node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
7,986
3
DOS_Shell:dos shell dos shell file manager debuted ms-dos ibm pc dos version 4.0 june 1988 discontinued ms-dos version 6.22 remained part supplemental disk supplemental disk could ordered could downloaded microsoft ftp server dos shell retained pc dos pc dos 2000 dos shell one first successful attempts create basic graphical user interface gui type file manager dos although properly referred text user interface tui character-oriented windows cow even though graphical modes available supported hardware vga-equipped pcs additionally one first guis developed microsoft later inspired design windows shell much like dos version file manager found windows versions 3.11 nt 3.51 file explorer later versions ms-dos 4.x 5.x program implemented com file codice_1 ms-dos 6 executable .exe filename extension codice_2 shell includes common features seen file managers copying moving renaming files well ability launch applications double-click shell could run command codice_3 ability set simple colours styles shell also help system program list task swapper like many modern file managers ability display dual hierarchy directory file lists i.e left right panes displaying list directory contents hierarchical file path current working directory mouse supported however like dos application required appropriate device driver one feature ability list files hard drive single alphabetized list along path attributes permitted user compare versions file different directories attributes easily spot duplicates dos shell incapable full multitasking supported rudimentary task switching could switch programs running memory cost performance hit however running programs fit conventional memory area support swapping disk time windows 3.1x graphical user interface became much popular among computer users windows capable multitasking system performance much higher complete access extended memory
[ 641, 6148, 10757, 6921, 6797, 5397, 2345, 7849, 11562, 7983, 5694, 576, 7364, 9166, 2383, 5840, 5612, 8301, 1007, 5619, 8959 ]
Validation
7,987
8
Vibe.d:vibe.d vibe.d open-source software web framework asynchronous i/o toolkit written programming language vibe.d deal requests per second common platforms
[ 1920, 3462, 8582, 2062, 9614, 2576, 148, 1812, 6941, 9245, 10526, 8739, 3876, 4777, 5165, 7983, 4529, 8883, 692, 5048, 6074, 190, 9666, 8644, 1353, 595, 84, 4056, 6493, 102, 8554, 5612, 8691, 3705, 11259 ]
Test
7,988
3
Scorpion_(CPU):scorpion cpu scorpion central processing unit cpu core designed qualcomm use snapdragon mobile systems chips socs released 2008 designed in-house many architectural similarities arm cortex-a8 cortex-a9 cpu cores
[ 11282, 9235, 11289, 1057, 38, 4139, 8237, 9774, 2097, 8250, 8253, 7745, 7747, 2635, 99, 8812, 10361, 638, 644, 9863, 8842, 146, 659, 7833, 666, 5786, 6815, 4258, 4773, 9913, 8383, 10945, 196, 4821, 2788, 3301, 9964, 1776, 6391, 3835, 28...
Validation
7,989
4
List_of_security_assessment_tools:list security assessment tools list available software hardware tools designed particularly suited various kinds security assessment security testing several operating systems tool suites provide bundles tools useful various types security assessment
[ 9440, 2084, 4580, 10718, 842, 2671, 1232, 3887, 11191, 2739, 1429, 4373, 8119, 7228, 2558 ]
Validation
7,990
4
Kristina_Svechinskaya:kristina svechinskaya kristina vladimirovna svechinskaya born february 16 1989 former russian money mule hacker studying new york university 2010 accused plot defraud british u.s. banks usage false passports according charges svechinskaya used zeus trojan horse attack thousands bank accounts opened least five accounts bank america wachovia received 35,000 £22,000 stolen money estimated nine people svechinskaya skimmed 3 million total svechinskaya dubbed media world sexiest computer hacker raunchy casual appearance compared anna chapman upcoming russian film botnet partially based svechinskaya story fluent english svechinskaya originally studied stavropol state university according svechinskaya mother death kristina father family living 12,000 ruble us 400 time salary third year kristina chose work travel program summer 2010 arrived massachusetts started work fast food outlet earnings small moved new york worked hacker money mule svechinskaya offered 8–10 share taken money sentence expected announced june 2011 svechinskaya signed personal recognizance bond released 25,000 bail case conviction svechinskaya could imprisoned 40 years would included fraud charge 30 years 1 million fine false passports charge 10 years 250,000 fine 2016 svechinskaya made youtube presentation smartflash marketed secure cloud-based usb flash drive store unlimited amount data
[ 10297, 4194, 4956 ]
Validation
7,991
2
IOS_SDK:ios sdk ios sdk software development kit formerly iphone sdk software development kit developed apple inc kit allows development mobile apps apple ios operating system originally developing iphone prior unveiling 2007 apple then-ceo steve jobs intend let third-party developers build native apps ios instead directing make web applications safari web browser however backlash developers prompted company reconsider jobs announcing october 2007 apple would software development kit available developers february 2008 sdk released march 6 2008 sdk free download users mac personal computers available microsoft windows pcs sdk contains sets giving developers access various functions services ios devices hardware software attributes also contains iphone simulator mimic look feel device computer developing new versions sdk accompany new versions ios order test applications get technical support distribute apps app store developers required subscribe apple developer program combined xcode ios sdk helps developers write ios apps using officially supported programming languages including swift objective-c. companies also created tools allow development native ios apps using respective programming languages originally developing iphone prior unveiling 2007 apple then-ceo steve jobs intend let third-party developers build native apps ios operating system instead directing make web applications safari web browser however backlash developers prompted company reconsider jobs announcing october 17 2007 apple would software development kit sdk available developers february 2008 sdk released march 6 2008 ios sdk free download mac users available microsoft windows personal computers test application get technical support distribute applications app store developers required subscribe apple developer program sdk contents separated following sets sdk also contains iphone simulator program used simulate look feel iphone developer computer new sdk versions accompany new ios versions ios sdk combined xcode helps developers write ios applications using officially supported programming languages including swift objective-c. .ipa ios app store package file ios application archive file stores ios app 2008 sun microsystems announced plans release java virtual machine jvm ios based java platform micro edition version java would enable java applications run iphone ipod touch soon announcement developers familiar sdk terms agreement believed allowing third-party applications run background answer phone call still run application example allowing application download code another source allowing application interact third-party application sun development efforts could hindered without apple cooperation sun also worked third-party company called innaworks attempts get java iphone despite apparent lack interest apple firmware leak 2007 iphone release revealed arm chip processor jazelle support embedded java execution novell announced september 2009 successfully developed monotouch software framework let developers write native iphone applications c .net programming languages still maintaining compatibility apple requirements xamarin.ios visual studio tools xamarin open-source app development platform lets build apps many operating systems single shared .net code base xamarin allows write apps take full advantage power features performance platform xamarin.ios one xamarin frameworks use create fully native ios apps using c visual studio ios support adobe flash although adobe two versions software – flash flash lite – apple views neither suitable iphone claiming full flash slow useful flash lite capable used web october 2009 adobe announced upcoming update creative suite would feature component let developers build native iphone apps using company flash development tools software officially released part company creative suite 5 collection professional applications april 2010 apple made controversial changes iphone developer agreement requiring developers use approved programming languages order publish apps app store banning applications used third-party development tools developer backlash news potential antitrust investigation apple revised agreement september allowing use third-party development tools
[ 10755, 9732, 11271, 4111, 5647, 7697, 4114, 11289, 9762, 3626, 4139, 6186, 6700, 7727, 1074, 8754, 9784, 8253, 8767, 576, 5696, 8774, 7246, 8783, 4180, 7253, 10838, 1623, 3672, 3162, 9308, 607, 3167, 3681, 2658, 9826, 8806, 3691, 6763, 83...
Test
7,992
2
Read-copy-update:read-copy-update computer science read-copy-update rcu synchronization mechanism based mutual exclusion used performance reads crucial example space–time tradeoff enabling fast operations cost space read-copy-update allows multiple threads efficiently read shared memory deferring updates pre-existing reads later time simultaneously marking data ensuring new readers read updated data makes readers proceed synchronization involved hence fast also making updates difficult key property rcu readers access data structure even process updated rcu updaters block readers force retry accesses overview starts showing data safely inserted deleted linked structures despite concurrent readers first diagram right depicts four-state insertion procedure time advancing left right first state shows global pointer named initially colored red indicate might accessed reader time thus requiring updaters take care allocating memory new structure transitions second state structure indeterminate state indicated question marks inaccessible readers indicated green color structure inaccessible readers updater may carry desired operation without fear disrupting concurrent readers initializing new structure transitions third state shows initialized values structure fields assigning reference new structure transitions fourth final state state structure accessible readers therefore colored red primitive used carry assignment ensures assignment atomic sense concurrent readers either see pointer valid pointer new structure mash-up two values additional properties described later article procedure demonstrates new data may inserted linked data structure even though readers concurrently traversing data structure insertion second diagram right depicts four-state deletion procedure time advancing left right first state shows linked list containing elements three elements colored red indicate rcu reader might reference time using remove element list transitions second state note link element b c left intact order allow readers currently referencing element traverse remainder list readers accessing link element either obtain reference element element either way reader see valid correctly formatted linked list element colored yellow indicate pre-existing readers might still reference element new readers way obtain reference wait-for-readers operation transitions third state note wait-for-readers operation need wait pre-existing readers new readers element colored green indicate readers longer referencing therefore safe updater free element thus transitioning fourth final state important reiterate second state different readers see two different versions list either without element words rcu provides coordination space different versions list well time different states deletion procedures stark contrast traditional synchronization primitives locking transactions coordinate time space procedure demonstrates old data may removed linked data structure even though readers concurrently traversing data structure deletion given insertion deletion wide variety data structures implemented using rcu rcu readers execute within read-side critical sections normally delimited statement within rcu read-side critical section said quiescent state statements permitted hold references rcu-protected data structures wait-for-readers operation required wait threads quiescent states time period thread resides least quiescent state called grace period definition rcu read-side critical section existence beginning given grace period must complete end grace period constitutes fundamental guarantee provided rcu addition wait-for-readers operation must wait least one grace period elapse turns guarantee provided extremely small read-side overheads fact limiting case actually realized server-class linux-kernel builds read-side overhead exactly zero rcu fundamental guarantee may used splitting updates removal reclamation phases removal phase removes references data items within data structure possibly replacing references new versions data items run concurrently rcu read-side critical sections reason safe run removal phase concurrently rcu readers semantics modern cpus guarantee readers see either old new version data structure rather partially updated reference grace period elapsed longer readers referencing old version safe reclamation phase free reclaim data items made old version splitting update removal reclamation phases allows updater perform removal phase immediately defer reclamation phase readers active removal phase completed words grace period elapsed typical rcu update sequence goes something like following procedure matches earlier diagram updater performing removal reclamation step often helpful entirely different thread reclamation reference counting used let reader perform removal even thread performs update step step 2 reclamation step step 4 often helpful think separately early 2008 almost 2,000 uses rcu api within linux kernel including networking protocol stacks memory-management system 9,000 uses since 2006 researchers applied rcu similar techniques number problems including management metadata used dynamic analysis managing lifetime clustered objects managing object lifetime k42 research operating system optimizing software transactional memory implementations dragonfly bsd uses technique similar rcu closely resembles linux sleepable rcu srcu implementation ability wait readers done allows rcu readers use much lighter-weight synchronization—in cases absolutely synchronization contrast conventional lock-based schemes readers must use heavy-weight synchronization order prevent updater deleting data structure reason lock-based updaters typically update data place must therefore exclude readers contrast rcu-based updaters typically take advantage fact writes single aligned pointers atomic modern cpus allowing atomic insertion removal replacement data linked structure without disrupting readers concurrent rcu readers continue accessing old versions dispense atomic read-modify-write instructions memory barriers cache misses expensive modern smp computer systems even absence lock contention lightweight nature rcu read-side primitives provides additional advantages beyond excellent performance scalability real-time response example provide immunity deadlock livelock conditions course rcu also disadvantages example rcu specialized technique works best situations mostly reads updates often less applicable update-only workloads another example although fact rcu readers updaters may execute concurrently enables lightweight nature rcu read-side primitives algorithms may amenable read/update concurrency despite well decade experience rcu exact extent applicability still research topic technique covered u.s. software patent 5,442,758 issued august 15 1995 assigned sequent computer systems well 5,608,893 expired 2009-03-30 5,727,209 expired 2010-04-05 6,219,690 expired 2009-05-18 6,886,162 expired 2009-05-25 now-expired us patent 4,809,168 covers closely related technique rcu also topic one claim sco v. ibm lawsuit rcu available number operating systems added linux kernel october 2002 user-level implementations liburcu also available implementation rcu version 2.6 linux kernel among better-known rcu implementations used inspiration rcu api remainder article core api application programming interface quite small diagram right shows api communicates among reader updater reclaimer rcu infrastructure observes time sequence codice_9 codice_10 codice_1 codice_4 invocations order determine 1 codice_1 invocations may return callers 2 codice_4 callbacks may invoked efficient implementations rcu infrastructure make heavy use batching order amortize overhead many uses corresponding apis rcu extremely simple toy implementations aid understanding rcu section presents one toy implementation works non-preemptive environment void call_rcu void *callback void void *arg void synchronize_rcu void code sample codice_7 codice_5 ignored without missing much however needed order suppress harmful compiler optimization prevent cpus reordering accesses smp_wmb /* order previous writes */ typeof p _value access_once p note codice_9 codice_10 nothing great strength classic rcu non-preemptive kernel read-side overhead precisely zero codice_19 empty macro dec alpha cpus memory barriers needed modern cpus codice_20 macro volatile cast generates additional code cases way codice_9 participate deadlock cycle cause realtime process miss scheduling deadline precipitate priority inversion result high lock contention however toy rcu implementation blocking within rcu read-side critical section illegal blocking holding pure spinlock implementation codice_1 moves caller synchronize_cpu cpu thus blocking cpus able perform context switch recall non-preemptive environment blocking within rcu read-side critical section illegal imply preemption points within rcu read-side critical section therefore given cpu executes context switch schedule another process know cpu must completed preceding rcu read-side critical sections cpus executed context switch preceding rcu read-side critical sections completed although rcu used many different ways common use rcu analogous reader-writer locking following side-by-side code display shows closely related reader-writer locking rcu differences two approaches quite small read-side locking moves codice_9 codice_10 update-side locking moves reader-writer lock simple spinlock codice_1 precedes codice_26 however one potential catch read-side update-side critical sections run concurrently many cases problem necessary check carefully regardless example multiple independent list updates must seen single atomic update converting rcu require special care also presence codice_1 means rcu version codice_28 block problem codice_4 could used like codice_30 place codice_1 especially useful combination reference counting name comes way rcu used update linked structure place thread wishing uses following steps thread made copy awakened kernel safely deallocate old structure structure read concurrently thread copying order update hence name read-copy update abbreviation rcu one many contributions linux community names similar techniques include passive serialization mp defer vm/xa programmers generations k42 tornado programmers techniques mechanisms resembling rcu independently invented multiple times bauer r.t. june 2009 operational verification relativistic program psu tech report tr-09-04 http //www.pdx.edu/sites/www.pdx.edu.computer-science/files/tr0904.pdf
[ 4616, 3082, 5139, 10780, 10785, 6180, 8242, 9266, 4161, 8772, 6213, 3142, 8268, 589, 593, 6244, 5222, 10856, 4207, 5244, 4734, 11391, 7812, 7821, 4238, 10382, 2195, 2711, 6808, 9882, 1694, 2723, 8364, 10933, 5815, 5822, 5824, 1736, 2762, ...
Validation
7,993
8
Pimp_My_Search:pimp search pimp search novelty website create google lookalike webpage replacing word google word phrase user choice non-commercial website connected google inc. pimp search started 2006 became popular 2008 featured many media websites youtube videos site closed later 2009 citing dispute 'trademark issues february 2009 pimp search ended google search facilities posted message read trademark issues google longer allowing searches us ... currently site remains closed following message displayed trademark issues pimp search closed ever linking another website shinysearch.com
[ 119 ]
Test
7,994
4
Password_fatigue:password fatigue password fatigue feeling experienced many people required remember excessive number passwords part daily routine logon computer work undo bicycle lock conduct banking automated teller machine atm concept also known password chaos broadly identity chaos increasing prominence information technology internet employment finance recreation aspects people lives ensuing introduction secure transaction technology led people accumulating proliferation accounts passwords according 2002 survey british online-security consultant nta monitor typical intensive computer user 21 accounts require password factors causing password fatigue aside contributing stress password fatigue may encourage people adopt habits reduce security protected information example account holder might use password several different accounts deliberately choose easy-to-remember passwords vulnerable cracking rely written records passwords many sites attempt prevent users choosing easy-to-guess passwords add restrictions password length composition contribute password fatigue many cases restrictions placed passwords actually serve decrease security account either preventing good passwords making password complex user ends storing insecurely post-it note sites also block non-ascii non-alphanumeric characters password fatigue typically affect users also affect technical departments manage user accounts constantly reinitializing passwords situation ends lowering morale cases many cases users end typing passwords cleartext text files remember even writing post-it notes stick desk drawer companies well organized respect implemented alternative authentication methods adopted technologies user credentials entered automatically others may focus ease use even worsen situation constantly implementing new applications authentication system
[ 3521, 9313, 6916, 6797, 5108, 1557, 3382, 5435 ]
Validation
7,995
0
Language_Grid:language grid language grid multilingual service platform internet mainly supporting intercultural collaboration enables easy registration sharing language resources online dictionaries bilingual corpora machine translations language grid developed increase accessibility usability language resources takes service-oriented approach wrapping existing language resources atomic web services enables users compose new services combining atomic web services architecture language grid increase usability language resources decrease risk providers opening resources wrapping resources services providers control intellectual property rights essential define stakeholders roles social protocol among every stakeholder related service grids service grid user take one roles following three categories institutional agreement reflects intentions three roles service grid users service providers ’ point view protection intellectual property rights critical satisfy demands service usage classified following three categories even for-profit organizations social responsibility activities classified non-profit use activities often conducted public institutions non-profit organizations conversely activities public institutions non-profit organizations commercial profit classified for-profit use language grid consists four service layers p2p service grid layer atomic service layer composite service layer application system layer p2p service grid layer constructed service grid server software main components service supervisor grid composer service supervisor controls service invocations according access control policies registered service providers service consumers invoke services composite service container atomic service container verifies whether request satisfies providers access control policies hand grid composer coordinates distributed service grids operated different grid operators order connect regional language services service grid server software developed language grid project national institute information communications technology development started 2006 april 2010 open-sourced software maintained open source project software used build language grid also employed lapps grid funded nsf department social informatics kyoto university started single operation language grid december 2007 non-profit purpose research purpose named language grid kyoto operation center january 2011 second operation center language grid started national electronics computer technology center thailand called language grid bangkok operation center later language grid jakarta operation center indonesia language grid xinjiang operation china started 2012 2014 respectively four operation centers connected realize federated operation language grid enables sharing language services among multiple language grids may 2017 operation kyoto language grid moved kyoto university npo language grid association may 2018 183 groups 24 countries regions joined kyoto language grid 226 services shared federated language grid researches developing using language grid cover several areas including artificial intelligence services computing human-computer interaction since 2006 research funds language grid provided national institute information communications technology japan society promotion science strategic information communications r promotion programme ministry internal affairs communications japan research institute science technology society japan science technology agency november 2015 research collaboration federated grid language services started among language grid european language resources association linguistic data consortium using language services different ways based language grid activities conducted different communities 2006 language grid association formed among industry government academia citizens advance technologies applications language grid foreigners fall ill different countries may unable receive adequate medical attention inability communicate japanese medical doctors multilingual medical communication support system developed wakayama university cooperation kyoto center multicultural society npo dispatched volunteer interpreters several affiliated hospitals total 1700 times per year support system helps communication foreign outpatients medical staff hospital reception desks using system hospital staff ask outpatients symptoms provide guidance around section hospital npo pangaea universities japan vietnam worked agricultural support project two major goals low rice productivity environmental burdens caused excessive use agrichemicals 2011 2014 four-month experiment conducted year vinh long province located mekong delta goal provide timely appropriate agriculture knowledge rice harvesting vietnamese farmers japanese experts since japanese experts physically travel rural areas highly motivated use language grid however low literacy rate areas farmers difficulties using computers reading writing messages youth-mediated communication ymc model invented children act mediators bridge gaps language knowledge cultures experts farmers
[ 7164, 7599 ]
None
7,996
4
Donbot_botnet:donbot botnet donbot also known aliases buzus bachsoy botnet mostly involved sending pharmaceutical stock-based e-mail spam donbot botnet thought consist roughly 125,000 individual computers combined send 800 million spam messages day amount equals 1.3 estimated total global spam volume 230 billion messages day though botnet known spikes accounted 4 total spam volume
[ 3072, 10756, 3724, 3347, 4883, 2325, 278, 9630, 10657, 4648, 939, 46, 5886, 10297, 3643, 7739, 11583, 9664, 9154, 8133, 10952, 81, 8789, 10457, 7515, 988, 3807, 8032, 3941, 10477, 4462, 1400, 2041, 10875, 3581, 2558, 9087 ]
None
7,997
3
FCMOV:fcmov fcmov floating point conditional move opcode intel x86 architecture first introduced pentium pro processors copies contents one floating point stack register depending contents eflags integer flag register st 0 top stack register 8 variants instruction selected condition codes need set instruction perform move similar cmov instruction fcmov allows conditional operations performed without usual branching overhead however higher latency conditional branch instructions therefore useful simple yet unpredictable comparison conditional operations provide substantial performance gains instruction usually used fcomi instruction fcom-fstsw-sahf idiom set relevant condition codes based result floating point comparison table shows variants fcmov instructions first operand always st register equivalently top floating point stack opcode column indicates two-byte sequence second byte base value indicating number floating point stack register use second operand add desired number complete corresponding opcode value
[ 11107, 936, 6924, 4237, 10796, 5234, 499, 372, 1915 ]
None
7,998
2
Shared_graphics_memory:shared graphics memory computer architecture shared graphics memory refers design graphics chip dedicated memory instead shares main system ram cpu components design used many integrated graphics solutions reduce cost complexity motherboard design additional memory chips required board usually mechanism via bios jumper setting select amount system memory use graphics means graphics system tailored use much ram actually required leaving rest free applications side effect ram allocated graphics becomes effectively unavailable anything else example computer 512 mib ram set 64 mib graphics ram appear operating system user 448 mib ram installed disadvantage design lower performance system ram usually runs slower dedicated graphics ram contention memory bus shared rest system may also cause performance issues rest system designed fact mind ram 'taken away graphics similar approach gave similar results boost graphics used sgi computers notably o2/o2+ memory machines simply one fast pool 2.1 gb per second 1996 shared system graphics sharing performed demand including pointer redirection communication main system graphics subsystem called unified memory architecture uma early personal computers used shared memory design graphics hardware sharing memory cpu designs saved money single bank dram could used display program examples include apple ii computer commodore 64 radio shack color computer atari st apple macintosh notable exception ibm pc graphics display facilitated use expansion card memory plugged isa slot first ibm pc use sma ibm pcjr released 1984 video memory shared first 128kib ram exact size video memory could reconfigured software meet needs current program early hybrid system commodore amiga could run shared memory system would load executable code preferentially non-shared fast ram available
[ 9741, 2838, 2594, 6818, 10658, 9126, 7983, 8514, 10051, 9932, 1614, 344, 11487, 6495, 1387, 1515, 7151, 1776, 508 ]
None
7,999
2
MP/M:mp/m mp/m multi-programming monitor control program discontinued multi-user version cp/m operating system created digital research developer tom rolander 1979 allowed multiple users connect single computer using separate terminal mp/m fairly advanced operating system era least microcomputers included priority-scheduled multitasking kernel name used kernel referred nucleus memory protection concurrent input/output xios support spooling queueing also allowed user run multiple programs switch system required 8080 z80 cpu minimum 32 kb ram run left little memory user applications order support reasonable setups mp/m allowed memory switched machine real memory area instance program might loaded bank ram addressable cpu time program run bank ram would switched appear low memory typically lower 32 48 kb thus become visible os technique known bank switching subsequently added single user version cp/m version 3.0 one primary uses mp/m perhaps surprise dri power user version cp/m single user ability run several programs time address large amounts memory made system worth extra price mp/m ii 2.0 added file sharing capabilities 1981 mp/m ii 2.1 came extended file locking january 1982 versions like cp/m mp/m eventually ported intel 8086 appeared mp/m-86 2.0 september 1981 main developers system include frank holsworth later director marketing digital research known revisions mp/m-86 2.0 dated 25 september 1981 5 october 1981 also mp/m-86 2.1 dated 20 july 1982 mp/m-86 2.x absorbed technology cp/m-86 1.1 bdos 2.2 become concurrent cp/m-86 3.0 bdos 3.0 1982/1983 december 1983 dos emulator named pc-mode became available optional module concurrent cp/m-86 3.1 bdos 3.1 shipping 21 february 1984 system developed ms-dos compatible concurrent dos bdos 3.1 higher turn continued evolve flexos multiuser dos still use industrial applications following list commands supported mp/m ii console command processor early 1980s digital research also developed networking software named cp/net used connect mp/m server multiple cp/net clients named requesters running cp/m originally developed tom rolander mp/net mp/m system networking allowing mp/m system function requester server cp/m requesters cp/net clients could also run diskless configuration system stored rom named cp/nos nos network operating system similar mp/nos contained mp/m without local disk facilities like cp/nos mp/nos performed disk functions network system allowed share files printers send electronic messages cp/net existed versions 1.0 1.1 1.2 version 8080 z80 processors cp/net-86 8086 available well later incarnations dr net flexnet caldera permitted redistribution modification original digital research files including source code related cp/m mp/m families tim olmstead unofficial cp/m web site since 1997 olmstead death 12 september 2001 free distribution license refreshed expanded lineo meanwhile become owner digital research assets 19 october 2001
[ 6675, 7187, 7188, 10776, 25, 4637, 9762, 5158, 7217, 9784, 10809, 6207, 576, 10333, 97, 5220, 9320, 8298, 8301, 2672, 9329, 7285, 9335, 4727, 2168, 6778, 1147, 3197, 1150, 2179, 10883, 6797, 3216, 9366, 6296, 2201, 7325, 9887, 2729, 7849,...
None
8,000
9
Racket_features:racket features racket active development vehicle programming language research since mid-1990s accumulated many features years article describes demonstrates features note one racket main design goals accommodate creating new languages domain-specific languages completely new languages therefore following examples different languages implemented racket please refer main article information core racket implementation highly flexible even without using dialects function full-featured scripting language capable running without windows-native gui capable tasks web server creation graphics racket use three different garbage collectors like implementations scheme family racket implements full tail call elimination racket takes language made fully safe-for-space via live variable analysis complements precise garbage collector cases like implementation lazy racket two features crucial proper execution addition additional compiler optimizations lambda lifting just-in-time compilation racket system interface includes asynchronous non-blocking i/o green threads synchronization channels semaphores sub-processes tcp sockets following program starts echo server port 12345 combination dynamic compilation rich system interface makes racket capable scripting language similar perl python following example demonstrates walking directory tree starting current directory uses codice_1 function construct sequence walks tree codice_2 form binds codice_3 path sequence codice_4 tests paths given regexp pattern next example uses hash table record previously seen lines print unique ones programs run drracket command line via codice_5 executable racket ignores initial shebang line making possible turn programs executable scripts following script demonstrates addition using racket library command-line argument parsing script grep-like utility expecting three command-line arguments base directory filename extension perl-compatible regular expression scans base directory files given suffix print lines matching regexp pattern racket features concept custodian kind value acts resource manager often used network servers connection dealt new custodian making easy clean-up resources might left open handler e.g. open ports following extends echo server example custodian use custodians combined memory accounting feature 3m garbage collector number additional runtime parameters control additional aspects runtime make possible create completely safe sandboxed execution contexts codice_6 library provides kind functionality simple way following example creates repl server specified port connecting port look like plain racket repl except evaluation subject various protection aspects sandbox example possible access filesystem repl create network connection run subprocesses use much time memory fact repl safe enough given publicly next example implements web server using codice_7 language time connection made server codice_8 function called get html send back client racket also includes functions would need write scrapers robots example following function would list google results search string library also includes support protocols http graphic capabilities come several different flavors intended different audiences codice_9 library provides convenient functions constructing images library mainly used students htdp-based courses following example codice_10 function defined called time generate sierpinski triangle depth 8 drracket editors contain images drracket displays image values like type value integers lists running program example actually displays sierpinski triangle cut pasted another program codice_11 library constructs image values mature audiences needs example following program plots sum two formula_1 three-dimensional gaussians concentric partially transparent surfaces codice_12 function requires three-argument function first argument curried codice_13 supplies besides constructing image values codice_11 also write files png pdf postscript svg formats racket implements portable gui layer libraries mentioned build implemented via native windows api via cocoa mac os x via gtk+ linux others racket api class-based toolkit somewhat related wxwidgets used originally following simple guessing game demonstrates coding gui toolkit codice_15 class implements top-level window codice_16 implements button codice_17 function defined produces function used button callback action gui hand-coded way help gui designer program available planet slide-based presentations also developed racket using codice_18 language much like beamer racket programmatic facilities elements slides pictures combined example following program displays full-screen title slide followed slide pictures codice_19 codice_20 functions combine pictures vertically horizontally respectively centered axis extension packages also exist planet example include latex elements racket features foreign function interface based libffi interface allows writing unsafe low-level c-like code allocate memory dereference pointers call functions shared libraries send callbacks racket functions using libffi closures core implementation thin layer atop libffi written c full interface implemented via racket code interface uses macros extensively resulting expressive racket-based interface description language language number useful features uniform representation higher-order functions avoiding pitfalls callbacks callouts different struct definitions similar plain racket structs custom function types represent input output pointers implicit arguments e.g. argument provides number elements vector passed another argument using interface access underlying gui toolkits racket implements gui layer completely racket ffi used number different ways writing complete glue layer library done racket opengl binding quickly pulling single foreign function example latter approach racket notable feature ability build new domain-specific general-purpose languages result combining number important features module system plays important role combining features making possible write code spans across number modules written different language languages used extensively racket distribution user libraries fact creating new language straightforward languages less handful uses racket comes number useful languages different racket default language scribble racket documentation system comes form number languages used write prose used racket documentation well writing books articles actually rather single scribble language family similar dialects different purpose run following example copy drracket click one two scribble rendering buttons appear pdf rendering requires pdftex alternatively use codice_21 executable file striking feature scribble languages use new syntax designed specifically textually rich code syntax allows free-form text string interpolation customizable quotations useful applications preprocessing text generating text html template systems note syntax extends plain s-expressions implemented alternative input expressions typed racket statically typed variant racket type system implements unique motivation developing accommodating much idiomatic racket code possible—as result includes subtypes unions much another goal typed racket allow migration parts program typed language accommodates calling typed code untyped code vice versa generating dynamic contracts enforce type invariants considered desirable feature application lifetime stages matures script application static typing helps maintenance large body code codice_22 language language lazy evaluation semantics similar haskell following example codice_23 infinite list whose 1000th element computed value needed printout racket comes three logic programming languages racklog prolog-like language datalog implementation minikanren port unlike scribble syntax first two languages use completely new syntax rather extension s-expressions use drracket 'll see provides proper highlighting usual host tools check syntax prolog/datalog repl plt group develops racket traditionally involved education levels one earliest research ideas group promoted use language levels restrict new students providing helpful error messages fit student level knowledge approach heavily used design programs textbook several plt developers authored well programbydesign project following program uses codice_24—the beginning student language uses codice_9 library creating pictures teaching languages codice_26 library interactive animations racket comes complete implementation algol 60 language another supported language plai like racket typed untyped modules written plai export every definition unlike scheme typed plai language differs traditional racket importantly statically typed also gives useful new constructs define-type type-case test finally following example implementation new language language code stored codice_28 file use follows
[ 2304, 8582, 5896, 6536, 8973, 5008, 8609, 3876, 10924, 8628, 9926, 4423, 1610, 5585, 727, 10584, 225, 10465, 10083, 8421, 2666, 8303, 11632 ]
Test
8,001
2
CANDE:cande cande command edit command line shell text editor mcp master control program operating system runs unisys clearpath series mainframes originally implemented burroughs large systems range features interacting operating system execution environment focused executing editing compiling programs creating copying moving renaming deleting files general full name cande mcs mcs message control subsystem general form systems program burroughs architecture mcp master control program core os mcs cande editor provides overall control network users editing capabilities cande anachronistic casual opposed scripted editing predate full screen graphical editors cande provides command-line interpreter line editor although unlike modern interpretation operating system command line interpreter cande commands compiled cande mcs shell like capabilities provided wfl notable features functions include addition features cande on-line help facility extra speed cande implemented user context switching swapping block top stack novel method broke several assumptions built design burroughs large systems particular handling virtual memory descriptors meant cande written dcalgol system-level privileges architecturally cande split two main sections primary single-instanced main process originally supporting 255 simultaneous users one worker stacks main process called bump receives input messages including input users simple requests executed without delay involve i/o disk access handled immediately requests added work queue handled one worker processes worker process called grind one instances time grind process default five pseudo-threads actually carry work internal threading model context switching selects one worker pseudo-threads per grind process makes executing context achieved copying top stack worker process needs execute i/o asynchronous activity initiates action marks waiting calls context-switching function selects different context execution cande operates without internal locks careful separation data possible user connection station assigned index main array called station array sta stay current station index named stax pronounced stay-x multiple words state data per station stored first words together followed second words etc allows cande index array using addition multiplication made faster operation hard-wired cpus era cande originally written 1973 darrel f. high taken randall gellens 1984 point library maintenance file copying moving renaming deleting routines rewritten allow significantly expanded capabilities slew utilities added using syntax allowing used even program running several architectural improvements made later transferred santa barbara plant eventually india syntax originally allowing control program execution input would normally directed program grew include number utilities
[ 6529, 2786, 3716, 2533, 2181, 1702, 4900, 2477, 7983, 2002, 5714, 11059, 7325 ]
None
8,002
9
Lisp-based_Intelligent_Software_Agents:lisp-based intelligent software agents lisa project platform development lisp-based intelligent software agents lisa production-rule system implemented common lisp object system clos heavily influenced clips java expert system shell jess core reasoning engine based object-oriented implementation rete algorithm efficient mechanism solving difficult many-to-many matching problem intrinsic lisa ability reason clos objects without imposing special class hierarchy requirements thus possible easily augment existing clos applications reasoning capabilities lisa extension common lisp full power lisp environment always available lisa-enabled applications run ansi-compliant common lisp platform
[ 6502, 5677, 2062, 9103, 9877 ]
Test
8,003
3
Krait_(CPU):krait cpu krait arm-based central processing unit designed qualcomm included snapdragon s4 snapdragon 400/600/800/801/805 krait 200 krait 300 krait 400 krait 450 system chips introduced 2012 successor scorpion cpu although architectural similarities krait cortex-a15 core designed in-house
[ 11282, 9235, 11289, 1057, 38, 4139, 8237, 9774, 2097, 8250, 8253, 7745, 7747, 2635, 99, 8812, 8815, 10361, 638, 644, 9863, 8842, 146, 659, 7833, 666, 5786, 6815, 2208, 4258, 4773, 9913, 8383, 10945, 196, 4821, 2788, 3301, 9964, 1776, 63...
Test
8,004
2
Socket_G3_Memory_Extender:socket g3 memory extender socket g3 memory extender short g3mx planned advanced micro devices solution problem connecting large amounts memory single microprocessor g3mx expected available amd 800s series chipset server market starting 2009 officially cancelled together cancellation socket g3 early 2008 electrical limitations preclude connecting 2 unbuffered ddr sdram dimms 4 buffered dimms single shared bus also impractical manufacture single chip two ddr memory buses channels thus impossible connect 8 dimms single chip typically per-processor limitation well obvious solution use narrower higher-speed bus interface memory implement point-to-point link daisy-chaining additional modules however intel made two attempts neither hugely successful amd answer g3mx chip similar amb intended placed motherboard dimm connect multiple dimms minimize latency designed daisy-chained g3mx asymmetrical link processor match typical memory usage patterns 20 differential signals supply read data processor 13 differential signals receive commands write data totals 66 pins less half required ddr2 ddr3 interface thus processor easily 4 g3mx memory interfaces 4 buffered dimms attached allowing 16 dimms feed one processor
[ 3464, 7058, 7151 ]
None
8,005
7
Instant_WebKiosk:instant webkiosk instant webkiosk operating system based debian gnu/linux designed use web kiosks digital signage 2017-12 binary emotions completely focused raspberry pi operating systems instant webkiosk live operating system pcs macs designed web kiosks browser defaults google chromium locked full-screen mode users may change settings reset typically end session operating system defaults originally defined values operating system designed boot usb flash devices may optionally installed hard drive network access via wired wireless networks system configuration done via web interface raspberry webkiosk port instant webkiosk raspberry pi designed web kiosks raspberry digital signage raspberry slideshow raspberry pi operating systems designed digital signage purposes also originated instant webkiosk code base
[ 6371, 4841, 5397, 823, 1849 ]
Test
8,006
1
Autocommit:autocommit context data management autocommit mode operation database connection individual database interaction i.e. sql statement submitted database connection autocommit mode executed transaction implicitly committed sql statement executed autocommit mode rolled back autocommit mode theory incurs per-statement transaction overhead often undesirable performance resource utilization impact nonetheless systems microsoft sql server well connection technologies odbc microsoft ole db autocommit mode default statements change data order ensure individual statements conform acid atomicity-consistency-isolation-durability properties transactions alternative autocommit mode non-autocommit means sql client application responsible issuing transaction initiation start transaction termination commit rollback commands non-autocommit mode enables grouping multiple data manipulation sql commands single atomic transaction dbms e.g mariadb force autocommit every ddl statement even non-autocommit mode ddl statement starts previous dml statements transaction auto committed ddl executed new autocommit transaction following ddl statements new transaction automatically started needed
[ 10048, 4490, 8683, 10413, 853 ]
None
8,007
3
Ultra_60:ultra 60 ultra 60 fairly large heavy computer workstation tower enclosure sun microsystems ultra 60 launched november 1997 shipped solaris 7 available several specifications ultra 60 similar higher-cost sun ultra 80 somewhat smaller supports fewer cpus less memory ultra 60 may rack-mounted using optional kit x9627a 560-2548 although generally rack-mounted since ultra 60 designed use workstation rather server details found sun ultra 80 rack mount installation guide enterprise 220r ultra 60 motherboard specialized rackmount case custom power supplies parts ultra 60 longer sold new replaced ultra 45 last order date ultra 60 july 2002 last model shipped 2003 considered sun end life although shipped solaris 7 ultra 60 run later versions solaris 10 well linux various unix operating systems ultra 60 run microsoft windows directly although internal pci card sunpci ii pro similar sun could fitted allow use windows full specifications longer found oracle web site abbreviated specification along extra notes likely useful given ultra 60 came equipped 1 2 cpus cpus run 300,360,450 mhz 16-kb data 16-kb instruction cache chip 2mb 4mb external secondary cache secondary cache size depends cpu model ultra 60 uses 144-pin 5v 60-ns dimm memory modules either 32 64 128 mb installed sets four identical dimms 16 dimm sockets possible fit 2 gb 16 128-mb modules memory bus 576 bits wide 512 bits used data 64 bits error correction specifications give maximum throughput 1.78-gb/s performance improved 2-way interleaving used giving 512 mb 2 gb ultra 60 takes one two 1 high sca scsi disk drives internally sold 18.2-gb 36.4-gb disks practice use sca disk internal disks must mounted carrier spud-bracket sun part number 540-3024 scsi ids internal disks 0 3 set sca backplane changed optional 1.44 mb 3.5 ms-dos/ibm compatible floppy drive fitted optional 644 mb suncd 32x-speed photo cd compatible cd-rom drive optional 10x dvd-rom could specified well many ultra 60s current use fitted rewritable cd-rom drive systems might inoperable pci 2.2 card installed 2 upa graphics slots running 112 mhz supporting one elite3d m3 and/or elite3d m6 graphics options two creator3d graphics options xvr-1000 graphics option officially supported work solaris 9 solaris 10 sun ultra 60 fitted dual channel ultra-3 scsi controller speed 40 mb/s one controller c0 used internal disk cd-rom dvd-rom tape second channel c1 used external 68-pin ultra wide scsi connector rear ultra 60 sun ultra 60 1 gbit/s ethernet used optional sun x1141a ethernet card usb officially supported various usb boards pcs known work linux solaris according hardware specifications sun web site maximum power consumption 380 w. components list lists power supply sun part number 300-1357 sony 670 w 12a power supply well fitted system 2x450mhz 2gb memory elite3d graphics one disk draws 200 watts idle remove 2nd video card 2nd cpu ultra 60 well built workstation use cheap mass-produced commodity pc parts like ultra workstations ultra 5 ultra 10 well cooled suffering none problems overheating like sun previous quad processor machine sparcstation 20 ultra 60 longer sold new sun policy support hardware 5 years date last shipment ultra 60 officially supported october 2007 addition official support knowledgeable people often sun employees regular visitors comp.unix.solaris comp.sys.sun.hardware comp.sys.sun.admin usenet newsgroups
[ 3328, 9731, 1801, 4235, 1809, 2710, 1316, 10789, 7594, 1707, 3247, 7983, 6322, 823, 1600, 7104, 6338, 9665, 10436, 1480, 2895, 3919, 597, 10327, 10200, 4960, 9955, 11363, 11626, 7148, 7022, 1776, 5233, 8179, 9333, 1399, 11129, 9343 ]
Test
8,008
3
Conflict-free_replicated_data_type:conflict-free replicated data type distributed computing conflict-free replicated data type crdt data structure replicated across multiple computers network replicas updated independently concurrently without coordination replicas always mathematically possible resolve inconsistencies might result crdt concept formally defined 2011 marc shapiro nuno preguiça carlos baquero marek zawirski development initially motivated collaborative text editing mobile computing crdts also used online chat systems online gambling soundcloud audio distribution platform nosql distributed databases redis riak crdt data types concurrent updates multiple replicas data without coordination computers hosting replicas result inconsistencies replicas general case may resolvable restoring consistency data integrity conflicts updates may require updates entirely partially dropped accordingly much distributed computing focuses problem prevent concurrent updates replicated data another possible approach optimistic replication concurrent updates allowed go inconsistencies possibly created results merged resolved later approach consistency replicas eventually re-established via merges differing replicas optimistic replication might work general case turns significant practically useful class data structures crdts work — mathematically always possible merge resolve concurrent updates different replicas data structure without conflicts makes crdts ideal optimistic replication example one-way boolean event flag trivial crdt one bit value true false true means particular event occurred least false means event occurred set true flag set back false event occurred un-occur resolution method true wins merging replica flag true replica observed event another one flag false replica n't observed event resolved result true — event observed two approaches crdts provide strong eventual consistency operation-based crdts state-based crdts two alternatives equivalent one emulate operation-based crdts require additional guarantees communication middleware namely operations dropped duplicated transmitted replicas though delivered order state-based crdts also disadvantage entire state must transmitted replicas may costly operation-based crdts referred commutative replicated data types cmrdts cmrdt replicas propagate state transmitting update operation example cmrdt single integer might broadcast operations +10 −20 replicas receive updates apply locally operations commutative however idempotent communications infrastructure must therefore ensure operations replica delivered replicas without duplication order pure operation-based crdts variant operation-based crdts reduces metadata size state-based crdts called convergent replicated data types cvrdts contrast cmrdts cvrdts send full local state replicas states merged function must commutative associative idempotent merge function provides join pair replica states set states forms semilattice update function must monotonically increase internal state according partial order rules semilattice delta state crdts simply delta crdts optimized state-based crdts recently applied changes state disseminated instead entire state cmrdts place requirements protocol transmitting operations replicas use less bandwidth cvrdts number transactions small comparison size internal state however since cvrdt merge function associative merging state replica yields previous updates replica gossip protocols work well propagating cvrdt state replicas reducing network use handling topology changes lower bounds storage complexity state-based crdts known payload integer n p cvrdt implements counter cluster n nodes node cluster assigned id 0 n 1 retrieved call myid thus node assigned slot array p increments locally updates propagated background merged taking max every element p. compare function included illustrate partial order states merge function commutative associative idempotent update function monotonically increases internal state according compare function thus correctly-defined cvrdt provide strong eventual consistency cmrdt equivalent broadcasts increment operations received payload integer n p integer n n common strategy crdt development combine multiple crdts make complex crdt case two g-counters combined create data type supporting increment decrement operations p g-counter counts increments n g-counter counts decrements value pn-counter value p counter minus value n counter merge handled letting merged p counter merge two p g-counters similarly n counters note crdt internal state must increase monotonically even though external state exposed query return previous values payload set g-set grow-only set set allows adds element added removed merger two g-sets union payload set set r two g-sets grow-only sets combined create 2p-set addition remove set called tombstone set elements added also removed removed element re-added element e tombstone set query never return true element 2p-set uses remove-wins semantics remove e takes precedence add e lww-element-set similar 2p-set consists add set remove set timestamp element elements added lww-element-set inserting element add set timestamp elements removed lww-element-set added remove set timestamp element member lww-element-set add set either remove set remove set earlier timestamp latest timestamp add set merging two replicas lww-element-set consists taking union add sets union remove sets timestamps equal bias lww-element-set comes play lww-element-set biased towards adds removals advantage lww-element-set 2p-set unlike 2p-set lww-element-set allows element reinserted removed or-set resembles lww-element-set using unique tags instead timestamps element set list add-tags list remove-tags maintained element inserted or-set new unique tag generated added add-tag list element elements removed or-set tags element add-tag list added element remove-tag tombstone list merge two or-sets element let add-tag list union two add-tag lists likewise two remove-tag lists element member set add-tag list less remove-tag list nonempty optimization eliminates need maintaining tombstone set possible avoids potentially unbounded growth tombstone set optimization achieved maintaining vector timestamps replica sequence list ordered set crdt used build collaborative real-time editor alternative operational transformation ot known sequence crdts treedoc rga woot logoot lseq crate decentralized real-time editor built top lseq runnable network browsers using webrtc logootsplit proposed extension logoot order reduce metadata sequence crdts mute online web-based peer-to-peer real-time collaborative editor relying logootsplit algorithm redis distributed highly available scalable in-memory database uses crdts implementing globally distributed databases based fully compatible redis open source soundcloud open-sourced roshi lww-element-set crdt soundcloud stream implemented top redis riak distributed nosql key-value data store based crdts league legends uses riak crdt implementation in-game chat system handles 7.5 million concurrent users 11,000 messages per second bet365 largest european on-line betting company 2.5 million simultaneous users peak stores hundreds megabytes data riak implementation or-set tomtom employs crdts synchronize navigation data devices user phoenix web framework web framework written elixir uses crdts support real time multi-node information sharing version 1.2 facebook implements crdts apollo low-latency consistency scale database teletype atom employs crdts enable developers share workspace team members collaborate code real time microsoft cosmos db uses crdts enable multi-master write mode haja networks orbitdb uses operation-based crdts core data structure ipfs-log apple implements crdts notes app syncing offline edits multiple devices
[ 9224, 19, 7347, 7446, 1049 ]
None
8,009
4
CyberPatriot:cyberpatriot cyberpatriot national youth cyber education program created united states help direct students toward careers cybersecurity science technology engineering mathematics disciplines program created air force association afa features annual national youth cyber defense competition high school middle school students national youth cyber defense competition eleventh season called cyberpatriot xi indicating season competition cyberpatriot xi open high schools middle schools accredited home school programs around country jrotc units services civil air patrol squadrons naval sea cadet corps divisions may also participate competition outside regular competition cyberpatriot also hosts two additional sub-programs summer cybercamps elementary school cyber education initiative northrop grumman foundation presenting sponsor spin program run uk called cyber centurion cyberpatriot began 2009 proof concept demonstration afa ’ air warfare symposium orlando florida nine high school civil air patrol squadrons competed second phase program limited air force afjrotc civil air patrol teams online training qualification competitions held fall 2009 nearly 200 teams 44 states competing eight slots in-person national finals competition february 2010 held orlando florida final phase developmental program full national deployment underway 1,500 teams 50 states canada dod dependant schools overseas competed cyberpatriot vi cyberpatriot vii began october 2014 2,100 teams registered compete new division middle school division added season cyberpatriot ix started october 2016 featured 4,300 registered teams cyberpatriot designed accessible high school middle school student provides path high school college workforce benefits cyberpatriot partners nation program increases awareness cybersecurity delivering basic cybersecurity education competitive format enhances leadership communication cooperation skills among competitors teams following members team required registered coach registered competitors coach registration begins late spring allow preparation summer qualification rounds competition completed online teams ’ home locations september early january competition tournament structure three divisions early rounds competition done online weekends via internet teams ’ schools sponsoring organizations ’ facilities prior round teams download virtual image representations operating systems known flaws cybersecurity vulnerabilities team tasked find flaws keeping specified computer functions services email working team progress recorded central cyberpatriot scoring system scores qualification rounds 1 2 totaled determine tier team advances teams platinum tier teams eligible qualify national finals see additional rules top scoring semifinal teams division approximately 28 teams invited all-expenses paid in-person national finals competition spring cyberpatriot iv vii national finals competitions held gaylord national hotel convention center national harbor maryland beginning cyberpatriot viii season national finals competitions moved hyatt regency inner harbor baltimore maryland challenges teams may face include winning teams open service division earn education grants school choice first place teams earn 2,000 per competitor second place teams earn 1,500 per competitor third place earns 1,000 per competitor scholarship money provided northrop grumman corp cyberpatriot vii first second third place additional 2,000 1,500 1,000 awarded teams respectively national security agency
[]
Test
8,010
3
Alpha_Blaster:alpha blaster alpha blaster fixed shooter video game developed dave aron sumlock vic-20 home computer published livewire software 1983 aackosoft published msx adaptation game following year alpha blaster derivative galaxian 1979 player defends alien invasion fleet planet alpha piloting lone federation battle cruiser player scores points shooting flying saucers spacecraft laser cannon craft laser energy fuel limited surviving two waves attacks player must dodge blast debris cruiser flies asteroid belt player passes asteroid belt cruiser docks supply ship rearm refuel cycle game difficulty level increases
[ 10931, 9006, 10287 ]
Test
8,011
9
SAS_language:sas language sas language computer programming language used statistical analysis created anthony james barr north carolina state university read data common spreadsheets databases output results statistical analyses tables graphs rtf html pdf documents sas language runs compilers used microsoft windows linux various unix mainframe computers sas system world programming system wps sas language compilers
[ 1952, 963, 8262, 6797, 8627, 823, 4667, 2652 ]
Validation
8,012
2
Ptrace:ptrace ptrace system call found unix several unix-like operating systems using ptrace name abbreviation process trace one process control another enabling controller inspect manipulate internal state target ptrace used debuggers code-analysis tools mostly aids software development ptrace used debuggers gdb dbx tracing tools like strace ltrace code coverage tools ptrace also used specialized programs patch running programs avoid unfixed bugs overcome security features used sandbox run-time environment simulator like emulating root access non-root software attaching another process using ptrace call tool extensive control operation target includes manipulation file descriptors memory registers single-step target code observe intercept system calls results manipulate target signal handlers receive send signals behalf ability write target memory allows data store changed also application code segment allowing controller install breakpoints patch running code target ability inspect alter another process powerful ptrace attach processes owner send signals typically processes superuser account ptrace almost process except init kernels 2.6.26 linux systems feature capabilities-based security ability ptrace limited cap_sys_ptrace capability yama linux security module freebsd limited freebsd jails mandatory access control policies communications controller target take place using repeated calls ptrace passing small fixed-size block memory two necessitating two context switches per call acutely inefficient accessing large amounts target memory done word sized blocks ptrace call word reason 8th edition unix introduced procfs allows permitted processes direct access memory another process 4.4bsd followed use /proc debugger support inherited solaris bsd aix mostly copied linux solaris removed ptrace system call altogether retaining library call reinterprets calls ptrace terms platform procfs systems use ioctls file descriptor opened /proc file issue commands controlled process freebsd hand extended ptrace remove mentioned problems declared procfs obsolete due inherent design problems ptrace provides basic interface necessary support debuggers similar tools programs using must intimate knowledge specifics os architecture including stack layout application binary interface system call mechanism name mangling format debug data responsible understanding disassembling machine code programs inject executable code target process like gdb allow user enter commands executed context target must generate load code generally without help program loader ptrace first implemented version 6 unix present svr4 4.3bsd branches unix ptrace available system call irix ibm aix netbsd freebsd openbsd linux ptrace implemented library call solaris built solaris kernel procfs filesystem sun notes ptrace solaris intended compatibility recommends new implementations use richer interface proc supplies instead unixware also features limited ptrace like sun sco recommends implementers use underlying procfs features instead hp-ux supported ptrace release 11i v3 deprecated favour ttrace similar os-specific call 11i v1 starting ubuntu 10.10 ptrace allowed called child processes apple mac os x also implements ptrace system call apple version adds special option pt_deny_attach — process invokes option subsequent attempts ptrace process fail apple uses feature limit use debuggers programs manipulate drm-ed content including itunes pt_deny_attach also disables dtrace ability monitor process debuggers os x typically use combination ptrace mach vm thread apis ptrace pt_deny_attach available developers apple iphone linux also gives processes ability prevent processes attaching processes call prctl syscall clear pr_set_dumpable flag later kernels prevents non-root processes ptracing calling process openssh authentication agent uses mechanism prevent ssh session hijacking via ptrace later ubuntu versions ship linux kernel configured prevent ptrace attaches processes traced process parent allows gdb strace continue work running target process prevents attaching unrelated running process control feature performed via /proc/sys/kernel/yama/ptrace_scope setting systems feature enabled commands like gdb -- attach strace -p work android phones locked boot loader ptrace used gain control init process enable '2nd boot replace system files
[ 9732, 8966, 10631, 7561, 5771, 2061, 5397, 1304, 6813, 3487, 3488, 6829, 7983, 10933, 823, 9911, 700, 1724, 9665, 9921, 4423, 8395, 6369, 2275, 4972, 11506, 5492, 7421 ]
Test
8,013
8
OPeNDAP:opendap opendap acronym open-source project network data access protocol endeavor focused enhancing retrieval remote structured data web-based architecture discipline-neutral data access protocol dap widely used especially earth science protocol layered http current specification dap4 though previous dap2 version remains broadly used developed advanced openly collaboratively non-profit opendap inc. dap intended enable remote selective data-retrieval easily invoked web service opendap inc. also develops maintains zero-cost reference implementations dap protocol server-side client-side software opendap often used place dap denote protocol also may refer entire dap-based data-retrieval architecture dap-centered architectures thredds erddap noaa geo-ide uaf erddap exhibit significant interoperability one another well systems employing opendap open-source servers software dap client ordinary browser even spreadsheet though limited functionality see opendap web page available client software typically dap clients regardless types whether developed commercially end-user clients almost universally link dap servers libraries implement dap2 dap4 protocol one language another opendap offers open-source libraries c++ java many clients rely community developed libraries pydap especially netcdf suite developed maintained unidata program ucar multiple programming languages netcdf libraries include embedded capabilities retrieving array-style data dap servers data-using client references data set url requests metadata content issuing usually embedded dap library http request dap server content requests usually preceded requests metadata describing structure details referenced data set information client may construct dap constraint expressions retrieve specific content i.e. subsets source opendap servers offer various types responses depending specific form client request including xml json html ascii response requests content opendap servers respond multi-part mime documents include binary portion netcdf dap-native encoding binary forms offer compact means deliver large volumes content dap-native form may even streamed desired opendap software building dap servers top apache dubbed hyrax includes adapters facilitate serving wide variety source data dap servers frequently enable remote access large hdf netcdf files source data exist databases formats including user-defined ones source data organized files dap retrievals enable via subsetting finer-grained access ftp furthermore opendap servers aggregate subsets multiple files delivery single retrieval taken together subsetting aggregation streaming yield substantial data-access efficiencies even presence slow networks opendap dap servers used operationally government agencies including nasa noaa providing access earth science data including satellite imagery high-volume information sources dap data model embraces comprehensive set data structures including multidimensional arrays nested sequences i.e. records complemented correspondingly rich set constraint expressions hence opendap data-retrieval architecture demonstrated utility across broad range scientific data types including data generated via simulations data generated via observations whether remotely sensed measured situ
[ 7364, 10791, 5677, 7580, 7326 ]
Train
8,014
4
Pangu_Team:pangu team pangu team chinese programming team ios community developed pangu jailbreaking tools tools assist users bypassing device restrictions enabling root access ios operating system permits user install applications customizations typically unavailable official ios app store versions chinese mythology name usaama pan gu chinese word first living creator pangu pangu jailbreak ios 7.1 7.1.x free ios jailbreaking tool developed pangu team capable executing jailbreaks various ios 7.1 devices ipod touch iphone ipad using various exploits tool first released 23 june 2014 jailbreak ios 7.1 ios devices new fourth generation apple tv tvos 9.0 9.0.1 initial release tool included support ios 7.1.2 team suspected firmware update imminent apple would use release patch vulnerabilities used tool pangu uses revoked enterprise certificate inject jailbreak removed jailbreak complete initial release v1.0.0 25pp chinese cracked app store would installed user uncheck check box checked default installation 25pp removed package version 1.1.0 originally v1.0.0 pangu achieved jailbreaking using infoleak vulnerability taken stefan esser aka i0n1c paid security training sessions along vulnerabilities found although team acknowledges esser help within pangu jailbreak tool esser took twitter let everyone know way okay pangu using exploit discovered one pangu members daniel_k4 later responded public one asked sign nda paid security training sessions infoleak bug known everyone attended security training sessions daniel_k4 said found similar vulnerability infoleak used since n't want disclose new vulnerabilities infoleak bug used bypass kaslr make untethered jailbreak alone team said never thought using learned paid class would wrong pangu offered esser another vulnerability compensation received response thus since version 1.1.0 release esser infoleak replaced another vulnerability found pangu pangu8 pangu jailbreak ios 8.0 8.1 free ios 8 jailbreak tool pangu team first released october 22 2014 tool compatible devices capable running ios 8 iphone 6 iphone 6 plus ipad mini 3 ipad air 2 currently available chinese english cydia included initial release package added v1.1.0 available pangu website since cydia incompatible initial release pangu8 included pangu app allows users install cydia alongside various pangu bug fixes recommended software tool works tweaking utility also recommends tools openssh cydia installed pangu app removed device removing pangu loader ios cydia respringing device uninstalling pangu app removing pangu jailbreak ios users remove pangu jailbreak restore device latest ios version moreover difficult downgrade ios device back previous ios version apple stops signing old ios versions release newer ios firmware initial releases also enabled cydia installed debian package file instead within pangu app alternative pangu9 pangu jailbreak ios 9.0 9.1 latest free ios 9 jailbreak tool pangu team first released october 14 2015 included jailbreak ios 9.0 9.0.2 march 11 2016 pangu released pangu9 v1.3.0 included jailbreak ios 9.1 tool capable jailbreaking devices running ios 9.0 64-bit devices running ios 9.1 currently available english windows os x versions available cydia bundled pangu9 first release removing need pangu app found previous pangu jailbreaks released july 24 2016 pp25 also known pangu9 new pangu9 jailbreak ios 9.2 9.3.3 supported 64-bit devices supported ipod 6th gen ipad pro 1st release application known pp assistant chinese program install cracked apps pangu jailbreak bundled pp assistant option install pp25 app device jailbreak process ask apple id used install unofficial app jailbreak english version released adding support ipod 6th gen ipad pro likely add support 32-bit apple corrected iomobileframebuffer bug ios 9.3.4 released august 4 2016 “ team pangu ” credited source update official security notes apple states available iphone 4s later ipad 2 later ipod touch 5th generation later impact application may able execute arbitrary code kernel privileges description memory corruption issue addressed improved memory handling cve-2016-4654 team pangu like ios 9.x releases ios 9.3.4 designed iphone 4s later ipad 2 later ipad mini later ipad pro range 5th generation ipod touch later outsiders recommend upgrade ios 9.3.3 ios 9.3.4 jailbreak pangu9 ios 9 9.1 worked allowing access photos app able install unsigned application cydia pangu9 ios 9.2 9.3.3 used similar exploit allowing notifications enabled installation cydia used app bundled pp25 allowed jailbreak without use computer
[ 10755, 6023, 9063, 10631, 6186, 7983, 1299, 3286, 700, 4957 ]
None
8,015
2
Message_loop_in_Microsoft_Windows:message loop microsoft windows message loop obligatory section code every program uses graphical user interface microsoft windows windows programs gui event-driven windows maintains individual message queue thread created window usually first thread creates windows windows places messages queue whenever mouse activity occurs thread window whenever keyboard activity occurs window focus times process also add messages queue accept user input reasons thread window must continuously retrieve messages queue act programmer makes process writing loop calls getmessage blocks message retrieves calls dispatchmessage dispatches message repeats indefinitely message loop usually message loop main program runs main thread additional message loop created modal dialog messages every window process pass message queue handled message loop message loop one kind event loop basic message loop appears follows conventional event loop call translatemessage message translate virtual keystrokes strings calling translatemessage technically required problems result called message loop must call dispatchmessage message loop directly act messages handles dispatches calling dispatchmessage transfers message window procedure window message addressed window procedure callback procedure got associated window class registered one window use window procedure code also send messages directly window procedure called nonqueued messages strict message loop option code elsewhere program also accept dispatch messages peekmessage non-blocking call returns immediately message waiting message none waiting waitmessage allows thread sleep message queue modern graphical interface frameworks windows forms windows presentation foundation mfc delphi qt others require applications code windows message loop automatically route events key presses mouse clicks appropriate handlers defined within framework however framework implements message loop somewhere message loop usually accessed replaced direct control required
[ 1348, 5029, 2603, 6797, 1113, 10654 ]
Test
8,016
7
Le_Select:le select le select framework prototype accessing data heterogeneous nature invoking data processing program internet/intranet environments 1 le select middleware software system designed intention providing organised platform access distributed data software resources unlike data warehouses attempt collect data central location usually single format data structure le select mediator aims provide connection data le select based distributed computing system fully distributed architecture le select global repository global schema data published le select viewed users tuples relational table regardless native data format could flat file spreadsheet wrappers software modules used le select translate data native format relational format viewed users also contain information locate data server access formed set java classes additional xml definition files designed wrappers serve similar purposes re-written rather developer start scratch le select based fully distributed system architecture program run one le select server whilst using data another server system sends data server program running coordinates execution sends back results client relational table user view le select data standard web-browser form tuples relational database additional capabilities include provision sql search abilities le select form middleware software based fully distributed system architecture allows users publish consult wide range data queried accessed remotely via internet
[ 9397, 5677, 479 ]
Validation
8,017
4
Ntrepid:ntrepid ntrepid american software hardware cyber security company registered florida based herndon virginia 2008 anonymizer company acquired abraxas corporation purchased cubic 2010 124 million abraxas former employees left form ntrepid year lance cottrell founder anonymizer chief scientist ntrepid anonymizer wholly owned ntrepid march 2011 ntrepid 2.76 million contract u.s. military online persona management contract creation technology would allow blogging activities websites exclusively outside united states counter violent extremist enemy propaganda would allow one operator anonymously create control ten personas one computer project overseen u.s. central command centcom whose spokesman commander bill speaks stated operation would carried arabic persian urdu project thought connected operation earnest voice
[ 8320, 149, 2558 ]
Validation
8,018
4
Qualified_electronic_signature:qualified electronic signature qualified electronic signature electronic signature compliant eu regulation 910/2014 eidas regulation electronic transactions within internal european market enables verify authorship declaration electronic data exchange long periods time qualified electronic signatures considered digital equivalent handwritten signatures purpose eidas create set standards ensure electronic signatures could used secure manner conducting business online conducting official business across borders eu member states qualified electronic signature one standard outlined eidas qualified electronic signature advanced electronic signature qualified digital certificate created qualified signature creation device qscd electronic signature considered qualified electronic signature must meet three main requirements first signatory must linked uniquely identified signature second point data used create signature must sole control signatory last must ability identify data accompanies signature tampered since signing message important note creating qualified electronic signature merely adding qualified certificate advanced electronic signature signature must also created using qualified signature creation device qscd device responsible qualifying digital signatures using specific hardware software ensures signatory control private key addition qualified trust service provider manages signature creation data produced signature creation data must remain unique confidential protected forgery qualified electronic signatures comply eidas may technically implemented three specific digital signature standards xades pades cades developed european telecommunications standards institute etsi need complemented qualified digital certificate procedures described qualified trust service provider crucial role process qualified electronic signing trust service provider must receive qualified status supervisory governmental body allows entity provide qualified trust services used creating qualified electronic signatures regulated eidas european union published eu trust list constitutive effect meaning provider service qualified appears trusted list qualified trust service providers required abide strict guidelines outlined eidas regulation include part certificate creation process eidas intent implementation qualified electronic signatures serve several purposes facilitation business public services processes including go across borders processes safely expedited using electronic signing eidas eu member states charged establishing points single contact pscs trust services ensure electronic id schemes may used cross-border public sector transactions exchanging accessing healthcare information across borders previously signatory would sign document message return intended recipient via postal service facsimile service hand scanning attaching email issue methods always secure timely delays delivery could occur exists possibility signatures could forged enclosed documents may altered risk increases multiple signatures required different people may located different locations problems alleviated using qualified electronic signatures save time legally binding provide higher level technical security increased transparency electronic signing transaction process enhanced interoperability expected spur innovation european internal market eidas requires electronic signature denied legal effect admissibility evidence solely grounds electronic form meet requirements qualified electronic signatures qualified electronic signature shall equivalent legal effect handwritten signature evidentiary value depends circumstances normally considered high eu member states required recognize qualified electronic signature valid long created qualified certificate issued another member state eidas regulation article 27 electronic signatures public services member states prohibited requesting signatures higher level qualified electronic signature article 25 2 eidas allows qualified electronic signature carry legal weight handwritten signature
[ 3264, 5674, 4015, 5200, 9744, 1496, 3231 ]
Test
8,019
2
HTC_Sense:htc sense htc sense software suite developed htc used primarily company android-based devices serving successor htc touchflo 3d software windows mobile sense modifies many aspects android user experience incorporating additional features altered home screen keyboard additional widgets re-designed applications additional htc-developed applications first device sense htc hero released 2009 hd2 running windows mobile 6.5 released later year included sense following release hero future android devices htc shipped sense except nexus one t-mobile g2 htc first google pixel pixel 2 nexus 9 used stock version android also htc smartphones using mediatek processors come without htc sense mobile world congress 2010 htc debuted new updated htc sense ui htc desire htc legend upgrade available hero magic new version based upon android 2.1 featured interface features friend stream widget aggregated twitter facebook flickr information leap allows access home screens htc sensation released featured htc sense 3.0 added interface elements including updated lock screen allows applications pinned directly easier access htc evo 3d also features sense 3.0 two versions sense developed android 4.0 sense 4.0 included htc new devices beginning 2012 htc one x designed provide refreshed minimalist look closer stock android previous versions integrating features provided android 4.0 sense 3.6 distributed updates older htc phones designed maintain closer resemblance previous versions sense android 2.3 original version sense first introduced htc hero espresso codename version sense running atop t-mobile mytouch devices debuted t-mobile mytouch 3g htc espresso t-mobile mytouch 4g htc glacier features widgets apps regular sense color apps certain interface elements blue instead green pushed apps appear home screen sense 4.1 debuted htc desire htc legend provided upgrades htc hero htc magic introduced friendstream leap feature similar macos mission control sense 3.0 debuted htc sensation version introduced htc watch movie streaming service updated lockscreen app shortcuts easier access additional lockscreen styles included widgets display content weather photos also features 3d homescreen transition effects swiping among homescreens legacy htc devices received updates android 4.0 use sense 3.6 update integrating select features sense 4 updated home screen visual design elements sense 3.5 sense 4.0 first introduced htc one series devices android 4.0 unveiled 2012 one x one one v. many aspects sense interface modified closer resemble standard android interface home screen uses dock shortcuts instead fixed apps phone personalize buttons previous versions new application switcher using cards updated stock apps beats audio support sense 4.1 minor update original sense 4.0 ran top android 4.0.4 opposed android 4.0.3 included many bug fixes optimizations device original htc one series receive update htc one v. announced 2012 htc one x+ updates sense 4+ also released android 4.1.2 updates one x one evo 4g lte one sv lte 3g desire x.. announced april 2013 2013 htc one features minimalistic design new scrolling news aggregator home screen known blinkfeed displays scrolling grid news headlines social network content default sense 5 uses three home screen pages two traditional grid apps widgets previous devices using grid fewer spaces apps default default screen redesigned clock blinkfeed although pages still added sense 5.0 going exclusive htc one february 28 2013 htc announced would provide updates butterfly one later discontinued one x/x+ sense 5.0 coming months announced september 2013 htc one max adds rss google+ support blinkfeed allows users disable blinkfeed entirely adds tool making animated gifs additional highlights themes sense 6.0 nicknamed sixth sense announced alongside 2014 htc one m8 march 25 2014 based android 4.4 kitkat similar sense 5 offers new customization options color themes new font choices increased use transparency effects particularly home screen sense 6.0 devices use on-screen buttons updates included apps blinkfeed gallery tv zoe updated independently sense google play store htc one 2013 one mini one max updated 6.0 via software update sense 7.0 announced mobile world congress march 1 2015 alongside htc one m9 based android 5.0 lollipop largely sense 6.0 far default user interface concerned save tweaked icons new weather clock widget perhaps notable new feature new user interface theming app simply called themes allows users alter color schemes icons sounds fonts throughout operating system users either create themes scratch download pre-made ones created htc fellow users another major new feature ability customize navigation buttons across bottom display users change order add fourth button power button one hides navigation bar altogether htc confirmed advertisements displayed blinkfeed however htc given option user opt-out receiving advertisements august 2015 owners htc m8 m9 united states reported reddit received push-notification promoting upcoming fantastic four movie theme htc u12+ ships android 8.0 oreo overlay htc sense ui 10.0 features project treble allows faster updates new versions android appear amazon alexa google assistant htc sense companion virtual assistants come pre-installed c 1 sense 3.6 exclusively obtained android 4.0 updates existing devices htc devices released since introduction sense incorporate several including nexus one released first device nexus series t-mobile g2 variation htc desire z stock android htc first facebook home disabled special edition htc one released google play june 2013 march 2014 htc announced desire 310 running android 4.2.2 addition blinkfeed video highlights like predecessor htc one m8 also got google play edition running android 4.4.2 nexus 9 tablet unveiled google october 15 2014 running android 5.0
[ 10755, 5637, 8719, 3600, 7700, 9244, 11294, 1578, 5677, 1083, 6212, 69, 2630, 8262, 4685, 3664, 8280, 8285, 2658, 11391, 1670, 5262, 10393, 7835, 673, 8870, 1191, 7857, 196, 8907, 2259, 8413, 9949, 1255, 8940, 5892, 7428, 2828, 280, 10009...
None
8,020
2
Plurix:plurix plurix unix-like operating system developed brazil early 1980s plurix developed federal university rio de janeiro ufrj nce nce researchers returning postgraduate courses usa attempted license unix source code late 1970s without success 1982 due refusing license code development team led newton faller decided initiate development alternative system called plurix ** using reference unix version 7 recent time running old motorola computer system 1985 plurix system running pegasus 32-x shared-memory multi-processor computer also designed nce plurix licensed brazilian companies 1988 two brazilian universities also developed unix systems universidade federal de minas gerais ufmg developed dcc-ix operating system university são paulo usp developed real operating system 1987 nce/ufrj also offered technical courses os design implementation local computer companies later produced proprietary unix systems fact brazilian companies first created organization companies interested unix called api tried license unix attempts frustrated end 1986 canceled negotiations api companies edisa cobra softec invested development systems edix sox analix respectively finally licensed code brazilian companies majority decided drop local development use licensed code localize system purposes cobra nce/ufrj kept developing tried convince brazilian government prohibit entrance unix brazil since operating systems developed cobra plurix similar could things brazilian industry 80s protected market foreign company could n't sell product brazil brazilian company offered similar hardware software cobra strong argument similarity os recognized x/open government north american pressure delayed decision new president elected twenty years military dictatorship first act terminate laws ruled brazilian market protection hardware software later everything else projects withdrawn nce went back university cobra almost went bankrupt state-owned company whose major customer banco brasil certainly none national systems comprehensiveness original unix system v incorporated software different origins fifteen years ahead however evolution national systems could followed viable proper way still preserved basic characteristics unix philosophy assure compatibility unix systems around world nce plurix project evolved 2 projects mulplix unix-like operating system designed support medium-grain parallelism provide efficient environment running parallel applications within multiplus multiplus distributed shared-memory multiprocessor designed modular architecture able support 1024 processing elements 32 gb global memory address space developed group volunteers like gnu/linux tropix fully preemptive real-time unix-like operating system pcs user level tropix bears reasonable similarity unix operating system processes created fork-execs i/o always treated sequence bytes performed open-read-write-close primitives signals sent processes kernel process zero swapper/pager init process common ancestor user processes etc internally tropix kernel structure quite different unix tropix fully preemptible kernel many specialized system calls manipulate coordinate execution real-time processes real-time processes coexist time-sharing counterparts run higher priorities many privileges besides swapper/pager tropix kernel standard processes include unique dispatcher process per processor running multiprocessing environment scheme greatly facilitates implementation different scheduling strategies followed different processors fine-grain parallel processing within executing processes also possible since tropix implements threads supervisor level
[ 2179, 6787, 6412, 5397, 1304, 3487, 9507, 3241, 7983, 3248, 2995, 9141, 823, 9784, 9151, 10436, 6369, 5492, 2424, 633 ]
Validation
8,021
2
Maciej_Stachowiak:maciej stachowiak maciej stachowiak born june 6 1976 polish american software developer currently employed apple inc. leader development team responsible safari web browser webkit framework longtime proponent open source software stachowiak involved scwm gnome nautilus projects linux joining apple actively involved development web standards co-chair world wide web consortium html 5 working group member web hypertext application technology working group steering committee graduating east high school rochester new york 1994 stachowiak accepted mit completed course 6 electrical engineering computer science received sc.b m.eng 1998 mit stachowiak worked rethinking cs101 project 1997 began scheme constraints window manager project greg badros also contributed paper cognitive neural sciences office naval research stachowiak mit m.eng thesis automated extraction structured data html documents indicative early interest web standards development 1999-2001 stachowiak contributed various linux software projects employed eazel one lead developers along andy hertzfeld darin adler create nautilus file manager also developer object activation framework oaf gnome desktop environment 1999-2001 1999 became maintainer scheme interpreter guile employment eazel stachowiak also contributed eye gnome gnome libs gravevine gnop developer medusa bonobo gnome vfs stachowiak also member gnome foundation board directors told fortune magazine eazel seemed like borderline-crazy business plan ... said 'sure 'll work colleagues fidgeted uncomfortably two months later eazel ceased operations laying entire staff closure eazel remaining senior engineers including bud tribble melton darin adler john sullivan ken kocienda stachowiak joined apple safari team june 2001 later joined netscape/mozilla firefox alumni david hyatt june 13 2002 stachowiak announced mailing list apple releasing javascriptcore framework mac os x based kde javascript engine webkit project javascriptcore since evolved squirrelfish extreme javascript engine compiles javascript native machine code june 6 2005 webkit made open source coincidentally stachowiak birthday stachowiak wrote behalf apple along members mozilla foundation opera software proposal new html working group w3c adopt web hypertext application technology working group ’ html5 starting point work 9 may 2007 new html working group resolved may 2009 stachowiak co-authored w3c html design principles html5 one first major documentation projects w3c 27 august 2009 stachowiak co-chaired world wide web consortium html working group along ibm sam ruby microsoft paul cotton webkit underpinnings safari published open-source software june 6 2005 safari run latest version webkit passed web standards project acid2 test stachowiak reported webkit blog march 26 2008 software passed 100/100 acid3 test making safari first browser pass
[ 10083, 10012, 487, 9275, 2139, 9778, 823, 3323, 124 ]
Test
8,022
4
SonicWall:sonicwall sonicwall originally private company headquartered silicon valley dell subsidiary 2012 2016 sells range internet appliances primarily directed content control network security include devices providing services network firewalls utms unified threat management vpns virtual private network anti-spam email company also markets information subscription services related products company solutions also serve solve problems surrounding hipaa pci compliance march 13 2012 usa today said dell announced intent acquire sonicwall 130 patents 950 employees dell acquisition sonicwall became official may 9 2012 june 20 2016 dell sold sonicwall part dell software private equity firm francisco partners elliott management 1991 brothers sreekanth ravi sudhakar ravi founded company name sonic systems develop ethernet fast ethernet cards hubs bridges apple market late 1990s company released security product initially called interpol later branded sonicwall dedicated hardware appliance firewall vpn software intended small-business market sales security appliances rapidly accelerated company exited apple add-on networking business refocused exclusively network security company late 1999 company changed name sonic systems sonicwall inc. represent shift network security company november 1999 sonicwall went public symbol snwl 2001 sonicwall upgraded global management system gms software manage vpn devices matthew t. medeiros formerly philips components became ceo march 2003 sonicwall acquired number companies years expanding product line process 2005 sonicwall announced acquisition enkoo 2007 sonicwall announced acquisition aventail corporation july 23 2010 sonicwall announced completed merger affiliates investor group led thoma bravo llc included ontario teachers pension plan private investor department teachers private capital merger sonicwall delisted nasdaq march 13 2012 dell announced signed definitive agreement acquire sonicwall may 20 2016 dell announced sale dell software included sonicwall private equity firm francisco partners elliott management
[ 8515, 7972, 3941, 10615, 9640, 11146, 939, 7089, 3732, 5749, 54, 7126, 1400, 7515, 8471, 10392, 8735 ]
Validation
8,023
4
Tsutomu_Shimomura:tsutomu shimomura shimomura founder semiconductor company neofocal systems served ceo cto 2016 born japan shimomura son osamu shimomura winner 2008 nobel prize chemistry grew princeton new jersey attended princeton high school caltech studied nobel laureate richard feynman caltech went work los alamos national laboratory continued hands-on education position staff physicist brosl hasslacher others subjects lattice gas automata 1989 became research scientist computational physics university california san diego senior fellow san diego supercomputer center shimomura also became noted computer security expert working national security agency 1992 testified congress issues regarding privacy security lack thereof cellular telephones author bruce sterling described first meeting shimomura documentary freedom downtime best known events 1995 assisted tracking computer hacker kevin mitnick year shimomura also received prank calls popularized phrase kung fu stronger equating hacking shimomura journalist john markoff wrote book pursuit book later adapted movie similar name track shimomura appeared brief cameo movie shimomura worked sun microsystems late 1990s shimomura founder privately held fabless semiconductor company neofocal systems served ceo cto 2016 kevin mitnick others raised legal ethical questions concerning shimomura involvement case california author jonathan littman wrote 1996 book case called fugitive game online kevin mitnick presented mitnick side story different version events written shimomura markoff book littman made allegations journalistic impropriety markoff questioned legality shimomura involvement matter well suggesting many parts fabricated authors self-serving purposes mitnick autobiography ghost wires expands concerns shimomura involvement case unethical illegal
[ 9665, 1315, 7887, 10110, 4956, 2558 ]
Test
8,024
4
NANO_Antivirus:nano antivirus nano antivirus russian antivirus software developed nano security ltd software free paid nano antivirus pro versions nano security russian company founded 2009 team developed implemented antivirus software since 2003 nano security ltd integrated security maintenance microsoft software intended use homes small businesses 2017 nano antivirus pro included russian software registry ministry telecom mass communications russian federation nano antivirus failed pass vb100 certification first attempt since earned five consecutive vb100 awards award streak interrupted failed certification nano antivirus earned two vb100 including last certification vb100 team commended product quality nano antivirus integrated following online scanners virustotal opswat metadefender virscan.org engine supplier certified partner technologies nano security patented europe usa russia china countries
[ 2049, 7809, 131, 1417, 6797, 3342, 4374, 1052, 156, 2721, 2213, 550, 1318, 6823, 2601, 8614, 2859, 3243, 6699, 8615, 7983, 6834, 4403, 10166, 2749, 704, 9537, 7362, 10308, 4421, 202, 1355, 1994, 5069, 10574, 10708, 2005, 11225, 1242, 2907...
Test
8,025
4
Brooks–Iyengar_algorithm:brooks–iyengar algorithm brooks–iyengar algorithm brooks–iyengar hybrid algorithm distributed algorithm improves precision accuracy interval measurements taken distributed sensor network even presence faulty sensors sensor network exchanging measured value accuracy value every node every node computes accuracy range measured value whole network values collected even data sensors faulty sensor network malfunction algorithm fault-tolerant distributed could also used sensor fusion method precision accuracy bound algorithm proved 2016 brooks–iyengar hybrid algorithm distributed control presence noisy data combines byzantine agreement sensor fusion bridges gap sensor fusion byzantine fault tolerance seminal algorithm unified disparate fields first time essentially combines dolev ’ algorithm approximate agreement mahaney schneider ’ fast convergence algorithm fca algorithm assumes n processing elements pes faulty behave maliciously takes input either real values inherent inaccuracy noise unknown real value apriori defined uncertainty interval output algorithm real value explicitly specified accuracy algorithm runs n log n n number pes see big notation possible modify algorithm correspond crusader ’ convergence algorithm cca however bandwidth requirement also increase algorithm applications distributed control software reliability high-performance computing etc brooks–iyengar algorithm executed every processing element pe distributed sensor network pe exchanges measured interval pes network fused measurement weighted average midpoints regions found concrete steps brooks–iyengar algorithm shown section pe performs algorithm separately input measurement sent pe k pe closed interval formula_1 formula_2 output output pe includes point estimate interval estimate example consider example 5 pes pe 5 formula_14 sending wrong values pes exchange values values received formula_15 next table draw weighted region diagram wrd intervals determine formula_16 pe 1 according algorithm formula_17 consists intervals least 4 formula_3 5−1 measurements intersect output pe 1 equal formula_19 interval estimate formula_20 similar could obtain inputs results 5 pes 1982 byzantine problem byzantine general problem extension two generals problem could viewed binary problem 1983 approximate consensus method removes values set consists scalars tolerant faulty inputs 1985 in-exact consensus method also uses scalar input 1996 brooks-iyengar algorithm method based intervals 2013 byzantine vector consensus method uses vectors input 2013 multidimensional agreement method also use vectors input measure distance different could use approximate consensus scalar-based brooks-iyengar algorithm interval-based byzantine vector consensus vector-based deal interval inputs paper proved brooks–iyengar algorithm best brooks–iyengar algorithm seminal work major milestone distributed sensing could used fault tolerant solution many redundancy scenarios also easy implement embed networking systems 1996 algorithm used minix provide accuracy precision leads development first version rt-linux 2000 algorithm also central darpa sensit program ’ distributed tracking program acoustic seismic motion detection readings multiple sensors combined fed distributed tracking system besides used combine heterogeneous sensor feeds application fielded bbn technologies bae systems penn state applied research lab arl usc/isi besides thales group uk defense manufacturer used work global operational analysis laboratory applied raytheon ’ programs many systems need extract reliable data unreliable sensor network exempts increasing investment improving sensor reliability also research developing algorithm results tools used us nav maritime domain awareness software education brooks–iyengar algorithm widely used teaching classes university wisconsin purdue georgia tech clemson university university maryland etc addition area sensor network fields time-triggered architecture safety cyber-physical systems data fusion robot convergence high-performance computing software/hardware reliability ensemble learning artificial intelligence systems could also benefit brooks–iyengar algorithm inventors brooks iyengar algorithm dr brooks dr ss iyengar received prestigious 25 year test time award pioneering research high impact brooks-iyengar algorithm high impact research work influenced numerous us government programs commercial products
[ 7499, 9677, 7085, 7315, 11612 ]
Validation
8,026
0
Michel_DeGraff:michel degraff michel frederic degraff haitian creolist served board journal haitian studies tenured professor massachusetts institute technology founding member haitian creole academy field scholarship creole language also known lang kreyòl linguistics known advocacy towards recognition haitian creole full-fledged language fall 2012 received 1 million grant national science foundation introduce online creole language materials teaching stem haiti believes haitian children taught native language levels instruction contrary tradition teaching french degraff believes instruction french foreign language haitian children hinders creativity ability excel child growing middle-class haitian family attending top school instruction french degraff reports despite top student often felt french hindrance speaking well caused complexes inferiority among otherwise bright children remembers believing spoke one half language haitian creole half fact language children spoke well default creole recalls french although imposed home school never used jokes soccer field dr. degraff holds phd computer science university pennsylvania prior phd studied computer science city college new york arrived city college haiti 1982 developed interest linguistics internship bell labs new jersey 1985 dr. degraff currently works introducing ict haitian children instructed creole matènwa school la gonâve children encouraged use google translate read available web languages creole national science foundation grant also using computer games creole teach math skills
[ 5699 ]
None
8,027
3
Knightmare_III:_Shalom:knightmare iii shalom
[ 8193, 4357, 9006 ]
Validation
8,028
1
SQL_CLR:sql clr sql clr sqlclr sql common language runtime technology hosting microsoft .net common language runtime engine within sql server sqlclr allows managed code hosted run microsoft sql server environment technology introduced microsoft sql server 2005 allow users example create following types managed code objects sql server .net languages c vb.net sql clr relies creation deployment registration cli assemblies physically stored managed code dynamic load libraries dlls assemblies may contain cli namespaces classes functions properties
[ 3045, 10413, 11030, 1719, 5403, 2780 ]
None
8,029
4
HashClash:hashclash hashclash distributed computing project find collisions md5 hash algorithm based department mathematics computer science eindhoven university technology marc stevens initiated project part master degree thesis project ended stevens defended m.sc thesis june 2007 however sha1 added later code repository ported git 2017 project used create rogue certificate authority certificate 2009
[ 517, 3282, 915, 6421, 9271 ]
None
8,030
7
GridWay:gridway gridway open-source meta-scheduling technology enables large-scale secure reliable efficient sharing computing resources clusters computing farms servers supercomputers ... managed different distributed resource management systems drms sge htcondor pbs lsf within single organization enterprise grid scattered across several administrative domains partner supply-chain grid end gridway supports several grid middlewares gridway provides end users application developers scheduling framework similar found local drms allowing submit monitor synchronize control jobs means drms-like command line interface gwsubmit gwwait gwkill ... drmaa ogf standard gridway performs job execution management resource brokering allowing unattended reliable efficient execution jobs array jobs complex jobs heterogeneous dynamic loosely coupled grids gridway performs job scheduling submission steps transparently end user adapts job execution changing grid conditions providing fault recovery mechanisms dynamic scheduling migration on-request opportunistic migration gridway framework light component meta-scheduling grid ecosystem intended end users grid application developers
[ 10625, 5956, 7983, 9040, 2710, 2040, 11353, 2651, 8702, 7935 ]
Test
8,031
2
Stuart_Feldman:stuart feldman stuart feldman creator computer software program make unix systems also author first fortran 77 compiler part original group bell labs created unix operating system feldman head schmidt sciences foundation schmidt philanthropies member dean external advisory board university michigan school information previously vice president engineering east coast google vice president computer science ibm research feldman served board computing research association cra association advance collegiate schools business aacsb international chair acm sigplan founding chair acm sigecom elected president acm 2006 feldman also member editorial advisory board acm queue magazine helped found steve bourne also served editorial boards ieee internet computing ieee transactions software engineering received a.b astrophysical sciences princeton university ph.d applied mathematics massachusetts institute technology feldman became fellow ieee 1991 fellow acm 1995 2003 awarded acm software system award creation make
[ 1952, 7872, 4398, 7983, 9298, 5492, 1783, 3323 ]
None
8,032
4
Sality:sality sality classification family malicious software malware infects files microsoft windows systems sality first discovered 2003 advanced years become dynamic enduring full-featured form malicious code systems infected sality may communicate peer-to-peer p2p network form botnet purpose relaying spam proxying communications exfiltrating sensitive data compromising web servers and/or coordinating distributed computing tasks purpose processing intensive tasks e.g password cracking since 2010 certain variants sality also incorporated use rootkit functions part ongoing evolution malware family continued development capabilities sality considered one complex formidable forms malware date majority antivirus a/v vendors use following naming conventions referring family malware sality family polymorphic file infectors target windows executable files extensions .exe .scr sality utilizes polymorphic entry-point obscuring epo techniques infect files using following methods changing entry point address host replacing original host code entry point executable variable stub redirect execution polymorphic viral code inserted last section host file stub decrypts executes secondary region known loader finally loader runs separate thread within infected process eventually load sality payload sality may execute malicious payload deletes files certain extensions and/or beginning specific strings terminates security-related processes services searches user ’ address book e-mail addresses send spam messages contacts remote host sality may also download additional executable files install malware purpose propagating pay per install applications sality may contain trojan components variants may ability steal sensitive personal financial data i.e information stealers generate relay spam relay traffic via http proxies infect web sites achieve distributed computing tasks password cracking well capabilities sality ’ downloader mechanism downloads executes additional malware listed urls received using peer-to-peer component distributed malware may share “ code signature ” sality payload may provide attribution one group and/or share large portion code additional malware typically communicates reports central command control c c servers located throughout world according symantec combination file infection mechanism fully decentralized peer-to-peer network ... make sality one effective resilient malware today threat landscape two versions botnet currently active versions 3 4 malware circulated botnets digitally signed attackers prevent hostile takeover recent years sality also included use rootkit techniques maintain persistence compromised systems evade host-based detections anti-virus software sality infects files affected computer variants use dll dropped computer dll file written disk two forms example dll file contains bulk virus code file extension .dl_ compressed copy recent variants sality virus win32-sality.am drop dll instead load entirely memory without writing disk variant along others also drops driver random file name folder system \drivers malware may also drop sality computer example sality variant detected virus win32-sality.au dropped worm win32-sality.au variants sality may also include rootkit creating device name device\amsint32 \dosdevices\amsint32 sality usually targets files drive c .scr .exe file extensions beginning root folder infected files increase size varying amount virus also targets applications run windows start frequently used applications referenced following registry keys sality avoids infecting particular files order remain hidden computer variants sality infect legitimate files moved available removable drives network shares enumerating network share folders resources local computer files drive c beginning root folder infects files finds adding new code section host inserting malicious code newly added section legitimate file exists malware copy file temporary files folder infect file resulting infected file moved root available removable drives network shares following sality variant also creates autorun.inf file root drives points virus copy drive accessed computer supporting autorun feature virus launched automatically sality variants may also drop file .tmp file extension discovered network shares resources well drop .lnk file run dropped virus microsoft identified dozens files commonly associated malware
[ 2432, 3072, 6916, 10756, 3724, 6797, 3347, 4883, 2325, 278, 11413, 9630, 10657, 2213, 4648, 939, 7851, 46, 7855, 8753, 52, 10297, 3643, 7739, 7996, 10875, 9791, 8640, 9664, 9154, 11583, 8133, 4423, 10952, 81, 8789, 10457, 7515, 988, 3807,...
None
8,033
2
Dyne:bolic:dyne bolic dyne bolic gnu/linux live cd/dvd distribution based linux kernel shaped needs media activists artists creators practical tool focus multimedia production delivers large assortment applications allows manipulation broadcast sound video tools record edit encode stream addition multimedia specific programs dyne bolic also provides word processors common desktop computing tools termed rastasoft author based entirely free software recognized gnu project dyne bolic created volunteers author maintainer jaromil also included multimedia tools like muse hasciicam freej distribution dyne bolic intended used live cd/dvd require installation hard drive attempts recognize devices peripherals sound video tv etc automatically designed work older slower computers kernel optimized low latency performance making distribution suitable audio video production turning pcs full media stations reason software included sometimes newest version available dyne bolic extended downloading extra modules development tools common software like openoffice.org squashfs files placed modules/ directory dock see burnt cd automatically integrated boot basic system requirements version 1.x 2.x relatively low pc pentium amd k5 i586 class cpu 64 mb ram ide cd-rom drive sufficient versions dyne bolic 1.x ported co-developer smilzo used xbox game console multiple xbox installations could clustered console installation clustering currently supported version 2.x version 3.0 codenamed munir higher system requirements former releases first comes dvd image pentium ii amd k6-2 class processor 256 mb ram ide/sata dvd-rom drive recommended harddisk needed released september 8 2011 user copies dyne/ directory cd/dvd suitably formatted partition drive called docking file system recognised booted cd dvd option install gnu grub bootloader edit existing one booting floppy disk supported user settings saved disc usb flash drive writable image file containing /home /etc filesystem described nesting also encrypted better privacy version 3.0 currently dyne bolic 3.0 beta 4 uses linux kernel 3.0.1 dvd-rom image 1.65 gb gnome 2 used desktop interface grub2 boot loader version latest 2.5.2 uses linux kernel 2.6 cd-rom image xfce used desktop interface version used linux kernel 2.4 cd-rom image brought ability create nests docks hard disk usb key features present dyne bolic 1.x dropped later
[ 8837, 7435, 4493, 10127, 2321, 10257, 8851, 5397, 8214, 4887, 10394, 8992, 673, 3618, 3745, 10016, 9253, 10149, 10530, 11305, 9899, 7854, 2864, 2738, 4790, 439, 56, 59, 7483, 3903, 4673, 2375, 4039, 8907, 1110, 473, 9693, 2914, 485, 3685,...
Test
8,034
3
Yie_Ar_Kung-Fu:yie ar kung-fu yie ar kung-fu features protagonist bruce lee-based kung fu master named oolong japanese ウーロン ūron see oolong renamed lee msx famicom ports controlled player oolong must fight martial arts masters given game eleven arcade version five thirteen home ports win title grand master honor memory father side variety punch kick blows reachable combining joystick one buttons punch kick also greatest jumping ability game fighters exception blues player faces variety opponents unique appearance fighting style player perform 16 different moves using combination buttons joystick movements standing crouching jumping moves thrown high middle low levels regardless move defeated male characters save feedle always fall unconscious lying backs legs apart players flail feet female characters always fall lying sides feedle disappears player gains extra life word xiè xiè mandarin thank heard 11 martial arts masters listed fight order hot fighting history masterhand history msx nes port many differences arcade counterpart hero called lee faces 5 opponents two hidden characters game boy advance access player must input famous konami code title screen characters available special two-player mode found collection fighters bishoo woman dressed white attacks daggers clayman living statue attacks sword bigger sword hidden character mobile phone version katana samurai attacks katana shawn appears msx nes version yie ar kung-fu subsequently widely ported platforms including msx family computer commodore 64 zx spectrum amstrad cpc bbc micro emulated version game released 2005 playstation 2 japan part oretachi geasen zoku sono -series released xbox live arcade xbox 360 july 18 2007 updated graphics nintendo ds recent years game re-released tv game products 1987 game included compilation konami coin-op hits hyper sports green beret mikie nes version relaunched game boy color part konami gb collection vol 4 sega saturn playstation arcade version yie ar kung-fu made available microsoft game room service xbox 360 console windows-based pcs july 2010 msx version yie ar kung-fu released d4 enterprise project egg service october 28 2014 japan game commercial success europe went number 2 uk sales charts behind capcom commando yie ar kung fu went become second best-selling computer game 1986 united kingdom number-two overall 1986 chart sequel yie ar kung-fu ii released year later sequel released home computers never ported arcades another fighting game konami martial champion originally planned released yie ar kung-fu 2 fact jin protagonist martial champion modeled lee protagonist nes msx versions ryu 1987 street fighter arcade game
[ 11238, 5610, 10316, 6797, 9006, 498, 10931, 8601 ]
None
8,035
3
Northbridge_(computing):northbridge computing northbridge host bridge one two chips core logic chipset architecture pc motherboard southbridge unlike southbridge northbridge connected directly cpu via front-side bus fsb thus responsible tasks require highest performance northbridge also known memory controller hub usually paired southbridge systems included two chips manage communications cpu parts motherboard constitute core logic chipset pc motherboard older intel based pcs northbridge also named external memory controller hub mch graphics memory controller hub gmch equipped integrated graphics increasingly functions became integrated cpu chip beginning memory graphics controllers intel sandy bridge amd accelerated processing unit processors introduced 2011 functions northbridge reside cpu amd fx cpus still require external northbridge southbridge chips separating different functions cpu northbridge southbridge chips due difficulty integrating components onto single chip instances northbridge southbridge functions combined onto one die design complexity fabrication processes permitted example nvidia geforce 320m 2010 macbook air northbridge/southbridge/gpu combo chip cpu speeds increased time bottleneck eventually emerged processor motherboard due limitations caused data transmission cpu support chipset accordingly starting amd athlon64 series cpus based opteron new architecture used functions north- southbridge chips moved cpu modern intel core processors northbridge integrated cpu die known uncore system agent northbridge typically handles communications among cpu cases ram pci express agp video cards southbridge northbridges also contain integrated video controllers also known graphics memory controller hub gmch intel systems different processors ram require different signaling given northbridge typically work one two classes cpus generally one type ram chipsets support two types ram generally available shift new standard example northbridge nvidia nforce2 chipset work socket processors combined ddr sdram intel i875 chipset work systems using pentium 4 processors celeron processors clock speed greater 1.3 ghz utilize ddr sdram intel i915g chipset works intel pentium 4 celeron use ddr ddr2 memory name derived drawing architecture fashion map cpu would top map comparable due north general purpose geographical maps cpu would connected chipset via fast bridge northbridge located north system devices drawn northbridge would connected rest chipset via slow bridge southbridge located south system devices drawn northbridge plays important part far computer overclocked frequency commonly used baseline cpu establish operating frequency chip typically gets hotter processor speed becomes faster requiring cooling limit cpu overclocking digital circuits limited physical factors rise fall delay storage times transistors current gain bandwidth product parasitic capacitance propagation delay increases among factors operating temperature consequently overclocking applications software-imposed limits multiplier external clock setting additionally heat major limiting factor higher voltages needed properly activate field effect transistors inside cpus higher voltage produces larger amounts heat requiring greater thermal solutions die overall trend processor design integrate functions onto fewer components decreases overall motherboard cost improves performance memory controller handles communication cpu ram moved onto processor die amd beginning amd64 processors intel nehalem processors one advantages memory controller integrated cpu die reduce latency cpu memory another example kind change nvidia nforce3 amd64 systems combines features normal southbridge accelerated graphics port agp port connects directly cpu nforce4 boards marketed media communications processor mcp amd accelerated processing unit processors feature full integration northbridge functions onto cpu chip along processor cores memory controller graphics processing unit gpu evolution amd64 since memory controller integrated cpu die amd64 northbridge replaced system agent introduced sandy bridge microarchitecture 2011 essentially handles previous northbridge functions intel ’ sandy bridge processors feature full integration northbridge functions onto cpu chip along processor cores memory controller graphics processing unit gpu evolution westmere architecture also featured cpu gpu package
[ 3586, 9741, 398, 3472, 7442, 10130, 11417, 8090, 1563, 8730, 799, 10658, 426, 3883, 4270, 3892, 8629, 6339, 2635, 1614, 2383, 7247, 3537, 5073, 4444, 2525, 8931, 2791, 4717, 4334, 7151, 1776, 499, 3070 ]
None
8,036
2
Load_(computing):load computing unix unix-like systems generate dimensionless metric three load average numbers kernel users easily query current result unix shell running uptime command w top commands show three load average numbers range graphical user interface utilities linux also accessed reading codice_1 file idle computer load number 0 idle process n't counted process using waiting cpu ready queue run queue increments load number 1 process terminates decrements 1 unix systems count processes running cpu runnable waiting cpu states however linux also includes processes uninterruptible sleep states usually waiting disk activity lead markedly different results many processes remain blocked i/o due busy stalled i/o system example includes processes blocking due nfs server failure slow media e.g. usb 1.x storage devices circumstances result elevated load average reflect actual increase cpu use still gives idea long users wait systems calculate load average exponentially damped/weighted moving average load number three values load average refer past one five fifteen minutes system operation mathematically speaking three values always average system load since system started decay exponentially decay different speeds decay exponentially e 1 5 15 minutes respectively hence 1-minute load average consists 63 precisely 1 1/ e load last minute 37 1/ e average load since start excluding last minute 5- 15-minute load averages 63 /37 ratio computed 5 minutes 15 minutes respectively therefore technically accurate 1-minute load average includes last 60 seconds activity includes 37 activity past correct state includes mostly last minute single-cpu systems cpu bound one think load average measure system utilization respective time period systems multiple cpus one must divide load number processors order get comparable measure example one interpret load average 1.73 0.60 7.98 single-cpu system means system cpu disk memory etc could handled work scheduled last minute 1.73 times fast system four cpus load average 3.73 would indicate average 3.73 processes ready run one could scheduled cpu modern unix systems treatment threading respect load averages varies systems treat threads processes purposes load average calculation thread waiting run add 1 load however systems especially systems implementing so-called use different strategies counting process exactly purpose load regardless number threads counting threads currently exposed user-thread scheduler kernel may depend level concurrency set process linux appears count thread separately adding 1 load comparative study different load indices carried ferrari et al reported cpu load information based upon cpu queue length much better load balancing compared cpu utilization reason cpu queue length better probably host heavily loaded cpu utilization likely close 100 unable reflect exact load level utilization contrast cpu queue lengths directly reflect amount load cpu example two systems one 3 6 processes queue likely utilizations close 100 although obviously differ linux systems load-average calculated clock tick driven variable value based hz frequency setting tested clock tick hz variable pulse rate particular linux kernel activity 1 hz equal one clock tick 10ms default although hz value configured versions kernel normally set 100 calculation code uses hz value determine cpu load calculation frequency specifically timer.c :calc_load function run algorithm every 5 hz roughly five times per second following function entirety countdown 5 hz avenrun array contains 1-minute 5-minute 15-minute average macro associated values defined sched.h commands assessing system performance include
[ 3586, 4423, 3752, 5831, 810, 6281, 2222, 1776, 11442, 7188, 9300, 9174, 823, 9016, 1849, 3226 ]
None
8,037
3
Object_code:object code computing object code object module product compiler general sense object code sequence statements instructions computer language usually machine code language i.e. binary intermediate language register transfer language rtl term indicates code goal result compiling process early sources referring source code subject program object files turn linked form executable file library file order used object code must either placed executable file library file object file object code portion machine code yet linked complete program machine code one particular library module make completed product may also contain placeholders offsets found machine code completed program linker use connect everything together whereas machine code binary code executed directly cpu object code jumps partially parameterized linker fill assembler used convert assembly code machine code object code linker links several object library files generate executable assemblers also assemble directly machine code executable files without object intermediary step
[ 1409, 1922, 7173, 8069, 8966, 6664, 6921, 3468, 9996, 4112, 1683, 5783, 10013, 7071, 1952, 8609, 5154, 7462, 3624, 814, 5040, 1715, 7032, 1461, 4535, 7479, 3386, 2620, 1724, 7612, 10044, 10176, 9921, 1730, 2370, 4424, 5065, 3659, 9291, 64...
Test
8,038
1
EPassport_gates:epassport gates epassport gates automated self-service barriers automated border control system operated united kingdom border force located immigration checkpoints arrival halls airports across uk international railway terminals abroad offering alternative using desks staffed immigration officers gates use facial recognition technology verify traveller identity data stored chip biometric passport well run data numerous databases determine traveller security risk british citizens european economic area swiss citizens aged 12 holding biometric passports eligible use epassport gates epassport gates usually marked symbol holder nationality shown british overseas territories citizen british overseas citizen british subject british national overseas british protected person holder able use epassport gates travellers using passports hong kong taiwan enrolled registered traveller service use epassport gates provided aged either 18 12 travelling adult holding valid biometric passports epassport gates accept national identity cards use epassport gates traveller must biometric passport united kingdom certain countries epassports biometric logo front cover epassport gate scanner reads information contained chip inside passport camera takes picture traveller officer control station behind gates checks image captured camera matches one passport facial recognition data verification facial recognition process complete doors automatically either open signifying traveller permitted enter and/or exit country remain closed stop icon illuminate demonstrating traveller failed security checks personally meet immigration officials present epassport gates available following locations
[ 11138, 2876, 10685 ]
None
8,039
4
OpenConnect:openconnect openconnect open-source software application connecting virtual private networks vpn implement secure point-to-point connections originally written open-source replacement cisco proprietary anyconnect ssl vpn client supported several cisco routers openconnect project also offers anyconnect-compatible server ocserv thus offers full client-server vpn solution openconnect client added support juniper networks ssl vpn version 7.05 fork developed support palo alto networks globalprotect vpn included version 8.00 release cisco anyconnect vpns utilize tls authenticate configure routing dtls efficiently encrypt transport tunneled vpn traffic fall back tls-based transport firewalls block udp-based traffic dtls protocol used cisco anyconnect servers based non-standard pre-release draft dtls 1.0 support dtls 1.2 standard added 2018 openconnect ocserv implement extended version anyconnect vpn protocol proposed internet standard within open-source project unaffiliated cisco openconnect ocserv strive maintain seamless backwards-compatibility cisco anyconnect servers clients openconnect client also implements juniper globalprotect vpn protocols similar structure anyconnect protocol authenticate configure routing tls except use esp efficient encrypted transport tunneled traffic instead dtls fall back tls-based transport openconnect client written primarily c contains much infrastructure necessary add additional vpn protocols operating similar flow connect via common user interface openconnect available solaris linux openbsd freebsd macos graphical user interface clients windows 2000/xp/vista/7 gnome kde graphical client openconnect also available android devices integrated router firmware packages openwrt useful usage information
[ 10889, 6794, 9722, 8211, 11413, 11162, 3742, 9764, 8998, 4268, 10417, 7859, 2228, 823, 11577, 3777, 2884, 5959, 8265, 11468, 11133, 7376, 11221, 11606, 2136, 9048, 6490, 6364, 5084, 479, 10210, 9318, 11248, 5749, 3322, 2045 ]
None
8,040
2
Cryptographic_Service_Provider:cryptographic service provider microsoft windows cryptographic service provider csp software library implements microsoft cryptoapi capi csps implement encoding decoding functions computer application programs may use example implement strong user authentication secure email csps independent modules used different applications user program calls cryptoapi functions redirected csps functions since csps responsible implementing cryptographic algorithms standards applications need concerned security details furthermore one application define csp going use calls cryptoapi fact cryptographic activity implemented csps cryptoapi works bridge application csp csps implemented basically special type dll special restrictions loading use every csp must digitally signed microsoft signature verified windows loads csp addition loaded windows periodically re-scans csp detect tampering either malicious software computer viruses user him/herself trying circumvent restrictions example cryptographic key length might built csp code obtain signature non-microsoft csp developers must supply paperwork microsoft promising obey various legal restrictions giving valid contact information circa 2000 microsoft charge fees supply signatures development testing purposes csp developer configure windows recognize developer signatures instead microsoft somewhat complex obscure operation unsuitable nontechnical end users capi/csp architecture origins era restrictive us government controls export cryptography microsoft default base csp included windows limited 512-bit rsa public-key cryptography 40-bit symmetric cryptography maximum key lengths permitted exportable mass market software time csps implementing stronger cryptography available u.s. residents unless csps received u.s. government export approval system requiring csps signed presentation completed paperwork intended prevent easy spread unauthorized csps implemented anonymous foreign developers presented concession made microsoft government order get export approval capi bernstein v. united states court decision establishing computer source code protected free speech transfer cryptographic regulatory authority u.s. state department pro-export commerce department restrictions key lengths dropped csps shipped windows include full-strength cryptography main use third-party csps interface external cryptography hardware hardware security modules hsm smart cards cryptographic functions realised smart card thus smart card csp microsoft way pkcs 11 microsoft windows identifying correct smart card csp used analysing answer reset atr smart card registered windows registry installing new csp atrs supported smart cards enlisted registry cryptographic service providers used encryption word excel powerpoint documents starting microsoft office xp standard encryption algorithm 40-bit key used default enabling csp enhances key length thus makes decryption process continuous applies passwords required open document password type one encrypts password-protected document
[ 8674, 11144, 2027, 9196, 3629, 2221, 6797, 9745, 3890, 7739 ]
Test
8,041
9
Urbiscript:urbiscript urbiscript programming language robotics features syntactic support concurrency event-based programming prototype-based object-oriented scripting language dynamic name resolution performed program execution late binding slots member variables added/removed runtime even prototypes superclasses object changed runtime memory management performed reference counting tightly bound urbi platform supports seamless integration c++/java components syntactical point view urbiscript belongs c-family programming languages prototype-based object-oriented design influenced self io programming languages designed program also interact robots influenced unix shells languages provide read-eval-print loop style interactive toplevel however contrary others prompt user input answers system prefixed timestamp milliseconds square brackets urbiscript statements include among others actually contrary c-like languages despite syntax suggests statements value therefore expressions provided embedded braces urbiscript control-flow constructs come several flavors two types sequential composition two types concurrent composition hood concurrency implemented using coroutines like c semicolon denotes sequential composition codice_13 stands run statement codice_14 run statement codice_15 tasks may run codice_14 codice_15 another statement separator pipe denotes tight sequential composition task run codice_14 codice_15 codice_20 similarly urbiscript features two means compose statements concurrently codice_21 first codice_14 run point codice_15 -- possibly codice_14 still running similar codice_25 operator unix shells alternatively codice_26 codice_14 codice_15 started together interactive sessions means codice_14 wo n't run codice_15 fully entered properly followed either codice_31 codice_32 scopes boundaries backgrounded jobs demonstrated following example looping constructs urbiscript come several flavors based four statement separators codice_31 codice_34 codice_32 codice_25 instance displays i.e. loop bodies executed sequentially codice_37 keyword runs loop bodies concurrently aiming development portable robotic applications urbiscript relies specific syntactic constructs specify reactive behaviors go charging dock battery low play friendly sound known face recognized stop obstacle detected event handling goes three steps first define event second specify event handlers third emit event events payloads event handlers enjoy pattern matching payload urbiscript language also allows monitor expressions following example demonstrates feature
[ 2048, 9345, 11361, 9320, 5612, 4750, 7983, 8221, 9490, 9780, 11221, 10198, 155, 2045 ]
Test
8,042
4
National_Cybersecurity_FFRDC:national cybersecurity ffrdc national cybersecurity ffrdc ncf federally funded research development center operated mitre corporation supports u.s. national institute standards technology national cybersecurity center excellence ncf first march 2017 federally funded research development center dedicated solely cybersecurity national cybersecurity ffrdc located 9700 great seneca hwy rockville maryland ncf mission increase cybersecurity business community providing practical guidance increasing adoption rate secure technologies accelerating innovation supports department commerce goal protecting economy ncf also fosters public-private collaborations identify solve cybersecurity threats nist ’ work others program non-profits federal state local agencies access cybersecurity technologies talent ncf contract operate ffrdc awarded september 2014 nist mitre corporation press release stated ffrdcs operate public interest required free organizational conflicts interest well bias toward particular company technology product—key attributes given nccoe ’ collaborative nature…the first three task orders contract allowed nccoe expand efforts developing use cases building blocks provide operations management facilities planning
[ 4826, 2709, 6423 ]
Validation
8,043
9
Extension_Language_Kit:extension language kit extension language kit elk free scheme implementation embeddable c c++ programs also used stand-alone scheme interpreter available custom permissive license use commercial noncommercial elk written oliver laumann carsten bormann provide extension language development large c++-based systems oda document editor isotext videoconferencing system teles.vision inspired lisp interpreter emacs turn helped inspire developers dynamic language interpreters matz ruby interpreter 2005 sam hocevar became current maintainer elk scheme project merging contributed patches fixing known bugs
[ 9245, 10083, 2045, 8262 ]
Test
8,044
7
Nettop:nettop nettop miniature pc mini pc smart micro pc small-sized inexpensive low-power legacy-free desktop computer designed basic tasks web browsing accessing web-based applications document processing audio/video playback word nettop portmanteau network desktop desktop counterpart netbook compared ordinary desktop computers nettops smaller cheaper also consume much less power example compulab fit-pc2 consumes 8 watts power whereas typical desktop would easily consume 100 watts power consequently nettops require significantly less cooling may even completely fanless optical disk drive use solid state drive making completely silent tradeoff hardware specifications processing power usually reduced hence make nettops less appropriate running complex resource-intensive applications nettops mini pcs could considered unusual history first wave devices occurred mid late 2000s commonly referred nettops included devices acer aspirerevo seen commonly considered kind temporary substitute pc lower cost users needing second pc use developing countries another commonly held view time use stepping stone towards thin client-based always online computer would replace inefficient pcs demand devices quickly waned industry responded addressing chief complaint devices would better portable devices new form laptop result netbook device considered true future nettop however prevailing attitudes economic issues 2008 onward made popular due low cost portability along then-expanding feature-set august 2009 reports reviewers netbook time traditional laptop price otherwise identical implications price standard notebooks dropped financial liability due huge unsold inventories standard laptops retail chains unfavorable market unload meant cannibalisation laptop sales netbooks would financially undesirable industry clearance sale also option conditions especially among multiple retail chains online shopping sites factors along desire keep netbook sales going recoup r design manufacturing costs likely contributing factors industry-wide effort sabotage netbooks purposefully limited devices could sold cheaply acting form social engineering towards discrediting netbook devices direct lineage nettops netbooks meant concept net- prefix considered failed idea devices chromebooks tablet pcs ultrabooks devices responded branding different type device chrome os exclusively pure web client proposal ultrabook succeeded compensating lighter weight otherwise equal-performance parts higher price tag 2015 revival concept came likely unrelated source technological form convergent evolution via likely-observed success stick pc idea combining system chip single-board computer led continuation nettop original product goals mini pcs minix z83-4 azulle access plus exclusively referred mini pcs despite identical near-identical paper nettop architecture three platforms primarily intended nettops netbooks nettops also adopted system-on-a-chip designs although many major parts chipsets video cards storage devices also found desktops cpus put inside nettops fundamental component differentiate normal desktops list contains range hardware components typical nettop may assembled intel atom processor adopted several hardware manufacturers asus msi sony nettops nvidia also released first generation ion platform puts geforce 9400m motherboard gpu alongside atom processor provide better high definition video playback ability lower power consumption addition nvidia announced support via cpus year reduce manufacturing cost improve power efficiency many manufacturers start-up companies chosen use cpus originally targeted embedded computing devices amd geode arm cortex-based cpus many net-top models x86-processor-based capable running standard pc oses also operating systems designed specifically nettops machines performance class high-end nettops capable running windows 10 google android linux distribution another option although google android originally designed smartphones also taken seat nettop market another linux system ubuntu nettops fell intel category basic pc usually cost 100 299 intel described nettops large potential market time nettops said able serve affordable first computer people developing countries environmentally friendly choice secondary computer people developed countries however stated primary flaw average consumer far useful portable system led development netbooks midst economic crisis netbooks seen hurting sales traditional laptops likely collaborative effort destroy demand hence original source computer class died marketplace result successes stick pcs linux mint-based nettop-like computers well continued success mac mini idea possibly unintentionally revived mini pcs continue sold online retailers august 2017
[ 6913, 3586, 1032, 4236, 9101, 10893, 911, 1935, 4623, 8592, 6419, 6804, 405, 2965, 10768, 2328, 4377, 8986, 9851, 6307, 9766, 5159, 426, 6444, 8495, 3121, 5681, 10675, 7352, 1083, 2496, 4289, 7234, 5444, 1224, 1480, 8520, 4429, 7248, 3537...
None
8,045
9
Samy_(computer_worm):samy computer worm samy also known js.spacehero cross-site scripting worm xss worm designed propagate across social networking site myspace samy kamkar within 20 hours october 4 2005 release one million users run payload making samy fastest spreading virus time worm relatively harmless carried payload would display string samy hero victim myspace profile page well send samy friend request user viewed profile page payload would replicated planted profile page continuing distribution worm myspace since secured site vulnerability samy kamkar author worm raided united states secret service electronic crimes task force 2006 releasing worm entered plea agreement january 31 2007 felony charge action resulted kamkar sentenced three years probation one computer use internet 90 days community service 15,000- 20,000 usd restitution directly reported samy kamkar greatest moments hacking history vice media video website motherboard
[ 3072, 5636, 3852, 9630, 803, 2470, 7855, 10297, 7739, 3704, 1113, 7515, 4830, 5087, 4063, 2147, 1381, 1254, 4198, 7659, 4462, 3700, 6520, 2041 ]
Validation
8,046
0
Natural-language_user_interface:natural-language user interface natural-language user interface lui nlui type computer human interface linguistic phenomena verbs phrases clauses act ui controls creating selecting modifying data software applications interface design natural-language interfaces sought speed ease use suffer challenges understanding wide varieties ambiguous input natural-language interfaces active area study field natural-language processing computational linguistics intuitive general natural-language interface one active goals semantic web text interfaces natural varying degrees many formal un-natural programming languages incorporate idioms natural human language likewise traditional keyword search engine could described shallow natural-language user interface natural-language search engine would theory find targeted answers user questions opposed keyword search example confronted question form 'which u.s. state highest income tax conventional search engines ignore question instead search keywords 'state 'income 'tax natural-language search hand attempts use natural-language processing understand nature question search return subset web contains answer question works results would higher relevance results keyword search engine prototype nl interfaces already appeared late sixties early seventies natural-language interfaces past led users anthropomorphize computer least attribute intelligence machines warranted part user led unrealistic expectations capabilities system expectations make difficult learn restrictions system users attribute much capability ultimately lead disappointment system fails perform expected case ai winter 1970s 80s 1995 paper titled 'natural language interfaces databases – introduction describes challenges goals consider generally speed efficiency interface algorithms two points main point determine methods better others therefore greater success market addition localisation across multiple language sites requires extra consideration based differing sentence structure language syntax variations languages finally regarding methods used main problem solved creating general algorithm recognize entire spectrum different voices disregarding nationality gender age significant differences extracted features even speakers says word phrase must successfully overcome natural-language interface gives rise technology used many different applications main uses named defined applications use natural-language recognition integrated utilities listed ubiquity add-on mozilla firefox collection quick easy natural-language-derived commands act mashups web services thus allowing users get information relate current webpages wolfram alpha online service answers factual queries directly computing answer structured data rather providing list documents web pages might contain answer search engine would announced march 2009 stephen wolfram released public may 15 2009 siri intelligent personal assistant application integrated operating system ios application uses natural language processing answer questions make recommendations siri marketing claims include adapts user individual preferences time personalizes results performs tasks making dinner reservations trying catch cab
[ 5122, 2440, 2059, 140, 3979, 2318, 6798, 4624, 11538, 10231, 1044, 5399, 538, 7069, 4782, 7599, 4531, 4662, 3127, 823, 2488, 3389, 7614, 8639, 6208, 10557, 7106, 1603, 6341, 5830, 5319, 10313, 3533, 5197, 6223, 10452, 8538, 5857, 1890, 95...
Test
8,047
4
Core_Security_Technologies:core security technologies core security american computer network security company provides attack intelligence platform vulnerability management network penetration testing measurement software products services company ’ research arm corelabs proactively identifies new security vulnerabilities publishes public vulnerability advisories works vendors assist eliminating exposures find february 2019 helpsystems acquired core security products secureauth helpsystems minnesota-based software company working areas systems network management business intelligence security compliance 1996 core security founded buenos aires argentina one year later corelabs research group established published first advisory core conducted first penetration test u.s. company 1998 year core security recognized endeavor entrepreneur endeavor foundation foundation supports entrepreneurial projects emerging markets 2000 company first u.s. office opened new york ny two years later core released first second versions flagship penetration testing product core impact pro 2003 company u.s. headquarters relocated new york boston five years later mark hatton became ceo core security 2009 core adds development sites boston india one year later core announced beta new security testing measurement product core insight 2012 core announces partnership ncircle year core announces partnership nt objectives 2013 core security named 2013 inc. 500/5000 list 2014 core security adds intrinium partner program extends reach pacific northwest year core security announced latest version core attack intelligence platform also 2014 core security information security magazine searchsecurity.com 2014 readers choice awards excellence vulnerability management december 2015 core security acquired identity access management iam company courion may 2016 courion rebranded core security name july 2016 core security technologies acquired damballa us 9 million 2017 core security merged secureauth 2019 helpsystems acquired core security solutions secureauth damballa founded 2006 atlanta georgia merrick furst associate dean georgia institute technology georgia tech college computing joined two georgia tech colleagues wenke lee david dagon company named damballa vodou snake god protects zombies implication damballa protects “ zombie ” computers operating part botnets according site damballa seeks primarily corporate clients isp damballa ’ product offerings damballa advanced threat protection solution enterprises damballa failsafe detects successful infections certainty terminates threat activity gives incident response intelligence needed rapidly prevent data breaches damballa failsafe able detection malicious files malware track suspicious behavior time network delivering actionable information known unknown threats regardless infection ’ source entry vector os device provides incident responders definitive evidence rapidly prevent loss high-risk devices blocking activity rest recommended advanced threat protection shortlist buyer guide 2015 damballa csp designed service providers isps identifies malicious activity originating subscriber ’ devices whether pc tablet mobile damballa csp sits out-of-band inside service provider ’ network monitors dns requests non-pii traffic subscriber ’ ip address enables identify subscriber devices infected advanced malware 2013 damballa granted first two patents related detecting advanced threats patent 8,566,928 describes methods detecting first network compromised computers second network computers patent 8,578,497 describes methods analyzing domain names registered collected asset real network february 2014 company granted third patent us20120198549 method system detecting malicious domain names upper dns hierarchy describes methodology identifying potential malicious domain names used propagate threats according website core security research department core labs conducts research system vulnerabilities cyber attack planning simulation source code auditing cryptography core labs publishes security advisories technical papers project information shared software tools public use researchers participating security research conferences including black hat briefings
[ 2275, 5636, 10341, 939, 3887, 1429, 5174, 7515, 7228, 2558 ]
Test
8,048
3
Motorola_88000:motorola 88000 88000 m88k short risc instruction set architecture isa developed motorola 1980s 88000 arrived market 1988 two years competing sparc mips due late start extensive delays releasing second-generation mc88110 m88k achieved limited success outside mvme platform embedded controller environments motorola joined aim alliance 1991 develop powerpc development 88000 ended originally called 78000 homage famed 68000 series design went tortuous development path including number change finally emerging april 1988 initial version 88100 generally required separate mmu mc88200 88200 added mmu data instruction caches time processors mmu built-in including motorola 68030 returning separate mmu chip step backward 88100/88200 saw little use follow-on version combining cpu mmu planned 88110 late 1980s several companies actively examining 88000 series future use including next apple computer apollo computer given design time 88110 finally available 1990 attempt popularize system 88open group similar sun microsystems attempting sparc design appears failed practical sense early 1990s motorola joined aim effort create new risc architecture based ibm power architecture worked features 88000 new powerpc architecture offer customer base sort upgrade path point 88000 dumped soon possible like 68000 88000 considered clean design pure 32-bit load/store architecture using separate instruction data caches harvard architecture separate data address buses small powerful command set like motorola cpus use memory segmentation major architectural mistake integer instructions floating-point instructions used register file required single register file sufficient read write ports support integer execution unit floating-point unit connections port additional capacitive load must driven register memory cell made difficult build high frequency superscalar implementations first implementation 88000 isa mc88100 microprocessor included integrated fpu mated mc88200 mmu cache controller idea behind splitting duties allow multiprocessor systems built easily single mc88200 could support four mc88100s however also meant building basic system single processor required chips considerable wiring driving costs likely another major reason 88000 limited success later addressed superscalar mc88110 combined cpu fpu mmu l1 cache single package additional modification made behest mit *t project resulted mc88110mp including on-chip communications use multi-processor systems version capable speeds 100 mhz planned mc88120 never built implementation embedded applications mc88300 development early 1990s eventually canceled ford motor company planned use chips offered powerpc design replacement accepted motorola released series single-board computers known mvme series building box systems based 88000 well series 900 stackable computers employing mvme boards unlike tower rack mount systems series 900 sat top connected one another bus-like cabling concept never caught major 3rd party users limited widespread use would data general aviion series fairly popular remain limited use today later models dg moved intel encore computer built encore-91 machine m88k introduced completely ground-up redesign infinity 90 series unclear many machines sold encore moved alpha gec computers used 88100 build gec 4310 one gec 4000 series computers issues memory management meant n't perform well earlier gate array based am2900 based gec 4000 series computers bbn butterfly model tc-2000 used 88100 processor scaled 512 cpus linotype-hell used 88110 power workstations running davinci raster graphics editor image manipulation 88110 made versions never released next machine next risc workstation project canceled along next hardware projects 1993 4-processor omron luna-88k machines japan used m88k used short time mach kernel project carnegie mellon university early 1990s northern telecom used 88100 88110 central processor dms supernode family telephone switches users much smaller alpha microsystems originally planned migrate 88k architecture motorola 68000 internally created machine around running unix system v later scrapped favour later 68k derivatives ncd used 88100 without 88200 88k x-terminals dolphin server spin-off dying norsk data built servers based 88k around 100 systems shipped 1988-1992 virtuality used 88110 su2000 virtual reality arcade machine graphics processor one 88110 per screen virtual reality headset embedded computer space tri-channel vms computer f-15 s/mtd used three 88000s triply redundant computer motorola released unix system v derivative system v/88 88000-based systems two major releases release 3.2 version 3 release 4.0 version 3. ref name= unix system v/88 /ref data general aviion systems ran dg/ux openbsd ports exist mvme systems ref name= openbsd/mvme88k openbsd/mvme88k /ref luna-88k workstations ref name= openbsd/luna88k openbsd/luna88k /ref data general aviion systems. ref name= openbsd/aviion openbsd/aviion /ref least one unofficial experimental netbsd port exists mvme systems. ref name= netbsd/m88k netbsd/m88k unofficial port netbsd 3.x /ref
[ 1548, 528, 11286, 2073, 6187, 10796, 4144, 11314, 8761, 6715, 7234, 3142, 10851, 7269, 3175, 3185, 5235, 7286, 7806, 7299, 1158, 7302, 7305, 9371, 8861, 6815, 6311, 682, 7852, 4269, 9391, 2224, 5297, 9911, 11447, 10945, 9410, 9932, 10985, ...
Train
8,049
6
Interleaving_(disk_storage):interleaving disk storage disk storage drum memory interleaving technique used improve access performance storage putting data accessed sequentially non-sequential sectors number physical sectors consecutive logical sectors called interleave skip factor skip factor historically interleaving used ordering block storage storage devices drums floppy disk drives hard disk drives primary purpose interleaving adjust timing differences computer ready transfer data data actually arriving drive head read interleaving common prior 1990s faded use processing speeds increased modern disk storage interleaved interleaving used arrange sectors efficient manner possible reading sector time would permitted processing next sector sequence ready read computer ready matching sector interleave processing speed therefore accelerates data transfer incorrect interleave make system perform markedly slower information commonly stored disk storage small pieces referred sectors blocks arranged concentric rings referred tracks across surface disk may seem easiest order blocks direct serial order track 1 2 3 4 5 6 7 8 9 early computing devices ordering practical data written read put special region reusable memory referred buffer data needed written moved buffer written buffer disk data read reverse took place transferring first buffer moved needed early computers fast enough read sector move data buffer somewhere else ready read next sector time next sector appearing read head sectors arranged direct serial order first sector read computer may spend time takes example three sectors pass ready receive data however sectors direct order sector two three four already passed computer n't need sectors 4 5 6 7 8 9 1 must wait pass reading sector two waiting disk spin around right spot slows data transfer rate correct processing delays ideal interleave system would 1:4 ordering sectors like 1 8 6 4 2 9 7 5 3 reads sector 1 processes three sectors whereby 8 6 4 pass computer becomes ready sector two arriving needed 1:1 interleave skip factor 0 places sectors sequentially—1 2 3 4 5 6 ... modern disk storage need interleaving data commonly stored clusters groups sectors data buffer sufficiently large allow sectors block read without delay sectors
[ 3841, 3315, 8129, 2159 ]
Test
8,050
4
Open_Source_Vulnerability_Database:open source vulnerability database open sourced vulnerability database osvdb independent open-sourced vulnerability database goal project provide accurate detailed current unbiased technical information security vulnerabilities project promoted greater open collaboration companies individuals goal provide accurate unbiased information security vulnerabilities computerized equipment core osvdb relational database tied various information security vulnerabilities common cross-referenced open security data source november 2013 database cataloged 100,000 vulnerabilities project started august 2002 blackhat def con conferences several industry notables including h. d. moore rain.forest.puppy others mostly-new management database officially launched public march 31 2004 open security foundation osf created ensure project continuing support brian martin aka jericho jake kouns project leaders osvdb project currently hold leadership roles osf client/server implementation consists server daemon mysqld many different client programs/libraries pluggable data store architecture 5 april 2016 database shut although blog continue originally vulnerability reports advisories exploits posted various security lists enter database new entry new entry contains title links entries vulnerability security lists however stage page new entry n't contain detailed description vulnerability new entries thoroughly scrutinized analyzed refined descriptions vulnerability solutions test notes added details reviewed members osvdb refined necessary made stable stable detailed information appears page entry january 2012 vulnerability entry performed full-time employees osf every new entry included title description solution known classification data references products creditee enthusiastic hackers volunteering maintain osvdb active members follows volunteers helped past include open security foundation non-profit 501 c 3 organization established early 2005 function support organization open source security projects originally conceived founded support osvdb project scope evolving provide support numerous projects foundation allows organizations individuals provide charitable contributions support open source security projects provide value global community foundation also provides guidance legal administrative policy guidelines support numerous projects open security foundation conceived chris sullo brian martin jake kouns early 2004 obtained official us 501 c 3 non-profit status april 2005
[ 2275, 8488, 2446, 8764, 5373, 4062 ]
Validation
8,051
2
ISPW:ispw ircam signal processing workstation ispw hardware dsp platform developed ircam ariel corporation late 1980s french ispw referred sim station d'informatique musicale eric lindemann principal designer ispw hardware well manager overall hardware/software effort consisted three customized dsp boards could plugged expansion bus next computer cube ispw could run customized real-time audio processing server hardware boards controlled client application next ispw card two intel i860 microprocessors running 80 mflops additional card eight channels audio i/o also available multi-channel sound recording playback three-board ispw provided time unsurpassed signal processing audio synthesis power single workstation single ispw card cost approximately 12,000us including computer made prohibitively expensive outside research institutes universities i860 board main server software developed ircam ispw called fts faster sound main next client application graphical program called max developed miller puckette commercial version max without fts server licensed ircam opcode systems later cycling '74 max/fts eventually migrated software-only application sgi dec alpha computers direct predecessor jmax see also pd
[ 10051, 4490, 7571, 7769, 7806 ]
None
8,052
6
Transparent_Data_Encryption:transparent data encryption transparent data encryption often abbreviated tde technology employed microsoft ibm oracle encrypt database files tde offers encryption file level tde solves problem protecting data rest encrypting databases hard drive consequently backup media protect data transit data use enterprises typically employ tde solve compliance issues pci dss require protection data rest microsoft offers tde part microsoft sql server 2008 2008 r2 2012 2014 2016 tde supported evaluation developer enterprise datacenter editions microsoft sql server sql tde supported hardware security modules thales e-security townsend security safenet inc. ibm offers tde part db2 version 10.5 fixpack 5 also supported cloud versions product default db2 cloud db2 warehouse cloud oracle requires oracle advanced security option oracle 10g 11g enable tde oracle tde addresses encryption requirements associated public private privacy security mandates pci california sb 1386 oracle advanced security tde column encryption introduced oracle database 10g release 2 oracle advanced security tde tablespace encryption support hardware security modules hsms introduced oracle database 11gr1 keys tde stored hsm manage keys across servers protect keys hardware introduce separation duties key used encrypt columns table regardless number columns encrypted encryption keys encrypted using database server master key stored dictionary table database sql server utilizes encryption hierarchy enables databases shared within cluster migrated instances without re-encrypting hierarchy consists combination symmetric asymmetric ciphers database backups compression occurs encryption due fact strongly encrypted data significantly compressed backups tde encrypted databases require additional resources enable automatic booting sql server stores lowest level encryption keys persistent storage using dpapi store presents potential security issue stored keys directly recovered live system backups used decrypt databases
[ 6850, 5051, 3366, 3880, 1964, 653, 3629, 7794, 2901, 4630, 11030, 3323, 4255 ]
Test
8,053
4
Milton_Smith:milton smith milton smith american computer security application developer researcher writer smith best known role leading java platform security oracle period high-profile security incidents fall 2012 due climate around java security 2013 smith invited present black hat leadership closed session non-disclosure agreement top industry leaders year smith established first ever full security track software developers conference javaone oracle premier conference java software developers san francisco california usa smith continues principal security analyst oracle working strategically across company business units smith active collaborator industry developing open source security tools researchers well participating security conference events organizing period smith chief technical editor application security book project colleges prior oracle around june 2011 smith leading security user data analytics uda business unit yahoo developed innovative security controls secure yahoo click stream revenues smith also lead yahoo enterprise security triage program monitoring enterprise vulnerabilities tracking remediation activities owasp one largest non-profit organizations security practitioners world march 12 2015 smith developed deepviolet tls/ssl scanning api researchers use extend tls/ssl scanning projects today deepviolet owasp incubator project smith also leader owasp security logging api project open source project extending important security features applications use popular logging platforms like log4j logback
[ 2558 ]
Validation
8,054
4
DNS_hijacking:dns hijacking dns hijacking dns redirection practice subverting resolution domain name system dns queries achieved malware overrides computer tcp/ip configuration point rogue dns server control attacker modifying behaviour trusted dns server comply internet standards modifications may made malicious purposes phishing self-serving purposes internet service providers isps public/router-based online dns server providers direct users web traffic isp web servers advertisements served statistics collected purposes isp dns service providers block access selected domains form censorship one functions dns server translate domain name ip address applications need connect internet resource website functionality defined various formal internet standards define protocol considerable detail dns servers implicitly trusted internet-facing computers users correctly resolve names actual addresses registered owners internet domain rogue dns server translates domain names desirable websites search engines banks brokers etc ip addresses sites unintended content even malicious websites users depend dns servers automatically assigned isps zombie computers use dns-changing trojans invisibly switch automatic dns server assignment isp manual dns server assignment rogue dns servers router assigned dns servers also altered remote exploitation vulnerability within router firmware users try visit websites instead sent bogus website attack termed pharming site redirected malicious website masquerading legitimate website order fraudulently obtain sensitive information termed phishing number consumer isps cablevision optimum online centurylink cox communications rcn rogers charter communications spectrum plusnet verizon sprint t-mobile us virgin media frontier communications bell sympatico t-online optus mediacom ono talktalk bigpond telstra ttnet türksat telkom indonesia use dns hijacking purposes displaying advertisements collecting statistics dutch isps xs4all ziggo use dns hijacking court order ordered block access pirate bay display warning page instead practices violate rfc standard dns nxdomain responses potentially open users cross-site scripting attacks concern dns hijacking involves hijacking nxdomain response internet intranet applications rely nxdomain response describe condition dns entry specified host one query invalid domain name example www.example.invalid one get nxdomain response – informing application name invalid taking appropriate action example displaying error attempting connect server however domain name queried one non-compliant isps one would always receive fake ip address belonging isp web browser behavior annoying offensive connections ip address display isp redirect page provider sometimes advertising instead proper error message however applications rely nxdomain error instead attempt initiate connections spoofed ip address potentially exposing sensitive information examples functionality breaks isp hijacks dns cases isps provide subscriber-configurable settings disable hijacking nxdomain responses correctly implemented setting reverts dns standard behavior isps however instead use web browser cookie store preference case underlying behavior resolved dns queries continue redirected isp redirect page replaced counterfeit dns error page applications web-browsers opted scheme using cookies opt-out targets http protocol scheme actually implemented protocol-neutral dns system uk information commissioner office acknowledged practice involuntary dns hijacking contravenes pecr ec directive 95/46 data protection require explicit consent processing communication traffic however refused intervene claiming would sensible enforce law would cause significant indeed demonstrable detriment individuals germany 2019 revealed deutsche telekom ag manipulated dns servers also transmitted network traffic non-secure cookies users use https third party company web portal t-online users redirected due dns manipulation owned deutsche telekom user filed criminal complaint deutsche telekom stopped dns manipulations icann international body responsible administering top-level domain names published memorandum highlighting concerns affirming end users dissatisfied poor opt-out options like cookies responded controversy finding ways avoid spoofed nxdomain responses dns software bind dnsmasq offer options filter results run gateway router protect entire network google among others run open dns servers currently return spoofed results user could use google public dns instead isp dns servers willing accept use service google privacy policy potentially exposed another method google track user one limitation approach providers block rewrite outside dns requests opendns owned cisco similar popular service alter nxdomain responses google april 2016 launched dns-over-https service scheme overcome limitations legacy dns protocol performs remote dnssec check transfers results secure https tunnel also application-level work-arounds noredirect firefox extension mitigate behavior approach like fixes one application example firefox address issues caused website owners may able fool hijackers using certain dns settings example setting txt record unused wildcard address e.g *.example.com alternatively try setting cname wildcard example.invalid making use fact '.invalid guaranteed exist per rfc limitation approach prevents hijacking particular domains may address vpn security issues caused dns hijacking
[ 899, 10756, 138, 278, 5531, 1692, 7965, 9117, 8224, 10915, 2996, 3643, 6076, 448, 6209, 10950, 2887, 7251, 5078, 2136, 225, 4198, 8432, 4725, 5749, 8055, 507 ]
Test
8,055
4
ISP_redirect_page:isp redirect page isp redirect page spoof page served major isps including cox communications embarq verizon rogers earthlink various others world wide web users enter invalid dns name user types incorrect uniform resource locator url example codice_1 instead codice_2 isp dns server respond spoofed dns response redirects user advertising web page domain name system dns resolution process translating human-readable domain name example codice_3 ip address computers use every isp runs dns server allow customers translate domain names ip addresses computers understand use isp dns server receives request translate name according rfc dns server return associated ip address customer computer able connect requested resource isp dns server receives request name recognized unavailable isps spoof nx null response instead return ip address search advertising page client client using web browser display search page contains possible suggestions proper address small explanation error search pages often contain advertising paid isp sometimes customer opt-out service opt-out frequently implemented layer spoofing opt-out procedures vary isp isp method implementation effectiveness
[ 2945, 2887, 138, 8054, 119 ]
Test
8,056
5
Simple_Symmetric_Transport_Protocol:simple symmetric transport protocol simple symmetric transport protocol sstp protocol delivering messages clients servers used microsoft groove
[]
None
8,057
9
List_of_programming_language_researchers:list programming language researchers following list researchers programming language theory design implementation related areas
[ 512, 515, 4483, 3462, 6791, 8582, 6420, 1435, 7069, 6558, 9245, 11555, 3876, 5031, 4392, 4777, 6313, 9644, 5165, 5677, 10670, 2482, 564, 692, 1976, 4025, 9915, 6460, 4799, 10560, 11328, 3267, 2372, 8644, 8262, 10568, 10569, 8524, 1613, 55...
Test
8,058
3
QorIQ:qoriq qoriq brand arm-based power isa-based communications microprocessors nxp semiconductors formerly freescale evolutionary step powerquicc platform initial products built around one e500mc cores came five different product platforms p1 p2 p3 p4 p5 segmented performance functionality platform keeps software compatibility older powerpc products powerquicc platform 2012 freescale announced arm based qoriq offerings beginning 2013 qoriq brand p1 p2 p4 product families announced june 2008 details p3 p5 products announced 2010 qoriq p series processors manufactured 45 nm fabrication process available end 2008 p1 p2 mid-2009 p4 2010 p5 qoriq series based 28 nm process pushing aggressive power envelope target capping 30 w. using e6500 core altivec expected shipping 2013 qoriq ls-1 ls-2 families arm based processors using cortex a7 cortex a9 a15 a53 a72 cores upon isa agnostic layerscape architecture available since 2013 target low mid range networking wireless infrastructure applications layerscape ls architecture latest evolution qoriq family features previously provided dpaa like compression may implemented software hardware depending specific chip transparent application programmers ls-1 ls-2 announced use cortex a7 a9 a15 a53 a72 cores initial ls-1 series include accelerated packet processing layer focusing typical power consumption less 3w using two cortex a7 providing ecc caches ddr3/4 1000 1600 mt/s dual pci express controllers x1/x2/x4 operation sd/mmc sata 1/2/3 usb 2/3 integrated phy virtualized etsec gigabit ethernet controllers ls1 means ls1xxx series e.g. ls1021a etc ls2 means ls2xxx series ls2 means higher performance level ls1 indicate second generation middle two digits product name core count last digit distinguishes models cases higher digit meaning greater performance “ ” end indicates arm processor lx designates 16 nm finfet generation ls1 family built layerscape architecture programmable data-plane engine networking architecture ls1 ls2 families processors offer advanced high-performance datapath network peripheral interfaces features frequently required networking telecom/datacom wireless infrastructure military aerospace applications freescale semiconductor inc. acquired nxp semiconductors late 2015 announced network processor system architecture said give flexibility scalability required network infrastructure oems handle market trends connected devices massive datasets tight security real-time service increasingly unpredictable network traffic patterns qoriq p series processors based e500 e5500 cores p10xx series p2010 p2020 based e500v2 core p204x p30xx p40xx e500mc core p50xx e5500 core features include 32/32 kb data/instruction l1 cache 36-bit physical memory addressing appended top virtual address process context process still 32bit double precision floating point unit present cores support virtualization hypervisor layer present products featuring e500mc e5500 dual multi-core devices supports symmetric asymmetric multiprocessing run multiple operating systems parallel p1 series tailored gateways ethernet switches wireless lan access points general-purpose control applications entry level platform ranging 400 800 mhz devices designed replace powerquicc ii pro powerquicc iii platforms chips include among integrated functionality gigabit ethernet controllers two usb 2.0 controllers security engine 32-bit ddr2 ddr3 memory controller ecc support dual four-channel dma controllers sd/mmc host controller high speed interfaces configured serdes lanes pcie sgmii interfaces chip packaged 689-pin packages pin compatible p2 family processors p2 series designed wide variety applications networking telecom military industrial markets available special high quality parts junction tolerances −40 125 °c especially suited demanding doors environments mid-level platform devices ranging 800 mhz 1.2 ghz designed replace powerquicc ii pro powerquicc iii platforms chips include among integrated functionality 512 kb l2 cache security engine three gigabit ethernet controllers usb 2.0 controller 64-bit ddr2 ddr3 memory controller ecc support dual four-channel dma controllers sd/mmc host controller high speed serdes lanes configured three pcie interfaces two rapidio interfaces two sgmii interfaces chips packaged 689-pin packages pin compatible p1 family processors p3 series mid performance networking platform designed switching routing p3 family offers multi-core platform support four e500mc cores frequencies 1.5 ghz chip connected corenet coherency fabric chips include among integrated functionality integrated l3 caches memory controller multiple i/o-devices duart gpio usb 2.0 security encryption engines queue manager scheduling on-chip events serdes based on-chip high speed network configurable multiple gigabit ethernet 10 gigabit ethernet rapidio pcie interfaces p3 family processors share physical package also software backwards compatible p4 p5 p3 processors 1.3 ghz 64-bit ddr3 memory controllers 18 serdes lanes networking hardware accelerators packet handling scheduling regular expressions raid security cryptography rapidio cores supported hardware hypervisor run symmetric asymmetric mode meaning cores run boot operating systems together separately resetting partitioning cores datapaths independently without disturbing operating systems applications p4 series high performance networking platform designed backbone networking enterprise level switching routing p4 family offers extreme multi-core platform support eight e500mc cores frequencies 1.5 ghz chip connected corenet coherency fabric chips include among integrated functionality integrated l3 caches memory controllers multiple i/o-devices duart gpio usb 2.0 security encryption engines queue manager scheduling on-chip events serdes based on-chip high speed network configurable multiple gigabit ethernet 10 gigabit ethernet rapidio pcie interfaces cores supported hardware hypervisor run symmetric asymmetric mode meaning cores run boot operating systems together separately resetting partitioning cores datapaths independently without disturbing operating systems applications help software developers system designers get started qoriq p4080 freescale worked virtutech create virtual platform p4080 used prior silicon availability develop test debug software chip currently simulator p4080 chips announced 2008 complete set network engines processor used telecommunication systems lte enodeb epc wcdma bts freescale 6wind ported 6wind packet processing software p4080 p5 series based high performance 64-bit e5500 core scaling 2.5 ghz allowing numerous auxiliary application processing units well multi core operation via corenet fabric p5 series processors share physical package also software backwards compatible p3 p4 p5 processors 1.3 ghz 64-bit ddr3 memory controllers 18 serdes lanes networking hardware accelerators packet handling scheduling regular expressions raid security cryptography rapidio introduced june 2010 samples available late 2010 full production expected 2011 applications range high end networking control plane infrastructure high end storage networking complex military industrial devices february 2011 freescale introduced qoriq qonverge platform series combined cpu dsp soc processors targeting wireless infrastructure applications psc913x family chips uses e500 core based cpu starcore sc3850 dsps available 2011 manufactured 45 nm process e6500 cs3900 core based 28 nm parts available 2012 called p4xxx qoriq advanced multiprocessing amp series processors based multithreaded 64-bit e6500 core integrated altivec simd processing units except lowest end t1 family uses older e5500 core products range single core versions parts 12 cores frequencies ranging way 2.5 ghz processes sectioned five classes according performance features named t1 t5 manufactured 28 nm process beginning 2012 t4 family uses e6500 64-bit dual threaded core t2 family uses e6500 64-bit dual threaded core t1 family uses e5500 64-bit single threaded core 1.2 1.5 ghz 256 kb l2 cache per core 256kb shared corenet l3 cache qoriq products bring new challenges order design control planes telecommunication systems data plane instance 4 8 cores used p4080 order achieve millions packet processing per seconds system scale regular software stack many cores require different system design order restore simplicity still get highest level performance telecommunication systems based segregation cores cores used control plane others used re-designed data plane based fast path freescale partnered networking company 6wind provide software developers high-performance commercial packet processing solution qoriq platform
[ 6663, 5642, 1548, 11282, 9235, 2073, 11289, 1563, 1057, 38, 4139, 2097, 11314, 8761, 6715, 8253, 6207, 7745, 7747, 2635, 9302, 3168, 99, 1635, 7269, 8812, 3185, 4211, 5235, 7286, 10361, 638, 7299, 644, 1158, 4743, 7302, 7305, 8842, 146, ...
Test
8,059
9
Anders_Hejlsberg:anders hejlsberg anders hejlsberg born 2 december 1960 prominent danish software engineer co-designed several popular commercially successful programming languages development tools original author turbo pascal chief architect delphi currently works microsoft lead architect c core developer typescript hejlsberg born copenhagen denmark studied electrical engineering technical university denmark university 1980 began writing programs nascom microcomputer including pascal compiler initially marketed blue label software pascal nascom-2 however soon rewrote cp/m dos marketing first compas pascal later polypascal later product licensed borland integrated ide become turbo pascal system turbo pascal competed polypascal compiler largely inspired tiny pascal compiler niklaus wirth algorithms data structures programs one influential computer science books time borland hands turbo pascal became one commercially successful pascal compilers hejlsberg remained polydata company came financial stress 1989 moved california become chief engineer borland time developed turbo pascal became chief architect team produced delphi replaced turbo pascal 1996 hejlsberg left borland joined microsoft one first achievements j++ programming language windows foundation classes also became microsoft distinguished engineer technical fellow since 2000 lead architect team developing c language 2012 hejlsberg announced new microsoft project typescript superset javascript hejlsberg received 2001 dr. dobb excellence programming award work turbo pascal delphi c microsoft .net framework together shon katzenberger scott wiltamuth todd proebsting erik meijer peter hallam peter sollich anders awarded technical recognition award outstanding technical achievement work c language 2007 video available microsoft channel 9
[ 8057, 3462, 8262, 6795, 8524, 10991, 883, 3573, 4409, 7450, 9467, 10684, 7775 ]
Test
8,060
3
Thread_control_block:thread control block thread control block tcb data structure operating system kernel contains thread-specific information needed manage tcb manifestation thread operating system example information contained within tcb thread control block acts library information threads system specific information stored thread control block highlighting important information process
[ 9739, 9911 ]
Validation
8,061
4
Proofpoint,_Inc.:proofpoint inc. proofpoint enterprise security company based sunnyvale california provides software service products inbound email security outbound data loss prevention social media mobile devices digital risk email encryption electronic discovery ediscovery ” email archiving claims half fortune 100 users solutions company founded june 2002 eric hahn formerly cto netscape communications launched july 21 2003 raising 7 million series funding round releasing first product lining six customers references backed venture investors benchmark capital stanford university additional 9 million series b funding led new york-based rre ventures announced october 2003 proofpoint became publicly traded company april 2012 time initial public offering ipo company shares traded 13 apiece investors purchased 6.3 million shares ipo raising 80 million company first product proofpoint protection server medium large businesses incorporated described mlx technology proprietary machine learning algorithms applied problem accurately identifying spam email using 10,000 different attributes differentiate spam valid email company joined dozens anti-spam software providers business opportunity fueled exponential increase spam volume threatening worker productivity making spam top business priority according 2004 national technology readinesed number spam detection attributes 50,000 2004 strict new hipaa regulations governing financial disclosures privacy health care data prompted proofpoint begin developing new products would automatically identify intercept outbound email containing sensitive information march 2004 proofpoint introduced first hardware appliance p-series message protection appliance later renamed proofpoint messaging security gateway using hardened linux kernel proofpoint protection server 2.0 software tested infoworld found stop 94 spam another product introduction november 2004 included protection server 3.0 email firewall mlx-based dynamic reputation analysis content security suite plug-in modules designed scanning outbound messages attachments assist compliance data protection regulations sarbanes-oxley hipaa gramm-leach-bliley combination known proofpoint messaging security gateway appliance reviewed channelweb proofpoint appliance stands guard e-mail gate channelweb nov 26 2004 observed used combination technologies policy-based management spam-filtering engine adaptive learning technology proofpoint introduced new product network content sentry add-on appliance content security suite august 2005 designed monitor online messaging email appliance monitors web mail message boards blogs ftp-based communications proofpoint also introduced policy-based email encryption features using identity-based encryption technology licensed voltage security step towards simpler operational requirements proofpoint messaging security gateway virtual edition released april 2007 product runs virtual appliance host running vmware virtual server software moving dedicated hardware appliance virtual server eliminates problems associated proprietary hardware reduces upgrade costs though require knowledge vmware virtual server architecture proofpoint messaging security gateway v5.0 released june 2007 based new integrated architecture combining capabilities single platform could run either dedicated appliance virtual appliance software suite icsa labs independent division verizon business announced april 2007 certified six anti-spam products new testing program one proofpoint messaging security gateway goal icsa labs anti-spam product testing certification evaluate product effectiveness detecting removing spam guidelines also address well products recognize e-mail messages legitimate sources moving software-as-a-service business proofpoint introduced proofpoint demand hosted version email security data loss prevention offerings may 2008 company hosted offerings expanded introduction proofpoint demand—standard edition product targeted small-to-medium size businesses need email security run servers on-site personnel proofpoint products designed solve three business problems advanced cybersecurity threats regulatory compliance brand-impostor fraud calls “ digital risk ” products work across email social media mobile devices cloud june 2008 proofpoint acquired fortiva inc. provider on-demand email archiving software legal discovery regulatory compliance email storage management fortiva used exchange journaling automatically archive internal external communications end users search archived messages including attachments directly search folder outlook proofpoint security portfolio includes products stop traditional cyberattacks delivered via malicious attachments urls socially engineered attacks—such business email compromise bec credential phishing—that use malware uses blend sandbox analysis reputational analysis automated threat data human threat intelligence attributes sender/recipient relationship headers content detect potential threats automated encryption data-loss prevention forensics-gathering tools designed speed incident response mitigate damage costs threats get portfolio also includes protection social-media account takeovers harmful mobile apps rogue wi-fi networks proofpoint compliance products designed reduce manual labor involved identifying potentially sensitive data managing supervising compliance government industry rules producing quickly e-discovery legal requests proofpoint digital risk products aimed companies seeking stop cybercriminals impersonating brand harm customers partners brand reputation email digital risk portfolio includes authentication technology prevent email domain spoofing social media stops scams fraudsters create fake customer-service accounts find people seeking help social media trick handing account credentials visiting malicious website mobile finds counterfeit apps distributed mobile app stores 2016 forrester wave™ digital risk monitoring q3 2016 proofpoint digital risk social media product included evaluation nine top vendors emerging market solutions monitor “ digital ” —i.e. social mobile web dark web—channels detect prevent malicious unwanted content undermining organizational efforts build brand across major social media platforms oct 23 2014 proofpoint acquired nexgate inc. social media security compliance vendor nov 4 2015 proofpoint acquired socialware inc compliance workflow content capture review technology company 2010 2011 2012 2013 2014 2015 2016 gartner magic quadrant identified proofpoint inc. leader “ magic quadrant secure email gateways ” seventh consecutive year gartner magic quadrant identified proofpoint inc. leader enterprise information archiving 2017 2017 sc magazine awards proofpoint inc. awarded best email security solution best regulatory compliance solution 2016 sc magazine award proofpoint inc. awarded best email security trust award forrester research named proofpoint inc. “ leader ” forrester wave™ digital risk monitoring q3 2016 nine vendors matter stack forrester credited proofpoint inc. report proofpoint stands rest pack strong portfolio patents related digital risk monitoring proofpoint essentials wins customers ’ choice award review platform expert insights may 2019
[ 4194, 10245, 11046, 6153, 1484, 3629, 9053, 467, 11225, 7418, 7515, 8061, 9278 ]
None
8,062
3
Phantasie:phantasie phantasie fantasy role-playing video game series designed winston douglas wood published strategic simulations 1985 released apple ii atari 8-bit family atari st amiga commodore 64 ms-dos msx based isle gelnor phantasie allows group six characters adventure countryside try defeat evil black knights sorcerer leader nikademus players could choose one six character classes thief fighter ranger monk priest wizard could also choose races human dwarf halfling elf gnome selecting random one could also choose ogre troll pixie gnoll orc lizard man minotaur races 1986 ssi published next part series phantasie ii dark lord nikademus nemesis time nikademus fashioned evil orb cast curse beautiful island named ferronrah enslaved people player mission find destroy orb final installment trilogy based around fighting evil nikademus finishing good released 1987 time nikademus attempting take entire world party stop entry japan-exclusive pc-9801 msx english translation 50,000 copies sold north america phantasie successful ssi company best-selling commodore game late 1987 phantasie ii sold 30,100 copies phantasie iii sold 46,113 copies phantasie phantasie iii questron ii later re-released together reviewed 1994 dragon 203 sandy petersen eye monitor column petersen gave compilation 2 5 stars
[ 9006, 9166, 6030, 10930, 6426 ]
Test
8,063
2
BESYS:besys besys bell operating system early computing environment originally implemented batch processing operating system 1957 bell labs ibm 704 computer system developed bell recognized definite mismatch…between 704 internal speed sluggishness on-line unit-record equipment inherent slowness manual operations associated stand-alone use goals system initial version system besys-1 use october 16 1957 created george h. mealy gwen hansen wanda lee mammel guidance victor a. vyssotsky utilized ibm fortran north american symbolic assembly program sap programming languages designed efficiently deal large number jobs originating punched cards producing results suitable printing paper punched cards system also provided processing capabilities data stored magnetic tapes magnetic disk storage units typically punched card print processing handled line peripheral electronic accounting machines ibm 1401 computers eventually direct coupled computers first system actually used bell labs besys-2 system resident magnetic tape occupied lowest 64 36-bit words highest4 k words memory upper 4 k words held resident portion monitor could partially swapped magnetic drum free additional core user program needed besys complex software package provided convenient input/output integrated disk file storage facilities besys used extensively many departments bell labs decade made available share organization others without charge formal technical support versions besys environment besys-3 1960 besys-4 1962 besys-5 1963 besys-7 1964 be90 1968 implemented underlying computers transitioned ibm 709x family besys development discontinued bell labs moved ibm system/360 1969 throughout period head besys development project george l. baldwin
[ 6675, 7187, 10776, 25, 4637, 9762, 5158, 7217, 10803, 7733, 9784, 10809, 573, 576, 8262, 10333, 97, 9829, 6248, 8298, 7285, 9335, 2168, 1147, 2172, 3197, 1150, 2179, 10883, 6797, 9361, 9366, 6296, 9370, 7325, 9887, 7848, 8879, 3248, 6837,...
None
8,064
4
SpySheriff:spysheriff spysheriff clones bravesentry pest trap spytrooper spywareno malwarealarm malware disguises anti-spyware software attempts mislead user false security alerts scaring buying program like rogue antiviruses producing list false threats prompts user pay remove software particularly difficult remove since nests components system restore folders also blocks system management tools however spysheriff removed experienced user antivirus software using rescue disk spysheriff hosted www.spysheriff.com www.spy-sheriff.com operated 2005 shutdown 2008 several similarly-named websites also hosted program shut several typosquatted websites also attempted automatically install spysheriff including fake version google.com called goggle.com 2015 goggle.com changed ownership following lawsuit google hosted survey scam displayed links amazon items 2017 domain hosted blank page word goggle present html script beginning 2018 site redirected scam site tango-deg.com october 2018 existed simple html markup top-level heading reading goggle.com inc
[ 10756, 4165, 9287, 9746, 10103, 3320, 8921, 7515, 10392 ]
None
8,065
6
/dev/random:/dev/random unix-like operating systems special files serve pseudorandom number generators allow access environmental noise collected device drivers sources typically blocks less entropy available requested typically never blocks even pseudorandom number generator seed fully initialized entropy since boot blocks boot seed securely initialized enough entropy never blocks operating systems implement methods provide random number generation kernel space implemented first time linux 1994 theodore ts implementation uses secure hashes rather ciphers avoid cryptography export restrictions place generator originally designed implementation also designed assumption given hash cipher might eventually found weak design durable face weaknesses fast recovery pool compromise considered requirement requirements pool compromise sufficient much easier direct attacks unrelated parts operating system ts implementation generator keeps estimate number bits noise entropy pool entropy pool random numbers created read codice_1 device return random bytes within estimated number bits noise entropy pool entropy pool empty reads codice_1 block additional environmental noise gathered intent serve cryptographically secure pseudorandom number generator delivering output entropy large possible suggested authors use generating cryptographic keys high-value long-term protection counterpart codice_1 codice_4 unlimited /non-blocking random source reuses internal pool produce pseudo-random bits means call block output may contain less entropy corresponding read codice_1 codice_4 still intended pseudorandom number generator suitable cryptographic purposes authors corresponding man page note theoretically may exist as-yet-unpublished attack algorithm used codice_4 users concerned attack use codice_1 instead however attack unlikely come existence entropy pool unpredictable n't leak security reduced number bits also possible write codice_1 allows user mix random data pool non-random data harmless privileged user issue ioctl needed increase entropy estimate current amount entropy size linux kernel entropy pool measured bits available codice_10 displayed command codice_11 codice_12 respectively gutterman pinkas reinman march 2006 published detailed cryptographic analysis linux random number generator describe several weaknesses perhaps severe issue report embedded live cd systems routers diskless clients bootup state predictable available supply entropy environment may limited system non-volatile memory recommend saving state rng shutdown included rng state next reboot case router network traffic represents primary available source entropy note saving state across reboots would require potential attackers either eavesdrop network traffic router first put service obtain direct access router internal state issue note particularly critical case wireless router whose network traffic captured distance may using rng generate keys data encryption linux kernel provides support several hardware random number generators installed raw output device may obtained codice_13 linux kernel 3.16 newer kernel mixes data hardware random number generators codice_1 sliding scale based definable entropy estimation quality hwrng means userspace daemon codice_15 codice_16 needed job linux kernel 3.17+ virtio rng modified default quality defined 0 currently hwrng mixed codice_1 default entropy pool improved programs like codice_18 codice_19 codice_20 etc codice_16 hardware random number generators like entropy key etc write codice_1 diehard tests programs codice_23 codice_24 codice_25 test random number generators january 2014 daniel j. bernstein published critique linux mixes different sources entropy outlines attack one source entropy capable monitoring sources entropy could modify output nullify randomness sources entropy consider function h x z h hash function x z sources entropy z output cpu based malicious hrng z bernstein estimated attacker would need repeat h x r 16 times compromise dsa ecdsa possible linux reseeds h ongoing basis instead using single high quality seed october 2016 release linux kernel version 4.8 newer codice_4 switched chacha20-based implementation theodore ts based bernstein well-regarded stream cipher chacha20 given standard shell script code uses /dev/urandom generates cryptmail heavily freebsd operating system provides codice_4 compatibility behavior different linux freebsd codice_4 link codice_1 blocks properly seeded freebsd prng fortuna reseeds regularly attempt estimate entropy system small amount network disk activity reseeding done fraction second entropy pool–based methods completely secure implemented correctly overestimate entropy may become less secure well-seeded prngs cases attacker may considerable amount control entropy example diskless server may get almost network rendering potentially vulnerable man-in-the-middle attacks since openbsd 5.1 may 1 2012 use algorithm based rc4 renamed intellectual property reasons arc4 random number generation uses system entropy gathered several ways arc4 algorithm provides fail-safe ensuring rapid high quality pseudo-random number stream provided even pool low entropy state system automatically uses hardware random number generators provided intel pci hubs available openbsd cryptographic framework openbsd 5.5 may 1 2014 call used openbsd random devices longer uses arc4 chacha20 arc4random name might reconsidered replacement call random netbsd implementation legacy api also switched chacha20 well macos uses 160-bit yarrow based sha1 difference /dev/random /dev/urandom behave identically apple ios also uses yarrow codice_1 codice_4 also available solaris netbsd tru64 unix 5.1b aix 5.2 hp-ux 11i v2 freebsd aix implements yarrow-based design however aix uses considerably fewer entropy sources standard codice_1 implementation stops refilling pool thinks contains enough entropy windows nt similar functionality delivered codice_33 reading special file codice_34 work unix documented methods generate cryptographically random bytes cryptgenrandom rtlgenrandom dos naturally provide functionality open-source third-party driver called codice_35 functions similarly creates two devices codice_36 codice_37 also accessible codice_38 codice_39 programs access random data linux emulator cygwin windows provide implementations codice_1 codice_4 used scripts programs
[ 8976, 10387, 5397, 6808, 10926, 7983, 823, 4925, 701, 593, 7252, 8414, 7139, 8679, 5363, 10620, 5117, 1150, 4863 ]
Validation
8,066
2
Exec_Shield:exec shield exec shield project started red hat inc late 2002 aim reducing risk worm automated remote attacks linux systems first result project security patch linux kernel emulates nx bit x86 cpus lack native nx implementation hardware exec shield project many components people refer first patch exec shield first exec shield patch attempts flag data memory non-executable program memory non-writeable suppresses many security exploits stemming buffer overflows techniques relying overwriting data inserting code structures exec shield also supplies address space layout randomization mmap heap base patch additionally increases difficulty inserting executing shellcode rendering exploits ineffective application recompilation necessary fully utilize exec-shield although applications mono wine xemacs mplayer fully compatible features came exec shield project position independent executables pie address space randomization patch linux kernels wide set glibc internal security checks make heap format string exploits near impossible gcc fortify source feature port merge gcc stack-protector feature exec shield works x86 cpus utilizing code segment limit way exec shield works lightweight however wo n't fully protect arbitrary virtual memory layouts cs limit raised example calling mprotect make higher memory executable protections lost limit ingo molnar points e-mail conversation applications fairly sane stack important part least winds mapped libraries become executable except explicit calls application august 2004 nothing exec shield projects attempt enforce memory protections restricting mprotect architecture although memory may initially executable may become executable later kernel allow application mark memory pages writable executable time however cooperation security-enhanced linux project selinux standard policy fedora core distribution prohibit behavior executables exceptions compatibility reasons exec shield developed various people red hat first patch released ingo molnar red hat first released may 2003 part fedora core 1 6 red hat enterprise linux since version 3 people involved include jakub jelínek ulrich drepper richard henderson arjan van de ven
[ 4616, 3082, 3603, 5139, 10780, 10785, 6180, 7717, 8242, 9266, 5176, 4161, 8772, 6213, 8268, 589, 593, 1632, 6754, 10851, 6244, 5222, 10856, 4207, 5244, 4734, 11391, 7812, 7821, 4238, 10382, 2195, 2711, 6808, 9882, 1694, 2723, 8867, 8364, ...
Validation
8,067
5
WinExe:winexe winexe software allows administrator users execute commands remotely windowsnt/2000/xp/2003/vista/2003/2008 systems gnu/linux winexe distributed pre-built rpm packages source code available well winexe analogous sysinternals tool psexec
[ 5096, 4074, 6797, 7983, 5492, 5397, 823 ]
Test
8,068
2
Npm_(software):npm software npm originally short node package manager package manager javascript programming language default package manager javascript runtime environment node.js consists command line client also called npm online database public paid-for private packages called npm registry registry accessed via client available packages browsed searched via npm website package manager registry managed npm inc. npm written entirely javascript developed isaac z. schlueter result seen module packaging done terribly inspiration similar projects pear php cpan perl npm included recommended feature node.js installer npm consists command line client interacts remote registry allows users consume distribute javascript modules available registry packages registry commonjs format include metadata file json format 477,000 packages available main npm registry registry vetting process submission means packages found low quality insecure malicious instead npm relies user reports take packages violate policies low quality insecure malicious npm exposes statistics including number downloads number depending packages assist developers judging quality packages npm version 6 audit feature introduced help developers identify fix vulnerability security issues installed packages source security issues taken reports found node security platform nsp integrated npm since npm acquisition nsp npm manage packages local dependencies particular project well globally-installed javascript tools used dependency manager local project npm install one command dependencies project codice_8 file codice_8 file dependency specify range valid versions using semantic versioning scheme allowing developers auto-update packages time avoiding unwanted breaking changes npm also provides version-bumping tools developers tag packages particular version npm also provides codice_10 file entry exact version used project evaluating semantic versioning codice_8 number open-source alternatives npm installing modular javascript including codice_12 codice_13 codice_14 codice_15 last released facebook october 2016 compatible public npm registry use default provide different client-side experiences usually focused improving performance determinism compared npm client jsconf 2019 npm former cto announced new federated package registry entropic aimed decentralisation javascript commons
[ 1409, 3971, 3462, 6791, 8582, 1802, 6154, 9487, 788, 1813, 8213, 10900, 8476, 8605, 6176, 1698, 803, 5155, 4775, 5031, 6828, 1203, 438, 4920, 5819, 1470, 190, 1087, 5311, 7871, 8644, 9671, 5578, 5067, 3918, 463, 5070, 339, 3667, 11221, ...
Test
8,069
2
Convergent_Technologies_Operating_System:convergent technologies operating system convergent technologies operating system also known variously ctos btos starsys modular message-passing multiprocess-based operating system ctos many innovative features time system access controlled user password volume disk passwords one knew password example volume one could access file directory volume hard disk volume directory referenced delimiters identify could followed file name depending operation i.e network node volumename directoryname filename possible custom-link operating system add delete features ctos supported transparent peer-to-peer network carried serial rs-422 cables daisy-chain topology later versions carried twisted pair star topology rs-422 adapters workgroup called cluster connected server called master workstations normally diskless booted cluster network master could optionally locally booted attached hard drives inter-process communication ipc primarily based request respond messaging foundation enhanced enterprise application integration among services internal external environments thus ctos well known message-based microkernel architecture applications added services main server client consumes services via mailbox called exchange well-published message formats communication works request codes owned service operating system maintains exchanges message queues scheduling control message passing etc. service manages messages exchange using wait check respond macros ctos ran intel x86 computers could run concurrently windows nt unisys pc system api presented high-level languages assembly language assembler advanced lisp-like pattern-matching macro facility unmatched almost assembler since always-resident debugger system programs written pl/m algol-like language intel compiled directly object code without runtime library word processor one first screen-oriented editors many high-powered features multiple views file cut/copy/paste unlimited undo/redo typing lost crash power failure user-selectable fonts much spreadsheet allowed blocks cells protected editing user input btos version allowed scripts written included opening spreadsheet user input automatically printing graphs based input data system shell extensible making possible define new commands get parameters system would display form filled user input form conventions mandatory optional input fields made easy train new users convergent technologies first product iws integrated workstation based intel 8086 processor ctos operating system modular operating system built-in local area networking ctos supported multiple processes threads message-based interprocess communication companies licensed ctos included bull starsys burroughs btos later merged sperry become unisys unisys single largest customer convergent technologies merged become one company 1988 peak ctos 800,000 users worldwide diskless workstations e.g. bull used intel 80186 processor processor seldom used standard pcs progress software corporation made commercial database application ctos 4gl united states coast guard used databases logistics administration vessels port coreldraw ctos running presentation manager ctos longer marketed new customers former major customers included police forces banks airlines u.s postal service drug enforcement administration u.s. army united states coast guard coast guard used operating system approximately 1986 2000 australia ctos/btos used trade practices commission nsw auditor-general csiro commonwealth electoral office western australia prisons department many commercial banks
[ 512, 6675, 7187, 10776, 25, 4637, 5154, 9762, 5158, 7217, 9784, 10809, 576, 8262, 10333, 97, 8298, 7285, 9335, 2168, 1147, 3197, 1150, 2179, 10883, 6797, 9366, 6296, 7325, 9887, 10926, 3248, 6837, 8388, 9932, 5840, 7382, 8410, 1253, 5363,...
Test
8,070
8
Web_Services_Description_Language:web services description language web services description language wsdl xml-based interface description language used describing functionality offered web service acronym also used specific wsdl description web service also referred wsdl file provides machine-readable description service called parameters expects data structures returns therefore purpose roughly similar type signature programming language current version wsdl wsdl 2.0 meaning acronym changed version 1.1 stood definition wsdl describes services collections network endpoints ports wsdl specification provides xml format documents purpose abstract definitions ports messages separated concrete use instance allowing reuse definitions port defined associating network address reusable binding collection ports defines service messages abstract descriptions data exchanged port types abstract collections supported operations concrete protocol data format specifications particular port type constitutes reusable binding operations messages bound concrete network protocol message format way wsdl describes public interface web service wsdl often used combination soap xml schema provide web services internet client program connecting web service read wsdl file determine operations available server special datatypes used embedded wsdl file form xml schema client use soap actually call one operations listed wsdl file using example xml http current version specification 2.0 version 1.1 endorsed w3c version 2.0 w3c recommendation wsdl 1.2 renamed wsdl 2.0 substantial differences wsdl 1.1 accepting binding http request methods get post version 1.1 wsdl 2.0 specification offers better support restful web services much simpler implement however support specification still poor software development kits web services often offer tools wsdl 1.1 example version 2.0 business process execution language bpel supports wsdl 1.1 subset wsdl swsdl wsdl subset operations original wsdl developer use swsdl access subset service thus handle subset web service code subset wsdl used perform web service testing top development slicing web service done using subset wsdl access subset service subset service categorized layers using swsdl swsdls used web service analysis testing top development awscm pioneer tool construct swsdl successfully xml version= 1.0 encoding= utf-8 description xmlns= http //www.w3.org/ns/wsdl documentation /documentation -- abstract type -- -- abstract interfaces -- -- concrete binding http -- -- concrete binding soap -- -- web service offering endpoints bindings -- /description wsdl 1.0 sept. 2000 developed ibm microsoft ariba describe web services soap toolkit built combining two service description languages nassl network application service specification language ibm sdl service description language microsoft wsdl 1.1 published march 2001 formalization wsdl 1.0 major changes introduced 1.0 1.1 wsdl 1.2 june 2003 working draft w3c become wsdl 2.0 according w3c wsdl 1.2 easier flexible developers previous version wsdl 1.2 attempts remove non-interoperable features also defines http 1.1 binding better wsdl 1.2 supported soap servers/vendors wsdl 2.0 became w3c recommendation june 2007 wsdl 1.2 renamed wsdl 2.0 substantial differences wsdl 1.1 changes following since wsdl files xml-based specification describing web service wsdl files susceptible attack mitigate vulnerability files limiting access generated wsdl files setting proper access restrictions wsdl definitions avoiding unnecessary definitions web services encouraged
[ 11650, 7943, 8203, 6284, 1041, 5907, 10396, 158, 7455, 4768, 545, 10910, 10020, 6775, 7592, 10791, 5048, 1851, 4795, 4797, 6334, 8766, 322, 4419, 2501, 5830, 7878, 9415, 1481, 1354, 5449, 10829, 4688, 3921, 6353, 11353, 8923, 1756, 7261, ...
Test
8,071
7
Scaleform_GFx:scaleform gfx scaleform gfx game development middleware package vector graphics rendering engine used display adobe flash-based user interfaces huds video games result autodesk acquisition scaleform corporation march 2011 scaleform gfx became part autodesk gameware line middleware july 12th 2018 autodesk discontinued scaleform gfx longer available purchase authors created user interfaces using adobe flash authoring tools adobe flash professional resulting swf files could used directly gfx libraries providing similar functionality adobe flash player optimized use within game engines major platforms supported including game consoles mobile pc operating systems scaleform provided apis direct communication flash content game engine pre-built integrations popular engines unity unreal engine cryengine scaleform gfx could also licensed use standalone flash runtime system mobile platforms competing adobe air scaleform gfx contained several core systems including addition engine documentation samples scaleform gfx sdk included several additional components scaleform also provided two optional add-ons gfx
[ 2304, 4292, 8937, 4378, 9579, 6797, 10316, 10097, 2804, 2293, 3413, 823, 8185, 3130, 9691, 10076, 2943 ]
Test
8,072
3
Intel_8251:intel 8251 8251 universal synchronous/asynchronous receiver/transmitter packaged 28-pin dip made intel typically used serial communication rated per second signalling rate commonly confused much common 8250 uart made popular serial port ibm personal computer includes 5 sections version 8251a available us 6.40 quantity 100 intel 8251a used intel sdk-86 mcs-86 system design kit dec la120 printing terminal
[]
Train
8,073
5
Virtual_Router_Redundancy_Protocol:virtual router redundancy protocol virtual router redundancy protocol vrrp computer networking protocol provides automatic assignment available internet protocol ip routers participating hosts increases availability reliability routing paths via automatic default gateway selections ip subnetwork protocol achieves creation virtual routers abstract representation multiple routers i.e master backup routers acting group default gateway participating host assigned virtual router instead physical router physical router routing packets behalf virtual router fails another physical router selected automatically replace physical router forwarding packets given time called master router vrrp provides information state router routes processed exchanged router vrrp instance limited scope single subnet advertise ip routes beyond subnet affect routing table way vrrp used ethernet mpls token ring networks internet protocol version 4 ipv4 well ipv6 protocol described internet engineering task force ietf publication rfc 5798 open standard cisco claims similar protocol essentially facility patented licensed however reply direct request robert barr cisco replied 2001 assert patent claims unless someone tried assert claim cisco ibm also claims covering patents statement readable ietf webpage virtual router must use 00-00-5e-00-01-xx media access control mac address last byte address xx virtual router identifier vrid different virtual router network address used one physical router time reply mac address arp request sent virtual router ip address physical routers within virtual router must communicate within using packets multicast ip address 224.0.0.18 ip protocol number 112 routers priority 1 254 router highest priority become master default priority 100 mac address owner priority always 255 failure receive multicast packet master router period longer three times advertisement timer causes backup routers assume master router dead virtual router transitions unsteady state election process initiated select next master router backup routers fulfilled use multicast packets backup router supposed send multicast packets election process one exception rule physical router configured higher priority current master means connection network preempt master status allows system administrator force physical router master state immediately booting example particular router powerful others within virtual router backup router highest priority becomes master router raising priority current master take responsibility routing packets sent virtual gateway mac address cases backup routers priority backup router highest ip address becomes master router physical routers acting virtual router must local area network lan segment communication within virtual router takes place periodically period adjusted changing advertisement interval timers shorter advertisement interval shorter black hole period though expense traffic network security achieved responding first hop packets though mechanisms provided reinforce particularly local attacks election process made orderly use skew time derived router priority used reduce chance thundering herd problem occurring election skew time given formula 256 − priority /256 expressed milliseconds backup router utilization improved load sharing see rfc 5798 vrrp based cisco proprietary hot standby router protocol hsrp concepts protocols similar concept compatible
[ 5472, 3042, 11461, 6214, 841, 2954, 5486, 3323, 6834, 7411, 7702, 2811, 5469, 5470 ]
Train
8,074
4
Blancco_Technology_Group_plc:blancco technology group plc blancco technology group global provider mobile device diagnostics secure data erasure products company divided two distinct business units blancco data erasure smartchk mobile diagnostics data erasure solution providers blancco technology group holds highest number certifications approvals recommendations national international governing bodies including united states department defense nato tuv saarland dipcog originally known regenersis plc lse rgs blancco technology group plc lse bltg formed 2016 result number software business acquisitions following acquisitions regenersis disposed repair division focus pure-play software business renamed blancco technology group plc company divided two distinct business units blancco data erasure smartchk mobile diagnostics blancco technology group employs 240 people worldwide across north america europe asia australia company headquartered alpharetta ga united states certified data erasure software hardware see blancco mobile device diagnostics software business intelligence see smartchk blancco technology group started regenersis plc provider diagnostics repair data erasure services consumer electronics industry regenersis filed ipo 2005 public company london stock exchange year acquired intec group intec cellular services intec distribution blancco technology group partners multiple resellers distributors including asset disposition vendors mobile services recycling providers data centers cloud storage providers
[ 11368, 9086 ]
Test
8,075
6
High_Sierra_Format:high sierra format high sierra format hsf early logical file system used cd-roms 1985 1986 later ecma-119 iso 9660 standards based revised hsf compact discs originally developed recording musical data soon used storing additional digital data types equally effective archival mass data storage first every cd-rom maker created format high-level standards yellow book cd-rom standard lowest level need standard organizing data compact disks logical units files order develop cd-rom file system standard z39.60 volume file structure cdrom information interchange national information standards organization niso set standards committee sc ee compact disc data format july 1985 september/ october 1985 several companies invited experts participate development working paper standard november 1985 representatives computer hardware manufacturers gathered high sierra hotel casino currently called hard rock hotel casino near lake tahoe california group became known high sierra group hsg present meeting representatives apple computer digital equipment corporation dec hitachi laserdata microware microsoft 3m philips reference technology inc. sony corporation tms inc. videotools later meridian xebec yelick meeting report evolved yellow book cd-rom standard data cds open ended leading diversification creation many incompatible data storage methods high sierra group proposal hsgp released may 1986 draft version submitted european computer manufacturers association ecma changes led issue initial edition ecma-119 standard december 1986 ecma submitted standard international standards organization iso fast tracking refined iso 9660 compatibility second edition ecma-119 revised equivalent iso 9660 december 1987. published 1988 ecma-119 iso 9660 needed hsf geared primarily towards needs us market international extensions bulk differences formats order create incompatibilities niso suspended work z39.60 adopted niso members 28 may 1987 withdrawn final approval favour iso 9660
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 7720, 7225, 11323, 8772, 1109, 4708, 9836, 7789, 8301, 5231, 9329, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 5...
None
8,076
2
Fedora_Media_Writer:fedora media writer fedora media writer formerly fedora live usb creator free open-source tool designed create live usb operating systems
[ 934, 6797, 7983, 11221, 823, 6012, 4637 ]
None
8,077
2
OpenSolaris_for_System_z:opensolaris system z opensolaris system z discontinued port opensolaris operating system ibm system z line mainframe computers opensolaris based solaris originally released sun 1991 sun microsystems released bulk solaris system source code opensolaris 14 june 2005 made possible developers create opensolaris distributions sine nomine associates began project bring opensolaris ibm mainframe july 2006 project named sirius analogy polaris project port opensolaris powerpc april 2007 sine nomine presented initial progress report ibm system z technical expo conference gartner data center conference las vegas nevada late 2007 sine nomine demonstrated opensolaris running ibm system z z/vm david boyes sine nomine stated opensolaris system z would available soon share conference 13 august 2008 neale ferguson sine nomine associates presented update progress opensolaris system z presentation included working demonstration opensolaris system z presentation stated opensolaris ready prime-time hoped version available public testing matter weeks rather months october 2008 sine nomine associates released first prototype lacks number features dtrace solaris containers ability act nfs server opensolaris system z public opensolaris system z project page opensolaris.org opensolaris system z available download charge governed open source license terms opensolaris platforms source code available oco object code modules port uses z/architecture 64-bit addressing therefore requires ibm system z mainframe port depends recently defined z/architecture processor instructions requires system z9 later mainframe model run older machines also run release version hercules mainframe emulator needed changes included svn version 5470 hercules also requires paravirtualization features provided z/vm run bare metal logical partition lpar without z/vm hypervisor version 5.3 level later also opensolaris uses new network diagnose instruction ptf vm64466 vm64471 must applied z/vm provide support instruction 18 november 2008 ibm authorized use ifl processors run opensolaris system z workloads register reported march 2010 email insider saying
[ 10883, 4996, 7053, 9361, 9468, 789, 2967, 11673, 9370, 3359, 5280, 6049, 9343, 421, 7848, 1323, 6445, 8879, 7217, 10803, 7733, 7607, 10040, 5562, 573, 9665, 1219, 8388, 6342, 1235, 5335, 863, 11363, 868, 3429, 9829, 6248, 366, 381, 5240, ...
None
8,078
3
Program_status_word:program status word program status word psw ibm system/360 architecture successors control register performs function status register program counter architectures although certain fields within psw may tested set using non-privileged instructions testing setting remaining fields may accomplished using privileged instructions contained within psw two bit condition code representing zero positive negative overflow similar flags architectures status registers conditional branch instructions test encoded four bit value bit representing test one four condition code values 2 2 2 2 since ibm uses big-endian bit numbering mask value 8 selects code 0 mask value 4 selects code 1 mask value 2 selects code 2 mask value 1 selects code 3 64-bit psw describes among things early instances architecture system/360 early system/370 instruction address 24 bits later instances xa/370 instruction address 31 bits plus mode bit 24 bit addressing mode zero 31 bit addressing mode one total 32 bits present instances architecture z/architecture instruction address 64 bits psw 128 bits psw may loaded load psw instruction lpsw lpswe contents may examined extract psw instruction epsw
[ 7607, 9911, 9739, 10508, 10796, 3630, 5457, 5234, 663, 2745, 2811 ]
Test
8,079
9
Scilab:scilab scilab free open-source cross-platform numerical computational package high-level numerically oriented programming language used signal processing statistical analysis image enhancement fluid dynamics simulations numerical optimization modeling simulation explicit implicit dynamical systems corresponding toolbox installed symbolic manipulations scilab one two major open-source alternatives matlab one gnu octave scilab puts less emphasis syntactic compatibility matlab octave similar enough authors suggest easy transfer skills two systems scilab high-level numerically oriented programming language language provides interpreted programming environment matrices main data type using matrix-based computation dynamic typing automatic memory management many numerical problems may expressed reduced number code lines compared similar solutions using traditional languages fortran c c++ allows users rapidly construct models range mathematical problems language provides simple matrix operations multiplication scilab package also provides library high-level operations correlation complex multidimensional arithmetic software used signal processing statistical analysis image enhancement fluid dynamics simulations numerical optimization scilab also includes free package called xcos fork scicos based modelica language modeling simulation explicit implicit dynamical systems including continuous discrete sub-systems xcos open source equivalent simulink mathworks syntax scilab similar matlab scilab includes source code translator assisting conversion code matlab scilab scilab available free cost open source license due open source nature software user contributions integrated main program scilab syntax largely based matlab language simplest way execute scilab code type prompt codice_1 graphical command window way scilab used interactive mathematical shell hello world scilab plotting 3d surface function v scilab many contributed toolboxes different tasks available atoms portal scilab forge scilab created 1990 researchers inria école nationale des ponts et chaussées enpc initially named ψlab psilab scilab consortium formed may 2003 broaden contributions promote scilab worldwide reference software academia industry july 2008 order improve technology transfer scilab consortium joined digiteo foundation scilab 5.1 first release compiled mac available early 2009 supported mac os x 10.5 a.k.a leopard thus osx 10.4 tiger never supported except porting sources linux windows builds released since beginning solaris support dropped version 3.1.1 hp-ux dropped version 4.1.2 spotty support june 2010 consortium announced creation scilab enterprises scilab enterprises develops markets directly international network affiliated services providers comprehensive set services scilab users scilab enterprises also develops maintains scilab software ultimate goal scilab enterprises help make use scilab effective easy february 2017 scilab 6.0.0 released leveraged latest c++ standards lifted memory allocation limitations since july 2012 scilab developed published scilab enterprises early 2017 scilab enterprises acquired virtual prototyping pioneer esi group since 2016 scilab embedded browser called via interface written scilab api new deployment method notable advantages masking code data well providing large computational power
[ 2304, 7301, 5129, 3980, 6797, 15, 5395, 5148, 7580, 7326, 5023, 9376, 10145, 5677, 1917, 7341, 7983, 2481, 6450, 6962, 9133, 823, 6718, 2242, 5830, 5703, 8262, 5833, 4042, 11207, 462, 8162, 11239, 4840, 363, 7148, 5741, 9330, 3960, 11385,...
None
8,080
2
Features_new_to_Windows_XP:features new windows xp windows xp introduced many features found previous versions windows introduction windows xp c++ based software-only gdi+ subsystem introduced replace certain gdi functions gdi+ adds anti-aliased 2d graphics textures floating point coordinates gradient shading complex path management bicubic filtering intrinsic support modern graphics-file formats like jpeg png support composition affine transformations 2d view pipeline gdi+ uses argb values represent color use features apparent windows xp user interface transparent desktop icon labels drop shadows icon labels desktop shadows menus translucent blue selection rectangle windows explorer sliding task panes taskbar buttons several applications microsoft paint windows picture fax viewer photo printing wizard pictures slideshow screensaver presence basic graphics layer greatly simplifies implementations vector-graphics systems flash svg gdi+ dynamic library shipped application used older versions windows total number gdi handles per session also raised windows xp 16384 65536 configurable registry windows xp shipped directx 8.1 brings major new features directx graphics besides directx audio directsound directmusic directplay directinput directshow direct3d introduced programmability form vertex pixel shaders enabling developers write code without worrying superfluous hardware state fog bump mapping texture mapping directx 9 released 2003 also sees major revisions direct3d directsound directmusic directshow direct3d 9 added new version high level shader language support floating-point texture formats multiple render targets texture lookups vertex shader windows xp upgraded directx 9.0c shader model 3.0 later included windows xp sp2 windows xp sp3 added windows imaging component windows xp includes cleartype subpixel rendering makes onscreen fonts smoother readable liquid crystal display lcd screens although cleartype effect crt monitors primary use lcd/tft-based laptop notebook modern 'flatscreen displays cleartype windows xp currently supports rgb bgr sub pixel structures parameters contrast set via cleartype tuner powertoy microsoft makes available free download typography website windows xp start button updated support fitts law help user access wider range common destinations easily single location start menu expanded two columns left column focuses user installed applications right column provides access user documents system links previously located desktop links documents pictures special folders brought fore computer network places network neighborhood windows 95 98 icons also moved desktop start menu making easier access icons number applications open desktop remains clean moreover links configured expand cascading menu frequently used programs automatically displayed left column newly installed programs highlighted user may opt pin programs start menu always accessible without navigate programs folders default internet browser default email program pinned start menu start menu fully customizable links added removed number frequently used programs display set programs menu expands like classic start menu utilize entire screen set scroll programs user name user account picture also shown start menu taskbar buttons running applications quick launch also updated fitt law locking taskbar prevents accidentally resized moved elements quick launch deskbands also locked accidentally moved taskbar grouping feature combines multiple buttons application single button clicked pops menu listing grouped windows number advanced taskbar grouping options configured registry user choose always show always hide hide notification area icons inactive time button allows user reveal icons taskbar set thicker height also displays day date notification area significant changes made windows explorer windows xp visually functionally microsoft focused especially making windows explorer discoverable task-based well adding number features reflect growing use computer “ digital hub ” task pane displayed left side window instead traditional folder tree view navigation pane turned presents user list common actions destinations relevant current directory file selected instance directory containing mostly pictures set “ picture tasks ” shown offering options display pictures slide show print go online order prints conversely folder containing music files would offer options play files media player go online purchase music every folder also “ file folder tasks ” offering options create new folders share folder local network publish files folders web site using web publishing wizard common tasks like copying renaming moving deleting files folders file types identified printable also option listed print file underneath “ file folder tasks ” “ places ” always lists parent folder folder viewed includes additional links common locations “ computer ” “ control panel ” “ documents ” previously navigated locations change depending folder user underneath “ places ” “ details ” area gives additional information file folder selected – typically file type file size date modified depending file type author image dimensions attributes details file type thumbnail image handler installed preview also appears details task pane music files might show artist album title length song information also shown horizontally status bar “ folders ” button windows explorer toolbar toggles traditional navigation pane containing tree view folders task pane users also close navigation pane clicking close button right corner well turn task pane folder options navigation pane enhanced windows xp support simple folder view turned hides dotted lines connect folders subfolders makes folders browsable single click still keeping double clicking right pane single clicking simple folder view auto expands folder clicking another folder automatically expands folder collapses previous one windows xp introduced large number metadata properties shown columns details view explorer new tiles view explorer summary tab file properties file tooltip explorer status bar single file selected users also gain ability sort property turned details view developers write column handler shell extensions define properties files sorted column items sorted highlighted sorting files folders ascending order descending order views details view reverse order user simply perform sort property sort order also made intuitive compared one windows 2000 file names containing numbers windows explorer tries sort based numerical value rather comparing number digit digit every character position file name instance files containing 1 2 .. 10 intuitively sorted 10 appearing 9 instead appearing 1 2 right pane windows explorer show groups feature allows explorer separate contents headings based field used sort items items thus grouped detail turned show groups available thumbnails tiles icons details views microsoft introduced animated search companions attempt make searching engaging friendly default character puppy named rover three characters merlin magician earl surfer courtney also available search companions powered microsoft agent technology bear great deal similarity microsoft office ’ office assistants even incorporating “ tricks ” sound effects user wishes also turn animated character entirely search capability fairly similar windows windows 2000 important additions indexing service extract exif properties well metadata asf wmv mp3 files windows xp via ipropertystorage interface using built-in null filter search also instructed search files categorically “ documents ” “ pictures music video searching perceived type feature noteworthy largely windows determines types files classified categories another important addition look field accepts expands environment variables abbreviated entry long paths also users configure whether windows xp searches system and/or hidden files folders using tweak ui search user interface restored one used windows 2000 windows xp improves image preview offering filmstrip view shows images single horizontal row large preview currently selected image “ back ” “ previous ” buttons facilitate navigation pictures pair “ rotate ” buttons offer 90-degree clockwise counter-clockwise rotation images filmstrip view like view turned per folder view available new common tasks folder view selected windows classic folder view aside filmstrip view mode 'thumbnails view displays thumbnail-sized images folder also displays images subfolder may containing 4 default overlaid large folder icon folder thumbnail view customized customize tab accessible properties users also change folder icon specify template type pictures music videos documents folder optionally subfolders size quality thumbnails thumbnails view adjusted using tweak ui registry exif metadata stored image also shown file properties summary tab details view view status bar windows xp optionally caches thumbnails thumbs.db file folder pictures thumbnails generated faster next time thumbnails forced regenerate right-clicking image thumbnail filmstrip views selecting refresh thumbnail autoplay examines newly discovered removable media devices based content pictures music video files launches appropriate application play display content autoplay confused autorun created order simplify use peripheral devices – mp3 players memory cards usb storage devices others – automatically starting software needed access view content devices autoplay enhanced autoplay-compatible software hardware configured user associate favourite applications autoplay events actions actions called autoplay handlers sets handlers associated various types content new autoplay handlers get added system additional software installed user edit delete create autoplay handlers using tweakui autoplay settings configured per-device windows xp device properties user inserts optical disc drive attaches usb camera windows detects arrival starts process examining device searching medium looking properties device content medium autoplay present set meaningful options user user makes particular choice also option make selection automatic next time windows sees content device content types available vary type drive selected windows xp includes windows picture fax viewer based gdi+ capable viewing image formats supported gdi+ namely jpeg bmp png gif including animated gifs ico wmf emf tiff format files supersedes part functions imaging windows previous versions windows windows picture fax viewer integrated windows explorer functions like slideshow email printing etc quickly starts image double clicked windows explorer supports full file management within viewer right clicking image shows context menu one shown image right clicked windows explorer images set desktop wallpaper context menu supports successive viewing images current folder looping images viewing last image directory shows first image vice versa default images smaller user display resolution shown actual size image larger display resolution scaled fit screen best fit images zoomed depending viewing area done scroll bars allow viewing areas image standard toolbar buttons delete print copy open copy button converts image different format supported gdi+ jpeg bmp gif tiff png print button starts photo printing wizard allows printing images picture titles using various page layouts full page prints wallet prints contact/index sheets certain fixed dimensions images cropped rotated fit page wizard shows preview printed page look like currently specified options windows picture fax viewer also rotate images clockwise anti-clockwise start slideshow selected images folder e-mail selecting send mail recipient option options allow image mailed full size pixel dimensions 640 x 480 800 x 600 1024 x 768 using tweak ui time images slideshow adjusted windows picture fax viewer recognizes embedded icc v2 color profiles jpg tiff files gif files shown full animation even zoomed tiff files annotated using annotation toolbar appears bottom screen lines drawn tiff image text added areas image selected concealed windows picture fax viewer also capable viewing multi-page tiff files however tiff images jpeg compression fully supported last button standard toolbar opens image editing default microsoft paint however editing application registered button viewer windows picture fax viewer saves remembers window position size supports keyboard shortcuts operations raw image formats preferred formats professional photography supported however microsoft released later update called raw image thumbnailer viewer windows xp viewing certain raw image files text services framework tsf com framework api introduced windows xp supports advanced text input text processing text services framework designed offer advanced language word processing features applications supports features multilingual support keyboard drivers handwriting recognition speech recognition well spell checking text natural language processing functions also downloadable older windows operating systems language bar core user interface text services framework language bar enables text services add ui elements toolbar enables elements application focus language bar users select input language control keyboard input handwriting recognition speech recognition language bar also provides direct means switch installed languages even non-tsf-enabled application focus windows xp kernel completely different kernel windows 9x/me line operating systems although upgrade windows 2000 kernel major scalability stability performance improvements albeit transparent end user windows xp includes simultaneous multithreading hyperthreading support simultaneous multithreading processor ability process one data thread time windows xp supports larger system virtual address space –— 1.3 gb contiguous virtual address space used device drivers 960 mb windows xp memory manager redesigned consume less paged pool allowing caching greater availability paged pool component needs total size memory-mapped files windows 2000 limited memory manager allocated prototype page table entries pptes pages required map entire file even application created mapped views parts file windows xp prototype ptes allocated active views allowing larger mapped files benefit example case making backups large files low memory systems paged pool limit 470 mb lifted memory manager windows xp unmapped views dynamically reusable memory manager depending pool usage memory pages working sets trimmed efficiently multiprocessor systems depending recently accessed lock contention reduced number unnecessary locks used resource synchronizations ram allocation mapping address windowing extensions system page table entries charging non-paged/paged pool quotas charging commitment pages removed dispatcher lock contention reduced page frame number pfn lock optimized increased parallelism granularity windows xp uses push locks event synchronization object contention support shared exclusive acquisition push locks used protect handle table entries executive object manager protect data structures security descriptors memory manager protect awe-related locks windows xp uses sysenter/sysexit mechanisms require fewer clock cycles transition user mode kernel mode speed system calls kernel page write protection limit windows xp enabled systems 256 mb ram beyond large pages enabled increased address translation performance windows xp introduces creatememoryresourcenotification function notify user mode processes high low memory availability applications allocate memory free memory necessary previous versions windows registry size limited 80 paged pool size windows xp registry reimplemented outside paged pool registry hives memory mapped cache manager system cache eliminating registry size limit registry size limited available disk space system hive still maximum size raised 12 mb 200 mb eliminating issue previous windows versions faced unable boot large fragmented system hive configuration manager updated minimize registry memory footprint lock contention reduce fragmentation thus page faults accessing registry improved algorithms speed registry query processing in-memory security cache eliminates redundant security descriptors windows xp supports cross user session debugging attaching debugger non-crashing user-mode program dumping process memory space using dump command detaching debugger without terminating debugging done firewire port local system debug heap disabled standard heap used debugging windows xp introduces support vectored exception handling vectored exception handling made available windows programmers using languages c++ visual basic veh replace structured exception handling seh rather veh seh coexist veh handlers priority seh handlers compared seh veh works like traditional notification callback scheme applications intercept exception calling addvectoredexceptionhandler api watch handle exceptions vectored handlers chained order linked list n't tied stack frame added anywhere call stack unlike seh try/catch blocks heap leak detection enabled processes exit debugger extension used investigate leaks also introduced new heap performance-monitoring counter windows xp introduces new low fragmentation heap policy disabled default allocates memory distinct sizes blocks less 16kb reduce heap fragmentation low fragmentation heap enabled default heaps using lfh heap enabler utility new apis irp cancellation registering file system filter callbacks intercept os fast i/o functions low memory conditions must succeed calls denied causing slowdown preventing bug check i/o throttled fetch one memory page time increasing overall scalability windows xp includes ntfs 3.1 expands master file table mft entries redundant mft record number useful recovering damaged mft files ntfs conversion utility convert.exe supports new /cvtarea switch ntfs metadata files written contiguous placeholder file resulting less fragmented file system conversion ntfs 3.1 also supports symbolic links although tools drivers shipped windows xp create symbolic links windows xp introduces ability mount ntfs read-only volumes new apis preserve original short file names retrieve list mount points drive letters mounted folder paths specified volume enable applications create large files quickly setting valid data length files without force-writing data zeroes vdl setfilevaliddata function instance function used quickly create fixed size virtual machine hard disk default access control lists newly created files read-only users group write permissions given administrators group system account owner ability boot 30 seconds design goal windows xp microsoft developers made efforts streamline system much possible logical prefetcher significant part monitors files loaded boot optimizes locations files disk less time spent waiting hard drive heads move issues large asynchronous i/o requests overlapped device detection initialization occurs boot prefetcher works tracing frequently accessed paged data used task scheduler create prefetch-instructions file windir \prefetch system boots application started data code specified trace already memory prefetched disk previous prefetching results determine scenario benefited prefetched next boot launch prefetcher also uses algorithms reduce application startup times reduce disk seeking even disk defragmenter called idle time optimize layout specific files metadata contiguous area boot resume operations traced analyzed using bootvis.exe windows xp includes fast logon optimization feature performs logon asynchronously without waiting network fully initialized roaming user profiles set use cached credentials avoids delays logging domain group policy applied background startup logon scripts execute asynchronously default windows xp reconciles local roaming user profiles using copy contents registry user longer made wait windows 2000 profile unloaded windows xp saves locked registry hives open keys 60 seconds roaming profile changes saved back server problem left computer recover memory profile uses unloaded make sure user profiles completely reconciled correctly logoff microsoft released user profile hive cleanup service windows xp later included windows vista windows xp offers enhancements usability resilience corruption performance roaming user profiles new group policies prevent propagation roaming user profile changes server give administrators control users profile folders preventing use roaming user profiles specific computers accommodate scenario older profile would overwrite newer server profile due windows xp fast logon feature windows xp ensures situation user registry hive copied server local profile deletion profiles marked deletion next logoff fail locked profiles workgroup computers windows xp longer deletes profiles users belonging guests group windows xp includes changes behavior offline files offline files client-side cache encrypted encrypting file system shared folders dfs namespaces made available offline also roaming user profiles synchronized server even offline files marked server unavailable windows xp service pack 2 kb811660 introduce additional functionality offline files editing registry users suppress error messages file types offline files cache excluded synchronization offline files user primary computer determined matching current user sid specified sid registry set purge logoff administratively assigned offline files also prevented cached non-primary users beginning windows xp folders redirected network automatically made available offline using offline files although optionally disabled group policy older windows nt 4.0 earlier systems legacy directory structure windows xp allows redirecting documents folder home directory windows xp improvements made system restore compared windows system restore uses copy-on-write file system filter driver taking snapshots windows xp system restore configurable per volume data stores also stored per volume ntfs volumes restore points stored using ntfs compression protected using acls disk cleanup handler allows deleting recent restore point besides registry hives system files com+ wmi databases iis metabase also restored system restore supports group policy system restore windows xp also works without issues efs-encrypted files automated system recovery feature provides ability save restore windows installed applications system state critical boot system files special backup instead plain reinstall asr consists two components backup restore backup portion located ntbackup backs system state windows registry com+ class registration database active directory sysvol directory share volumes associated operating system components required start windows restore well configuration basic dynamic restore portion asr accessed pressing f2 windows xp text mode setup automated system recovery even restore programs device drivers added asr setup information disk asr restore data files common issue previous versions windows users frequently suffered dll hell one version dynamically linked library dll installed computer software relies dlls using wrong version could result non-functional applications worse windows 98 second edition windows 2000 partially solved problem native code introducing side-by-side component sharing dll/com redirection operating systems allowed loading private version dll placed application folder developer instead system directory must registered properly system windows xp improves upon introducing side-by-side assemblies com+ 2.0 .net com classic win32 components c runtime gdi+ common controls technology keeps multiple digitally signed versions shared dll centralized winsxs folder runs demand appropriate application keeping applications isolated using common dependencies manifests assembly version number used os loader determine correct binding assembly versions applications instead globally registering components achieve windows xp introduces new mode com object registration called registration-free com regfree com allows component object model com components store activation metadata clsid codice_1 component without using registry instead metadata clsids classes implemented component declared assembly manifest described using xml stored either resource executable separate file installed component allows multiple versions component installed different directories described manifests well xcopy deployment application loading windows loader searches manifest present loader adds information activation context com class factory tries instantiate class activation context first checked see implementation clsid found lookup fails registry scanned windows error reporting collects offers send post-error debug information memory dump using internet developer application crashes stops responding user desktop data sent without user consent dump error signature information reaches microsoft server analyzed solution sent back user one available windows error reporting runs windows service optionally entirely disabled software hardware manufacturers may access error reports using microsoft winqual program software hardware manufacturers also close loop customers linking error signatures windows error reporting responses allows distributing solutions well collecting extra information customers reproducing steps took crash providing support links old versions windows users upgrade device driver chance new driver less stable efficient functional original reinstalling old driver major hassle avoid quandary windows xp keeps copy old driver new version installed new driver problems user return previous version feature work printer drivers windows xp merged consumer enterprise versions windows needed support applications developed popular consumer-oriented windows 9x platform windows nt kernel microsoft addressed improving compatibility application-specific tweaks shims providing tools application compatibility toolkit appcompat act allow users apply automate tweaks shims applications users script compatibility layer using batch files windows xp setup also includes compatibility checker warns users setup begins incompatible applications device drivers applications may need reinstallation windows xp rtm includes windows media player version 8 officially called windows media player windows xp windows media 8 codecs windows media player windows xp introduced id3 support mp3s editing media information within library adding lyrics mp3 wma tracks file name customization ripping new visualizations support hdcds ability lockdown player corporate environment dvd playback support appropriate codecs installed separately windows xp sp2 includes windows media player 9 series windows media format runtime 9.0 upgradeable version 11 player format runtime windows media player also incorporates newer hardware support portable devices means media transfer protocol user-mode driver framework-based windows portable devices api original rtm release windows xp included windows movie maker 1.1 added non-compressed dv avi recording digital video sources windows movie maker 2 free download released 2002 later incorporated windows xp sp2 windows movie maker 2 introduced numerous new transitions effects titles credits task pane resizable preview window dimensions improved capture export options automovie feature saving final video back tape custom wmv export profiles windows xp media center edition 2005 includes windows movie maker 2.5 includes dvd burning windows xp includes advances broadcast driver architecture receiving capturing analog digital tv broadcasts complete signal demodulation tuning software de-multiplexing electronic program guide store ip data broadcasting etc addition windows xp media center edition introduced windows media center application pvr-like recording playback features tv content windows xp includes improved firewire ieee 1394 support dvcpro25 525-60 625-50 digital video cameras audio video devices introduces mstape wdm driver d-vhs mpeg camcorder devices windows xp sp2 adds support dvcpro50 dvcpro100 directshow 8 introduces video mixing renderer-7 vmr-7 filter uses directdraw 7 video rendering replacing overlay mixer vmr-7 mix multiple streams graphics alpha blending allowing applications draw text closed captions graphics channel logos ui buttons video without flickering support compositing implement custom effects transitions vmr-7 also supports source color keying overlay surface management frame-stepping improved multiple-monitor support vmr-7 features windowless mode applications easily host video playback within window renderless playback mode applications access composited image rendered directx 9 introduced vmr-9 uses direct3d 9 instead directdraw allowing developers transform video images using direct3d pixel shaders windows xp sp2 introduced yuv mixing mode vmr-7 vmr-9 renderers performs mixing yuv color space save memory bandwidth directshow 8 includes avstream multimedia class driver video-only audio-video kernel streaming windows xp provides new and/or improved drivers user interfaces devices compared windows 98 beginning windows xp service pack 1 generic usb 2.0 enhanced host controller interface drivers included windows xp also adds support usb device classes bluetooth usb video device class imaging still image capture device class media transfer protocol windows media player 10 mass storage devices windows xp introduces hardware descriptors distinguish various storage types operating system set appropriate default write caching policy example usb devices disables write caching default surprise removal devices cause data loss device manager provides configuration setting whether optimize devices quick removal performance windows xp supports twain well windows image acquisition-based scanners windows image acquisition windows xp adds support automatic document feeder scanners scroll-fed scanners without preview capabilities multi-page tiff generation wia video snapshot filter driver introduced allows still frames captured video stream windows xp sp1 later support downloadable wia library v2.0 provides access wia functionality programming languages scripting environments support ole automation scanner camera wizard based windows image acquisition common dialogs wia devices improved windows xp show media information metadata rotate images necessary categorize subfolders capture images video case still video camera crop scan images single multi-page tiff case scanner picture transfer protocol ptp implementation updated support mandatory optional commands ptp standard object tree support allows secondary files associated parent file grouped transferred concurrently windows media player 10 also adds media transfer protocol transferring media content portable devices thus digital cameras windows xp supports acquiring photos using either wia ptp usb mass storage class mtp protocols depending camera manufacturer supports windows xp includes technology roxio allows users directly burn files compact disc windows explorer previously end users install cd burning software windows xp cd dvd-ram fat32 dvd-ram burning directly integrated windows interface data discs created using joliet iso 9660 file systems audio cds using redbook standard prevent buffer underrun errors windows xp premasters complete image files burnt streams disc burner users burn files cd way write files floppy disk hard drive via standard copy-paste drag drop methods burning functionality also exposed api called image mastering api windows xp cd burning support disk-to-disk copying disk images although api used programmatically tasks creation audio cds integrated windows media player audio cds burnt using track-at-once mode cd-rw discs quick erased api support added windows xp burning dvds blu-ray discs mastered-style burning udf write-once rewritable dvd blu-ray media installing windows feature pack storage upgrades imapi version 2 note add dvd blu-ray burning features windows explorer third party applications use apis support dvd blu-ray burning windows xp includes firewire 800 support 1394b beginning service pack 1 mentioned section windows xp includes improved support firewire cameras audio video devices s/pdif audio mpeg-2 video streams supported across firewire audio video receivers set-top boxes dvd d-vhs speakers tv transmissions windows xp supports av/c iec 61883 protocol isochronous real-time data transfer audio-video applications windows xp also allows non-firewire devices exposed virtual firewire devices direct memory access 1394 bus host target allows kernel debugging firewire finally support tcp/ip networking internet connection sharing ieee 1394 bus windows xp includes windows script host 5.6 major update wsh environment includes improved object model reduce boilerplate code stronger security several improvements new xml-based file format windows script file format .wsf introduced besides .vbs .js store xml node file extra information besides script code digital signature blocks runtime directives instructions import external code wsf schema include jobs wrapped unique job tag outer package tag tags wsf file allow including external files importing constants tlb storing usage syntax runtime element displaying using new showusage method invoked switch wsf format also supports hosting multiple wsh scripting languages including cross function-calls wshshell object supports 'currentdirectory read-write method scripts digitally signed well verified programmatically using scripting.signer object script provided valid certificate present system alternatively signcode tool platform sdk extended support wsh filetypes may used command line verifyfile method used authenticate embedded signature validity check script modifications signing wsh thus decide whether execute script verification code stored in-memory string also signed using sign method signature block stored commented section script file backward compatibility older wsh versions using software restriction policies supported windows xp later system may also configured execute scripts digitally signed thus preventing execution untrusted scripts local scripts also run remote machine new wscript.wshcontroller object powered dcom remote wsh enabled group policy administrative template registry remote scripts always run wscript loaded remote machine server process run non-interactively default configured using dcomcnfg run security context allows display user interface wsh automation server loads instance wshremote object created script runs calling execute method external files called remote script must located remote machine directory path specified exec method remote script monitored using status property wsh 5.6 introduces exec method wshshell object execute command-line console applications access standard i/o streams stdin stdout stderr spawned process earlier versions windows script use arguments one access wsharguments collection object could created externally required person running script know order arguments syntax values wsh 5.6 introduces named arguments command line follow /string value boolean convention defined 'runtime tag recognized irrespective order command line named arguments grouped named collection object usual methods like item count length well exists method 'showusage method wsharguments object mentioned earlier shows argument information message box windows xp includes scriptpw.password com automation object implemented scriptpw.dll file used mask sensitive information like passwords command line scripts users log windows xp professional remotely remote desktop service built terminal services technology rdp similar remote assistance allows remote users access local resources printers terminal services client special remote desktop connection client web-based client using activex control may used connect remote desktop remote desktop clients earlier versions windows windows 95 windows 98 98 second edition windows windows nt 4.0 windows 2000 made available microsoft permits earlier versions windows connect windows xp system running remote desktop vice versa several resources users redirect remote server machine local client depending upon capabilities client software used instance file system redirection allows users use local files remote desktop within terminal session printer redirection allows users use local printer within terminal session would locally network shared printer port redirection allows applications running within terminal session access local serial parallel ports directly audio allows users run audio program remote desktop sound redirected local computer clipboard also shared remote computer local computer rdp client windows xp upgraded 7.0 remote desktop web connection component internet information services 5.1 also allows remote desktop functionality web activex control internet explorer remote assistance allows windows xp user temporarily take remote windows xp computer network internet resolve issues hassle system administrators personally visit affected computer remote assistance allows diagnose possibly even repair problems computer without ever personally visiting remote assistance allows sending invitations support person email windows messenger saving invitation file computer controlled support person connecting remotely well one sending invitation chat audio-video conversations file transfer available windows xp introduces fast user switching end user friendly welcome screen user account picture replaces classic logon prompt fast user switching allows another user log use system without log previous user quit applications previously windows windows 2000 one user time could logged except terminal services serious drawback multi-user activity fast user switching like terminal services requires system resources single user logged time although one user logged one user actively using account time feature available welcome screen turned joined windows server domain novell client installed even welcome screen enabled users switch classic logon pressing ctrl+alt+del twice welcome screen windows xp introduced windows installer msi 2.0 windows installer 2.0 brought major improvements installation management side-by-side clr assemblies sandboxing msi custom actions improved event logging hiding sensitive information log files per-user program isolation digital signatures improved patching robust patch conflict resolution reduced unnecessary unversioned file copying source prompts terminal server support integration system restore software restriction policies windows xp service pack 2 includes windows installer 3.0 also adds numerous improvements patching patch uninstallation support add remove programs binary delta patches patch sequencing install patches correct order installing multiple patches different products one transaction eliminating source media requests delta compression patches patch elevation limited user accounts msi source location list inventory management apis fixing numerous bugs windows xp sp3 includes msi 3.1v2 windows xp updated windows installer 4.5 windows disk defragmenter updated alleviate several restrictions longer relies windows nt cache manager prevented defragmenter moving pieces file cross 256kb boundary within file parts stream including cluster boundary non-compressed files reparse points bitmaps attribute_lists ntfs metadata files efs-encrypted files ntfs master file table defragmented defragmenter supports ntfs volumes cluster sizes larger 4 kilobytes command-line tool defrag.exe included providing access defragmenter cmd.exe task scheduler users members power users group schedule defragmentation windows task manager incorporates number improvements windows xp updated display process names longer 15 characters length processes tab used truncated windows 2000 session id user name columns added processes tab delete key also used terminate processes processes tab new networking tab shows statistics relating network adapters present computer default adapter name percentage network utilization link speed state network adapter shown along chart recent activity options shown choosing select columns ... view menu users tab shows users currently session computer server computers may several users connected computer using terminal services may also multiple users logged onto computer one time using fast user switching users disconnected logged tab shutdown menu introduced allows access standby hibernate turn restart log switch user holding codice_2 clicking new task opens command prompt windows xp includes new command-line tools wmi-based scripts windows 2000 ntlm hash user password requirement technically allowed potential malefactor decrypt master key ntlm hash directly security accounts manager database windows xp improves dpapi security encrypting master key using sha1 hash password also improves security data encrypted encrypting file system windows xp pki supports cross-certification bridge ca scenarios user -type certificates auto-enrolled renewed certificate requests issuing new certificates renewing expired ones pending administrator approval issued certificate authority approved install automatically root ca certificates also auto-update via microsoft update windows xp also supports delta crls crls whose status changed since last full base compiled crl base64-encoded crls revocation checking use default windows xp enroll version 2 certificate templates many configurable attributes smart cards used log terminal server sessions connecting windows server 2003 higher terminal server capicom system tools net.exe runas.exe also numerous improvements certificate status checking chain building revocation checking path validation discovery windows xp service pack 3 adds sha-2 hashing algorithms sha256 sha384 sha512 cryptoapi validating x.509 certificates windows xp includes several encrypting file system improvements notable improvement multiple user accounts share access encrypted files file-by-file basis details button advanced file attributes dialog file properties allows adding removing additional users access efs-encrypted file viewing certificate thumbprint data recovery agent account efs certificates autoenrolled ca support revocation checking certificates used sharing encrypted files unlike windows 2000 default local data recovery agent requirement one although self-signed certificate recovery agent generated using cipher.exe dpapi master key protected using domain-wide public key stronger fips 140-1 compliant algorithm 3des used windows xp service pack 1 adds support default use aes-256 symmetric encryption algorithm efs-encrypted files kb912761 windows xp sp2 windows xp sp3 users configure whether efs generates self-signed certificate certificate authority unavailable windows xp also warns user efs encrypted files copied file system fat unsupported location support efs thus file going get decrypted windows xp also encrypt files remote server ntfs server trusted delegation active directory user certificate private key loaded local profile server roaming user profile used copied locally webdav server mapped drive letter windows xp encrypt file locally transport raw encrypted file webdav server using http put command similarly efs encrypted files downloaded raw webdav decrypted locally command line utilities cipher copy xcopy updated windows xp efs also completely disabled windows xp group policy domain registry non-domain computer faster cache validation time long user session key certificate chain cached adjusted starting windows xp password reset disk created using forgotten password wizard disk used reset password using password reset wizard logon screen user rsa private key backed using offline public key whose matching private key stored one two places password reset disk computer member domain active directory member domain attacker authenticate windows xp localsystem still access decryption key stored pc hard drive password reset dpapi master key deleted windows xp blocks access efs encrypted files prevent offline rogue attacks protect encrypted files user changes password back original password efs encrypted files recovered windows xp prompts credentials upon authentication errors allows saving use integrated windows authentication secure roaming keyring store protected data protection api saved credentials managed stored user names passwords item user accounts control panel certificate authority present users select x.509 certificate prompted credentials resource accessed saved credentials used remote access/vpn connections also create temporary credentials keyring make experience seamless credential manager also exposes api single sign windows xp introduces software restriction policies safer api use software restriction policies system may configured execute install applications scripts digitally signed certain trust level thus preventing execution untrusted programs scripts administrators define default rule using local security policy snap-in exceptions rule types rules include hash rule path rule certificate rule zone rule identify file hash path software publisher certificate internet explorer-zone respectively example activex control restricted run particular domain specifying certificate rule-based software restriction policy windows xp service pack 2 introduced data execution prevention feature present nx evp amd amd64 processors xd edb intel processors flag certain parts memory containing data instead executable code prevents overflow errors resulting arbitrary code execution intended prevent application service executing code non-executable memory region helps prevent certain exploits store code via buffer overflow example dep runs two modes hardware-enforced dep cpus mark memory pages nonexecutable software-enforced dep limited prevention cpus hardware support software-enforced dep protect execution code data pages instead another type attack seh overwrite hardware-enforced dep enables nx bit compatible cpus automatic use pae kernel 32-bit windows native support 64-bit kernels software dep unrelated nx bit microsoft calls enforcement safe structured exception handling software dep/safeseh simply checks exception thrown make sure exception registered function table application requires program built dep enabled applications users gain additional resistance zero-day exploits applications dep-compliant generate dep exceptions therefore dep enforced applications default 32-bit versions windows turned critical system components however windows xp service pack 3 introduces additional nx apis allow software developers enable nx hardware protection code independent system-wide compatibility enforcement settings developers mark applications nx-compliant built allows protection enforced application installed runs enables higher percentage nx-protected code software ecosystem 32-bit platforms default system compatibility policy nx configured protect operating system components windows xp rtm introduced internet connection firewall later upgraded windows firewall windows xp service pack 2 support filtering ipv6 traffic well default windows firewall performs stateful packet filtering inbound solicited unsolicited traffic types network interfaces lan/wlan pppoe vpn dial-up connections like internet connection sharing firewall location-aware policy meaning disabled corporate domain enabled private home network option disallow exceptions may useful connecting public network firewall also used edge firewall ics clients firewall blocks program displays notification excepted traffic specified tcp/udp port application filename scope part network excepted traffic originates supports port mapping icmp security log capabilities included record ip addresses data relating connections originating home office network internet record dropped packets successful connections used instance track every time computer network connects website windows firewall also supports configuration group policy applications use windows firewall apis automatically add exceptions windows security center introduced windows xp service pack 2 provides users ability view status computer security settings services windows security center also continually monitors security settings informs user via pop-up notification balloon problem windows security center consists three major components control panel windows service application programming interface provided windows management instrumentation control panel divides monitored security settings categories headings displayed color-coded backgrounds current state settings determined windows service starts automatically computer starts takes responsibility continually monitoring system changes settings made available system wmi provider anti-malware firewall software vendors register security center wmi provider windows update settings status also monitored reported windows 2000 wireless support support seamless roaming auto-configuration windows xp wireless zero configuration service supports automatic wireless network configuration re-authentication necessary thus providing seamless roaming capability setting preferred order connections absence wireless access point windows xp set ad hoc wireless network native support wpa wpa2 authentication infrastructure networks latest service packs and/or updates applied windows xp includes wireless network setup wizard supports windows connect usb flash drive wcn-ufd method ease setting wireless network inexperienced users kb918997 windows xp sp2 windows xp sp3 add wireless lan api developers create wireless client programs manage profiles connections ieee 802.1x support wireless wired connections case pki available issue certificates vpn connection support preshared key ike authentication windows xp connect hotspots created using wireless provisioning services windows xp service pack 2 added native bluetooth support windows xp bluetooth stack supports external integrated bluetooth dongles attached usb windows xp sp2 sp3 support bluetooth 1.1 1.0 bluetooth 2.0 bluetooth 2.0+edr bluetooth stack supports following bluetooth profiles natively pan spp dun hid hcrp third-party stacks may replace windows xp stack may support profiles newer versions bluetooth windows xp internet connection sharing integrated upnp allowing remote discovery control ics host quality service packet scheduler component ics client relatively fast network ics host connected internet slow link windows may incorrectly calculate optimal tcp receive window size based speed link client ics host potentially affecting traffic sender adversely ics qos component sets tcp receive window size would receiver directly connected slow link internet connection sharing also includes local dns resolver windows xp provide name resolution network clients home network including non-windows-based network devices ics also location-aware connected domain computer group policy restrict use ics home ics enabled multiple applications accessing internet simultaneously without qos connection n't fast enough tcp receive window size set full window data transit first application uses connection steady state reached subsequent connections made applications take much longer reach optimal window size transmission rate second third application always lower application established connection first slow links qos component windows xp automatically enables deficit round robin scheduling scheme creates separate queue application services queues round-robin fashion basic production quality support windows xp ipv6 teredo tunneling advanced networking pack later incorporated windows xp sp2 ipv6 installed configured command line using netsh interface ipv6 context gui support network interface link-local address assigned stateless autoconfiguration local global addresses performed windows xp static ipv6 addresses assigned ipv6 router local link transition mechanisms manually configured tunnels 6to4 set windows firewall beginning windows xp sp2 also supports ipv6 stateful filtering applications tools telnet client ftp client ping nslookup tracert dns resolver file print sharing internet explorer iis updated support ipv6 privacy extensions enabled used default 6to4 automatically activated public ipv4 addresses without global ipv6 address types tunnels set include 6over4 teredo isatap portproxy teredo also helps traverse cone restricted nats teredo host-specific relay enabled global ipv6 address assigned otherwise teredo client functionality enabled windows xp dns resolver make dns queries using ipv4 use ipv6 transport make query however dns query sends back ipv4 ipv6 resource records ipv6 addresses preferred windows xp support dhcpv6 pppv6/ipv6cp open source dhcpv6 implementation called dibbler available although stateless autoconfiguration largely makes unnecessary windows xp includes background intelligent transfer service windows service facilitates prioritized throttled asynchronous transfer files machines using idle network bandwidth bits transfer data whenever bandwidth used applications example applications use 80 available bandwidth bits use remaining 20 bits constantly monitors network traffic increase decrease network traffic throttles transfers ensure foreground applications web browser get bandwidth need bits also supports resuming transfers case disruptions bits version 1.0 supports downloads version 1.5 bits supports downloads uploads uploads require iis web server bits server extension receiving side bits 2.0 part windows xp sp2 added support performing concurrent foreground downloads using server message block paths remote names downloading portions file changing prefix complete name remote name limiting client bandwidth usage bits upgradeable version 2.5 windows xp bits 2.5 part windows xp sp3 adds support ipv6 certificate-based client authentication secure http transports custom http headers windows xp components windows update use bits download updates idle bandwidth used download updates downloading resumed case network connectivity interrupted bits uses queue manage file transfers downloads files behalf requesting applications asynchronously i.e. application requests bits service transfer free job even terminate transfer continue background long network connection job owner logged bits supports transfers http https network application begins consume bandwidth bits decreases transfer rate preserve user interactive experience except foreground priority downloads bits exposed component object model com making possible use virtually programming language windows xp fax console manage incoming outgoing archived faxes settings fax monitor appears notification area fax transmission reception progress manual reception faxes enabled appears upon incoming fax call archived faxes open windows picture fax viewer tiff format upon installing microsoft outlook fax service automatically switches windows address book using outlook address book windows xp introduces fax service extended com api application developers incorporate fax functionality advanced networking pack later made part sp2 introduced peer-to-peer networking peer name resolution protocol pnrp windows xp operates ipv6 p2p architecture windows xp consists following components pnrp provides dynamic name publication resolution names endpoints pnrp distributed name resolution protocol allowing internet hosts publish peer names corresponding ipv6 addresses optionally information hosts resolve peer name retrieve corresponding addresses information establish peer-to-peer connections pnrp peer names composed authority qualifier authority identified secure hash associated public key place-holder number zero peer name unsecured qualifier string allowing authority different peer names different services peer name secure pnrp name records signed publishing authority verified using public key unsecured peer names published anybody without possible verification multiple entities publish peer name example peer name associated group group member publish addresses peer name peer names published resolved within specified scope scope local link site e.g campus whole internet graphing pnrp also allows creating overlay network called graph peer overlay network corresponds node graph nodes resolved addresses using pnrp nodes graph share book-keeping information responsible functioning network whole example distributed resource management network node resource needs shared information shared records flooded peers graph peer stores record local database record consists header body body contains data specific application using api header contains metadata describe data body name-value pairs serialized using xml addition author version information also contain index body data fast searching node connect nodes directly well communication need shared entire graph grouping peer-to-peer api also allows creation secure overlay network called group consisting subset nodes graph group shared multiple applications unlike graph peers group must identifiable unique named registered using pnrp digital signature certificate termed group member certificate gmc records exchanged digitally signed peers must invited group invitation contains gmc enables join group windows xp introduces simplified form sharing files local users multi-user environment network called simple file sharing simple file sharing enabled default non-domain joined computers disables separate security tab used set advanced acls/permissions enables common interface permissions file system folders sharing simple file sharing enabled documents folder subfolders read written owner local administrators shared network checking make folder private option properties local administrators also denied permissions documents folder sharing files user accounts computer simple file sharing enabled windows xp includes shared documents folder simple file sharing disables granular local network sharing permissions shares item everyone group network read write access without asking password forcing guest user permissions windows xp webdav mini-redirector added preferred old web folders client default newer client works system service network-redirector level immediately file-system allowing webdav shares assigned drive letter used software even firewalls nats applications open remote files http servers edit file save changes back file server allows redirector also allows webdav shares addressed via unc paths e.g codice_5 converted codice_6 compatibility windows filesystem apis webdav mini-redirector known limitations authentication support although windows xp ship following major windows features out-of-the-box new features added windows xp downloading components incorporated later versions windows
[ 5120, 513, 517, 6150, 5643, 4624, 9744, 1043, 11283, 537, 540, 3102, 7713, 9762, 8227, 8740, 11301, 1575, 1577, 6697, 10281, 1581, 4143, 7728, 3122, 7218, 9780, 2101, 8246, 10812, 3648, 4162, 582, 8262, 1098, 7754, 10828, 4173, 4174, 1083...
Test
8,081
3
Gall_Force:gall force origin precursor gall force franchise originally appearing monthly model graphix magazine japan 3d photo novel using detailed models later set stage animated films rabby patty rumy main solnoid characters featured equipped different uniforms weapons vehicles shown regular gall force ovas although first-ever storyline gall force mythos proper star front place official continuity questioned disregarded due contradictions eternal story although actual origin franchise seen fans non-canon alternate timeline another factor causes question fact fans outside japan never knew photo novel existence original timeline gall force series consist four story arcs first story arc rhea arc earth chapter arc new era arc within arc several episodes exception rhea first arc starts centuries-long war paranoids solnoids exodus early humanity planet terra death star leaf crew timeline ends events lead rhea arc first story arc consists three episodes gall force eternal story gall force 2 destruction gall force 3 stardust war rhea gall force takes place aftermath stardust war events earth chapter 21st century earthen discovery derelict alien technology moon—which fact remnants events eternal story —ignited arms race western eastern blocs rushed deploy technology weapons including form artificial life based paranoids mme artificial life turned humanity starting war extermination creators rhea plot summary year 2084 scientist grey newman found reverse-engineered technology solnoid ship found moon see eternal story unintentionally brought end civilization world war iii breaks middle battle human alien synthezoids turn creators nearly annihilating humankind later year 2085 remaining humans run machines terminating order survive defeat alien machines human race must leave earth go mars among voyagers one woman bears burden guilt father contribution destruction civilization earth chapter arc continues story rhea arc reincarnations star leaf crew completion operation exodus earth resistance must survive long enough arrival mars reinforcements led general mckenzie consists three episodes earth chapter 1 earth chapter 2 earth chapter 3 new era concludes story earth chapter takes place 200 years later consists two episodes new era plot summary centuries war humans mme machines humans battle however many lives lost earth rendered terribly damaged unstable live shortly afterwards mankind began restore earth new race cyborgs called yumans begun live humans desire better future humanity linked one large computer network however conflict humans yumans shortly began considering far better human yumans began plot takeover humanity lives separated tightly packed arcologies built around world keeping minimal contact dealing internal problems like overpopulation young scientist named nova influenced revolutionary leader yumans genova develops plans bring humanity using tools acquired years awakens artificial intelligence destroy human life reprograming every computer earth gorn virus virus actually bit nova predicted due intent wiping humans yumans solar system entire system connected wars gorn able bring presence everywhere attempt achieve long-term goals gorn plans surprise catty foreseen disaster sets plan motion virus strikes yuman heart leads force seven women final battle man machine 1996 ova reimagining series replaced amorphous paranoids seemingly endless civil war west force east force solnoid armies unlike previous ovas somber apocalyptic tones revolution traditional sci-fi adventure story although still stresses tragedies wide-scale destruction caused war four episodes produced along one soundtrack album vocal collection starring main female cast singing various songs one remake disguised spies one original saga soundtracks plot tells struggle west force east force armies solnoids threatens escalate total destruction solnoid race sides search ultimate war weapon anti-matter gun happenstance however several troopers east force eluza rabby patty rumy west force lufy encounter conch outlawed solnoid anti-war organization trying spread peace among hostile parties discover war merely used insidious instrument balance one singular solnoid party rogue solnoid troopers unwittingly find fighting idea completely alien presents way stopping perpetuated madness 1988 omake animated mockumentary detailing behind-the-scenes look production gall force eternal story destruction first story arc characters drawn super deformed versions eternal story counterparts video maintained comedic tone opposed somewhat serious war story original video supposedly documenting ten little gall force released along scramble wars united states animeigo single vhs video titled super-deformed double feature strangely time released dvd gall force titles vhs release much-sought rare collector items shoot 'em released japan simply titled gall force family computer disk system hal laboratory november 19 1986 another shoot-em-up also developed hal released year titled gall force defense chaos msx followed gall force eternal story graphic adventure game msx2 1987 similarly ovas era studios aic artmic gall force features huge amount music performed voice actors involved series several soundtracks released film ova ova episode earth chapter case addition many music collections released featuring original songs performed aforementioned voice actors along various singles cd drama far soundtracks released films destruction stardust war soundtracks singles music collections gall force earth saga back school wars
[ 10931, 2156, 9006, 11471 ]
Validation
8,082
9
Oberon_(programming_language):oberon programming language oberon general-purpose programming language created 1986 niklaus wirth latest member wirthian family algol-like languages euler algol-w pascal modula modula-2 oberon result concentrated effort increase power modula-2 direct successor pascal simultaneously reduce complexity principal new feature concept type extension record types permits construction new data types basis existing ones relate deviating dogma strictly static data typing type extension wirth way inheritance reflecting viewpoint parent site oberon developed part implementation oberon operating system eth zurich switzerland name moon uranus oberon oberon still maintained wirth latest language change dated may 8 2016 oberon designed motto attributed albert einstein mind “ make things simple possible simpler. ” principal guideline concentrate features basic essential omit ephemeral issues another factor recognition growth complexity languages c++ ada contrast oberon emphasizes use library concept extending language enumeration subrange types present modula-2 removed similarly set types limited small sets integers number low-level facilities sharply reduced particularly type transfer functions eliminated elimination remaining potentially-unsafe facilities concludes essential step toward obtaining truly high-level language close type-checking even across modules strict index-checking run time null-pointer checking safe type extension concept largely allow programmer rely language rules alone intent strategy produce language easier learn simpler implement efficient oberon compilers viewed compact fast providing adequate code quality compared commercial compilers following features characterize oberon language oberon supports extension record types construction abstractions heterogeneous structures contrast later dialects—oberon-2 active oberon—the original oberon n't dispatch mechanism language feature rather programming technique design pattern gives great flexibility oop world oberon operating system two programming techniques used conjunction dispatch call method suite message handler technique table procedure variables defined global variable type declared extended module assigned back generic module extend generic type figure specific shape dynamic dispatch done via procedures figures module generic module technique consists replacing set methods single procedure discriminates among various methods extend generic type figure specific shape oberon operating system techniques used dynamic dispatch first one used known set methods second used new methods declared extension module example extension module rectangles implement new rotate procedure within figures module could called via message handler no-cost implementations oberon language oberon operating system found internet several ethz changes made first released specification object-oriented programming features added 'for loop reinstated instance result oberon-2 currently common implementation release called native oberon includes operating system directly boot pc class hardware .net implementation oberon addition minor .net-related extensions also developed ethz 1993 ethz spin company brought dialect oberon-2 market name oberon-l renamed component pascal 1997 oberon-2 compilers maintained eth include versions microsoft windows linux solaris classic mac os furthermore implementations various operating systems atari-tos amigaos oberon-2 lex scanner yacc parser stephen j bevan manchester university uk based one mössenböck wirth reference version 1.4 also oxford oberon-2 compiler also understands oberon-07 vishap oberon latter based josef templ oberon c transpiler called ofront turn based op2 compiler developed regis crelier ethz oberon-07 defined niklaus wirth 2007 revised 2011 2013 2014 2015 2016 based original version oberon rather oberon-2 main changes explicit numeric conversion functions e.g floor flt must used loop exit statements eliminated statements extended case statements used type extension tests return statements connected end function imported variables structured value parameters read-only arrays assigned without using copy full details see programming language oberon-07 oberon-07 compilers developed use several different computer systems wirth compiler targets risc processor design used implement 2013 version project oberon operating system xilinx fpga spartan-3 board ports risc processor fpga spartan-6 spartan-7 artix-7 risc emulator windows compilable linux os x well binaries available windows also exist obnc compiles via c used posix compatible operating system commercial astrobe implementation targets 32-bit arm cortex-m3 m4 m7 microcontrollers patchouli compiler produces 64-bit windows binaries oberon-07m produces 32-bit windows binaries implements revision 2008 language akron produces binaries windows linux oberonjs translates oberon javascript oberonc implementation java virtual machine active oberon yet another variant oberon adds objects object-centered access protection local activity control system-guarded assertions preemptive priority scheduling changed syntax methods type-bound procedures oberon world objects may active means may threads processes additionally active oberon way implement operators including overloading advanced syntax using arrays see oberonx language extensions proceedings 7th joint modular languages conference 2006 oxford uk knows namespaces see proposal module contexts operating system a2 bluebottle especially kernel synchronizes coordinates different active objects ethz released active oberon supports active objects bluebottle operating system environment jdk http ftp etc language many prior designs ethz versions available download internet written single dual x86 cpus strongarm family supported development continued languages family extension oberon-2 originally named oberon/l later renamed component pascal developed windows classic mac os oberon microsystems commercial company spin-off ethz .net queensland university technology addition lagoona obliq languages carry oberon spirit specialized areas recent .net development efforts ethz focused new language called zonnon includes features oberon restores pascal enumerated types built-in io syntactic differences additional features include support active objects operator overloading exception handling zonnon available plug-in language microsoft visual studio .net development environment oberon-v originally called seneca seneca younger descendant oberon designed numerical applications supercomputers especially vector pipelined architectures includes array constructors statement see seneca language numerical applications vectorcomputers proc conpar 90 vapp iv conf r. griesemer diss nr 10277 eth zurich
[ 512, 1145, 9345, 3462, 8582, 6797, 6414, 8973, 6160, 8720, 6675, 9107, 10387, 11411, 5783, 1435, 8219, 3613, 6558, 5663, 7326, 9245, 3876, 4777, 428, 5677, 9008, 5684, 10548, 823, 7479, 6074, 6718, 8510, 576, 963, 6979, 8644, 8262, 1480, ...
Validation
8,083
2
Nokia_C5-00:nokia c5-00 nokia c5-00 first new cseries nokia phones announced march 2010 c5-00 smartphone messaging social networking features including example facebook flickr applications c5-00 allows multitasking display 3.2-megapixel camera c5-00.2 5 mp also includes gps free navigation courtesy ovi maps runs symbian os s60 3rd edition feature pack 2 microsd slot support 16-gigabyte cards c5-00.2 32 gb – nokia c5 comes two-gigabyte card box device dimensions thin across high battery life good 12 hours talk time gsm working memory ram 128 mb c5-00.2 256 mb available white warm grey nokia c5-00 made globally available second quarter 2010 c5-00 comes monoblock form factor weighs battery 5-way navi-key two soft keys separate call end clear application keys well volume keys side phone user interface ring tones customized announced maximum talk time varies 4.9 hours 3g networks 12 hours plain gsm networks maximum standby times 630 670 hours respectively music played maximum 34 hours phone offline mode phone features bluetooth connectivity 3.5 mm av connector stereo fm radio act data modem supports calendar contact synchronization microsoft outlook charged via usb conference calls three participants also made nokia c5-00 also features integrated web browser supports xhtml markup language flash lite 3.0 video streaming rss feeds camera back flash announced operating range 1.5 meters camera different capture colour tone scene white balance modes horizontal orientation also photo editor device video captured long memory available device also features secondary vga resolution camera video calls nokia c5-00.2 2011 comes 5-megapixel camera 256 mb ram support 32-gigabyte cards
[ 1537, 8577, 3205, 11655, 9359, 1424, 529, 2449, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 2345, 3626, 5290, 10410, 10802, 7220, 821, 5175, 7866, 1083, 1728, 7617, 4291, 7877, 10053, 199, 967, ...
None
8,084
8
ShiftSpace:shiftspace shiftspace discontinued open-source metaweb web annotation application framework allows altering web pages different tools tagline application open source layer web page implemented userscript greasemonkey extension firefox development shiftspace ceased 2011 shiftspace user viewing webpage least one shift notice small shiftspace notifier icon bottom left corner browser window pressing shift space keys user invokes meta layer particular page additional user-created content becomes visible shiftspace user invoke meta layer web page browse create additional interpretations contextualizations interventions called shifts available tools authoring shifts called spaces currently included core release notes highlights imageswap sourceshift spaces utilitarian like notes highlights interventionist like imageswap sourceshift shiftspace founded 2006 dan phiffer mushon zer-aviv students nyu interactive telecommunications program later year received prixars honorary mention next idea category ars electronica center shiftspace covered techcrunch cnet shiftspace supported grant swiss confederation commission rhizome.org
[ 546, 803, 8644, 3462, 5612, 7983, 5078, 119, 2298 ]
Test
8,085
1
Data_curation:data curation data curation organization integration data collected various sources involves annotation publication presentation data value data maintained time data remains available reuse preservation data curation includes processes needed principled controlled data creation maintenance management together capacity add value data science data curation may indicate process extraction important information scientific texts research articles experts converted electronic format entry biological database modern era big data curation data become prominent particularly software processing high volume complex data systems term also used historical uses humanities increasing cultural scholarly data digital humanities projects requires expertise analytical practices data curation broad terms curation means range activities processes done create manage maintain validate component specifically data curation attempt determine information worth saving long user rather database typically initiates data curation maintains metadata according university illinois graduate school library information science data curation active on-going management data lifecycle interest usefulness scholarship science education curation activities enable data discovery retrieval maintain quality add value provide re-use time data curation workflow distinct data quality management data protection lifecycle management data movement census data available tabulated punch card form since early 20th century electronic since 1960s inter-university consortium political social research icpsr web site marks 1962 date first survey data archive deep background data libraries appeared 1982 issue illinois journal library trends historical background data archive movement see social scientific information needs numeric data evolution international data archive infrastructure exact curation process undertaken within organisation depends volume data much noise data contains expected future use data means dissemination crises space data led 1999 creation open archival information system oais model stewarded consultative committee space data systems ccsds formed 1982 term data curation sometimes used context biological databases specific biological information firstly obtained range research articles stored within specific category database instance information anti-depressant drugs obtained various sources checking whether available database saved drug database anti-depressive category enterprises also utilizing data curation within operational strategic processes ensure data quality accuracy dissemination information packages dips information reuse dipir project studying research data produced used quantitative social scientists archaeologists zoologists intended audience researchers use secondary data digital curators digital repository managers data center staff others collect manage store digital information protein data bank established 1971 brookhaven national laboratory grown global project database three-dimensional structural data proteins large biological molecules pdb contains 120,000 structures standardized validated experimental data annotated flybase primary repository genetic molecular data insect family drosophilidae dates back 1992 flybase annotates entire drosophila melanogaster genome linguistic data consortium data repository linguistic data dating back 1992 sloan digital sky survey began surveying night sky 2000 computer scientist jim gray working data architecture sdss championed idea data curation sciences datanet research program u.s. national science foundation office cyberinfrastructure funding data management projects sciences dataone data observation network earth one projects funded datanet helping environmental science community preserve share data
[ 2818, 5319, 3880, 1161, 522, 6131, 8405, 10102 ]
Test