node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
8,086
4
CUPS_(CMU):cups cmu carnegie mellon university usable privacy security laboratory cups established spring 2004 bring together carnegie mellon university researchers working diverse set projects related understanding improving usability privacy security software systems privacy security research community become increasingly aware usability problems severely impact effectiveness mechanisms designed provide security privacy software systems indeed one four grand research challenges information security assurance identified computing research association 2003 give end-users security controls understand privacy control dynamic pervasive computing environments future challenge cups strives address cups affiliated carnegie mellon cylab members engineering public policy department school computer science electrical computer engineering department heinz college department social decision sciences
[ 10928, 4213 ]
None
8,087
0
Morphological_pattern:morphological pattern morphological pattern set associations and/or operations build various forms lexeme possibly inflection agglutination compounding derivation term used domain lexicons morphology important distinguish paradigm lexeme morphological pattern context inflecting language inflectional morphological pattern explicit list inflected forms morphological pattern usually references prototypical class inflectional forms e.g ring per sing contrast paradigm lexeme explicit list inflected forms given lexeme e.g ring rang rung said terms difference description intension morphological pattern description extension paradigm
[ 11056 ]
Train
8,088
9
PhoX:phox automated theorem proving phox proof assistant based higher-order logic extensible user gives phox initial goal guides subgoals evidence prove goal internally constructs natural deduction trees previously proven formula become rule later proofs phox originally designed implemented christophe raffalli ocaml programming language continued lead current development team joint effort university savoy primary aim phox project creating user friendly proof checker using type system developed jean-louis krivine university paris vii meant intuitive systems remaining extensible efficient expressive compared systems proof-building syntax simplified closer natural language features include gui-driven proof construction rendering formatted output proof correctness programs ml programming language phox currently used teach logic savoy university experimental usable state released cecill 2.0
[ 7386, 8262, 4791 ]
None
8,089
3
Hardware_architect:hardware architect hardware systems architect hardware architect responsible large systems architecture developed way handle systems large one person conceive let alone design systems size rapidly becoming norm architectural approaches architects increasingly needed solve problems large systems engineers group reputation understanding responding human needs comfortably developing humanly functional aesthetically pleasing products architects expected understand human needs develop humanly functional aesthetically pleasing products good architect translator user/sponsor engineers—and even among engineers different specialties good architect also principal keeper user vision end product—and process deriving requirements implementing vision determining users/sponsors actually want rather say want engineering—it art architect follow exact procedure s/he communicates users/sponsors highly interactive way—together extract true requirements necessary engineered system hardware architect must remain constantly communication end users systems architect therefore architect must familiar user environment problem engineer need knowledgeable potential engineering solution space user/sponsor view architect user representative provide input architect direct interaction project engineers generally discouraged chance mutual misunderstanding high user requirements specification joint product user hardware architect systems hardware architects user brings needs wish list architect brings knowledge likely prove doable within cost time constraints user needs translated set high level requirements also best time write first version acceptance test thereafter religiously kept date requirements way user absolutely clear s/he getting also safeguard untestable requirements misunderstandings requirements creep development first level hardware engineering requirements purely analytical exercise also involve hardware architect engineer compromises made—to meet constraints like cost schedule power space architect must ensure final product overall look feel stray far user intent engineer focus developing design optimizes constraints ensures workable reliable product architect primarily concerned comfort usability product engineer primarily concerned producibility utility product provision needed services user true function engineered system however systems become ever larger complex emphases move away simple hardware components narrow application traditional hardware development principles found insufficient—the application general principles hardware architecture design sub systems seen needed hardware architecture also simplified model finished end product—its primary function define hardware components relationships whole seen consistent complete correct representation user mind—especially computer–human interface also used ensure components fit together relate desired way necessary distinguish architecture user world engineered hardware architecture former represents addresses problems solutions user world principally captured computer–human interfaces chi engineered system engineered system represents engineering solutions—how engineer proposes develop and/or select combine components technical infrastructure support chi absence architect unfortunate tendency confuse two architectures since engineer thinks terms hardware user may thinking terms solving problem getting people point point b reasonable amount time reasonable expenditure energy getting needed information customers staff hardware architect expected combine knowledge architecture user world potentially useful hardware engineering architectures former joint activity user latter joint activity engineers product set high level requirements reflecting user requirements used engineers develop hardware systems design requirements requirements evolve course project especially long one architect needed hardware system accepted user architect best insurance changes interpretations made course development compromise user viewpoint hardware engineers specialists know applications hardware design development intimately apply knowledge practical situations—that solve real world problems evaluate cost–benefits various solutions within hardware specialty ensure correct operation whatever design hardware architects generalists expected experts one hardware technology approach expected knowledgeable many able judge applicability specific situations also apply knowledge practical situations evaluate cost/benefits various solutions using different hardware technologies example specially developed versus commercially available hardware components assure system whole performs according user expectations many commercial-off-the-shelf already developed hardware components may selected independently according constraints cost response throughput etc cases architect already assemble end system unaided s/he may still need help hardware engineer select components design build special purpose function architects engineers may also enlist aid specialists—in safety security communications special purpose hardware graphics human factors test evaluation quality control rma interface management etc effective hardware architectural team must immediate access specialists critical specialties architect planning building works overall design making sure pleasing useful inhabitants single architect may enough build single-family house many engineers may needed addition solve detailed problems arise novel high-rise building designed job large complex enough parts architecture may designed components building housing complex may one architect complex one type building part architectural team large hardware systems also require architect much engineering talent engineered system large complex enough chief hardware systems architect may defer subordinate architects parts job although may members joint architectural team architect must never viewed engineering supervisor architect sub-allocate hardware requirements major components subsystems within scope single hardware engineer engineering manager subordinate architect ideally hardware component/subsystem sufficiently stand-alone object tested complete component separate whole using simple testbed supply simulated inputs record outputs necessary know air traffic control system works order design build data management subsystem necessary know constraints subsystem expected operate good architect ensures system however complex built upon relatively simple clean concepts sub system layer—easily understandable everyone especially user without special training architect use minimum rules ensure partition well-defined clean kludges work-arounds short-cuts confusing detail exceptions user needs evolve system fielded use lot easier subsequently evolve simple concept one laden exceptions special cases lots fine print layering hardware architecture important keeping sufficiently simple layer remains comprehensible single mind layers ascended whole systems lower layers become simple components higher layers may disappear altogether highest layers acceptance test always remains principal responsibility architect chief means architect prove user hardware originally planned subordinate architects engineers met objectives large projects tend dynamic changes along way needed user e.g. problems change expected user e.g. cost schedule reasons acceptance tests must kept current times principal means user kept informed final product perform act principal goal towards subordinate personnel must design build test building architect uses sketches models drawings hardware systems architect use sketches models prototypes discuss different solutions results user system architect engineers subordinate architects early draft version user manual invaluable especially conjunction prototype set engineering requirements means communicating users explicitly avoided well written set requirements specification intelligible engineering fraternity much legal contract lawyers
[]
Validation
8,090
3
Southbridge_(computing):southbridge computing southbridge one two chips core logic chipset personal computer pc motherboard northbridge southbridge typically implements slower capabilities motherboard northbridge/southbridge chipset computer architecture systems intel chipsets southbridge named i/o controller hub ich amd named southbridge fusion controller hub fch since introduction fusion amd accelerated processing unit apu southbridge usually distinguished northbridge directly connected cpu rather northbridge ties southbridge cpu use controller integrated channel circuitry northbridge directly link signals i/o units cpu data control access due push system-on-chip soc processors modern devices increasingly northbridge integrated cpu die examples intel sandy bridge amd fusion processors released 2011 southbridge became redundant replaced platform controller hub pch architecture introduced intel 5 series chipset 2008 southbridge features remaining i/o functions managed pch directly connected cpu via direct media interface dmi southbridge chipset handled computer i/o functions usb audio serial system bios isa bus interrupt controller ide channels different combinations southbridge northbridge chips possible two kinds chips must designed work together industry-wide standard interoperability different core logic chipset designs traditionally interface northbridge southbridge pci bus main bridging interfaces used dmi intel umi amd name derived representing architecture fashion map first described introduction pci local bus architecture 1991 intel authors pci specification viewed pci local bus centre pc platform architecture i.e. equator northbridge extends north pci bus backbone support cpu memory/cache performance-critical capabilities likewise southbridge extends south pci bus backbone bridges less performance-critical i/o capabilities disk interface audio etc cpu located top map due north cpu connected chipset via fast bridge northbridge located north system devices drawn northbridge connected rest chipset via slow bridge southbridge located south system devices drawn although current pc platform architecture replaced pci bus backbone faster i/o backbones bridge naming convention remains functionality found contemporary southbridge includes optionally southbridge also includes support ethernet raid usb audio codec firewire support provided non-usb keyboard mouse serial ports machine normally device referred super i/o still rarely southbridge may directly support keyboard mouse serial ports
[ 3586, 9092, 6806, 8730, 1563, 2719, 1058, 8625, 8629, 2635, 1614, 7247, 3537, 5073, 2523, 2525, 1376, 8035, 8931, 2791, 1515, 10734, 7151, 1776, 7538, 5368 ]
None
8,091
7
Joint_Battlespace_Infosphere:joint battlespace infosphere joint battlespace infosphere project funded afrl air force research lab intended provide management network-centric warfare systems utilize gig global information grid
[ 7388 ]
None
8,092
2
Operating_system_advocacy:operating system advocacy operating system advocacy practice attempting increase awareness improve perception computer operating system motivation behind may increase number users system assert superiority one choice another brand loyalty pride operating system abilities open source operating systems political philosophical reasons persuade software vendors port specific applications device drivers computing platform generally done support increasing network effects platform operating system advocacy vary widely tone form seriously studied researched comparisons heated debates mailing lists forums advocates often normal users devote spare time advocacy operating system choice many deep abiding interest use design construction operating systems emotional investment favorite operating system one specific example known platform evangelism operating system advocacy compared advocacy fields particularly browser editor wars programming languages video game consoles well ford vs. chevy similar debates car culture due often emotional nature advocacy debate sometimes narrow appeal wider user population forums discussion advocacy often separate general discussion usenet comp.os comp.sys hierarchy often *.advocacy groups devoted exclusively advocating respective operating systems groups comp.sys.amiga.advocacy remain active even subject os ceases market force guide windows newsgroups exhorts usenet posters get involved arguments windows vs. os/2 vs. macintosh vs. nextstep except comp.os.ms-windows.advocacy group operating system advocacy discussions usenet elsewhere spawned variety jargon describing commonly seen behaviour including microdroid amiga persecution complex emotional form negative characteristics often associated operating system advocacy led create guidelines explaining consider positive advocacy linux advocacy guidelines guidelines effective os/2 advocacy freebsd served mailing list specifically advocacy discussion advocacy-related materials links provided freebsd website including page logos large number linux distributions many organizations involved linux advocacy including companies directly involved development distributions well purely advocacy-based groups seul promotion takes wide variety forms tux plush toys t-shirts posters even unorthodox forms body paints video games 1984 super bowl advertisement test drive macintosh apple switch get mac advertising campaigns apple computer long history advocating platform traditional media also covers advocacy macintosh hardware peripherals even lifestyle choices fans company projecting alternately hip entertaining liberating lifestyle negatively portraying microsoft windows ibm competitors anything awkward dated totalitarian sinister big brother figure neowin.net wrote editorials opposing windows-bashing media microsoft attempted boost popularity windows 7 launch party program like freebsd netbsd foundation hosts mailing list especially advocacy mailing list automatically archived made accessible online also provide official advocacy material posters flyers official powered logo license permitting use product running netbsd like freebsd netbsd openbsd project provides mailing list specifically intended advocacy advocacy openbsd.org created july 21 1998 discussion user groups stickers shirts promotion openbsd image also host flame-worthy discussions part advocacy project also maintains list consulting firms individual consultants around world website produced number slogans including free functional secure secure default power security flexibility openbsd release features original song variety artwork team os/2 grassroots organization conceived ibm employee initially joined ibmers quickly spread outside ibm whether ibm employees team os/2 members initially volunteered time passion without official sanction connection ibm members would promote os/2 trade shows conferences fairs stores participate operating system discussions compuserve prodigy fidonet usenet throw parties help users install os/2 contact media figures explain os/2 generate interest general exercise creativity initiative helping popularize os/2 industry dynamics gave rise passionate advocacy multi-faceted perhaps leading cause antipathy idea microsoft could would establish monopoly windows dos widely deemed far inferior os/2 additionally many users feared ibm proven eminently capable developing superior pc operating system knew little consumer marketing high-tech marketplace establishing even superior product standard cut-throat get-there-first-at-any-cost arena dominated microsoft finally mere fact many copies windows shipping users os/2 advocates viewed uncritical uninformed coupled fact many industry much riding success os/2 created conditions ripe many trying take matters hands spark needed combustible situation ignite example evangelism provided new ibm employees took empowerment seriously able coordinate efforts participation teamos2 forum internal ibm discussion group passionate supporters outside ibm adopted ideas modeled behaviors early activists within ibm
[ 2560, 6155, 7187, 10776, 25, 4637, 9762, 4643, 6180, 7217, 10803, 2614, 10809, 576, 2625, 8262, 6221, 3160, 10333, 97, 11363, 6760, 10856, 9835, 7285, 4727, 9335, 634, 1147, 3197, 1150, 5247, 11390, 2179, 10883, 10891, 6797, 10382, 6296, ...
Test
8,093
4
Feedback_loop_(email):feedback loop email feedback loop fbl sometimes called complaint feedback loop inter-organizational form feedback mailbox provider mp forwards complaints originating users sender organizations mps receive users complaints placing report spam buttons webmail pages email client via help desks message sender organization often email service provider come agreement mp want collect users complaints feedback loops one ways reporting spam whether provide fbl choice mp end users report abuse mailbox provider reporting hub also help filtering alternative competent users may send abuse complaints directly acting mailbox providers marketers striving mail delivered twofold advantage remove subscribers n't want receive kind advertising listwashing analyze complaint rate hence advertising meets market expectations unsubscribing users complain marketers reduce overall complaint rate per ip domain ensuring targeted mail much likely reach subscribers actually want receive esps playing sender role sensitive sending mail behalf customers may affect reputation monitoring complaint rate one ways control users sending weakness fbl relative asynchrony produce glitches possibly large time interval sits esp subscription fbl recipient clicking junk button interval click actual deletion recipient name list much shorter may noteworthy case huge mailbox providers gmail aol bulk messages provide information unsubscribe directly header fields codice_1 codice_2 besides providing direct better way unsubscribe also allows tell apart unsubscription junk reporting example one report message posted discussion list junk staying subscribed sketched process implies spencer besides author sender message connected postmaster responsible mail domain subscribing fbl usually involves postmaster authorization fbl subscriber may may forward abuse reports relevant authors subscribers exist given mail domain isaac omit sending abuse report fact subscriptions done one one laborious task mail domains engaged mass mailing may want skip addresses latter shortcoming proposing auto-subscribe just-in-time fbls started sending unsolicited abuse report directives minimum way unsubscribe ipsos noted majority respondents survey spam reporting marked messages spam based solely subject sender data years end users told trust email unsubscribe links many users hit spam button alternative unsubscribing consequently report spam may act unsubscribe cases one reasons hit unsubscribe links avoid confirming message received opened abuse reporting format arf standard format fbl reports much like bounce messages whose design inherited arf abuse report consists human readable part followed machine readable part original message report characterized feedback-type field whose values may indicate one abuse fraud virus types registered iana microsoft use name junk mail reporting jmr also use format google gmail beta testing non-traditional fbl select esps gmail uses format—an aggregate report reveals spam rate per notable sender sendgrid reports gmail fbl developed launched julian tempelsman sri somanchi effective identifying spam anti-spam systems miss
[ 8224, 1667, 488, 3145, 6762, 1899, 8202, 7949, 8747, 914, 10578, 5012, 6261, 1495 ]
None
8,094
4
Attack_surface:attack surface attack surface software environment sum different points attack vectors unauthorized user attacker try enter data extract data environment keeping attack surface small possible basic security measure examples attack vectors include user input fields protocols interfaces services due increase countless potential vulnerable points enterprise increasing advantage hackers attackers need find one vulnerable point succeed attack three steps towards understanding visualizing attack surface step 1 visualize visualize system enterprise first step mapping devices paths networks step 2 find indicators exposures second step correspond indicator vulnerability potentially exposed visualized map last step one ioe missing security controls systems software step 3 find indicators compromise indicator attack already succeeded one approach improving information security reduce attack surface system software basic strategies attack surface reduction include following reduce amount code running reduce entry points available untrusted users eliminate services requested relatively users less code available unauthorized actors tend fewer failures turning unnecessary functionality fewer security risks although attack surface reduction helps prevent security failures mitigate amount damage attacker could inflict vulnerability found
[ 5636, 6917, 11022, 4755, 10776, 2084, 9642, 10412, 11188, 3643, 11198, 9791, 9160, 6614, 4439, 7264, 4074, 2027, 9964, 5872, 5373, 2558, 8446 ]
None
8,095
4
Aurora_Generator_Test:aurora generator test idaho national laboratory ran aurora generator test 2007 demonstrate cyberattack could destroy physical components electric grid experiment used computer program rapidly open close diesel generator circuit breakers phase rest grid cause explode vulnerability referred aurora vulnerability vulnerability especially concern much grid equipment supports using modbus legacy communications protocols designed without security mind n't support authentication confidentiality replay protection means attacker communicate device control use aurora vulnerability destroy prepare experiment researchers procured installed 2.25 mw generator connected substation also needed access programmable digital relay another device controls breaker access could mechanical digital interface experiment researchers used cyberattack open close breakers sync maximize stress time breakers closed torque synchronization caused generator bounce shake eventually causing parts generator ripped apart sent flying parts generator landed far 80 feet away generator unit destroyed roughly three minutes however researchers assessed damage iteration attack real attack could destroyed unit much quickly experiment designated unclassified official use september 27 2007 cnn published article based information video dhs released july 3 2014 dhs released many documents related experiment part unrelated foia request aurora vulnerability caused out-of-sync closing protective relays close imperfect analogy would imagine effect shifting car reverse driven highway effect revving engine car neutral shifting drive aurora attack designed open circuit breaker wait system generator slip synchronism reclose breaker protection system recognizes responds attack ... traditional generator protection elements typically actuate block reclosing 15 cycles many variables affect time every system needs analyzed determine specific vulnerability aurora attack ... although main focus aurora attack potential 15-cycle window opportunity immediately target breaker opened overriding issue fast generator moves away system synchronism failure even single generator could cause widespread outages possibly cascading failure entire power grid occurred northeast blackout 2003 additionally even outages removal single component n-1 resilience large window second attack failure could take year replace destroyed generator many generators transformers custom-built aurora vulnerability mitigated preventing out-of-phase opening closing breakers suggested methods include adding functionality protective relays ensure synchronism adding time delay closing breakers one mitigation technique add synchronism-check function protective relays potentially connect two systems together implement function must prevent relay closing unless voltage frequency within pre-set range devices ieee 25 sync check relay well ieee 46,47,50 53 used prevent out-of-phase opening closing breakers discussion whether aurora hardware mitigation devices hmd cause failures may 2011 quanta technology published article used rtds real time digital simulator testing examine performance multiple commercial relay devices available aurora hmds quote relays subject different test categories find performance dependable need operate secure response typical power system transients faults power swing load switching ... general technical shortcomings protection scheme ’ design identified documented using real time testing results rtds testing showed yet single solution widely applied case present required reliability level presentation quanta technology dominion succinctly stated reliability assessment hmds dependable secure joe weiss cybersecurity control system professional disputed findings report claimed misled utilities wrote report done great deal damage implying aurora mitigation devices cause grid issues several utilities used quanta report basis installing aurora mitigation devices unfortunately report several questionable assumptions include applying initial conditions hardware mitigation designed address slower developing faults nominal grid frequencies existing protection address “ slower ” developing faults nominal grid frequencies 59 hz 61 hz aurora hardware mitigation devices fast out-of-phase condition faults currently gaps protection i.e. protected device grid march 4 2007 idaho national laboratory demonstrated aurora vulnerability june 21 2007 nerc notified industry aurora vulnerability september 27 2007 cnn released previously-classified demonstration video aurora attack homepage video downloaded october 13 2010 nerc released recommendation industry aurora vulnerability july 3 2014 us department homeland security released 840 pages documents related aurora
[ 4689, 4489, 8694, 5433 ]
Test
8,096
8
Fuse_Services_Framework:fuse services framework fuse services framework open source soap rest web services platform based apache cxf use enterprise organizations productized supported fuse group fusesource corp. fuse services framework service-enables new existing systems use enterprise soa infrastructure fuse services framework pluggable small-footprint engine creates high performance secure robust services minutes using front-end programming apis like jax-ws jax-rs supports multiple transports bindings extensible developers add bindings additional message formats systems work together without communicate centralized server fuse services framework part red hat jboss fuse fabric8 free apache 2.0 licensed upstream community jboss fuse product red hat
[ 1280, 10020, 1128, 8425, 4107, 5612, 5677, 11339, 7983, 9455, 3545, 2106 ]
Test
8,097
5
OpenLLDP:openlldp openlldp project aims bring comprehensive implementation ieee standard 802.1ab link layer discovery protocol openlldp currently supports lldp transmission reception following platforms
[ 11321, 823 ]
Validation
8,098
2
HomeOS:homeos homeos working title home automation operating system developed microsoft research early 2010s microsoft research announced project 2010 homeos communicates lab things cloud-based internet things infrastructure also developed microsoft slogan homeos project enabling smarter homes everyone homeos development team written three sample applications make use multiple devices including sticky media app plays music parts house lit rooms two-factor authentication app uses audio smartphones images front-door camera turn lights user identified home browser viewing controlling user access devices home staff worked homeos project cited microsoft ceo steve ballmer focus enterprise applications productivity software cloud computing reason stalled development homeos
[ 8576, 4995, 6787, 6797, 8976, 3857, 3477, 154, 5406, 10273, 7983, 9779, 1849, 321, 9033, 2380, 6476, 9166, 4305, 4051, 5600, 4194, 4964, 8423, 9194, 1148 ]
Test
8,099
0
James_Pustejovsky:james pustejovsky pustejovsky proposed generative lexicon theory lexical semantics interests include temporal reasoning event semantics spatial language language annotation computational linguistics machine learning pustejovsky research group current projects include timeml iso-space projects timeml project standard markup language temporal events document recently adopted iso-timeml iso iso-space iso-directed effort create expressive specification representation spatial information language previous work included medstract project effort extract information medical documents using current natural language processing technology
[ 1890, 11531, 7780 ]
Test
8,100
7
Object_request_broker:object request broker distributed computing object request broker orb middleware allows program calls made one computer another via computer network providing location transparency remote procedure calls orbs promote interoperability distributed object systems enabling systems built piecing together objects different vendors different parts communicate via orb orbs handle transformation in-process data structures raw byte sequence transmitted network called marshalling serialization addition marshalling data orbs often expose many features distributed transactions directory services real-time scheduling orbs corba-compliant systems use interface description language describe data transmitted remote calls object-oriented languages orb actually provides framework enables remote objects used network way local part process client side so-called stub objects created invoked serving part visible used inside client application stub methods invoked client-side orb performs marshalling invocation data forwards request server-side orb server side orb locates targeted object executes requested operation returns results results available client orb performs demarshalling passes results back invoked stub making available client application whole process transparent resulting remote objects appearing local
[ 7175, 9225, 3990, 11039, 2980, 10024, 8751, 8122, 9280, 9665, 4423, 333, 337, 2011, 9441, 10465, 3573, 6522, 3323 ]
Test
8,101
9
STOS_BASIC:stos basic stos basic dialect basic programming language implemented atari st computer stos basic originally developed jawx françois lionet constantin sotiropoulos published mandarin software known europress software stos basic version basic designed creating games set powerful high-level graphics sound commands offered made suitable developing multimedia-intense software without knowledge internals atari st although first version stos released uk version 2.3 released late 1988 mandarin software version released earlier france version 2.3 bundled three complete games orbit zoltar bullet train many accessories utilities sprite music editors compiler soon released enabled user compile stos basic program executable file ran lot faster compiled rather interpreted order compatible compiler stos needed upgraded version 2.4 came compiler stos 2.4 also fixed bugs faster floating point mathematics code floating point numbers smaller range stos 2.5 released make stos run atari stes tos 1.06 1.6 stos 2.6 needed make stos run atari stes tos 1.62 stos 2.7 compiler-only upgrade made programs stos tracker extension used play mod music compile 3rd-party hack called stos 2.07 designed make stos run even tos versions behave atari falcon around 2001 françois lionet released via clickteam website source code stos basic 4th april 2019 françois lionet announced release amos2 website amos2.tech amos2 replaces stos amos together using javascript code interpreter making new development system independent generally deployed internet browsers possible extend functionality stos adding extensions added commands language increased functionality first extension released stos maestro added ability play sampled sounds stos maestro plus stos maestro bundled sound-sampler cartridge extensions included tome stos 3d ste extension misty missing link control extension extra ninja tracker extensions kept stos alive many years release giving programmers ability rapidly create game without knowing internals stos criticised slow especially intensively using non-high-level commands allowing user program structured manner 1990 amos basic released amiga originally meant shortly follow release stos atari st. amos released two years uk release stos turned blessing disguise amiga community thanks extra development time amos take advantage extra amiga hardware commands stos style basic completely different line-numbers many structured programming constructs one time stos club newsletter published program allowed reader program stos using style often possible directly convert stos basic programs heavily rely extensions amos basic reverse usually true pc version called pcos mentioned never materialised instead publishers mandarin software renamed europress software one developers jawx francois lionet later form clickteam yves lamoureux went release klik click series games-creation tools dissimilar stos use primarily mouse-driven interface without need traditional code klik play games factory multimedia fusion multimedia fusion 2 released series
[ 3462, 3718, 7691, 1805, 9997, 786, 11412, 22, 3736, 3481, 9881, 797, 1952, 3233, 11683, 5925, 4136, 10666, 8494, 303, 7343, 11315, 315, 7355, 7486, 7870, 4160, 4674, 8262, 10750, 712, 847, 1879, 92, 11229, 2915, 9188, 5733, 11243, 2541, ...
Test
8,102
3
PowerPC_G4:powerpc g4 powerpc g4 designation used apple computer eyetech describe fourth generation 32-bit powerpc microprocessors apple applied name various though closely related processor models freescale former part motorola motorola freescale proper name family processors powerpc 74xx macintosh computers powerbook g4 ibook g4 laptops power mac g4 power mac g4 cube desktops took name processor powerpc g4 processors also used emac first-generation xserves first-generation mac minis imac g4 introduction powerpc 970 apple completely phased g4 series desktop models selected 64-bit ibm-produced powerpc 970 processor basis powerpc g5 series last desktop model used g4 mac mini comes intel processor last portable use g4 ibook g4 replaced intel-based macbook powerbook g4 replaced intel-based macbook pro powerpc g4 processors also popular computer systems amigaone series computers pegasos genesi besides desktop computers powerpc g4 popular embedded environments like routers telecom switches imaging media processing avionics military applications one take advantage altivec smp capabilities powerpc 7400 code-named max debuted august 1999 first processor carry g4 moniker chip operates speeds ranging 350 500 mhz contains 10.5 million transistors manufactured using motorola 0.20 μm hipermos6 process die measures 83 mm² features copper interconnects motorola promised apple deliver parts speed 500 mhz yields proved low initially forced apple take back advertised 500 mhz models powermac g4 power mac series downgraded abruptly 400 450 500 mhz processor speeds 350 400 450 mhz problems chip ironed incident generated rift apple-motorola relationship reportedly caused apple ask ibm assistance get production yields motorola 7400 series line 500 mhz model reintroduced february 16 2000 much 7400 design done motorola close co-operation apple ibm ibm third member aim alliance designed chip together motorola somerset design center chose manufacture see need back vector processing unit ultimately g4 architecture design contained 128-bit vector processing unit labelled altivec motorola apple marketing referred velocity engine powerpc 970 g5 first ibm-manufactured cpu implement vmx/altivec ibm reused old 7400 design still design motorola somerset xenon cpu xbox 360 also features vmx added proprietary extensions made especially microsoft power6 introduced 2007 ibms first big iron cpu also implement vmx altivec unit 7400 microprocessor four-way single precision 32-bit floating point math 16-way 8-bit 8-way 16-bit four-way 32-bit integer math single cycle furthermore vector processing unit superscalar two vector operations time compared intel x86 microprocessors time feature offered substantial performance boost applications designed take advantage altivec unit examples adobe photoshop utilises altivec unit faster rendering effects transitions apple ilife suite takes advantage unit importing converting files fly additionally 7400 enhanced support symmetric multiprocessing smp thanks improved cache coherency protocol mersi 64-bit floating point unit fpu derived part 604 series 603 series 32-bit fpu took two clock cycles accomplish 64-bit floating point arithmetic powerpc g4 family supports two bus technologies older 60x bus shares powerpc 600 powerpc 7xx families advanced mpx bus devices utilize 60x bus made compatible either 6xx 7xx processors enabling wide variety offerings clear cheap upgrade path keeping compatibility issues minimum primarily two companies manufacturing system controllers 7xx 7xxx computers tundra tsi1xx controllers marvell discovery controllers powerpc 7410 nitro low-power version 7400 manufactured 180 nm instead 200 nm like 7400 10.5 million transistors debuted powerbook g4 9 january 2001 chip added ability use half cache high-speed non-cached memory mapped processor physical address space desired feature used embedded systems vendors mercury computer systems powerpc 7450 voyager v'ger major redesign g4 processor 33-million transistor chip extended significantly execution pipeline 7400 7 vs. 4 stages minimum reach higher clock speeds improved instruction throughput 3 branch vs. 2 branch per cycle compensate higher instruction latency replaced external l2 cache 2 mb 2-way set associative 64-bit data path integrated one 256 kb 8-way set associative 256-bit data path supported external l3 cache 2 mb 8-way set associative 64-bit data path featured many architectural advancements altivec unit improved 7450 instead executing one vector permute instruction one vector alu simple int complex int float instruction per cycle like 7400/7410 7450 motorola/freescale-followers execute two arbitrary vector instructions simultaneously permute simple int complex int float introduced 733 mhz power mac g4 9 january 2001 motorola followed interim release 7451 codenamed apollo 6 like 7455 early amigaone xe computers shipped 7451 processor enhancements 745x design gave nicknames g4e g4+ never official designations powerpc 7455 “ apollo 6 ” introduced january 2002 came wider 256-bit on-chip cache path fabricated motorola 0.18 µm 180 nm hipermos process copper interconnects soi first processor apple computer pass 1 ghz mark 7445 chip without l3 cache interface 7455 used amigaone xe g4 dual 1 ghz power mac g4 quicksilver 2002 powerpc 7447 apollo 7 slightly improved 7450/55 512 kb on-chip l2 cache manufactured 130 nm process soi hence drawing less power 58 million transistors 7447a introduced integrated thermal diode well dfs dynamic frequency scaling freescale able reach slightly higher clock 7457 additional l3 cache interface supporting 4 mb l3 cache 2 mb supported 7455 7450 however frequency scaling stagnated apple chose use 7447 instead 7457 despite 7457 l3 cache-enabled successor l3 cache-enabled 7455 apple used companies offer 7457 form upgrades power mac g4 imac g4 power mac g4 cube giga designs sonnet technology daystar technology use 7457 imac g4 upgrades powerlogix pegasos computer platform genesi also uses 7447 pegasos-ii/g4 7457 often used repair amigaone xe cpu module amigaos software 7457 installed may mistake amigaone pegasos ii computer never official 7457 boards released eyetech powerpc 7448 apollo 8 evolution powerpc 7447a announced first freescale technology forum june 2005 improvements higher clock rates 1.7 ghz officially easily 2.4 ghz overclocking larger 1 mb l2 cache faster 200 mhz front side bus lower power consumption 18 w 1.7 ghz fabricated 90 nm process copper interconnects soi powerpc 7448 users 2004 freescale renamed g4 core e600 changed focus general cpus high-end embedded soc devices introduced new naming scheme mpc86xx 7448 last pure g4 formed base new e600 core seven-stage three-issue pipeline powerful branch prediction unit handles sixteen instructions out-of-order enhanced altivec unit capable limited out-of-order execution 1 mb l2 cache list complete list known g4 based designs excluding newer core e600 designs pictures illustrations scale
[ 6663, 5642, 1548, 528, 1042, 2073, 1563, 8231, 11314, 8761, 6715, 576, 9302, 1635, 7269, 3185, 4211, 5235, 7286, 7299, 1158, 4743, 7302, 7305, 8860, 6815, 6311, 4264, 9391, 5297, 11447, 11449, 1725, 10945, 10966, 6878, 7913, 10985, 9964, ...
Test
8,103
2
Volume_licensing:volume licensing software licensing volume licensing practice selling license authorizing one computer program used large number computers large number users customers licensing schemes typically business governmental educational institutions prices volume licensing varying depending type quantity applicable subscription-term example microsoft software available volume-licensing programs includes microsoft windows microsoft office traditionally volume licensing key vlk could supplied instances licensed computer program involved volume licensing popularity software service practices volume licensing customers supply software credentials belonging online user account instead used aspects services provisioning traditionally product key supplied computer programs acts analogously password computer programs old ask user prove entitlement response user provides key key however must used i.e one computer volume licensing key vlk however used several computers vendors take additional steps ensure products key used intended number efforts called product activation volume licenses always transferable example types microsoft volume license transferred provided formal transfer process completed enables microsoft register new owner small number software vendors specialize brokering transfers order allow selling volume licenses keys notable discount-licensing pioneered sale microsoft volume licenses way microsoft engaged volume licensing since inception enterprise sector primary market release windows xp 2001 microsoft introduced microsoft product activation digital rights management drm scheme curb software piracy among consumers verifying user entitlement product license time however volume-licensed versions windows xp exempt measure see starting windows vista microsoft introduced two volume licensing methods professionals charge installing windows organizations covered microsoft product activation first multiple activation keys mak windows xp volume licensing keys require product activation second key management server kms corresponding keys hosts activated via kms report back software license server every 180 days licenses using schemes procured via microsoft software assurance program large group microsoft customers oems assemble sell computers desktops laptops tablet computers mobile device devices sold oems windows license data stored computer bios area referred acpi_slic kms detect use previous microsoft products even storage device removed erased windows vista windows 7 slic data complementary volume licensing product key still supplied device user needs event reinstalling windows starting windows 8 however everything needed authorize device stored slic data 2010 microsoft introduced office 365 licensing program microsoft office microsoft exchange server skype business server products licensed based software service saas model exchange monthly subscription fee software updates support provisioning administration licensing additional services provided online web-based dashboard scheme licensed apps communicate recurrently microsoft internet product key needs issued user instead administrator needs sign microsoft account holds details licensed apps number payment methods account protected credentials username password introduced 2011 adobe creative cloud saas offering software produced adobe updates support provisioning administration licensing additional services provided internet exchange monthly subscription fee office 365 user account registered adobe required authorize software store payment information microsoft blocked several volume license keys abused service packs starting windows xp service pack 1 microsoft even developed new key verification engine windows xp service pack 2 could detect illicit keys even never used several security consultants condemned move microsoft saying leaving large install base unpatched various security holes irresponsible unpatched install base leveraged large scale internet attacks trojan horses used send spam e-mail others come microsoft defense arguing microsoft provide support illegal users much public outcry microsoft elected disable new key verification engine service pack 2 checks small list commonly used keys service pack 1 users existing installations windows xp also change product key following instructions microsoft volume license key commonly used bypass product activation early versions microsoft windows xp operating system codice_1 key part first warez release final version windows xp group called devils0wn 35 days official retail release 28 august 2001 key obsolete blacklisted microsoft since august 2004 affected computers display wga notification made famous partly featured popular image circulated internet retail launch windows xp image key written cd-r containing leaked operating system held front digital microsoft sign counting days release windows xp users using keys receive error message install latest service pack users told obtain legitimate license change product key client machine correct kms client setup keys authenticate kms server kms client keys well known documented publicly microsoft kms servers require minimum 25 clients properly activate also stop counting additional licenses beyond 50 automatically accept client key reaching 25 client threshold businesses operating kms servers required properly shield kms server behind firewalls reached internet used authorize illegal use kms client keys general public public exposure kms server result microsoft revoking server key thereby disabling attaching clients external kms server access desirable devices long-term leave away corporate network kms client activation expire six months able contact kms server situation business make accessible virtual private network vpn known devices outside corporate network unofficial kms server emulator exists activate windows office even software licensed paid regardless whether 25 computers network regardless whether previous version windows installed also program send kms requests legitimate kms server order fool server thinking 25 computers network microsoft considers exploits violation terms conditions
[ 6462, 321, 2244, 10756, 582, 4074, 6797, 8976, 467, 10900, 5749, 9173, 11103, 440, 4505, 2558, 6367 ]
Test
8,104
4
Wikimedia_Foundation_v._NSA:wikimedia foundation v. nsa suit filed united states district court district maryland nsa based fort meade maryland suit dismissed october 2015 judge t. s. ellis iii decision appealed four months later fourth circuit court appeals wikimedia foundation court appeals found dismissal valid plaintiffs except foundation whose allegations court found plausible enough legal standing case remanded lower court original plaintiffs besides wikimedia foundation national association criminal defense lawyers human rights watch amnesty international usa pen american center global fund women nation magazine ref name= nation 03/31/2015 /ref rutherford institute washington office latin america upstream surveillance first revealed may 2013 edward snowden former nsa analyst previous challenge aclu clapper v. amnesty international usa failed lack standing light leaks snowden included top secret nsa slide specifically referred wikipedia target http surveillance wikimedia foundation pushed forward legal complaint nsa violating users first fourth amendment rights since clapper government confirmed many key facts nsa upstream surveillance including conducts suspicionless searches. ref name= js 03/30/2015 /ref aclu attorney patrick toomey noted lawsuit particularly relevant plaintiffs engage hundreds billions international communications annually program upstream surveillance must necessarily sweep substantial part communications august 6 2015 defendants national security agency et al brought motion dismiss arguing plaintiffs plausibly shown injured upstream collection data thus lack standing sue response electronic frontier foundation filed amicus brief behalf group libraries booksellers sides presented oral arguments hearing september 25 2015 october 23 2015 district court district maryland dismissed suit grounds standing us district judge t. s. ellis iii ruled plaintiffs could plausibly prove subject upstream surveillance echoing 2013 decision clapper v. amnesty international us wikimedia foundation said expected appeal decision foundation said complaint merit question upstream surveillance captured communications user community wikimedia foundation electronic frontier foundation filed amicus brief support plaintiffs said perverse dismiss suit lack proof standing surveillance program complained secret urged federal courts tackle serious constitutional issues upstream surveillance presents plaintiffs filed appeal united states court appeals fourth circuit february 17 2016 may 23 2017 fourth circuit court appeals vacated dismissal lower court wikimedia complaints court appeals ruled foundation allegations nsa fourth amendment violations plausible enough survive facial challenge standing finding potential harm done nsa collection private data speculative court thereby remanded suit foundation ordered district court maryland continue proceedings court inversely affirmed dismissal ellis suits plaintiffs finding court noted non-wikimedia plaintiffs made strong enough case operations affected upstream scope
[ 1189, 3495, 6344, 7887, 208, 1169, 4177, 4595, 7893 ]
Test
8,105
2
European_Union_vs._Google:european union vs. google since 2010 european union launched three separate antitrust investigations google violating eu competition laws due dominant position market cases resulted formal charges google related google shopping google adsense android operating system date google found guilty antitrust behavior cases related google shopping android fined 10 november 2010 european commission opened formal investigation google search algorithm following number complaints issued smaller web companies google downgrading placement results returned google search results google preferentially favoring products competitors ec investigation also considered issues google terms use google adsense prevented using adsense use advertising google competitors 15 april 2015 five years investigation ec issued first statement objections towards google related towards preferential treatment google shopping product including google product search search results specific complaints issued ec included 27 june 2017 google found guilty fined largest antitrust fine issued ec google denied european union accusations made statement claiming “ services helped region digital economy grow ” fine represented 2.5 google 2016 revenue competition google pushing company individually monitored fear losing business dominant search engine would include investigating overviewing google prized search page algorithm pagerank eu competition commission decided monitor decision google compliance due obligation report eucc regular basis every four months although issue seems like close european commission believes continue time order comply google effectively separating comparison shopping service company fine google shopping service still part google run completely separately revenues profits move allow google avoid fines according bloomberg complies european union order allowing even treatment businesses matter compete google however even though google complying part company still appealing decision google responded appeal papers eu antitrust fine stating eu chair misstated facts show enough evidence prove site hurt rivals google wants fine either overturned reduced appeal based six arguments two court prove google favored shopping service placing paid ads top search results two stated courts misstated facts evidence two argued fine warranted possible penalty investigating case related google shopping ec found additional evidence related potential antitrust issues related google adsense issued statement complaints 14 july 2016 complaints centered google licensed adsense direct partners 20 march 2019 european commission imposed fine 1.49 € billion google abusive practices online advertising ec actions investigate google approach android operating system predicated two complaints received first complaint came fairsearch fairsearch established 2010 coalition travel-related web companies including expedia tripadvisor try fight google proposed acquisition ita developed airfare search software group shifted towards becoming google watchdog group looking instances google activities considered potentially anti-competition companies like microsoft nokia oracle joined group support broader effort prior attention android system fairsearch issued complaints ec google search engines would preferentially weight results google services partners others part antitrust investigations conducted eu since 2010 april 2013 european branch fairsearch filed formal complaint eu still investigating google previous complaints citing google practices android violated various eu antitrust laws complaint identified google required original equipment manufacturer oem wanting install google suite android apps including access google play store license entire suite feature predominately mobile device second anti-trust complaint google filed aptoide june 2014 alternative marketplace android apps aptoide asserted google approach google made difficult alternatives google play store installed components part google android open source project moved google mobile services suite including gmail google maps play store 15 april 2015 european commission started official investigation google following complaints filed fairsearch apotoide internal evaluation complaints year ec stated company may taken unlawful actions maintain google dominant position mobile market licensed suite android applications new investigation announced alongside ec findings antitrust investigation google search engine practices otherwise treated separate action google commission identified three points concern first statement objections google countered investigation practices android different apple inc. microsoft bundles proprietary apps respective ios windows phone oems still able distribute android-based phones without google suite apps investigation google formed alphabet inc. holding company google various subsidiaries google becoming one alphabet subsidiaries year 20 april 2016 european commission announced issue second statement objections addressing google alphabet within charges new set complaints amending first statement objections asserted google violated eu antitrust laws potential fines case google found violating antitrust laws maximum amount 10 company annual revenue time issuing second statement objection 19 july 2018 eu fined google google responded would appeal fine october 2018 according company spokesperson al verney android created choice everyone less date fine biggest ever imposed european union company anti-competitive behaviour european union competition commissioner margrethe vestager part decision google stated eu found google search anti-trust case 2017 google attempt settle issues android anti-trust issues far late eu filed initial charges google october 2018 google revamped would distribute google play store android future charging licensing fee store without requiring installation google apps making free pre-install google apps want furthermore google hardware partners allowed market devices eu run rival versions android operating systems march 2019 google announced give european users android phones option browser search engine want phone time purchase comply eu decision
[]
None
8,106
2
Subgraph_(operating_system):subgraph operating system subgraph os linux distribution designed resistant surveillance interference sophisticated adversaries internet based upon debian linux operating system mentioned edward snowden showing future potential subgraph os designed locked features aim reduce attack surface operating system increase difficulty required carry certain classes attack accomplished system hardening proactive ongoing focus security attack resistance subgraph os also places emphasis ensuring integrity installed software packages deterministic compilation subgraph os notable features include security subgraph os uses sandbox containers questioned comparison qubes uses virtualization another security focused operating system attacker trick subgraph user run malicious unsandboxed script via os default nautilus file manager terminal also possible run malicious code containing .desktop files used launch applications malware also bypass subgraph os application firewall also design subgraph isolate network stack like qubes os prevent bad usb exploits
[ 10016, 2118, 3495, 4972, 9646, 9455, 5363, 5397, 10933, 7483, 3422 ]
None
8,107
3
Joy's_law_(computing):joy law computing computing joy law first formulated sun microsystems co-founder bill joy 1983 states peak computer speed doubles year thus given simple function time specifically peak computer speed attained year expressed mips another statement attributed bill joy also referred joy law holds smartest people work someone else
[ 2273, 1316, 9665 ]
None
8,108
9
JDK_Enhancement_Proposal:jdk enhancement proposal jdk enhancement proposal jep process drafted oracle corporation collecting proposals enhancements java development kit openjdk words oracle jep serve long-term roadmap jdk release projects related efforts jep process intended replace java community process still required approve changes java api language rather allow openjdk committers work informally becoming formal java specification request
[ 4960, 8262, 5677, 2038, 9178 ]
Test
8,109
2
IPhone_8:iphone 8 iphone 8 iphone 8 plus smartphones designed developed marketed apple inc eleventh generation iphone announced september 12 2017 alongside higher-end iphone x steve jobs theater apple park campus released september 22 2017 succeeding iphone 7 iphone 7 plus besides addition glass back designs iphone 8 8 plus largely similar predecessors notable changes include addition inductive charging faster processor improved cameras displays iphone 8 8 plus share internal hardware iphone x reception phones mixed reviewers praising addition inductive charging new apple a11 processor significantly criticizing aging design august 31 2017 apple sent press invites media event steve jobs theater apple park campus september 12 2017 iphone 8 iphone 8 plus announced event released september 22 2017 april 9 2018 apple introduced iphone 8 red color finish black front support partnership product red aids fundraising campaign iphone 8 8 plus retain retina hd display found iphone 7 feature true tone technology allowing automatic screen adjustments based surrounding ambient lighting play hdr10 dolby vision content despite hdr-ready display done down-converting hdr content fit display still enhancements dynamic range contrast wide color gamut compared standard content iphone 8 features 12 mp camera autofocus f/1.8 aperture optical image stabilization capable capturing 4k video 24 30 60 frames per second 1080p video 30 60 120 240 frames per second iphone 8 plus upgrades main camera wide-angle lens 10× digital zoom 2× optical zoom retains second telephoto lens similar one found iphone 7 plus improved depth-of-field lighting effects portrait mode models 7 mp front camera f/2.2 aperture capable capturing 1080p video 30 frames per second 720p video 240 frames per second along face detection high-dynamic range iphone 8 8 plus contain apple a11 bionic system-on-chip hexa-core processor company says features two cores 25 faster iphone 7 a10 processor four cores 70 faster prior model phones also feature apple-designed graphics processing unit 30 faster prior units level performance a10 half power phones glass backs instead complete aluminum housing found prior models enabling use qi inductive charging phones rated ip67 water resistance models come 64 256 gigabyte storage options offered silver gold space gray color options product red special edition version red black front released april 9 2018 iphone 7 7 plus special editions white front iphone 8 6 10 repairability score ifixit mainly due use excessive glue battery glass back iphone 8 8 plus shipped ios 11 launch support ios 12 also support ios 13 samuel axon ars technica called a11 processor marvelous feat engineering writing offers industry-leading performance axon also praised cameras writing colors great low light performance good smartphone chris velazco engadget praised speed a11 processor build quality excellent camera criticizing design familiarities previous iphone generations limited water-protection levels compared competitors john mccann techradar enjoyed feel glass back despite criticizing phone overall design mccann also praised camera called inductive charging useful addition iphone lineup david pierce wired similarly stated iphone 8 models overshadowed iphone x despite calling virtually perfect phones pierce praised performance cameras displays repeatedly criticizing outdated design nilay patel verge called iphone 8 default option noting 8 models stand almost universally overlooked apple new iphone launched iphone x nevertheless praised device form factor easy non-slippery hold display addition true tone technology upgraded speakers though cited issues inductive charging speed wireless pads well price iphone 8 plus 256 gb close iphone x. patel also criticized iphone 8 aging design dating back iphone 6 released 2014 notable critique thick bezels compared 2017 smartphones designed nearly bezel-less faces incorporate larger screens similar form factor iphone 8 8 plus also criticized durability drop tests performed showed rear glass durable glass ever smartphone claimed apple camera testing company dxomark gave camera iphone 8 rating 92 8 plus rating 94 giving title best smartphone cameras tested company samsung galaxy note 8 later matched iphone 8 plus identical overall score 94 later overtaken google pixel 2 scored 98 rating august 31 2018 apple announced small percentage iphone 8 devices released september 2017 march 2018 contained manufacturing defect logic board fault affected iphone 8 models sold australia china hong kong india japan macau new zealand united states defective devices may experience unexpected reboots frozen unresponsive screen may fail turn users affected device determined serial number device replaced free apple issue affect iphone 8 plus
[ 10755, 9732, 1549, 5647, 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 6186, 4139, 6700, 7211, 1074, 8754, 9784, 1083, 8253, 576, 1090, 8783, 4180, 10838, 1623, 3672, 10840, 9312, 3681, 9826, 8806, 3691, 2673, 6258, 10357, 6264, ...
None
8,110
6
Rock_Ridge:rock ridge rock ridge interchange protocol rrip ieee p1282 extension iso 9660 volume format commonly used cd-rom dvd media adds posix file system semantics availability extension properties allows better integration unix unix-like operating systems standard takes name fictional town rock ridge mel brooks film blazing saddles rrip extensions briefly rrip extensions built upon related standard system use sharing protocol susp ieee p1281 susp provides generic way including additional properties directory entry reachable primary volume descriptor pvd iso 9660 volume every directory entry optional system use area whose contents undefined left interpreted system susp defines method subdivide area multiple system use fields identified two-character signature tag idea behind susp would enable number independent extensions iso 9660 rrip created included volume without conflicting also allows inclusion property data would otherwise large fit within limits system use area susp defines several common tags system use fields rrip defines additional susp tags support posix semantics along format meaning corresponding system use fields known susp fields include linux kernel built config_zisofs transparently decompresses data files marked additionally libburnia project proposed aaip would add following susp tag note apple iso 9660 extensions technically follow susp standard however basic structure aa ab fields defined apple forward compatible susp care volume use apple extensions well rrip extensions amiga rock ridge similar rrip except provides additional properties used amiga operating system built susp standard defining -tagged system use field thus amiga rock ridge posix rrip may used simultaneously volume specific properties supported extension additional amiga-bits files support attribute p stands pure bit indicating re-entrant command attribute script bit indicating batch file includes protection flags plus optional comment field extensions introduced angela schmidt help andrew young primary author rock ridge interchange protocol system use sharing protocol first publicly available software master cd-rom amiga extensions makecd amiga software angela schmidt developed together patrick ohly masteriso also recognizes extension also supported frying pan support latter one program uncredited amiga cd-rom filesystems supporting extensions amicdfs asimcdfs cachecdfs babelcdromfs users want access comments protection bits amiga files present cds could simply mount new logical units associated physical unit using one cd-rom filesystems mentioned
[ 8075, 5397, 671, 9762, 5413, 7720, 5293, 6062, 7342, 11568, 5816, 188, 5062, 5969, 3923, 2395, 5596, 5231, 7663, 5492 ]
Test
8,111
1
World_Spider_Catalog:world spider catalog world spider catalog wsc online searchable database concerned spider taxonomy aims list accepted families genera species well provide access related taxonomic literature wsc began series individual web pages 2000 created norman i. platnick american museum natural history platnick retirement 2014 natural history museum bern switzerland took catalog converting relational database 48,265 accepted species listed order araneae spiders seventh-largest number species orders existence world spider catalog makes spiders largest taxon online listing updated regularly described exhaustive resource promoted rigorous scholarship amplified productivity taxonomy spiders
[ 2901, 9286 ]
Test
8,112
2
Usplash:usplash usplash software project ubuntu community historically scrolling text verbose mode typically appeared linux computers boot usplash replaces scrolling-text screens graphical splash screen designed replace bootsplash thing kernel space level since usplash operates user space updated without recompiling kernel usplash uses linux framebuffer interface alternatively direct vesa access display splash screen ubuntu 9.10 karmic koala usplash used preliminary stages booting xsplash takes ubuntu 10.04 lts lucid lynx usplash fully replaced plymouth uses direct rendering manager drm kms driver
[ 11669, 3478, 8476, 926, 10016, 5410, 3245, 6445, 439, 823, 10687, 3654, 5962, 975, 7375, 1107, 4951, 3033, 3550, 5343, 4192, 6625, 7140, 5990, 7913, 7020, 9324, 11631, 8177, 2930, 9971, 1396, 3189, 5369, 5755, 11263 ]
Validation
8,113
9
APMonitor:apmonitor advanced process monitor apmonitor modeling language differential algebraic dae equations free web-service local server solving representations physical systems form implicit dae models apmonitor suited large-scale problems solves linear programming integer programming nonlinear programming nonlinear mixed integer programming dynamic simulation moving horizon estimation nonlinear model predictive control apmonitor solve problems directly calls nonlinear programming solvers apopt bpopt ipopt minos snopt apmonitor api provides exact first second derivatives continuous functions solvers automatic differentiation sparse matrix form julia matlab python mathematical programming languages apmonitor integration web-service apis gekko optimization suite recent extension apmonitor complete python integration interfaces built-in optimization toolboxes modules load process solutions optimization problems apmonitor object-oriented modeling language optimization suite relies programming languages load run retrieve solutions apmonitor models data compiled run-time translated objects solved optimization engine apopt ipopt optimization engine specified apmonitor allowing several different optimization engines switched simulation optimization mode also configurable reconfigure model dynamic simulation nonlinear model predictive control moving horizon estimation general problems mathematical optimization first step solving problem mathematical model expressed terms variables equations hock schittkowski benchmark problem 71 used test performance nonlinear programming solvers particular optimization problem objective function formula_1 subject inequality constraint formula_2 equality constraint formula_3 four variables must lower bound 1 upper bound 5 initial guess values formula_4 mathematical model translated apmonitor modeling language following text file problem solved python first installing apmonitor package pip install apmonitor following python code installing python required module apmonitor package installed imported apm_solve function solves optimization problem solution returned programming language processing analysis similar interfaces available matlab julia minor differences syntax extending capability modeling language important significant pre- post-processing data solutions often required solving complex optimization dynamic simulation estimation control problems highest order derivative necessary return dae ode form called differentiation index standard way dealing high-index daes differentiate equations put index-1 dae ode form see pantelides algorithm however approach cause number undesirable numerical issues instability syntax similar modeling languages gproms apmonitor solves daes index without rearrangement differentiation example index-3 dae shown pendulum motion equations lower index rearrangements return system equations ode form see index 0 3 pendulum example many physical systems naturally expressed differential algebraic equation include models direct current dc motor blood glucose response insulin dependent patient listed representative differential algebraic equations encountered many branches science engineering
[ 9376, 5830, 329, 7593, 587, 5612, 8554, 3567, 1039, 7983, 4019, 9431, 7326, 9915, 6718 ]
Validation
8,114
6
Hierarchical_File_System:hierarchical file system hierarchical file system hfs proprietary file system developed apple inc. use computer systems running mac os originally designed use floppy hard disks also found read-only media cd-roms hfs also referred mac os standard hfs standard successor hfs plus also called mac os extended hfs extended introduction mac os x 10.6 apple dropped support formatting writing hfs disks images remain supported read-only volumes starting macos 10.15 hfs disks longer read apple introduced hfs september 1985 specifically support apple first hard disk drive macintosh replacing macintosh file system mfs original file system introduced year half earlier first macintosh computer hfs drew heavily upon apple first hierarchical operating system sos failed apple iii also served basis hierarchical file systems apple iie apple lisa hfs developed patrick dirks bill bruffey shared number design features mfs available file systems time dos fat files could multiple forks normally data resource fork allowed main data file stored separately resources icons might need localized files referenced unique file ids rather file names file names could 255 characters long although finder supported maximum 31 characters however mfs optimized used small slow media namely floppy disks hfs introduced overcome performance problems arrived introduction larger media notably hard drives main concern time needed display contents folder mfs file directory listing information stored single file system search build list files stored particular folder worked well system hundred kilobytes storage perhaps hundred files systems grew megabytes thousands files performance degraded rapidly solution replace mfs directory structure one suitable larger file systems hfs replaced flat table structure catalog file uses b-tree structure could searched quickly regardless size hfs also redesigned various structures able hold larger numbers 16-bit integers replaced 32-bit almost universally oddly one places upsizing take place file directory limits hfs total 65,535 files logical disk hfs proprietary file system format well-documented usually solutions available access hfs-formatted disks modern operating systems apple introduced hfs necessity first 20 mb hard disk offering macintosh september 1985 loaded ram mfs floppy disk boot using patch file hard disk 20 however hfs widely introduced included 128k rom debuted macintosh plus january 1986 along larger 800 kb floppy disk drive macintosh also used hfs introduction hfs first advancement apple leave macintosh computer model behind original 128k macintosh lacked sufficient memory load hfs code promptly discontinued 1998 apple introduced hfs plus address inefficient allocation disk space hfs add improvements hfs still supported current versions mac os starting mac os x hfs volume used booting beginning mac os x 10.6 snow leopard hfs volumes read-only created updated macos sierra 10.12 apple release notes state hfs standard filesystem longer supported however read-only hfs standard support still present sierra works previous versions storage volume inherently divided logical blocks 512 bytes hierarchical file system groups logical blocks allocation blocks contain one logical blocks depending total size volume hfs uses 16-bit value address allocation blocks limiting number allocation blocks 65,535 2-1 five structures make hfs volume catalog file stores file directory records single data structure results performance problems system allows multitasking one program write structure time meaning many programs may waiting queue due one program hogging system also serious reliability concern damage file destroy entire file system contrasts file systems store file directory records separate structures dos fat file system unix file system structure distributed across disk means damaging single directory generally non-fatal data may possibly re-constructed data held non-damaged portions additionally limit 65,535 allocation blocks resulted files minimum size equivalent 1/65,535th size disk thus given volume matter size could store maximum 65,535 files moreover file would allocated space actually needed allocation block size disks small little consequence individual allocation block size trivial disks started approach 1 gb mark smallest amount space file could occupy single allocation block became excessively large wasting significant amounts disk space example 1 gb disk allocation block size hfs 16 kb even 1 byte file would take 16 kb disk space situation less problem users large files pictures databases audio larger files wasted less space percentage file size users many small files hand could lose copious amount space due large allocation block size made partitioning disks smaller logical volumes appealing mac users small documents stored smaller volume would take much less space resided large partition problem existed fat16 file system hfs saves case file created renamed case-insensitive operation
[ 5120, 2564, 1542, 6669, 3598, 10257, 4114, 9236, 6677, 5142, 8214, 3611, 5661, 9249, 9762, 5158, 7720, 1592, 7225, 11323, 8254, 576, 8772, 1109, 9308, 3167, 10851, 4708, 10857, 9836, 7789, 5743, 6771, 4724, 9333, 6263, 2168, 9335, 9848, 9...
Test
8,115
6
RAM_drive:ram drive ram drive also called ram disk block random-access memory primary storage volatile memory computer software treating memory disk drive secondary storage sometimes referred virtual ram drive software ram drive distinguish hardware ram drive uses separate hardware containing ram type battery-backed solid-state drive performance ram drive general orders magnitude faster forms storage media ssd hard drive tape drive optical drive performance gain due multiple factors including access time maximum throughput type file system file access time greatly reduced since ram drive solid state mechanical parts physical hard drive optical media cd-rom dvd blu-ray must move head optical eye position tape drives must wind rewind particular position media reading writing occur ram drives access data memory address given file movement alignment positioning necessary second maximum throughput ram drive limited speed ram data bus cpu computer forms storage media limited speed storage bus ide pata sata usb firewire compounding limitation speed actual mechanics drive motors heads eyes third file system use ntfs hfs ufs ext2 etc. uses extra accesses reads writes drive although small add quickly especially event many small files vs. larger files temporary internet folders web caches etc. storage ram volatile memory means lost event power loss whether intentional computer reboot shutdown accidental power failure system crash general weakness data must periodically backed persistent-storage medium avoid loss sometimes desirable example working decrypted copy encrypted file many cases data stored ram drive created data permanently stored elsewhere faster access re-created ram drive system reboots apart risk data loss major limitation ram drives limited capacity constrained amount ram within machine multi-terabyte-capacity persistent storage become commoditized 2012 whereas ram still measured gigabytes ram drives use normal ram main memory partition hard drive rather actually accessing data bus normally used secondary storage though ram drives often supported directly operating system via special mechanisms operating system kernel possible also create manage ram drive application usually battery backup needed due temporary nature information stored ram drive uninterrupted power supply keep entire system running power outage necessary ram drives use compressed file system cramfs allow compressed data accessed fly without decompressing first convenient ram drives often small due higher price per byte conventional hard drive storage first software ram drive microcomputers invented written jerry karlin uk 1979/80 software known silicon disk system developed commercial product marketed jk systems research became microcosm research ltd company joined peter cheesewright microcosm ltd idea enable early microcomputers use ram cpu could directly address making bank-switched ram behave like disk drive much faster disk drives especially days hard drives readily available machines silicon disk launched 1980 initially cp/m operating system later ms-dos due limitations memory addressing apple ii series commodore computers ram drive also popular application commodore 64 commodore 128 systems ram expansion units apple ii series computers 64kb ram apple computer supported software ram drive natively prodos systems 128kb ram prodos would automatically allocate ram drive named /ram ibm added ram drive named vdisk.sys pc dos version 3.0 august 1984 first dos component use extended memory vdisk.sys available microsoft ms-dos unlike components early versions pc dos written ibm microsoft included similar program ramdrive.sys ms-dos 3.2 released 1986 could also use expanded memory discontinued windows 7 dr-dos dr family multi-user operating systems also came ram disk named vdisk.sys multiuser dos ram disk defaults drive letter memory drive amigaos built ram drive since release version 1.1 1985 still amigaos 4.1 2010 apple computer added functionality apple macintosh system 7 memory control panel 1991 kept feature life mac os 9 mac os x users use hdid newfs newfs hfs mount utilities create format mount ram drive ram drive innovation introduced 1986 made generally available 1987 perry kivolowitz amigaos ability ram drive survive crashes reboots called asdg recoverable ram disk device survived reboots allocating memory dynamically reverse order default memory allocation feature supported underlying os reduce memory fragmentation super-block written unique signature could located memory upon reboot super-block rrd disk blocks maintained check sums enable invalidation disk corruption detected first asdg rrd locked asdg memory boards used selling feature later asdg rrd made available shareware carrying suggested donation 10 dollars shareware version appeared fred fish disks 58 241 amigaos would gain recoverable ram disk called rad version 1.3 many unix unix-like systems provide form ram drive functionality /dev/ram linux md 4 freebsd ram drives particularly useful high-performance low-resource applications unix-like operating systems sometimes configured also specialized ultra-lightweight linux distributions designed boot removable media stored ramdisk entire session ram drives use dram memory exclusively dedicated function extremely low latency storage device memory isolated processor directly accessible manner normal system memory 2002 cenatek produced rocket drive max 4gb four dimm slots pc133 memory maximum 4 gigabytes storage time common desktop computers used 64 128 megabytes pc100 pc133 memory 1 gigabyte pc133 modules largest available time cost approximately 1300 fully outfitted rocket drive 4 gb storage would cost 5600 2005 gigabyte technology produced i-ram max 4gb functioned essentially identical rocket drive except upgraded use newer ddr memory technology though also limited maximum 4gb capacity devices dynamic ram requires continuous power retain data power lost data fades away rocket drive connector external power supply separate computer option external battery retain data power failure i-ram included small battery directly expansion board 10-16 hours protection devices used sata 1.0 interface transfer data dedicated ram drive system sata interface slow bottleneck limited maximum performance ram drives drives still provided exceptionally low data access latency high sustained transfer speeds compared mechanical hard drives 2006 gigabyte technology produced gc-ramdisk max 8gb 2nd generation creation i-ram maximum 8gb capacity twice i-ram used sata-ii port twice i-ram one best selling points could boot ram drive use needed 2007 acard technology produced ans-9010 serial ata ram disk max 64gb quote tech report ans-9010 eight ddr2 dimm slots support 8gb memory per slot ans-9010 also features pair serial ata ports allowing function single drive masquerade pair drives easily split even faster raid 0 array 2009 acard technology produced acard ans-9010ba 5.25 dynamic ssd sata-ii ram disk max 64gb uses single sata-ii port 2014 ddrdrive llc produced ddrdrive x1 claims fastest solid state drive world drive primary 4gb ddr dedicated ram drive regular use backup recall 4gb slc nand drive intended market keeping recording log files power loss data saved internal 4gb ssd 60 seconds via use battery backup thereafter data recovered back ram power restored host power loss triggers ddrdrive x1 backup volatile data on-board non-volatile storage pros cons
[ 8832, 11137, 2055, 139, 1038, 5391, 5264, 2193, 9236, 2197, 5397, 7317, 2201, 11550, 671, 3233, 9249, 2339, 2723, 4387, 9762, 8618, 6062, 432, 6321, 178, 8114, 8369, 9983, 823, 4409, 6075, 8767, 451, 4548, 11076, 10570, 5709, 1742, 2383, ...
Test
8,116
9
Functional_reactive_programming:functional reactive programming functional reactive programming frp programming paradigm reactive programming asynchronous dataflow programming using building blocks functional programming e.g map reduce filter frp used programming graphical user interfaces guis robotics games music aiming simplify problems explicitly modeling time original formulation functional reactive programming found icfp 97 paper functional reactive animation conal elliott paul hudak frp taken many forms since introduction 1997 one axis diversity discrete vs. continuous semantics another axis frp systems changed dynamically earliest formulation frp used continuous semantics aiming abstract many operational details important meaning program key properties formulation semantic model frp side-effect free languages typically terms continuous functions typically time formulations event-driven frp elm version 0.17 require updates discrete event-driven formulations pushed practical frp focusing semantics simple api implemented efficiently setting robotics web-browser formulations common ideas behaviors events combined signals always current value change discretely pointed ordinary frp model inputs outputs poorly suited interactive programs lacking ability run programs within mapping inputs outputs may mean one following solutions used two types frp systems push-based pull-based push-based systems take events push signal network achieve result pull-based systems wait result demanded work backwards network retrieve value demanded frp systems yampa use sampling samples pulled signal network approach drawback network wait duration one computation step find changes input sampling example pull-based frp reactive etage libraries hackage introduced approach called push-pull frp combines best push-based pull-based frp approach next event purely defined stream list fixed events times demanded event constructed purely defined streams act like lazy lists haskell pull-based half push-based half used events external system brought external events pushed consumers find event instant issued functional reactive programming used create mobile applications android ios
[ 4417, 4578, 9345, 228, 3876, 3462, 2666, 5917, 10571, 219, 3823, 10480, 3705, 1051, 508, 2557, 7262 ]
Test
8,117
7
Airtable:airtable airtable cloud collaboration service headquartered san francisco founded 2012 howie liu andrew ofstad emmett nicholas airtable spreadsheet-database hybrid features database applied spreadsheet fields airtable table similar cells spreadsheet types 'checkbox 'phone number 'drop-down list reference file attachments like images users create database set column types add records link tables one another collaborate sort records publish views external websites airtable six basic components avoid need form single large table related data multiple tables airtables provides option link records different tables airtable allows linking existing tables related records creating new linked table also multiple links existing tables airtable allows multiple users work simultaneously base allowing productivity workplace new collaborator added clicking share button found top base providing email id collaborator owner set permission level collaborator sharing base three permission levels airtable base namely creator edit read multiple bases required team formed airtable airtable team hold multiple bases collaborators team work available bases team four permission levels team unlike base three extra permission level team owner full access team base bases easily shared public one need airtable account view published bases view bases shared public called airtable views views embedded one website allows website users see real time information base without needing airtable account one possible use-case airtable form used take survey product feedback received customer also shown public sharing airtable view airtable introduced forms july 2015 forms could used collect data others like co-workers customers public form easily created existing base data collected form automatically organized airtable base airtable allows user organize required fields form separate link created every airtable form link shared others get required data airtable form also embedded website get feedback website users airtable api used connect web services information exchanged external web applications airtable using zapier platform airtable connect 450 applications websites changes set triggers actions connected applications airtable provides greater sophistication backup data allow users undo/redo airtable periodically snapshots base previous version base needed appropriate snapshot selected user snapshots list addition user manually snapshot base time airtable introduced version 2.0 ios application december 2015 allowing users work tables iphone airtable android also available airtable provides api provide ability users build application solutions fitting exact problems key present overview section necessary use airtable api key kept secret api follows rest semantics uses json encode objects uses standard http codes signal operation outcomes initially user create base airtable airtable api used create read update delete records i.e crud 2016 airtable api allow users create modify base schema airtable uses 256 bit advanced encryption standard aes protect data also uses 256-bit ssl/tls encryption data transit
[ 10145, 4393, 7533, 5202, 2901 ]
Test
8,118
8
WordWeb:wordweb wordweb international english dictionary thesaurus program microsoft windows ios android mac os x available download online program partly based wordnet database program activated holding ctrl right-clicking word almost program opens wordweb main window definitions help program usually resides tray thesaurus integrated dictionary synonyms well detailed categorization relationship words shown definition program shows users also actively improve dictionary thesaurus submitting errors missing words/phrases/senses enhancement requests program two versions free version word list search anagram customization features paid version called 'wordweb pro wordweb 5 added ability list entries three web sources wikipedia wiktionary wordweb online details presented three separate tabs built client application version 6 added audio pronunciations support third-party oxford chambers add-on dictionaries wordweb 7 mainly content upgrade revised definition sound database also significantly updated one-click support latest browsers 64-bit programs changes version include 1 new revised definitions related words 2 updated audio pronunciations 3 improved one-click integration programs 4 better one-click 64-bit windows 8 program support 5 keyboard hotkeys bookmark menu items 6 auto-detect support latest 3-rd party concise oxford merriam-webster wordweb 7 requires windows windows xp windows vista windows 7 windows 8 windows 10 desktop wordweb 8 includes one-click keyboard lookup including thunderbird firefox without plugin support windows xp dropped version wordweb including pro available unix however used wine similar program includes wordweb pro features artha available linux windows port macintosh promised artha based wordnet database use free version subject license terms however might used educational institution free cost students even violate said terms wordweb regionalized specific dictionaries australian british canadian american irish new zealand south african indian english
[ 416, 1632, 6797, 7983, 5492 ]
None
8,119
4
Pentoo:pentoo pentoo live cd live usb designed penetration testing security assessment based gentoo linux pentoo provided 32 64 bit installable live cd pentoo also available overlay existing gentoo installation features packet injection patched wifi drivers gpgpu cracking software lots tools penetration testing security assessment pentoo kernel includes grsecurity pax hardening extra patches binaries compiled hardened toolchain latest nightly versions tools available tools installed versioned ebuilds open-ended ebuilds making possible pull latest subversions still installs tracked package management following tool categories included pentoo uses rolling releases periodic iso snapshots latest committed updates
[ 10016, 6371, 5284, 5380, 4775, 4841, 5067, 3147, 5356, 7794, 5363, 5397, 7989, 7228, 1150 ]
Test
8,120
3
AltiVec:altivec altivec single-precision floating point integer simd instruction set designed owned apple ibm freescale semiconductor formerly motorola semiconductor products sector — aim alliance implemented versions powerpc processor architecture including motorola g4 ibm g5 power6 processors p.a semi pwrficient pa6t altivec trademark owned solely freescale system also referred velocity engine apple vmx vector multimedia extension ibm p.a semi altivec refers instruction set implementations cpus produced ibm motorola separate terms logic design date ibm core included altivec logic design licensed motorola vice versa altivec standard part power isa v.2.03 specification never formally part powerpc architecture specification although used powerpc instruction formats syntax occupied opcode space expressly allocated purposes vmx/altivec sse feature 128-bit vector registers represent sixteen 8-bit signed unsigned chars eight 16-bit signed unsigned shorts four 32-bit ints four 32-bit floating point variables provide cache-control instructions intended minimize cache pollution working streams data also exhibit important differences unlike sse2 vmx/altivec supports special rgb pixel data type operate 64-bit double precision floats way move data directly scalar vector registers keeping load/store model powerpc risc design vector registers like scalar registers loaded stored memory however vmx/altivec provides much complete set horizontal operations work across elements vector allowable combinations data type operations much complete thirty-two 128-bit vector registers provided compared eight sse sse2 extended 16 x86-64 vmx/altivec instructions take three register operands compared two register/register register/memory operands ia-32 vmx/altivec also unique support flexible vector permute instruction byte resulting vector value taken byte either two vectors parametrized yet another vector allows sophisticated manipulations single instruction recent versions gnu compiler collection gcc ibm visualage compiler compilers provide intrinsics access vmx/altivec instructions directly c c++ programs version 4 gcc also includes auto-vectorization capabilities attempt intelligently create vmx/altivec accelerated binaries without need programmer use intrinsics directly vector type keyword introduced permit declaration native vector types e.g. codice_1 declares 128-bit vector variable named foo containing sixteen 8-bit unsigned chars full complement arithmetic binary operators defined vector types normal c expression language used manipulate vector variables also overloaded intrinsic functions codice_2 emit appropriate op code based type elements within vector strong type checking enforced contrast intel-defined data types ia-32 simd registers declare size vector register 128 64 bits case 128-bit register whether contains integers floating point values programmer must select appropriate intrinsic data types use e.g. codice_3 adding two vectors containing eight 16-bit integers power vector media extension vmx developed 1996 1998 collaborative project apple ibm motorola apple primary customer power vector media extension vmx apple switched intel-made x86-based cpus june 6 2005 used accelerate multimedia applications quicktime itunes key parts apple mac os x including quartz graphics compositor companies adobe used altivec optimize image-processing programs adobe photoshop motorola first supply altivec enabled processors starting g4 line altivec also used embedded systems high-performance digital signal processing ibm consistently left vmx earlier power microprocessors intended server applications useful power6 microprocessor introduced 2007 implements altivec last desktop microprocessor ibm powerpc 970 dubbed g5 apple also implemented altivec hardware similar powerpc 7400 altivec brandname trademarked freescale previously motorola standard category vector part power isa v.2.03 specification category also known vmx used ibm velocity engine brand name previously used apple cell broadband engine used amongst things playstation 3 also supports power vector media extension vmx ppu spu isa enhanced architecturally similar freescale bringing enhanced version altivec e6500 based qoriq processors ibm enhanced vmx use xenon xbox 360 called enhancement vmx128 enhancements comprise new routines targeted gaming accelerating 3d graphics game physics total 128 registers vmx128 entirely compatible vmx/altivec number integer operations removed make space larger register file additional application-specific operations power isa v2.06 introduces new vsx vector-scalar instructions extend simd processing power isa support 64 registers support regular floating point decimal floating point vector execution power7 first power isa processor implement power isa v2.06 new instructions introduced ibm vector media extension category integer operations part vsx extension power isa 2.07 new integer vector instructions introduced ibm following vmx encodings part vsx extension power isa v3.0 shall introduced power9 processors c++ standard way accessing altivec support mutually exclusive use standard template library codice_4 class template due treatment vector reserved word compiler implement context sensitive keyword version vector however may possible combine using compiler-specific workarounds instance gcc one may codice_5 remove codice_6 keyword use gcc-specific codice_7 keyword place following processors altivec vmx vmx128 included
[ 6663, 5642, 1548, 528, 1042, 1563, 2088, 6715, 1085, 7234, 3142, 6738, 9302, 8795, 5725, 2655, 1122, 1635, 7783, 3185, 4211, 2676, 5235, 643, 4743, 4237, 9369, 8860, 1181, 6311, 9391, 5297, 9911, 11449, 1725, 5326, 5844, 9428, 731, 6878, ...
Test
8,121
4
OmniPeek:omnipeek omnipeek packet analyzer software tool savvius liveaction company network troubleshooting protocol analysis supports application programming interface api plugins savvius formerly wildpackets founded 1990 ag group mahboud zabetian tim mccreery soon changed name wildpackets first product savvius written mac called etherpeek protocol analyzer ethernet networks later ported microsoft windows released 1997 2001 airopeek released added support wireless ieee 802.11 marketed wi-fi brand networks 2003 omniengine distributed capture engine released software hardware network recorder appliance morning july 15 2002 savvius building walnut creek california burnt ground however company survived fire mid-april 2015 company changed name wildpackets savvius broadened focus include network security june 2018 savvius acquired liveaction company provides network performance management visualization analytics software savvius acquired net3 group november 2000 product netsense expert system network troubleshooting converted plug-in integrated new version product called etherpeeknx savvius acquired optimized engineering corporation 2001 optimized network analysis training courses instructors added savvius services omnipeek apis front-end automation back-end analysis well mechanisms extend enhance program 40 plug-ins available omnipeek platform plug-ins range logging extensions full-blown applications hosted omnipeek remote adapters provide means capture packets stats remote adapters capture rmon netflow sflow cisco ap aruba ap linux boxes adapters available aggregate packets multiple network segments wireless channels time notable decoders protospecs decoder files interpreted text files extended user enhance display analysis existing protocols add knowledge completely new protocols without releasing new versions application plugin wizards omnipeek console omniengine microsoft visual studio project templates generate working plug-ins wizard run dialog appears providing options types functionality sample code generated wizard complete user left working plugin entry points adding application logic plug-in wizards enable development extensions omnipeek mypeek community portal website dedicated extension omnipeek provides plug-ins scripts adapters tools various levels support plug-ins posted expertise interested extending omnipeek placemap freely available standalone google maps packet sniffer application windows captures network traffic maps nodes google map placemap notable example extensibility uses exactly google map plugin also available omnipeek uses peek driver api capture packets
[ 9440, 10788, 10341, 1064, 842, 906, 6797, 7983, 6834, 2292, 2006, 823, 2430 ]
None
8,122
7
Middleware:middleware middleware computer software provides services software applications beyond available operating system described software glue middleware makes easier software developers implement communication input/output focus specific purpose application gained popularity 1980s solution problem link newer applications older legacy systems although term use since 1968 term commonly used software enables communication management data distributed applications ietf workshop 2000 defined middleware services found transport i.e tcp/ip layer set services application environment i.e application-level apis specific sense middleware described dash client-server -to- peer-to-peer middleware includes web servers application servers content management systems similar tools support application development delivery objectweb defines middleware software layer lies operating system applications side distributed computing system network services regarded middleware include enterprise application integration data integration message oriented middleware mom object request brokers orbs enterprise service bus esb database access services often characterised middleware language specific implementations support heterogeneous features related communication features examples database-oriented middleware include odbc jdbc transaction processing monitors distributed computing system middleware loosely divided two categories—those provide human-time services web request servicing perform machine-time latter middleware somewhat standardized service availability forum commonly used complex embedded systems within telecom defense aerospace industries term middleware used contexts well middleware sometimes used similar sense software driver abstraction layer hides detail hardware devices software application
[ 10242, 9224, 3086, 5658, 9252, 9766, 5677, 8751, 3130, 2116, 3141, 8262, 3664, 9297, 9301, 3158, 8280, 11359, 7780, 9828, 105, 113, 3698, 9844, 119, 5245, 1663, 4225, 9345, 11393, 7812, 10373, 8326, 2183, 5772, 5774, 10909, 5283, 1702, 17...
Test
8,123
7
VDIworks:vdiworks vdiworks american software company founded 2008 provides services like desktop virtualization desktop service daas networking pcoip cloud computing vdiworks built first pcoip broker connection industry ’ pcoip broker quad broking support vdiworks vdi technology service comes full physical management vdiworks helps virtual desktops new high-speed connection protocol vdiworks inc. started services 2008 like virtual desktop enablement management software offers fast remote desktop bring power windows ipad run microsoft office well access spreadsheets power point presentations pc documents travelling videooverip remoting protocol virtual desktops deliver multimedia performance multi-monitor capabilities allowing capitalize management improvements security enhancements lowered-tco result virtualization company provides virtual desktop platform vdp virtual desktop infrastructure management system combines connection brokering vm management health alerting inventory physical management support various remoting protocols vdivision system center operations manager 2007 combine power vdiworks virtual desktop platform ubiquity datacenter management capabilities system center addition vdiworks inc. introduced vdiworks2go extension vdiworks vdp console allows mobile users check virtual machine compute go even connected network protocol inspector discover report remoting capabilities vms hosts network company provides cloud computing desktop virtualization remote access systems management technologies vdiworks inc. offers software education healthcare financial services small-medium-sized business enterprise markets vdiworks inc. prior subsidiary clearcube technology inc. vdiworks received best emerging virtualization company award multiple times crn contribution commitment towards virtualization innovation awareness vdiworks virtual desktop platform vdi management suite connection brokering remoting protocol centralized management desktop security virtual desktop healthcare aggregates user environment servers replacing pcs hardy completely secure thin clients virtual desktops vdi represent next evolution healthcare pc vdiworks made remote access possible educational power virtualization removed limitations location single desktop dependency user access information whether class room restaurant home travelling
[ 8466, 4194, 467 ]
Validation
8,124
3
GeeXboX:geexbox geexbox free linux distribution providing media center software suite personal computers geexbox 2.0 later uses xbmc media playback implemented live usb live cd options system need permanently installed hard drive modern operating systems would instead computer booted geexbox cd media playback desired reasonable approach need media playback services performing tasks computer users wish repurpose older computers media centers seeking free alternative windows xp media center edition unofficial port geexbox 1.x also runs wii geexbox 1.x versions also came utility called iso-generator allowed user customize geexbox discs following options configurable via
[ 1674, 6797, 11283, 5397, 4637, 1700, 6058, 7983, 7602, 4147, 823, 7483, 3664, 1107, 6371, 5612, 6380, 5363, 4219, 1150 ]
Test
8,125
3
MMX_(instruction_set):mmx instruction set mmx single instruction multiple data simd instruction set designed intel introduced 1997 p5-based pentium line microprocessors designated pentium mmx technology developed similar unit introduced intel i860 earlier intel i750 video pixel processor mmx processor supplementary capability supported recent ia-32 processors intel vendors new york times described initial push including super bowl ads focused new generation glitzy multimedia products including videophones 3-d video games mmx subsequently extended several programs intel others 3dnow streaming simd extensions sse ongoing revisions advanced vector extensions avx mmx officially meaningless initialism trademarked intel unofficially initials variously explained standing newsweek described 57 new 'instructions etched microscopically onto face chip amd one numerous court battles intel produced marketing material intel indicating mmx stood matrix math extensions since initialism trademarked attempt invalidate intel trademark 1995 intel filed suit amd cyrix corp. misuse trademark mmx amd intel settled amd acknowledging mmx trademark owned intel intel granting amd rights use mmx trademark technology name processor name mmx defines eight registers called mm0 mm7 operations operate register 64 bits wide used hold either 64-bit integers multiple smaller integers packed format single instruction applied two 32-bit integers four 16-bit integers eight 8-bit integers mmx provides integer operations originally developed intel i860 use integer math made sense 2d 3d calculations required graphics cards much became common integer simd cpu became somewhat redundant graphical applications hand saturation arithmetic operations mmx could significantly speed digital signal processing applications avoid compatibility problems context switch mechanisms existing operating systems mmx registers aliases existing x87 fpu registers context switches would already save restore unlike x87 registers behave like stack mmx registers directly addressable random access operation involving floating point stack might also affect mmx registers vice versa aliasing makes difficult work floating point simd operations application maximize performance programmers often used processor exclusively one mode deferring relatively slow switch long possible 64-bit mmx register corresponds mantissa part 80-bit x87 register upper 16 bits x87 registers thus go unused mmx bits set ones making nans infinities floating point representation used applications decide whether particular register content intended floating point simd data software support mmx slow coming intel c compiler related development tools obtained intrinsics invoking mmx instructions intel released libraries common vectorized algorithms using mmx intel metrowerks attempted automatic vectorization compilers operations c programming language mapped poorly onto mmx instruction set custom algorithms 2000 typically still written assembly amd competing x86 microprocessor vendor enhanced intel mmx 3dnow instruction set 3dnow best known adding single-precision 32-bit floating-point support simd instruction-set among integer general enhancements following mmx intel next major x86 extension sse introduced pentium-iii family 1999 roughly year amd 3dnow introduced sse addressed core shortcomings mmx inability mix integer-simd ops floating-point ops creating new 128-bit wide register file xmm0–xmm7 new simd instructions like 3dnow sse focused exclusively single-precision floating-point operations 32-bit integer simd operations still performed using mmx register instruction set however new xmm register-file allowed sse simd-operations freely mixed either mmx x87 fpu ops sse2 introduced pentium 4 extended x86 simd instruction set integer 8/16/32 bit double-precision floating-point data support xmm register file sse2 also allowed mmx opcodes use xmm register operands extended even wider ymm zmm registers later sse revisions intel marvell xscale microprocessor core starting pxa270 include simd instruction set extension arm core called iwmmxt whose functions similar ia-32 mmx extension iwmmxt stands intel wireless mmx technology provides arithmetic logic operations 64-bit integer numbers software may choose instead perform two 32-bit four 16-bit eight 8-bit operations single instruction extension contains 16 data registers 64-bits eight control registers 32-bits registers accessed standard arm architecture coprocessor mapping mechanism iwmmxt occupies coprocessors 0 1 space opcodes clash opcodes earlier floating-point extension fpa later versions marvell arm processors supports wmmx wireless mmx wmmx2 wireless mmx2 support
[ 6151, 4108, 5649, 533, 1053, 2088, 1085, 7234, 3142, 8795, 1119, 2655, 1122, 3175, 7783, 4204, 1137, 4217, 3194, 10375, 1677, 4237, 7313, 8851, 6804, 8855, 9369, 9391, 2224, 9911, 2237, 5309, 6339, 5326, 5844, 725, 9428, 731, 7387, 3294, ...
Test
8,126
3
Streaming_SIMD_Extensions:streaming simd extensions computing streaming simd extensions sse single instruction multiple data simd instruction set extension x86 architecture designed intel introduced 1999 pentium iii series central processing units cpus shortly appearance advanced micro devices amd 3dnow sse contains 70 new instructions work single precision floating point data simd instructions greatly increase performance exactly operations performed multiple data objects typical applications digital signal processing graphics processing intel first ia-32 simd effort mmx instruction set mmx two main problems re-used existing x87 floating point registers making cpus unable work floating point simd data time worked integers sse floating point instructions operate new independent register set xmm registers adds integer instructions work mmx registers sse subsequently expanded intel sse2 sse3 ssse3 sse4 supports floating point math wider applications mmx became popular addition integer support sse2 made mmx largely redundant code though performance increases attained situations using mmx parallel sse operations sse originally called katmai new instructions kni katmai code name first pentium iii core revision katmai project intel sought distinguish earlier product line particularly flagship pentium ii later renamed internet streaming simd extensions isse sse amd eventually added support sse instructions starting athlon xp duron morgan core processors sse originally added eight new 128-bit registers known codice_1 codice_2 amd64 extensions amd originally called x86-64 added eight registers codice_3 codice_4 extension duplicated intel 64 architecture also new 32-bit control/status register codice_5 registers codice_3 codice_4 accessible 64-bit operating mode sse used single data type xmm registers sse2 would later expand usage xmm registers include 128-bit registers additional machine states operating system must preserve across task switches disabled default operating system explicitly enables means os must know use codice_8 codice_9 instructions extended pair instructions save x86 sse register states support quickly added major ia-32 operating systems first cpu support sse pentium iii shared execution resources sse floating point unit fpu compiled application interleave fpu sse instructions side-by-side pentium iii issue fpu sse instruction clock cycle limitation reduces effectiveness pipelining separate xmm registers allow simd scalar floating point operations mixed without performance hit explicit mmx/floating point mode switching sse introduced scalar packed floating point instructions following simple example demonstrates advantage using sse consider operation like vector addition used often computer graphics applications add two single precision four-component vectors together using x86 requires four floating-point addition instructions corresponds four x86 fadd instructions object code hand following pseudo-code shows single 128-bit 'packed-add instruction replace four scalar addition instructions x86 instruction set extensions bios operating system application programmer test detect existence proper operation user application uptake x86 extensions slow even bare minimum baseline mmx sse support cases non-existent applications 10 years extensions became commonly available distributed computing accelerated use extensions scientific community—and many scientific applications refuse run unless cpu supports sse2 sse3 use multiple revisions application cope many different sets extensions available simplest way around x86 extension optimization problem software libraries applications begun support multiple extension types hinting full use available x86 instructions may finally become common 5 15 years instructions initially introduced processor id applications
[ 4098, 4108, 5649, 1053, 2088, 1085, 7234, 3142, 585, 8266, 8795, 1119, 2655, 1122, 7783, 4204, 1137, 4217, 10375, 4237, 10383, 6804, 8853, 8855, 9369, 2732, 9391, 2224, 4276, 9911, 2237, 5309, 6339, 5326, 5844, 725, 9428, 10985, 5356, 996...
Test
8,127
2
Microreboot:microreboot microrebooting technique used recover failures crash-only software systems instead rebooting whole system subsets fine-grain components restarted granularity components typically finer process level e.g. ejb-level java ee systems goal confining reboot fine-grain components threefold reduce amount time takes system return service minimize failure disruption system users preserve much in-memory application data possible concept proposed 2001 george candea armando fox former graduate student stanford university initially reduced practice systems satellite ground station control system java ee application server later formed basis design commercial systems like aster data systems ncluster
[ 2811, 4646 ]
Test
8,128
1
ScaleBase:scalebase scalebase company sold software implement distributed mysql databases cloud computing software company located boston massachusetts area scalebase founded 2009 doron levari ram metser formerly ceo guardium database security company acquired ibm 2009 named ceo october 2012 october 2012 scalebase closed series b round 10.5 million bain capital ventures ascent venture partners original investor cedar fund scalearc raised 5.33 million december 2011 12 million new funding announced january 2013 led accell partners assets scalebase acquired scalearc august 2015 company scalebase provided two technology offerings one also called scalebase analysis genie scalebase software first released august 2011 scalebase distributed database cluster built mysql capability provides scalability availability benefits distributed database retaining relational database characteristics scalebase data distribution policy-based transparent scalebase provides visibility control variables impact data distribution policy scalebase software available amazon web services ec2 rds rackspace ibm cloud analysis genie software service analyzed schema queries purpose suggest data distribution policy uniquely tuned individual application requirements database workloads
[ 11136, 4194, 7022, 7248, 467 ]
None
8,129
6
Data_cluster:data cluster computer file systems cluster allocation unit unit disk space allocation files directories reduce overhead managing on-disk data structures filesystem allocate individual disk sectors default contiguous groups sectors called clusters disk uses 512-byte sectors 512-byte cluster contains one sector whereas 4-kibibyte kib cluster contains eight sectors cluster smallest logical amount disk space allocated hold file storing small files filesystem large clusters therefore waste disk space wasted disk space called slack space cluster sizes small versus average file size wasted space per file statistically half cluster size large cluster sizes wasted space become greater however larger cluster size reduces bookkeeping overhead fragmentation may improve reading writing speed overall typical cluster sizes range 1 sector 512 b 128 sectors 64 kib cluster need physically contiguous disk may span one track sector interleaving used may even discontiguous within track confused fragmentation sectors still logically contiguous term cluster changed allocation unit dos 4.0 however term cluster still widely used
[ 9698, 8451, 9762, 2314, 9420, 8301, 7663, 2193, 8049, 3315, 2196, 532, 2197, 11667, 3512, 3834, 6843 ]
Validation
8,130
4
DMARC:dmarc dmarc domain-based message authentication reporting conformance email authentication protocol designed give email domain owners ability protect domain unauthorized use commonly known email spoofing purpose primary outcome implementing dmarc protect domain used business email compromise attacks phishing emails email scams cyber threat activities dmarc dns entry published receiving email server authenticate incoming email based instructions published domain owner within dns entry email passes authentication delivered trusted email fails check depending instructions held within dmarc record email could delivered quarantined rejected dmarc extends two existing mechanisms sender policy framework spf domainkeys identified mail dkim allows administrative owner domain publish policy dns records specify mechanism dkim spf employed sending email domain check codice_1 field presented end users receiver deal failures reporting mechanism actions performed policies dmarc defined rfc 7489 dated march 2015 informational dmarc policy allows sender domain indicate emails protected spf and/or dkim tells receiver neither authentication methods passes – reject message quarantine policy also specify email receiver report back sender domain messages pass and/or fail policies published public domain name system dns text txt records dmarc n't directly address whether email spam otherwise fraudulent instead dmarc require message pass dkim spf validation also pass alignment dmarc message fail even passes spf dkim fails alignment setting dmarc may positive impact deliverability legitimate senders dmarc operates checking domain message codice_1 field also called 5322.from aligned authenticated domain names either spf dkim alignment checks pass dmarc alignment test passes alignment may specified strict relaxed strict alignment domain names must identical relaxed alignment top-level organizational domain must match organizational domain found checking list public dns suffixes adding next dns label example a.b.c.d.example.com.au example.com.au organizational domain registrar offers names .com.au customers albeit time dmarc spec ietf working group domain boundaries nowadays organizational domain derived public suffix list like spf dkim dmarc uses concept domain owner entity entities authorized make changes given dns domain spf checks ip address sending server authorized owner domain appears smtp codice_3 command email address mail also called envelope-from 5321.mailfrom addition requiring spf check pass dmarc additionally checks 5321.mailfrom aligns 5322.from dkim allows parts email message cryptographically signed signature must cover field within dkim-signature mail header codice_4 domain codice_5 selector tags specify dns retrieve public key signature valid signature proves signer domain owner field n't modified since signature applied may several dkim signatures email message dmarc requires one valid signature domain codice_4 tag aligns sender domain stated codice_1 header field dmarc records published dns subdomain label codice_8 example codice_9 compare spf codice_10 dkim codice_11 content txt resource record consists codice_12 tags separated semicolons similar spf dkim example codice_13 version codice_14 policy codice_15 subdomain policy codice_16 percent bad emails apply policy codice_17 uri send aggregate reports example entity controlling example.com dns domain intends monitor spf and/or dkim failure rates n't expect emails sent subdomains example.com note subdomain publish dmarc record receivers must check falling back organizational domain record dmarc capable producing two separate types reports aggregate reports sent address specified following codice_17 forensic reports emailed address following codice_19 tag mail addresses must specified uri mailto format e.g nowiki mailto worker example.net /nowiki multiple reporting addresses valid must full uri format separated comma target email addresses belong external domains case target domain set dmarc record say agrees receive otherwise would possible exploit reporting spam amplification example say codice_20 receives mail message codice_21 wishes report finds codice_22 looks confirming dns record namespace administered target like aggregate reports sent xml files typically per day subject mentions report domain policy-publishing sender mail messages reported submitter entity issuing report payload attachment long filename consisting bang-separated elements report-issuing receiver begin end epochs reported period unix-style time stamps optional unique identifier extension depends possible compression used codice_23 example codice_24 xml content consists header containing policy report based report metadata followed number records records put database relation viewed tabular form xml schema defined appendix c specifications raw record exemplified dmarc.org stick relational example better conveys nature data dmarc records also directly transformed html applying xsl stylesheet rows grouped source ip authentication results passing count group leftmost result columns labelled spf dkim show dmarc-wise results either pass fail taking alignment account rightmost ones similar labels show name domain claims participate sending message parentheses authentication status claim according original protocol spf dkim regardless identifier alignment right side spf appear twice codice_25 test codice_26 test dkim appear signature present message example first row represents main mail flow example.org second row dkim glitch signature breakage due minor alteration transit third fourth rows show typical failures modes forwarder mailing list respectively dmarc authentication failed last row could affected message disposition example.org specified strict policy disposition reflects policy published actually applied messages none quarantine reject along shown table dmarc provides policy override reasons receiver apply policy different one requested already provided specification forensic reports also known failure reports generated real time consist redacted copies individual emails failed spf dkim based upon value specified codice_27 tag format extension abuse reporting format resembles regular bounces contain either message/rfc822 text/rfc822-headers several different types email forwarding may break spf mailing lists frequent cause legitimate breakage original author domain dkim signature routinely change spf-authenticated domain therefore break dmarc alignment number workarounds possible mailing list software packages working solutions one popular least intrusive workarounds consists rewriting codice_1 header field original author address added codice_30 field rewriting range appending codice_31 domain name allocating temporary user id forward replies list opaque id used keeps user real email address private list addition display name changed show author list list operator examples would result respectively one last line codice_30 designed order accommodate reply-to-author functionality case reply-to-list function covered preceding change codice_1 header field way original meaning fields reversed altering author fair general break expected relationship meaning appearance datum also breaks automated use communities use mailing lists coordinate work deploy tools use codice_1 field attribute authorship attachments wrapping message works nicely use email client understands wrapped messages change perhaps obvious solution except seem legally due countries routinely losing spf authentication may render overall authentication fragile making changes codice_1 header field pass dkim alignment may bring message compliance rfc 5322 section 3.6.2 'from field specifies author message mailbox es person system responsible writing message mailbox refers author email address codice_36 header available indicate email sent behalf another party dmarc checks policy domain ignores sender domain adsp dmarc reject using sender field non-technical basis many user agents n't display recipient draft dmarc specification maintained since 30 january 2012 october 2013 gnu mailman 2.1.16 released options handle posters domain dmarc policy codice_37 change tried anticipate interoperability issues expected case restrictive policies applied domains human users opposed purely transactional mail domains april 2014 yahoo changed dmarc policy codice_37 thereby causing misbehavior several mailing lists days later aol also changed dmarc policy codice_37 moves resulted significant amount disruption mailbox providers accused forcing costs security failures onto third parties ietf working group formed august 2014 order address dmarc issues starting interoperability concerns possibly continuing revised standard specification documentation meanwhile existing dmarc specification reached editorial state agreed upon implemented many published march 2015 independent submission stream informational non-standard category rfc 7489 march 2017 federal trade commission published study dmarc usage businesses study found 10 569 businesses significant online presence publish strict dmarc policies contributors dmarc specification include
[ 5254, 8202, 7949, 6808, 5421, 4272, 9909, 4793, 8130, 2887, 3018, 4689, 10578, 10326, 479, 9569, 488, 2409, 4969, 6762, 1658 ]
Validation
8,131
4
Panda_Cloud_Antivirus:panda cloud antivirus panda cloud antivirus antivirus software developed panda security free paid version available cloud-based sense files scanned remote server without using processing power user machine cloud technology based panda collective intelligence run constantly providing protection viruses malicious websites slowing system extent system scan according panda security panda cloud antivirus able detect viruses trojans worms spyware dialers hacking tools hacker security risks panda cloud antivirus relies collective intelligence cloud up-to-date information normally uses internet connection access up-to-date information internet accessed use local cache common threats circulation april 2009 review found panda cloud antivirus 1.0 clean fast simple easy use good detection rates review scored panda 100.00 malware detection 100.0 malicious url detection overall score 100 strong protection factor considering software version 1.0 released november 10 2009 pc magazine reviewed panda cloud antivirus gave editor choice award best av techradar review states think panda cloud antivirus best viewed defense tool rather utility cleaning system already riddled infection free edition panda cloud antivirus released license usage exclusively allowed private households state schools non-governmental non-profit organizations
[ 4194, 2213, 202, 5356, 7983, 499 ]
Test
8,132
8
Microsoft_Personal_Web_Server:microsoft personal web server microsoft personal web server pws scaled-down web server software windows operating systems fewer features microsoft internet information services iis functions superseded iis visual studio microsoft officially supports pws windows 95 windows 98 windows 98 se windows nt 4.0 prior release windows 2000 pws available free download well included windows distribution cds pws 4.0 last version found windows 98 cd windows nt 4.0 option pack personal web server originally created vermeer technologies company created microsoft frontpage acquired microsoft installed frontpage versions 1.1 98 well nt workstation 4.0 shipped peer web services based iis 2.0 3.0 iis 4.0 renamed personal web server consistent name used 95/98 since windows 2000 pws renamed iis name used server versions windows standard windows component windows windows xp home edition support neither pws iis although pws installed windows editions windows xp iis included standard microsoft visual studio 2005 pws useful developing web applications localhost deploying production web server ide visual studio 2005 later versions contains built-in lightweight web server development purposes ftp smtp http usual web languages php perl supported pws also supports basic cgi common gateway interface conventions subset classic asp using technologies web applications running pws capable performing interpreting database queries results microsoft also produced version personal web server macintosh based code acquired acquisition resnova software november 1996
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 558, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 8841, 6797, 2193, 98...
None
8,133
4
Grum_botnet:grum botnet grum botnet also known alias tedroo reddyb botnet mostly involved sending pharmaceutical spam e-mails world largest botnet grum traced back early 2008 time shutdown july 2012 grum reportedly world 3rd largest botnet responsible 18 worldwide spam traffic grum relies two types control servers operation one type used push configuration updates infected computers used tell botnet spam emails send july 2010 grum botnet consisted estimated 560,000–840,000 computers infected grum rootkit botnet alone delivered 39.9 billion spam messages march 2010 equating approximately 26 total global spam volume temporarily making world then-largest botnet late 2010 botnet seemed growing output increased roughly 51 comparison output 2009 early 2010 used panel written php control botnet july 2012 malware intelligence company published analysis botnet command control servers located netherlands panama russia later reported dutch colo/isp soon seized two secondary servers responsible sending spam instructions existence made public within one day panamanian isp hosting one grum primary servers followed suit shut server cybercriminals behind grum quickly responded sending instructions six newly established servers ukraine fireeye connected spamhaus cert-gib anonymous researcher shut remaining six c c servers officially knocking botnet sinkhole running former ip addresses grumbot c c servers feed sinkhole processed via shadowserver abusix inform point contact isp infected ip addresses isp asked contact customers infections malware cleaned shadowserver.org inform users service per day abusix sends x-arf extended version abuse reporting format report every hour
[ 1024, 3072, 10756, 535, 9761, 4644, 4133, 4648, 46, 10297, 3643, 7739, 9791, 1608, 3657, 8779, 81, 8789, 4703, 8288, 8292, 10875, 3711, 8320, 5764, 2187, 3724, 4240, 1688, 2717, 9375, 9904, 9395, 8886, 10952, 3789, 4304, 10457, 4314, 9435...
Test
8,134
4
Airport_security:airport security airport security refers techniques methods used attempt protect passengers staff aircraft airport property accidental/malicious harm crime threats aviation security combination human material resources safeguard civil aviation unlawful interference unlawful interference could acts terrorism sabotage threat life property communication false threat bombing etc large numbers people pass airports every day presents potential targets terrorism forms crime number people located one place similarly high concentration people large airliners increases potentially high death rate attacks aircraft ability use hijacked airplane lethal weapon may provide alluring target terrorism september 11 attacks airport security attempts prevent threats potentially dangerous situations arising entering country airport security succeed chances dangerous situation illegal items threats entering aircraft country airport greatly reduced airport security serves several purposes protect airport country threatening events reassure traveling public safe protect country people monte r. belger u.s. federal aviation administration notes goal aviation security prevent harm aircraft passengers crew well support national security counter-terrorism policy countries may agency protects airports australia australian federal police polices airport countries protection controlled state local level primary personnel vary include resources may include incidents result travelers carrying either weapons items could used weapons board aircraft hijack plane travelers screened metal detectors and/or millimeter wave scanners explosive detection machines used include x-ray machines explosives trace-detection portal machines a.k.a puffer machines united states tsa working new scanning machines still effective searching objects n't allowed airplanes n't depict passengers state undress find embarrassing explosive detection machines also used carry-on checked baggage detect volatile compounds given explosives using gas chromatography recent development controversial use backscatter x-rays detect hidden weapons explosives passengers devices use compton scattering require passenger stand close flat panel produce high resolution image technology released israel early 2008 allows passengers pass metal detectors without removing shoes process required walk-through gate detectors reliable detecting metal shoes lower body extremities alternately passengers step fully shoed onto device scans 1.2 seconds objects small razor blade countries specially trained individuals may engage passengers conversation detect threats rather solely relying equipment find threats single backscatter scan exposes target 0.05 0.1 microsievert radiation comparison exposure standard chest x-ray almost 100 times higher generally people screened airport security areas exit gates aircraft located areas often called secure sterile airside passengers discharged airliners sterile area usually re-screened disembarking domestic flight however still subject search time airport food outlets started using plastic glasses utensils opposed glasses made glass utensils made metal reduce usefulness items weapons united states non-passengers allowed concourses meet arriving friends relatives gates greatly restricted due terrorist attacks non-passengers must obtain gate pass enter secure area airport common reasons non-passenger may obtain gate pass assist children elderly well attending business meetings take place secure area airport united states least 24 hours notice generally required planning attend business meeting inside secure area airport countries australia restrict non-travellers accessing airside area however non-travellers typically subject security scans travellers sensitive areas airports including airport ramps operational spaces restricted general public called sida security identification display area spaces require special qualifications enter systems consist physical access control gates passive systems monitor people moving restricted areas sound alert restricted area entered throughout world dozen airports instituted version trusted traveler program proponents argue security screening made efficient detecting people threats searching argue searching trusted verified individuals take amount time critics argue programs decrease security providing easier path carry contraband another critical security measure used several regional international airports fiber optic perimeter intrusion detection systems security systems allow airport security locate detect intrusion airport perimeter ensuring real-time immediate intrusion notification allows security personnel assess threat track movement engage necessary security procedures notably utilised dulles international airport u.s. military jfpass world first terrorist attack flight cubana flight 455 october 6 1976 airliner flying barbados jamaica brought two time bombs killing 73 people evidence implicated several central intelligence agency-linked anti-castro cuban exiles members venezuelan secret police disip including luis posada carriles single deadliest airline catastrophe resulting failure airport security detect onboard bomb air india flight 182 1985 killed 329 people another onboard bomb slipped airport security one pan flight 103 1988 killed 270 people 259 plane 11 residents lockerbie scotland another notable failure 1994 bombing philippine airlines flight 434 turned test run planned terrorist attack called operation bojinka explosion small killing one person plane made emergency landing operation bojinka discovered foiled manila police 1995 may 30 1972 three members japanese red army undertook terrorist attack popularly called lod airport massacre lod airport known ben gurion international airport tel aviv firing indiscriminately automatic firearms throwing grenades managed kill 24 people injure 78 others neutralized one suicide one three terrorists kozo okamoto survived incident rome vienna airport attacks december 1985 two instances airport security failures attacks left 20 people dead gunmen threw grenades opened fire travelers el al airline ticket counters september 11 attacks widely recognized terrorist attacks recent times involving air travel morning september 11 2001 19 members islamic terrorist group al-qaeda took control four airplanes east coast united states deliberately crashed two world trade center towers new york city third pentagon arlington county virginia fourth plane crashed field near shanksville pennsylvania reaching washington d.c. intended target either u.s. capitol white house attacks resulted deaths 2,996 people including 245 civilians law enforcement officer 19 hijackers board four airplanes july 5 2002 gunman opened fire los angeles international airport israel el al ticket counter shooter killed two people injured four august 10 2006 security airports united kingdom canada united states raised significantly due uncovering british authorities terror plot aimed detonating liquid explosives flights originating countries also notable first time u.s. terror alert level ever reached red incident also led tighter restrictions carrying liquids gels hand luggage eu canada united states. ref name= 1546/2006 /ref restrictions involving airport security determined transport canada implemented canadian air transport security authority catsa conjunction airport operator since september 11 attacks well air india bombing 1985 incidents airport security tightened canada order prevent attacks canadian airspace catsa uses x-ray machines verify contents carry-ons well metal detectors explosive trace detection etd equipment random physical searches passengers pre-board screening points x-ray machines ctx machines high-resolution x-rays etds also used scan checked bags checked baggage always x-rayed major commercial airports catsa launched restricted area identity card raic program january 2007 raic world first dual biometric access control system airports program replaces old airport restricted area passes issued airport employees security checks canadian security intelligence service royal canadian mounted police rcmp transport canada new cards issued checks conducted contain biometric information fingerprints iris scans belonging person issued raic catsa responsible pre-board passenger random non-passenger screening contract third-party service providers g4s securitas gardaworld train manage employ screening officers addition individual airport authorities privatized 1990s canadian government responsible general airport security rather catsa normally contract private companies case large airports pay small contingent local police officers remain site well safety security canada airports provided local police forces rcmp used provide service airports remains today regulation ec 300/2008 european parliament council establishes common rules european union protect civil aviation acts unlawful interference regulation provisions apply airports parts airports located eu country used exclusively military purposes provisions also apply operators including air carriers providing services aforementioned airports also applies entities located inside outside airport premises providing services airports standards regulation 300/2008 implemented commission regulation eu 2015/1998 regulation 2320/2002 2002 introduced requirement security checks passenger flights also domestic eu countries checks domestic flights around 2005 introducing full security checks took time since terminals might need expansion passenger luggage freight security checking security guard duties outsourced contractors general public security responsibility finnish police airport unit helsinki airport airport unit criminal investigation canine tepo terrorist bomb squad ptr police customs border guard intelligence component furthermore units finnish border guard units airports often arrest wanted individuals fugitives border finnish customs seizes e.g weapons false documents explosives addition wanted individuals french security stepped since terrorist attacks france 1986 response france established vigipirate program program uses troops reinforce local security increases requirements screenings id checks since 1996 security check-points transferred police nationale/gendarmerie de l'air private companies hired airport authorities member european economic area iceland adopted ec regulation 300/2008 national law thus complies eu standards airport security international flights domestic flights within icelandic territory however exempted security rules exemption granted eea joint committee citing geographical remoteness country well low population density small size aircraft used domestic operations airport security netherlands provided koninklijke marechaussee kmar royal military constabulary airport security spain provided police forces well private security guards policía nacional provides general security well passport international airports documentation checking catalonia basque country mossos d'esquadra ertzaintza respectively replaced policía nacional except documentation functions guardia civil handles security customs checking often aided private security guards local police provide security traffic control outside airport building security measures controlled state owned company aena bound european commission regulations european union countries airport security handled security guards provided airport police assistance needed airport fire fighters also security guards swedish transport agency decides rules check based international regulations airports generally defined law protected objects give guards extra authority like demanding identity documents search people belongings sweden traditionally seen low-crime country little need security checks sweden introduced security checks international departures international regulations demanded around 1970s/1980s september 2001 decision introduce security checks also domestic flights took years implement domestic airports terminals prepared room department transport dft governing authority airport security united kingdom civil aviation authority caa also responsible certain security regulatory functions september 2004 home office dft started initiative called multi agency threat risk assessment matra piloted five united kingdom major airports — heathrow birmingham east midlands airport newcastle glasgow following successful trials scheme rolled across 44 airports since september 11 attacks new york united kingdom assessed high risk country due support united states invasion afghanistan iraq january 7 2008 travelers longer limited single piece carry-on luggage uk major airports currently hand luggage limited size weight dft/caa although airlines impose rules uk trialed controversial new method screening passengers improve airport security using backscatter x-ray machines provide 360-degree view person well see clothes right skin bones longer used replaced millimeter wave scanners shows hidden items showing body passenger hong kong international airport secured hong kong police force aviation security company avseco within police force airport district responsible safety security airport region airport security units deployed around airport armed h k mp5 a3 sub-machine guns glock 17 pistols security restricted area responsibility police avseco airport control airport authority hong kong aahk security power delegated avseco staffs persons baggages carried must x-rayed checked security screening points avseco exceptions tenant restricted area immigration department check incomers passport identities customs excise department check passengers crews luggage discourage smuggling drugs contraband entering hong kong india stepped airport security 1999 kandahar hijacking central industrial security force paramilitary organisation charge airport security regulatory framework bureau civil aviation security ministry civil aviation cisf formed airport security group protect indian airports every airport given apsu airport security unit trained unit counter unlawful interference civil aviation apart cisf every domestic airline security group looks aircraft security terrorist threats narcotics main threats indian airports another problem airports face proliferation slums around airport boundaries places like mumbai boarding additional searching hand luggage likely moreover cisf many duties context aviation security cargo security screening done regulated agents airlines airports security staff tested certified bureau civil aviation security bcas aviation security regulator el al airlines headquartered israel last hijacking occurred july 23 1968 plane departing ben gurion airport outside tel aviv ever hijacked 1972 terrorists japanese red army launched attack led deaths least 24 people lod airport since security airport relies number fundamentals including heavy focus raphael ron former director security ben gurion airport terms human factor may generalized inescapable fact terrorist attacks carried people found stopped effective security methodology december 27 1985 terrorists simultaneously attacked el al ticket counters rome italy vienna austria airports using machine guns hand grenades nineteen civilians killed many wounded response israel developed methods stop massacres drastically improved security measures around israeli airports even promised provide plainclothes armed guards foreign airport last successful airline-related terrorist attack 1986 security agent found suitcase full explosives initial screening process bag make board injure 13 detonating terminal part focus so-called human factor israeli security officers interrogate travelers using racial profiling singling appear arab based name physical appearance additionally passengers even appear arab descent questioned traveling israel followed several general questions trip order search inconsistencies although numerous civil rights groups demanded end profiling israel maintains effective unavoidable according ariel merari israeli terrorism expert would foolish use profiling everyone knows terrorists come certain ethnic groups likely muslim young potential threat justifies inconveniencing certain ethnic group passengers leaving israel checked computerized list computers maintained israeli ministry interior connected israeli police fbi canadian security intelligence service csis scotland yard shin bet interpol order catch suspects others leaving country illegally despite tight security incident occurred november 17 2002 man apparently slipped airport security ben gurion airport pocketknife attempted storm cockpit el al flight 581 en route tel aviv istanbul turkey injuries reported attacker subdued guards hidden among passengers 15 minutes plane landed safely turkey authorities shut ben gurion time attack reassess security situation investigation opened determine man israeli arab managed smuggle knife past airport security conference may 2008 united states department homeland security secretary michael chertoff told reuters interviewers united states seek adopt israeli security measures domestic airports left post january 2009 mere 6 months statement may may enough time implement limited focus american airports turning israeli government israeli-run firms help upgrade security post-9/11 world israeli officials toured los angeles airport november 2008 re-evaluate airport making security upgrade recommendations 2006 calling ben gurion world safest airport antonio villaraigosa mayor los angeles implemented israeli review order bring state-of-the-art technology tactical measures help secure lax considered state primary terrorist target singled al qaeda network new age security solutions led former director security ben gurion based washington d.c. consults aviation security boston logan international airport u.s. airports incorporate israeli tactics systems include port oakland san diego county regional airport authority israelis legendary security opportunity see firsthand importantly theory behind said steven grossman director aviation port oakland impressed briefing presented israelis suggested trip israel u.s. branch airports council international order gain deeper understanding methods employed israeli airport security law enforcement pakistan airports security force asf responsible protecting airports facilities planes asf safeguards civil aviation industry unlawful interference adopting counter terrorism measures preventing crime maintaining law order within limits airports pakistan security country two international passenger airports comes purview airport police division singapore police force although resources concentrated singapore changi airport scheduled passenger traffic dominate seletar airport specializes handling non-scheduled training flights seen posing less security issue since september 11 attacks naming changi airport terrorism target jemaah islamiyah airport security stepped roving patrol teams two soldiers police officer armed automatic weapons patrol terminals random departing passengers checked entrance gate rather immigration clearance unlike hong kong international airport security measure easily noticed presence x-ray machines metal detectors every gate normally seen airports assisting state organizations security services provided ground handlers namely certis cisco singapore airport terminal services sats security services aetos security management private limited formed merger changi international airport services airport security unit companies become single island-wide auxiliary police company officers duties include screening luggage controlling movement restricted areas since 2005 upgrade screening technology rising security concerns led luggage-screening processes conducted behind closed doors plans also place install 400 cameras monitor airport discourage bomb attacks similar 2005 songkhla bombings southern thailand hat yai international airport targeted tenders incorporate system called late september 2005 since 8 may 2007 liquid restrictions 100 ml cap enforced following 2006 transatlantic aircraft plot passengers advised check liquids gels aerosols 100 ml failing confiscated airport security post back oneself anything security areas allowed general practice unacceptable materials also confiscated post back excluding nail clippers nail files umbrellas racquets prior 1970s american airports minimal security arrangements prevent acts terrorism measures introduced starting late 1960s several high-profile hijackings sky marshals introduced 1970 insufficient numbers protect every flight hijackings continued take place november 10 1972 trio hijackers threatened fly southern airways flight 49 nuclear reactor oak ridge national laboratory direct response incident federal aviation administration required airlines begin screening passengers carry-on baggage january 5 1973 screening generally contracted private security companies private companies would bid contracts airline operational control departure concourse controlled given checkpoint would hold contract although airline would control operation checkpoint oversight authority held faa c.f.r title 14 restrictions permit relevant airport authority exercise oversight checkpoint operations 1974 film parallax view shows early airport security checkpoint operation september 11 attacks prompted even tougher regulations limiting number types items passengers could carry board aircraft requiring increased screening passengers fail present government-issued photo id aviation transportation security act generally required november 19 2002 passenger screening must conducted federal employees result passenger baggage screening provided transportation security administration tsa part u.s. department homeland security provisions improve technology detecting explosives included terrorism prevention act 2004 often security category x airports u.s. largest busiest measured volume passenger traffic provided private contractors high volume passenger traffic category x airports considered vulnerable targets terrorism increase security screening airports saw long queues security checks alleviate airports created premium lines passengers traveling first business class elite members particular airline frequent flyer program screening passengers observation techniques spot program operating u.s. airports us specific
[ 2128, 11126, 8519, 1823 ]
Test
8,135
4
L0pht:l0pht l0pht heavy industries pronounced loft hacker collective active 1992 2000 located boston massachusetts area l0pht one first viable hackerspaces us pioneer responsible disclosure group famously testified front congress 1998 topic ‘ weak computer security government ’ second character name originally slashed zero symbol used old teletypewriters character mode operating systems mean zero modern online name including domain name therefore l0pht zero letter ø origin l0pht traced brian oblivion count zero two founding members sharing common loft space south boston wives ran hat business one half space experimented personal computers equipment purchased flea mit mit items obtained dumpster diving local places interest founded 1992 l0pht quickly became location members store computer hardware work various projects time members l0pht quit day jobs start business venture named l0pht heavy industries hacker think tank business released numerous security advisories also produced widely used software tools l0phtcrack password cracker windows nt pocsag decoder cd software collections 1997 august 8–10 mudge brian oblivion kingpin space rogue stefan weld pond john tan l0pht discussed recent projects accomplishments windows nt new projects emerging trends shortcomings technologies q session beyond hope puck building new york city october 1999 l0pht featured lengthy article new york times sunday magazine article jeffrey hunker nsc director information protection said l0pht objective basically help improve state art security gadfly speak january 2000 l0pht heavy industries merged startup stake completing l0pht slow transition underground organization whitehat computer security company symantec announced acquisition stake september 16 2004 completed transaction october 8 year march 14 2008 several members l0pht sat panel standing-room-only group infosec professionals source boston present weld pond john tan mudge space rogue silicosis dildog may 19 1998 seven members l0pht brian oblivion kingpin mudge space rogue stefan von neumann john tan weld pond famously testified congress united states could shut entire internet 30 minutes washington post referred response tragedy missed opportunity four members original group space rogue weld pond kingpin mudge held briefing entitled “ disaster foretold — ignored ” revisiting first-ever congressional cybersecurity hearing hosted congressional internet caucus academy briefing held may 22 2018 almost exactly 20 years original testimony streamed live via facebook defcon 26 hacking conference held august 10 2018 las vegas seven l0pht members sat panel entitled l0pht testimony 20 years later things afraid ask among things panel encouraged attendees keep hacking stay side law kept jail general counsel national security agency glenn s. gerstell quoted testimony l0pht ’ hearing keynote american bar association ’ 28th annual review field national security law conference november 1 2018 l0pht occupied physical space real expenses electricity phone internet access rent early l0pht history costs evenly divided among l0pht members fact l0pht originally shared space hat-making business run spouses brian oblivion count zero rental cost divided amongst soon subsidized profits made selling old hardware monthly mit electronic flea market summer occasionally shell accounts offered low cost l0pht.com server selected individuals individuals access l0pht.com server members l0pht one first physical products sold profit l0pht pocsag decoder kit sold kit assembled form subsequently whacked mac archives transferred cd-rom sale soon followed cd copies black crawling system archives command line version l0phtcrack password cracker windows nt given away free gui version sold commercial product followed creation hacker news network website host advertisements however even sources income l0pht barely broke even eventually began custom security coding companies like nfr january 2009 l0phtcrack acquired original authors zatko wysopal rioux symantec l0phtcrack 6 released source boston conference march 11 2009 l0phtcrack 6 contains support 64-bit windows platforms well upgraded rainbow tables support l0pht membership varied included various times
[ 9217, 9569, 3619, 6916, 1861, 10914, 10279, 5512, 8976, 10110, 1525, 5111, 8827, 4956, 7741, 9214 ]
None
8,136
2
History_of_operating_systems:history operating systems computer operating systems oses provide set functions needed used application programs computer links needed control synchronize computer hardware first computers operating system every program needed full hardware specification run correctly perform standard tasks drivers peripheral devices like printers punched paper card readers growing complexity hardware application programs eventually made operating systems necessity everyday use earliest computers mainframes lacked form operating system user sole use machine scheduled period time would arrive computer program data often punched paper cards magnetic paper tape program would loaded machine machine would set work program completed crashed programs could generally debugged via control panel using dials toggle switches panel lights symbolic languages assemblers compilers developed programmers translate symbolic program-code machine code previously would hand-encoded later machines came libraries support code punched cards magnetic tape would linked user program assist operations input output genesis modern-day operating system however machines still ran single job time cambridge university england job queue one time washing line tapes hung different colored clothes-pegs indicate job-priority machines became powerful time run programs diminished time hand equipment next user became large comparison accounting paying machine usage moved checking wall clock automatic logging computer run queues evolved literal queue people door heap media jobs-waiting table batches punch-cards stacked one top reader machine able select sequence magnetic tape drives processed tapes program developers originally access run jobs machine supplanted dedicated machine operators looked machine less less concerned implementing tasks manually commercially available computer centers faced implications data lost tampering operational errors equipment vendors put pressure enhance runtime libraries prevent misuse system resources automated monitoring needed cpu usage counting pages printed cards punched cards read disk storage used signaling operator intervention required jobs changing magnetic tapes paper forms security features added operating systems record audit trails programs accessing files prevent access production payroll file engineering program example features building towards repertoire fully capable operating system eventually runtime libraries became amalgamated program started first customer job could read customer job control execution record usage reassign hardware resources job ended immediately go process next job resident background programs capable managing multistep processes often called monitors monitor-programs term operating system established underlying program offering basic hardware-management software-scheduling resource-monitoring may seem remote ancestor user-oriented oses personal computing era shift meaning os early automobiles lacked speedometers radios air-conditioners later became standard optional software features became standard features every os package although applications database management systems spreadsheets remain optional separately priced led perception os complete user-system integrated graphical user interface utilities applications text editors file managers configuration tools true descendant early operating systems called kernel technical development circles old restricted sense os persists continued active development embedded operating systems kinds devices data-processing component hand-held gadgets industrial robots real-time control-systems run user applications front-end embedded os device today far removed one might think ancestor 1950s broader categories systems application software discussed computer software article first operating system used real work gm-naa i/o produced 1956 general motors research division ibm 704 early operating systems ibm mainframes also produced customers early operating systems diverse vendor customer producing one operating systems specific particular mainframe computer every operating system even vendor could radically different models commands operating procedures facilities debugging aids typically time manufacturer brought new machine would new operating system applications would manually adjusted recompiled retested state affairs continued 1960s ibm already leading hardware vendor stopped work existing systems put effort developing system/360 series machines used instruction input/output architecture ibm intended develop single operating system new hardware os/360 problems encountered development os/360 legendary described fred brooks mythical man-month —a book become classic software engineering performance differences across hardware range delays software development whole family operating systems introduced instead single os/360 ibm wound releasing series stop-gaps followed two longer-lived operating systems ibm maintained full compatibility past programs developed sixties still run z/vse developed dos/360 z/os developed mft mvt change ibm also developed tss/360 time-sharing system system/360 model 67 overcompensating perceived importance developing timeshare system set hundreds developers work project ended bloated buggy project took long boot crash ended project without releasing several operating systems ibm s/360 s/370 architectures developed third parties including michigan terminal system mts music/sp control data corporation developed scope operating systems 1960s batch processing later developed mace operating system time sharing basis later kronos cooperation university minnesota kronos later nos operating systems developed 1970s supported simultaneous batch timesharing use like many commercial timesharing systems interface extension dtss time sharing system one pioneering efforts timesharing programming languages late 1970s control data university illinois developed plato system used plasma panel displays long-distance time sharing networks plato remarkably innovative time shared memory model plato tutor programming language allowed applications real-time chat multi-user graphical games univac 1107 univac first commercial computer manufacturer produced exec operating system computer sciences corporation developed exec ii operating system delivered univac exec ii ported univac 1108 later univac developed exec 8 operating system 1108 basis operating systems later members family like early mainframe systems exec exec ii batch-oriented system managed magnetic drums disks card readers line printers exec 8 supported batch processing on-line transaction processing 1970s univac produced real-time basic rtb system support large-scale time sharing also patterned dartmouth basic system burroughs corporation introduced b5000 1961 mcp master control program operating system b5000 stack machine designed exclusively support high-level languages software even lowest level operating system written directly machine language assembly language mcp first os written entirely high-level language espol dialect algol 60 although espol specialized statements syllable b5000 instruction set mcp also introduced many ground-breaking innovations one first commercial implementations virtual memory rewrite mcp b6500 still use today unisys clearpath/mcp line computers ge introduced ge-600 series general electric comprehensive operating supervisor gecos operating system 1962 honeywell acquired ge computer business renamed general comprehensive operating system gcos honeywell expanded use gcos name cover operating systems 1970s though many computers nothing common earlier ge 600 series operating systems derived original gecos project mac mit working ge bell labs developed multics introduced concept ringed security privilege levels digital equipment corporation developed tops-10 pdp-10 line 36-bit computers 1967 widespread use unix tops-10 particularly popular system universities early arpanet community bolt beranek newman developed tenex modified pdp-10 supported demand paging another popular system research arpanet communities later developed dec tops-20 scientific data systems/xerox data systems developed several operating systems sigma series computers basic control monitor bcm batch processing monitor bpm basic time-sharing monitor btm later bpm btm succeeded universal time-sharing system uts designed provide multi-programming services online interactive user programs addition batch-mode production jobs succeeded cp-v operating system combined uts heavily batch-oriented xerox operating system digital equipment corporation created several operating systems 16-bit pdp-11 machines including simple rt-11 system time-sharing rsts operating systems rsx-11 family real-time operating systems well vms system 32-bit vax machines several competitors digital equipment corporation data general hewlett-packard computer automation created operating systems one max iii developed modular computer systems modcomp ii modcomp iii computers characterised target market industrial control market fortran libraries included one enabled access measurement control devices ibm key innovation operating systems class call mid-range cpf system/38 capability-based addressing used machine interface architecture isolate application software operating system hardware dependencies including even details address size register size included integrated rdbms succeeding os/400 as/400 files objects different types objects persist large flat virtual memory called single-level store i5/os later ibm iseries continue line operating system unix operating system developed bell laboratories late 1960s originally pdp-7 later pdp-11 essentially free early editions easily obtainable easily modified achieved wide acceptance also became requirement within bell systems operating companies since written c language language ported new machine architecture unix also able ported portability permitted become choice second generation minicomputers first generation workstations widespread use exemplified idea operating system conceptually across various hardware platforms later became one roots free software open-source software operating system projects including gnu linux berkeley software distribution apple macos also based unix via nextstep freebsd pick operating system another operating system available wide variety hardware brands commercially released 1973 core basic-like language called data/basic sql-style database manipulation language called english licensed large variety manufacturers vendors early 1980s observers saw pick operating system strong competitor unix beginning mid-1970s new class small computers came onto marketplace featuring 8-bit processors typically mos technology 6502 intel 8080 motorola 6800 zilog z80 along rudimentary input output interfaces much ram practical systems started kit-based hobbyist computers soon evolved essential business tool many eight-bit home computers 1980s bbc micro commodore 64 apple ii series atari 8-bit amstrad cpc zx spectrum series others could load third-party disk-loading operating system cp/m geos generally used without one built-in operating systems designed era floppy disk drives expensive expected used users standard storage device tape drive using standard compact cassettes computers shipped built-in basic interpreter rom also served crude command line interface allowing user load separate disk operating system perform file management commands load save disk popular home computer commodore 64 notable exception dos rom disk drive hardware drive addressed identically printers modems external devices furthermore systems shipped minimal amounts computer memory—4-8 kilobytes standard early home computers—as well 8-bit processors without specialized support circuitry like mmu even dedicated real-time clock hardware complex operating system overhead supporting multiple tasks users would likely compromise performance machine without really needed systems largely sold complete fixed hardware configuration also need operating system provide drivers wide range hardware abstract away differences video games even available spreadsheet database word processors home computers mostly self-contained programs took machine completely although integrated software existed computers usually lacked features compared standalone equivalents largely due memory limitations data exchange mostly performed standard formats like ascii text csv specialized file conversion programs since virtually video game consoles arcade cabinets designed built 1980 true digital machines based microprocessors unlike earlier pong clones derivatives carried minimal form bios built-in game colecovision sega master system snk neo geo modern-day game consoles videogames starting pc-engine minimal bios also provides interactive utilities memory card management audio video cd playback copy protection sometimes carry libraries developers use etc cases however would qualify true operating system notable exceptions probably dreamcast game console includes minimal bios like playstation load windows ce operating system game disk allowing easily porting games pc world xbox game console little disguised intel-based pc running secret modified version microsoft windows background furthermore linux versions run dreamcast later game consoles well long sony released kind development kit called net yaroze first playstation platform provided series programming developing tools used normal pc specially modified black playstation could interfaced pc download programs operations require general functional os platforms involved general said videogame consoles arcade coin-operated machines used built-in bios 1970s 1980s 1990s playstation era beyond started getting sophisticated point requiring generic custom-built os aiding development expandability development microprocessors made inexpensive computing available small business hobbyist turn led widespread use interchangeable hardware components using common interconnection s-100 ss-50 apple ii isa pci buses increasing need standard operating systems control important early oses machines digital research cp/m-80 8080 8085 z-80 cpus based several digital equipment corporation operating systems mostly pdp-11 architecture microsoft first operating system mdos/midas designed along many pdp-11 features microprocessor based systems ms-dos pc dos supplied ibm designed similar cp/m-80 machines small boot program rom loaded os disk bios ibm-pc class machines extension idea accreted features functions 20 years since first ibm-pc introduced 1981 decreasing cost display equipment processors made practical provide graphical user interfaces many operating systems generic x window system provided many unix systems graphical systems apple classic mac os macos radio shack color computer os-9 level ii/multivue commodore amigaos atari tos ibm os/2 microsoft windows original gui developed xerox alto computer system xerox palo alto research center early 1970s commercialized many vendors throughout 1980s 1990s since late 1990s three operating systems widespread use personal computers apple inc. macos open source linux microsoft windows since 2005 apple transition intel processors developed mainly x86 platform although macos retained powerpc support 2009 linux remains ported multitude architectures including ones 68k pa-risc dec alpha long superseded production sparc mips used servers embedded systems longer desktop computers operating systems amigaos os/2 remain use mainly retrocomputing enthusiasts specialized embedded applications early 1990s psion released psion series 3 pda small mobile computing device supported user-written applications running operating system called epoc later versions epoc became symbian operating system used mobile phones ericsson motorola nokia 1996 palm computing released pilot 1000 pilot 5000 running palm os microsoft windows ce base pocketpc 2000 renamed windows mobile 2003 peak 2007 common operating system smartphones u.s 2007 apple introduced iphone operating system ios like mac os x based unix-like darwin addition underpinnings also introduces powerful innovative graphic user interface – later also used tablet computer ipad year later android introduced based modified linux kernel graphical user interface microsoft re-entered market windows phone 2010 due replaced windows 10 mobile 2015 addition wide range mobile operating systems contending area operating systems originally ran directly hardware provided services applications virtualization operating system runs control hypervisor instead direct control hardware mainframes ibm introduced notion virtual machine 1968 cp/cms ibm system/360 model 67 extended later 1972 virtual machine facility/370 vm/370 system/370 x86-based personal computers vmware popularized technology 1999 product vmware workstation 2001 vmware gsx server vmware esx server products later wide range products others including xen kvm hyper-v meant 2010 reported 80 percent enterprises virtualization program project place 25 percent server workloads would virtual machine time line virtual machines monitors operating systems blurred many ways virtual machine software today plays role formerly held operating system including managing hardware resources processor memory i/o devices applying scheduling policies allowing system administrators manage system
[ 2560, 6148, 9732, 6153, 6155, 6675, 7187, 10776, 25, 9756, 4637, 11295, 5154, 4643, 6180, 9762, 5158, 7217, 10803, 9784, 10809, 576, 2625, 7234, 3142, 1610, 6221, 5714, 86, 9302, 3160, 11356, 10333, 97, 11363, 9829, 6248, 6760, 8298, 9835...
None
8,137
2
Gecos_field:gecos field gecos field gecos field entry /etc/passwd file unix similar operating systems typically used record general information account user real name phone number typical format gecos field comma-delimited list order unix systems non-root users change information using chfn chsh command early unix systems bell labs used gecos machines print spooling various services field added carry information user gecos identity internet relay chat irc real name field commonly referred gecos field irc clients required supply field connecting hexchat x-chat fork defaults 'realname talksoup.app gnustep defaults 'john doe irssi reads operating system user full name replacing 'unknown defined irc clients use field advertising example znc defaulted got znc changed realname match configuration syntax 2015
[ 3937, 5251, 3916, 7983, 8304, 11153, 5492 ]
None
8,138
5
Binary_Synchronous_Communications:binary synchronous communications binary synchronous communication bsc bisync ibm character-oriented half-duplex link protocol announced 1967 introduction system/360 replaced synchronous transmit-receive str protocol used second generation computers intent common link management rules could used three different character encodings messages six-bit transcode looked backwards older systems usascii 128 characters ebcdic 256 characters looked forward transcode disappeared quickly ebcdic usascii dialects bisync continued use one time bisync widely used communications protocol still limited use 2013 bisync differs protocols succeeded complexity message framing later protocols use single framing scheme messages sent protocol hdlc digital data communications message protocol ddcmp point-to-point protocol ppp etc different framing schemes one frame format exists within specific protocol bisync five different framing formats ack0 ack1 even/odd affirmative acknowledgement encoded two characters—dle '70 x dle ebcdic dle 0 dle 1 usasii dle dle transcode wabt wait transmit encoded dle dle dle w. frame formats begin least two syn bytes binary form syn byte property rotation byte equal original allows receiver find beginning frame searching received bit stream syn pattern found tentative byte synchronization achieved next character also syn character synchronization achieved receiver searches character start frame characters outside set described leading graphics sometimes used identify sender frame long messages syn bytes inserted approximately every second maintain synchronization ignored receiver normal block ending character etb etx followed check sum block check character bcc usascii one character longitudinal redundancy check lrc transcode ebcdic check sum two character cyclic redundancy check crc data frame may contain intermediate check sum preceded itb character ability include intermediate check sums long data frame allows considerable improvement error detection probability usascii characters also transmitted using odd parity additional checking pad characters required following line turn-around—nak eot enq ack0 ack1 transmission ends eot etx pad follows bcc pad either 1 bits alternating 0 1 bits next transmission begins pad character either syn optional heading containing control information precede data frame content heading defined protocol defined specific device heading present preceded soh start heading character followed stx start text text data normally follows heading begun stx terminated etx end text etb end transmission block normal data frames allow certain characters appear data block ending characters etb etx enq itb syn characters number unique characters transmitted therefore limited 59 transcode 123 usascii 251 ebcdic transparent data framing provides unrestricted alphabet 64 128 256 characters transparent mode block framing characters etb etx syn preceded dle character indicate control significance dle character represented sequence dle dle technique became known character stuffing analogy bit stuffing link control protocol similar str designers attempted protect simple transmission errors protocol requires every message acknowledged ack0/ack1 negatively acknowledged nak transmission small packets high transmission overhead protocol recover corrupted data frame lost data frame lost acknowledgment error recovery retransmission corrupted frame since bisync data packets serial-numbered considered possible data frame go missing without receiver realizing therefore alternating ack0s ack1s deployed transmitter receives wrong ack assume data packet ack went missing potential flaw corruption ack0 ack1 could result duplication data frame error protection ack0 ack1 weak hamming distance two messages two bits protocol half-duplex 2-wire environment packets frames transmission strictly unidirectional necessitating 'turn-around even simplest purposes acknowledgments turn-around involves 2-wire environment causes noticeable round-trip delay reduces performance datasets support full-duplex operation full-duplex 4-wire used many circumstances improve performance eliminating turn-around time added expense 4-wire installation support typical full-duplex data packets transmitted along one wire pair acknowledgements returned along much bisync traffic point-to-point point-to-point lines optionally use contention determine master station case one device transmit enq bid control device reply ack0 accept bid prepare receive nak wabt refuse cases connection terminal multiple hosts possible via dial telephone network multi-drop part initial bisync protocol master station normally computer sequentially poll terminals attached via analog bridges communication line accomplished sending message consisting enq character addressed device turn selected station transmits message master reply eot indicate data transmit original purpose bisync batch communications system/360 mainframe another mainframe remote job entry rje terminal ibm 2780 ibm 3780 rje terminals support limited number data formats punched card images print line images terminal non-ibm hardware vendors mohawk data sciences used bisync purposes tape-to-tape transmission programmer easily emulate rje terminal device ibm offered assembler language macros provide programming support system/360 era access methods btam basic telecommunications access method qtam queued telecommunications access method – later replaced telecommunications access method tcam ibm introduced vtam virtual telecommunications access method system/370 teleprocessing monitors ibm cics third-party software remote ducs display unit control system westi platforms used bisync line control communicate remote devices academic computing network bitnet together connecting networks geographic areas used bisync connect 3000 computer systems peak financial network s.w.i.f.t used bsc protocol communication regional center institution bank server leased line mid-1990 bsc replaced x.25 infrastructure important systems use bisync data framing different link control protocol houston automated spooling program hasp uses bisync half-duplex hardware conjunction link control protocol provide full-duplex multi-datastream communication small computer mainframe running hasp bisync terms conversational mode early x.25 networks tolerated connection scheme transparent bisync data frames encapsulated hdlc lapb data control packets several vendors encapsulate bisync transmissions within tcp/ip data streams bisync began displaced 1970s systems network architecture sna allows construction network multiple hosts multiple programs using telecommunications x.25 internet protocol later protocols like sna provide mere link control large number devices use bisync protocol
[ 5472, 4546, 4586, 1997, 10094, 47, 5071, 8432, 11217, 3443, 10072, 5021, 8606 ]
None
8,139
7
Apache_SystemML:apache systemml apache systemml flexible machine learning system automatically scales spark hadoop clusters systemml's distinguishing characteristics systemml created 2010 researchers ibm almaden research center led ibm fellow shivakumar vaithyanathan observed data scientists would write machine learning algorithms languages r python small data came time scale big data systems programmer would needed scale algorithm language scala process typically involved days weeks per iteration errors would occur translating algorithms operate big data systemml seeks simplify process primary goal systemml automatically scale algorithm written r-like python-like language operate big data generating answer without error-prone multi-iterative translation approach june 15 2015 spark summit san francisco beth smith general manager ibm analytics announced ibm open-sourcing systemml part ibm major commitment apache spark spark-related projects systemml became publicly available github august 27 2015 became apache incubator project november 2 2015 may 17 2017 apache software foundation board approved graduation apache systemml apache top level project
[ 10377, 8460, 7567, 1296, 6161, 1047, 1913, 8217, 6555, 8860, 11161, 3877, 10661, 11303, 5677, 1327, 7983, 823, 4919, 5047, 4538, 1851, 6074, 7485, 7742, 9789, 7233, 6338, 4419, 1222, 1991, 4294, 5833, 5066, 7750, 4944, 1363, 11221, 8408, ...
Test
8,140
9
O-code:o-code o-code intermediate language emitted bcpl compiler compiled machine code computer intended run program method compiling allowed original bcpl compiler ported new machines easily result became widespread idea since used many recent compilers however interpret equivalent o-code virtual machine rather compiling originally case o-code machine virtual machine developed martin richards late 1960s give machine independence bcpl low-level forerunner c c++ concept behind o-code machine create o-code output stands object bcpl compiler o-code either interpreted normally compiled machine specific code idea used later compilers p-code pascal compilers bytecode generated jvm java compilers o-code allowed richards separate general compilation issues machine specific implementation issues writing bcpl compiler use bcpl compiler made compiler easy port result bcpl quickly became available many machines
[ 6242, 8868, 1349, 8262, 8524, 5677, 10638, 10703, 5872, 2045 ]
Test
8,141
4
Sagan_(software):sagan software sagan open source gnu/gplv2 multi-threaded high performance real-time log analysis correlation engine developed quadrant information security runs unix operating systems written c uses multi-threaded architecture deliver high performance log event analysis sagan structure rules work similarly sourcefire snort ids/ips engine allows sagan compatible snort rule management software give sagan ability correlate snort ids/ips data sagan record events snort unified2 output format makes sagan compatible user interfaces snorby sguil base proprietary consoles sagan supports different output formats reporting analysis log normalization script execution event detection automatic firewall support via snortsam geoip detection/alerting multi-line log support time sensitive alerting
[ 3714, 7813, 7983, 5492, 5245, 2045, 3486 ]
None
8,142
8
Protein_Structure_Evaluation_Suite_&_Server:protein structure evaluation suite amp server protein structure evaluation suite server prosess freely available web server protein structure validation designed university alberta assist process evaluating validating protein structures solved nmr spectroscopy structure validation particularly important component structure determination pipeline many protein structures small structural errors i.e distorted bond lengths angles incompatible torsion angles overlapping atoms easily detected visual inspection protein structures solved nmr spectroscopy large numbers structures generated coordinate inaccuracies common problem particularly acute nmr-based structure validation protocols primarily use noe nuclear overhauser enhancement j-coupling residual dipolar coupling rdc data assess validate structures particular try assess agreement experimentally observed calculated noes rdcs and/or j-couplings good agreement calculated observed parameters normally indicates good structure methods structure validation procheck molprobity resprox vadar focus measuring coordinate data rather experimental data assess quality bond torsion angle geometry prosess unique among structure validation servers evaluates coordinate quality experimental data quality prosess also able use nmr chemical shifts well noes assess validate protein structures chemical shifts easily precisely measurable nmr observables provide great deal information protein structure dynamics see protein chemical shift prediction specifically prosess assesses agreement observed chemical shifts shiftx-predicted ha ca cb n c hn nmr chemical shifts addition ability validate structures using chemical shifts prosess also checks many protein structure parameters including covalent bond quality non-covalent bond atomic packing quality torsion angle quality noe quality i.e measuring model agreement noe-based distance restraints total 8 different programs see prosess sub-programs used prosess evaluation validation process prosess handle single-chain x-ray models multi-chain x-ray models single-chain nmr ensembles multi-chain nmr ensembles monomeric multimeric proteins addition able validate nmr protein structures prosess used validate evaluate protein model regardless solved x-ray nmr comparative modelling etc. prosess generates detailed colorful structure validation report including tables color-coded images graphs bar charts many tables contain embedded hyperlinks additional details explanations graphs charts prosess uses simple rag red amber green color scheme indicate quality different structure parameters protein whole different members structure ensemble specific residues specific atoms different shades red indicate serious problems different shades yellow amber indicate potential problems different shades green indicate protein model residues/atoms free problems color also assigned number ranging 0 9with 0 bad 9 excellent structure quality assessment quantifiable prosess quality indices quality color scales designed specifically help non-structural biologists easily rapidly understand protein structure validation reports
[ 225 ]
Test
8,143
3
Operand:operand mathematics operand object mathematical operation i.e. object quantity operated following arithmetic expression shows example operators operands example '+ symbol operation called addition operand 3 one inputs quantities followed addition operator operand 6 input necessary operation result operation 9 number 9 also called sum augend 3 addend 6 operand also referred one inputs quantities operation operands may complex may consist expressions also made operators operands expression 3 5 first operand multiplication operator 2 second operand 3 5 expression contains addition operator operands 3 5 rules precedence affect values form operands operators expression multiplication operator higher precedence addition operator multiplication operator operands 5 2 addition operator operands 3 5 × 2 depending mathematical notation used position operator relation operand may vary everyday usage infix notation common however notations also exist prefix postfix notations alternate notations common within computer science comparison three different notations — represent addition numbers 1 2' mathematical expression order operation carried left right start leftmost value seek first operation carried accordance order specified i.e. start parentheses end addition/subtraction group example expression first operation acted upon expressions found inside parenthesis beginning left moving right find first case parenthesis 2 2 within parenthesis found expression 2 reader required find value 2 going value 2 4 found value remaining expression looks like next step calculate value expression inside parenthesis 2 4 6 expression looks like calculated parenthetical part expression start beginning left value move right next order operation according rules exponents start left value 4 scan eyes right search first exponent come across first expression come across expressed exponent 2 find value 2 4 left expression next order operation multiplication 4 × 4 16 expression looks like next order operation according rules division however division operator sign ÷ expression 16 − 6 move next order operation i.e. addition subtraction precedence done left right correct value original expression 4 × 2 − 2 2 10 important carry order operation accordance rules set convention reader evaluates expression follow correct order operation reader come forth different value different value incorrect value order operation followed reader arrive correct value expression operation carried proper order number operands operator called arity based arity operators classified nullary operands unary 1 operand binary 2 operands ternary 3 operands etc computer programming languages definitions operator operand almost mathematics computing operand part computer instruction specifies data manipulated operated time representing data computer instruction describes operation add multiply x operand operands one specify x operate well value x. additionally assembly language operand value argument instruction named mnemonic operates operand may processor register memory address literal constant label simple example x86 architecture mov ds ax value register operand codice_1 moved codice_2 register codice_3 depending instruction may zero one two operands
[ 1029, 1798, 4742, 7173, 8715, 8716, 6926, 5655, 8352, 10786, 6821, 5415, 10796, 1463, 9911, 6596, 9028, 8262, 8136, 8523, 3157, 730, 604, 477, 1502, 6247, 5358, 240, 1776, 4465, 499, 372, 7281, 7421 ]
Train
8,144
4
Miredo:miredo miredo teredo tunneling client designed allow full ipv6 connectivity computer systems ipv4-based internet direct native connection ipv6 network miredo included many linux bsd distributions also available recent versions mac os x discontinued includes working implementations released terms gnu general public license miredo free software
[ 5469, 2045, 5470, 823 ]
Test
8,145
7
ActiveCampaign:activecampaign activecampaign email marketing marketing automation sales automation crm software platform small-to-mid-sized businesses based chicago illinois activecampaign founded jason vandeboom 2003 started consulting firm on-premise software provider helping small midsize businesses automate marketing tasks manage contacts 2013 company transitioned on-premise software software service business focused marketing sales automation 2018 activecampaign 60,000 clients 60 million recurring revenue 2016 activecampaign raised 20 million silversmith capital partners activecampaign headquartered chicago offices indianapolis sydney australia activecampaign provides cloud-based marketing sales automation software features email marketing lead scoring web analytics crm platform live chat messaging platform called conversations software uses customer data create customized messaging according pc magazine activecampaign offers lot features relatively low price downside confusing use times thankfully help resources plentiful solutions review pointed users access detailed behavior tracking capabilities well precision marketing options segmentation 2018 activecampaign appeared crain chicago business best places work list inc.com list best workplaces chicago tribune list top midsize workplaces
[ 6576 ]
Test
8,146
4
Hackers.mu:hackers.mu hackers.mu group developers mauritius focused computer security ietf standards linux open source software adoption worked implementing tls 1.3 linux open source software ietf 100 hackathon part tls working group also prepared high school students google code-in 2016 marked first time mauritius participated 2017 trained another batch high school students would lead first grand prize winner mauritius ietf 101 hackers.mu acted tls 1.3 champions continued work application integration support june 2018 hackers.mu organized hackathon codename operation jask fix sigspoof3 number open source projects july 2018 hackers.mu participated ietf 102 hackathon tls 1.3 champions work inter-operability applications support http 451 additionally active authoring ietf standards rfc 8270
[ 7547, 2558, 823 ]
Train
8,147
2
Revolution_OS:revolution os revolution os 2001 documentary film traces twenty-year history gnu linux open source free software movement directed j. t. s. moore film features interviews prominent hackers entrepreneurs including richard stallman michael tiemann linus torvalds larry augustin eric s. raymond bruce perens frank hecker brian behlendorf film begins glimpses raymond linux ipo torvalds idea open source perens stallman sets historical stage early days hackers computer hobbyists code shared freely discusses change came 1978 microsoft co-founder bill gates open letter hobbyists pointedly prodded hobbyists pay stallman relates struggles proprietary software vendors mit artificial intelligence lab leading departure focus development free software gnu project torvalds describes development linux kernel gnu/linux naming controversy linux evolution commercialization raymond stallman clarify philosophy free software versus communism capitalism well development stages linux michael tiemann discusses meeting stallman 1987 getting early version stallman gcc founding cygnus solutions larry augustin describes combining gnu software normal pc create unix-like workstation one third price twice power sun workstation relates early dealings venture capitalists eventual capitalization commodification linux company va linux ipo brian behlendorf one original developers apache http server explains started exchange patches ncsa web server daemon developers led release patchy webserver dubbed apache frank hecker netscape discusses events leading netscape executives releasing source code netscape browser one signal events made open source force reckoned business executives mainstream media public large point validated film release netscape source code eventually became firefox web browser reclaiming large percentage market share microsoft internet explorer film also documents scope first full-scale linuxworld summit conference appearances linus torvalds larry augustin keynote stage much footage film shot silicon valley film appeared several film festivals including south southwest atlanta film video festival boston film festival denver international film festival best documentary savannah film video festival kudzu film festival every review noted historical significance information noticed found production values high presentation history mainly dry even resembling lecture ron wells film threat found film important worthwhile well thought explaining principles free software open source concepts noting failure represent camera debate representatives proprietary software camp wells gave film 4 5 stars tv guide rated film 3 4 stars surprisingly exciting fascinating sharp looking good soundtrack daily variety saw film targeted equally techno-illiterate savvy-hacker crowd educating patting one group head canonizing strong enough enjoyable recommendation negative side new york times faulted film one-sidedness found reliance jargon fairly dense going gave recommendation internet reviews found didactic dull documentary glorifying software anarchy raging microsoft sun lacking follow-through red hat valinux stock 2007 2 peak value lots talking heads toxicuniverse.com noted revolution os blatantly serves infomercial propaganda bearded throwback sixties hacker richard stallman serves movement spiritual leader scandinavian linus torvalds acts mild mannered chief engineer developer linux kernel tim lord reviewing slashdot film interesting worthy viewing misgivings growth free software movement eventual co-option open source movement supposed linux battle microsoft movie quickly hijacked participants film lacks staple documentaries scenes multiple people later analyzed individually participants indeed much back-and-forth linux benefits notably missing w e never shown anyone using linux except unhappy users installfest debate linux vs windows missing showing origin os response proprietary expensive sun dec software hardware growth solely due apache web server lord notes film shows challenge torvalds stallman equally disingenuous remarks linux vs gnu/linux naming issue
[ 2560, 2050, 1028, 5644, 10255, 5139, 9237, 4636, 4637, 9245, 5663, 10780, 546, 3618, 9257, 3114, 5677, 1584, 9266, 7223, 6718, 10817, 8258, 8772, 3654, 5703, 10822, 1101, 10317, 2134, 1112, 3162, 3674, 4192, 2658, 10851, 6244, 9320, 6763, ...
None
8,148
4
Disinfectant_(software):disinfectant software disinfectant popular antivirus software program classic mac os originally released freeware john norstad spring 1989 disinfectant featured system extension would detect virus infections application users could scan remove viruses new versions disinfectant subsequently released detect additional viruses bob levitus praised recommended disinfectant 1992 may 1998 norstad retired disinfectant citing new danger posed macro viruses disinfectant detect inability single individual maintain program caught
[ 576, 7515, 2213, 7983 ]
Validation
8,149
8
Fuse_Mediation_Router:fuse mediation router fuse mediation router open source tool integrating services using enterprise integration patterns based apache camel use enterprise organizations certified productized fully supported people wrote code fuse mediation router uses standard method notation go diagram implementation without coding fuse mediation router rule-based routing process mediation engine combines ease basic pojo development clarity standard enterprise integration patterns deployed inside container used stand-alone works directly kind transport messaging model rapidly integrate existing services applications fuse mediation router part red hat jboss fuse fusesource offers graphical eclipse-based tooling apache camel download
[ 1280, 10020, 4107, 5612, 5677, 11339, 7983, 9455 ]
Test
8,150
4
High-water_mark_(computer_security):high-water mark computer security high-water mark access control introduced clark weissmann 1969 pre-dates bell–lapadula security model whose first volume appeared 1972 high-water mark object less user security level opened object relabeled reflect highest security level currently open hence name practical effect high-water mark gradual movement objects towards highest security level system user writing confidential document checks unclassified dictionary dictionary becomes confidential user b writing secret report checks spelling word dictionary becomes secret finally user c assigned assemble daily intelligence briefing top secret level reference dictionary makes dictionary top secret low-water mark extension biba model biba model no-write-up no-read-down rules enforced model rules exactly opposite rules bell-la padula model low-water mark model read permitted subject label reading degraded object label classified floating label security models
[ 3360, 3616, 8259, 2737, 10968, 2558 ]
None
8,151
3
Do!_Run_Run:run run run run known super pierrot スーパーピエロ japan fourth final incarnation mr universal video game mascot returning mr. roots clown bouncing powerball hurl monsters mr. runs along playfield picking dots leaving line behind player encouraged create closed sections precariously balanced log traps rolled downslope crushing enemies resulting game somewhat cross mr congo bongo pac-man qix title reference song da doo ron ron goal run run rack points completing screens screen completed whenever fruits/dots eaten regular monsters alpha-monsters sidekicks defeated using rope follows mr. inscribe dots convert cherries familiar fruit mr. collect cherries worth points dots eating restores powerball quickly eating dots would time mr. inscribes fruit progress higher tier dots become cherries cherries become apples apples become lemons lemons become pineapples eating dot awards 10 points 1/16 powerball recharge eating pineapple worth 160 points 1/4 powerball recharge players additionally encouraged inscribe sections playfield letters e x r constant feature mr games randomly one inscribed fruits turn flashing letter spot corresponding movement alpha-monster top screen mr. runs spot monster sporting letter release top screen three blue henchmen resemble three ghost-like monsters original mr chase mr. defeating alpha-monster lock letter 5 letters earned player earns extra life well progressing next stage also earn 5,000 point bonus points also awarded defeating monsters directly firing powerball monster awards 500 points consumes powerball needs replenished eating fruit points earned powerball bounces surface bounce raises bonus 500 points maximum 3000 points earned smashing monsters rolling log earns 1000 points possible roll multiple monsters earn cumulative bonus 500 per extra monster 1500 2nd 2000 3rd etc. apparently 10,000 point bonus smashing 5 monsters like mr. games monsters nameless except alpha-monsters defy easy description two types monsters attempt foil clown efforts green clam-like monster blue snake-like monster neither particularly sophisticated although clam monsters seemingly clever moments bumble path way powerball blue snakes linger long direct path convert fireball charge across playing field state immune powerball common arcade games contact monsters instantly fatal mr. shown electrocuted complete visible flashing skeleton reappearing black skeleton time stage elapses music changes surviving monsters convert different form clam monsters become blue armored spines snake monsters essentially become different looking snake monsters speed monster willingness chase mr. major changes fairly easily eluded long player simply run away instead mr. climb terrain closely chased monsters lose lot time changing levels playfield whereas mr. gets slight speed going downslope short duration music resumes monsters transform back old selves pattern transformation repeating alpha-monsters summoned letter circle released three henchmen henchmen home mr. typically precede alpha-monster killing alpha-monster rids playfield henchmen although easier lure four path log smash alpha-monsters also released every time score reaches increments 5,000 points unless already alpha-monster playfield configured rom occur infrequently bonus diamond worth 10,000 points show manner letter circles fruit inscribed player collects stage ends awarded bonus credit fashion original mr versions released msx 1987 amiga atari st 1990 ports amstrad cpc commodore 64 zx spectrum cancelled development
[ 11373, 9006, 9110, 4312, 3039 ]
Validation
8,152
4
Alec_Muffett:alec muffett alec david edward muffett born april 22 1968 anglo-american internet-security evangelist architect software engineer principally known work crack original unix password cracker cracklib password-integrity testing library also active open-source software community muffett joined sun microsystems 1992 working initially systems administrator rose “ ranks ” become principal engineer security position held retrenched many others 2009 shortly oracle acquired sun sun one researchers worked factorization 512 bit rsa challenge number rsa-155 successfully factorized august 1999 muffett also worked sun md5 hash algorithm introduced solaris 9 update 2 new algorithm drew muffett work pluggable crypt implemented many different languages example python algorithm uses complete text famous soliloquy shakespeare hamlet question ... constant data muffett justified choice text exposes programmers shakespeare got good thing sabbatical year muffett began work mine project lead developer subsequently became director consultant green lane security also consults surevine became director open rights group october 2011 muffett blogs professionally computer world unscrewing security personally dropsafe numerous publications credit besides frequent presenter technical conferences muffett co-inventor darren moffat casper dik patent method apparatus implementing pluggable password obscuring mechanism united states patent 7,249,260 issued june 12 2003 2015 muffett named one top 6 influential security thinkers sc magazine october year coauthored rfc 7686 .onion special-use domain name jacob applebaum recently muffett assisted new york times creation tor onion site following created onion wikipedia site accessible tor previously muffett worked software engineer facebook leading team added end-to-end encryption facebook messenger currently works principal engineer infrastructure security deliveroo
[ 3937, 8554, 8612, 9665 ]
Test
8,153
3
Linux_Kernel_Library:linux kernel library linux kernel library project started octavian purdila university politehnica bucharest ixia sponsored laboratories ixlabs project goal use linux kernel linkable library non-static functions kernel called external program first application use lkl lklftpd ftp daemon serves files disk images containing file system supported linux kernel
[ 7364, 11221 ]
None
8,154
1
IBM_Spufi:ibm spufi sql processor using file input database facility invented ibm interfacing db2 system accessed within tso ispf db2i primary option menu spufi allows direct input sql commands tso environment rather embedded within program set spufi defaults unlikely changed values similar across installations typical example shown although essentially interactive tool spufi operates using pair datasets dataset z/os equivalent file operating systems main spufi screen one specifies input dataset output dataset specified reused repeatedly user moves main screen standard ispf editor opened input dataset point user enter required sql statements using familiar editor exiting editor main spufi screen reappears user moves time contents input dataset executed results placed output dataset ispf editor opened read-only browse mode output user reads results interactive use spufi continues around steps summary cycle spufi uses normal datasets commands output possible pre-populate commands operate output accessing datasets independently spufi tool using datasets also means possibly-complicated set sql commands persist session session rather lost user exits tool simple query comments typical result type query output dataset contains resultant rows case select along additional details like number rows affected sql query sqlcode returned execution sql query case sql errors details error given db2 developer guide craig mullins sams publishing
[ 2089, 909, 10413, 2901, 5562, 3323 ]
None
8,155
4
Peter_G._Neumann:peter g. neumann peter gabriel neumann born 1932 computer-science researcher worked multics operating system 1960s edits risks digest columns acm software engineering notes communications acm founded acm sigsoft fellow acm ieee aaas 1950 1958 neumann studied harvard university 1961 granted ph.d. completing fulbright scholarship germany 1958–1960 student harvard two-hour breakfast albert einstein 8 november 1952 discussing simplicity design neumann worked bell labs 1960 1970 worked sri international menlo park california since 1971 risks mailing list neumann best known provably secure operating system psos neumann worked dorothy e. denning 1980s develop computer intrusion detection system known ides model later computer security software neumann long served moderator risks digest member accurate project neumann founding editor acm software engineering notes sen fellow acm
[ 7107, 9283, 10372, 3694, 5492, 6772, 1783, 5245, 2558 ]
Validation
8,156
4
Mastering_the_Internet:mastering internet mastering internet mti mass surveillance project led british communications intelligence agency government communications headquarters gchq budgeted £1 billion according reports register sunday times early may 2009 contracts total value £200m already awarded suppliers responding reports gchq issued press release countering claims mass surveillance stating gchq developing technology enable monitoring internet use phone calls britain target everyone uk however 2013 mass surveillance disclosures revealed gchq gathers raw information without filtering communications british citizens web part mastering internet programme mastering internet mti project british government part interception modernisation programme imp system described 2009 register sunday times replacement scrapped plans single central database involving thousands dpi black boxes various internet service providers association gchq base cheltenham funded single intelligence account budget £1.6 bn including £200m contract lockheed martin contract bae systems detica 2013 system capable copying signals 200 fibre-optic cables physical points entry great britain early 2007 john adams chief canada intelligence agency communications security establishment told parliament canada plans five eyes master internet cooperation nsa allies 2013 guardian provided specific details financial contributions made u.s. national security agency nsa mastering internet part five eyes alliance several english-speaking western democracies according documents leaked edward snowden nsa paid gchq £17.2 million towards running programme
[ 3495, 4937, 1930, 7887, 1169, 10417, 4595, 7893, 8567 ]
Test
8,157
2
Nat_Friedman:nat friedman nathaniel dourif friedman born august 6 1977 american technology executive 1996 freshman massachusetts institute technology friedman befriended miguel de icaza linuxnet irc network friedman created discuss linux intern microsoft friedman worked iis web server mit studied computer science mathematics graduated bachelor science 1999 friedman co-founded ximian originally called international gnome support helix code de icaza develop applications infrastructure gnome project de icaza started aim producing free software desktop environment company later bought novell 2003 novell friedman chief technology strategy officer open source january 2010 launched hula project began release components novell netmail open source tenure novell began effort migrate 6,000 employees away microsoft windows suse linux microsoft office openoffice.org friedman final project departure work suse studio sabbatical friedman created hosted podcast called hacker medley may 2011 friedman de icaza together founded xamarin friedman made ceo company created offer commercial support mono project de icaza initiated ximian provide free software implementation microsoft .net software stack xamarin focused continuing develop mono monodevelop marketing cross-platform xamarin sdk developers targeting mobile computing devices video game consoles 2016 friedman became employee microsoft upon acquisition xamarin rose position corporate vice president developer services june 2018 announcement microsoft 7.5 billion acquisition github companies simultaneously announced friedman would become github new ceo github co-founder then-current ceo chris wanstrath leading search wanstrath replacement since august 2017 friedman assumed role ceo 29th october 2018
[ 225, 5612, 6797, 3791, 1328, 4402, 2387, 3573, 11221, 823, 7450, 4439 ]
Test
8,158
9
JDOM:jdom jdom open-source java-based document object model xml designed specifically java platform take advantage language features jdom integrates document object model dom simple api xml sax supports xpath xslt uses external parsers build documents jdom developed jason hunter brett mclaughlin starting march 2000 part java community process jsr 102 though effort since abandoned suppose file foo.xml contains xml document one parse xml file tree java objects jdom like case want create document object file input stream create document object element converse one construct tree elements generate xml file following example
[ 4960, 8262, 5612, 5677, 7983, 502, 479 ]
Test
8,159
2
Active_Directory_Federation_Services:active directory federation services active directory federation services ad fs software component developed microsoft run windows server operating systems provide users single sign-on access systems applications located across organizational boundaries uses claims-based access-control authorization model maintain application security implement federated identity claims-based authentication involves authenticating user based set claims user identity contained trusted token token often issued signed entity able authenticate user means trusted entity claims-based authentication part active directory services ad fs identity federation established two organizations establishing trust two security realms federation server one side accounts side authenticates user standard means active directory domain services issues token containing series claims user including identity side resources side another federation server validates token issues another token local servers accept claimed identity allows system provide controlled access resources services user belongs another security realm without requiring user authenticate directly system without two systems sharing database user identities passwords practice user might typically perceive approach follows ad fs integrates active directory domain services using identity provider ad fs interact ws-* saml 2.0-compliant federation services federation partners
[ 929, 8227, 3303, 4074, 8174, 756, 820, 4505, 90, 6811 ]
Test
8,160
5
Orthogonal_frequency-division_multiplexing:orthogonal frequency-division multiplexing telecommunications orthogonal frequency-division multiplexing ofdm method encoding digital data multiple carrier frequencies ofdm developed popular scheme wideband digital communication used applications digital television audio broadcasting dsl internet access wireless networks power line networks 4g mobile communications coded orthogonal frequency-division multiplexing cofdm forward error correction convolutional coding time/frequency interleaving applied signal transmitted done overcome errors mobile communication channels affected multipath propagation doppler effects cofdm introduced alard 1986 digital audio broadcasting eureka project 147 practice ofdm become used combination coding interleaving terms cofdm ofdm co-apply common applications ofdm frequency-division multiplexing fdm scheme used digital multi-carrier modulation method ofdm introduced chang bell labs 1966 numerous closely spaced orthogonal subcarrier signals overlapping spectra emitted carry data demodulation based fast fourier transform algorithms ofdm improved weinstein ebert 1971 introduction guard interval providing better orthogonality transmission channels affected multipath propagation subcarrier signal modulated conventional modulation scheme quadrature amplitude modulation phase-shift keying low symbol rate maintains total data rates similar conventional single-carrier modulation schemes bandwidth main advantage ofdm single-carrier schemes ability cope severe channel conditions example attenuation high frequencies long copper wire narrowband interference frequency-selective fading due multipath without complex equalization filters channel equalization simplified ofdm may viewed using many slowly modulated narrowband signals rather one rapidly modulated wideband signal low symbol rate makes use guard interval symbols affordable making possible eliminate intersymbol interference isi use echoes time-spreading analog television visible ghosting blurring respectively achieve diversity gain i.e signal-to-noise ratio improvement mechanism also facilitates design single frequency networks sfns several adjacent transmitters send signal simultaneously frequency signals multiple distant transmitters may re-combined constructively sparing interference traditional single-carrier system following list summary existing ofdm-based standards products details see usage section end article ofdm-based multiple access technology ofdma also used several 4g pre-4g cellular networks mobile broadband standards next generation wlan advantages disadvantages listed discussed characteristics principles operation section conceptually ofdm specialized frequency-division multiplexing fdm method additional constraint subcarrier signals within communication channel orthogonal one another ofdm subcarrier frequencies chosen subcarriers orthogonal meaning cross-talk sub-channels eliminated inter-carrier guard bands required greatly simplifies design transmitter receiver unlike conventional fdm separate filter sub-channel required orthogonality requires subcarrier spacing formula_1 hertz seconds useful symbol duration receiver-side window size k positive integer typically equal 1 stipulates carrier frequency undergoes k complete cycles per symbol period previous carrier therefore n subcarriers total passband bandwidth b ≈ n ·δ f hz orthogonality also allows high spectral efficiency total symbol rate near nyquist rate equivalent baseband signal i.e near half nyquist rate double-side band physical passband signal almost whole available frequency band used ofdm generally nearly 'white spectrum giving benign electromagnetic interference properties respect co-channel users ofdm requires accurate frequency synchronization receiver transmitter frequency deviation subcarriers longer orthogonal causing inter-carrier interference ici i.e. cross-talk subcarriers frequency offsets typically caused mismatched transmitter receiver oscillators doppler shift due movement doppler shift alone may compensated receiver situation worsened combined multipath reflections appear various frequency offsets much harder correct effect typically worsens speed increases important factor limiting use ofdm high-speed vehicles order mitigate ici scenarios one shape subcarrier order minimize interference resulting non-orthogonal subcarriers overlapping example low-complexity scheme referred wcp-ofdm weighted cyclic prefix orthogonal frequency-division multiplexing consists using short filters transmitter output order perform potentially non-rectangular pulse shaping near perfect reconstruction using single-tap per subcarrier equalization ici suppression techniques usually increase drastically receiver complexity orthogonality allows efficient modulator demodulator implementation using fft algorithm receiver side inverse fft sender side although principles benefits known since 1960s ofdm popular wideband communications today way low-cost digital signal processing components efficiently calculate fft time compute inverse-fft fft transform take less time symbol example dvb-t means computation done less -point fft may approximated computational demand approximately scales linearly fft size double size fft needs double amount time vice versa comparison intel pentium iii cpu 1.266 ghz able calculate fft using fftw intel pentium 1.6 ghz intel core duo 3.0 ghz one key principle ofdm since low symbol rate modulation schemes i.e. symbols relatively long compared channel time characteristics suffer less intersymbol interference caused multipath propagation advantageous transmit number low-rate streams parallel instead single high-rate stream since duration symbol long feasible insert guard interval ofdm symbols thus eliminating intersymbol interference guard interval also eliminates need pulse-shaping filter reduces sensitivity time synchronization problems cyclic prefix transmitted guard interval consists end ofdm symbol copied guard interval guard interval transmitted followed ofdm symbol reason guard interval consists copy end ofdm symbol receiver integrate integer number sinusoid cycles multipaths performs ofdm demodulation fft standards ultrawideband interest transmitted power cyclic prefix skipped nothing sent guard interval receiver mimic cyclic prefix functionality copying end part ofdm symbol adding beginning portion effects frequency-selective channel conditions example fading caused multipath propagation considered constant flat ofdm sub-channel sub-channel sufficiently narrow-banded i.e. number sub-channels sufficiently large makes frequency domain equalization possible receiver far simpler time-domain equalization used conventional single-carrier modulation ofdm equalizer multiply detected subcarrier fourier coefficient ofdm symbol constant complex number rarely changed value fundamental level simpler digital equalizers better require fewer operations translates fewer round-off errors equalizer round-off errors viewed numerical noise inevitable differential modulation dpsk dqpsk applied subcarrier equalization completely omitted since non-coherent schemes insensitive slowly changing amplitude phase distortion sense improvements fir equalization using ffts partial ffts leads mathematically closer ofdm ofdm technique easier understand implement sub-channels independently adapted ways varying equalization coefficients switching different qam constellation patterns error-correction schemes match individual sub-channel noise interference characteristics subcarriers ofdm symbols may carry pilot signals measurement channel conditions i.e. equalizer gain phase shift subcarrier pilot signals training symbols preambles may also used time synchronization avoid intersymbol interference isi frequency synchronization avoid inter-carrier interference ici caused doppler shift ofdm initially used wired stationary wireless communications however increasing number applications operating highly mobile environments effect dispersive fading caused combination multi-path propagation doppler shift significant last decade research done equalize ofdm transmission doubly selective channels ofdm invariably used conjunction channel coding forward error correction almost always uses frequency and/or time interleaving frequency subcarrier interleaving increases resistance frequency-selective channel conditions fading example part channel bandwidth fades frequency interleaving ensures bit errors would result subcarriers faded part bandwidth spread bit-stream rather concentrated similarly time interleaving ensures bits originally close together bit-stream transmitted far apart time thus mitigating severe fading would happen travelling high speed however time interleaving little benefit slowly fading channels stationary reception frequency interleaving offers little benefit narrowband channels suffer flat-fading whole channel bandwidth fades time reason interleaving used ofdm attempt spread errors bit-stream presented error correction decoder decoders presented high concentration errors decoder unable correct bit errors burst uncorrected errors occurs similar design audio data encoding makes compact disc cd playback robust classical type error correction coding used ofdm-based systems convolutional coding often concatenated reed-solomon coding usually additional interleaving top time frequency interleaving mentioned two layers coding implemented choice reed-solomon coding outer error correction code based observation viterbi decoder used inner convolutional decoding produces short error bursts high concentration errors reed-solomon codes inherently well suited correcting bursts errors newer systems however usually adopt near-optimal types error correction codes use turbo decoding principle decoder iterates towards desired solution examples error correction coding types include turbo codes ldpc codes perform close shannon limit additive white gaussian noise awgn channel systems implemented codes concatenated either reed-solomon example mediaflo system bch codes dvb-s2 system improve upon error floor inherent codes high signal-to-noise ratios resilience severe channel conditions enhanced information channel sent return-channel based feedback information adaptive modulation channel coding power allocation may applied across subcarriers individually subcarrier latter case particular range frequencies suffers interference attenuation carriers within range disabled made run slower applying robust modulation error coding subcarriers term dmt denotes ofdm-based communication systems adapt transmission channel conditions individually subcarrier means so-called bit-loading examples adsl vdsl upstream downstream speeds varied allocating either fewer carriers purpose forms rate-adaptive dsl use feature real time bitrate adapted co-channel interference bandwidth allocated whichever subscriber needs ofdm primary form considered digital modulation technique multi-user channel access method since used transferring one bit stream one communication channel using one sequence ofdm symbols however ofdm combined multiple access using time frequency coding separation users orthogonal frequency-division multiple access ofdma frequency-division multiple access achieved assigning different ofdm sub-channels different users ofdma supports differentiated quality service assigning different number subcarriers different users similar fashion cdma thus complex packet scheduling media access control schemes avoided ofdma used ofdma also candidate access method ieee 802.22 wireless regional area networks wran project aims designing first cognitive radio-based standard operating vhf-low uhf spectrum tv spectrum multi-carrier code division multiple access mc-cdma also known ofdm-cdma ofdm combined cdma spread spectrum communication coding separation users co-channel interference mitigated meaning manual fixed channel allocation fca frequency planning simplified complex dynamic channel allocation dca schemes avoided ofdm-based wide-area broadcasting receivers benefit receiving signals several spatially dispersed transmitters simultaneously since transmitters destructively interfere limited number subcarriers whereas general actually reinforce coverage wide area beneficial many countries permits operation national single-frequency networks sfn many transmitters send signal simultaneously channel frequency sfns use available spectrum effectively conventional multi-frequency broadcast networks mfn program content replicated different carrier frequencies sfns also result diversity gain receivers situated midway transmitters coverage area increased outage probability decreased comparison mfn due increased received signal strength averaged subcarriers although guard interval contains redundant data means reduces capacity ofdm-based systems broadcasting systems deliberately use long guard interval order allow transmitters spaced farther apart sfn longer guard intervals allow larger sfn cell-sizes rule thumb maximum distance transmitters sfn equal distance signal travels guard interval — instance guard interval 200 microseconds would allow transmitters spaced 60 km apart single frequency network form transmitter macrodiversity concept used dynamic single-frequency networks dsfn sfn grouping changed timeslot timeslot ofdm may combined forms space diversity example antenna arrays mimo channels done ieee 802.11 wireless lan standards ofdm signal exhibits high peak-to-average power ratio papr independent phases subcarriers mean often combine constructively handling high papr requires non-linearity signal chain cause intermodulation distortion linearity requirement demanding especially transmitter rf output circuitry amplifiers often designed non-linear order minimise power consumption practical ofdm systems small amount peak clipping allowed limit papr judicious trade-off consequences however transmitter output filter required reduce out-of-band spurs legal levels effect restoring peak levels clipped clipping effective way reduce papr although spectral efficiency ofdm attractive terrestrial space communications high papr requirements far limited ofdm applications terrestrial systems crest factor cf db ofdm system n uncorrelated subcarriers cf crest factor db subcarrier cf 3.01 db sine waves used bpsk qpsk modulation example dvb-t signal 2k mode composed 1705 subcarriers qpsk-modulated giving crest factor 35.32 db many crest factor reduction techniques developed dynamic range required fm receiver dab require comparison extra bit per sample increases dynamic range performance communication system measured terms power efficiency bandwidth efficiency power efficiency describes ability communication system preserve bit error rate ber transmitted signal low power levels bandwidth efficiency reflects efficiently allocated bandwidth used defined throughput data rate per hertz given bandwidth large number subcarriers used bandwidth efficiency multicarrier system ofdm using optical fiber channel defined factor 2 two polarization states fiber formula_9 symbol rate giga symbol per second gsps formula_10 bandwidth ofdm signal saving bandwidth using multicarrier modulation orthogonal frequency division multiplexing bandwidth multicarrier system less comparison single carrier system hence bandwidth efficiency multicarrier system larger single carrier system 1 dbm increase receiver power get 76.7 improvement bandwidth efficiency using multicarrier transmission technique section describes simple idealized ofdm system model suitable time-invariant awgn channel ofdm carrier signal sum number orthogonal subcarriers baseband data subcarrier independently modulated commonly using type quadrature amplitude modulation qam phase-shift keying psk composite baseband signal typically used modulate main rf carrier formula_11 serial stream binary digits inverse multiplexing first demultiplexed formula_12 parallel streams one mapped possibly complex symbol stream using modulation constellation qam psk etc. note constellations may different streams may carry higher bit-rate others inverse fft computed set symbols giving set complex time-domain samples samples quadrature-mixed passband standard way real imaginary components first converted analogue domain using digital-to-analogue converters dacs analogue signals used modulate cosine sine waves carrier frequency formula_13 respectively signals summed give transmission signal formula_14 receiver picks signal formula_15 quadrature-mixed baseband using cosine sine waves carrier frequency also creates signals centered formula_16 low-pass filters used reject baseband signals sampled digitised using analog-to-digital converters adcs forward fft used convert back frequency domain returns formula_12 parallel streams converted binary stream using appropriate symbol detector streams re-combined serial stream formula_18 estimate original binary stream transmitter formula_12 subcarriers used subcarrier modulated using formula_20 alternative symbols ofdm symbol alphabet consists formula_21 combined symbols low-pass equivalent ofdm signal expressed formula_23 data symbols formula_12 number subcarriers formula_25 ofdm symbol time subcarrier spacing formula_26 makes orthogonal symbol period property expressed formula_28 denotes complex conjugate operator formula_29 kronecker delta avoid intersymbol interference multipath fading channels guard interval length formula_30 inserted prior ofdm block interval cyclic prefix transmitted signal interval formula_31 equals signal interval formula_32 ofdm signal cyclic prefix thus low-pass signal either real complex-valued real-valued low-pass equivalent signals typically transmitted baseband—wireline applications dsl use approach wireless applications low-pass signal typically complex-valued case transmitted signal up-converted carrier frequency formula_13 general transmitted signal represented ofdm used key features common ofdm-based systems presented following table ofdm used adsl connections follow ansi t1.413 g.dmt itu g.992.1 standards called discrete multitone modulation dmt dsl achieves high-speed data connections existing copper wires ofdm also used successor standards adsl2 adsl2+ vdsl vdsl2 g.fast adsl2 uses variable subcarrier modulation ranging bpsk 32768qam adsl terminology referred bit-loading bit per tone 1 15 bits per subcarrier long copper wires suffer attenuation high frequencies fact ofdm cope frequency selective attenuation narrow-band interference main reasons frequently used applications adsl modems ofdm used many powerline devices extend digital connections power wiring adaptive modulation particularly important noisy channel electrical wiring medium speed smart metering modems prime g3 use ofdm modest frequencies 30–100 khz modest numbers channels several hundred order overcome intersymbol interference power line environment ieee 1901 standards include two incompatible physical layers use ofdm itu-t g.hn standard provides high-speed local area networking existing home wiring power lines phone lines coaxial cables based phy layer specifies ofdm adaptive modulation low-density parity-check ldpc fec code ofdm extensively used wireless lan man applications including ieee 802.11a/g/n wimax ieee 802.11a/g/n operating 2.4 5 ghz bands specifies per-stream airside data rates ranging 6 54 mbit/s devices use ht mode added 802.11n top 20 mhz per-stream rate increased 72.2 mbit/s option data rates 13.5 150 mbit/s using 40 mhz channel four different modulation schemes used bpsk qpsk 16-qam 64-qam along set error correcting rates 1/2–5/6 multitude choices allows system adapt optimum data rate current signal conditions ofdm also used wimedia/ecma-368 standard high-speed wireless personal area networks 3.1–10.6 ghz ultrawideband spectrum see multiband-ofdm much europe asia adopted ofdm terrestrial broadcasting digital television dvb-t dvb-h t-dmb radio eureka 147 dab digital radio mondiale hd radio t-dmb directive european commission television services transmitted viewers european community must use transmission system standardized recognized european standardization body standard developed codified dvb project digital video broadcasting dvb framing structure channel coding modulation digital terrestrial television customarily referred dvb-t standard calls exclusive use cofdm modulation dvb-t widely used europe elsewhere terrestrial digital tv ground segments digital audio radio service sdars systems used xm satellite radio sirius satellite radio transmitted using coded ofdm cofdm word coded comes use forward error correction fec question relative technical merits cofdm versus 8vsb terrestrial digital television subject controversy especially european north american technologists regulators united states rejected several proposals adopt cofdm-based dvb-t system digital television services instead opted 8vsb vestigial sideband modulation operation one major benefits provided cofdm rendering radio broadcasts relatively immune multipath distortion signal fading due atmospheric conditions passing aircraft proponents cofdm argue resists multipath far better 8vsb early 8vsb dtv digital television receivers often difficulty receiving signal also cofdm allows single-frequency networks possible 8vsb however newer 8vsb receivers far better dealing multipath hence difference performance may diminish advances equalizer design cofdm also used radio standards digital audio broadcasting dab standard digital audio broadcasting vhf frequencies digital radio mondiale drm standard digital broadcasting shortwave medium wave frequencies 30 mhz drm+ recently introduced standard digital audio broadcasting vhf frequencies 30 174 mhz usa uses alternate standard proprietary system developed ibiquity dubbed hd radio however uses cofdm underlying broadcast technology add digital audio medium wave fm broadcasts digital radio mondiale hd radio classified in-band on-channel systems unlike eureka 147 dab digital audio broadcasting uses separate vhf uhf frequency bands instead band-segmented transmission orthogonal frequency division multiplexing bst-ofdm system proposed japan isdb-t isdb-tsb isdb-c broadcasting systems improves upon cofdm exploiting fact ofdm carriers may modulated differently others within multiplex forms cofdm already offer kind hierarchical modulation though bst-ofdm intended make flexible 6 mhz television channel may therefore segmented different segments modulated differently used different services possible example send audio service segment includes segment composed number carriers data service another segment television service yet another segment—all within 6 mhz television channel furthermore may modulated different parameters example audio data services could optimized mobile reception television service optimized stationary reception high-multipath environment ultra-wideband uwb wireless personal area network technology may also use ofdm multiband ofdm mb-ofdm uwb specification advocated wimedia alliance formerly multiband ofdm alliance mboa wimedia alliance two merged one competing uwb radio interfaces fast low-latency access seamless handoff orthogonal frequency division multiplexing flash-ofdm also referred f-ofdm based ofdm also specified higher protocol layers developed flarion purchased qualcomm january 2006 flash-ofdm marketed packet-switched cellular bearer compete gsm 3g networks example 450 mhz frequency bands previously used nmt-450 c-net c450 1g analogue networks mostly decommissioned europe licensed flash-ofdm operators finland license holder digita began deployment nationwide 450 wireless network parts country since april 2007 purchased datame 2011 february 2012 datame announced would upgrade 450 mhz network competing cdma2000 technology slovak telekom slovakia offers flash-ofdm connections maximum downstream speed 5.3 mbit/s maximum upstream speed 1.8 mbit/s coverage 70 percent slovak population flash-ofdm network switched majority slovakia 30 september 2015 t-mobile germany used flash-ofdm backhaul wi-fi hotspots deutsche bahn ice high speed trains 2005 2015 switching umts lte american wireless carrier nextel communications field tested wireless broadband network technologies including flash-ofdm 2005 sprint purchased carrier 2006 decided deploy mobile version wimax based scalable orthogonal frequency division multiple access sofdma technology citizens telephone cooperative launched mobile broadband service based flash-ofdm technology subscribers parts virginia march 2006 maximum speed available 1.5 mbit/s service discontinued april 30 2009 ofdm become interesting technique power line communications plc area research wavelet transform introduced replace dft method creating orthogonal frequencies due advantages wavelets offer particularly useful noisy power lines instead using idft create sender signal wavelet ofdm uses synthesis bank consisting formula_36-band transmultiplexer followed transform function receiver side analysis bank used demodulate signal bank contains inverse transform followed another formula_36-band transmultiplexer relationship transform functions example w-ofdm uses perfect reconstruction cosine modulated filter bank pr-cmfb extended lapped transform elt used wavelet tf thus formula_42 formula_43 given two functions respective inverses used modulate demodulate given input sequence case dft wavelet transform creates orthogonal waves formula_47 formula_48 ... formula_49 orthogonality ensures interfere sent simultaneously receiver formula_50 formula_51 ... formula_52 used reconstruct data sequence w-ofdm evolution standard ofdm certain advantages mainly sidelobe levels w-ofdm lower results less ici well greater robustness narrowband interference two properties especially useful plc lines n't shielded em-noise creates noisy channels noise spikes comparison two modulation techniques also reveals complexity algorithms remains approximately
[ 4609, 9863, 9098, 10381, 1550, 7698, 2968, 8600, 5020, 5664, 11686, 2994, 5304, 1977, 7490, 3140, 7108, 7498, 9038, 4691, 3040, 1121, 2920, 361, 7400, 5497 ]
Test
8,161
2
Windows_Driver_Model:windows driver model computing windows driver model wdm also known one point win32 driver model framework device drivers introduced windows 98 windows 2000 replace vxd used older versions windows windows 95 windows 3.1 well windows nt driver model wdm drivers layered stack communicate via i/o request packets irps microsoft windows driver model unified driver models windows 9x windows nt product lines standardizing requirements reducing amount code needed written wdm drivers run operating systems earlier windows 98 windows 2000 windows 95 windows nt 4.0 windows 3.1 conforming wdm drivers binary compatible source-compatible across windows 98 windows 98 second edition windows windows 2000 windows xp windows server 2003 windows vista backwards compatibility x86-based computers wdm drivers designed forward-compatible wdm driver run version windows newer driver initially written would mean driver take advantage new features introduced new version wdm generally backward-compatible wdm driver guaranteed run older version windows example windows xp use driver written windows 2000 make use new wdm features introduced windows xp however driver written windows xp may may load windows 2000 wdm exists intermediary layer windows 2000 kernel-mode drivers introduced increase functionality ease writing drivers windows although wdm mainly designed binary source compatible windows 98 windows 2000 may always desired specific drivers developed either operating system windows drivers model wdm devices microsoft implements approach kernel mode drivers unique windows operating systems wdm implements layered architecture device drivers every device computer served stack drivers however every driver stack chain isolate hardware independent features driver beneath drivers stack need interact directly one another wdm defines architecture device procedures range devices display network card known network driver interface specification ndis ndis architecture layered network drivers include lower-level drivers manage hardware upper-level drivers implement network data transport transmission control protocol tcp wdm defines three types device drivers driver stacks given device contain types device drivers three wdm device driver types bus driver every bus mainboard one bus driver primary responsibility identification devices connected bus responding plug play events microsoft provide bus drivers part operating system pci pnpisa scsi usb firewire function driver principal driver device provides operational interface device handling read write operations function drivers written device vendors interaction hardware depend specific bus driver present windows operating system filter driver driver optional modify behaviour device input output requests drivers implemented lower-level upper-level filter drivers function drivers bus drivers often implemented driver/minidriver pairs practice either class/miniclass port/miniport pair bus drivers devices attached bus implemented class drivers hardware-agnostic support operations certain type device windows operating systems include number class drivers kbdclass.sys driver keyboards miniclass drivers hand supplied vendor device support device specific operations particular device given class port drivers support general input/output i/o operations peripheral hardware interface core functionality port drivers mandated operating system windows operating systems integrate variety port drivers example i8042prt.sys port driver 8042 microcontroller connects ps/2 keyboards mainboard peripheral bus miniport drivers like miniclass drivers supplied hardware vendors support device specific operations peripheral hardware connected port mainboard driver processes i/o request device corresponding object loaded main memory device object created windows operating system associated device class device objects contain structures type device_object store pointers driver run time pointers used locate driver dispatch routine member functions wdm driver stack filter driver device object known upper filter receive i/o request packet irp device i/o manager upper filter driver serve request locate object driver one step driver stack irp passed driver stack calling function iocalldrive processed function driver device object also known functional device object function driver device object turn may pass irp lower filter another filter device object irp may passed bus driver operates physical device object bus driver object bottom driver stack interacts hardware abstraction layer part windows operating system kernel allows windows operating systems run variety processors different memory management unit architectures variety computer systems different i/o bus architectures execution irp finished driver objects stack returns request back i/o manager result status flag wdm framework developed microsoft simplify communication operating system drivers inside kernel windows operating systems drivers implemented dynamic link libraries .dll .sys files wdm compliant drivers must follow rules design initialisation plug-and-play power management memory allocation practice wdm driver programmers reuse large pieces code building new object orientated drivers means drivers wdm stack may contain residual functionality documented specifications drivers passed microsoft quality test digitally signed microsoft microsoft hardware compatibility tests driver development kit include reliability stress tests device driver designed specific hardware component may allow another device function basic functionality hardware device class similar functionality video card class example allows microsoft basic display adapter driver work wide variety video cards however installing wrong driver device mean full functionality device used may result poor performance destabilization windows operating system hardware device vendors may release updated device drivers particular windows operating systems improve performance add functionality fix bugs device working expected latest device drivers downloaded vendor website installed device drivers designed particular windows operating system versions device drivers previous version windows may work correctly versions many device drivers run kernel mode installing drivers previous operating system version may destabilise windows operating system migrating computer higher version windows operating system therefore requires new device drivers installed hardware components finding date device drivers installing windows 10 introduced complications migration process common device driver compatibility issues include 32-bit device driver required 32-bit windows operating system 64-bit device driver required 64-bit windows operating system 64-bit device drivers must signed microsoft run kernel mode unrestricted access computer hardware operating systems prior windows 10 microsoft allowed vendors sign 64-bit drivers assuming vendors undertaken compatibility tests however windows 10 64-bit drivers need signed microsoft therefore device vendors submit drivers microsoft testing approval driver installation package includes files .inf directory files package need installed otherwise installation device driver may fail operating system versions windows 10 files necessary driver installation included package requirement consistently enforced device driver installers user interface gui often requiring user configuration input absence user interface mean installation device driver successful besides windows 10 device drivers allowed include user interface network driver interface specification ndis 10.x used network devices windows 10 operating system network device drivers windows xp use ndis 5.x may work subsequent windows operating systems performance reasons network device drivers implement ndis 6.0 higher similarly wddm driver model windows vista replaces xpdm used graphics drivers device manager control panel applet microsoft windows operating systems allows users view control hardware attached computer allows users view modify hardware device properties also primary tool manager device drivers windows driver model significant improvement vxd windows nt driver model used criticised driver software developers significantly following also number concerns quality documentation samples microsoft provided issues microsoft released new set frameworks top wdm called windows driver frameworks wdf formerly windows driver foundation includes kernel-mode driver framework kmdf user-mode driver framework umdf windows vista supports pure wdm newer wdf kmdf also available download windows xp even windows 2000 umdf available windows xp
[ 10243, 10769, 9234, 1043, 1055, 2083, 8227, 3109, 1577, 4143, 9263, 3122, 11316, 1077, 6709, 8246, 4174, 4178, 83, 9813, 603, 608, 2145, 5225, 10359, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 5259, 653, 6797, 10900, 10902, 11414, 3...
Validation
8,162
9
SimulationX:simulationx simulationx cae software application running microsoft windows physical simulation technical systems developed sold esi iti gmbh dresden germany mid 1980s veb mikromat dresden developed program dos design controlled feed axis systems perform hydraulic calculations 1993 iti gmbh founded former mikromat employees 1990 introduced simulation tool microsoft windows designed dynamic calculations drive systems iti-sim 1 release iti-sim 2 1995 software also allowed fluid simulations 2002 newly developed application simulationx based object-oriented description language modelica introduced market year 2007 iti-sim version 3.8 completely replaced simulationx since beginning 2016 iti belongs esi group operates name esi iti gmbh simulation models created basis discrete network approach means system broken logical parts linked specific connections sub-systems represented preconfigured custom model elements organized domain-specific custom model libraries sub-models parameterized connected models created either graphical user interface using modelica command lines model libraries obtained modular packages software producer various libraries available basic models corresponding physical domains well libraries advanced models specific applications industries depending objective user choose 1d 2d 3d model elements respect modeling simulation parameterization requirements modelica-based third-party custom-built libraries also integrated simulationx simulationx libraries include simulationx supports modelica modeling language simulate individually created realistic sub- models models modelica standard library ones purely based modelica language definition executed simulationx provides open comprehensive cax-interfaces external programs different purposes applications e.g cae vehiclesim carsim bikesim trucksim cad solid edge unigraphics nx solidworks creo elements/pro autodesk inventor catia v5 cam computer-aided optimization e.g isight modefrontier optimus optislang optiy fea/fem abaqus ansys comsol multiphysics msc nastran cfd co-simulation provides general interface used link simulationx cae tools predefined setups particular realizations msc.adams simpack matlab/simulink fluent cadmould etc. coupling ensures data exchange tools simulation software tools holistic structural system analysis equilibrium computation natural frequencies vibration modes input-output analysis linking simulation model databases available com interface allows communication simulationx windows applications user-defined batch runs embedded simulation parameter studies optimizations code-export features support generation c source code seamless model integration hardware-in-the-loop hil applications rapid control prototyping functional mock-up virtual machine throughout stages modern system design processes engineers scientists work variety seamlessly integrated tools connection simulationx real-time testing simulation platforms labview ni veristand dspace etas labcar scale-rt heavily increases productivity design cycle shortens time-to-market new products simulationx supports creation import functional mock-up units defined functional mock-up interface standard development started modelisar project standardized interfaces facilitate platform-independent exchange simulation models increase flexibility connection external simulation tools models simulationx used designing modeling analyzing dynamic behavior complex mechatronic systems well virtual tests many industries research education including automotive sector railway shipbuilding heavy machinery mining power generation building technology aerospace defense mechanical engineering medical engineering oil gas precision instruments home appliances well consumer electronics simulationx widely used education research worldwide
[ 9376, 5380, 4454, 587, 5356, 6797, 7341, 3567, 7983, 8079, 10764, 2804, 4792, 1917, 7326 ]
None
8,163
3
The_Wizard_of_Oz_(1985_video_game):wizard oz 1985 video game wizard oz illustrated text adventure game developed published windham classics apple ii commodore 64 ms-dos msx 1985 adaptation books wonderful wizard oz marvelous land oz wizard oz positively received press including ii computing ahoy commodore power play
[ 9166, 9006 ]
None
8,164
7
Distributed_Common_Ground_System:distributed common ground system distributed common ground system dcgs system produces military intelligence multiple military branches u.s. air force use system produces intelligence collected u-2 dragonlady rq-4 global hawk mq-9 reaper mq-1 predator previous system similar use deployable ground station dgs first deployed july 1994 subsequent version dgs developed 1995 2009 although officially designated weapons system consists computer hardware software connected together computer network devoted processing dissemination information images 480th intelligence surveillance reconnaissance wing air combat command operates maintains usaf system plan envisioned 1998 develop interoperable systems army navy addition air force 2006 version 10.6 deployed air force version known dcgs-a developed army 2010 report general michael t. flynn program intended use cloud computing easy use ipad soldiers years commonly using april 2011 project manager colonel charles wells announced version 3 army system code named griffin deployed us war afghanistan january 2012 united states army communications-electronics research development engineering center hosted meeting based dcgs-a early experience brought together technology providers hope developing integrated systems using cloud computing open architectures compared previously specialized custom-built systems major contractor lockheed martin computers supplied silicon graphics international chippewa falls wisconsin office software known analyst notebook originally developed i2 limited included dcgs-a ibm acquired i2 2011 us army personnel reported using palantir technologies product improve ability predict locations improvised explosive devices april 2012 report recommending study initial success palantir software rated easy use flexibility wide number data sources dcgs-a july 2012 congressman duncan d. hunter california state palantir based complained us dod obstacles wider use although limited test august 2011 test evaluation command recommended deployment operation problems dcgs-a included baseline system operationally effective reboots average every 8 hours set improvements identified november 2012 press reported shortcomings uncovered general genaro dellarocco tests ambitious goal integrating 473 data sources 75 million reports proved challenging spending estimated 2.3 billion army system alone may 2013 politico reported palantir lobbyists anonymous returning veterans continued advocate use software despite interoperability limits particular members special forces us marines required use official army system similar stories appeared publications army representatives major general mary a. legere citing limitations various systems congressman hunter member house armed services committee required review program two members congress sent open letter secretary defense leon panetta senate defense appropriations subcommittee included testimony army chief staff general ray odierno 130th engineer brigade united states found system unstable slow friendly major hindrance operations equivalent system united states navy planned initial deployment 2015 within shipboard network called consolidated afloat networks enterprise services canes 2016 early testing announced 2009 aboard aircraft carrier portion software distributed data framework dcgs integration backbone dib version 4 submitted open-source software repository codice foundation github framework new dib version 4 replacing legacy dib portal ozone widget framework interface written java programming language distributed common ground system-army dcgs-a united states army primary system post data process information disseminate intelligence surveillance reconnaissance isr information threat weather terrain echelons dcgs-a provides commanders ability task battle-space sensors receive intelligence information multiple sources august 17 2011 upi article quoted i2 chief executive officer robert griffin commented dcgs-a best-of-breed approach development article detailed army contracting i2 analyst notebook software open architecture analyst notebook supports army strategy employ integrate best-of-breed solutions across industry meet dynamic needs users face field daily basis february 1 2012 article army web page quoted mark kitz dcgs-a technical director dcgs-a uses latest cloud technology rapidly gather collaborate share intelligence data multiple sources deliver common operating picture dcgs-a able rapidly adapt changing operational environments leveraging iterative development model open architecture allowing collaboration multiple government industry academic partners july 2012 article signal magazine monthly publication armed forces communications electronics association promoted dcgs-a taking advantage technological environments young soldiers familiar article quoted dcgs-a program manager col. charles wells systems benefits article also included lockheed martin dcgs-a program manager milwaukee journal sentinel published article may 4 2012 wisconsin-located companies helping dcgs-a cloud computing technology article promoted speed cloud computing processes intelligence cost savings analyzing data field u.s. army released 2011 army posture statement march 2 included statement dcgs-a dcgs-a connects tactical operational theater-level commanders hundreds intelligence intelligence-related data sources classification levels allows focus efforts entire isr community information requirements ground commanders describe dcgs-a unwieldy unreliable hard learn difficult use supporting alternative software palantir technologies palantir software supports small unit situational awareness sufficiently funded support broader role dcgs-a fulfills
[ 4194, 6858, 6539, 6419, 11221, 3323 ]
Test
8,165
4
IT_Underground:underground underground one biggest hacking conferences middle east europe series events dedicated information security held warsaw prague 2009 underground organised germany conference focused security aim show participants defend improve security lectures conducted byol bring laptop mode aimed participants brought computers therefore actively participate sessions attendees able boot machines test networks using techniques described lecturers try defend attacks performed others underground website
[ 7449, 5373 ]
None
8,166
1
Dictionary_of_Scottish_Architects:dictionary scottish architects dictionary scottish architects publicly available online database provides biographical information architects known worked scotland 1840 1980 lists works launched 2006 compiled team led professor david walker emeritus professor school art history university st andrews database includes known works architects based scotland scottish works english irish architects included database available free charge managed fully funded historic environment scotland replaced historic scotland 2015
[ 2901 ]
Test
8,167
4
Heap_overflow:heap overflow heap overflow heap overrun type buffer overflow occurs heap data area heap overflows exploitable different manner stack-based overflows memory heap dynamically allocated application run-time typically contains program data exploitation performed corrupting data specific ways cause application overwrite internal structures linked list pointers canonical heap overflow technique overwrites dynamic memory allocation linkage malloc meta data uses resulting pointer exchange overwrite program function pointer typical example older versions linux two buffers allocated next heap writing beyond boundary first buffer allows overwriting meta data second buffer setting in-use bit zero second buffer setting length small negative value allows null bytes copied program calls free first buffer attempt merge two buffers single buffer happens buffer assumed freed expected hold two pointers fd bk first 8 bytes formerly allocated buffer bk gets written fd used overwrite pointer accidental overflow may result data corruption unexpected behavior process uses affected memory area operating systems without memory protection could process system deliberate exploit may result data specific location altered arbitrary way arbitrary code executed example microsoft jpeg gdi+ buffer overflow vulnerability could allow remote execution code affected machine ios jailbreaking often uses heap overflows gain arbitrary code execution usually kernel exploits achieve ability replace kernel one jailbreak provides buffer overflows primarily three ways protect heap overflows several modern operating systems windows linux provide implementation three since version 2.3.6 gnu libc includes protections detect heap overflows fact example checking pointer consistency calling unlink however protections prior exploits almost immediately shown also exploitable addition linux included support aslr since 2005 although pax introduced better implementation years also linux included support nx-bit since 2004 microsoft included protections heap resident buffer overflows since april 2003 windows server 2003 august 2004 windows xp service pack 2 mitigations safe unlinking heap entry header cookies later versions windows vista server 2008 windows 7 include removal commonly targeted data structures heap entry metadata randomization expanded role heap header cookie randomized heap base address function pointer encoding termination heap corruption algorithm variation normal data execution prevention dep aslr also help mitigate attack
[ 928, 1474, 3234, 4836, 7717, 8551, 4074, 939, 6829, 3473, 4562, 4689, 11537, 7734, 1820, 4957 ]
Test
8,168
9
UBot_Studio:ubot studio ubot studio web browser automation tool allows users build scripts complete web-based actions data mining web testing social media marketing scripts created via command window inside ubot studio browser compiled separate executable files “ internet bots ” run computer called “ infrastructural piece botting world ” ubot studio developed seth turin media inc. first released 2009 ubot studio web automation product designed internet marketing automation advanced versions ubot studio contain drag-and-drop user interface designer bots image recognition task scheduler ability automate non web-based applications 2013 company introduced api creation plugins allow addition non-standard functionality software 2015 company released ubot studio stealth new browser using cef framework additional features
[ 5356, 5380, 9780, 7983 ]
Test
8,169
5
Waterfox:waterfox waterfox open-source web browser x64 arm64 systems intended speedy ethical maintain support legacy extensions dropped firefox forked official releases windows including portable version macos linux android waterfox based firefox compiled using various compilers using intel math kernel library streaming simd extensions 3 advanced vector extensions linux builds built clang waterfox continuing support long-standing xul xpcom add-on capability firefox removed version 57 features waterfox currently waterfox first released march 27 2011 64-bit windows mac build introduced may 14 2015 release version 38.0 linux build introduced december 20 2016 release version 50.0 android build first introduced version 55.2.2 version 29.0 released july 22 2015 build ios may 7 2019 68.0a1 first alpha version next generation waterfox released may 12 2015 november 12 2015 waterfox exclusive charity search engine called storm ecosia default search engine bing search engine default one
[ 513, 6657, 9736, 2579, 6171, 2076, 9757, 7713, 10791, 9770, 559, 4661, 3639, 10808, 3643, 9275, 64, 9281, 5707, 10834, 5205, 6231, 8281, 6747, 6237, 1642, 9834, 10860, 9841, 115, 9843, 119, 4728, 637, 1664, 2182, 6791, 6797, 11418, 10910,...
Test
8,170
7
Akamai_Technologies:akamai technologies akamai technologies inc. american content delivery network cdn cloud service provider headquartered cambridge massachusetts united states akamai content delivery network one world largest distributed computing platforms responsible serving 15 30 web traffic company operates network servers around world rents capacity servers customers want websites work faster distributing content locations close user user navigates url akamai customer browser redirected one akamai copies website akamai technologies entered 1998 mit 50k competition business proposition based research consistent hashing selected one finalists august 1998 developed working prototype help jonathan seelig randall kaplan began taking steps incorporate company late 1998 early 1999 group business professionals joined founding team notably paul sagan former president new media time inc. george conrades former chairman chief executive officer bbn corp. senior vice president u.s. operations ibm conrades became chief executive officer akamai april 1999 led company start-up sustained profitability positive free cash-flow turning reins sagan 2005 company launched commercial service april 1999 listed nasdaq stock market october 29 1999 july 1 2001 akamai added russell 3000 index russell 2000 index september 11 2001 co-founder daniel m. lewin died stabbing flight september 11th attacks age 31 lewin aboard american airlines flight 11 first plane crash world trade center 2005 paul sagan named chief executive officer akamai sagan worked differentiate akamai competitors expanding company breadth services leadership company grew 1.37 billion revenues sagan served chief executive officer co-founder current ceo tom leighton elected position 2013 akamai headquarters kendall square started technology square expanded multiple buildings cambridge center consolidating offices purpose-built building 145 broadway late 2019 early 2020 akamai intelligent platform distributed cloud computing platform operates worldwide network 240,000 servers deployed 120 countries servers reside 1,500 world networks gathering real-time information traffic congestion trouble spots akamai server equipped proprietary software uses complex algorithms process requests nearby users serve requested content content delivery process begins user submitting request browser user enters url dns request triggered ip address retrieved ip address browser contact web server directly subsequent requests content delivery network structure domain name url translated mapping system ip address edge server serve content user akamai delivers web content intelligent platform transparently mirroring elements html css software downloads media objects customers servers akamai server automatically picked depending type content user network location receiving content akamai server close user allows faster download times less vulnerability network congestion akamai claims provide better scalability delivering content last-mile servers close end-users avoiding middle-mile bottleneck internet download delivery product line includes http downloads large downloadable objects customizable application consumers analytics tools metrics monitor report download process addition using akamai servers akamai delivers content end-users computers form peer-to-peer networking users request download large files served system prompts download install akamai netsession interface download manager used reduce download time increase quality however software operates merely download manager delivering content internet user computer also peer-to-peer server delivering content cached user computer users computers akamai network operations command center nocc used proactive monitoring troubleshooting servers global akamai network nocc provides real time statistics akamai web traffic traffic metrics update automatically provide view internet traffic conditions akamai servers customer websites state internet report quarterly report akamai releases based data gathered intelligent platform provides global internet statistics connection speed broadband adoption attack traffic network connectivity mobile connectivity akamai ’ data visualization tools display data moving across internet real-time viewers able see global web conditions malicious attack traffic internet connectivity addition net usage indices monitor global news consumption industry specific traffic mobile trends akamai also offers internet visualization application allows users view real-time data mobile device october 9 2013 akamai announced open initiative 2013 akamai edge conference open allows customers partners develop customize way interact akamai intelligent platform key components open include system development operations integration real-time big data integration single-point user interface akamai technologies owns 60 domains primary domains uses include july 21 1999 macworld expo new york apple akamai announced strategic partnership build apple new media network quicktime tv qtv based quicktime streaming server companies later announced apple made 12.5 million investment company previous month apple continues use akamai primary content delivery network wide range applications including software downloads apple website quicktime movie trailers itunes store september 1999 microsoft akamai formed strategic relationship incorporate windows media technology akamai freeflow service well facilitate porting freeflow product windows platform relationship exists day microsoft azure offers akamai along verizon options standard cdn service arabic news network al-jazeera customer march 28 2003 april 2 2003 akamai decided end relationship network english-language managing editor claimed due political pressure june 2008 newsmarket teamed akamai accelerate dynamic content applications global media ahead beijing olympics bbc iplayer uses akamai stream recorded live programs focused xml playlist entire china central television website cctv.com including streaming video hosted akamai edge servers since late 2009 hulu uses akamai hosting video mit opencourseware utilizes akamai edgesuite content delivery network trend micro uses akamai housecall antivirus application valve corporation steam software service uses akamai content delivery network storing screenshots icons uploaded users akamai provided streaming services espn star india course icc cricket world cup 2011 rackspace cloud files use akamai content delivery network cdn storing customer files customers include adobe systems airbnb amd autotrader.com cos espn great courses hewlett-packard hilton worldwide ibm j. c. penney mtv networks nasa national academy recording arts sciences nbc sports pearson education red bull gmbh red hat sony playstation yahoo august 2017 nintendo launched new game console mobile gaming application simultaneously around world via akamai media delivery solutions one akamai patents covers method delivering electronic data using content delivery network internet web site proprietors content providers contract akamai deliver web sites content individual internet users patented method permits large files video music files stored akamai servers accessed servers internet users increases speed internet users access content web sites unfortunately akamai patent written way called permitted actions multiple persons entities—such content provider customer company providing cdn service akamai competitor limelight chose operate allegedly infringing service manner—it performed steps patented process customers performed so-called tagging step interpretation patent law time akamai decided sue limelight patent infringement method patent could held infringed single actor performed steps court therefore overturned 40 million jury verdict akamai favor akamai initially lost case even taking supreme court supreme court returned case united states court appeals federal circuit however invitation re-evaluate rule chose steps method performed single actor infringement remand federal circuit considered matter en banc active judges circuit modified rule held patent could also directly infringed alleged infringer conditions participation activity receipt benefit upon performance step steps patented method establishes manner timing performance basis federal circuit reinstated 40 million jury verdict said akamai presented substantial evidence demonstrating limelight conditions customers use content delivery network upon customers performance steps limelight perform considered substantial change patent law discussion case see akamai techs. inc. v. limelight networks inc. national security agency federal bureau investigation reportedly used facebook akamai content delivery network cdn collect information facebook users report appears show intelligence analysts intercepting communications facebook cdn provider indicate akamai complicit process according researchers universities cambridge california-berkeley university college london international computer science institute-berkeley akamai blocking access web sites visitors using tor feature known 'network lists optional implemented customers akamai legitimate feature common many major vendors provide network security feeds emerging threats provides feed free
[ 10755, 9732, 517, 1541, 1549, 7697, 19, 11289, 8735, 3112, 6186, 6700, 1074, 9784, 8253, 64, 576, 8779, 8783, 7248, 4689, 4180, 10838, 4194, 9826, 5733, 8806, 3691, 2676, 6264, 2686, 6783, 7806, 8833, 10368, 10878, 8842, 5784, 1177, 4251,...
None
8,171
4
Obfuscation_(software):obfuscation software software development obfuscation deliberate act creating source machine code difficult humans understand like obfuscation natural language may use needlessly roundabout expressions compose statements programmers may deliberately obfuscate code conceal purpose security obscurity logic implicit values embedded primarily order prevent tampering deter reverse engineering even puzzle recreational challenge someone reading source code done manually using automated tool latter preferred technique industry architecture characteristics languages may make easier obfuscate others c c++ perl programming language examples languages easy obfuscate writing reading obfuscated source code brain teaser number programming contests reward creatively obfuscated code international obfuscated c code contest obfuscated perl contest types obfuscations include simple keyword substitution use non-use whitespace create artistic effects self-generating heavily compressed programs according nick montfort techniques may include short obfuscated perl programs may used signatures perl programmers japhs another perl hacker winning entry international obfuscated c code contest written ian phillipps 1988 subsequently reverse engineered thomas ball c program compiled run generate 12 verses 12 days christmas contains strings required poem encoded form within code non-winning entry year next example illustrates creative use whitespace generates mazes arbitrary length ansi-compliant c compilers n't allow constant strings overwritten avoided changing *m 3 omitting m= following example óscar toledo gutiérrez best show entry 19th ioccc implements 8080 emulator complete terminal disk controller capable booting cp/m-80 running cp/m applications example japh slowly displays text another perl unix hacker multiple characters time delays explanation found python examples found official python programming faq elsewhere several advantages automated code obfuscation made popular widely useful across many platforms platforms java android .net decompiler reverse-engineer source code executable library main advantage automated code obfuscation helps protect trade secrets intellectual property contained within software making reverse-engineering program difficult economically unfeasible advantages might include helping protect licensing mechanisms unauthorized access shrinking size source code possibly shrinking size executable decompilation sometimes called man-at-the-end attack based traditional cryptographic attack known man-in-the-middle run-time interpreted languages commonly known script like older versions basic programs execute faster take less ram use single letter variable names avoid comments contain blank characters brief shorter faster obfuscation make reading writing reverse-engineering program difficult time-consuming necessarily make impossible anti-virus software avg antivirus also alert users land site code manually obfuscated one purposes obfuscation hide malicious code however developers may employ code obfuscation purpose reducing file size increasing security average user may expect antivirus software provide alerts otherwise harmless piece code especially trusted corporations feature may actually deter users using legitimate software variety tools exist perform assist code obfuscation include experimental research tools created academics hobbyist tools commercial products written professionals open-source software also exist deobfuscation tools attempt perform reverse transformation although majority commercial obfuscation solutions work transforming either program source code platform-independent bytecode used java .net also work directly compiled binaries debate whether illegal skirt copyleft software licenses releasing source code obfuscated form cases author less willing make source code available issue addressed gnu general public license requiring preferred form making modifications made available gnu website states obfuscated 'source code real source code count source code
[ 7556, 3462, 8582, 4493, 5395, 1945, 7851, 300, 2045, 4403, 9780, 10420, 10173, 65, 8262, 8775, 11081, 10442, 11212, 3413, 11351, 7421, 1881, 4444, 9052, 3555, 7395, 8554, 107, 10097, 3573, 4087, 6653, 4863 ]
None
8,172
4
Citizen_Lab:citizen lab citizen lab interdisciplinary laboratory based munk school global affairs university toronto canada founded directed professor ronald deibert citizen lab studies information controls—such network surveillance content filtering—that impact openness security internet pose threats human rights citizen lab collaborates research centres organizations individuals around world uses mixed methods approach combines computer-generated interrogation data mining analysis intensive field research qualitative social science legal policy analysis methods citizen lab founding partner opennet initiative 2002–2013 information warfare monitor 2002–2012 projects organization also developed original design psiphon censorship circumvention software spun lab private canadian corporation psiphon inc. 2008 citizen lab research outputs made global news headlines around world including front page exclusives new york times washington post globe mail tracking ghostnet 2009 researchers uncovered suspected cyber espionage network 1,295 infected hosts 103 countries high percentage high-value targets including ministries foreign affairs embassies international organizations news media ngos seminal study one first public reports reveal cyber espionage network targeted civil society government systems around world shadows cloud 2010 researchers documented complex ecosystem cyber espionage systematically compromised government business academic computer network systems india offices dalai lama united nations several countries million dollar dissident published august 2016 researchers discovered ahmed mansoor one uae five human rights defender united arab emirates targeted software developed israeli cyber war company nso group using chain zero-day exploits operators spyware attempted get mansoor click link socially engineered text message would given access everything phone prior releases report researchers contacted apple released security update patched vulnerabilities exploited spyware operators citizen lab number awards work first canadian institution win macarthur foundation ’ macarthur award creative effective institutions 2014 canadian institution receive new digital age grant 2014 google executive chairman eric schmidt past awards include electronic frontier foundation pioneer award 2015 canadian library association advancement intellectual freedom canada award 2013 canadian committee world press freedom press freedom award 2011 canadian journalists free expression ’ vox libera award 2010 according january 24 2019 ap news report citizen lab researchers targeted international undercover operatives citizen lab independent government corporate interests financial support citizen lab come ford foundation open society institute social sciences humanities research council canada international development research centre idrc canada centre global security studies university toronto ’ munk school global affairs john d. catherine t. macarthur foundation donner canadian foundation open technology fund walter duncan gordon foundation citizen lab received donations software support palantir technologies virustotal oculus info inc citizen lab ’ targeted threats research stream seeks gain better understanding technical social nature digital attacks civil society groups political context may motivate citizen lab conducts ongoing comparative analysis growing spectrum online threats including internet filtering denial-of-service attacks targeted malware targeted threats reports covered number espionage campaigns information operations tibetan community diaspora phishing attempts made journalists human rights defenders political figures international investigators anti-corruption advocates mexico prominent human rights advocate focus government surveillance united arab emirates citizen lab researchers collaborators like electronic frontier foundation also revealed several different malware campaigns targeting syrian activists opposition groups context syrian civil war many findings translated arabic disseminated along recommendations detecting removing malware citizen lab ’ research threats civil society organizations featured front page businessweek covered al jazeera forbes wired among international media outlets group reports work analyzing spyware used target opposition figures south america triggered death threats september 2015 members group received pop-up said opennet initiative tested internet filtering 74 countries found 42 them—including authoritarian democratic regimes—implement level filtering citizen lab continued research area internet censorship lab iclab project aimed developing new systems methods measuring internet censorship collaborative effort citizen lab professor phillipa gill group stony brook university department computer science professor nick feamster network operations internet security group princeton university citizen lab studies censorship surveillance implemented popular applications including social networks instant messaging search engines previous work includes investigations censorship practices search engines provided google microsoft yahoo chinese market along domestic chinese search engine baidu 2008 nart villeneuve found tom-skype chinese version skype time collected stored millions chat records publicly accessible server based china 2013 citizen lab researchers collaborated professor jedidiah crandall ph.d. student jeffrey knockel university new mexico reverse engineering tom-skype sina uc another instant messaging application used china team able obtain urls encryption keys various versions two programs downloaded keyword blacklists daily work analyzed one year half data tracking keyword lists examined social political contexts behind content lists analyzed times list updated including correlations current events current research focuses monitoring information controls popular chinese microblogging service sina weibo chinese online encyclopedias mobile messaging applications popular asia asia chats project utilizes technical investigation censorship surveillance assessment use storage user data comparison terms service privacy policies applications first report released project examined regional keyword filtering mechanisms line applies chinese users analysis popular cellphone app called smart sheriff citizen lab german group cure53 asserted app represented security hole betrayed privacy children meant protect parents south korean law required cellphones sold 18 contain software designed protect children smart sheriff popular government approved app—with 380,000 subscribers citizen lab/cure53 report described smart sheriff security holes catastrophic citizen lab conducts groundbreaking research global proliferation targeted surveillance software toolkits including finfisher hacking team nso group finfisher suite remote intrusion surveillance software developed munich-based gamma international gmbh marketed sold exclusively law enforcement intelligence agencies uk-based gamma group 2012 morgan marquis-boire bill marczak provided first public identification finfisher software citizen lab collaborators done extensive investigations finfisher including revealing use bahraini activists analyzing variants finfisher suite target mobile phone operating systems uncovering targeted spying campaigns political dissidents malaysia ethiopia documenting finfisher command control servers 36 countries citizen lab finfisher research informed inspired responses civil society organizations pakistan mexico united kingdom mexico example local activists politicians collaborated demand investigation state acquisition surveillance technologies uk led crackdown sale software worries misuse repressive regimes hacking team milan italy-based company provides intrusion surveillance software called remote control system rcs law enforcement intelligence agencies citizen lab collaborators mapped rcs network endpoints 21 countries revealed evidence rcs used target human rights activist united arab emirates moroccan citizen journalist organization independent news agency run members ethiopian diaspora following publication hacking team targeting ethiopian journalists electronic frontier foundation privacy international took legal action related allegations ethiopian government compromised computers ethiopian expatriates united states uk 2018 citizen lab released investigation global proliferation internet filtering systems manufactured canadian company netsweeper inc using combination publicly available ip scanning network measurement data technical tests identified netsweeper installations designed filter internet content operational networks 30 countries focused 10 past histories human rights challenges afghanistan bahrain india kuwait pakistan qatar somalia sudan uae yemen websites blocked countries include religious content political campaigns media websites particular interest netsweeper ‘ alternative lifestyles ’ category appears one principal purposes blocking non-pornographic lgbtq content including offered civil rights advocacy organizations hiv/aids prevention organizations lgbtq media cultural groups citizen lab called government agencies abandon act filtering lgbt content since 2016 citizen lab published number reports pegasus spyware mobile devices developed nso group israeli-based cyber intelligence firm citizen lab ten part series nso group ran 2016 2018 august 2018 report timed coordinate amnesty international in-depth report nso group 2017 group released several reports showcased phishing attempts mexico used nso group technology products used multiple attempts gain control mobile devices mexican government officials journalists lawyers human rights advocates anti-corruption workers operations used sms messages bait attempt trick targets clicking links nso group exploit infrastructure clicking links would lead remote infection target phone one case son one journalists—a minor time—was also targeted nso purports sell products governments also came group focus prominent uae human rights defender ahmed mansoor mobile phone targeted report attempts showed first time ios zero day exploits wild prompted apple release security update ios 9.3.5 affecting 1 billion apple users worldwide citizen lab research surveillance software featured front pages washington post new york times covered extensively news media around world including bbc bloomberg cbc slate salon citizen lab research commercial surveillance technologies resulted legal policy impacts december 2013 wassenaar arrangement amended include two new categories surveillance systems dual use control list— intrusion software ip network surveillance systems wassenaar arrangement seeks limit export conventional arms dual-use technologies calling signatories exchange information provide notification export activities goods munitions included control lists amendments december 2013 product intense lobbying civil society organizations politicians europe whose efforts informed citizen lab research intrusion software like finfisher surveillance systems developed marketed blue coat systems citizen lab studies commercial market censorship surveillance technologies consists range products capable content filtering well passive surveillance citizen lab developing refining methods performing internet-wide scans measure internet filtering detect externally visible installations url filtering products goal work develop simple repeatable methodologies identifying instances internet filtering installations devices used conduct censorship surveillance citizen lab conducted research companies blue coat systems netsweeper smartfilter major reports include devices wander mistake planet blue coat redux 2013 pakistan stand guard thee analysis canada-based netsweeper ’ role pakistan ’ censorship regime 2013 planet blue coat mapping global censorship surveillance tools 2013 research covered news media around world including front page washington post new york times globe mail jakarta post following 2011 publication behind blue coat investigations commercial filtering syria burma blue coat systems officially announced would longer provide support updates services software syria december 2011 u.s. department commerce bureau industry security reacted blue coat evidence imposed 2.8 million fine emirati company responsible purchasing filtering products blue coat exporting syria without license citizen lab netsweeper research cited pakistani civil society organizations bytes bolo bhi public interest litigation pakistani government formal complaints high commission embassy canada pakistan citizen lab examines transparency accountability mechanisms relevant relationship corporations state agencies regarding personal data surveillance activities research investigated use artificial intelligence canada immigration refugee systems co-authored international human rights program university toronto faculty law analysis ongoing encryption debates canadian context co-authored canadian internet policy public interest clinic close look consumer personal data requests canada summer 2017 government canada introduced new national security legislation bill c-59 national security act proposed significantly change canada national security agencies practices including canada signals intelligence agency communications security establishment since bill first proposed range civil society groups academics called significant amendments proposed act co-authored paper citizen lab canadian internet policy public interest clinic represented detailed comprehensive analysis cse-related reforms date analysis produced help members parliament journalists researchers lawyers civil society advocates engage effectively issues included parliamentary committee debates highlighted dozens media reports citizen lab active participant various global discussions internet governance internet governance forum icann united nations government group experts information telecommunications since 2010 citizen lab helped organize annual cyber dialogue conference hosted munk school global affairs ’ canada centre convenes 100 individuals countries around world work government civil society academia private enterprise effort better understand pressing issues cyberspace cyber dialogue participatory format engages attendees moderated dialogue internet security governance human rights conferences around world including high-level meeting hague-based scientific council government policy swedish government stockholm internet forum taken themes inspired discussions cyber dialogue citizen lab contributes field building supporting networks researchers advocates practitioners around world particularly global south citizen lab developed regional networks activists researchers working information controls human rights past ten years networks asia opennet asia commonwealth independent states opennet eurasia middle east north africa support international development research centre idrc citizen lab launched cyber stewards network 2012 consists south-based researchers advocates practitioners analyze impact cybersecurity policies practices local regional international level project consists 24 partners across asia sub-saharan africa latin america middle east north africa including 7iber opennet centre internet society citizen lab staff also work local partners educate train at-risk communities example 2013 collaborated tibet action institute hold public awareness events dharamshala india exiled tibetan community cyber espionage campaigns winter 2013 citizen lab conducted digital security training session russian investigative journalists sakharov center moscow citizen lab work often cited media stories relating digital security privacy controls government policy human rights technology since 2006 featured 24 front-page stories publications including new york times washington post globe mail international herald tribune since 2013 citizen lab hosted summer institute monitoring internet openness rights annual research workshop munk school global affairs university toronto brings together researchers practitioners academia civil society private sector working internet openness security rights collaborations formed clsi workshops led publication high impact reports internet filtering zambia security audit child monitoring apps south korea analysis great cannon attack tool china used large scale distributed-denial service attacks github greatfire.org according report ap news journalist raphael satter citizen lab researchers reported october israeli nso group surveillance software used spy inner circle jamal khashoggi murder targeted turn international undercover operatives citizen lab october report revealed nso signature spy software placed iphone saudi dissident omar abdulaziz one khashoggi ’ confidantes months abdulaziz said saudi arabia spies used hacking software reveal khashoggi private criticisms saudi royal family said played major role death march 2019 new york times reported citizen lab target uae contractor darkmatter
[ 10392, 3996, 5024, 1317, 4903, 6186, 2734, 7096, 3520, 1994, 2634, 11211, 3286, 9817, 4314, 2661, 3944, 2542, 1015 ]
Test
8,173
9
Advice_(programming):advice programming aspect functional programming advice describes class functions modify functions latter run certain function method procedure applied given join point program following taken discussion mailing list aosd-discuss pascal costanza contributed following term advice goes back term advising introduced warren teitelman phd thesis 1966 quote chapter 3 thesis advising found way bbn lisp later xerox parc interlisp also found way flavors first object-oriented extension lisp developed mit subsumed notion method combination since method combination macros closely related also interesting note first macro system described 1963 three years warren teitelman phd thesis practical use advice functions generally modify otherwise extend behavior functions easily modified extended emacspeak emacs-addon makes extensive use advice must modify thousands existing emacs modules functions produce audio output blind corresponding visual presentation would infeasible copy redefine produce audio output addition normal outputs emacspeak programmers define advice functions run another emacs example suppose one corrected misspelled word ispell one wanted re-spellcheck entire buffer codice_1 offers functionality even spellchecked word used thousand times one could track definition codice_1 copy one .emacs write additional functionality tedious prone broken-ness .emacs version get sync actual ispell elisp module even works home one wants fairly simple run another command codice_1 runs using advice functions done simply form advices part c classes late 1970s early 1980s namely functions called codice_4 codice_5 defined class called respectively member functions class however dropped c++ advices part common lisp object system clos codice_6 codice_7 codice_8 methods combined primary method standard method combination common lisp implementations provide advice functionality addition standard method combination clos extensions lispworks supports advising functions macros clos methods emacslisp added advice-related code version 19.28 1994 gregor kiczales comments follows
[ 10981, 6502, 7880, 8554, 5420, 6061, 5361, 9877, 3675 ]
Test
8,174
4
Claims-based_identity:claims-based identity claims-based identity common way applications acquire identity information need users inside organization organizations internet also provides consistent approach applications running on-premises cloud claims-based identity abstracts individual elements identity access control two parts notion claims concept issuer authority claim statement one subject person organization makes another subject example statement name group buying preference ethnicity privilege association capability subject making claim claims provider claims packaged one tokens issued issuer provider commonly known security token service sts name claims-based identity confusing first seems like misnomer attaching concept claims concept identity appears combining authentication determination identity authorization identified subject may may however closer examination reveals case claims subject subject application receiving incoming claim map is/is claims may/may rules application traditional systems often confusion differences similarities user is/is user may/may claims-based identity makes distinction clear distinction user is/is user may/may clarified possible authentication user is/is claims handled third party third party called security token service better understand concept security token service consider analogy night club doorman doorman wants prevent under-age patrons entry facilitate requests patron present driver license health insurance card identification token issued trusted third party security token service provincial state vehicle license department health department insurance company nightclub thus alleviated responsibility determining patron age trust issuing authority course make judgment authenticity token presented two steps completed nightclub successfully authenticated patron regard claim legal drinking age continuing analogy nightclub may membership system certain members may regular vip doorman might ask another token membership card might make another claim member vip case trusted issuing authority token would probably club membership card makes claim patron vip club react accordingly translating authenticated vip membership claim permission patron permitted sit exclusive lounge area served free drinks note uses term authentication include claims acquisition difference authentication limited binding user information contained user target site attribute data claim required complete authentication privacy concerns become important ability digital entities authenticate users without access personal attributes becomes increasingly important claims-based identity potential simplify authentication logic individual software applications applications n't provide mechanisms account creation password creation reset furthermore claims-based identity enables applications know certain things user without interrogate user determine facts facts claims transported envelope called secure token claims-based identity greatly simplify authentication process user n't sign multiple times multiple applications single sign creates token used authenticate multiple applications web sites addition certain facts claims packaged token user tell individual application facts repeatedly instance answering similar questions completing similar forms
[ 3521, 4194, 1966, 10801, 820, 8159 ]
Test
8,175
9
David_Sayre:david sayre david sayre march 2 1924 – february 23 2012 american scientist credited early development direct methods protein crystallography diffraction microscopy also called coherent diffraction imaging working ibm part initial team ten programmers created fortran later suggested use electron beam lithography fabrication x-ray fresnel zone plates international union crystallography awarded sayre ewald prize 2008 unique breadth contributions crystallography range seminal contributions solving phase problem complex physics imaging generic objects x-ray diffraction microscopy ... sayre born new york city completed bachelor degree physics yale university age 19 working mit radiation laboratory earned ms degree auburn university 1948 1949 moved oxford wife anne colquhoun married 1947 sayre completed doctoral studies dorothy hodgkin group 1951 time sayre discovered equation named based concept atomicity although key direct methods still use today sayre share 1985 chemistry nobel prize awarded discovery also around time sayre inspired claude shannon recent work suggested short paper crystallographic phase problem could solved easily one could measure intensities higher density imposed bragg law insight widely seen initial spark lead recent lensless imaging techniques back united states david sayre worked structure determination carcinogen molecule lab peter friedlander university pennsylvania philadelphia structure determination program wrote ibm 701 attracted attention john backus hired part initial team programmers developed high-level programming language fortran sayre remain ibm retirement 1990 early 1970s sayre became interested x-ray microscopy suggested use newly developed electron beam lithography apparatus ibm produce fresnel zone plates type x-ray lens widely used synchrotron facilities '80s came back goal achieving lensless imaging pursued rest life
[ 10040, 11539, 3960, 1976, 3323 ]
Test
8,176
4
Incapsula:incapsula imperva incapsula cloud-based application delivery platform uses global content delivery network provide web application security ddos mitigation content caching application delivery load balancing failover services incapsula founded 2009 gur shatz marc gaffan company origins imperva nyse impv american-based cyber security firm owned 85 incapsula spun imperva 2009 reported growing rate 50 per quarter august 2013 company lost 1.7 million second quarter year february 2014 imperva bought remaining part incapsula became product line within parent company october 2013 incapsula credited protected one internet largest attacks website september 24 2013 attack said lasted nine hours 100gbit/s traffic peak attack btc china bitcoin yuan trading platform december 2016 incapsula reported defended largest ddos attack ever recorded peaked 650gbit/s 200mpps incapsula multiple features used security performance websites incapsula waf protects websites cross site scripting illegal resource access owasp top 10 threats sql injections web 2.0 threats including academic web archiving comment spam fake registrations malicious bots referrer spam site scraping works changing website domain name system dns record route website traffic incapsula incapsula filters malicious attacks bots website scrapers incapsula also content delivery network caches websites server network speed website load time cached information returned server closest end user order provide fast page loads also eliminates slow response central servers due heavy server traffic incapsula launched tool named backdoor protect 2013 tool reported detect block malicious backdoors webshells tool works comparing website traffic database known backdoors later year company announced login-protect two factor authentication feature integrated addition products incapsula also announced 2013 would implementing layer 7 load balancing capabilities 2011 incapsula chosen one top 10 companies participate rsa conference innovation sandbox year finalist red herring top 100 north america award 2013 incapsula named 1 best cloud based security cdn werockyourweb 2017 forrester wave ddos service providers named imperva leader top scores current offering strategy evaluated ddos service providers
[ 64, 10368, 4194, 899, 2118, 4198, 2409, 4522, 331, 11244, 9293, 9855, 9181, 3807, 7352, 7899, 2717, 1087 ]
None
8,177
2
Edubuntu:edubuntu edubuntu previously known ubuntu education edition official derivative ubuntu operating system designed use classrooms inside schools homes communities edubuntu developed collaboration teachers technologists several countries edubuntu built top ubuntu base incorporates ltsp thin client architecture several education-specific applications aimed users aged 6 18 designed easy installation ongoing system maintenance included edubuntu linux terminal server project many applications relevant education including gcompris kde edutainment suite sabayon profile manager pessulus lockdown editor edubuntu menueditor libreoffice gnome nanny italc edubuntu cds previously available free charge shipit service available download dvd format edubuntu default gui unity gnome still available unity default gui since release 12.04 since release 7.10 kde also available edubuntu kde 2010 edubuntu qimo 4 kids project working providing qimo within edubuntu done would fitted cd primary goal edubuntu enable educator limited technical knowledge skills set computer lab on-line learning environment hour less effectively administer environment principal design goals edubuntu centralized management configuration users processes together facilities working collaboratively classroom setting equally important gathering together best available free software digital materials education according statement goals official edubuntu website aim put together system contains best free software available education make easy install maintain also aims allow low income environments maximize utilisation available older equipment first edubuntu release coincided release ubuntu 5.10 codenamed breezy badger 2005-10-13 8.04 hardy heron release edubuntu given name ubuntu education edition changed add-on standard ubuntu installation instead installable livecd version 9.10 onwards edubuntu changed available full system dvd instead add-on cd edubuntu also installable via selection edubuntu packages distributions using official ubuntu repositories ubuntu kubuntu mainly since 14.04 edubuntu become lts-only edubuntu announced skip 16.04 lts update plan staying 14.04 due lack contributors
[ 4611, 3079, 3089, 4113, 8209, 8727, 10780, 543, 11297, 546, 7204, 9253, 551, 11305, 56, 3129, 4153, 59, 8248, 9276, 4673, 3654, 5190, 3147, 1101, 2125, 1107, 1110, 89, 5721, 4192, 10851, 3685, 9320, 9324, 10860, 5742, 2671, 3189, 5755, ...
Test
8,178
9
IpTables_Rope:iptables rope rope programming language allows developers write extensions iptables/netfilter components linux using simple scripting language based reverse polish notation scriptable iptables match module used identify whether ip packets passed match particular set criteria rope started life project make string match module iptables stronger evolved fairly quickly open-ended scriptable packet matching mechanism
[ 823 ]
None
8,179
9
NeWS:news news network extensible window system discontinued windowing system developed sun microsystems mid-1980s originally known sundew primary authors james gosling david s. h. rosenthal news interpreter based postscript later display postscript although two projects otherwise unrelated extending allow interaction multiple contexts support windows like postscript news could used complete programming language unlike postscript news could used make complete interactive programs mouse support gui news started implementing postscript interpreter running cooperative multitasking fashion since unlike postscript printer news would displaying number postscript programs time one screen also added complete view hierarchy based viewports known canvases synchronous event distribution system supporting events interests threads monitors like view system guis news included concept tree embedded views along events passed instance mouse click would generate event would passed object directly mouse pointer say button object respond event object button would receive message news included complete model events including timers automatic events input queues devices mice keyboards functionality required full interaction input handling system designed provide strong event synchronization guarantees possible asynchronous protocols like x support user interface widgets news expanded original postscript stack-based language complete object oriented oo programming style inheritance eliminated need external oo language build complete application since additions implemented extensions postscript possible write simple postscript code would result running onscreen interactive program two popular demonstration programs onscreen clock required two pages code program drew pair eyes followed cursor moved around screen eyeball program shown siggraph 1988 inspiration later well-known x application xeyes news included several libraries user interface elements widgets written news widgets ran behaviour news interpreter required communications outside program news code widget demanded example toggle button display routine query button state pressed change display accordingly button postscript code also react mouse clicks changing state pressed pressed vice versa happen windowing server without interaction client program mouse released button event sent handling sophisticated x window system server model report mouse pushed mouse mouse released events client figure event button switch state finally instruct server display new state client server machine interactions must travel network results delay responding news architecturally similar called ajax except news coherently best example library tnt news toolkit sun released 1989 sun also shipped earlier lite toolkit intended example purposes making small programs although adoption never widespread several companies licensed news adapted various uses open look version framemaker desktop publishing program developed frame technology corp. funding mainly sun microsystems nsa one commercial products ran news hyperlook developed arthur van hoff turing institute interactive application design system hopkins developed news version simcity built hyperlook commercial drawing program altsys virtuoso produced news port freehand additional functionality took advantage postscript environment unfortunately sun announced end support news virtuoso became ready ship compared x news vastly powerful also slower especially local connections c api low level difficult use news programs tended entirely written postscript another factor popularity sun charged fee license news source code mit x11 code free cost first versions news emulated x10 protocol translating calls news postscript speed problems plus existence programs relied exact pixel results x10 calls obsolescence x10 forced sun release x11/news hybrid called xnews ran x11 server parallel postscript interpreter seriously degraded news interpreter performance considered good x11 server either sun also implemented open look user interface specification several toolkits news toolkit tnt open look toolkit written postscript ran news server olit built xt x intrinsics base motif xview used apis sun earlier sunview window system clear open look lost motif popularity adobe acquired framemaker sun stopped supporting news products news simply vanished
[ 3328, 9731, 3462, 1801, 1802, 4235, 3597, 1809, 2710, 9343, 7072, 8994, 1316, 10789, 1707, 5677, 3247, 7983, 6322, 8628, 2871, 7104, 9665, 6338, 10051, 10436, 8007, 1480, 2895, 597, 3285, 10327, 10200, 8923, 479, 4960, 5471, 5855, 9955, 1...
Test
8,180
2
YOPER:yoper yoper linux—your operating system—was linux distribution pcs i686 pentium pro higher processor types intended use personal computers server used hardware recognition tools known knoppix defining feature distribution set custom optimisations intended make fastest out-of-the-box distribution project founded andreas girardet later maintained tobias gerschner distribution scratch-built opposed modifying one popular distributions create new distribution yoper discontinued operationally dismantled december 31 2012
[ 5380, 8837, 7435, 10127, 2321, 5397, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 7983, 2738, 4790, 823, 439, 56, 59, 7483, 3903, 4673, 2375, 4039, 8907, 1110, 9693, 2914, 485, 3685, 9064, 4841, 6890, 7913, 7020, 10860, 7534, ...
None
8,181
1
Amazon_Aurora:amazon aurora amazon aurora relational database service developed offered amazon web services beginning october 2014 aurora available part amazon relational database service rds aurora offered mysql compatible service upon release added postgresql compatibility october 2017 became possible stop start aurora clusters september 2018 august 2018 amazon began offer serverless version 2019 developers aurora sigmod systems award fundamentally redesigning relational database storage cloud environments aurora automatically allocates database storage space 10-gigabyte increments needed maximum 64 terabytes aurora offers automatic six-way replication chunks across multiple locations improved availability fault-tolerance aurora provides users performance metrics query throughput latency provides fast database cloning amazon designed aurora compatible mysql meaning tools querying managing mysql databases command-line client mysql workbench graphical user-interface used mysql options features available amazon aurora compatible mysql 5.6 5.7 supports innodb storage engine amazon claims fivefold performance improvements benchmarking tests mysql hardware due tightly integrating database engine ssd-based virtualized storage layer purpose-built database workloads reducing writes storage system minimizing lock contention eliminating delays created database process threads independent tests shown aurora performs better competing technologies combinations workload instance type
[ 11392, 8962, 8451, 6027, 5660, 11038, 11556, 2217, 7983, 9010, 10681, 11201, 9286, 5960, 10185, 590, 7248, 2901, 3927, 7512, 8921, 8539, 735, 1001, 5612, 7022, 7537, 2810 ]
Test
8,182
7
Fabasoft:fabasoft fabasoft ag software manufacturer headquartered linz upper austria company established 1988 helmut fallmann leopold bauernfeind name fabasoft acronym fallmann bauernfeind software fiscal year fabasoft ag commences april 1 number employees respective reporting date march 31 increased recent years 100 staff 2003 185 2004 203 2005 corporate revenue also increased eur 16.94 million 2003/2004 fiscal year eur 21.85 million 2004/2005 eur 25.3 million 2005/2006 fiscal year 2006/2007 fiscal year revenue decreased eur 21.2 million eur 21.6 million recorded 2007/2008 fiscal year 2008/2009 fabasoft ag recorded revenue eur 20.02 million fiscal year 2009/2010 sales revenue eur 23.3 million fabasoft ag stocks listed prime standard frankfurt stock exchange since october 4 1999 fabasoft certified according iso 9001 iso 20000 iso 27001 type ii
[]
Test
8,183
8
UCoz:ucoz ucoz free web hosting built-in content management system modules ucoz cms used together build fully featured website separately e.g online shopping platform blog webforum etc july 10 2015 one half million websites created ucoz system ucoz among top sites russian-speaking users according alexa internet initially basis service development formed combined experience several developers consisted previous work different services polls free guestbooks importantly professional cms script wocatalog pro 29 october 2005 almost year development ucoz announced russian version system june 2007 english version system officially announced august — german version currently ucoz also available azeri spanish french arabic hungarian romanian swedish polish portuguese partially hebrew latvian ukrainian georgian languages january 2013 yandex 4th largest search engine world announced transfer ucoz project narod 2nd largest free website hosting platform russian internet merger increased ucoz market share substantially company already market leader merger ucoz backed mail.ru group headquarters moscow russia offices sankt petersburg rostov kazan cherkassy ukraine saas system ucoz features type platform like closed source code availability running server-side scripts like javascript also unavailability running databases possible within web 3.0 paas concept balanced great number built-in system capabilities also system fully html5 css3 compatible
[ 10020, 3462, 735 ]
None
8,184
3
Astron_Belt:astron belt astron belt アストロンベルト early laserdisc video game form third-person space combat rail shooter released arcades 1983 sega japan licensed bally midway release united states developed 1982 commonly cited first laserdisc game game unveiling 1982 amoa show chicago marked beginning laserdisc fever videogame industry release japan following year marked first commercial release laserdisc game however release united states delayed due several hardware software bugs time dragon lair beaten public release astron belt however first laserdisc game released europe arcade game available upright cockpit cabinets latter illuminated buttons control panel larger 25 monitor upright used standard 19 vibrating seat astron belt ported msx home system player controls lone spacecraft mission singlehandedly take entire enemy armada enemy fighters ships shoot player mines objects must shot avoided game divided waves end wave command ship must destroyed later waves enemy fighters move shoot aggressively shots accurate waves take place open space others require player battle enemies flying narrow trenches tunnels player timer beginning game unlimited number lives available length timer adjusted machine operator normally 60 seconds timer expires player given limited number additional lives lives lost game ends background videos used game mixture original artwork borrowed material addition scenes created specifically game designers also incorporated footage three science fiction movies battle beyond stars message space astron belt used one four laserdisc players either pioneer ld-v1000 ld-v1001 hitachi vip-9500sg vip-9550 two different versions laser disc also pressed single-sided version pioneer double-sided version sega however discs information may used four players running sega laserdisc hardware game combines pre-rendered laserdisc footage real-time 2d computer graphics plane real-time graphics plane overlaid imitating matting technique crt monitor scans horizontally across screen fed information laserdisc point fed information computer graphics system information coming laserdisc stops creating black mask sprite inserted uses collision detection system laserdisc sprite planes interact frame laserdisc footage coded hit detection spot stored rom memory zilog z80 cpu reads number laserdisc frame checks laserdisc hit spots shots fired player coordinates correspond instructs laserdisc player display explosion sequence sections player must navigate walls walls laserdisc footage also coded use collision detection astron belt responsible starting interactive movie laserdisc craze shown 1982 amoa show one laserdisc games inspired dragon lair sega bally midway released sequel called starblazer also known galaxy ranger 1984 controls similar gameplay astron belt one machine could converted simply changing laserdisc game roms sound board
[ 1776, 9006 ]
Test
8,185
7
List_of_game_middleware:list game middleware middleware games piece software integrated game engine handle specialized aspect physics graphics networking ai pathfinding collisions physics animation sound
[ 162, 8071, 10076, 2826, 11306, 6900, 8122, 1916 ]
Test