburb mount royal long fence running along side l'acadie boulevard intents purposes separates community working-class neighbourhood park extension also many newer suburban subdivisions employ decorative gates give impression exclusivity seclusion china compounds like gated communities around world target rich also many foreigners live gated communities beijing often foreign companies choose locations foreign employees live cases pay rent associated costs e.g management fees garden work similar communities exist shanghai another major chinese city shanghai links exclusive expatriate community enclosing golf course shanghai american school example notable gated communities shanghai include seasons villas development hutchinson whampoa thomson golf villas green villas gated communities china daxing district beijing enclose homes rural migrants intended reduce crime increase public order safety communist party china-run people daily claims 73 system controversial segregates migrants poor claiming true purpose keep track migrants scheduled implementation changping district also guayaquil quito ecuador many gated communities coastal city guayaquil mostly located samborondón quito valleys surrounding city home mostly wealthiest people trend specially guayaquil houses gated communities moderate prices well greater cairo example dreamland mountain view egypt alexandria el maamoura india many gated neighborhoods also called colonies new delhi big cities upper middle-class upper-class people live new delhi mumbai chennai bangalore like gated communities sometimes communities separated wealth also ethnicity members particular ethnicity tend feel comfortable living among owing reasons related common festivals language cuisine examples common new delhi strong punjabi community many gated neighborhoods predominantly punjabi cases discrimination members ethnic backgrounds living communities likewise also exist bengali south indian muslim gujarati neighborhoods nowadays many modern gated communities developed like aamby valley city lavasa city maharashtra occupying 100 square kilometers area gated communities built chennai hyderabad bangalore lot real estate developers bangalore 3 locations community living bannerghatta hebbal villas devanahalli neighboring countries target housing societies seem upper-middle upper class citizens caste religious discrimination prevalent real estate industry several people denied homes based caste religion regardless factor non-residential indians interested gated housing indonesia gated communities luxurious lots 740 square metres 8000 sq ft affordable lots ranging 40 120 square metres 2000 new residential area build private developer gated community examples include bumi serpong damai south tangerang telaga golf sawangan pesona khayangan depok sentul city bogor regency gated communities indonesia still allow outsiders use facilities inside community regulation social facilities residential development handed local government used public two examples gated community italy olgiata rome village roccamare castiglione della pescaia tuscany malaysia known gated guarded communities seeing steady increase popularity currently according town country planning department four types gated communities malaysia namely gated community concept emerged response rise safety security issues offers advantages terms calm environment enhanced safety ideal family development gated communities mexico result huge income gap existing country 2008 study found average income urban area mexico 26,654 rate higher advanced regions like spain greece average income rural areas sometimes short distance away 8,403 close proximity wealth poverty created large security risk mexico middle class gated communities found virtually every medium large sized city mexico largest found major cities monterrey mexico city guadalajara luxury status gated communities popular middle high income residents mexico gated luxury communities mexico considerably cheaper countries united states retaining houses similar size quality due commonness communities lower cost build priced lower attract middle class residents many gated communities mexico fully independent self-contained infrastructure schools water power facilities security fire forces medical facilities larger gated communities even retain school districts police departments interlomas area mexico city contains hundreds gated communities largest concentration gated communities world stretching surrounding areas santa fe bosques-lomas interlomas-bosque real also made predominantly gated communities span 30 greater mexico city many smaller gated communities mexico officially classified separate gated communities many municipal rules prohibit closed roads small neighborhoods cater lower middle income residents offer close perimeter check points similar authentic gated community situation tolerated sometimes even promoted city governments due lack capacity provide reliable trusted security forces new zealand gated communities developed suburban areas main cities since 1980s 1990s pakistan large number gated communities target middle class pakistanis largest bahria town also largest asia communities major cities defence housing authority also major developer gated communities others include wapda town gulberg islamabad schon properties emaar properties also maintains several gated communities country targeting primarily upper class people gated communities pakistan mostly immune problems law enforcement lack energy faced majority housing societies short time property prices communities greatly increased – 2007 20-square-meter house bahria town lahore cost around four million rupees 40,000 similar property 2012 costed nine million rupees houses priced around 100-300 million rupees lima peru several gated communities especially wealthy districts la molina santiago de surco home many prominent peruvians philippines sizable number gated communities known philippine english subdivisions villages regardless names communities may either form part larger barangay village constitute single barangay aerobus live complex de facto first gated community moscow business center complex outside residential area ozero cooperative formed around vladimir putin dacha priozersky district leningrad oblast saudi arabia many expatriate workers required live company-provided housing 2003 attack al hambra jadawel siyanco vinell militant saudi dissidents government established tight military security compounds large western populations many western individuals also reside many gated compounds non-gated villas apartments cities work saudi aramco provides compound dhahran one largest kind within saudi arabia gated communities also popular many saudis accounts limited availability open villas communities premium rent paid housing compounds found many saudi arabia cities including limited abha dhahran riyadh taif south africa increasing number gated communities often wealthy enclosed live close proximity urban poor yet little contact two many housing estates thailand take form gated communities targeted upper middle classes may managed development company resident committees gated communities often referred mubans thailand turkey several gated communities especially istanbul ankara called site turkish mostly located around edge city united arab emirates gated communities exploded popularity particularly dubai 2002 decision allow foreigners freehold properties resulted construction numerous communities built along various themes examples include lakes springs meadows arabian ranches united kingdom gated communities relatively rare 2004 estimated 1,000 communities england i.e including scotland wales northern ireland usually small scale gated street 60 100 houses single block 500 700 flats found london example docklands new caledonian wharf kings queen wharf pan peninsula east london bow quarter bow london gated communities us unincorporated like indiana briar ridge may even span one incorporated municipality however numerous incorporated gated cities southern california namely bradbury canyon lake hidden hills laguna woods rolling hills meet legal requirements city halls municipal facilities public private corporations parks facilities within gates 1997 estimated 20,000 gated communities built across country approximately 40 new homes california behind walls 1997 estimates number people gated communities ranged 4 million 30,000 communities around 8 million million california alone one reason difficult determine many gated communities united states privately developed incorporated gated communities outside california including lake quivira kansas sea ranch lakes florida anderson creek north carolina north oaks minnesota hot springs village arkansas largest gated community united states 26,000 heavily wooded acres hot springs village governed hot springs village property owners association poa short private tax-exempt home owners association bay harbor michigan largest gated community midwestern united states village rosemont illinois outside chicago maintains security checkpoint entrance main residential section naval square first city philadelphia pennsylvania neighborhood gives suburban feel otherwise urban environment downtown miami florida neighborhood brickell key gated island community high-rise residential towers although anyone walk onto island come via public bus authorized automobiles may enter brickell key expensive apartments miami 2012 gated community retreat twin lakes made famous shooting trayvon martin george zimmerman national spotlight well year 2013 acquittal zimmerman
[]
Test
7,827
4
Data_diddling:data diddling data diddling type cybercrime data altered entered computer system often data entry clerk computer virus computerized processing altered data results fraudulent benefit cases altered data changed back processing conceal activity results huge might include adjusting financial figures marginally could complex make entire system unusable
[ 4945, 7739, 2558 ]
Validation
7,828
4
Sniffing_attack:sniffing attack sniffing attack sniffer attack context network security corresponds theft interception data capturing network traffic using sniffer application aimed capturing network packets data transmitted across networks data packets encrypted data within network packet read using sniffer using sniffer application attacker analyze network gain information eventually cause network crash become corrupted read communications happening across network sniffing attacks compared tapping phone wires get know conversation reason also referred wiretapping applied computer networks using sniffing tools attackers sniff sensitive information network including email traffic smtp pop imap traffic web traffic http ftp traffic telnet authentication ftp passwords smb nfs many packet sniffer utility usually sniffs network data without making modifications network packets packet sniffers watch display log traffic information accessed attacker prevent networks sniffing attacks organizations individual users keep away applications using insecure protocols like basic http authentication file transfer protocol ftp telnet instead secure protocols https secure file transfer protocol sftp secure shell ssh preferred case necessity using insecure protocol application data transmission encrypted required vpn virtual private networks used provide secure access users
[ 9440, 3490, 7364, 10245, 3688, 2953, 9640, 939, 6360 ]
Test
7,829
4
Electric_grid_security:electric grid security electric grid security refers activities utilities regulators stakeholders play securing national electricity grid american electrical grid going one largest changes history move smart grid technology smart grid allows energy customers energy providers efficiently manage generate electricity similar new technologies smart grid also introduces new concerns security utility owners operators whether investor-owned municipal cooperative typically responsible implementing system improvements regards cybersecurity executives utilities industry beginning recognize business impact cybersecurity electric utility industry u.s. leads number initiatives help protect national electric grid threats industry partners federal government particularly national institute standards technology north american electric reliability corporation federal intelligence law enforcement agencies electric grids targets military terrorist activity american military leaders created first air war plan axis 1941 germany electric grid top target list north american electrical power grid highly connected system ongoing modernization grid generally referred smart grid reliability efficiency two key drivers development smart grid another example ability electrical system incorporate renewable energy sources wind power geothermal power one key issues electric grid security ongoing improvements modernizations created risk system example one risk specifically comes integration digital communications computer infrastructure existing physical infrastructure power grid according academic journal ieee security privacy magazine smart grid uses intelligent transmission distribution networks deliver electricity approach aims improve electric system reliability security efficiency two-way communication consumption data dynamic optimization electric-system operations maintenance planning u.s. federal energy regulatory commission ferc charge cybersecurity standards bulk power system system includes systems necessary operating interconnected grid investor-owned utilities operate different authority state public utility commissions falls outside ferc jurisdiction 2018 two evolutions taking place power economic sector evolutions could make harder utilities defend cyber threat first hackers become sophisticated attempts disrupt electric grids attacks targeted including spear phishing efforts aimed individuals shifting corporate networks include industrial control systems second grid becoming distributed connected growing internet things world could make every device could potential vulnerability 2006 200,000 miles transmission lines 230 kv higher existed united states main problem impossible secure whole system terrorist attacks scenario terrorist attack however would minimal would disrupt small portion overall grid example attack destroys regional transmission tower would temporary impact modern-day electric grid system capable restoring equipment damaged natural disasters tornadoes hurricanes ice storms earthquakes generally short period time due resiliency national grid events would difficult even well-organized large group terrorists cause physical damage small- moderate-scale tornado 2016 members russian hacker organization grizzly steppe infiltrated computer system vermont utility company burlington electric exposing vulnerability nation electric grid attacks hackers disrupt state electric grid however burlington electric discovered malware code computer system connected grid today utility industry advancing cybersecurity series initiatives partnering federal agencies goal improve sector-wide resilience physical cyber threats industry also working national institute standards technology north american electric reliability corporation federal intelligence law enforcement agencies 2017 electric companies spent 57.2 billion grid security september 2018 brien sheahan chairman ceo illinois commerce commission member u.s. department energy doe nuclear energy advisory committee robert powelson former federal energy regulatory commission ferc commissioner wrote published piece utility dive cyberthreats national power system require stronger national standards collaboration levels government recent article u.s. department homeland security confirmed russian hackers targeted control room american public utilities electric distribution system become networked together interconnected critical public services depend system water delivery financial institutions hospitals public safety prevent disruption network sheahan powelson recommended national standards collaboration federal state energy regulators utility companies cybersecurity-specific practices teams baltimore gas electric conducts regular drills employees also shares cyber-threat related information industry government partners duke energy put together corporate incident response team devoted cybersecurity 24 hours day unit works closely government emergency management law enforcement states cybersecurity procedures practices december 2018 u.s senators cory gardner michael bennet introduced legislation intended improve grid security nation-wide bills would create 90 million fund would distributed states develop energy security plans legislation would also require u.s. energy department identify vulnerabilities cyberattacks nation ’ electrical power grid electricity subsector coordinating council escc main liaison organization federal government electric power industry mission coordinate efforts prepare respond national-level disasters threats critical infrastructure escc composed electric company ceos trade association leaders segments industry federal government counterparts include senior administration officials white house relevant cabinet agencies federal law enforcement national security organizations
[ 4830 ]
Validation
7,830
3
Macintosh_IIx:macintosh iix macintosh iix personal computer designed manufactured sold apple computer inc. september 1988 october 1990 model introduced update original macintosh ii replacing 16 mhz motorola 68020 cpu 68881 fpu 68030 cpu 68882 fpu running clock speed initial price iix version 40 mb hard drive 800 kb floppy drive replaced 1.44 mb superdrive iix first macintosh include standard mac iix included 0.25 kib l1 instruction cpu cache 0.25 kib l1 data cache 16 mhz bus 1:1 cpu speed supported system 7.5.5 iix second three macintosh models use case allowing dual floppy drives 6 nubus slots last model macintosh iifx apple nomenclature time used x indicate presence '030 cpu used macintosh iicx iivx support spare parts iix discontinued august 31 1998
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 576, 1090, 4180, 10838, 10840, 9312, 8806, 6258, 10357, 7286, 4220, 10365, 10878, 6783, 7299, 4741, 8842, 6283, 7824, 147, 6807, 4258, 7842, 7844, 7869, 8893, 8896, ...
Test
7,831
1
Media_contacts_database:media contacts database media contacts database media database specific people media commonly journalists media contacts database consists mainly list journalists reporters editors publishers contributors freelance journalists tv show anchors radio show hosts djs etc media-type work media contacts database usually contains following information information available may less based research methods media research company creates database media contacts database pr tool used pr professionals pitch stories particular topic product company specific group journalists journalists would write speak particular topic relevant issue episode shows media contacts database allows pr professional gain easy access hundreds journalists within short span time media contacts database created sold many media research companies offer pr software professionals
[]
Train
7,832
3
Road_Fighter:road fighter game later released msx home computer system 1985 nintendo entertainment system japan 1985 europe 1992 followed format original game included konami arcade classics 1999 nintendo ds arcade game released i-mode phones japan 2005 road fighter made available microsoft game room service xbox 360 console windows-based pcs march 24 2010 first second levels contain 4 courses ranging grassy plains water bridge seashore mountains finally forest area arcade version 6 stages contained pressing b button raises player speed around 196 km/h pressing button skyrockets speed 400 player limited amount fuel earn touching special multi-colored cars player collides car slips occasionally appearing patches oil car begin spin corrected may crash side barriers causing loss 5-6 fuel units nes famicom version total 6 types cars 1 yellow red three blue one truck yellow cars travel along straight line occur large numbers red cars little less likely appear change lane travelling get way player blue cars vary way change lane trucks go straight way colliding causes player crash konami man make cameo appearance flying side road player progresses certain point level without crashing included course 2 nes famicom versions midnight run road fighter 2 sequel road fighter released arcades march 1996 playstation 1997 arcade version released worldwide playstation version released japan europe europe playstation version titled midnight run removing road fighter connection main selling point allows player shift back forth manual automatic transmission races although different 2-d road fighter scenery similar racing games set japan initial arcade stage wangan midnight except cars licensed player also unique selection normal cars tuned cars reviewing arcade version next generation praised support four players challenging ai multiple tracks ability switch manual automatic mid-race tight controls powerslides car selection generally fast-paced racing nonetheless concluded game slightly average scored three five stars winding heat sequel road fighter midnight run released arcades 1996 first appeared arcades september though arcades receive units later improved version midnight run road fighter 2 though normal tuned cars rules remain unlike midnight run takes place touge roads cabinet came two configurations sitdown version 50 inch monitor upright version 25 inch monitor cabinets linked support four players road fighters japan-only sequel original road fighter released arcades 2010 game features 3d-enhanced graphics mounted pair goggles used view effect tracks set real-life locations based race courses previous konami racing titles including enthusia professional racing gti club series game includes numerous licensed vehicles saved using konami e-amusement pass containing tuning customization data game konami answer sega initial arcade stage 4 namco wangan midnight maximum tune terms card-based games taito chase h.q 2 terms rebooted sequels opening theme take higher composed together system music sota fujimori included beatmania iidx 18 resort anthem playable song addition game includes music beatmania iidx dance dance revolution series form promote another konami arcade games
[ 9957, 6797, 9006 ]
Test
7,833
3
ARM_Cortex-A15:arm cortex-a15 arm cortex-a15 mpcore 32-bit processor core licensed arm holdings implementing armv7-a architecture multicore processor out-of-order superscalar pipeline running 2.5 ghz arm claimed cortex-a15 core 40 percent powerful cortex-a9 core number cores speed first a15 designs came autumn 2011 products based chip reach market 2012 key features cortex-a15 core first implementation came samsung 2012 exynos 5 dual shipped october 2012 samsung chromebook series 3 arm version followed november google nexus 10 press announcements current implementations licensees lg expected produce a15 based design point
[ 11282, 9235, 11289, 1057, 38, 4139, 8237, 9774, 2097, 8250, 8253, 7745, 7747, 2635, 99, 8812, 8815, 630, 10361, 638, 644, 7300, 8842, 146, 659, 666, 5786, 6815, 4258, 4773, 9913, 8383, 10945, 4821, 2788, 3301, 9964, 1776, 9970, 6391, 38...
Test
7,834
4
Type_I_and_type_II_errors:type type ii errors statistical hypothesis testing type error rejection true null hypothesis also known false positive finding conclusion type ii error non-rejection false null hypothesis also known false negative finding conclusion much statistical theory revolves around minimization one errors though complete elimination either treated statistical impossibility statistics null hypothesis statement one seeks nullify conclude incorrect evidence contrary commonly presented statement phenomenon studied produces effect makes difference example null hypothesis might statement diet low carbohydrates effect people weight experimenter usually frames null hypothesis intent rejecting intending run experiment produces data shows phenomenon study indeed make difference case diet low carbohydrates specific time frame fact tend lower body weight people adhere cases specific alternative hypothesis opposed null hypothesis cases alternative hypothesis explicitly stated simply null hypothesis false — either event binary judgment interpretation differs matter significant dispute statistics terms false positives false negatives positive result corresponds rejecting null hypothesis negative result corresponds failing reject null hypothesis false means conclusion drawn incorrect thus type error false positive type ii error false negative comparing two means concluding means different reality different type error concluding means different reality different type ii error various extensions suggested type iii errors though none wide use statistical hypothesis tests probability making type type ii errors example blood tests disease falsely detect disease proportion people fail detect disease proportion people test probability making type error denoted α test probability making type ii error denoted β error rates traded given sample set effort reduce one type error generally results increasing type error given test way reduce error rates increase sample size may feasible test statistic robust type error rate controlled terms also used general way social scientists others refer flaws reasoning statistical test theory notion statistical error integral part hypothesis testing test requires unambiguous statement null hypothesis usually corresponds default state nature example person healthy accused guilty product broken alternative hypothesis negation null hypothesis example person healthy accused guilty product broken result test may negative relative null hypothesis healthy guilty broken positive healthy guilty broken result test corresponds reality correct decision made however result test correspond reality error occurred due statistical nature test result never except rare cases free error two types error distinguished type error type ii error type error occurs null hypothesis h true rejected asserting something absent false hit type error often referred false positive result indicates given condition present actually present terms folk tales investigator may see wolf none raising false alarm null hypothesis h comprises statement wolf type error rate significance level probability rejecting null hypothesis given true denoted greek letter α alpha also called alpha level often significance level set 0.05 5 implying acceptable 5 probability incorrectly rejecting null hypothesis type ii error occurs null hypothesis false erroneously fails rejected failing assert present miss type ii error often called false negative actual hit disregarded test seen miss test checking single condition definitive result true false type ii error committed true alternative hypothesis believed terms folk tales investigator may fail detect wolf fact wolf present therefore fail raise alarm h null hypothesis comprises statement wolf wolf indeed present type ii error part investigator wolf either exists exist within given context— question correctly detected either failing detect present detecting present rate type ii error denoted greek letter β beta related power test equals 1−β tabularised relations truth/falseness null hypothesis outcomes test hypothesis adding water toothpaste protects cavities null hypothesis h adding water make toothpaste effective fighting cavities null hypothesis tested experimental data view nullifying evidence contrary type error occurs detecting effect adding water toothpaste protects cavities present null hypothesis true i.e. true adding water toothpaste make effective protecting cavities null hypothesis rejected based bad experimental data extreme outcome chance alone hypothesis adding fluoride toothpaste protects cavities null hypothesis h adding fluoride toothpaste effect cavities null hypothesis tested experimental data view nullifying evidence contrary type ii error occurs failing detect effect adding fluoride toothpaste protects cavities present null hypothesis false i.e. adding fluoride actually effective cavities data given experiment null hypothesis rejected hypothesis evidence produced court proves man guilty null hypothesis h man innocent type error occurs convicting innocent person miscarriage justice type ii error occurs letting guilty person go free error impunity positive correct outcome occurs convicting guilty person negative correct outcome occurs letting innocent person go free hypothesis patient symptoms improve treatment rapidly placebo treatment null hypothesis h patient symptoms treatment indistinguishable placebo type error would falsely indicate treatment effective placebo whereas type ii error would failure demonstrate treatment effective placebo even though actually effective 1928 jerzy neyman 1894–1981 egon pearson 1895–1980 eminent statisticians discussed problems associated deciding whether particular sample may judged likely randomly drawn certain population florence nightingale david remarked necessary remember adjective 'random term 'random sample apply method drawing sample sample identified two sources error namely 1930 elaborated two sources error remarking 1933 observed problems rarely presented form discriminate certainty true false hypothesis p. 187 also noted deciding whether fail reject reject particular hypothesis amongst set alternative hypotheses p. 201 h h easy make error papers co-written neyman pearson expression h always signifies hypothesis tested paper call two sources error errors type errors type ii respectively standard practice statisticians conduct tests order determine whether speculative hypothesis concerning observed phenomena world inhabitants supported results testing determine whether particular set results agrees reasonably agree speculated hypothesis basis always assumed statistical convention speculated hypothesis wrong so-called null hypothesis observed phenomena simply occur chance consequence speculated agent effect – test determine whether hypothesis right wrong hypothesis test often called null hypothesis likely coined fisher 1935 p. 19 hypothesis either nullified nullified test null hypothesis nullified possible conclude data support alternative hypothesis original speculated one consistent application statisticians neyman pearson convention representing hypothesis tested hypothesis nullified expression h led circumstances many understand term null hypothesis meaning nil hypothesis – statement results question arisen chance necessarily case – key restriction per fisher 1966 null hypothesis must exact free vagueness ambiguity must supply basis 'problem distribution test significance solution consequence experimental science null hypothesis generally statement particular treatment effect observational science difference value particular measured variable experimental prediction probability obtaining result extreme one obtained supposing null hypothesis true lower pre-specified cut-off probability example 5 result said statistically significant null hypothesis rejected british statistician sir ronald aylmer fisher 1890–1962 stressed null hypothesis statistical tests always involve trade-off threshold value varied make test restrictive sensitive restrictive tests increasing risk rejecting true positives sensitive tests increasing risk accepting false positives automated inventory control system rejects high-quality goods consignment commits type error system accepts low-quality goods commits type ii error notions false positives false negatives wide currency realm computers computer applications follows security vulnerabilities important consideration task keeping computer data safe maintaining access data appropriate users context authentication reject positive outcome may counterintuitive experts fields put another way null hypothesis user authorized moulton 1983 stresses importance false positive occurs spam filtering spam blocking techniques wrongly classify legitimate email message spam result interferes delivery anti-spam tactics block filter high percentage unwanted emails without creating significant false-positive results much demanding task false negative occurs spam email detected spam classified non-spam low number false negatives indicator efficiency spam filtering term false positive also used antivirus software wrongly classifies harmless file virus incorrect detection may due heuristics incorrect virus signature database similar problems occur antitrojan antispyware software detection algorithms kinds often create false positives optical character recognition ocr software may detect dots appear algorithm used false positives routinely found every day airport security screening ultimately visual inspection systems installed security alarms intended prevent weapons brought onto aircraft yet often set high sensitivity alarm many times day minor items keys belt buckles loose change mobile phones tacks shoes ratio false positives identifying innocent traveller terrorist true positives detecting would-be terrorist therefore high almost every alarm false positive positive predictive value screening tests low relative cost false results determines likelihood test creators allow events occur cost false negative scenario extremely high detecting bomb brought onto plane could result hundreds deaths whilst cost false positive relatively low reasonably simple inspection appropriate test one low statistical specificity high statistical sensitivity one allows high rate false positives return minimal false negatives biometric matching fingerprint recognition facial recognition iris recognition susceptible type type ii errors null hypothesis input identify someone searched list people system designed rarely match suspects probability type ii errors called false alarm rate hand system used validation acceptance norm far measure system security frr measures user inconvenience level practice medicine significant difference applications screening testing example states usa require newborns screened phenylketonuria hypothyroidism among congenital disorders although display high rate false positives screening tests considered valuable greatly increase likelihood detecting disorders far earlier stage simple blood tests used screen possible blood donors hiv hepatitis significant rate false positives however physicians use much expensive far precise tests determine whether person actually infected either viruses perhaps widely discussed false positives medical screening come breast cancer screening procedure mammography us rate false positive mammograms 15 highest world one consequence high false positive rate us 10-year period half american women screened receive false positive mammogram false positive mammograms costly 100 million spent annually u.s. follow-up testing treatment also cause women unneeded anxiety result high false positive rate us many 90–95 women get positive mammogram condition lowest rate world netherlands 1 lowest rates generally northern europe mammography films read twice high threshold additional testing set high threshold decreases power test ideal population screening test would cheap easy administer produce zero false-negatives possible tests usually produce false-positives subsequently sorted sophisticated expensive testing false negatives false positives significant issues medical testing false negatives may provide falsely reassuring message patients physicians disease absent actually present sometimes leads inappropriate inadequate treatment patient disease common example relying cardiac stress tests detect coronary atherosclerosis even though cardiac stress tests known detect limitations coronary artery blood flow due advanced stenosis false negatives produce serious counter-intuitive problems especially condition searched common test false negative rate 10 used test population true occurrence rate 70 many negatives detected test false false positives also produce serious counter-intuitive problems condition searched rare screening test false positive rate one ten thousand one million samples people true positive positives detected test false probability observed positive result false positive may calculated using bayes theorem
[ 5857, 2244, 2213, 4330, 6643, 10743, 10207, 7739, 2045, 2558, 9791 ]
None
7,835
2
Android_One:android one android one near-stock version android operating system released google android one altered companies make phones runs certain smartphones android one brand promises regular security updates three years android os updates two years android one started google 2014 focusing entry-level devices emerging markets though evolved including mid-range high-end smartphones android one runs 100 phones jon gold head android one partnerships google described program evolution including higher-end devices continuation google nexus program phones vetted google included software allowing years quick updates made companies android one started sundar pichai former product chief current ceo google android one often took least year latest android update arrived non-google devices project targeted indian market low-tier devices pichai said initial set devices shared common hardware based reference platform increasing range devices launched future security system updates handled google first set android one devices featured mediatek quad-core mt6582 mobile system-on-chip mobile soc 2014 android one phones initially rolled india pakistan bangladesh nepal indonesia philippines sri lanka myanmar south asian countries first android one smartphones indian brands micromax spice karbonn september 2014 second generation android one smartphones indonesia brands mito impact evercoss one x nexian journey february 2015 first android one preinstalled android 5.0 lollipop manufacturers including qmobile launched android one device named qmobile a1 july 6 2015 pakistan android one launched nigeria august 2015 infinix hot 2 x510 1 2 gb ram version became first android one africa infinix hot 2 x510 also exported african countries egypt ghana ivory coast morocco kenya cameroon uganda also asian countries united arab emirates pakistan indonesia 2 gb ram version manufactures follow gradually 2016 softbank announced would first carrier japan introduce android one phone country namely sharp 507sh released late july 2016 netherlands italy developed countries android one available market retailer media markt sells turkish smartphone brand general mobile 4g android one devices two countries well turkey since 2017 may 25 2017 turkish smartphone brand general mobile released next addition fully committed portfolio android one phones gm 6 softbank soon followed introducing sharp x1 japan subsidiary telecommunications company mobile june 30 september 5 2017 android one xiaomi jointly announced xiaomi mi a1 first android one device evolved program charter bring users smartphones running unmodified android operating system latest google technology easy use interface regular security os upgrades mi a1 first android one device released globally thirty-six markets sold various online offline distributors including xiaomi ’ mi homes device sales concentrated india indonesia russia taiwan september 2017 mvno google fi introduced first android one device available u.s. android one moto x4 november android one entered german market htc u11 life end november 2017 softbank announced addition four new devices android one lineup mobile x2 htc x3 kyocera s3 sharp s4 kyocera february 2018 hmd global maker nokia smartphones announced joined android one program devices approved google original equipment manufacturers oems agree requirements android one features concerning android operating system os security updates official android one entry page says fine print end confirm exact duration support phones territory smartphone manufacturer monthly security updates supported least three years initial phone release february 22 2018 google blog article says faster access android os updates two years including latest ai innovations google amongst secure devices ecosystem regular security updates three years google play protect built google confirms promise provide 2 years updates android one devices still stands website design impact promise program android one continues expand line smartphones geographic availability oem carrier partnerships countries release likely expand beyond initial countries regions listed snapdragon 410 devices rebrands longcheer l8150 based qualcomm seed reference design explaining similarities direct competitor based fully custom pcb design wileyfox swift available worldwide officially supported wileyfox recent android versions community supported lineageos roms
[ 5637, 11273, 8719, 3600, 7700, 9244, 11294, 1578, 5677, 8237, 1083, 10303, 6212, 69, 8262, 4685, 3664, 8280, 8794, 8285, 2658, 11391, 1670, 5262, 10393, 673, 8870, 1191, 9913, 196, 8907, 2259, 8921, 8413, 9949, 1255, 8940, 6391, 5892, 742...
Test
7,836
2
Unit_Control_Block:unit control block ibm mainframe operating systems os/360 successors line unit control block ucb memory structure control block describes single input/output peripheral device unit exposure alias operating system certain data within ucb also instructs input/output supervisor ios use certain closed subroutines addition normal ios processing additional physical device control operating systems similar structures initial program load ipl current mvs systems nucleus initialization program nip reads necessary information i/o definition file iodf uses build ucbs ucbs stored system-owned memory extended system queue area esqa ipl completes ucbs owned input/output support information stored ucb device type disk tape printer terminal etc address device 1002 subchannel identifier device number channel path id chpid defines path device devices volume serial number volser large amount information including os job management data contents ucb changed mvs evolved concept representation channel command processor external device inside every ucb representation subchannel information block used ssch assembler instruction put irb input put orb output start chain channel commands known ccws ccws queued onto ucb startio macro interface although reference discuss startio macro macro instruction ibm-supported interface withstanding fact interface remained least past three decades startio interface either start operation immediately channel queue empty queue request channel queue deferred execution deferred execution initiated immediately request head queue device becomes available even another program control instant basic design input/output supervisor ios ucb evolved anchor hold information states device ucb currently five areas used external interface device class extension ucb common extension ucb prefix stub ucb common segment ucb device dependent segment areas internal use information read used determine information device earliest implementations os ucbs foundations extensions assembled sysgen located within first 64 kb system area i/o device lookup table consisted 16-bit q-type i.e relocatable addresses subsequent enhancements allowed extensions 64-kilobyte 65,536 bytes line thereby saving space additional ucb foundations 64-kilobyte line also thereby preserving architecture ucb lookup table converting cuu ucb foundation address ucbs introduced 1960s os/360 device addressed ucb typically moving head hard disk drive tape drive internal cache without device usually grossly outperformed mainframe channel processor hence reason execute multiple input/output operations time would impossible device physically handle 1968 ibm introduced 2305-1 2305-2 fixed-head disks 8 exposures alias addresses per disk os/360 support provided ucb per exposure order permit multiple concurrent channel programs similarly later systems derived os/360 required additional ucb allocated virtual volume 3850 mass storage system mss exposure 3880-11 3880-13 successors originally implemented operating system real way determine waiting i/o less important waiting i/os i/os device handled first first workload manager wlm introduced mvs/esa 5.1 os/390 added smart i/o queuing allowed operating system using information provided wlm systems programmer determine waiting i/os less important waiting i/os wlm would sense move waiting i/o queue device longer busy important waiting i/o would get device next wlm improved i/o response device important work processed however still limit single i/o single ucb/device one time since one set channel commands i/o could run one time fine 1960s cpus slow i/o could processed fast cpus could process systems matured cpu speed greatly surpassed i/o input capacity access device serialized ucb level became serious bottleneck parallel access volume pav allow ucbs clone allow multiple i/o run simultaneously appropriate support dasd hardware pav provides support one i/o single device time maintain backward compatibility operations still serialized ucb level pav allows definition additional ucbs logical device using additional alias address example dasd device base address 1000 could alias addresses 1001 1002 1003 alias addresses would ucb since four ucbs single device four concurrent i/os possible writes extent area disk assigned one contiguous area file still serialized reads writes occur simultaneously first version pav disk controller assigns pav ucb second version pav processing work load manager wlm reassigns pav new ucbs time time third version pav processing ds8000 controller series i/o uses available pav ucb needs net effect pavs decrease iosq time component disk response time often zero restrictions pav number alias addresses 255 per base address overall number devices per logical control unit 256 counting base plus aliases two types pav alias addresses static dynamic static alias address defined dasd hardware z/os refer specific single base address dynamic means number alias addresses assigned specific base address fluctuates based need management dynamic aliases left wlm running goal mode always case supported levels z/os systems implement pav usually mixture pav types one perhaps two static aliases defined base ucb bunch dynamic aliases defined wlm manage sees fit wlm watches i/o activity system wlm determines high-importance workload delayed due high contention specific pav-enabled device specifically disk device base alias ucbs must insufficient eliminate ios queue time high contention wlm estimates would help workload achieve goals readily try move aliases another base address device another problem may certain performance goals met specified wlm service classes wlm look alias ucbs processing work less important tasks service class appropriate wlm re-associate aliases base addresses associated important work wlm actions moving aliases one disk device another take seconds effects seen many situations fast enough hyperpavs much responsive acquire ucb pool duration single i/o operation returning pool delay waiting wlm react hyperpav ucb acquired duration single i/o smaller number ucbs required service workload compared dynamic pavs large z/os images ucbs scarce resource hyperpavs provide relief regard similar concept unix-like systems kernel codice_1 structure addressed combination major minor number device node digital vms operating system uses identically named structure ucb similar purposes ucb created i/o device data ucb includes device unit number part device name listhead pending i/o requests may queued ucb may device-driver defined extension driver keep driver-defined data instantiated device device object i/o subsystem windows nt-family operating systems another similar structure
[ 11656, 7053, 8976, 5397, 663, 2081, 8485, 7983, 2616, 11131, 8393, 7242, 10958, 3669, 1501, 868, 7272, 10601, 4586, 3565, 10094, 1911, 2168, 3323, 2172 ]
None
7,837
8
Discoverability:discoverability discoverability degree something especially piece content information found search file database information system discoverability concern library information science many aspects digital media software web development marketing since something e.g. website product service etc used people find understand used metadata information information book title product description website keywords affects discoverable something database online 2010s adding metadata product available online make easier end users find product example song file made available online making title name band genre year release pertinent information available connection song file make easier users find song file organizing information putting alphabetical order including search engine example improve discoverability discoverability related different accessibility usability qualities affect usefulness piece information concept discoverability information science online context loose borrowing concept similar name legal profession law discovery pre-trial procedure lawsuit party law civil procedure obtain evidence party parties means discovery devices request answers interrogatories request production documents request admissions depositions discovery obtained non-parties using subpoenas discovery request objected requesting party may seek assistance court filing motion compel discovery usability piece information directly relates discoverable either walled garden database open internet quality information available database internet depends upon quality meta-information item product service case service emphasis placed service reusability opportunities exist reuse service however reuse possible information discoverable first place make items products services discoverable following set activities need performed regarding number 2 storing information searchable repository technically human-searchable repository printed paper list would qualify 2010s searchable repository usually taken mean computer-searchable repository database human user search using type search engine find feature number 3 supports analysis number 2 reading printed paper list hand might feasible theoretical sense time cost-efficient comparison computer-based searching apart increasing reuse potential services discoverability also required avoid development solution logic already contained existing service design services discoverable also provide interpretable information capabilities service discoverability principle provides guidelines could applied service-oriented analysis phase service delivery process relation audiovisual content according meaning given canadian radio-television telecommunications commission crtc purpose 2016 discoverability summit discoverability summed intrinsic ability given content stand lot position easily found discovered piece audiovisual content movie tv series music book ebook audio book podcast audiovisual content digital file tv show movie song made available online content tagged identifying information names key artists e.g. actors directors screenwriters tv shows movies singers musicians record producers songs genres e.g. movies genres action drama comedy songs genres heavy metal music hip hop music etc makes easier end users find content interested 2010s users interact online content algorithms typically determine types content user interested computer program suggests like content user may interested different websites systems different algorithms one approach used amazon online store indicate user user searches looks content/product x users purchased x also purchased following items example oriented around online purchasing behaviour algorithm could also programmed provide suggestions based factors e.g. searching viewing etc. 2010s discoverability typically referred connection search engines highly discoverable piece content e.g. certain movie would movie appears top near top user search results related concept role recommendation engines computer programs give user recommendations based his/her online activity 2010s discoverabilty applies desktop laptop computers increasingly widening range devices access internet including various console video game systems mobile devices tablets smartphones organizations make effort promote certain content e.g. tv show film song video game use traditional marketing billboards tv ads radio ads digital ads pop-up ads pre-roll ads etc mix traditional digital marketing even user ’ intervention searching certain content type content discoverability prime factor contributes whether piece audiovisual content likely found various digital modes content consumption 2017 modes searching include looking netflix movies spotify music audible audio books etc. although concept also generally applied content found twitter tumblr instagram websites involves content ’ mere presence given platform involve associating content keywords tags search algorithms positioning within different categories metadata etc thus discoverability enables much promotes audiovisual content broadcast streamed digital media using internet discoverability includes underlying concepts information science programming architecture foundation search specific product information content within specific webpage software application app discoverability feature content link depends range factors including size colour highlighting features position within page colour used communicate importance feature link designers typically use elements well shadows bolding individuals see certain colours traditional paper printing created physical locations stood fold newspaper versus fold web page app screenview may certain locations give features additional visibility users right bottom web page screen positional advantages disadvantages various locations depend different cultures languages e.g. left right vs. right left locations become established toolbars top screen webpage designers argued commonly used features e.g. print button much visually prominent rarely used features features seen convention user places mouse cursor certain area toolbar function option become visible general smaller screen mobile devices controls often placed right centre screen user views content text organizations try increase discoverability certain feature adding animation moving click icon 2017 addition motion sensors geotracking mobile devices made webpage design discoverability complex smartphones tablets typically capable many inputs user 1980s era desktop including swiping touchscreen touching images screen tilting device one challenges webpage app design degree sophistication experience users navigating webpage app environment varies great deal individuals new using applications one extreme experienced computer users items searched online goal discoverability near top search results organizations may make efforts make likely content webpages top close top search results approaches often collectively called search engine optimization seo note organization takes action increase seo website normally involve changes search engine rather involves adding metadata tags original content among strategies increase visibility website search engine algorithms service delivery context application principle requires collecting information service service analysis phase phase maximum information available service ’ functional context capabilities service stage domain knowledge business experts could also enlisted document meta-data service service-oriented design phase already gathered meta-data could made part service contract oasis soa-rm standard specifies service description artifact represents service meta-data make service meta-data accessible interested parties must centrally accessible could either done publishing service-meta dedicated 'service registry simply placing information 'shared directory case 'service registry repository also used include qos sla current state service basic type meta-information expresses functional context service details product content service ’ capabilities application standardized service contract principle helps create basic functional meta-data consistent manner standardization applied meta-information outside technical contract service e.g publishing information service registry general items data might used categorize may include services know service behavior limitations user service experience information needs documented within service registry way potential consumers use meta-information comparing performance requirements effective application design principle requires meta-information recorded service needs consistent meaningful possible organization-wide standards exist enforce service developers record required meta-data consistent way information recorded meta-data service needs presented way technical non-technical experts understand purpose capabilities service evaluation service may required business people service authorized used principle best applied service-oriented analysis phase time details service ’ purpose functionality available although service design principles support positive manner however case service abstraction service discoverability principle exists inversely proportional relationship details service hidden away service consumers less discoverable information available discovering service could addressed carefully recording service meta-information inner workings service documented within meta-information online economy sophisticated computer programs called algorithms analyse ways end users search access use different content products online thus metadata created regarding content product e.g. author genre e-book also data generated specific human users interaction content organization social media website user profile given person indicating demographic information e.g. age gender location residence employment status education etc social media website collect analyse information tendencies given user given subcategory users social media websites collecting data human users online activities preferences may raise potential privacy concerns algorithms called “ black boxes ” factors used leading websites algorithms typically proprietary information released public number search engine optimization seo firms offer services attempting increase ranking client ’ web content website seo firms typically know exact algorithms used google facebook ghosh et al found algorithm web crawler access 26 new online content ... recrawling constant fraction entire web 2010s one concern raised increasing role algorithms search engines databases specific person indicates preference certain type content product computer algorithm may increasingly focus making recommendations type content give practical example person searches comedy movies online search engine algorithm may start mainly recommending comedies user showing range films e.g. drama documentary etc. positive side person likes comedy films restricted filter reduce information load scanning vast numbers films however various cultural stakeholders raised concerns filter algorithms may restrict diversity material discoverable users concerns dangers filter bubbles raised regards online news services provide types news news sources topics user based his/her previous online activities thus person previously searched fox tv content mainly shown fox tv content person previously searched pbs content shown pbs search results could lead news readers becoming aware certain news source viewpoints search behaviour video content viewers changed great deal since widespread popularity video sharing websites video streaming whereas typical tv show consumer 1980s would read print edition tv guide find shows click channel channel channel surfing see shows appealed 2010s video content consumers increasingly watching screens either smart tvs tablet computer screens smartphones computerized search function often automated algorithm-created suggestions viewer search function user enter name tv show producer actor screenwriter genre help find content interest user searching search engine device laptop tablet computer smartphone device may transmit information user preferences previous online searches website continuing 1980s 2010s comparison 1980s type brand television user watching affect his/her viewing habits however person searching tv shows 2010s different brands computerized smart tvs probably get different search results search term organizations trying get maximal user uptake product content service online discoverability become important goal however achieving discovery automatically translate market success example hypothetical online game xyz easily discoverable function mobile devices video game perform well mobile game market despite top search results well even product functions runs plays properly well users may like product case user like certain online product service discoverability repeatable user find product service subsequent search may longer look product/service instead shift substitute easily reliably findable enough make online product service discoverable short period unless goal create “ viral ” content part short-term marketing campaign
[ 9734, 113, 2901, 1083, 8639 ]
Test
7,838
8
Application_Request_Routing:application request routing application request routing arr extension internet information server iis enables iis server function load balancer arr iis server configured route incoming requests one multiple web servers using one several routing algorithms load balancing requests high availability web servers achieved without incurring typically-high costs dedicated load balancing products arr currently available version 3.0 released july 26 2013 current version supported x86 x64 installed iis 7.0 later windows 2008 later arr available download microsoft download center via microsoft web platform installer webpi arr requires url rewrite extension function uses routing requests arr configured redirect traffic based server variables urls cookies performs full layer 7 load balancing arr functionality described load balancing reverse proxy although advanced dedicated reverse proxy products microsoft uag dedicated load balancing solutions arr 3.0 supports following features
[ 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 10281, 2101, 8757, 10812, 3648, 7754, 10828, 4173, 4174, 9808, 10839, 603, 9819, 3170, 10338, 617, 9834, 622, 9839, 4210, 7796, 7290, 4731, 10879, 8841, 6797, 2193, 9874, 10900, 4248, 9377, 32...
Validation
7,839
0
Machine-readable_dictionary:machine-readable dictionary machine-readable dictionary mrd dictionary stored machine computer data instead printed paper electronic dictionary lexical database machine-readable dictionary dictionary electronic form loaded database queried via application software may single language explanatory dictionary multi-language dictionary support translations two languages combination translation software multiple languages usually apply bidirectional dictionaries mrd may dictionary proprietary structure queried dedicated software example online via internet dictionary open structure available loading computer databases thus used via various software applications conventional dictionaries contain lemma various descriptions machine-readable dictionary may additional capabilities therefore sometimes called smart dictionary example smart dictionary open source gellish english dictionary term dictionary also used refer electronic vocabulary lexicon used example spelling checkers dictionaries arranged subtype-supertype hierarchy concepts terms called taxonomy also contains relations concepts called ontology search engines may use either vocabulary taxonomy ontology optimise search results specialised electronic dictionaries morphological dictionaries syntactic dictionaries term mrd often contrasted nlp dictionary sense mrd electronic form dictionary printed paper although used programs contrast term nlp dictionary preferred dictionary built scratch nlp mind iso standard mrd nlp able represent structures called lexical markup framework first widely distributed mrds merriam-webster seventh collegiate w7 merriam-webster new pocket dictionary mpd produced government-funded project system development corporation direction john olney manually keyboarded typesetting tapes either book available originally distributed multiple reels magnetic tape card images separate word definition separate punch card numerous special codes indicating details usage printed dictionary olney outlined grand plan analysis definitions dictionary project expired analysis could carried robert amsler university texas austin resumed analysis completed taxonomic description pocket dictionary national science foundation funding however project expired taxonomic data could distributed roy byrd et al ibm yorktown heights resumed analysis webster seventh collegiate following amsler work finally 1980s starting initial support bellcore later funded various u.s. federal agencies including nsf arda darpa dto reflex george armitage miller christiane fellbaum princeton university completed creation wide distribution dictionary taxonomy wordnet project today stands widely distributed computational lexicology resource
[ 416, 6145, 874, 396, 2414, 11056, 10519, 538 ]
None
7,840
2
WinBuilder:winbuilder winbuilder free application designed build customize boot disks live cds based microsoft windows winpe scripts building blocks live cd compiled winbuilder used build core components live cd adding applications configuration specific project scripts consist human-readable text file .script extension contain winbuilder scripting commands scripts graphical user interface sometimes encoded applications extracted needed project collection winbuilder scripts maintained building complete live cd project contains multiple scripts responsible adding features applications build users may build projects scratch use one many projects actively developed boot-land community projects downloaded directly using winbuilder built-in download manager used as-is customized meet individual needs projects developed distributed freely aim provide alternative popular live cd distributions based linux knoppix slax damn small linux known use rescue administrative actions pcs use software build various customized boot disks covered articles pc quest german edition pc world also offers customized scripts building disk images including additional utilities branded pcwvistape pcwwin7pe russian edition chip terabyte unlimited cnet editor review found winbuilder one easy-to-use boot disk creation tools genre praised novice-friendly interface time warned program expects experienced users part boot disk applications experts built-in download center remarked simplifies procuring boot disk applications features praised small size fair memory overhead simple instructions robust application installation wizards
[ 9693, 9377, 6371, 6436, 5380, 8837, 6797, 7983, 10896, 9780, 9910, 4637, 1150 ]
None
7,841
1
Spanner_(database):spanner database spanner google newsql database spanner globally distributed database service gives developers production-ready storage solution provides key features global transactions strongly consistent reads automatic multi-site replication failover spanner stores large amounts mutable structured data spanner allows users perform arbitrary queries using sql relational data maintaining strong consistency high availability data synchronous replication key features spanner spanner joined google platform february 2017 available part google cloud platform spanner uses paxos algorithm part operation shard partition data across hundreds servers makes heavy use hardware-assisted clock synchronization using gps clocks atomic clocks ensure global consistency google f1 sql database management system dbms built top spanner replacing google custom mysql variant
[ 4995, 5892, 7816, 6156, 5262, 8719, 5524, 7700, 10645, 8858, 1435, 10525, 2978, 4901, 1959, 3499, 10284, 1203, 11317, 5431, 7359, 196, 3269, 3782, 11590, 4683, 7499, 11343, 3664, 3795, 1240, 8413, 6367, 2658, 6632, 5483, 236, 7022, 9712, ...
Test
7,842
3
Macintosh_Quadra:macintosh quadra macintosh quadra family personal computers designed manufactured sold apple computer inc. october 1991 october 1995 quadra named motorola 68040 central processing unit replaced macintosh ii family high-end macintosh model first models quadra 700 quadra 900 introduced october 1991 quadra 800 840av 605 added 1993 macintosh centris line merged quadra october 1993 adding 610 650 660av range introduction power macintosh line early 1994 apple continued produce sell new quadra models 950 continued sold october 1995 product manager quadra family frank casanova also product manager macintosh iifx first computers bearing macintosh quadra name quadra 700 quadra 900 introduced 1991 central processing unit cpu speed 25 mhz 700 compact model using case dimensions macintosh iici processor direct slot pds expansion slot latter newly designed tower case five nubus expansion slots one pds slot 900 replaced 1992 quadra 950 cpu speed 33 mhz line joined number 800-series machines new minitower case design starting quadra 800 600-series pizza box desktop cases quadra 610 1993 quadra 840av 660av introduced 40 mhz 25 mhz respectively included digital signal processor s-video composite video input/output ports well cd-quality microphone audio output ports av models also introduced plaintalk consisting text-to-speech software macintalk pro speech control although dictation however features poorly supported software dsp installed later av macs based more-powerful powerpc 601 cpu powerful enough handle coprocessor duties apple hired marketing firm lexicon branding come name lexicon chose name quadra hoping appeal engineers evoking technical terms like quadrant quadriceps quadra name also used successors centris models briefly existed 1993 610 650 660av centris mid-range line systems quadra high end lc low end later decided many product lines name dropped machines era including quadra 605 also sold performas last use name quadra 630 variation lc 630 using full motorola 68040 instead lc 68lc040 introduced together 1994 630 first mac use ide based drive bus internal hard disk drive whereas earlier models used scsi first three apple workgroup server models wgs 60 wgs 80 wgs 95 mostly called aws 95 apple workgroup server based centris 610 quadra 800 quadra 950 respectively transition motorola 68040 smooth previous transitions motorola 68020 motorola 68030 due motorola 68040 split instruction data caches quadra compatibility problems self-modifying code including relocating code common macintosh memory model apple partially fixed basic mac os memory copy call flush caches solved vast majority stability problems negated much motorola 68040 performance improvements apple also introduced variant memory copy call flush cache new trap defined way calling older version mac os would simply call previous memory copy routine net effect many complex applications initially slow prone crashing 68040 although developers quickly adapted new architecture relying apple memory copy routines rather flushing cache using memory copy flush cache appropriate time
[ 9732, 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 1592, 8253, 576, 1090, 8783, 4180, 10838, 10840, 9312, 9826, 8806, 6258, 5235, 10357, 7286, 4220, 10365, 10878, 6783, 7299, 4741, 7305, 8842, 6283, 7824, 147, 7830, ...
Test
7,843
4
Real-time_adaptive_security:real-time adaptive security real-time adaptive security network security model necessary accommodate emergence multiple perimeters moving parts network increasingly advanced threats targeting enterprises adaptive security watch network malicious traffic behavioral anomalies ferret end point vulnerabilities identify real-time changes systems automatically enforce end point protections access rules block malicious traffic follow compliance dashboard providing audit data among key features adaptive security infrastructure security platforms share correlate information rather point solutions heuristics system could communicate suspicions firewall features include finer-grained controls automation addition human intervention on-demand security services security service integration security management data rather adding security custom applications go operational security models would created design phase app major change model real-time adaptive security shifting authorization management policy on-demand service contains details policy enforcement matches compliance adapt user situation trying access application instance
[ 2192, 939, 5245 ]
Test
7,844
3
Macintosh_IIvi:macintosh iivi macintosh iivi also sold macintosh performa 600 personal computer designed manufactured sold apple computer inc. september 1992 february 1993 iivi introduced alongside macintosh iivx using slower processor 16 mhz vs. 32 mhz floating point unit performa 600 models meanwhile iivi iivx 32 mhz cpu iivi benchmarks faster iivx model macintosh ii family branded performa short-lived macintosh model discontinued four months introduction centris 650 introduced similar price point performa 600 featured 1994 disney movie blank check models include three nubus slots pds performa 600 models formally introduced september 14 shipments delayed october coincide introduction iivi iivx introduced september 14 1992 introduced october 19 1992
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 1090, 4180, 10838, 10840, 9312, 8806, 6258, 10357, 4220, 10365, 10878, 6783, 7299, 4741, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7869, 8893, 8896, 4807, 4810, ...
None
7,845
3
Black_Lab_Linux:black lab linux black lab linux free software linux distribution x86 x86-64 hardware first released november 2013 pc/opensystems llc black lab linux based ubuntu linux tailored general desktop use technical user commercially made available pc/opensystems llc business desktops education facilities well parallel computing formerly known os/4 product renamed roberto j. dohnert software team black lab linux uspto denied trademark application os/4 pc/opensystems llc acquired rights name black lab linux 2008 acquisition terrasoft solutions fixstars current incarnation black lab linux share code platform similarities terrasoft solutions product called black lab linux terrasoft solutions release powerpc processor fixstars linux products yellow dog linux y-hpc currently developed yellow dog linux brand
[ 8837, 7435, 10127, 2321, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 2738, 4790, 823, 439, 56, 59, 7483, 3903, 4673, 2375, 4039, 8907, 11388, 1110, 9693, 2914, 485, 3685, 9064, 4841, 6890, 7913, 5356, 7020, 7534, 2671, 7920, ...
None
7,846
2
EFx_Factory:efx factory efx factory architectural-guidance software factory pioneering architectural guidance software factory microsoft one first implementations software factory built ‘ efx factory ’ implements .net distributed architecture service-oriented applications services factory based upon architectural application framework called enterprise framework describes physical microsoft .net architecture leveraging microsoft enterprise library service-oriented patterns microsoft patterns practices efx factory designed built development consultants within microsoft consulting services response customer demand implementation .net architecture best practices .net development guidance best use enterprise library number application blocks freely available microsoft initially circa 2003 .net framework 1.0-1.1 visual studio 2002–2003 ‘ enterprise framework ’ efx built meet growing customer demand implementation .net architecture framework based upon implementation patterns harvested several enterprise solution implementations various customers framework implemented layered .net architecture leveraged extended enterprise library provide complete framework authoring applications services .net platform application framework evolved along changes .net platform emerging microsoft technologies changes industry service orientation patterns framework delivered set class libraries containing base implementations architectural layers prescribing certain technologies asmx ‘ infrastructural services ’ developers used address cross-cutting concerns architectural layers exception handling authentication authorization logging etc framework extended enterprise library implemented several real-world security providers necessary many customers time heterogeneous technology environments addition many best practice patterns specifically concerning exception handling built upon enterprise library solve requirements enterprise context framework also provided blocks packaged enterprise library validation block provided useful abstractions enterprise library specific solution domain offered simplified apis framework unified api typing string parameters framework delivered source form set framework assemblies packaged enterprise library framework included suggested set solutions reference implementation ri documentation developers created client-side applications server-side asp.net web services development application service required developer create new solution implement set assemblies one layer referenced framework assemblies deployed executable application web service primary challenge developers learning patterns framework hand crafting applications services blank solutions without availability time code templates resulted prolific cut pasting code reference implementation code highly vulnerable manual error circa 2005 several technologies emerged microsoft enabled use templates automation modeling types applications services including visual studio 2005 visual studio modeling distributed application system designers guidance automation toolkit gat domain-specific language toolkit dsl using new technologies framework able evolve systematically implementation software factory process many constraints framework lifted enable flexibility products factory could assemble primarily removal prescription technology architectural layers ability deal effectively change development applications services factory introduced domain modeling several new abstractions utilized automation previously possible factory one first factories combine dsl diagrams gat recipes well extending distributed application system designers visual studio gat recipes factory makes extensive use recipes automating changes solution structure property changes structure providing wizards configure models factory provides generating project templates work products automating menial tasks factory user 2007 development efx factory ceased many concepts pioneered absorbed future software factory platform microsoft adopted software factories patterns practices web service software factory following list exemplifies features factory others period factory one first factories designed factory 'product model part factory schema factory provides logical architectural view supporting runtime creating/modifying work products factory developer logical model separates logical design factory product ‘ product explorer ’ physical implementation normally viewed modified ‘ solution explorer ’ visual studio way physical structure solution artifacts could separated logical architectural structure work products product factory user could focus upon architecture product author using models abstractions whilst factory manages creation placement source artifacts factory integrates extends distributed application system designers installed visual studio team edition software architects visual studio provided diagrams application designer system designers provide means define high-level application services enterprise compose black box systems composed larger systems factory extends designers add number new shapes representing implementation applications services new shapes implemented provide specific projects solution templates represent physical structure factory product templates added new set diagram files represent internal component parts application service layers diagrams define specification application service layers give user navigation path drill-down high-level applications inner implementation details factory models using dsl ’ internal implementation applications services based upon logical technology-independent architecture soa patterns architecture composed several layers extended implemented pluggable ‘ artefact generators ’ ‘ technology providers ’ technology providers provide technology specific implementation view layer example layer would ‘ service contract ’ layer web service containing service interfaces service operations data contracts factory first factory provide extensibility mechanism 3rd parties global si isv community domain experts would provide technology tailored implementations various layers technology providers would take form external factories factorettes would integrate efx factory enhance expose technology specific views architectural models ultimately transform source artefacts technology separation capability allowed 'variant factory packaged deployed include technology-independent core factory models several ‘ artefact generators ’ providing technology implementations factory enabled composability variant factories could build solutions suit multitude real-world heterogeneous technology environments
[ 10243, 4107, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 4143, 9263, 11316, 1077, 8246, 4174, 4178, 9813, 603, 2145, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 5259, 653, 3224, 4771, 10414, 8391, 7368, 214, 9943, 9434, 2783, 736, 432...
Test
7,847
2
Environment_variable:environment variable environment variable dynamic-named value affect way running processes behave computer part environment process runs example running process query value temp environment variable discover suitable location store temporary files home userprofile variable find directory structure owned user running process introduced modern form 1979 version 7 unix included unix operating system flavors variants point onward including linux macos pc dos 2.0 1982 succeeding microsoft operating systems including microsoft windows os/2 also included feature although somewhat different syntax usage standard variable names unix unix-like systems process separate set environment variables default process created inherits duplicate environment parent process except explicit changes made parent creates child api level changes must done running codice_1 codice_2 alternatively command shells bash user change environment variables particular command invocation indirectly invoking via codice_3 using codice_4 notation running program access values environment variables configuration purposes shell scripts batch files use environment variables communicate data preferences child processes also used store temporary values reference later shell script however unix variables usually used unix environment variable changed script compiled program affect process possibly child processes parent process unrelated processes affected similarly changing removing variable value inside dos batch file change variable duration codice_5 existence unix environment variables normally initialized system startup system init scripts hence inherited processes system users often augment profile script command shell using microsoft windows environment variable default value stored windows registry set codice_6 file unix setuid program given environment chosen caller runs different authority caller dynamic linker usually load code locations specified environment variables codice_7 codice_8 run process authority setuid program would insecure caller could get run arbitrary code hence misuse authority reason libc unsets environment variables startup setuid process setuid programs usually unset unknown environment variables check others set reasonable values variables used scripts command line usually referenced putting special symbols front around variable name instance display user home directory scripting environments user type dos os/2 windows command-line interpreters codice_5 codice_10 user type windows powershell user type commands codice_3 codice_12 codice_13 display environment variables values codice_13 also used print single variable giving variable name sole argument command commands codice_3 codice_12 also used set environment variables often incorporated directly shell unix following commands also used often dependent certain shell simple principles govern environment variables achieve effect environment variables local process set two shell processes spawned value environment variable changed one change seen child process created inherits environment variables values parent process usually program calls another program first creates child process forking child adjusts environment needed lastly child replaces program called procedure gives calling program control environment called program unix unix-like systems names environment variables case-sensitive unix shells variables may assigned without codice_17 keyword variables defined way displayed codice_12 command true environment variables stored shell recognized kernel codice_13 command display child processes inherit however used front program run variables added program environment persistence environment variable session-wide system-wide unset builtin command implemented bourne shell family sh ksh bash etc c shell family csh tcsh etc unix command line shells unsets shell variable removing memory shell exported environment implemented shell builtin directly manipulates internals shell read-only shell variables unset one tries unset read-only variable unset command print error message return non-zero exit code dos os/2 windows command-line interpreters codice_5 codice_10 codice_22 command used assign environment variables values using following arguments codice_22 command without arguments displays environment variables along values examples environment variables include dos master environment provided primary command processor inherits pre-environment defined codice_64 first loaded size configured codice_65 parameter 160 32767 bytes local environment segments inherited child processes typically reduced size contents hold command-line processors like 4dos allow define minimum amount free environment space available launching secondary shells content environment variables remains unchanged upon storage names without codice_66 always converted uppercase exception pre-environment variables defined via codice_64 directive codice_22 dr dos 6.0 higher codice_69 allow lowercase names dr-dos 7.02 higher principle ms-dos 7.0 higher also supports lowercase variable names codice_70 provides means user define environment variable names containing lowercase letters stored environment like normal environment variables remain invisible dos software since written expect uppercase variables command processors limit maximum length variable name 80 characters principally limited size environment segment dos 16-bit windows programs expect contents environment variables exceed 128 characters dr-dos codice_5 supports environment variables 255 4dos even 512 characters since codice_5 configured via codice_73 support command lines 1024 characters internally ms-dos 7.0 higher environment variables expected contain least 1024 characters well versions dr-dos environment passed drivers often need environment installation shrunken relocated codice_74 codice_75/codice_76 options codice_77 zero environment codice_78 substitute drive e.g codice_79 codice_80 relocate environment program order minimize driver effectively resulting resident memory footprint batch mode non-existent environment variables replaced zero-length string standard environment variables reserved environment variables include dr-dos family supports number additional standard environment variables including datalight rom-dos supports number additional standard environment variables well including codice_364 codice_365 codice_366 codice_367 codice_368 codice_369 also used rom-dos system path variables refer locations critical operating system resources generally user-dependent user management variables store information related resources settings owned various user profiles within system general rule variables refer critical system resources locations necessary os run optional system variables explicitly specified default used modify default behavior certain built-in console commands variables also need explicitly specified command line arguments following tables shows typical default values certain environment variables english versions windows retrieved codice_427 list environment variable refers location user documents directory standard method setting program home directory documents directory besides true environment variables statically stored environment changed deleted number pseudo-environment variables exist batch processing so-called replacement parameters replaceable parameters microsoft ibm terminology aka replacement variables digital research novell caldera terminology batch file parameters jp software terminology codice_432..codice_433 codice_434 used retrieve calling parameters batchjob see codice_435 batchjobs retrieved like environment variables actually stored environment command-line processors like dr-dos codice_5 multiuser dos codice_437/codice_438 terminal message process jp software 4dos 4os2 4nt take command windows cmd.exe support type pseudo-environment variables named system information variables novell caldera terminology internal variables jp software terminology used retrieve various possibly dynamic read-only information running system batch jobs returned values represent status system moment variables queried reading multiple times row may return different values even within command querying direct effect system since stored environment listed set exist external programs retrieve true environment variable name defined takes precedence corresponding variable environment variable deleted case-sensitive almost variables prefixed underscore codice_439 4dos etc convention f.e codice_440 dr-dos codice_5 f.e codice_260 addition 4dos 4os2 4nt take command also support called variable functions including user-definable ones work like internal variables take optional parameters f.e codice_443 may even change system status depending function system information variables supported dr-dos codice_5 system information variables supported dr-dos codice_5 networking loaded dynamic environment variables also named internal variables system information variables dos pseudo-environment variables supported codice_427 command-line extensions enabled expand various discrete values whenever queried values change queried multiple times even within command used batch jobs prompt stored environment consequently neither listed codice_22 exist external programs read case-sensitive indirectly also supported windows codice_5 modified internally call codice_602 execute commands
[ 515, 6148, 9733, 9735, 2568, 521, 3594, 6664, 9738, 2573, 7181, 10760, 6674, 1555, 532, 1556, 7188, 6680, 537, 8729, 7196, 8221, 9762, 5670, 2599, 8236, 52, 9780, 3131, 3649, 10817, 2120, 5706, 3659, 4174, 6227, 11351, 9819, 7266, 8296, ...
Validation
7,848
2
Amdahl_UTS:amdahl uts uts discontinued implementation unix operating system ibm mainframe compatible computers amdahl created first versions uts released may 1981 uts global acquiring rights product 2002 uts global since gone business uts release 4.5 supports following s/390 model processors successors uts project origins work started princeton university 1975 port unix ibm vm/370 system team members tom lyon joseph skudlarek peter eichenberger eric schmidt tom lyon joined amdahl 1978 1979 full version 6 unix system amdahl 470 used internally design automation engineering late 1979 updated commonly ported version 7 1980 amdahl announced support unix system 470 five years later ibm announced mainframe unix ix/370 competitive response amdahl commercial versions uts based unix system iii unix system v. 1986 amdahl announced first version run natively ibm/370-compatible hardware uts/580 amdahl 580 series machines previous unix ports always ran guests ibm vm hypervisor version 4.5 based unix system v release 4 svr4
[ 2179, 4996, 6787, 10883, 6412, 7053, 8077, 9361, 6675, 9468, 789, 5397, 1304, 11673, 9370, 2168, 3359, 3487, 3488, 7460, 421, 3241, 1323, 7983, 3248, 7217, 8879, 2995, 10803, 7733, 9141, 823, 9784, 10040, 5562, 573, 9151, 1219, 8388, 1043...
Validation
7,849
2
Graphics_Environment_Manager:graphics environment manager gem graphics environment manager operating environment created digital research dri use dos operating system intel 8088 motorola 68000 microprocessors gem known primarily graphical user interface gui atari st series computers also supplied series ibm pc-compatible computers amstrad also available standard ibm pc time 6 mhz ibm pc concept gui brand new core small number dos programs notable ventura publisher ported number computers previously lacked graphical interfaces never gained popularity platforms dri also produced x/gem flexos real-time operating system adaptations os/2 presentation manager x window system preparation well gem started life dri general-purpose graphics library known gsx graphics system extension written team led heiskell lee lorenzen graphic software systems inc. recently left xerox parc birthplace modern gui wrote much code gsx essentially dri-specific implementation gks graphics standard proposed late 1970s gsx intended allow dri write graphics programs charting etc platforms cp/m-80 cp/m-86 ms-dos nec apc-iii would run task would otherwise require considerable effort port due large differences graphics hardware concepts various systems era gsx consisted two parts selection routines common drawing operations device drivers responsible handling actual output former known gdos latter gios play division cp/m machine-independent bdos machine-specific bios gdos selection routines handled gks drawing gios actually used underlying hardware produce output driver binary may operate cp/m-86 dos gsx evolved one part would later known gem effort build full gui system using earlier gsx work basis originally known crystal play ibm project called glass name later changed gem gem gsx became gem vdi virtual device interface responsible basic graphics drawing vdi also added ability work multiple fonts added selection raster drawing commands formerly vector-only gks-based drawing commands vdi also added multiple viewports key addition use windows new module gem aes application environment services provided window management ui elements gem desktop used libraries combination provide gui 8086 version entire system first demoed 1984 comdex shipped gem/1 28 february 1985 gem desktop 1.0 released 28 february 1985 gem desktop 1.1 released april 1985 support cga ega displays version apricot computers f-series supporting 640×200 8 colors also available gem desktop 1.2 dri originally designed gem dos would check run ibm computers pc compatibles like compaq company hoped receive license fees compatible makers developers reacted byte described small explosion reported dri-hosted seminar february 1985 half attendees agreed gem incompatibility compaq serious limitation later month company removed restriction applications supported gem included lifetree software gem write point apple computer sued dri would turn long dispute look feel gem/1 system almost direct copy macintosh elements bearing closer resemblance earlier lisa available since january 1983 eventually led dri forced change several basic features system see also apple v. digital research apple would later go sue companies similar issues including copyright lawsuit microsoft hp addition printers system also contained drivers unusual devices polaroid palette dri responded lawsuit-friendly gem desktop 2.0 released march 1986 support vga displays allowed display two fixed windows desktop though programs could wished changed trash icon removed animations things like opening closing windows otherwise similar gem/1 also included number bug fixes cosmetic improvements 1988 stewart alsop ii said gem among several guis already knocked market apple ibm/microsoft others gem xm gem desktop 3.0 updated version gem/2 1986/1987 dos including dos plus allowed task-switching ability run ten gem dos programs swapping expanded memory xm ems/eems disk including ram disks thereby also allowing use extended memory data could copied pasted applications clipboard filter function feature later also found taskmax dr dos 6.0 digital research planned offer gem xm option gem draw plus users oem channels gem xm source code freely available terms gnu general public license last retail release gem/3 desktop released november 1988 speed improvements shipped number basic applications commercial sales gem ended gem/3 source code subsequently made available number dri leading customers gem/4 released 1990 included ability work bézier curves feature still commonly found outside postscript world version produced specifically artline drawing program german company ccp development gmbh system also included changes font management system made incompatible likes timeworks publisher another version gem called gem/5 produced gst timeworks publisher 2.1 contained updated look 3d buttons along features on-the-fly font scaling came complete standard 3.1 tools version produced gem 3.13 bézier handling taken gem/4 gem desktop spun 1990 product known viewmax used solely file management shell dr dos form system could run gem programs led situation number applications including viewmax could exist statically linked copy gem system scenario actually rare native gem programs published 1991 viewmax 2 released forms gem survived dri purchased novell june 1991 gem development cancelled throughout time dri also working making gem system capable multitasking started x/gem based gem/1 required use one multitasking cp/m-based operating systems dri also produced x/gem flexos real-time operating system adaptations os/2 presentation manager x window system preparation well lee lorenzen left soon release gem/1 became clear dri strong interest application development joined two former dri employees heiskell john meyer start ventura software developed ventura publisher later marketed xerox eventually corel would go popular desktop publishing program time development production 68000 version gem began september 1984 atari sent team called monterey group digital research begin work porting gem originally plan run gem top cp/m-68k ostensibly ported motorola 68000 dri prior st design created fact ports unusable would require considerable development digital research also offered gemdos originally written gem dos dos-like operating system aimed port gem different hardware platforms available 8086 68000 processors adapted apple lisa 2/5 motorola vme/10 development system already atari eventually decided give existing cp/m-68k code instead port gemdos atari st platform referring tos atari provided development 68000 version given full rights continued developments without needing reverse-license back dri result apple-dri lawsuit apply atari versions gem allowed keep mac-like ui next seven years 1985 1992 new versions tos released new generation st line updates included support colors higher resolutions raster-side system remained generally similar original terms gks support 1992 atari released tos 4 multitos along final computer system falcon030 combination mint tos 4 allowed full multitasking support gem caldera bought remaining digital research assets novell 23 july 1996 initial plans revive gem viewmax technologies low-footprint user interface opendos mobile applications caldera view plans abandoned caldera uk favour dr-webspyder grow caldera thin clients later known lineo released source gem gem xm terms gnu general public license gpl april 1999 development gem pc continued freegem opengem atari st platform original dri sources ported used free open source tos clone emutos new implementations aes portions gem implemented scratch form xaaes myaes fully re-entrant support multitasking top freemint multitasking extensions tos full gem system consisted three main parts gem vdi core graphics system overall gem engine responsible low level drawing form draw line vdi included resolution coordinate independent set vector drawing instructions called applications fairly simple interface tvdi also included environment information state context current color line thickness output device etc commands examined gdos whose task send commands proper driver actual rendering instance particular gem vdi environment connected screen vdi instructions routed screen driver drawing simply changing environment point printer needed theory print dramatically reducing developer workload formerly printing hand applications gdos also responsible loading drivers requested fonts gem first loaded one major advantage vdi provided macintosh way multiple devices contexts handled mac information stored memory inside application resulted serious problems attempting make mac handle pre-emptive multitasking drawing layer quickdraw needed direct memory access programs gem vdi however information stored device gdos creating virtual devices every context – window instance gem aes provided window system window manager ui style gui elements widgets performance reasons many gui widgets actually drawn using character graphics compared macintosh aes provided rather spartan look system shipped single monospaced font aes performs operations calling vdi general sense two parts gem often completely separated applications applications typically called aes commands set new window rest application using vdi calls actually draw window gem desktop application program used aes provide file manager launcher traditional desktop environment users come expect macintosh unlike macintosh gem desktop based top dos ms-dos dos plus dr dos pc gemdos atari result actual display cluttered computer-like items including path names wildcards general gem much geeky mac simply running usable shell dos huge achievement otherwise gem advantages mac os proportional sliders
[ 10113, 2179, 10757, 6921, 6797, 3216, 4114, 3091, 6675, 5397, 9366, 2840, 2201, 9881, 11422, 2729, 11562, 6187, 7983, 178, 7986, 8628, 4409, 5694, 7999, 576, 9795, 4548, 9166, 10067, 6100, 6104, 10083, 5220, 7269, 9700, 10728, 1515, 5612, ...
None
7,850
2
HostAP:hostap hostap one popular ieee 802.11 device drivers linux since november 2016 officially obsolete linux kernel works cards using conexant formerly intersil prism 2/2.5/3 chipset support host ap mode allows wlan card perform functions wireless access point driver code written jouni malinen hired atheros 2008 included main kernel tree linux 2.6.14
[ 8909, 7983, 9968, 10863, 823 ]
None
7,851
4
Polymorphic_code:polymorphic code computer terminology polymorphic code code uses polymorphic engine mutate keeping original algorithm intact code changes time runs function code semantics change example 1+3 6-2 achieve result using different values operations technique sometimes used computer viruses shellcodes computer worms hide presence encryption common method hide code encryption main body code also called payload encrypted appear meaningless code function decryption function added code code executed function reads payload decrypts executing turn encryption alone polymorphism gain polymorphic behavior encryptor/decryptor pair mutated copy code allows different versions code function anti-virus software intrusion detection systems ids attempt locate malicious code searching computer files data packets sent computer network security software finds patterns correspond known computer viruses worms takes appropriate steps neutralize threat polymorphic algorithms make difficult software recognize offending code constantly mutates malicious programmers sought protect encrypted code virus-scanning strategy rewriting unencrypted decryption engine resulting encrypted payload time virus worm propagated anti-virus software uses sophisticated pattern analysis find underlying patterns within different mutations decryption engine hopes reliably detecting malware emulation may used defeat polymorphic obfuscation letting malware demangle virtual environment utilising methods traditional signature scanning virtual environment sometimes called sandbox polymorphism protect virus emulation decrypted payload remains regardless variation decryption algorithm metamorphic code techniques may used complicate detection virus may execute without ever identifiable code blocks memory remain constant infection infection first known polymorphic virus written mark washburn virus called 1260 written 1990 better-known polymorphic virus created 1992 hacker dark avenger pseudonym means avoiding pattern recognition antivirus software common virulent polymorphic virus file infecter virut example really polymorphic code serve introduction world encryption via xor operator example algorithm using variables b variable c could large amount code changes c would effect algorithm allowing changed endlessly without heed final product encrypted code payload make different versions code copy garbage lines manipulate c change code inside encrypted lots encrypted code search code decryption_code cryptokey algorithm new code thing usually coder uses zero key example xor 0 first generation virus making easier coder key code encrypted coder implements incremental key algorithm random one polymorphic code also used generate encryption algorithm code generated online service stringencrypt takes string file content encrypts random encryption commands generates polymorphic decryption code one many supported programming languages see c++ example string encrypted character stored encrypted form using unicode widechar format different encryption commands used like bitwise xor addition subtraction bit rotations everything randomized encryption keys bit rotation counters encryption commands order well output code generated c/c++ c java javascript python ruby haskell masm fasm autoit thanks randomization generated algorithm different every time possible write generic decryption tools compiled code polymorphic encryption code analyzed time re-encrypted
[ 9345, 11266, 3462, 9224, 11278, 7578, 3867, 1051, 9245, 6430, 3876, 2213, 6182, 7717, 9385, 3629, 5677, 7343, 10745, 9393, 10420, 11574, 10042, 7739, 9791, 11583, 1474, 10819, 3529, 5081, 7515, 8032, 8554, 8171, 4972, 8430, 2680, 2041, 5245...
Validation
7,852
3
Classic_RISC_pipeline:classic risc pipeline history computer hardware early reduced instruction set computer central processing units risc cpus used similar architectural solution called classic risc pipeline cpus mips sparc motorola 88000 later notional cpu dlx invented education classic scalar risc designs fetched tried execute one instruction per cycle main common concept design five-stage execution instruction pipeline operation pipeline stage worked one instruction time stages consisted initial set flip-flops combinational logic operated outputs flip-flops instruction cache machines latency one cycle meaning instruction cache would ready next clock cycle instruction fetch stage 32-bit instruction fetched cache program counter pc register holds address current instruction feeds pc predictor sends program counter pc instruction cache read current instruction time pc predictor predicts address next instruction incrementing pc 4 instructions 4 bytes long prediction always wrong case taken branch jump exception see delayed branches later machines would use complicated accurate algorithms branch prediction branch target prediction guess next instruction address unlike earlier microcoded machines first risc machines microcode fetched instruction cache instruction bits shifted pipeline simple combinational logic pipeline stage could produce control signals datapath directly instruction bits result little decoding done stage traditionally called decode stage consequence lack decoding meant however instruction bits used specifying instruction also leaves fewer bits things like register indices mips sparc dlx instructions two register inputs decode stage two register names identified within instruction two registers named read register file mips design register file 32 entries time register file read instruction issue logic stage determined pipeline ready execute instruction stage issue logic would cause instruction fetch stage decode stage stall stall cycle stages would prevent initial flip-flops accepting new bits instruction decoded branch jump target address branch jump computed parallel reading register file branch condition computed register file read branch taken instruction jump pc predictor first stage assigned branch target rather incremented pc computed architectures made use alu execute stage cost slightly decreased instruction throughput decode stage ended quite lot hardware mips possibility branching two registers equal 32-bit-wide tree ran series register file read making long critical path stage also branch target computation generally required 16 bit add 14 bit incrementer resolving branch decode stage made possible single-cycle branch mispredict penalty since branches often taken thus mispredicted important keep penalty low execute stage actual computation occurs typically stage consists arithmetic logic unit also bit shifter may also include multiple cycle multiplier divider arithmetic logic unit responsible performing boolean operations nand xor xnor also performing integer addition subtraction besides result alu typically provides status bits whether result 0 overflow occurred bit shifter responsible shift rotations instructions simple risc machines divided three latency classes according type operation data memory needs accessed done stage stage single cycle latency instructions simply results forwarded next stage forwarding ensures one two cycle instructions always write results stage pipeline one write port register file used always available direct mapped virtually tagged data caching simplest far numerous data cache organizations two srams used one storing data storing tags stage single cycle two cycle instructions write results register file hennessy patterson coined term hazard situations instructions pipeline would produce wrong answers structural hazards occur two instructions might attempt use resources time classic risc pipelines avoided hazards replicating hardware particular branch instructions could used alu compute target address branch alu used decode stage purpose alu instruction followed branch would seen instructions attempt use alu simultaneously simple resolve conflict designing specialized branch target adder decode stage data hazards occur instruction scheduled blindly would attempt use data data available register file classic risc pipeline data hazards avoided one two ways bypassing also known operand forwarding suppose cpu executing following piece code instruction fetch decode stages send second instruction one cycle first flow pipeline shown diagram naive pipeline without hazard consideration data hazard progresses follows cycle 3 codice_1 instruction calculates new value codice_2 cycle codice_3 operation decoded value codice_2 fetched register file however codice_1 instruction yet written result codice_2 write-back normally occurs cycle 5 green box therefore value read register file passed alu execute stage codice_3 operation red box incorrect instead must pass data computed codice_1 back execute stage i.e red circle diagram codice_3 operation normally written-back solution problem pair bypass multiplexers multiplexers sit end decode stage flopped outputs inputs alu multiplexer selects decode stage logic compares registers written instructions execute access stages pipeline registers read instruction decode stage cause multiplexers select recent data bypass multiplexers make possible pipeline execute simple instructions latency alu multiplexer flip-flop without multiplexers latency writing reading register file would included latency instructions note data passed forward time data bypassed back earlier stage processed yet case data passed forward time codice_3 ready register alu codice_1 already computed however consider following instructions data read address codice_13 n't present data cache memory access stage codice_14 instruction time codice_3 instruction already alu resolve would require data memory passed backwards time input alu possible solution delay codice_3 instruction one cycle data hazard detected decode stage fetch decode stages stalled prevented flopping inputs stay state cycle execute access write-back stages downstream see extra no-operation instruction nop inserted codice_14 codice_3 instructions nop termed pipeline bubble since floats pipeline like air bubble occupying resources producing useful results hardware detect data hazard stall pipeline hazard cleared called pipeline interlock pipeline interlock used data forwarding however first example codice_1 followed codice_3 second example codice_14 followed codice_3 solved stalling first stage three cycles write-back achieved data register file correct causing correct register value fetched codice_3 decode stage causes quite performance hit processor spends lot time processing nothing clock speeds increased less forwarding logic wait data hazard detected quite easily program machine code written compiler stanford mips machine relied compiler add nop instructions case rather circuitry detect taxingly stall first two pipeline stages hence name mips microprocessor without interlocked pipeline stages turned extra nop instructions added compiler expanded program binaries enough instruction cache hit rate reduced stall hardware although expensive put back later designs improve instruction cache hit rate point acronym longer made sense control hazards caused conditional unconditional branching classic risc pipeline resolves branches decode stage means branch resolution recurrence two cycles long three implications four schemes solve performance problem branches delayed branches controversial first semantics complicated delayed branch specifies jump new location happens next instruction next instruction one unavoidably loaded instruction cache branch delayed branches criticized poor short-term choice isa design suppose 32-bit risc processes add instruction adds two large numbers result fit 32 bits happens simplest solution provided architectures wrapping arithmetic numbers greater maximum possible encoded value significant bits chopped fit usual integer number system 3000000000+3000000000=6000000000 unsigned 32 bit wrapping arithmetic 3000000000+3000000000=1705032704 6000000000 mod 2^32 may seem terribly useful largest benefit wrapping arithmetic every operation well defined result programmer especially programming language supporting large integers e.g lisp scheme may want wrapping arithmetic architectures e.g mips define special addition operations branch special locations overflow rather wrapping result software target location responsible fixing problem special branch called exception exceptions differ regular branches target address specified instruction branch decision dependent outcome instruction common kind software-visible exception one classic risc machines tlb miss see virtual memory exceptions different branches jumps control flow changes resolved decode stage exceptions resolved writeback stage exception detected following instructions earlier pipeline marked invalid flow end pipe results discarded program counter set address special exception handler special registers written exception location cause make easy fast software fix problem restart program cpu must take precise exception precise exception means instructions excepting instruction executed excepting instruction everything afterwards executed take precise exceptions cpu must commit changes software visible state program order in-order commit happens naturally classic risc pipeline instructions write results register file writeback stage writes automatically happen program order store instructions however write results store data queue access stage store instruction takes exception store data queue entry invalidated written cache data sram later occasionally either data instruction cache n't contain required datum instruction cases cpu must suspend operation cache filled necessary data must resume execution problem filling cache required data potentially writing back memory evicted cache line specific pipeline organization discussed two strategies handle suspend/resume problem first global stall signal signal activated prevents instructions advancing pipeline generally gating clock flip-flops start stage disadvantage strategy large number flip flops global stall signal takes long time propagate since machine generally stall cycle identifies condition requiring stall stall signal becomes speed-limiting critical path another strategy handle suspend/resume reuse exception logic machine takes exception offending instruction instructions invalidated cache filled necessary data instruction caused cache miss restarts expedite data cache miss handling instruction restarted access cycle happens one cycle data cache filled
[ 7173, 9739, 2066, 7699, 2071, 5655, 27, 10779, 10781, 6181, 8231, 3630, 6705, 7218, 2623, 2113, 7234, 3142, 2638, 1122, 3175, 8815, 5237, 630, 8822, 6268, 3197, 7313, 6815, 8352, 5793, 6818, 6821, 9391, 2224, 2226, 7858, 9911, 8890, 4286,...
Test
7,853
4
Clock_drift:clock drift clock drift refers several related phenomena clock run exactly rate reference clock time clock drifts apart gradually desynchronizes clock i.e crystal-based clocks used computers like clocks subject clock drift means count time different rates diverge phenomenon used instance computers build random number generators negative side clock drift exploited timing attacks everyday clocks wristwatches finite precision eventually require correction remain accurate rate drift depends clock quality sometimes stability power source ambient temperature subtle environmental variables thus clock different drift rates different occasions advanced clocks old mechanical clocks often kind speed trimmer one adjust speed clock thus correct clock drift instance pendulum clocks clock drift manipulated slightly changing length pendulum quartz oscillator less subject drift due manufacturing variances pendulum mechanical clock hence everyday quartz clocks adjustable drift correction atomic clocks precise nearly clock drift even earth rotation rate drift variation drift atomic clock due tidal acceleration effects principle behind atomic clock enabled scientists re-define si unit second terms exactly 9 192 631 770 oscillations caesium atom precision oscillations allows atomic clocks drift roughly one second hundred million years 2015 accurate atomic clock loses one second every 15 billion years international atomic time tai time standard derivatives coordinated universal time utc based weighted averages atomic clocks worldwide einstein predicted relativistic effects also cause clock drift due time dilation fixed universal time time relative observer special relativity describes two clocks held observers different inertial frames i.e moving respect accelerating decelerating appear either observer tick different rates addition general relativity gives us gravitational time dilation briefly clock stronger gravitational field e.g closer planet appear tick slowly people holding clocks i.e inside outside stronger field would agree clocks appear going faster note time rather function clock affected effects experimentally observed time dilation practical importance instance clocks gps satellites experience effect due reduced gravity experience making clocks appear run quickly earth must therefore incorporate relativistically corrected calculations reporting locations users general relativity accounted navigational fix based gps satellites would false 2 minutes errors global positions would continue accumulate rate 10 kilometers day computer programs often need high quality random numbers especially cryptography several similar ways clock drift used build random number generators rngs one way build hardware random number generator use two independent clock crystals one instance ticks 100 times per second one ticks 1 million times per second average faster crystal tick 10,000 times time slower one ticks since clock crystals precise exact number ticks vary variation used create random bits instance number fast ticks even 0 chosen number ticks odd 1 chosen thus 100/1000000 rng circuit produce 100 somewhat random bits per second typically system biased—it might instance produce zeros ones—and hundreds somewhat-random bits whitened produce unbiased bits also similar way build kind software random number generator involves comparing timer tick operating system tick usually 100–1000 times per second speed cpu os timer cpu run two independent clock crystals situation ideal less previous example even use clock crystal process/program clock drift measurement disturbed many less unpredictable events cpu interrupts processes programs runs time thus measurement still produce fairly good random numbers hardware random number generators ones described fairly slow therefore programs use create good seed feed pseudorandom number generator cryptographically secure pseudorandom number generator produce many random numbers fast 2006 side channel attack published exploited clock skew based cpu heating attacker causes heavy cpu load pseudonymous server tor hidden service causing cpu heating cpu heating correlated clock skew detected observing timestamps server real identity
[ 4389, 4423, 1776, 5457, 8273, 3637 ]
Test
7,854
3
SolydXK:solydxk solydxk dutch linux distribution based debian aims simple use providing environment stable secure ideal small businesses non-profit organizations home users solydxk includes proprietary software adobe flash steam optional closed-source drivers provide initial multimedia usage gaming linux solydxk originated 2012 unofficial version linux mint debian edition lmde using kde plasma 4 workspaces november 2012 linux mint ceased maintaining kde xfce versions lmde solydxk started support two desktop environments solydx refers xfce version solydk refers kde version project name amalgam two names two core editions solydxk solydx solydk officially available 64-bit live cds installers distribution installs common software firefox libreoffice xchat/quassel pidgin/kopete gimp variety common tasks editions also provide steam playonlinux installed gaming driver manager easily enable best gaming performance solydxk originally based debian testing since january 2015 built debian stable also community editions officially tested supported solydxk team examples solydxk enthusiast ’ edition versions solydx solydk follow debian testing 32-bit community editions version raspberry pi 3
[ 4611, 3079, 3089, 4113, 8209, 8727, 543, 11297, 7204, 9253, 11305, 56, 3129, 4153, 59, 8248, 9276, 3649, 4673, 3654, 5190, 3147, 2125, 1107, 1110, 89, 5721, 4192, 3685, 10860, 5742, 2671, 11388, 2692, 8837, 9353, 9873, 11410, 8857, 10394,...
None
7,855
4
Payload_(computing):payload computing computing telecommunications payload part transmitted data actual intended message headers metadata sent enable payload delivery context computer virus worm payload portion malware performs malicious action term borrowed transportation payload refers part load pays transportation computer security payload part private user text could also contain malware worms viruses performs malicious action deleting data sending spam encrypting data addition payload malware also typically overhead code aimed simply spreading avoiding detection computer programming common usage term context message protocols differentiate protocol overhead actual data example json web service response might string hello world payload rest protocol overhead computer networking data transmitted payload almost always encapsulated type frame composed framing bits frame check sequence examples ethernet frames point-to-point protocol ppp frames fibre channel frames v.42 modem frames
[ 5636, 10756, 535, 2084, 7717, 3629, 7739, 8252, 9791, 8265, 4703, 9834, 107, 5245, 5246, 9356, 9868, 10392, 9375, 2213, 3262, 10947, 7368, 5325, 2262, 6360, 3290, 2275, 6373, 8432, 10492, 5373, 9488, 8978, 5402, 4892, 5404, 8989, 10020, 8...
Test
7,856
4
Alphanumeric_shellcode:alphanumeric shellcode computer security alphanumeric shellcode shellcode consists assembles execution entirely alphanumeric ascii unicode characters 0-9 a-z a-z type encoding created hackers hide working machine code inside appears text useful avoid detection code allow code pass filters scrub non-alphanumeric characters strings part filters response non-alphanumeric shellcode exploits similar type encoding called printable code uses printable characters 0-9 a-z a-z etc ... shown possible create shellcode looks like normal text english writing alphanumeric printable code requires good understanding instruction set architecture machine code executed demonstrated possible write alphanumeric code executable one machine
[ 7717, 37, 5358, 4956, 2558 ]
None
7,857
2
Comparison_of_mobile_operating_systems:comparison mobile operating systems comparison mobile operating systems latest versions shown table even though older versions may still marketed
[ 11271, 5647, 3089, 10271, 3626, 3629, 5677, 7727, 1074, 9784, 1083, 2111, 7246, 3152, 7253, 3162, 10332, 607, 97, 2658, 10341, 6763, 4725, 8315, 8316, 8829, 7292, 11391, 6276, 10886, 9863, 6797, 10387, 10900, 1177, 10393, 6301, 673, 3248, ...
Train
7,858
3
Stack_register:stack register stack register computer central processor register whose purpose keep track call stack accumulator-based architecture machine may dedicated register sp intel x86 machine general register machine may register reserved convention pdp-11 risc machines designs data general eclipse dedicated register used reserved hardware memory address function machines late 1960s—such pdp-8 hp 2100—did compilers supported recursion subroutine instructions typically would save current location jump address set program counter next address simpler maintaining stack since one return location per subroutine code section recursion without considerable effort part programmer stack machine 2 stack registers — one keeps track call stack keep track stack 8086 main stack register called stack pointer sp stack segment register ss usually used store information memory segment stores call stack currently executed program sp points current stack top default stack grows downward memory newer values placed lower memory addresses push value stack codice_1 instruction used pop value stack codice_2 instruction used example assuming ss 1000h sp 0xf820 means current stack top physical address 0x1f820 due memory segmentation 8086 next two machine instructions program illustrates push works usually running program pushes registers stack make use registers purposes like call routine may change current values registers restore values stored stack program shall contain machine instructions like note program pops bx first pushed last note 8086 codice_1 codice_2 instructions work 16-bit elements simpler processors store stack pointer regular hardware register use arithmetic logic unit alu manipulate value typically push pop translated multiple micro-ops separately add/subtract stack pointer perform load/store memory newer processors contain dedicated stack engine optimize stack operations pentium first x86 processor introduce stack engine implementation stack pointer split among two registers esp 32-bit register esp 8-bit delta value updated directly stack operations push pop call ret opcodes operate directly esp register esp near overflow esp register referenced instructions esp ≠ 0 synchronisation micro-op inserted updates esp using alu resets esp 0 design remained largely unmodified later intel processors although esp expanded 64 bits stack engine similar intel also adopted amd k8 microarchitecture bulldozer need synchronization micro-ops removed internal design stack engine known
[ 7173, 9739, 2066, 7699, 5655, 10779, 8732, 10781, 6181, 8231, 3630, 6705, 7218, 2623, 2113, 7234, 3142, 2638, 1122, 3175, 8815, 630, 8822, 6268, 3197, 8322, 7313, 6815, 8352, 5793, 6818, 6821, 7852, 9391, 2224, 2226, 9911, 8890, 4286, 224...
Test
7,859
5
LogMeIn_Hamachi:logmein hamachi logmein hamachi virtual private network vpn application written alex pankratov 2004 capable establishing direct links computers behind network address translation nat firewalls without requiring reconfiguration user pc accessed directly without relays internet/wan side words establishes connection internet emulates connection would exist computers connected local area network lan hamachi acquired pankratov logmein 2009 currently available production version microsoft windows macos beta version linux system-vpn-based client compatible android ios paid subscribers hamachi runs background idle computers feature previously available users became restricted paid subscribers hamachi proprietary centrally-managed vpn system consisting server cluster managed vendor system client software installed end-user computers client software adds virtual network interface computer used intercepting outbound well injecting inbound vpn traffic outbound traffic sent operating system interface delivered client software encrypts authenticates sends destination vpn peer specially initiated udp connection hamachi currently handles tunneling ip traffic including broadcasts multicast windows version also recognizes tunnels ipx traffic client establishes maintains control connection server cluster connection established client goes login sequence followed discovery process state synchronization login step authenticates client server vice versa discovery used determine topology client internet connection specifically detect presence nat firewall devices route internet synchronization step brings client view private networks sync members networks member network goes online offline server instructs network peers either establish tear tunnels former establishing tunnels peers hamachi uses server-assisted nat traversal technique similar udp hole punching detailed information works made public process work certain combinations nat devices requiring user explicitly set port forward additionally 1.0 series client software capable relaying traffic vendor-maintained 'relay servers event unexpectedly losing connection server client retains tunnels starts actively checking status server unexpectedly loses client connection informs client peers fact expects also start liveliness checks enables hamachi tunnels withstand transient network problems route client server well short periods complete server unavailability hamachi clients also get closed port clients repaired port forwarding hamachi frequently used gaming remote administration vendor provides free basic service extra features fee february 2007 ip-level block imposed hamachi servers parts vietnamese internet space due scale system abuse originating blocked addresses company working less intrusive solution problem hamachi client normally assigned ip address logs system first time avoid conflicting existing private networks client side normal private ip address blocks 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 used november 19 2012 5.0.0.0/8 range used range previously unallocated allocated ripe ncc late 2010 space range used hosting providers public internet hamachi switched 25.0.0.0/8 block 25.0.0.0/8 block allocated british ministry defence organisations need communicate mod may experience problems specific internet routes attract traffic meant internal hosts alternatively find unable reach legitimate users addresses addresses used internally squatting established practice internet client supports ipv6 selected address assigned picked range registered logmein ip address assigned hamachi client henceforth associated client public crypto key long client retains key log system use ip address hamachi creates single broadcast domain clients makes possible use lan protocols rely ip broadcasts discovery announcement services hamachi networks following considerations apply hamachi use vpn application current builds hamachi available following operating systems prior versions 1.0.2.0 1.0.2.1 windows release many windows vista users experienced compatibility connection issues using hamachi march 30 2007 software includes vista tweaks answer os-related problems among specific solutions
[ 2050, 10631, 10889, 4746, 8331, 9868, 6797, 14, 9722, 8211, 11413, 11162, 3742, 9764, 4268, 7214, 7983, 10417, 2228, 823, 3770, 5819, 8640, 3777, 9281, 2884, 5959, 8265, 11468, 7502, 3792, 6993, 7376, 11606, 2136, 9048, 6490, 8283, 5084, ...
Train
7,860
4
FlowMon:flowmon flowmon name monitoring probe result academic research activity cesnet also name commercial product marketed university spin-off company flowmon networks flowmon probe appliance monitoring reporting information ip flows high-speed computer networks probe developed liberouter team within scope cesnet research plan optical national research network new applications research activity 602 programmable hardware flowmon probe built upon pair programmable network cards called combo host computer linux operating system pair combo cards consists main card pci pci-x pci-express connector connection motherboard host computer add-on card 2 4 network interfaces cards contain programmable chips fpgas able process high amount data multi-gigabit speed flow monitoring process split hardware acceleration cards application software running host computer following principle hardware/software codesign time-critical tasks implemented fpga chips acceleration cards complex operations carried application software concept enables monitoring modern high-speed 1 gbps 10 gbps networks packet loss necessity input sampling time flexible user-friendly interface provided software flowmon probe passive monitoring device i.e alter passing traffic way therefore detection hardly possible connected network flowmon probe observes passing traffic/packets extracts aggregates information ip flows flow records flowmon probe able export aggregated data external collectors netflow version 5 9 ipfix format collectors collect incoming flow records store automated manual visual analysis automated malicious traffic detection filter rules graphs statistical schemas whole system allows monitoring actual state monitored network well long-term traffic analysis flowmon probe part géant2 security toolset consists netflow analysis tools nfsen nfdump flowmon appliance flowmon network traffic monitoring security solution flowmon networks company flowmon networks established 2007 university spin-off made technology transfer cesnet czech nren continue r finish prototypes put market flowmon solution initially based flowmon probes developed cesnet nowadays flowmon complete flow monitoring solution consists flowmon probes flowmon collectors additional modules flowmon ads flowmon apm flowmon ddos defender flowmon traffic recorder flowmon probes provide netflow/ipfix statistics network traffic come standard version suitable standard networks 10mbit/s 10gbit/s hardware-accelerated version based cesnet fpga boards suitable high-speed networks 10gbit/s 100gbit/s flowmon collectors appliances netflow/sflow/ipfix/jflow/netflow lite/net stream/cflowd storage analysis flowmon modules extend functionality flowmon probes flowmon collectors brings additional functionality e.g network behavior analysis nba application performance monitoring anomaly detection http logging
[ 5559, 8625, 823 ]
Validation
7,861
5
ChatZilla:chatzilla chatzilla irc client mozilla-based browsers firefox introduced 2000 cross-platform open source software noted consistent appearance across platforms css appearance customization scripting april 20 1999 reported mozilla time open-source arm aol netscape communications division announced commencement instant messaging chat project stated goal supporting wide variety chat protocols including venerable internet relay chat companies also developing chat systems recognize lot interest instant messaging space said aol spokesperson catherine corre referring mozilla project 'this recognition interest area time new chat client proposal reported competition aol aol instant messenger chat client april 21 1999 announcement rescinded pending review netscape independently programmer robert ginda developed irc client submitted mozilla project september 1999 planned introduce planned release mozilla browser named chatzilla client available development form may 2000 netscape 6.01 browser mozilla 0.8 chatzilla runs platform mozilla-based browser run including os x linux microsoft windows provides consistent user interface across board also used standalone app using xulrunner contains general features irc clients including connecting multiple servers maintaining built-in list standard networks searching sorting available channels chat logging direct client-to-client dcc chat file transfers user customization interface chatzilla includes automatic completion nicknames codice_1 key appends comma nickname first word line also provides completion codice_2 codice_1 key quick double-codice_1 presents list available commands based typed far text entry window single line enter key sends composed text multiline allows composing larger text sections line breaks ctrl-enter key combo sends text block javascript used running scripts messages styled css controlled user selecting view menu dragging link codice_5 file message window codice_6 command dcc supported allows users transfer files chat directly one another sender message shown left text link—clicking link opens private chat window user chatzilla included seamonkey addition available download mozilla-based browsers firefox extension also run tab firefox chatzilla offers many plugins extend functionality user-experience add-on plugins include introduction firefox quantum version 57 dropped support add-ons stopped chatzilla working inside firefox work begun move code webextension reviews chatzilla varied enthusiastic case users familiar irc unimpressed reviewers accustomed chat client user interfaces 2003 review computers doctors mozilla 1.0 referred irc client applications user-friendly goes chatzilla wo n't find pop-up icons happy little noises telling somebody wants chat 2004 jennifer golbeck writing irc hacks pointed cross-platform consistency found quick easy start using great support changing appearance chat windows motifs ... css files 2008 overview extensions firefox linux journal dan sawyer described chatzilla oldie-but-goodie venerable trimmings handsomely organizes chat channels logs extensive built-in list available channels supports dcc chats file transfers plugin theming architecture application implements standards well prefer keep desktop clutter minimum still enjoy fighting random strangers irc chatzilla must-have
[ 1664, 5760, 5251, 3462, 6791, 9736, 6797, 1295, 7951, 2836, 5397, 10006, 11418, 9757, 1713, 823, 11449, 5054, 9152, 9281, 5316, 10057, 2893, 5199, 7889, 2387, 3030, 5078, 6231, 7384, 8923, 10078, 482, 10722, 488, 2409, 8169, 1643, 5612, 1...
None
7,862
9
FusionDebug:fusiondebug fusiondebug interactive step debugger cfml compatible adobe coldfusion railo lucee enables developers step code line-by-line step code better understand code running
[ 4512, 5314, 8739, 9666, 102, 1802, 3469, 655, 7983, 4529, 9618, 148, 9144, 3895, 5048, 4507 ]
Test
7,863
5
ISCSI:iscsi computing iscsi acronym internet small computer systems interface internet protocol ip -based storage networking standard linking data storage facilities provides block-level access storage devices carrying scsi commands tcp/ip network iscsi used facilitate data transfers intranets manage storage long distances used transmit data local area networks lans wide area networks wans internet enable location-independent data storage retrieval protocol allows clients called initiators send scsi commands cdbs storage devices targets remote servers storage area network san protocol allowing organizations consolidate storage storage arrays providing clients database web servers illusion locally attached scsi disks mainly competes fibre channel unlike traditional fibre channel usually requires dedicated cabling iscsi run long distances using existing network infrastructure iscsi pioneered ibm cisco 1998 submitted draft standard march 2000 essence iscsi allows two hosts negotiate exchange scsi commands using internet protocol ip networks iscsi takes popular high-performance local storage bus emulates wide range networks creating storage area network san unlike san protocols iscsi requires dedicated cabling run existing ip infrastructure result iscsi often seen low-cost alternative fibre channel requires dedicated infrastructure except fcoe fibre channel ethernet form however performance iscsi san deployment severely degraded operated dedicated network subnet lan vlan due competition fixed amount bandwidth although iscsi communicate arbitrary types scsi devices system administrators almost always use allow servers database servers access disk volumes storage arrays iscsi sans often one two objectives initiator functions iscsi client initiator typically serves purpose computer scsi bus adapter would except instead physically cabling scsi devices like hard drives tape changers iscsi initiator sends scsi commands ip network initiator falls two broad types software initiator uses code implement iscsi typically happens kernel-resident device driver uses existing network card nic network stack emulate scsi devices computer speaking iscsi protocol software initiators available popular operating systems common method deploying iscsi hardware initiator uses dedicated hardware typically combination firmware running hardware implement iscsi hardware initiator mitigates overhead iscsi tcp processing ethernet interrupts therefore may improve performance servers use iscsi iscsi host bus adapter commonly hba implements hardware initiator typical hba packaged combination gigabit 10 gigabit ethernet network interface controller kind tcp/ip offload engine toe technology scsi bus adapter appears operating system iscsi hba include pci option rom allow booting iscsi san iscsi offload engine isoe card offers alternative full iscsi hba isoe offloads iscsi initiator operations particular network interface host processor freeing cpu cycles main host applications iscsi hbas isoes used additional performance enhancement justifies additional expense using hba iscsi rather using software-based iscsi client initiator isoe may implemented additional services tcp offload engine toe reduce host server cpu usage iscsi specification refers storage resource located iscsi server generally one potentially many instances iscsi storage nodes running server target iscsi target often dedicated network-connected hard disk storage device may also general-purpose computer since initiators software provide iscsi target available mainstream operating systems common deployment scenarios iscsi target include data center enterprise environment iscsi target often resides large storage array arrays form commodity hardware free-software-based iscsi implementations commercial products quantastor cloudbyte stortrends pure storage hp storageworks equallogic tegile systems nimble storage reduxio ibm storwize family isilon netapp filer emc corporation ns-series cx4 vnx vnxe vmax hitachi data systems hnas pivot3 vstac storage array usually provides distinct iscsi targets numerous clients nearly modern mainstream server operating systems bsd linux solaris windows server provide iscsi target functionality either built-in feature supplemental software specific-purpose operating systems implement iscsi target support scsi terminology lun stands logical unit specified unique logical unit numbers lun represents individually addressable logical scsi device part physical scsi device target iscsi environment luns essentially numbered disk drives initiator negotiates target establish connectivity lun result iscsi connection emulates connection scsi hard disk initiators treat iscsi luns way would raw scsi ide hard drive instance rather mounting remote directories would done nfs cifs environments iscsi systems format directly manage filesystems iscsi luns enterprise deployments luns usually represent subsets large raid disk arrays often allocated one per client iscsi imposes rules restrictions multiple computers sharing individual luns leaves shared access single underlying filesystem task operating system general data storage already-booted computer type generic network interface may used access iscsi devices however generic consumer-grade network interface able boot diskless computer remote iscsi data source instead commonplace server load initial operating system tftp server local boot device use iscsi data storage booting local device finished separate dhcp server may configured assist interfaces equipped network boot capability able boot iscsi case network interface looks dhcp server offering pxe bootp boot image used kick iscsi remote boot process using booting network interface mac address direct computer correct iscsi boot target one use software-only approach load small boot program turn mount remote iscsi target local scsi drive fire boot process said iscsi target achieved using existing preboot execution environment pxe boot rom available many wired ethernet adapters boot code also loaded cd/dvd floppy disk floppy disk image usb storage replace existing pxe boot code adapters re-flashed popular free software offer iscsi boot support ipxe intel ethernet controllers servers support iscsi boot iscsi uses tcp typically tcp ports 860 3260 protocols higher-level names used address objects within protocol special names refer iscsi initiators targets iscsi provides three name-formats iqn format addresses occur commonly qualified date yyyy-mm domain names expire acquired another entity ieee registration authority provides eui accordance eui-64 standard naa part oui provided ieee registration authority naa name formats added iscsi rfc 3980 provide compatibility naming conventions used fibre channel serial attached scsi sas storage technologies usually iscsi participant defined three four fields iscsi initiators locate appropriate storage resources using internet storage name service isns protocol theory isns provides iscsi sans management model dedicated fibre channel sans practice administrators satisfy many deployment goals iscsi without using isns iscsi initiators targets prove identity using chap includes mechanism prevent cleartext passwords appearing wire chap vulnerable dictionary attacks spoofing reflection attacks followed carefully best practices using chap within iscsi reduce surface attacks mitigate risks additionally ip-based protocols ipsec operate network layer iscsi negotiation protocol designed accommodate authentication schemes though interoperability issues limit deployment ensure valid initiators connect storage arrays administrators commonly run iscsi logically isolated backchannel networks deployment architecture management ports storage arrays exposed general-purpose internal network iscsi protocol run dedicated network segments virtual lans vlan mitigates authentication concerns unauthorized users physically provisioned iscsi thus talk storage arrays however also creates transitive trust problem single compromised host iscsi disk used attack storage resources hosts iscsi logically isolated general network using vlans still different network equipment may use cable port long completed signal path source target single cabling mistake network technician compromise barrier logical separation accidental bridging may immediately detected cause network errors order differentiate iscsi regular network prevent cabling mistakes changing connections administrators may implement self-defined color-coding labeling standards using yellow-colored cables iscsi connections blue cables regular network clearly labeling ports switches used iscsi iscsi could implemented vlan cluster ports large multi-port switch also used general network usage administrator may instead choose use physically separate switches dedicated iscsi vlans prevent possibility incorrectly connected cable plugged wrong port bridging logical barrier iscsi aims consolidate storage many servers single storage array iscsi deployments require strategies prevent unrelated initiators accessing storage resources pathological example single enterprise storage array could hold data servers variously regulated sarbanes–oxley act corporate accounting hipaa health benefits information pci dss credit card processing audit storage systems must demonstrate controls ensure server one regime access storage assets server another typically iscsi storage arrays explicitly map initiators specific target luns initiator authenticates storage array specific storage asset intends use however target luns scsi commands expressed iscsi negotiation protocol underlying scsi protocol care must taken ensure access control provided consistently part iscsi operates cleartext protocol provides cryptographic protection data motion scsi transactions result attacker listen iscsi ethernet traffic problems occur iscsi rather apply san protocol without cryptographic security ip-based security protocols ipsec provide standards-based cryptographic protection traffic dates following table denote first appearance native driver operating system third-party drivers windows linux available early 2001 specifically attaching ibm ip storage 200i appliance iscsi targets involve disk though iscsi tape medium-changer targets popular well far physical devices featured native iscsi interfaces component level instead devices parallel scsi fibre channel interfaces bridged using iscsi target software external bridges controllers internal device enclosure alternatively possible virtualize disk tape targets rather representing actual physical device emulated virtual device presented underlying implementation deviate drastically presented target done virtual tape library vtl products vtls use disk storage storing data written virtual tapes actual physical devices virtual targets presented using iscsi target software external bridges controllers internal device enclosure security products industry manufacturers use iscsi raid target initiator either ip-enabled encoder camera multiple systems exist allow fibre channel scsi sas devices attached ip network use via iscsi used allow migration older storage technologies access sans remote servers linking sans ip networks iscsi gateway bridges ip servers fibre channel sans tcp connection terminated gateway implemented fibre channel switch standalone appliance
[ 3328, 514, 2947, 2564, 7557, 9218, 1801, 2314, 6797, 8471, 1304, 9625, 8602, 2974, 3742, 10272, 9505, 2723, 3366, 1450, 3628, 6445, 10924, 8625, 6014, 9906, 2356, 2996, 10422, 823, 9655, 5322, 8266, 1743, 5457, 6993, 7126, 6999, 1880, 216...
None
7,864
5
SVDO:svdo svdo simultaneous voice ev-do data technology allows supported cdma2000 ev-do cellular phones maintain active 3g data session phone call previously capability able use data call found mobile phones using gsm cellular networks 2011 verizon released first svdo-supported phone htc thunderbolt following year sprint released first svdo-supported phone htc evo 4g lte although phones support lte already allows simultaneous voice data devices 3g data coverage use svdo 3g data session phone call
[]
Validation
7,865
5
Data_link_layer:data link layer data layer layer 2 second layer seven-layer osi model computer networking layer protocol layer transfers data adjacent network nodes wide area network wan nodes local area network lan segment data link layer provides functional procedural means transfer data network entities might provide means detect possibly correct errors may occur physical layer data link layer concerned local delivery frames nodes level network data-link frames protocol data units called cross boundaries local area network inter-network routing global addressing higher-layer functions allowing data-link protocols focus local delivery addressing media arbitration way data link layer analogous neighborhood traffic cop endeavors arbitrate parties contending access medium without concern ultimate destination devices attempt use medium simultaneously frame collisions occur data-link protocols specify devices detect recover collisions may provide mechanisms reduce prevent examples data link protocols ethernet local area networks multi-node point-to-point protocol ppp hdlc adccp point-to-point dual-node connections internet protocol suite tcp/ip data link layer functionality contained within link layer lowest layer descriptive model also includes functionality encompassed osi model physical layer frame header contains source destination addresses indicate device originated frame device expected receive process contrast hierarchical routable addresses network layer layer-2 addresses flat meaning part address used identify logical physical group address belongs data link thus provides data transfer across physical link transfer reliable unreliable many data-link protocols acknowledgments successful frame reception acceptance data-link protocols might even form checksum check transmission errors cases higher-level protocols must provide flow control error checking acknowledgments retransmission networks ieee 802 local area networks data link layer described detail media access control mac logical link control llc sublayers means ieee 802.2 llc protocol used ieee 802 mac layers ethernet token ring ieee 802.11 etc. well non-802 mac layers fddi data-link-layer protocols hdlc specified include sublayers although protocols cisco hdlc use hdlc low-level framing mac layer combination different llc layer itu-t g.hn standard provides way create high-speed 1 gigabit/s local area network using existing home wiring power lines phone lines coaxial cables data link layer divided three sub-layers application protocol convergence logical link control media access control within semantics osi network architecture data-link-layer protocols respond service requests network layer perform function issuing service requests physical layer data link layer two sublayers logical link control llc media access control mac uppermost sublayer llc multiplexes protocols running top data link layer optionally provides flow control acknowledgment error notification llc provides addressing control data link specifies mechanisms used addressing stations transmission medium controlling data exchanged originator recipient machines mac may refer sublayer determines allowed access media one time e.g csma/cd times refers frame structure delivered based mac addresses inside generally two forms media access control distributed centralized may compared communication people network made people speaking i.e conversation pause random amount time attempt speak effectively establishing long elaborate game saying first media access control sublayer also determines one frame data ends next one starts – frame synchronization four means frame synchronization time based character counting byte stuffing bit stuffing services data link layer provides beside framing data link layers also include mechanisms detect even recover transmission errors receiver detect transmission error sender must add redundant information form bits error detection code frame sent receiver obtains frame error detection code recomputes verifies whether received error detection code matches computed error detection code match frame considered valid error detection code defined function computes amount redundant bits corresponding string total number bits simplest error detection code parity bit allows receiver detect transmission errors affected single bit among transmitted bits multiple flipped bits checking method might able unveil receiver side advanced methods parity error detection exist providing higher grades quality features simple example works using metadata transmitting word hello encoding letter position alphabet thus letter coded 1 b 2 shown table right adding resulting numbers yields 8 5 12 12 15 52 5 2 7 calculates metadata finally 8 5 12 12 15 7 numbers sequence transmitted receiver see end transmission errors receiver knows last number received error-detecting metadata data message receiver recalculate math metadata matches concluded data received error-free though receiver sees something like 7 5 12 12 15 7 sequence first element altered error run check calculating 7 5 12 12 15 51 5 1 6 discard received data defective since 6 equal 7 internet protocol suite tcp/ip osi data link layer functionality contained within lowest layer link layer tcp/ip link layer operating scope link host connected concerns hardware issues point obtaining hardware mac addresses locating hosts link transmitting data frames onto link link layer functionality described rfc 1122 defined differently data link layer osi encompasses methods affect local link tcp/ip model top-down comprehensive design reference networks formulated purpose illustrating logical groups scopes functions needed design suite internetworking protocols tcp/ip needed operation internet general direct strict comparisons osi tcp/ip models avoided layering tcp/ip principal design criterion general considered harmful rfc 3439 particular tcp/ip dictate strict hierarchical sequence encapsulation requirements attributed osi protocols following table shows various networking models number layers varies three seven networking models textbooks secondary sources may conflict intent rfc 1122 ietf primary sources
[ 8192, 10242, 11267, 1030, 6670, 8211, 6681, 7706, 10271, 10274, 2085, 4650, 2091, 562, 11321, 3133, 5181, 11332, 71, 8265, 10830, 4687, 2640, 10833, 4691, 10341, 10344, 10864, 7811, 9860, 649, 9868, 2701, 3218, 9365, 5270, 11413, 2206, 3742...
Validation
7,866
2
Nokia_N81:nokia n81 nokia n81 symbian os smartphone announced nokia 29 august 2007 released next month runs s60 3rd edition feature pack 1 n81 marketed entertainment device focused music gaming first device came preloaded n-gage 2.0 gaming service 2008 albeit public beta features two dedicated gaming keys used n-gage games would later also appear n96 n85 5730 xpressmusic launch n-gage 2.0 n81 specifically chosen nokia advertisements also much marketed music-centric smartphone one first support nokia music store service stereo speakers considered loud several reviewers claimed n81 much like older nokia n91 high sound output quality therefore highly suitable audiophiles four-way silver-coloured d-pad display also contains new capacitive sensor called navi wheel allows scrolling s60 gallery music player applications 'stroking key similar manner ipod click wheel unique feature rarely appears mobile handsets navi wheel would later also appear nokia nseries handsets n78 n85 n79 n81 modest specifications compared nokia n95 2-megapixel camera lacking gps hsdpa weighing 20 grams heavier however n81 arm11 369 mhz processor fastest nokia device time nokia n81 notably features sliding spring-loaded physical keylock top device located next 3.5 mm jack first nseries device swapped miniusb port favour microusb variant called n81 8gb 8-gigabytes internal flash memory also announced time version retailed 430 euros taxes 70 euros standard version requires microsd memory card expand 12 megabytes storage n81 would succeeded n85 nokia n81 lower sound output compared n91 due release new firmware version according nokia must follow international standard wherein device initial default volume must set low cause damage users cnet found buggy slow badly designed s21 gave 3/5 praising feature set criticising plasticky design however musical capabilities highly praised
[ 1537, 8577, 3205, 11655, 9359, 1424, 529, 2449, 659, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 9262, 10802, 7220, 821, 5175, 1083, 1728, 7617, 4291, 7877, 10053, 199, ...
Validation
7,867
9
Spice_Lisp:spice lisp spice lisp scientific personal integrated computing environment programming language dialect lisp implementation originally written carnegie mellon university cmu spice lisp group targeted microcode 16-bit workstation perq operating system accent used workstation microcode abilities provided microcodes languages pascal c ada implement stack machine architecture store data structures 32-bit objects enable run time type-checking would later popular workstations spice lisp evolved implementation common lisp renamed cmu common lisp cmucl
[ 10752, 7173, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 2105, 3132, 6717, 8258, 8771, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 3176, 2666, 2667, 5751, 7805, 9345, 1159, 9865, 9877, 4779, 5803, 2225, 8...
Test
7,868
1
Array_DBMS:array dbms array database management systems dbmss provide database services specifically arrays also called raster data homogeneous collections data items often called pixels voxels etc sitting regular grid one two dimensions often arrays used represent sensor simulation image statistics data arrays tend big data single objects frequently ranging terabyte soon petabyte sizes example today ’ earth space observation archives typically grow terabytes day array databases aim offering flexible scalable storage retrieval information category style standard database systems sets array dbmss offer scalable flexible storage flexible retrieval/manipulation arrays conceptually unlimited size practice arrays never appear standalone array model normally embedded overall data model relational model systems implement arrays analogy tables introduce arrays additional attribute type management arrays requires novel techniques particularly due fact traditional database tuples objects tend fit well single database page unit disk access server typically 4 kb array objects easily span several media prime task array storage manager give fast access large arrays sub-arrays end arrays get partitioned insertion so-called tiles chunks convenient size act units access query evaluation array dbmss offer query languages giving declarative access arrays allowing create manipulate search delete like e.g. sql expressions arbitrary complexity built top set core array operations due extensions made data query model array dbmss sometimes subsumed nosql category sense sql query optimization parallelization important achieving scalability actually many array operators lend well towards parallel evaluation processing tile separate nodes cores important application domains array dbmss include earth space life social sciences well related commercial applications hydrocarbon exploration industry olap business variety occurring observed e.g. geo data 1-d environmental sensor time series 2-d satellite images 3-d x/y/t image time series x/y/z geophysics data well 4-d x/y/z/t climate ocean data found relational data model prevailing today directly support array paradigm extent sets tuples iso sql lists array-valued attribute type one-dimensional almost operational support usable application domains array dbmss another option resort blobs binary large objects equivalent files byte strings conceptually unlimited length without query language functionality multi-dimensional subsetting first significant work going beyond blobs established picdms system offers precursor 2-d array query language albeit still procedural without suitable storage support first declarative query language suitable multiple dimensions algebra-based semantics published baumann together scalable architecture another array database language constrained 2-d presented marathe salem seminal theoretical work accomplished libkin et al model called ncra extend nested relational calculus multidimensional arrays among results important contributions array query complexity analysis map algebra suitable 2-d 3-d spatial raster data published mennis et al terms array dbms implementations rasdaman system longest implementation track record n-d arrays full query support oracle georaster offers chunked storage 2-d raster maps albeit without sql integration terralib open-source gis software extends object-relational dbms technology handle spatio-temporal data types main focus vector data also support rasters starting version 2.0 postgis embeds raster support 2-d rasters special function offers declarative raster query functionality sciql array query language added monetdb dbms scidb recent initiative establish array database support like sciql arrays seen equivalent tables rather new attribute type rasdaman postgis special case sparse data olap data cubes well established store cell values together location adequate compression technique face locations carrying valid information operate sql technique scale density standard databases used today dense data like satellite images cells carry meaningful information rather proprietary ad-hoc implementations prevail scientific data management similar situations hence array dbmss make particular contribution generally array dbmss emerging technology operationally deployed systems exist like oracle georaster postgis 2.0 rasdaman still many open research questions including query language design formalization query optimization parallelization distributed processing scalability issues general besides scientific communities still appear reluctant taking array database technology tend favor specialized proprietary technology adding arrays databases facets database design need reconsidered ranging conceptual modeling suitable operators storage management management arrays spanning multiple media query processing efficient processing strategies formally array given total partial function x → v x domain -dimensional integer interval 0 v called range non-empty value set set notation rewritten p v p x v v p v denotes array element cell following common notation write p v examples x include 0..767 × 0..1023 xga sized images examples v include 0..255 8-bit greyscale images 0..255 × 0..255 × 0..255 standard rgb imagery following established database practice array query language declarative safe evaluation iteration array heart array processing declarativeness much centers aspect requirement conceptually cells inspected simultaneously words query enforce explicit iteration sequence array cells evaluation evaluation safety achieved every query terminates finite number finite-time steps avoiding general loops recursion way achieving time avoiding explicit loop sequences opens manifold optimization opportunities example array query operators rasdaman algebra query language serve establish expression language minimal set array primitives begin generic core operators present common special cases shorthands marray operator creates array given domain extent initializes cells index-range-specification defines result domain binds iteration variable without specifying iteration sequence cell-value-expression evaluated location domain example “ cutout array given corner points 10,20 40,50 ” special case pure subsetting abbreviated subsetting keeps dimension array reduce dimension extracting slices single slicepoint value indicated slicing dimension example “ slice x/y/t timeseries position t=100 retrieving available data x y. ” wildcard operator indicates current boundary array used note arrays dimension boundaries left open definition time may change size dimensions array lifetime examples simply copied original values instead values may manipulated example “ array log applied cell value. ” abbreviated principle called induced operations query language offers operations cell type offers array level hence numeric values usual unary binary arithmetic exponential trigonometric operations available straightforward manner plus standard set boolean operators condense operator aggregates cell values one scalar result similar sql aggregates application general form marray index-range-specification specifies domain iterated binds iteration variable without specifying iteration sequence likewise cell-value-expression evaluated domain location condense-op clause specifies aggregating operation used combine cell value expressions one single value example sum values shorthand operation manner analogy sql aggregates number shorthands provided including counting average minimum maximum boolean quantifiers next example demonstrates combination marray condense operators deriving histogram example histogram 8-bit greyscale image induced comparison a=bucket establishes boolean array extent aggregation operator counts occurrences true value bucket subsequently put proper array cell 1-d histogram array languages allow formulating statistical imaging operations expressed analytically without using loops proven expressive power array languages principle equivalent relational query languages ranking array storage accommodate arrays different dimensions typically large sizes core task maintain spatial proximity disk reduce number disk accesses subsetting note emulation multi-dimensional arrays nested lists 1-d arrays per se accomplish therefore general lead scalable architectures commonly arrays partitioned sub-arrays form unit access regular partitioning partitions size except possibly boundaries referred chunking generalization removes restriction equally sized partitions supporting kind partitioning tiling array partitioning improve access array subsets significantly adjusting tiling access pattern server ideally fetch required data one disk access compression tiles sometimes reduce substantially amount storage needed also transmission results compression useful large amounts data consideration networks bandwidth often constitutes limiting factor tile-based storage structure suggests tile-by-tile processing strategy rasdaman called tile streaming large class practically relevant queries evaluated loading tile tile thereby allowing servers process arrays orders magnitude beyond main memory due massive sizes arrays scientific/technical applications combination often complex queries optimization plays central role making array queries efficient hardware software parallelization applied example heuristic optimization rule averaging array resulting cell-wise addition two input images equivalent adding averages input array replacing left-hand variant right-hand expression costs shrink three costly array traversals two array traversals plus one cheap scalar operation see figure uses rasdaman query language introduced many – – cases phenomenon sampled simulated result rasterized data set conveniently stored retrieved forwarded array typically array data ornamented metadata describing example geographically referenced imagery carry geographic position coordinate reference system expressed following representative domains large-scale multi-dimensional array data handled examples generally arrays frequently represent sensor simulation image statistics data spatial time dimensions combined abstract axes sales products one example abstract axes explicitly foreseen open_geospatial_consortium |open geospatial consortium ogc coverage model many communities established data exchange formats hdf netcdf tiff de facto standard earth science communities opendap data transport architecture protocol database specification offers important components characterize database system conceptual model client/server implementations declarative geo raster query language web coverage processing service wcps standardized open geospatial consortium ogc june 2014 iso/iec jtc1 sc32 wg3 maintains sql database standard decided add multi-dimensional array support sql new column type based initial array support available since new standard adopted fall 2018 named iso 9075 sql part 15 mda multi-dimensional arrays
[ 2688, 5632, 10632, 8201, 8979, 2068, 10389, 7446, 2456, 1049, 5658, 5403, 9631, 1697, 9634, 9893, 4263, 2344, 7080, 10413, 10286, 9397, 10294, 4155, 3004, 9147, 11324, 10048, 5953, 11457, 580, 6085, 9286, 2512, 2901, 7802, 7767, 10326, 1109...
None
7,869
2
IPhone_6:iphone 6 iphone 6 iphone 6 plus smartphones designed marketed apple inc eighth generation iphone succeeding iphone 5s announced september 9 2014 released september 19 2014 iphone 6 iphone 6 plus jointly replaced flagship devices iphone series iphone 6s iphone 6s plus september 9 2015 iphone 6 6 plus include larger displays faster processor upgraded cameras improved lte wi-fi connectivity support near field communications-based mobile payments offering iphone 6 6 plus received positive reviews critics regarding redesign specifications camera battery life improvements previous iphone models however aspects design iphone 6 also panned including plastic strips rear device antenna disrupted otherwise metal exterior screen resolution standard-sized iphone 6 lower devices class pre-orders iphone 6 iphone 6 plus exceeded four million within first 24 hours availability—an apple record ten million iphone 6 iphone 6 plus devices sold first three days another apple record lifespan iphone 6 6 plus sold 220 million total making best selling iphone models far one successful phones date despite positive reception iphone 6 6 plus subject several hardware issues including prominently susceptible bending hard pressure dubbed bendgate byproduct lack rigidity touchscreen internal hardware susceptible losing connection phone logic board nicknamed touch disease additionally iphone 6 plus models subject camera issues including malfunctioning optical image stabilization otherwise defects rear cameras iphone 6 6 plus moved midrange spot apple iphone lineup iphone 6s 6s plus released september 2015 iphone 6 6 plus discontinued markets september 7 2016 apple announced iphone 7 iphone 7 plus spot entry-level iphone replaced iphone se released earlier march 31 2016 iphone 6 relaunched 32 gb storage asian markets february 2017 midrange/budget iphone later expanded europe hitting us markets may 2017 canada july 2017 iphone 6 6 plus supported ios 8 9 10 11 12 dropped ios 13 third support five versions ios iphone 4s iphone 5 launch original iphone iphone 4s iphones used 3.5-inch displays—which smaller screens used flagship phones competitors iphone 5 immediate successors featured display taller width prior models measuring 4 inches diagonally following apple loss smartphone market share companies producing phones larger displays reports early january 2014 suggested apple preparing launch new iphone models larger 4.7-inch 5.5-inch displays reports prior unveiling also speculated apple might use new iphone model introduce mobile payments platform using near-field communications—a technology incorporated many android phones experienced low adoption rate among users iphone 6 iphone 6 plus officially unveiled press event flint center performing arts cupertino california september 9 2014 released september 19 2014 pre-orders began september 12 2014 iphone 6 starting us 649 iphone 6 plus starting us 749 china iphone 5c 5s first models iphone series released country day international launch apple notified local wireless carriers would unable release iphone 6 iphone 6 plus 19th details ready local media reported devices yet approved ministry industry information technology earlier year news report state broadcaster china central television alleged iphone devices threat national security ios 7 frequent locations function could expose state secrets august 2015 apple initiated replacement program early iphone 6 plus found potentially faulty cameras could causing photos appear blurry september 9 2015 release iphone 6s iphone 6s plus iphone 6 6 plus moved mid-range iphone lineup 128 gb versions iphone 6 iphone 6 plus discontinued along gold version phones 16 gb 64 gb versions iphone 6 iphone 6 plus silver space gray remain available sale reduced price june 2016 apple faced potential sales ban china shenzhen baili chinese device maker alleged iphone 6 iphone 6 plus infringed design patent iphone 6 6 plus discontinued september 7 2016 apple announced iphone 7 iphone 7 plus iphone 6 6 plus spot entry-level iphone since taken iphone se iphone se powerful internal hardware midrange iphone 6 largely 6s released earlier march 31 2016 created unusual situation sold alongside iphone 6 6 plus september 7 despite marketed lower-tier iphone february 2017 iphone 6 quietly relaunched carrier stores online time storage changed 32 gb india sold amazon website space grey taiwan sold taiwan mobile march 10 gold colour mid-march released eu belarus via i-store web shop also makes appearance north america sprint based us prepaid carriers boost mobile virgin mobile along gophone distributed apple website retail stores design iphone 6 iphone 6 plus influenced ipad air glass front curved around edges display aluminum rear contains two plastic strips antenna back built 6000-series aluminum models come gold silver space gray finishes iphone 6 thickness iphone 6 plus thickness thinner iphone 5c iphone 5s iphone 6 apple thinnest phone date significant changes iphone 6 iphone 6 plus displays branded retina hd display ion-strengthened iphone 6 display 4.7 inches size resolution 1334x750 326 ppi minus one row pixels iphone 6 plus includes 5.5-inch 1920x1080 1080p display 401 ppi displays use multiple-domain lcd panel dubbed dual-domain pixels rgb pixels skewed pattern every pixel seen different angle technique helps improve viewing angles display accommodate larger physical size iphone 6 iphone 6 plus power button moved side phone instead top improve accessibility iphone 6 features 6.91 wh 1810 mah battery iphone 6 plus features 11.1 wh 2915 mah battery unlike previous model rear-facing camera flush rear device instead protrudes slightly models include apple a8 system-on-chip m8 motion co-processor—an update m7 chip iphone 5s primary difference m8 original m7 coprocessor m8 also includes barometer measure altitude changes phil schiller touted a8 chip would provide comparison 5s 25 increase cpu performance 50 increase graphics performance less heat output early hands-on reports suggested a8 gpu performance might indeed break away previous generations doubling performance yearly release scoring 21204.26 base mark x compared 20253.80 10973.36 5034.75 respectively 5s 5 4s expanded lte connectivity iphone 6 iphone 6 plus improved lte advanced support 20 lte bands seven iphone 5s 150 mbit/s download speed volte support wi-fi performance improved support 802.11ac specifications providing speeds 433.0581 mbit/s—which three times faster 802.11n along wi-fi calling support available iphone 6 iphone 6 plus add support near-field communications nfc initially used exclusively apple pay—a new mobile payments system allows users store credit cards passbook use online payments retail purchases nfc ios 11 added limited use near-field communications besides apple pay 3rd party apps iphone 6 rear-facing camera ability shoot 1080p video either 30 60 frames per second slow-motion video either 120 240 frames per second camera also includes phase detection autofocus iphone 6 plus camera nearly identical also includes optical image stabilization front-facing camera also updated new sensor f/2.2 aperture along support burst hdr modes first released iphone 6 iphone 6 plus supplied pre-loaded ios 8 iphone 5s supplied pre-loaded ios 7 apps able take advantage increased screen size iphone 6 6 plus display information on-screen example mail app uses dual-pane layout similar ipad version device landscape mode iphone 6 plus uses identical aspect ratio apps designed iphone 5 iphone 5c 5s upscaled use iphone 6 6 plus improve usability devices larger screens additional reachability gesture added double-tapping home button slide top half screen contents bottom half screen function allows users reach buttons located near top screen back button top-left corner june 2019 apple announced drop support iphone 6 6 plus release ios 13 iphone 6 models received generally positive reviews re/code called best smartphone buy techradar praised iphone 6 brilliant design improved battery life 5s ios 8 smarter intuitive ever along quality camera however plastic antenna strips rear phone criticized resulting poor aesthetics display lower resolution pixel density comparison recent smartphones – including physical screen size iphone 6 htc one sufficient justification significantly higher price comparison similar devices running android windows phone verge considered iphone 6 simply cleanly designed comparison 5s noting phone still felt usable despite larger size criticized antenna plastic protruding camera lens prevents device sitting flat without case lack additional optimization operating system bigger screen improvements performance battery life volte support tweaks also noted conclusion iphone 6 considered good even great ’ little ’ truly ambitious truly moving needle ’ refinement lot existing ideas much pleasant package regards 6 plus engadget panned design uncomfortable hold harder grip comparison devices galaxy note 3 lg g3 praised inclusion optical image stabilization slightly better battery life 6 iphone 6 6 plus affected number notable hardware-related issues including limited concerns surrounding rigidity led incidents surrounding chassis bending well degradation outright loss touchscreen functionality performance issues models larger storage capacity camera problems 6 plus model well initially undocumented error 53 appeared certain circumstances shortly public release reported iphone 6 iphone 6 plus chassis susceptible bending pressure carried tightly user pocket issues exclusive iphone 6 6 plus design flaw came known among users media apple responded bending allegations stating received nine complaints bent devices damage occurring due regular use extremely rare company maintained iphone 6 6 plus went durability testing ensure would stand daily use company offered replace phones bent determined bending unintentional october 1 2014 axel telzerow editor-in-chief german magazine computer bild reported following posting video presenter able bend iphone 6 plus apple germany representative informed publication banned future apple events would longer receive devices directly apple testing telzerow responded saying congratulate fine new generation iphones even one minor weakness casing deeply disappointed lack respect company october 3 2014 9to5mac released post claiming certain iphone 6 iphone 6 plus users complained social networking sites phone ripped hair held phone close ears making phone calls twitter users claimed seam glass screen aluminum back iphone 6 blame hair becoming caught within users reported 64 128 gb iphone 6 models experienced performance issues 128 gb iphone 6 plus models would rare cases randomly crash reboot business korea reported issues connected triple-layer cell nand storage affected models triple-layer cells store three bits data per cell flash cheaper dual-layer cell solutions cost performance reported apple planned switch affected model lines back multi-layer cell flash address performance issues existing devices future ios update reported optical image stabilization systems iphone 6 plus models faulty failing properly stabilize phone held perfectly still leading blurry photos wavy -looking videos optical image stabilization system also found affected accessories use magnets third-party lens attachments apple issued advisories users licensed accessory makers warning magnetic metallic accessories cause ois malfunction august 21 2015 apple instituted repair program iphone 6 plus models released september 2014 january 2015 citing faulty rear cameras affected models may produce blurry pictures iphone 6 iphone 6 plus models issue front-facing camera somehow shifted place apple stated would replace affected iphone 6 models issue free charge despite numerous complaints regarding issue seem affect camera said camera shifted piece protective foam around camera module gone place iphone 6 home button repaired modified third party device fail security checks related touch id components re-validated security reasons—a process performed authorized apple outlet failing checks disables features related touch id effects sometimes happened result damage well reported hardware integrity checks would trigger unrecoverable loop recovery mode ios updated restored attempts restore device via itunes software resulting error 53 message beyond explanation related hardware integrity errors regarding touch id components apple provided official explanation specifically triggers error 53 fixed without replacing entire device february 18 2016 apple released ios 9.2.1 patch itunes addresses issue admitted error 53 actually related diagnostic check inspecting touch id hardware iphone shipped factories touchscreen control components iphone 6 logic boards insufficient support including lack underfill—which strengthens stabilizes integrated circuits lack rigid metal shielding logic board unlike previous iphone models touchscreen controller instead shielded flexible sticker normal use device cause logic board flex internally strains touchscreen ic connectors leads degradation outright loss touchscreen functionality symptom associated type failure flickering grey bar near top display ifixit reported issue nicknamed touch disease byproduct previous bendgate design flaw device demonstrated lack rigidity larger iphone 6 plus susceptible flaw also reported small percentage iphone 6 models devices successor iphone 6s afflicted flaw due changes internal design included strengthening key points rear casing re-location touchscreen controllers display assembly logic board initially apple officially acknowledge issue issue widely discussed apple support forum—where posts discussing issue subject censorship touchscreen repaired via microsoldering apple stores equipped tools needed perform logic board repair led affected users sending devices unofficial third-party repair services apple store employee interviewed apple insider reported six months first started noticing problem apple issued guidance instructing tell affected users hardware issue could repaired iphone replaced however in-stock units also afflicted issue box leading employee stating tired pulling service stock box seeing exact problem customer replacement issue received mainstream attention august 2016 reported ifixit august 26 2016 apple insider reported based data four high-traffic apple store locations spike number iphone 6 devices brought repairs following mainstream reports touch disease problem august 30 2016 group three iphone 6 owners sued apple inc. united states district court northern district california filed proposed class action lawsuit alleging apple engaging unfair business practices long aware defective design yet refusing acknowledge repair november 17 2016 apple officially acknowledged issue announced paid repair program affected iphone 6 plus models stating iphone 6 plus devices may exhibit display flickering multi-touch issues dropped multiple times hard surface incurring stress device apple inc. announced within 24 hours availability 4 million pre-orders iphone 6 6 plus made exceeding supply available 10 million iphone 6 iphone 6 plus devices sold first three days
[ 10755, 9732, 1549, 5647, 7697, 4114, 6165, 11289, 7706, 8222, 8735, 1057, 6183, 1576, 6186, 4139, 6700, 7211, 1074, 8754, 9784, 1083, 8253, 576, 1090, 8783, 4180, 10838, 1623, 3672, 10840, 9312, 3681, 9826, 8806, 3691, 2673, 6258, 10357, ...
None
7,870
9
Turbo-Basic_XL:turbo-basic xl turbo-basic xl advanced version basic programming language atari 8-bit family home computers compatible superset atari basic built-in atari machines era turbo-basic xl notable feature vastly improved execution speed atari basic program loaded turbo-basic changes made would generally run three times fast turbo-basic xl compiler also available created binary executables speeding program performance ten times faster atari basic turbo-basic xl developed frank ostrowski published december 1985 issue german computer magazine happy computer version 400/800 models released shortly known frost basic 1.4 since release 1979 8-bit family normally shipped version atari basic rom cartridge built internal roms later machines version basic number custom commands allowed partial access system advanced features like graphics sound however also notoriously slow appearing bottom list microcomputer basics original version david ahl creative computing benchmark poor performance official atari basic led market 3rd party basics better performance commands among official port microsoft basic sold atari several new versions released optimized systems software written original atari basic contract many others also several atari basic compilers turbo-basic xl late entry list first published december 1985 type-in program unique came interpreter compiler versions included code take advantage expanded memory available xl series machines later xe series meant could run original 400/800 systems led ostrowski make port known frost basic short frank ostrowski tied atari dos 2.0 number ports different versions dos available notable feature turbo-basic dramatically improved speed unmodified atari basic program loaded turbo-basic would normally run three five times faster would improve program size grew due largely series improvements well-known problems original atari basic code basics goto handled reading associated line number searching program line code simple improvement compare line number line found goto line number larger interpreter would search forward spot smaller would search start program ms basic included pointer next instruction previous atari basic lacked simple improvement searching code start every time ... next loops another common construct basic programs basics portion seen location source code pushed onto call stack could easily return associated next encountered atari basic lacked improvement instead looked entire code associated took considerable time programs significant looping often case basic could represent dramatic performance hit turbo-basic used address ms-basic went greatly improved goto performance well line numbers sent hash function broke 256-line chunks program entered address first chunks stored 256-value table runtime line number lookup needed would first pick nearest-but-lower value table retrieve address begin scanning line point improvement notable larger programs scanning time increasingly expensive turbo-basic could hit 5-times increase larger programs major source poor performance atari basic slow binary coded decimal bcd floating point code library contained separate 2k rom considered part operating system opposed basic written hurry never optimized routines notably multiply exponents far slower could turbo-basic fixed including complete floating point library fixed many issues also optimized code unrolling small loops programs used math extensively new library resulted dramatic performance improvements sending atari near bottom ahl benchmark lists near top beating number machines much faster hardware among extra features turbo-basic xl added atari basic following
[ 3718, 7691, 1805, 9997, 6289, 786, 11412, 22, 3736, 3481, 9881, 797, 1952, 3233, 11683, 5925, 8101, 4136, 10666, 8494, 303, 5040, 7343, 7983, 11315, 315, 7355, 7486, 4160, 4674, 10750, 712, 847, 1879, 92, 11229, 2915, 9188, 5733, 11243, ...
None
7,871
9
JavaScript_library:javascript library javascript library library pre-written javascript allows easier development javascript-based applications especially ajax web-centric technologies javascript first developed netscape later mozilla long presence web many websites gained particular pitch rise web 2.0 era computing javascript became increasingly used development user interfaces applications web-based desktop-based javascript also combined css create dynamic web pages also become popular efficient accessible alternative flash-based websites expanded demands javascript easier means programmers develop dynamic interfaces needed thus javascript libraries javascript widget libraries developed allowing developers concentrate upon distinctive applications ajax led companies groups microsoft yahoo developing javascript-based user interface libraries find way web applications developed companies javascript libraries allow easier integration javascript web development technologies css php ruby java many libraries include code detect differences runtime environments remove need applications allow inconsistencies almost javascript libraries released either copycenter copyleft license ensure license-free distribution usage modification javascript libraries angular classified frameworks since exhibit full-stack capabilities properties found general javascript libraries
[ 1409, 259, 8068, 3462, 5255, 6791, 1802, 6154, 10507, 1295, 8854, 4378, 8605, 9245, 7455, 6176, 8735, 1698, 803, 1959, 5031, 5677, 1713, 3761, 1203, 11060, 438, 4920, 1470, 5311, 2880, 9152, 8644, 4171, 5067, 11087, 339, 84, 4822, 5846, ...
None
7,872
2
The_Art_of_Unix_Programming:art unix programming art unix programming eric s. raymond book history culture unix programming earliest days 1969 2003 published covering genetic derivations bsd conceptual ones linux author utilizes comparative approach explaining unix contrasting operating systems including desktop-oriented ones microsoft windows classic mac os ones research roots eros plan 9 bell labs book published addison-wesley september 17 2003 also available online creative commons license additional clauses book contains many contributions quotations comments unix gurus past present include
[ 3206, 6797, 2581, 3733, 6304, 9507, 294, 7983, 823, 1335, 576, 9926, 8395, 1360, 9298, 3923, 4830, 8031, 3939, 4333, 5492, 3062 ]
None
7,873
4
Proxy_list:proxy list proxy list list open http/https/socks proxy servers one website proxies allow users make indirect network connections computer network services proxy lists include ip addresses computers hosting open proxy servers meaning proxy servers available anyone internet proxy lists often organized various proxy protocols servers use many proxy lists index web proxies used without changing browser settings 3 types http proxies socks protocol relays tcp sessions firewall host allow application users transparent access across firewall protocol independent application protocols used many different services telnet ftp finger whois gopher www etc access control applied beginning tcp session thereafter server simply relays data client application server incurring minimum processing overhead since socks never know anything application protocol also easy accommodate applications use encryption protect traffic nosy snoopers information client sent server – thus need test anonymity level socks proxies
[ 5405, 1692, 4725, 5591 ]
Test
7,874
7
Axcient:axcient axcient inc mountain view california company provides recovery-as-a-service raas businesses protect data applications axcient platform manages data backup data recovery disaster recovery regulatory compliance cloud storage online backup granular data recovery single web based service eliminate data loss small large businesses axcient founded 2006 headquartered mountain view california privately held backing investors including allegis capital peninsula ventures thomvest scale venture partners company name comes combining words intelligent access placed random word generator exchanged word intelligent synonym sapient flipped around access ax -sapient cient september 16 2014 axcient acquired directrestore dover delaware-based granular recovery technology solutions provider directrestore product portfolio enables restoration mainstream applications sql server microsoft exchange database backups replications axcient integrate single solution oem software.in july 2017 efolder merged axcient gartner rated axcient excellent critical capabilities recovery service report “ visionary ” gartner ’ magic quadrant draas axcient also ranked “ leader ” forrester disaster recovery service provider forrester wave “ leader ” idc marketscape draas vendor assessment service require software installed customers hardware axcient one product web-based cloud solution includes data backup data recovery disaster recovery regulatory compliance cloud storage online backup granular data application restore
[ 6514, 6565, 3366, 8446 ]
Test
7,875
2
UpdateStar:updatestar updatestar freeware software application providing update information approximately 1.3 million software programs implementing social computing aspect update database maintained users updatestar uses advertising refinance free service shares ad revenue 50/50 software authors via share program software searched downloaded updated addition updatestar freeware client easily installed inform users available updates individual software setup allows downloading installing uninstalling programs within client acts enhancement add/remove programs control panel applet programs features windows vista software search engine http //www.updatestar.com/ built top updatestar ’ user generated software program database via ad revenue sharing program share updatestar allows developers use updatestar website download mirror participate ad revenue created program ’ webpages updatestar founded michael ganss frank alperstaedt olaf kehrer 2007 based berlin software search engine website however launch july 2008 company funded founders current version site released july 2008 included new software search capabilities results based user submitted information 259,000 programs new professional services business section updatestar freeware client section updatestar freeware grown popularity 50,000 users 2007 550,000 users july 2008 updatestar 4 released march 2009 introduced enhanced recognition algorithm registry cleaner removes remnants uninstalled software updates appear almost daily basis software setup 60 80 programs typical pc making nearly impossible pc user keep program available freeware well commercial premium edition additional security advice program cleaner system maintenance updatestar provides user information software updates available software computer includes major releases provided updatestar freeware edition well minor version upgrades patches included premium edition many updates published security reasons newly included features either way software updates considered important even critical case updates made available publishers security reasons updatestar premium additionally offers security advice allowing identification important software updates updatestar premium includes tool clean windows registry superfluous faulty software entries often result incompletely uninstalled software two million users profit updatestar service per month december 2009 receive updates pcs software updatestar provides users program update information 4.5 million installations daily updatestar released version 5 oct 19 2009 introducing improved version recognition improved windows 7 support new language support korean lithuanian improved translations russian hungarian romanian attempts download software updatestar site lead malware attacks updatestar uses software search engine website share ad revenue software authors professional services include software market research analytics well targeted marketing services connect software vendors allows updatestar provide update information service free user community updatestar website tracks created ad revenues program pages share program creates ppc based revenue streams users click ads program ’ download page updatestar web advertiser charged advertising fee split updatestar software vendor vendor participates share partner updatestar website ’ user traffic comes targeted alerts newly available updates used software offering information downloads traffic multiplies number updates users way share software vendor partners participate repeatedly revenue created content software long participate february 2010 updatestar began commercial online backup service called updatestar online backup users updatestar online backup select files folders desktop application periodically backed remote data center program employs differential backup algorithm minimize amount data needs backed subsequent runs updatestar offers plans unlimited storage home business desktop computers limited storage 100 gb 250 gb 500 gb server computers program runs windows xp windows vista windows 7 desktop edition windows server 2003 windows server 2008 server edition
[ 4074, 5067, 6797, 7983 ]
Test
7,876
9
Affix_grammar:affix grammar affix grammar kind formal grammar used describe syntax languages mainly computer languages using approach based natural language typically described grammatical rules affix grammar context-free grammar except certain parts nonterminals affixes used arguments affix occurs multiple times rule value must agree i.e must everywhere types affix grammar complex relationships affix values possible describe extremely simple fragment english following manner context-free grammar describes simple sentences nouns verbs rules introduce parts speech large range english sentences described promising approach describing syntax english however given grammar also describes sentences sentences wrong english subject verb grammatical number must agree affix grammar express directly grammar describes correct english sentences although could argued still incorrect instead read incorporated using affixes means describing relationships different affix values powerful enough remarked means depend type affix grammar chosen simplest type affix grammar affixes take values finite domain affix values related agreement example applied way affixes increase compactness grammars add expressive power another approach allow affixes take arbitrary strings values allow concatenations affixes used rules ranges allowable values affixes described context-free grammar rules produces formalism two-level grammars also known van wijngaarden grammars 2vw grammars successfully used describe complicated languages particular syntax algol 68 programming language however turns even though affix values manipulated string concatenation formalism turing complete hence even basic questions language described arbitrary 2vw grammar undecidable general extended affix grammars developed 1980s restricted version idea mainly applied describe grammar natural language e.g english another possibility allow values affixes computed code written programming language two basic approaches used
[ 1952, 8262, 1672, 2316, 3277, 9871, 7634, 477 ]
Test
7,877
2
Nokia_N96:nokia n96 nokia n96 high-end smartphone announced nokia february 11 2008 mobile world congress barcelona part nseries line n96 runs updated symbian os v9.3 s60 3rd edition fp2 compatible n-gage 2.0 gaming platform also dvb-h television tuner compared popular nokia n95 8gb n96 doubled flash storage capacity 16 gigabytes dual led flash camera slimmer design however critics negative views n96 battery life user-unfriendlyness downgraded cpu clock speed raised questions one 2008 anticipated mobile phones launch delayed widely available october 2008 thus considered commercial failure critics felt nokia n85 provided new additions compared n96 much cheaper shipments n96 started september 2008 europe middle east asia-pacific first locations provide handset consumers american chinese versions expected shortly thereafter u.s. device sold us 900 criticised expensive general uk release date n96 1 october although london separate date 24 september device went sale exclusively nokia flagship stores regent street terminal 5 heathrow airport additions negative
[ 1537, 4609, 8577, 3205, 11655, 9359, 1424, 529, 2449, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 9262, 10802, 7220, 821, 5175, 7866, 1083, 1728, 7617, 4291, 10053, 199,...
Test
7,878
8
List_of_web_service_specifications:list web service specifications variety specifications associated web services specifications varying degrees maturity maintained supported various standards bodies entities specifications basic web services framework established first-generation standards represented wsdl soap uddi specifications may complement overlap compete web service specifications occasionally referred collectively ws-* though single managed set specifications consistently refers recognized owning body across ws-* prefix used indicate specifications associated web services exist many ws-* standards including ws-addressing ws-discovery ws-federation ws-policy ws-security ws-trust page includes many specifications might considered part ws-* sites contain documents links different web services standards identified page specifications provide additional information improve interoperability vendor implementations
[ 8070, 4107, 6284, 5782, 7320, 10396, 5789, 11040, 10020, 425, 4397, 431, 6067, 5303, 317, 6079, 10949, 9415, 1097, 10829, 6353, 6357, 2013, 6366, 479, 11105, 489, 5996, 4974, 4213, 10486, 6775, 3839 ]
Test
7,879
3
Interruptible_operating_system:interruptible operating system interruptible operating system operating system ability handle multiple interrupts concurrently words allow interrupts interrupted concurrent interrupt handling essentially mean concurrent execution kernel code hence induces additional complexity concurrency control accessing kernel datastructures means system stop program already running feature nearly modern operating systems
[ 5457, 9366, 7983 ]
None
7,880
9
Flavors_(programming_language):flavors programming language flavors early object-oriented extension lisp developed howard cannon mit artificial intelligence laboratory lisp machine programming language lisp machine lisp first programming language include mixins symbolics used lisp machines eventually developed new flavors original new flavors message passing oo models hugely influential development common lisp object system clos implementations flavors also available common lisp new flavors replaced message sending calling generic functions flavors offers daemons default method combination called flavors offers features found clos clos offers following features found flavors
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 2105, 3132, 6717, 8258, 8771, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 2666, 5751, 7805, 1159, 9865, 9877, 5803, 2225, 7867, 4799, 8908, 205, 5837, 5852, 10...
Test
7,881
2
Direct-access_storage_device:direct-access storage device direct-access storage device dasd pronounced secondary storage device physical record discrete location unique address ibm coined term dasd shorthand describing hard disk drives magnetic drums data cells later optical disc drives flash memory units also classified dasd term dasd contrasts sequential storage media magnetic tape unit record equipment card devices like card readers punches access methods dasd include sequential indexed direct direct access contrasts sequential access method used tape drives record dasd accessed without read intervening records current location whereas reading anything next record tape requires skipping intervening records requires proportionally long time access distant point medium dasd storage class includes fixed removable media ibm mainframes access i/o devices including dasd channels type subordinate mini-processor channel programs write read control given device operating system uses four byte relative track record ttr access methods others eight-byte extent-bin-cylinder-track-record block address mbbcchhr channel programs address dasd using six byte seek address bbcchh five byte record identifier cchhr 2321 data cell discontinued january 1975 addressing scheme device referred chr ctr cylinder-track-record bin number always 0 ibm refers data records programmers work logical records format disk blocks physical records one block might contain several logical user records schemes called spanned records partial logical records physical records size limit track devices track overflow feature allowed breaking large block track-size segments within cylinder access methods responsible blocking deblocking logical records written read external media ckd acronym count key data physical layout block dasd device confused ctr block address used channel program 1970s ibm introduced fixed block architecture fba mainframes programming level devices use traditional chr addressing reference fixed-length blocks number much like sectors mini-computers correctly application programmer remains unaware underlying storage arrangement stores data fixed physical block lengths 512 1024 2048 4096 depending device type applications fba offers simplicity increase throughput fba supported vm/370 dos/vse mvs successor operating systems os/360 line programming interface macros routines collectively referred dam direct access methods ibm 1964 first version ibm system/360 system summary used term file collectively described devices called dasd files provided random access storage time ibm product reference manual described devices direct access storage devices without acronym early public use acronym dasd ibm march 1966 manual data file handbook earliest non-ibm use acronym dasd found google ngram viewer refer storage devices dates 1968 use term grew exponentially drums data cells disappeared products dasd remains synonym disk flash optical devices modern dasd used mainframes rarely consist single disk-drives commonly dasd means large disk arrays utilizing raid schemes current devices emulate ckd fba hardware
[ 8290, 868, 663, 6664, 11673, 7053, 3323, 8911, 7217, 6003, 6515, 4535, 9977, 2395 ]
Test
7,882
7
GStat:gstat gstat web application aimed displaying information grid services grid information system related metrics system designed modular way software reused different application scenarios gstat evolved past years simple cgi script displayed summary grid infrastructure production quality service providing rich features information content testing infrastructure monitoring evolutionary approach development enabled gstat add functionally response real use cases become key operational tool gstat 2.0 major redesign original version ensure meet future demands evolving infrastructure easily integrate operational tools gstat result collaboration academia sinica grid technology group cern main purpose joint project align gstat direction taken wlcg monitoring group respect operational tools addition ensure gstat make contribution middleware certification site validation gstat compatible version 1.3 grid laboratory uniform environment data model taking information existing berkeley database information index instances currently effort developing compatibility version 2.0 grid laboratory uniform environment data model initial version gstat designed developed min tsai current team members contacted grid information product team webpage gstat provides method visualize grid infrastructure operational perspective based information found grid information system even absence information system information existence grid services needs communicated existence grid services communication existence defines grid infrastructures one main concepts gstat 2.0 bootstrapped information system endpoint defines view grid infrastructure periodically takes snapshot information system maintains cache main entities found infrastructure provides basic structure visualization main entities cache also used configure monitoring framework monitors information system reports health various components information system composed along metrics performance resulting information information system monitoring thereof used produce various displays address specific use cases gstat architecture makes clear separation data infrastructure monitoring content validation visualization core data model used maintain snapshot information system cache main entities probes used monitor information system components validation checks used ensure information content correct visualization framework used displaying resulting data modular approach enables software reused application scenarios gstat uniquely positioned support modern day big data initiatives gstat architecture implemented using two main frameworks django nagios django open source web application framework written python follows model–view–controller architectural pattern django models used provide core data model system snapshot script takes snapshot information system uses django framework store information import-entities script extracts main entities sites services snapshot maintains cache entities addition certain attributes extracted snapshot stored rrd databases using gstat-update-rrd script nagios open source monitoring framework used gstat monitor information system components validate information content via use custom probes monitoring probes re-used nagios based monitoring tools also executed command line enables easily incorporated test suites django also leveraged visualization aspects gstat entity cache used provide main structure displays snapshot result testing used provide detailed information
[ 8554, 1211, 5956, 7983 ]
None
7,883
2
Lorinda_Cherry:lorinda cherry lorinda cherry computer programmer received masters computer science stevens institute technology 1969 joined bell labs 1972 assembly language programmer worked unix operating system several years cherry worked mathematical tools bc dc co-authored eqn brian kernighan work libplot inspired later gnu plotutils package also worked analyzing federalist papers compressing digital phone books non-mathematical work included dictionary unix spell checker bell labs writer workbench wwb writer workbench meant help students learn edit work feeling lot tools value education much pointing people learning write choices make choices ’ think writing task making choices per se get paper think ’ cast stone makes edit cherry also contributed plan 9 operating system cowrote typing documents unix system using –ms –mcs macros troff mike lesk unix tenth edition manual coded non-dictionary based spellchecker typo conceived bob morris lorinda cherry also worked lee mcmahon along morris collecting substantial corpus text studying statistically tools particularly uniq comm became staples work came remarkable typo spotted typing errors statistical inference cherry ’ work approximate parsing aho ’ fast pattern search turned right foundation english style-appraiser suggested prof. william vesterman rutgers turn elaborated writer workbench nina macdonald others human performance engineering department cherry one three co-inventors patent method system verifying status 911 emergency telephone services cherry raced rally cars hobby cherry always fascinated text processing
[ 1987, 8522, 9298, 5492, 310, 477 ]
Train
7,884
2
C-list_(computer_security):c-list computer security capability-based computer security c-list array capabilities usually associated process maintained kernel program running process manipulate capabilities directly refers via c-list indexes—integers indexing c-list file descriptor table unix example c-list unix processes manipulate file descriptors directly refer via file descriptor numbers c-list indexes keykos eros operating systems process capability registers constitute c-list
[ 256, 4034, 7480, 10146, 10813, 2951, 4423, 5503, 5483, 11596, 10835, 3700, 5492, 10614, 728, 8633, 6813, 3999 ]
Test
7,885
5
Brave_(web_browser):brave web browser brave free open-source web browser developed brave software inc. based chromium web browser browser blocks ads website trackers company proposed adopting pay-to-surf business model future version browser 2018 brave supports windows macos linux android ios current version features five search engines default including partner duckduckgo brave allows users support sites visit bat users may earn bat watching ads funding bat wallet users paid 70 revenue generate remaining 30 split brave advertisement publisher test version browser brave targets web ads analyzing user anonymized browsing history brave software basic attention token ad exchange platform received investment danhua capital digital currency group foundation capital founders fund huiyin blockchain venture pantera capital propel venture partners originally incorporated delaware hyperware labs inc 2015 later changed name brave software inc. registered california company headquartered brave developed brave software founded may 28 2015 ceo brendan eich cto brian bondy january 20 2016 brave software launched first version brave ad blocking feature announced plans privacy ad feature revenue sharing program june 2018 brave released pay-to-surf test version browser version brave preloaded approximately 250 ads sends detailed log user browsing activity brave short-term purpose testing functionality brave announced expanded trials follow later month brave added support tor desktop browser private browsing mode december year brave called boycott google advertising practices december 2018 brave ran fork electron called muon marketed secure fork nevertheless brave developers moved chromium citing need ease maintenance burden final muon-based version released intention would stop working instruct users update end life approached april 25 2019 brave team members released brave ads release version web browser also working vice media home chef ternio blockcard mycrypto etoro addition buysellads tap network airswap fluidity uphold pay users cryptocurrency viewing ads july brave ads also became available android app brave browser default browser upcoming cryptocurrency-focused htc exodus 1 telephone june 2019 brave started testing new ad-blocking rule matching algorithm implemented rust brave claims average 69 times faster previous implementation c++ new algorithm inspired ublock origin ghostery algorithms january 2016 reaction brave software initial announcement sebastian anthony ars technica described brave cash-grab double dip anthony concluded brave interesting idea generally rather frowned upon stick ads front someone else techcrunch computerworld engadget termed brave ad replacement plans controversial february 2016 andy patrizio network world reviewed pre-release version brave patrizio criticized browser feature set mighty primitive lauded performance pages load instantly ca n't really benchmark page loads since happen faster start/stop stopwatch april 2016 ceo newspaper association america david chavern said brave proposed replacement advertising viewed illegal deceptive courts consumers value creation content eich responded emphasizing browser gives lion share ad revenue content publishers april 2017 techworld praised brave great speeds advanced ad-tracking controls said extension functionality still lacking january 2019 zerocrypted praised ui new chrome extension support said rewards clear users similarly cnet said december review brave june 21 2019 technical columnist washington post geoffrey fowler recommending firefox listed brave among browser options available alternatives chrome article indicating abandonment browser 11,000 tracking cookies documented browser single week noted brave goes even trying jam ad-tech industry basic attention token bat open-source decentralized ad exchange platform based ethereum platform integrated brave web browser possible use access platform browser official description token provided via whitepaper brave payments formerly used bitcoin allows users tip websites content creators youtubers twitch streamers bat tokens akin patronage services patreon integration bat application involves implementing bat ads system displays ads users based locally stored data ad targeting performed locally removing need third-party tracking initial coin offering may 31 2017 bat sold 1,000,000,000 bat total 156,250 ethereum us 35m less 30 seconds additional 500,000,000 bat retained team developer user growth pools used promote adoption platform additionally received least us 7 million angel investments venture capital firms including peter thiel founders fund propel venture partners pantera capital foundation capital digital currency group early december 2017 development team disbursed first round user growth pool grants total 300,000 bat distributed new users first come first served basis mid january 2018 team issued us 1m worth bat tokens users promotional giveaway grants claimed within ten days march 1 2018 company expanded brave payments support streamers twitch.tv platform increased referral program grants us 1m worth bat april 24 2019 brave implemented bat ads program pays users bat viewing advertisements compensation attention users get 70 revenue attention generates deposited brave wallet monthly notable publishers accept bat tokens include washington post guardian npr la times vimeo marketwatch barron duckduckgo qwant bittorrent slate vice
[ 513, 6657, 9736, 2579, 6171, 9757, 7713, 10791, 9770, 559, 4661, 3639, 10808, 3643, 9275, 1087, 64, 5707, 10834, 6231, 8281, 6747, 1642, 9834, 9841, 115, 9843, 119, 4728, 637, 1664, 2182, 6791, 6797, 10910, 8351, 7340, 9394, 9908, 185, ...
None