node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
8,286 | 4 | Attack_model:attack model cryptanalysis attack models attack types classification cryptographic attacks specifying kind access cryptanalyst system attack attempting break encrypted message also known ciphertext generated system greater access cryptanalyst system useful information get utilize breaking cypher cryptography sending party uses cipher encrypt transform secret plaintext ciphertext sent insecure communication channel receiving party receiving party uses inverse cipher decrypt ciphertext obtain plaintext secret knowledge required apply inverse cipher ciphertext secret knowledge usually short number string called key cryptographic attack third party cryptanalyst analyzes ciphertext try break cipher read plaintext obtain key future enciphered messages read usually assumed encryption decryption algorithms public knowledge available cryptographer case modern ciphers published openly assumption called kerckhoffs principle common attack models different attack models used cryptographic primitives generally kind security systems examples attack models | [
8674,
9156,
1797,
4389,
11241,
3084,
3629,
11119,
177,
212,
1941,
10329
] | Test |
8,287 | 5 | Run-length_limited:run-length limited run-length limited rll coding line coding technique used send arbitrary data communications channel bandwidth limits rll codes defined four main parameters n k first two n refer rate code remaining two specify minimal maximal k number zeroes consecutive ones used telecommunication storage systems move medium past fixed recording head specifically rll bounds length stretches runs repeated bits signal change runs long clock recovery difficult short high frequencies might attenuated communications channel modulating data rll reduces timing uncertainty decoding stored data would lead possible erroneous insertion removal bits reading data back mechanism ensures boundaries bits always accurately found preventing bit slip efficiently using media reliably store maximal amount data given space early disk drives used simple encoding schemes rll 0,1 fm code followed rll 1,3 mfm code widely used hard disk drives mid-1980s still used digital optical discs cd dvd md hi-md blu-ray higher density rll 2,7 rll 1,7 codes became de facto industry standard hard disks early 1990s hard disk drive information represented changes direction magnetic field disk magnetic media playback output proportional density flux transition computer information represented voltage wire voltage wire relation defined ground level would binary zero positive voltage wire relation ground represents binary one magnetic media hand always carries magnetic flux either north pole south pole order convert magnetic fields binary data encoding method must used translate two one simplest practical codes modified non-return-to-zero-inverted nrzi simply encodes 1 magnetic polarity transition also known flux reversal zero transition disk spinning constant rate bit given equal time period data window magnetic signal represents bit flux reversal occurs start window note older hard disks used one fixed length time data window whole disk modern disks complicated see zoned bit recording method quite simple playback output proportional density ones long run zeros means playback output simple example consider binary pattern 101 data window 1 ns one nanosecond one billionth second stored disk change followed change another change preceding magnetic polarity already positive resulting pattern might look like −−+ value 255 binary ones would written −+−+−+−+ +−+−+−+− zero byte would written ++++++++ −−−−−−−− 512 byte sector zeros would written 4,096 sequential bits polarity since disk drive physical piece hardware rotational speed drive change slightly due change motor speed thermal expansion disk platter physical media floppy disk also become deformed causing larger timing errors timing circuit controller may small variations speed problem long string zeros way disk drive controller know exact position read head thus way know exactly many zeros speed variation even 0.1 precise practical floppy drive could result four bits added removed 4,096 bit data stream without form synchronization error correction data would become completely unusable problem due limits magnetic media possible write many polarity changes certain amount space upper limit many 1 also written sequentially depends linear velocity head gap prevent problem data coded way long repetitions single binary value occur limiting number zeros written consecutively makes possible drive controller stay sync limiting number 1 written row overall frequency polarity changes reduced allowing drive store data amount space resulting either smaller package amount data storage size package codes used record magnetic disks limited length transition-free runs therefore characterized rll codes earliest simplest variants given specific names modified frequency modulation mfm name rll commonly used complex variants given specific names term technically applies first rll code used hard drives rll 2,7 developed ibm engineers first used commercially 1979 ibm 3370 dasd use 4300 series mainframe late 1980s pc hard disks began using rll proper i.e variants complex received proper names mfm rll codes found almost universal application optical disc recording practice since 1980 consumer electronics rlls like efm code rate=8/17 d=2 k=10 employed compact disc cd minidisc md efmplus code rate=8/16 d=2 k=10 used dvd parameters k minimum maximum allowed run-lengths coverage storage technologies references cited article useful generally run-length number bits signal remains unchanged run-length 3 bit 1 represents sequence '111 instance pattern magnetic polarizations disk might '+−−−−++−−−++++++ runs length 1 4 2 3 6 however run length limited coding terminology assumes nrzi encoding 1 bits indicate changes 0 bits indicate absence change sequence would expressed '11000101001000001 runs zero bits counted somewhat confusingly run length number zeros 0 3 1 2 5 preceding adjacent ones one less number bit times signal actually remains unchanged run length limited sequences characterized two parameters k stipulate minimum maximum zero-bit run length occur sequence rll codes generally specified k rll e.g 1,3 rll encoded format 1 bit indicates flux transition 0 indicates magnetic field disk change time interval generally term rll code used refer elaborate encodings original frequency modulation code also called differential manchester encoding seen simple rate-1/2 rll code added 1 bits referred clock bits example extending maximum run length 2 adjacent 0 bits data rate improved 4/5 original ibm group coded recording variant possible eleven 16 codes bit pattern codice_1 encoded prefixing complement codice_1 five cases would violate one rules codice_3 codice_4 code beginning 11 substituted codice_5 e ∨ example note meet definition 0,2 rll sufficient 5-bit code contain two consecutive zeros also necessary pair 5-bit codes combined sequentially contain two consecutive zeros must two zeros last one bit first code first one bit second code two arbitrarily chosen codes required rll code run length limits—0 2 case—apply overall modulated bitstream components represent discrete sequences plain data bits rule must hold arbitrary pair codes without exception input data may arbitrary sequence bits ibm gcr code meets condition since maximum run length zeros beginning 5-bit code one likewise maximum run length end code one making total run length two junction adjacent codes example maximum run length occurring codes seen example given code data 0010 ends zero code next data 1101 begins zero forming run two zeros junction two 5-bit codes modified frequency modulation begins get interesting special properties allow bits written magnetic medium twice density arbitrary bit stream limit close time flux transitions reading equipment detect constrains closely bits recorded medium worst case arbitrary bit stream two consecutive 1 produces two consecutive flux transitions time bits must spaced far enough apart would sufficient time flux transitions reader detect code imposes constraint =1 i.e minimum one 0 two 1 means worst case flux transitions two bit times apart bits twice close together arbitrary bit stream without exceeding reader capabilities doubled recording density compensates 1/2 coding rate code takes two bits represent one bit real information makes equivalent rate-1 code x complement previous encoded bit also previous data bit except clock bits—that x bit 0 01 code—this fm table code gets name inserted clock bits 0 except two 0 data bits example 1,7 rll maps 2 bits data onto three bits disk encoding done two four bit groups encoding rules x becomes x x except x 0 0 becomes x x 0 0 0 encoding according table longest last table match must used exceptions handle situations applying earlier rules would lead violation code constraints example 2,7 rll rate- code mapping n bits data onto 2 n bits disk like mfm minimum run length 50 longer three bit times instead two bits written faster achieving 50 higher effective data density encoding done two three four bit groups western digital wd5010a wd5011a wd50c12 seagate st11r ibm encoded forms begin four end three zero bits giving maximum run length seven example also alternate 1,7 rll encoding sometimes used avoid dc bias helps sending signal long distance types recording media x complement previous encoded bit i.e 1 previous bit 0 0 previous bit 1 example hhh 1,13 code rate-2/3 code developed three ibm researchers hirt hassner heise use 16 mb/s irda vfir physical layer unlike magnetic encoding designed infrared transmitter 0 bit represents 1 bit represents 1 bits consume power transmit designed limit density 1 bits less 50 particular 1,13|5 rll code final 5 indicates additional constraint 5 consecutive 10 bit pairs first eight rows describe standard 1,7 -rll code additional six exceptions increase maximum run zeros 13 legal pattern 100 000 000 000 001 represents 10 11 10 11 followed 01 limit maximum average ones density longest run 1–0 pairs 000 101 010 101 000 code limits ones density average 25.8 example let us encode bit sequence 10110010 different encodings suppose magnetic tape contain 3,200 flux reversals per inch modified frequency modulation 1,3 rll encoding stores data bit two bits tape since guaranteed one 0 non flux reversal bit 1 flux reversal bits possible store 6,400 encoded bits per inch tape 3,200 data bits per inch 1,7 rll encoding also store 6,400 encoded bits per inch tape since takes 3 encoded bits store 2 data bits 4,267 data bits per inch 2,7 rll encoding takes 2 encoded bits store data bit since guaranteed two 0 bits 1 bits possible store 9,600 encoded bits per inch tape 4,800 data bits per inch flux reversal densities hard drives significantly greater improvements storage density seen using different encoding systems | [
7400,
2989,
2159,
6129,
2968,
3323
] | Test |
8,288 | 4 | Democratic_National_Committee_cyber_attacks:democratic national committee cyber attacks democratic national committee cyber attacks took place 2015 2016 computer hackers infiltrated democratic national committee dnc computer network leading data breach cybersecurity experts well u.s. government stated cyberespionage work russian intelligence agencies forensic evidence analyzed several cybersecurity firms crowdstrike fidelis mandiant fireeye strongly indicates two russian intelligence agencies infiltrated dnc computer systems american cybersecurity firm crowdstrike removed hacking programs revealed history encounters groups already named calling one cozy bear fancy bear names used media december 9 2016 cia told u.s. legislators u.s. intelligence community concluded russia conducted cyberattacks operations 2016 u.s. election assist donald trump winning presidency multiple u.s. intelligence agencies concluded specific individuals tied russian government provided wikileaks stolen emails dnc well stolen emails hillary clinton campaign chairman also target cyberattack intelligence organizations additionally concluded russia hacked republican national committee r.n.c well d.n.c. chose leak information obtained r.n.c cyber attacks successfully penetrated dnc computing system began 2015 attacks cozy bear began summer 2015 attacks fancy bear began april 2016 fancy bear group began activities compromised system became apparent groups presumed spying communications stealing opposition research donald trump well reading email chats finally identified crowdstrike may 2016 groups intruders successfully expelled dnc systems within hours detection attacks considered part group recent attacks targeting u.s. government departments several political organizations including 2016 campaign organizations july 22 2016 person entity going moniker guccifer 2.0 claimed wordpress-hosted blog acting alone hacking dnc also claimed send significant amounts stolen electronic dnc documents wikileaks wikileaks revealed source leaked emails however cybersecurity experts firms including crowdstrike fidelis cybersecurity mandiant secureworks threatconnect editor ars technica rejected claims guccifer 2.0 determined basis substantial evidence cyberattacks committed two russian state-sponsored groups cozy bear fancy bear according separate reports new york times washington post u.s. intelligence agencies concluded high confidence russian government behind theft emails documents dnc u.s. intelligence community concluded russia behind cyberattack intelligence officials told washington post reached conclusion passed emails wikileaks know whether russian officials directed leak number experts cybersecurity analysts believe guccifer 2.0 probably russian government disinformation cover story distract attention away dnc breach two russian intelligence agencies president obama russian president vladimir putin discussion computer security issues took place side segment then-ongoing g20 summit china september 2016 obama said russian hacking stopped warning putin joint statement october 7 2016 united states department homeland security office director national intelligence stated us intelligence community confident russian government directed breaches release obtained allegedly obtained material attempt … interfere us election process common among russian intelligence services groups used similar hacking tools strategies believed neither group aware although antithetical american computer intelligence methods fear undermining defeating intelligence operations common practice russian intelligence community since 2004 intrusion part several attacks attempting access information american political organizations including 2016 u.s. presidential campaigns cozy bear fancy bear known adversaries extensively engaged political economic espionage benefits russian federation government believed connected russian intelligence services also access resources demonstrate levels proficiency matching nation-state capabilities cozy bear past year infiltrated unclassified computer systems white house u.s. state department u.s. joint chiefs staff according crowdstrike targeted sectors include defense energy mining financial insurance legal manufacturing media think tanks pharmaceutical research technology industries well universities cozy bear observed attacks occurred western europe brazil china japan mexico new zealand south korea turkey central asia fancy bear operating since mid-2000s crowdstrike reported targeting included aerospace defense energy government media industries fancy bear intrusions occurred united states western europe brazil canada china republic georgia iran japan malaysia south korea targeted defense ministries military organizations parallel russian federation government interests may indicate affiliation main intelligence directorate gru russian military intelligence service specifically fancy bear linked intrusions german bundestag france ’ tv5 monde television station april 2015 secureworks cybersecurity firm headquartered united states concluded march 2015 may 2016 fancy bear target list included merely dnc tens thousands foes putin kremlin united states ukraine russia georgia syria handful republicans targeted however january 25 2018 dutch newspaper de volkskrant tv program nieuwsuur reported 2014 dutch intelligence agency general intelligence security service aivd successfully infiltrated computers cozy bear observed hacking head office dnc subsequently white house first alert national security agency cyber-intrusion cozy bear access dnc systems since summer 2015 fancy bear since april 2016 evidence collaboration knowledge presence within system rather two russian espionage groups compromised systems engaged separately theft identical credentials cozy bear employed sea daddy implant obfuscated powershell script backdoor launching malicious code various times various dnc systems fancy bear employed x agent malware enabled distant command execution transmissions files keylogging well x-tunnel malware dnc leaders became aware compromise april 2016 attacks broadly reflect russian government interest u.s. political system well political leaders policies tendencies proclivities assessing possible beneficial outcomes attacks also broadly reflect russian government interest strategies policies practices u.s. government also globally reflects foreign governments interest ascertaining information donald trump new entry u.s. political leadership roles contrast information likely garnered decades pertaining clintons dnc commissioned cybersecurity company crowdstrike defeat intrusions chief technology officer dmitri alperovitch also cybersecurity expert stated cybersecurity firms fidelis cybersecurity fireeye independently reviewed malware came conclusion crowdstrike—that expert russian hacking groups responsible breach november 2017 us authorities identified 6 russian individuals conducted hack beginning december 2016 russian government arrested sergei mikhailov high ranking government cyber-spy ruslan stoyanov private sector cyber-security expert georgy fomchenkov former government cyber-spy dmitry dokuchaev mikhailov associate charged aiding u.s. intelligence agencies new york times associated dnc hacking although dnc claimed personal financial donor information accessed guccifer 2.0 leaked claimed donor lists detailing dnc campaign contributions gawker smoking gun however information authenticated doubts remain guccifer 2.0 backstory june 2016 person person claimed hacker hacked dnc servers published stolen documents online guccifer 2.0 later also claimed leaked 20.000 emails wikileaks u.s. intelligence community tasked resources debating putin chose summer 2016 escalate active measures influencing u.s. politics director national intelligence james r. clapper said 2011–13 russian protests putin confidence viability politician damaged putin responded propaganda operation former cia officer patrick skinner explained goal spread uncertainty u.s congressman adam schiff ranking member house permanent select committee intelligence commented putin aims said u.s. intelligence agencies concerned russian propaganda speaking disinformation appeared hungary slovakia czech republic poland schiff said increase behavior u.s. schiff concluded russian propaganda operations would continue u.s. election december 9 2016 cia told u.s. legislators u.s. intelligence community concluded russia conducted operations 2016 u.s. election assist donald trump winning presidency multiple u.s intelligence agencies concluded people specific individuals tied russian government gave wikileaks hacked emails democratic national committee d.n.c additional sources john podesta campaign chairman hillary clinton intelligence organizations additionally concluded russia hacked republican national committee r.n.c well d.n.c.—and chose leak information obtained r.n.c cia said foreign intelligence agents russian operatives previously known u.s. cia officials told u.s senators quite clear russia intentions help trump trump released statement december 9 disregarded cia conclusions members u.s. senate intelligence committee traveled ukraine poland 2016 learned russian operations influence affairs u.s senator angus king told portland press herald tactics used russia 2016 u.s. election analogous used countries 30 november 2016 king joined letter seven members u.s. senate intelligence committee asked president obama publicize information intelligence community russia role u.s. election interview cnn senator king warned ignoring problem saying bipartisan issue representatives u.s. congress took action monitor national security united states advancing legislation monitor propaganda 30 november 2016 legislators approved measure within national defense authorization act ask u.s. state department act propaganda inter-agency panel legislation authorized funding 160 million two-year-period initiative developed bipartisan bill countering foreign propaganda disinformation act written u.s senators republican rob portman democrat chris murphy portman urged u.s. government action counter propaganda murphy said election apparent u.s. needed additional tactics fight russian propaganda u.s. senate intelligence committee member ron wyden said frustration covert russian propaganda bipartisan republican u.s senators stated planned hold hearings investigate russian influence 2016 u.s. elections went preference incoming republican president-elect donald trump downplayed potential russian meddling election u.s. senate armed services committee chairman john mccain u.s. senate intelligence committee chairman richard burr discussed plans collaboration investigations russian cyberwarfare election u.s. senate foreign relations committee chairman bob corker planned 2017 investigation senator lindsey graham indicated would conduct sweeping investigation 115th congress december 9 2016 president obama ordered entire united states intelligence community conduct investigation russia attempts influence 2016 u.s. election — provide report left office january 20 2017 lisa monaco u.s homeland security advisor chief counterterrorism advisor president announced study said intrusion foreign nation u.s. national election unprecedented event would necessitate investigation subsequent administrations executive branch intelligence analysis take account data last three presidential elections u.s evidence showed malicious cyberwarfare 2008 2016 u.s. elections | [
1024,
5636,
10252,
4117,
8726,
535,
9761,
4644,
4133,
1608,
3657,
8779,
4703,
8292,
2158,
10875,
3711,
8320,
5764,
2187,
4240,
1688,
2717,
9375,
176,
9904,
9395,
8886,
3789,
7887,
4304,
4314,
9435,
4830,
3807,
1251,
5349,
1254,
10477,
382... | None |
8,289 | 9 | JavaScript_syntax:javascript syntax syntax javascript set rules define correctly structured javascript program examples make use log function console object present browsers standard text output javascript standard library lacks official standard text output function given javascript mainly used client-side scripting within modern web browsers almost web browsers provide alert function alert also used commonly used brendan eich summarized ancestry syntax first paragraph javascript 1.1 specification follows javascript case sensitive common start name constructor capitalised letter name function variable lower-case letter example var a=5 console.log // 5 console.log // throws referenceerror defined spaces tabs newlines used outside string constants called whitespace unlike c whitespace javascript source directly impact semantics technique called automatic semicolon insertion asi statements well formed newline parsed considered complete semicolon inserted prior newline authorities advise supplying statement-terminating semicolons explicitly may lessen unintended effects automatic semicolon insertion two issues five tokens either begin statement extension complete statement five restricted productions line breaks allowed certain positions potentially yielding incorrect parsing five problematic tokens open parenthesis open bracket slash plus minus open parenthesis common immediately-invoked function expression pattern open bracket occurs sometimes others quite rare example given spec b c // treated // b c e .foo suggestion preceding statement terminated semicolon suggest instead use leading semicolons lines starting nowiki /nowiki line accidentally joined previous one known defensive semicolon particularly recommended code may otherwise become ambiguous rearranged example b c // treated // b c // e .foo initial semicolons also sometimes used start javascript libraries case appended another library omits trailing semicolon result ambiguity initial statement five restricted productions return throw break continue post-increment/decrement cases inserting semicolons fix problem makes parsed syntax clear making error easier detect return throw take optional value break continue take optional label cases advice keep value label line statement often shows return statement one might return large object literal might accidentally placed starting new line post-increment/decrement potential ambiguity pre-increment/decrement recommended simply keep line return b // returns undefined treated // return // b // written // return b comment syntax c++ many languages // short one-line comment /* long multi-line comment /* comments /* may nested */ syntax error */ variables standard javascript type attached value stored variable starting es6 version language finalised 2015 variables declared codice_1 block level variable codice_2 function level variable codice_3 immutable one however object assigned codice_3 changed properties es6 variables declared codice_2 statement identifier must start letter underscore dollar sign subsequent characters also digits 0-9 javascript case sensitive letters include characters z uppercase characters z lowercase starting javascript 1.5 iso 8859-1 unicode letters \uxxxx unicode escape sequences used identifiers certain javascript implementations sign used identifier contrary specifications supported newer implementations variables lexically scoped function level block level c depend order forward declaration necessary variable declared inside function point block inside function name resolve variable equivalent block scoping variables forward declared top function referred however variable value codice_6 initialized forward reference possible thus statement middle function equivalent declaration statement top function assignment statement point middle function – declaration hoisted assignment function statements whose effect declare variable type codice_7 assign value similar variable statements addition hoisting declaration also hoist assignment – entire statement appeared top containing function – thus forward reference also possible location function statement within enclosing function irrelevant sure understand var func function .. // hoisted function func .. // hoisted block scoping produced wrapping entire block function executing — known immediately-invoked function expression pattern declaring variable using codice_1 keyword variables declared outside function global variable declared higher scope accessed child functions javascript tries resolve identifier looks local function scope identifier found looks outer function declared local one along scope chain reaches global scope global variables reside still found javascript raise codice_9 exception assigning identifier javascript goes exactly process retrieve identifier except found global scope create variable property global object consequence variable never declared global assigned declaring variable keyword codice_2 global code i.e outside function body assigning never declared identifier adding property global object usually window also create new global variable note javascript strict mode forbids assignment undeclared variable avoids global namespace pollution also codice_3 declared without initialization examples variable declarations scope var x 0 // global variable function function f f console.log z // line raise referenceerror exception value z longer available let i=0 10 i++ console.log console.log // throws referenceerror defined const i=0 10 i++ console.log // throws typeerror assignment constant variable const pi // throws syntaxerror missing initializer const declaration javascript language provides six primitive data types primitive data types also provide set named values represent extents type boundaries named values described within appropriate sections value undefined assigned uninitialized variables also returned checking object properties exist boolean context undefined value considered false value note undefined considered genuine primitive type unless explicitly converted undefined value may behave unexpectedly comparison types evaluate false logical context var test // variable declared defined ... var testobj console.log test // test variable exists value ... console.log testobj.myprop // testobj exists property ... console.log undefined == null // unenforced type check displays true console.log undefined === null // enforce type check displays false note built-in language literal undefined thus foolproof way check whether variable undefined versions ecmascript 5 legal someone write robust approach compare using functions like wo n't work expected function isundefined x var u return x === u // like ... function isundefined x return x === void 0 // ... second one function isundefined x return typeof x === undefined // ... third one calling codice_12 raises unknown identifier whereas n't unlike undefined null often set indicate something declared defined empty boolean context value null considered false value javascript note null true primitive-type within javascript language note case single value performing checks enforce type checking null value equal false types surprisingly considered object console.log null == undefined // unenforced type check displays true console.log null === undefined // enforce type check displays false console.log typeof null === 'object // true numbers represented binary ieee-754 doubles provides accuracy nearly 16 significant digits floating point numbers always exactly represent real numbers including fractions becomes issue comparing formatting numbers example console.log 0.2 0.1 == 0.3 // displays true per ecmascript 6 specifications console.log 0.94 0.01 // displays 0.9299999999999999 result routine method used round numbers whenever formatted output numbers may specified notations 345 // integer although one numeric type javascript 34.5 // floating-point number 3.45e2 // another floating-point equivalent 345 0b1011 // binary integer equal 11 0o377 // octal integer equal 255 0xff // hexadecimal integer equal 255 digits represented ... extents +∞ −∞ nan number number type may obtained two program expressions infinity // positive infinity negative obtained -infinity instance nan // not-a-number value also returned failure ... infinity nan numbers typeof infinity // returns number typeof nan // returns number three special values correspond behave ieee-754 describes number constructor unary may used perform explicit numeric conversion var mystring 123.456 var mynumber1 number mystring var mynumber2 +mystring used constructor numeric wrapper object created though little use mynumericwrapper new number 123.456 however impossible use equality operators codice_13 codice_14 determine whether value nan console.log nan == nan // false console.log nan === nan // false console.log isnan nan // true string javascript sequence characters javascript strings created directly literals placing series characters double single quotes strings must written single line may include escaped newline characters \n javascript standard allows backquote character a.k.a grave accent backtick quote multiline literal strings supported certain browsers 2016 firefox chrome internet explorer 11. var greeting hello world var anothergreeting 'greetings people earth individual characters within string accessed using method provided preferred way accessing individual characters within string also works non-modern browsers var h greeting.charat 0 modern browsers individual characters within string accessed strings single character notation arrays var h greeting 0 however javascript strings immutable greeting 0 h // fails applying equality operator == two strings returns true strings contents means length containing sequence characters case significant alphabets thus var x world var compare1 hello +x == hello world // compare1 contains true var compare2 hello +x == hello world // compare2 contains ... quotes type nested unless escaped var x hello world said // fine var x hello world said // good var x hello world said // works escaping possible create string using constructor var greeting new string hello world objects method returning primitive string wrapped within var new string hello typeof // 'object typeof s.valueof // 'string equality two objects behave string primitives var s1 new string hello var s2 new string hello s1 == s2 // false two distinct objects s1.valueof == s2.valueof // true javascript provides boolean data type literals operator returns string primitive types used logical context empty string evaluate due automatic type coercion values complement previous list evaluate including strings object automatic type coercion equality comparison operators codice_13 codice_16 avoided using type checked comparison operators codice_14 codice_18 type conversion required javascript converts operands follows douglas crockford advocates terms truthy falsy describe values various types behave evaluated logical context especially regard edge cases binary logical operators returned boolean value early versions javascript return one operands instead left–operand returned evaluated case conjunction codice_19 case disjunction codice_20 otherwise right–operand returned automatic type coercion comparison operators may differ cases mixed boolean number-compatible operands including strings evaluated number objects evaluated string boolean operand compared numeric value may unexpected expression explicitly cast boolean primitive doubling logical negation operator using function using conditional operator codice_21 // automatic type coercion console.log true == 2 // false ... true → 1 == 2 ← 2 console.log false == 2 // false ... false → 0 == 2 ← 2 console.log true == 1 // true ... true → 1 === 1 ← 1 console.log false == 0 // true ... false → 0 === 0 ← 0 console.log true == 2 // false ... true → 1 == 2 ← 2 console.log false == 2 // false ... false → 0 == 2 ← 2 console.log true == 1 // true ... true → 1 === 1 ← 1 console.log false == 0 // true ... false → 0 === 0 ← 0 console.log false == // true ... false → 0 === 0 ← console.log false == nan // false ... false → 0 == nan console.log nan == nan // false ... nan equivalent anything including nan // type checked comparison conversion types values console.log true === 1 // false ... data types match // explicit type coercion console.log true === 2 // true ... data types values match console.log true === 0 // false ... data types match values differ console.log 1 true false // true ... ±0 nan “ falsy ” numbers console.log 0 true false // true ... empty string “ falsy ” console.log boolean // true ... objects “ truthy ” new operator used create object wrapper boolean primitive however operator return object wrapper returns objects evaluate method must used retrieve wrapped value explicit coercion boolean type mozilla recommends function without used preference boolean object var boolean b // boolean true var f boolean b.valueof // boolean false var n new boolean b // recommended n new boolean b.valueof // preferred 0 || -0 || || null || undefined || b.valueof || new boolean || else b typeof b === object b.tostring === false new ecmascript6 symbol unique immutable identifier example x=symbol 1 y=symbol 1 x==y // false arr= x arr x =1 arr =2 // x unique keys array arr arr x // displays 1 arr // displays 2 x=symbol 3 arr // displays symbol 1 symbol 1 arr x // undefined x=symbol 1 arr x // undefined symbol wrapper also provides access variable free iterator x= 1,2,3,4 // x array iterable ex=x symbol.iterator // provides iterator x exv=ex.next .value =undefined console.log exv // displays 1,2,3,4 javascript language provides handful native objects javascript native objects considered part javascript specification javascript environment notwithstanding set objects always available array javascript object prototyped array constructor specifically designed store data values indexed integer keys arrays unlike basic object type prototyped methods properties aid programmer routine tasks example join slice push arrays use zero-based indexing scheme value inserted empty array means push method occupies 0th index array var myarray // point variable myarray newly ... myarray.push hello world // fill next empty index case 0 console.log myarray 0 // equivalent console.log hello world arrays length property guaranteed always larger largest integer index used array automatically updated one creates property even larger index writing smaller number length property remove larger indices elements arrays may accessed using normal object property access notation myarray 1 // 2nd item myarray myarray 1 two equivalent possible use dot -notation strings alternative representations number myarray.1 // syntax error myarray 01 // myarray 1 declaration array use either array literal array constructor myarray 0 1 4 5 // array length 6 6 elements ... myarray new array 0 1 2 3 4 5 // array length 6 6 elements myarray new array 365 // empty array length 365 arrays implemented defined elements use memory sparse arrays setting uses space two elements like object length array still reported 58 one use object declaration literal create objects behave much like associative arrays languages dog color brown size large dog color // results brown dog.color // also results brown one use object array declaration literals quickly create arrays associative multidimensional technically javascript support multidimensional arrays one mimic arrays-of-arrays cats color brown size large cats 0 size // results large dogs rover color brown size large dogs spot size // results small dogs.rover.color // results brown date object stores signed millisecond count zero representing 1970-01-01 00:00:00 ut range ±10 days several ways providing arguments date constructor note months zero-based new date // create new date instance representing current time/date new date 2010 2 1 // create new date instance representing 2010-mar-01 00:00:00 new date 2010 2 1 14 25 30 // create new date instance representing 2010-mar-01 14:25:30 new date 2010-3-1 14:25:30 // create new date instance string methods extract fields provided well useful tostring var new date 2010 2 1 14 25 30 // 2010-mar-01 14:25:30 // displays '2010-3-1 14:25:30 console.log d.getfullyear '- d.getmonth 1 '- d.getdate // built-in tostring returns something like 'mon mar 01 2010 14:25:30 gmt-0500 est console.log custom error messages created using error class throw new error something went wrong caught try ... catch ... finally blocks described section exception handling math object contains various math-related constants example functions example cosine note math object constructor unlike array date methods static class methods trigonometric functions use angles expressed radians degrees grads /expression/.test string // returns boolean string .search /expression/ // returns position number string .replace /expression/ replacement // examples /tom/.test name tom console.log hello tom console.log name tom .search /tom/ // == 11 letters tom console.log name tom .replace /tom/ john // == name john // \d digit // \d non digit // \s space // \s non space // \w word char // \w non word // one // one // range /\d/.test 0 console.log 'digit 0-9 /.test 6 console.log 'digit 13579 /.test 1 console.log 'odd number /\s\s\s\s\s\s\s/.test 'my name console.log 'format ok /\w\w\w/.test 'tom console.log 'hello tom a-za-z /.test b console.log 'letter // ... z ... z 0 ... 9 alphanumeric // \u0000 ... \uffff unicode hexadecimal // \x00 ... \xff ascii hexadecimal // \t tab // \n new line // \r cr // character // /t.m/.test 'tom console.log 'hi tom tam tim /a|b/.test console.log b // 0 1 match // 0 // 1 // n exactly n // n n // 0 n n less // n range n /ab c/.test ac console.log ok // match ac abc /ab*c/.test ac console.log ok // match ac abc abbc abbbc etc /ab+c/.test abc console.log ok // match abc abbc abbbc etc /ab 3 c/.test abbbc console.log ok // match abbbc /ab 3 c/.test abbbc console.log ok // match abbbc abbbbc abbbbbc etc /ab 1,3 c/.test abc console.log ok // match abc abbc abbbc // string starts // string ends /^my/.test name tom console.log hi /tom /.test name tom console.log hi tom // groups characters /water mark /.test watermark console.log water // match water watermark tom john /.test john console.log hi tom john // /g global // /i ignore upper/lower case // /m allow matches span multiple lines console.log hi tom .replace /tom/i john // == hi john console.log ratatam .replace /ta/ tu // == ratutam console.log ratatam .replace /ta/g tu // == ratutum my_array my_string.split my_delimiter // example my_array dog cat cow .split // my_array== dog cat cow my_array my_string.match my_expression // example my_array start 11:30 12:15 16:45 .match /\d\d \d\d/g // my_array== 11:30 12:15 16:45 var myre \d 4 -\d 2 -\d 2 \d 2 \d 2 \d 2 var results myre.exec date time 2009-09-08 09:37:08 results else console.log find valid date every function javascript instance function constructor // x argument 'return x function body last argument list var add new function x 'return x var add 1 2 console.log // 3 add function may also defined using function expression var add function x var add 1 2 console.log // 3 exists shorthand assigning function expression variable follows function add x var add 1 2 console.log // 3 var add x // var add x x var add 1 2 console.log // 3 function instance properties methods function subtract x console.log subtract.length // 2 expected amount arguments console.log subtract.tostring function subtract x '+ operator overloaded used string concatenation arithmetic addition may cause problems inadvertently mixing strings numbers unary operator convert numeric string number // concatenate 2 strings console.log 'he 'llo // displays hello // add two numbers console.log 2 6 // displays 8 // adding number string results concatenation console.log 2 2 // displays 22 console.log 3 4 // displays 34 7 may expected console.log 3 4 // displays 7 console.log 3 4 7 // displays 77 numbers stay numbers string added // convert string number console.log 2 === 2 // displays true console.log +'hello // displays nan similarly '* operator overloaded convert string number console.log 2 6'*1 // displays 8 console.log 3* 7 // 21 console.log 3'* 7 // 21 console.log 'hello'*'world // displays nan javascript supports following binary arithmetic operators javascript supports following unary arithmetic operators var x 1 console.log ++x // x becomes 2 displays 2 console.log x++ // displays 2 x becomes 3 console.log x // x 3 displays 3 console.log x -- // displays 3 x becomes 2 console.log x // displays 2 x 2 console.log -- x // x becomes 1 displays 1 modulo operator displays remainder division modulus negative numbers involved returned value depends operand var x 17 console.log x 5 // displays 2 console.log x 6 // displays 5 console.log -x 5 // displays -2 console.log -x -5 // displays -2 console.log x -5 // displays 2 always return non-negative number re-add modulus apply modulo operator var x 17 console.log -x 5+5 5 // displays 3 assignment primitive types var x 9 x += 1 console.log x // displays 10 x *= 30 console.log x // displays 300 x /= 6 console.log x // displays 50 x -= 3 console.log x // displays 47 x 7 console.log x // displays 5 assignment object types /** var object_1 1 // assign reference newly created object object_1 var object_2 0 var object_3 object_2 // object_3 references object object_2 object_3.a 2 message // displays 1 2 2 object_2 object_1 // object_2 references object object_1 message // displays 1 1 2 object_2.a 7 // modifies object_1 message // displays 7 7 2 object_3.a 5 // object_3 n't change object_2 message // displays 7 7 5 object_3 object_2 object_3.a=4 // object_3 changes object_1 object_2 message // displays 4 4 4 function message mozilla javascript since version 1.7 destructuring assignment allows assignment parts data structures several variables left hand side assignment pattern resembles arbitrarily nested object/array literal containing l-lvalues leaves receive substructures assigned value var b c e b c 3 4 5 console.log b c // displays 3,4,5 e foo 5 bar 6 baz 'baz 'content var arr baz arr 0 arr 3 foo bar b e console.log b arr // displays 5,6 baz ,content b b // swap contents b console.log b // displays 6,5 b c 3 4 5 // permutations b c b c console.log b c // displays 4,5,3 ecmascript 2015 standard introduces ... operator related concepts spread syntax rest parameters spread syntax provides another way destructure arrays indicates elements specified array used parameters function call items array literal words ... transforms ... foo foo 0 foo 1 foo 2 this.bar ... foo this.bar foo 0 foo 1 foo 2 var 1 2 3 4 // used multiple times expression var b ... ... // b 1 2 3 4 1 2 3 4 // combined non-spread items var c 5 6 ... 7 9 // c 5 6 1 2 3 4 7 9 // comparison without spread operator // creates nested array var // 1 2 3 4 1 2 3 4 // works function calls function foo arg1 arg2 arg3 // use even passes parameters function use foo ... // 1:2:3 → foo 0 1 2 3 // mix non-spread parameters foo 5 ... 6 // 5:1:2 → foo 5 0 1 2 3 6 // comparison without spread operator // assigns array arg1 nothing parameters foo // 1,2,3,4 undefined undefined ... used function declaration indicates rest parameter rest parameter must final named parameter function parameter list assigned array containing arguments passed function excess named parameters words gets rest arguments passed function hence name function foo b ... c foo 1 2 3 4 5 // 3 → c 3 4 5 foo b // 0 → c rest parameters similar javascript arguments object array-like object contains parameters named unnamed current function call unlike arguments however rest parameters true array objects methods .slice .sort used directly ... operator used array objects however proposal extend objects future ecmascript standard variables referencing objects equal identical reference object var obj1 1 var obj2 1 var obj3 obj1 console.log obj1 == obj2 //false console.log obj3 == obj1 //true console.log obj3 === obj1 //true see also string javascript provides four logical operators context logical operation expression evaluates true except following boolean function used explicitly convert primitive type boolean // empty strings return false console.log boolean === false console.log boolean false === true console.log boolean 0 === true // zero nan return false console.log boolean nan === false console.log boolean 0 === false console.log boolean -0 === false // equivalent -1*0 console.log boolean -2 === true // objects return true console.log boolean === true console.log boolean === true console.log boolean === true // types return false console.log boolean null === false console.log boolean undefined === false // equivalent boolean operator evaluates operand boolean returns negation using operator twice row double negative explicitly converts expression primitive type boolean console.log 0 === boolean 0 console.log boolean 0 === 1 console.log 1 === boolean 1 console.log 0 === boolean 0 console.log boolean 0 === 1 console.log 1 === boolean 1 console.log === boolean console.log boolean === console.log === boolean console.log === boolean console.log boolean === console.log === boolean ternary operator also used explicit conversion console.log == false console.log true false // “ truthy ” comparison uses .tostring console.log 0 == false console.log 0 true false // 0 .tostring == 0 console.log 0 == false console.log 0 true false // 0 → 0 ... 0 == 0 ... 0 ← false console.log 1 == true console.log 1 true false // 1 .tostring == 1 console.log 1 == true console.log 1 true false // 1 → 1 ... 1 == 1 ... 1 ← true console.log 2 true console.log 2 true false // 2 .tostring == 2 console.log 2 true console.log 2 true false // 2 → 2 ... 2 1 ... 1 ← true expressions use features post–incrementation i++ anticipated side effect javascript provides short-circuit evaluation expressions right operand executed left operand suffice determine value expression console.log || b // true reason evaluate b. console.log b // false reason evaluate b. console.log c f // c true reason evaluate f. early versions javascript jscript binary logical operators returned boolean value like c-derived programming languages however contemporary implementations return one operands instead console.log || b // true return otherwise return b console.log b // false return otherwise return b programmers familiar behavior c might find feature surprising allows concise expression patterns like null coalescing var || default // assigns default value null empty etc javascript supports following binary bitwise operators examples x=11 6 console.log x // 2 javascript supports following unary bitwise operator javascript supports following binary assignment operators examples x=7 console.log x // 7 x « =3 console.log x // 7- 14- 28- 56 examples str ab cd // abcd str += e // abcde str2 2 2 // 22 4 4 pair curly brackets enclosed sequence statements constitute compound statement used wherever statement used expr else expr2 else conditional operator creates expression evaluates one two expressions depending condition similar statement selects one two statements execute depending condition i.e. conditional operator expressions statements unlike statement conditional operator omit else-branch syntax javascript switch statement follows syntax javascript loop follows syntax javascript codice_22 follows var property_name some_object syntax javascript loop follows condition syntax javascript codice_24 follows condition statement adds given object properties methods following block scope letting referenced local variables document semantics similar statement pascal availability statements hinders program performance believed reduce code clarity since given variable could actually property enclosing statement allowed strict mode javascript supports nested labels implementations loops blocks labelled break statement loops continue although goto reserved word goto implemented javascript loop1 var 0 10 a++ block1 goto block1 // parse error function block possibly empty parameter list normally given name function may use local variables exit function without return statement value returned function gcd segmenta segmentb console.log gcd 60 40 // 20 var mygcd gcd // mygcd reference function gcd note argument s. console.log mygcd 60 40 // 20 functions first class objects may assigned variables number arguments given calling function may necessarily correspond number arguments function definition named argument definition matching argument call value implicitly cast false within function arguments may also accessed object provides access arguments using indices e.g including beyond number named arguments arguments list .length property instance methods etc function add7 x add7 3 // 11 add7 3 4 // 9 primitive values number boolean string passed value objects reference object passed var obj1 1 var obj2 b 2 function foo p foo obj1 3 // affect obj1 3 additional parameter console.log obj1.a obj2.b // writes 1 3 functions declared inside functions access outer function local variables furthermore implement full closures remembering outer function local variables even outer function exited var v top var bar baz function foo foo baz fugly bar // fugly fud even though foo exited console.log v // top convenience types normally subdivided primitives objects objects entities identity equal map property names values slots prototype-based programming terminology objects may thought associative arrays hashes often implemented using data structures however objects additional features prototype chain ordinary associative arrays javascript several kinds built-in objects namely array boolean date function math number object regexp string objects host objects defined language runtime environment example browser typical host objects belong dom window form links etc. objects created using constructor object literal constructor use either built-in object function custom function convention constructor functions given name starts capital letter // constructor var anobject new object // object literal var objecta var objecta2 // a2 create new objects copies var objectb index1 'value 1 index2 'value 2 // custom constructor see object literals array literals allow one easily create flexible data structures var mystructure basis json simple notation uses javascript-like syntax data exchange method simply function assigned property name object unlike many object-oriented languages distinction function definition method definition object-related javascript rather distinction occurs function calling function called method called method standard local variable automatically set object instance left also methods set explicitly—some packages jquery unusual things example foo used constructor nothing special constructor plain function initialises object used keyword norm set newly created blank object note example foo simply assigning values slots functions thus assign different functions different instances prototyping example function foo yz var foo1 new foo 1 var foo2 new foo 0 foo2.prefix b- console.log foo1/2 foo1.pyz foo2.pyz // foo1/2 a-y b-z foo1.m3 px // assigns function evaluated result i.e px var baz prefix c- baz.m4 px // need constructor make object console.log m1/m3/m4 foo1.m1 foo1.m3 baz.m4 // m1/m3/m4 a-x a-x c-x foo1.m2 // throws exception foo1.m2 n't exist constructor functions simply assign values slots newly created object values may data functions example manipulating object function myobject attributea attributeb myobject.staticc blue // myobject function object console.log myobject.staticc // blue object new myobject 'red 1000 console.log object.attributea // red console.log object attributeb // 1000 console.log object.staticc // undefined object.attributec new date // add new property delete object.attributeb // remove property object console.log object.attributeb // undefined delete object // remove whole object rarely used console.log object.attributea // throws exception constructor referenced object prototype constructor slot // use 'new sets prototype slots example // x new foo would set x prototype foo.prototype // foo.prototype constructor slot pointing back foo x new foo // almost equivalent y.constructor foo y.constructor // except x.constructor == y.constructor // true x instanceof foo // true instanceof foo // false // prototype object.prototype // foo.prototype since initialised // instead new foo // even though foo set constructor slot // ignored instanceof prototype's // constructor slot considered functions objects used produce effect similar static properties using c++/java terminology shown function object also special prototype property discussed inheritance section object deletion rarely used scripting engine garbage collect objects longer referenced javascript supports inheritance hierarchies prototyping manner self following example class inherits class created reference base instance copied derive contain value retrieved accessed made clear changing value reflected value implementations allow prototype accessed set explicitly using slot shown function base function derived base new base derived.prototype base // must new derived derived.prototype.constructor derived // required make instanceof work new derived // copies derived.prototype instance hidden prototype slot instanceof derived // true instanceof base // true d.anoverride // derived :anoverride d.abasefunction // base :anewbasefunction console.log d.abasefunction == derived.prototype.abasefunction // true console.log d.__proto__ == base // true mozilla-based implementations false many others following shows clearly references prototypes copied instance creation changes prototype affect instances refer base.prototype.m m2 bar new base console.log bar.m bar.m // bar.m two new top foo new base base.prototype // effect foo *reference* copied console.log foo.m foo.m // foo.m two baz new base console.log baz.m baz.m // baz.m three t.m m1 // affect baz derived classes console.log baz.m1 baz.m // baz.m1 one practice many variations themes used powerful confusing javascript includes codice_25 exception handling statement handle run-time errors codice_25 statement catches exceptions resulting error throw statement syntax follows try catch errorvalue finally initially statements within try block execute exception thrown script control flow immediately transfers statements catch block exception available error argument otherwise catch block skipped catch block want handle specific error case statements finally block always executed used free resources although memory automatically garbage collected either catch finally clause may omitted catch argument required mozilla implementation allows multiple catch statements extension ecmascript standard follow syntax similar used java browser event commonly used trap exceptions onerror function errorvalue url linenr ... return true evaluates expression string parameter include assignment statements variables local functions referenced expression function foo // shows val 9 | [
1152,
2304,
5635,
8068,
3462,
6791,
8582,
1802,
6154,
10510,
9871,
6160,
8854,
155,
3229,
8605,
6176,
1698,
803,
5031,
5677,
1203,
5684,
438,
4920,
1470,
5311,
2880,
7871,
963,
5067,
8524,
10571,
339,
8531,
7894,
4056,
9560,
9561,
603,
... | None |
8,290 | 2 | Basic_sequential_access_method:basic sequential access method ibm mainframe operating systems basic sequential access method bsam access method read write datasets sequentially bsam available os/360 os/vs2 mvs z/os related operating systems bsam used devices naturally sequential punched card readers punches line printers magnetic tape also used data devices could also addressed directly magnetic disks bsam offers device independence extent possible api calls used different devices bsam allows programs read write physical blocks data opposed powerful less flexible queued sequential access method qsam allows programs access logical records within physical blocks data bsam user must aware possibility encountering short truncated blocks blocks within dataset shorter blksize dataset particularly end dataset also many cases within dataset qsam none limitations programmer specifies codice_1 data control block dcb indicate use bsam basic access method bsam reads writes member data blocks i/o operation proceeds asynchronously must tested completion using codice_2 macro bsam uses standard system macros codice_3 codice_4 codice_5 codice_6 codice_2 codice_8 macro instruction returns position last block read written codice_9 macro reposition location identified previous codice_8 dataset unblocked logical record length lrecl equal physical block size blksize bsam may utilized simulate directly accessed dataset using codice_8 codice_9 supported direct access device type devd=da primitive applications designed way bsam application program interface compared interface offered open read write close calls using file handles operating systems unix windows codice_9 provides analog seek lseek ftell equivalent codice_8 | [
868,
4645,
7272,
7881,
2616,
4586,
8393,
6797,
7053,
7983,
8272,
10094,
10958,
5492,
3669,
2168,
11131
] | None |
8,291 | 1 | Entity–attribute–value_model:entity–attribute–value model entity–attribute–value model eav data model encode space-efficient manner entities number attributes properties parameters used describe potentially vast number actually apply given entity relatively modest entities correspond mathematical notion sparse matrix eav also known object–attribute–value model vertical database model open schema data representation analogous space-efficient methods storing sparse matrix non-empty values stored eav data model attribute-value pair fact describing entity row eav table stores single fact eav tables often described long skinny long refers number rows skinny columns data recorded three columns consider one would try represent general-purpose clinical record relational database clearly creating table set tables thousands columns feasible vast majority columns would null complicate things longitudinal medical record follows patient time may multiple values parameter height weight child example change child grows finally universe clinical findings keeps growing example diseases emerge new lab tests devised would require constant addition columns constant revision user interface situation list attributes changes frequently termed attribute volatility database parlance following shows snapshot eav table clinical findings visit doctor fever morning 1/5/98 entries shown within angle brackets references entries tables shown text rather encoded foreign key values ease understanding example values literal values could also pre-defined value lists latter particularly useful possible values known limited i.e. enumerable example illustrates symptoms findings might seen patient pneumonia eav data described comparable contents supermarket sales receipt would reflected sales line items table database receipt lists details items actually purchased instead listing every product shop customer might purchased n't like clinical findings given patient sales receipt sparse row modeling facts something case sales transaction recorded multiple rows rather multiple columns standard data modeling technique differences row modeling eav may considered generalization row-modeling clinical data repository row modeling also finds numerous uses laboratory test subschema typically modeled way lab test results typically numeric encoded numerically circumstances would need go beyond standard row-modeling eav listed situation arises ontology-modeling environments categories classes must often created fly classes often eliminated subsequent cycles prototyping certain hybrid classes attributes non-sparse present instances attributes highly variable sparse latter suitable eav modeling example descriptions products made conglomerate corporation depend product category e.g. attributes necessary describe brand light bulb quite different required describe medical imaging device common attributes packaging unit per-item cost clinical data entity typically clinical event described general-purpose settings entity foreign key objects table records common information every object thing database – minimum preferred name brief description well category/class entity belongs every record object table assigned machine-generated object id objects table approach pioneered tom slezak colleagues lawrence livermore laboratories chromosome 19 database standard large bioinformatics databases use objects table mandate concurrent use eav design conventional tables used store category-specific details object major benefit central objects table supporting table object synonyms keywords one provide standard google-like search mechanism across entire system user find information object interest without first specify category belongs important bioscience systems keyword like acetylcholine could refer either molecule neurotransmitter biological receptor binds eav table attribute id foreign key attribute definitions table stated however usually multiple metadata tables contain attribute-related information discussed shortly coercing values strings eav data example results simple non-scalable structure constant data type inter-conversions required one wants anything values index value column eav table essentially useless also convenient store large binary data images base64 encoded form table small integers strings therefore larger systems use separate eav tables data type including binary large objects blobs metadata given attribute identifying eav table data stored approach actually quite efficient modest amount attribute metadata given class form user chooses work cached readily memory however requires moving data one table another attribute ’ data type changed happen often mistakes made metadata definition database schema design eav general-purpose means knowledge representation originated concept association lists attribute-value pairs commonly used today first introduced language lisp attribute-value pairs widely used diverse applications configuration files using simple syntax like attribute value example non-database use eav uima uniform information management architecture standard managed apache foundation employed areas natural language processing software analyses text typically marks annotates segment example provided uima tutorial program performs named-entity recognition ner document annotating text segment president bush annotation-attribute-value triple person full_name george w. bush annotations may stored database table eav direct connection av-pairs stead hammond appear first conceived use persistent storage arbitrarily complex data first medical record systems employ eav regenstrief electronic medical record effort led clement macdonald william stead ed hammond tmr medical record system help clinical data repository cdr created homer warner group lds hospital salt lake city utah regenstrief system actually used patient-attribute-timestamp-value design use timestamp supported retrieval values given patient/attribute chronological order systems developed 1970s released commercial systems based e.f. codd relational database model available though help much later ported relational architecture commercialized 3m corporation note codd landmark paper published 1970 heavily mathematical tone unfortunate effect diminishing accessibility among non-computer-science types consequently delaying model acceptance software-vendor circles value subsequent contribution christopher j date codd colleague ibm translating ideas accessible language accompanied simple examples illustrated power overestimated group columbia-presbyterian medical center first use relational database engine foundation eav system open-source trialdb clinical study data management system nadkarni et al first use multiple eav tables one dbms data type eav/cr framework designed primarily luis marenco prakash nadkarni overlaid principles object orientation onto eav built tom slezak object table approach described earlier entity section senselab publicly accessible neuroscience database built eav/cr framework additionally numerous commercial applications use aspects eav internally including oracle designer applied er modeling kalido applied data warehousing master data management lazysoft sentences applied custom software development eav system sit top tabular structure instead directly b tree infinitydb eliminates need one table per value data type term eav database refers database design significant proportion data modeled eav however even database described eav-based tables system traditional relational tables noted eav modeling makes sense categories data clinical findings attributes numerous sparse conditions hold standard relational modeling i.e. one column per attribute preferable using eav mean abandoning common sense principles good relational design clinical record systems subschemas dealing patient demographics billing typically modeled conventionally vendor database schemas proprietary vista system used throughout united states department veterans affairs va medical system known veterans health administration vha open-source schema readily inspectable though uses mumps database engine rather relational database discussed shortly eav database essentially unmaintainable without numerous supporting tables contain supporting metadata metadata tables typically outnumber eav tables factor least three typically standard relational tables example metadata table attribute definitions table mentioned simple eav design values attribute simple primitive data types far database engine concerned however eav systems used representation highly diverse data possible given object class instance may substructure attributes may represent kinds objects turn may substructure arbitrary level complexity car example engine transmission etc. engine components cylinders permissible substructure given class defined within system attribute metadata discussed later thus example attribute random-access-memory could apply class computer class engine represent substructure one incorporates special eav table value column contains references entities system i.e. foreign key values objects table get information given object requires recursive traversal metadata followed recursive traversal data stops every attribute retrieved simple atomic recursive traversal necessary whether details individual class represented conventional eav form traversal performed standard object–relational systems example practice number levels recursion tends relatively modest classes performance penalties due recursion modest especially indexing object ids eav/cr eav classes relationships refers framework supports complex substructure name somewhat misnomer outshoot work eav systems practice many even classes system may represented standard relational form based whether attributes sparse dense eav/cr really characterized detailed metadata rich enough support automatic generation browsing interfaces individual classes without write class-by-class user-interface code basis browser interfaces possible generate batch dynamic sql queries independent class object first consulting metadata using metadata information generate sequence queries data tables queries may arbitrarily recursive approach works well object-at-a-time queries web-based browsing interfaces clicking name object brings details object separate page metadata associated object class also facilitates presentation object details includes captions individual attributes order presented well grouped one approach eav/cr allow columns hold json structures thus provide needed class structure example postgresql version 9.4 offers json binary column jsonb support allowing json attributes queried indexed joined words prof. dr. daniel masys formerly chair vanderbilt university medical informatics department challenges working eav stem fact eav database physical schema way data stored radically different logical schema – way users many software applications statistics packages regard i.e. conventional rows columns individual classes eav table conceptually mixes apples oranges grapefruit chop suey want analysis data using standard off-the-shelf software cases convert subsets columnar form process called pivoting important enough discussed separately metadata helps perform sleight hand lets users interact system terms logical schema rather physical software continually consults metadata various operations data presentation interactive validation bulk data extraction ad hoc query metadata actually used customize behavior system eav systems trade simplicity physical logical structure data complexity metadata among things plays role database constraints referential integrity standard database designs tradeoff generally worthwhile typical mixed schema production systems data conventional relational tables also benefit functionality automatic interface generation structure metadata complex enough comprises subschema within database various foreign keys data tables refer tables within subschema subschema standard-relational features constraints referential integrity used hilt correctness metadata contents terms intended system behavior critical task ensuring correctness means creating eav system considerable design efforts must go building user interfaces metadata editing used people team know problem domain e.g. clinical medicine necessarily programmers historically one main reasons pre-relational tmr system failed adopted sites home institution metadata stored single file non-intuitive structure customizing system behavior altering contents file without causing system break delicate task system authors trusted eav system implemented rdf rdf schema language may conveniently used express metadata schema information may used eav database engine dynamically re-organize internal table structure best efficiency final caveats regarding metadata validation presentation grouping metadata make possible creation code frameworks support automatic user interface generation data browsing well interactive editing production system delivered web task validation eav data essentially moved back-end/database tier powerless respect task middle /web server tier back-end validation always ideal impossible subvert attempting direct data entry table middle tier validation generic framework quite workable though significant amount software design effort must go building framework first availability open-source frameworks studied modified individual needs go long way avoiding wheel reinvention eav modeling alternative terms generic data modeling open schema long standard tool advanced data modelers like advanced technique double-edged used judiciously also employment eav preclude employment traditional relational database modeling approaches within database schema emrs rely rdbms cerner use eav approach clinical-data subschema vast majority tables schema fact traditionally modeled attributes represented individual columns rather rows modeling metadata subschema eav system fact good fit traditional modeling inter-relationships various components metadata trialdb system example number metadata tables schema outnumber data tables ten one correctness consistency metadata critical correct operation eav system system designer wants take full advantages features rdbmss provide referential integrity programmable constraints rather reinvent rdbms-engine wheel consequently numerous metadata tables support eav designs typically third-normal relational form commercial electronic health record systems ehrs use row-modeling classes data diagnoses surgical procedures performed laboratory test results segregated separate tables table entity composite patient id date/time diagnosis made surgery lab test performed attribute foreign key specially designated lookup table contains controlled vocabulary e.g. icd-10 diagnoses current procedural terminology surgical procedures set value attributes e.g. laboratory-test results one may record value measured whether normal low high range id person responsible performing test date/time test performed stated earlier full-fledged eav approach domain attributes given table restricted domain product ids supermarket sales table would restricted domain products products table however capture data parameters always defined standard vocabularies ehrs also provide pure eav mechanism specially designated power-users define new attributes data type maximum minimal permissible values permissible set values/codes allow others capture data based attributes epic tm ehr mechanism termed flowsheets commonly used capture inpatient nursing observation data typical case using eav model highly sparse heterogeneous attributes clinical parameters electronic medical record emrs stated even however accurate state eav modeling principle applied sub-schema database rather contents patient demographics example naturally modeled one-column-per-attribute traditional relational structure consequently arguments eav vs. relational design reflect incomplete understanding problem eav design employed sub-schema database sparse attributes need modeled even need supported third normal form metadata tables relatively database-design problems sparse attributes encountered circumstances eav design applicable relatively rare even encountered set eav tables way address sparse data xml-based solution discussed applicable maximum number attributes per entity relatively modest total volume sparse data also similarly modest example situation problems capturing variable attributes different product types sparse attributes may also occur e-commerce situations organization purchasing selling vast highly diverse set commodities details individual categories commodities highly variable magento e-commerce software employs eav approach address issue another application eav modeling classes attributes sparse dynamic number data rows per class relatively modest – couple hundred rows typically dozen – system developer also required provide web-based end-user interface within short turnaround time dynamic means new classes attributes need continually defined altered represent evolving data model scenario occur rapidly evolving scientific fields well ontology development especially prototyping iterative refinement phases creation new tables columns represent new category data especially labor-intensive programming web-based interfaces support browsing basic editing type- range-based validation case maintainable long-term solution create framework class attribute definitions stored metadata software generates basic user interface metadata dynamically eav/cr framework mentioned earlier created address situation note eav data model essential system designer may consider acceptable alternative creating say sixty tables containing total two thousand rows number rows per class efficiency considerations less important standard indexing class id/attribute id dbms optimizers easily cache data small class memory running query involving class attribute dynamic-attribute scenario worth noting resource description framework rdf employed underpinning semantic-web-related ontology work rdf intended general method representing information form eav rdf triple comprises object property value end jon bentley book writing efficient programs author warns making code efficient generally also makes harder understand maintain one rush tweak code unless one first determined performance problem measures code profiling pinpointed exact location bottleneck done modify specific code needs run faster similar considerations apply eav modeling apply sub-system traditional relational modeling known priori unwieldy clinical data domain discovered system evolution pose significant maintenance challenges database guru currently vice-president core technologies oracle corporation tom kyte example correctly points drawbacks employing eav traditional business scenarios makes point mere flexibility sufficient criterion employing eav however makes sweeping claim eav avoided circumstances even though oracle health sciences division employs eav model clinical-data attributes commercial systems clintrial oracle clinical achilles heel eav difficulty working large volumes eav data often necessary transiently permanently inter-convert columnar row-or eav-modeled representations data error-prone done manually well cpu-intensive generic frameworks utilize attribute attribute-grouping metadata address former latter limitation use less mandated case mixed schemas contain mixture conventional-relational eav data error quotient significant conversion operation called pivoting pivoting required eav data also form row-modeled data example implementations apriori algorithm association analysis widely used process supermarket sales data identify products purchasers given product also likely buy pivot row-modeled data first step many database engines proprietary sql extensions facilitate pivoting packages microsoft excel also support circumstances pivoting necessary considered however structure eav data model perfect candidate relational division see relational algebra good indexing strategy possible get response time less hundred milliseconds billion row eav table microsoft sql server mvp peter larsson proved laptop made solution general available obviously matter approaches take querying eav fast querying standard column-modeled relational data certain types query much way access elements sparse matrices fast non-sparse matrices latter fit entirely main memory sparse matrices represented using structures linked lists require list traversal access element given x-y position access elements matrices represented 2-d arrays performed using fast cpu register operations however chose eav approach correctly problem trying solve price pay respect eav modeling example space schema maintenance versus cpu-time tradeoff originally postulated maier ullman vardi universal data model udm seeks simplify query complex relational schema naive users creating illusion everything stored single giant universal table utilizing inter-table relationships user need concerned table contains attribute c.j date however pointed circumstances table multiply related another genealogy databases individual father mother also individuals business databases addresses stored centrally organization different office addresses shipping addresses insufficient metadata within database schema specify unambiguous joins udm commercialized sap businessobjects limitation worked around creation universes relational views predefined joins sets tables universe developer disambiguates ambiguous joins including multiply-related table view multiple times using different aliases apart way data explicitly modeled udm simply uses relational views intercede user database schema eav differs universal data models also applies transactional systems query oriented read-only systems udm also used basis clinical-data query systems eav implementations necessarily shield user specify class object interest eav-based i2b2 clinical data mart example user searches term option specifying category data user interested example phrase lithium refer either medication used treat bipolar disorder laboratory assay lithium level patient blood blood level lithium must monitored carefully much drug causes severe side effects little ineffective open schema implementation use xml column table capture variable/sparse information similar ideas applied databases support json-valued columns sparse hierarchical data represented json database json support postgresql partially sql server 2016 later attributes queried indexed joined offer performance improvements 1000x naive eav implementations. necessarily make overall database application robust note two ways xml json data stored one way store plain string opaque database server way use database server see structure obviously severe drawbacks storing opaque strings queried directly one form index based contents impossible perform joins based content building application manage data gets extremely complicated using eav models extent infrastructure developed terms metadata tables application-framework code using xml solves problem server-based data validation must done middle-tier browser-based code eav-based frameworks following drawbacks drawbacks remediable creating layer metadata application code creating original advantage create framework vanished fact modeling sparse data attributes robustly hard database-application-design problem matter storage approach used sarka work however proves viability using xml field instead type-specific relational eav tables data-storage layer situations number attributes per entity modest e.g. variable product attributes different product types xml-based solution compact eav-table-based one xml may regarded means attribute-value data representation though based structured text rather relational tables exist several approaches representation tree-structured data xml json formats nested set model relational database hand database vendors begun include json xml support data structures query features like ibm db2 xml data stored xml separate tables using xpath queries part sql statements postgresql json data type indexed queried developments accomplish improve substitute eav model approach noted however uses json xml necessarily use eav model though overlap xml preferable eav arbitrarily hierarchical data relatively modest volume single entity intended scale multi-gigabyte level respect data-manipulation performance xml concerned per-se sparse-attribute problem data model underlying information represented decomposed straightforwardly relational structure xml better suited means data interchange primary storage mechanism eav stated earlier specifically applicable sparse-attribute scenario scenario holds use datatype-specific attribute-value tables indexed entity attribute value manipulated simple sql statements vastly scalable use xml tree structure google app engine mentioned uses strongly-typed-value tables good reason alternative approach managing various problems encountered eav-structured data employ graph database represent entities nodes graph hypergraph attributes links edges graph issue table joins addressed providing graph-specific query languages apache tinkerpop opencog atomspace pattern matcher postgresql version 9.4 includes support json binary columns jsonb queried indexed joined allows performance improvements factors thousand traditional eav table designs db schema based jsonb always less tables one may nest attribute-value pairs jsonb type fields entity table makes db schema easy comprehend sql queries concise programming code manipulate database objects abstraction layer turns much shorter microsoft sql server 2008 offers proprietary alternative eav columns atomic data type e.g. numeric varchar datetime columns designated sparse simply including word sparse column definition create table statement sparse columns optimize storage null values take space useful majority records table null values column indexes sparse columns also optimized rows values indexed addition contents sparse columns particular row table collectively aggregated single xml column column set whose contents form codice_1 fact column set defined table part create table statement sparse columns subsequently defined typically added interesting consequence sql statement codice_2 return individual sparse columns concatenate single xml column whose name column set therefore acts virtual computed column sparse columns convenient business applications product information applicable attributes highly variable depending product type total number variable attributes per product type relatively modest however approach modeling sparse attributes several limitations rival dbmss notably chosen borrow idea engines limitations include many cloud computing vendors offer data stores based eav model arbitrary number attributes associated given entity roger jennings provides in-depth comparison amazon offering simpledb data type limited strings data intrinsically non-string must coerced string e.g. numbers must padded leading zeros wish perform operations sorting microsoft offering windows azure table storage offers limited set data types byte bool datetime double guid int long string google app engine offers greatest variety data types addition dividing numeric data int long float also defines custom data types phone number e-mail address geocode hyperlink google amazon microsoft lets define metadata would prevent invalid attributes associated particular class entity letting create metadata model google lets operate data using subset sql microsoft offer url-based querying syntax abstracted via linq provider amazon offer limited syntax concern built-in support combining different entities joins currently april '10 non-existent three engines operations performed application code may concern application servers co-located data servers vendor data center lot network traffic would generated two geographically separated eav approach justified attributes modeled numerous sparse data captured meet requirement cloud vendors default eav approach often mismatch applications require true back-end database opposed merely means persistent data storage retrofitting vast majority existing database applications use traditional data-modeling approach eav-type cloud architecture would require major surgery microsoft discovered example database-application-developer base largely reluctant invest effort recently therefore microsoft provided premium offering – cloud-accessible full-fledged relational engine sql server azure allows porting existing database applications modest changes one limitation sql azure physical databases limited 500gb size microsoft recommends data sets larger split multiple physical databases accessed parallel queries | [
2688,
5632,
3462,
10632,
8201,
2059,
9631,
1697,
10145,
11683,
7076,
7080,
10921,
9397,
4155,
7868,
9147,
11324,
11457,
6085,
9286,
10693,
2512,
10452,
2901,
7767,
11098,
8539,
479,
4065,
4194,
7650,
7780,
9828,
6502,
10471,
2024,
6770,
459... | Test |
8,292 | 4 | TLBleed:tlbleed tlbleed cryptographic side-channel attack uses machine learning exploit timing side-channel via translation look-aside buffer tlb modern microprocessors use simultaneous multithreading attack demonstrated experimentally intel processors speculated processors may also potentially vulnerable variant attack proof concept demonstrated recent news amd indicates processors vulnerable attack attack led openbsd project disabling simultaneous multithreading intel microprocessors openbsd project leader theo de raadt stated attack could theoretically addressed preventing tasks different security contexts sharing physical cores fix currently impractical complexity problem | [
1024,
5636,
4117,
8726,
535,
9761,
4644,
4133,
7218,
1608,
3657,
8779,
8273,
4703,
8288,
10875,
3711,
8320,
5764,
2187,
4240,
1688,
2717,
9375,
9904,
9395,
8886,
3789,
4304,
4314,
9435,
4830,
3807,
5349,
1254,
10477,
9460,
7418,
2815,
384... | Test |
8,293 | 9 | MultiLisp:multilisp multilisp functional programming language dialect language lisp dialect scheme extended constructs parallel computing execution shared memory extensions involve side effects rendering multilisp nondeterministic along parallel-programming extensions multilisp also unusual garbage collection task scheduling algorithms like scheme multilisp optimized symbolic computing unlike parallel programming languages multilisp incorporated constructs causing side effects explicitly introducing parallelism designed robert h. halstead jr. early 1980s use 32-processor concert multiprocessor developed massachusetts institute technology mit implemented interlisp influenced development scheme dialects gambit interlisp-vax multilisp achieves parallelism pcall macro codice_1 equivalent codice_2 except arguments codice_3 etc explicitly allowed evaluated parallel circumvents usual order evaluation sequential left right also makes use parallel programming construct called futures resembles forking combined lazy evaluation using construct expression codice_4 written overlap evaluation expressions b computations use result cons call operation performed needs correct information value b | [
10752,
4101,
11269,
2056,
9224,
2062,
9231,
7184,
2577,
9749,
8728,
4633,
4122,
8226,
3119,
2105,
3132,
6717,
8258,
8771,
8262,
1613,
9299,
10841,
3675,
7267,
2660,
2666,
8815,
5751,
7805,
9345,
1159,
9865,
9877,
5803,
2225,
7867,
4799,
7... | None |
8,294 | 7 | Apache_Tajo:apache tajo apache tajo big data relational distributed data warehouse system apache hadoop designed tajo targeting low-latency scalable ad-hoc queries online aggregation etl feature follows sample statement create sql table may look like follows | [
10377,
6797,
7567,
1296,
1047,
8217,
11161,
6555,
8860,
3877,
10661,
11303,
7983,
823,
4919,
5047,
4538,
1851,
7485,
7742,
9789,
7233,
6338,
1222,
1991,
4294,
7750,
5066,
8139,
4944,
1363,
8408,
9179,
7261,
990,
8799,
10719,
865,
11235,
1... | None |
8,295 | 1 | Drizzle_(database_server):drizzle database server drizzle abandoned free software/open-source relational database management system dbms forked now-defunct 6.0 development branch mysql dbms like mysql drizzle client/server architecture uses sql primary command language old drizzle files distributed version 2 3 gnu general public license gpl portions including protocol drivers replication messaging bsd license early work fork done mid-2008 brian aker ongoing development handled team contributors includes staff members canonical ltd. google six apart sun microsystems rackspace data differential blue gecko intel percona hewlett-packard red hat others drizzle source code along instructions compiling available via project launchpad website october 2010 drizzle 13,478 total contributions 96 total contributors 37 active contributors also announced drizzle entered beta first ga version released march 2011 drizzle actively participated google summer code project since 2010 drizzle targeted web-infrastructure cloud computing markets developers product describe smaller slimmer hopefully faster version mysql drizzle written c++ programming language stores string data utf-8 format developed modern unix-like operating systems including linux freebsd mac os x solaris – general os conforms posix working implementation gnu autotools microsoft windows supported time mainly lack autotools support discussion accomplish sensible manner drizzle re-designed version mysql v6.0 codebase designed around central concept microkernel architecture features query cache authentication system plugins database follow general theme pluggable storage engines introduced mysql 5.1 supports pam ldap http auth authentication via plugins ships via plugin system currently supports logging files syslog remote services rabbitmq gearman drizzle acid-compliant relational database supports transactions via mvcc design plugin points added support replication storage engines query rewrite table functions user-defined functions protocol adapters multiple query caches like mysql drizzle supports concurrent multiple engines via drizzle includes built-in support b+ tree hash indexes drizzle query planner capable using multiple indexes multiple engines satisfy complex queries using temporary in-memory bitmap index operations database triggers drizzle supported dml ddl number additional event-based operations server primebase blob streaming system allows drizzle stream binary large objects blobs via http makes use system triggers drizzle currently must written c++ query matched rewritten dynamically sent server action done parsing occurs wide variety native data types supported including support execute command drizzle operate dynamic multi-statement sql via keyword concurrent operate statements parallel replication drizzle done generating messages using google protocol buffers library messages stored executed remote servers message format non-sql neutral format allowed drizzle replication appliers rabbitmq memcached mysql voldemort apache cassandra drizzle licensed version two three gpl parts libdrizzle client library bsd license | [
11392,
6273,
8195,
5384,
6797,
10258,
7187,
3221,
5397,
5399,
10389,
1049,
7453,
1950,
9503,
10145,
2339,
7339,
10413,
7983,
9010,
5047,
823,
5433,
10048,
6721,
9665,
5964,
5198,
1232,
7506,
9687,
9177,
8539,
2780,
10459,
2143,
4194,
3045,
... | Validation |
8,296 | 2 | Features_new_to_Windows_10:features new windows 10 windows 10 introduced number new elements including option use touch-optimized interface known tablet mode traditional desktop interface similar windows 7 along live tiles windows 8 however unlike previous versions windows major features release completed rtm windows 10 continues receive major features changes beyond initial release market microsoft describes windows 10 'operating system service receive ongoing updates features functionality supplemented ability enterprise environments receive non-critical updates slower pace use long-term support milestones receive critical updates security patches ten-year lifespan support terry myerson executive vice president microsoft windows devices group argued goal model reduce fragmentation across windows platform windows 10 codenamed threshold 1 first release windows 10 carries build number 10.0.10240 build n't contain version number microsoft retroactively named version 1507 standing july 2015 matching versioning scheme later updates threshold 1 announced event september 30 2014 first preview following day final release made available windows insiders july 15 2015 followed public release july 29 2015 free upgrade windows 7 windows 8.1 threshold 1 release windows 10 supported users long term servicing branch ltsb new feature indicated release added since windows 8.1 update 1 released april 2014 mail app adds user-configurable swipe gesture controls pop3 email support google calendar support added calendar app settings app expanded similar functionality control panel albeit metro-style user interface map app download maps offline use microsoft edge new browser windows 10 successor internet explorer although internet explorer remain compatibility legacy purposes cortana integrated edge accessible option ask cortana right click menu well reading view ability write notes directly web pages save onenote reading list feature also added users save articles content accessed read later microsoft edge also includes share button toolbar tapping clicking bring system share panel users able share webpage installed applications reading list third-party apps facebook twitter since release microsoft edge scored 402 555 points html5test windows 10 introduced universal windows platform uwp extension windows runtime platform originally introduced windows 8 uwp emphasizes core set apis common variations operating system enabling ability code single application adaptations user interface differences different device families states including desktops laptops tablets smartphones via windows 10 mobile xbox one new device classes surface hub hololens application may also react available displays input device connected monitor suitable docking station uwp app smartphone take appearance app pc information also synchronized versions app different devices notifications licensing windows 10 includes directx 12 alongside wddm 2.0 unveiled march 2014 gdc directx 12 aims provide console-level efficiency closer metal access hardware resources reduced cpu graphics driver overhead performance improvements achieved low-level programming reduce single-threaded cpu bottlenecking caused abstraction higher level apis performance gains achieved allowing developers direct access gpu resources similar low-level rendering initiatives amd mantle apple metal api opengl successor vulkan wddm 2.0 introduces new virtual memory management allocation system reduce workload kernel-mode driver windows 10 brings updates xbox app introduced windows 8 games xbox one streamed windows 10 device excluding smartphones windows 10 introduces game bar provides screenshot video capture functionality windows games users invoke game bar record gameplay take screenshot using appropriate keyboard shortcuts windows 10 also continuously capture gameplays background allows user request last users defined moments gameplay saved hard disk useful user wants save and/or share moment gameplay think explicitly record beforehand windows 10 also allows web apps desktop software using either win32 .net framework packaged distribution windows store desktop software distributed windows store packaged using app-v system allow sandboxing web apps executed remote servers access windows functions notifications camera access windows 8 locally packaged web apps written using html winjs called action center windows 7 windows server 2008 r2 successor called security maintenance title action center windows 10 usurped sidebar provides list received notifications group quick actions buttons different settings areas accessed clicking notifications icon system tray swiping right screen touchscreens windows 10 brings improvements system command-line interface unlike previous versions windows nt win32 console windows resized without restrictions made cover full screen pressing combination keyboard microsoft also enabled use standard keyboard shortcuts cut copy paste within console word wrapping keyboard shortcuts move caret select manipulate text become available features word wrap transparency also included user option disable new features return legacy console wish continuum blanket title group features windows 10 designed enable smoother transitions default interface mode designed use keyboard mouse interface designed touchscreen environments especially hybrid devices laplets enabling tablet mode switches primary interface full screen version start menu opens applications maximized view default taskbar also modified adding back button next start button default hiding buttons opened pinned applications task view used primary means switching programs windows prompt switch two modes automatically certain events occur plugging keyboard mouse tablet switching laplet laptop state vice versa windows 10 brought cortana assistant windows phone 8.1 windows 10 default cortana appears search pane taskbar changed button like tablet mode activated voice using command hey cortana user searches start menu user searches cortana search pane cortana users ask cortana questions weather calendar events types notifications along online information cortana currently requires microsoft account function windows 10 reintroduced start menu seen versions windows prior 8 however unlike versions new start menu includes live tile features windows 8 possible resize start menu view recently added used applications also made full screen tablet users users prefer windows 8-like experience right hand side start menu used pin tiles menu contain limited amount columns depending screen resolution columns divided groups title every group divided 6 8 columns depending user settings allow either 6 8 small sized tiles next task view task switching virtual desktop system accessible via taskbar button keyboard shortcut swiping left touchscreen activating task view shows zoomed display windows currently opened specific monitor clicking window switches task view also displayed window snapped half screen three windows snapped fourths screen prompting window occupy remainder screen task view also allows creation virtual workspaces windows dragged workspaces modern settings app windows 8 continues evolve windows 10 incorporating system setting configuration functionality windows control panel ultimate goal make settings app feature complete obviating need control panel push-button reset function changed utilize files current windows installation rebuild system rather separate recovery image system updates carry new installation re-downloaded separate refresh option removed users given explicit choices within reset process remove personal files applications keep personal files remove applications perform full factory reset mac address randomization wifi introduced try prevent third parties using mac address track devices windows 10 november update windows 10 version 1511 codenamed threshold 2 first major update windows 10 carries build number 10.0.10586 version 1511 referencing date release november 2015 first preview released august 18 2015 final release made available windows insiders november 3 2015 followed public release november 12 2015 existing windows 10 users free upgrade windows 7 windows 8.1 unlike initial release windows branch also made available existing windows phone 8.1-devices xbox one preview release windows server 2016 pre-installed new windows 10 mobile-devices like microsoft lumia 950 threshold 2 release windows 10 supported users current branch businesses cbb changes highlight features new since threshold 1 release windows 10 windows 10 anniversary update windows 10 version 1607 codenamed redstone 1 second major update windows 10 first 2 major updates given redstone codename released july 29 2016 universal windows platform apps support extensions allowing add-ons dlcs apps games respectively furthermore add-ons managed windows settings app anniversary update windows 10 adds windows subsystem linux allows ubuntu user space run natively windows subsystem translate linux system call ubuntu uses windows nt kernel allows bash ubuntu command line apps run within windows console however interoperability restriction bash run windows apps windows run linux software project centennial allows win32 .net apps repackaged appx allow use full set windows runtime apis also allow apps distributed windows store new workspace environment pen users includes virtual sticky notes pen could used take notes sticky notes features optical character recognition ocr highlight relevant text used cortana workspace also includes sketchpad ability take screenshot draw virtual ruler windows 10 creators update windows 10 version 1703 codenamed redstone 2 feature update windows 10 slated released april 11 2017 first preview release seeded windows insiders august 11 2016 redstone 2 release windows 10 currently development branch available windows insiders changes highlights features new since redstone 1 release windows 10 april 2018 update windows 10 version 1803 fifth feature update windows 10 windows 10 october 2018 update windows 10 version 1809 sixth feature update windows 10 | [
11283,
3100,
3102,
8740,
11301,
6697,
1581,
2101,
576,
582,
1098,
6221,
4178,
8798,
10338,
5225,
8299,
9839,
9331,
7796,
6265,
8315,
636,
639,
641,
651,
6797,
10896,
2196,
10388,
10900,
7847,
3250,
9910,
2749,
10957,
2777,
3289,
4316,
585... | Validation |
8,297 | 0 | Link_grammar:link grammar link grammar lg theory syntax davy temperley daniel sleator builds relations pairs words rather constructing constituents phrase structure hierarchy link grammar similar dependency grammar dependency grammar includes head-dependent relationship whereas link grammar makes head-dependent relationship optional links need indicate direction colored multiplanar link grammar cmlg extension lg allowing crossing relations pairs words relationship words indicated link types thus making link grammar closely related certain categorial grammars example subject–verb–object language like english verb would look left form subject link right form object link nouns would look right complete subject link left complete object link subject–object–verb language like persian verb would look left form object link distant left form subject link nouns would look right subject object links link grammar connects words sentence links similar form catena unlike catena traditional dependency grammar marking head-dependent relationship optional languages becoming mandatory free-word-order languages turkish finnish hungarian lithuanian english subject-verb relationship obvious subject almost always left verb thus specific indication dependency needs made case subject-verb inversion distinct link type employed free word-order languages longer hold link subject verb must contain explicit directional arrow indicate two words link grammar also differs traditional dependency grammars allowing cyclic relations words thus example links indicating head verb sentence head subject sentence well link subject verb three links thus form cycle triangle case cycles useful constraining might otherwise ambiguous parses cycles help tighten set allowable parses sentence example parse left-wall indicates start sentence root node directional wv link arrows points head verb sentence wall-verb link wd link drawn without arrows indicates head noun subject sentence link type wd indicates connects wall w sentence declarative sentence lower-case subtype ss link indicates subject-verb relationship lower-case indicating subject singular note wv wd ss links cycle pa link connects verb complement lower-case indicating predicative adjective case parsing performed analogy assembling jigsaw puzzle representing parsed sentence puzzle pieces representing individual words language represented means dictionary lexis consists words set allowed jigsaw puzzle shapes word shape indicated connector link-type direction indicator indicating right left thus example transitive verb may connectors s- o+ indicating verb may form subject connection left object connection right similarly common noun may connectors d- s+ indicating may connect determiner left d- act subject connecting verb right s+ act parsing identify s+ connector attach s- connector forming link two words parsing completes connectors connected given word may dozens even hundreds allowed puzzle-shapes termed disjuncts example many verbs may optionally transitive thus making o+ connector optional verbs might also take adverbial modifiers e connectors inherently optional complex verbs may additional connectors indirect objects particles prepositions thus part parsing also involves picking one single unique disjunct word final parse must satisfy connect connectors disjunct connectors may also include head-dependent indicators h d. case connector containing head indicator allowed connect connector containing dependent indicator connector without h-d indicators indicators used link decorated arrows indicate link direction recent extension simplifies specification connectors languages little restrictions word-order lithuanian also extensions make easier support languages concatenative morphologies parsing algorithm also requires final graph planar graph i.e links cross constraint based empirical psycho-linguistic evidence indeed languages nearly situations dependency links really cross rare exceptions e.g finnish even english parsed link-grammar introducing complex selective connector types capture situations connectors optional floating-point cost markup cheaper use others thus giving preference certain parses others total cost parse sum individual costs connectors used cheapest parse indicates likely parse used parse-ranking multiple ambiguous parses fact costs local connectors global property algorithm makes essentially markovian nature assignment log-likelihood linkages allows link grammar implement semantic selection predicate-argument relationships certain constructions although syntactically valid extremely unlikely way link grammar embodies ideas present operator grammar costs additive behave like logarithm probability since log-likelihoods additive equivalently somewhat like entropy since entropies additive makes link grammar compatible machine learning techniques hidden markov models viterbi algorithm link costs correspond link weights markov networks bayesian networks link grammar link types understood types sense type theory effect link grammar used model internal language certain non-symmetric compact closed categories pregroup grammars sense link grammar appears isomorphic homomorphic categorial grammars thus example categorial grammar noun phrase bad boy may written whereas corresponding disjuncts link grammar would contraction rules inference rules lambek calculus mapped connecting connectors link grammar directional indicators correspond forward backward-slashes categorical grammar finally single-letter names understood labels easy-to-read mnemonic names rather verbose types np/n etc primary distinction categorical grammars two type constructors forward backward slashes used create new types np/n base types np n link-grammar omits use type constructors opting instead define much larger set base types compact easy-to-remember mnemonics basic rule file svo language might look like thus english sentence boy painted picture would appear similar parses apply chinese conversely rule file null subject sov language might consist following links simple persian sentence man nan xordam من نان خوردم ate bread would look like vso order likewise accommodated arabic many languages concatenative morphology stem plays grammatical role grammar determined suffixes thus russian sentence 'вверху плыли редкие облачка might parse subscripts '.vnndpp used indicate grammatical category primary links wd ei sip api connect together suffixes principle stems could appear without altering structure sentence api link indicates adjective sip denotes subject-verb inversion ei modifier wd link used indicate head noun head verb indicated sentence llxxx links serve attach stems suffixes link-grammar also indicate phonological agreement neighboring words example connector 'ph used constrain determiners appear word 'abstract effectively blocks makes costly use determiner sentence link 'an becomes cheap links roughly previous examples denoting subject denoting object denoting determiner 'wv link indicates head verb w link indicates head noun lower-case letters following upper-case link types serve refine type example ds connect singular noun ss singular subject os singular object lower-case v phv denotes 'vowel lower-case wd denotes declarative sentence vietnamese language sentence bữa tiệc hôm qua là một thành công lớn party yesterday great success may parsed follows link grammar syntax parser library natural language processing written c. available lgpl license parser ongoing project recent versions include improved sentence coverage russian persian arabic language support prototypes german hebrew lithuanian vietnamese turkish programming api python java common lisp autoit ocaml 3rd-party bindings perl ruby javascript node.js current major undertaking project learn grammar morphology new languages using unsupervised learning algorithms link-parser program along rules word lists english may found standard linux distributions e.g. debian package although many years date abiword free word processor uses link grammar on-the-fly grammar checking words linked anywhere underlined green semantic relationship extractor relex layered top link grammar library generates dependency grammar output making explicit semantic relationships words sentence output classified level ssyntr dsyntr meaning-text theory also provides framing/grounding anaphora resolution head-word identification lexical chunking part-of-speech identification tagging including entity date money gender etc tagging includes compatibility mode generate dependency output compatible stanford parser penn treebank-compatible pos tagging link grammar also employed information extraction biomedical texts events described news articles well experimental machine translation systems english german turkish indonesian farsi link grammar link dictionary used generate verify syntactic correctness three different natural language generation systems nlgen nlgen2 microplanner/surreal also used part nlp pipeline opencog ai project | [
7780,
4070,
3462,
2440,
8582,
8554,
10890,
5612,
5677,
7343,
7983,
9245,
10610,
2804,
7164,
2045
] | Test |
8,298 | 6 | Inode:inode inode index node data structure unix-style file system describes file-system object file directory inode stores attributes disk block location object data file-system object attributes may include metadata times last change access modification well owner permission data directories lists names assigned inodes directory contains entry parent children uncertainty linux kernel mailing list reason inode 2002 question brought unix pioneer dennis ritchie replied paper published 1978 ritchie ken thompson strongly suggests etymology also maurice j. bach writes file system relies data structures files beside file content former called metadata —data describes data file associated inode identified integer number often referred i-number inode number inodes store information files directories folders file ownership access mode read write execute permissions file type many types file system implementations maximum number inodes fixed file system creation limiting maximum number files file system hold typical allocation heuristic inodes file system one percent total size inode number indexes table inodes known location device inode number kernel file system driver access inode contents including location file thus allowing access file file inode number found using codice_1 command codice_1 command prints i-node number first column report unix-style file systems reiserfs omit inode table must store equivalent data order provide equivalent capabilities data may called stat data reference codice_3 system call provides data programs file names directory implications operating system kernel in-memory representation data called codice_4 linux systems derived bsd use term codice_5 v vnode referring kernel virtual file system layer posix standard mandates file-system behavior strongly influenced traditional unix file systems inode denoted phrase file serial number defined per-file system unique identifier file file serial number together device id device containing file uniquely identify file within whole system within posix system file following attributes may retrieved codice_3 system call make sense store small files inode save space data block needed look-up time disk access needed file system feature called inlining strict separation inode file data thus longer assumed using modern file systems data file fits space allocated pointers data space conveniently used example ext2 successors stores data symlinks typically file names way data 60 bytes fast symbolic links ext4 file system option called inline_data enabled file system creation allows ext4 perform inlining inode size limited works small files | [
2560,
2564,
6155,
7187,
8214,
10774,
10776,
25,
4637,
9762,
4643,
6180,
2597,
7217,
10803,
10809,
576,
2625,
8772,
6221,
3160,
10333,
97,
11363,
6760,
10856,
9835,
7285,
4727,
9335,
634,
1147,
3197,
1150,
5247,
11390,
2179,
10883,
10891,
... | Test |
8,299 | 2 | List_of_features_removed_in_Windows_10:list features removed windows 10 windows 10 version windows nt successor windows 8 features operating system removed comparison windows 8 windows 8.1 changes features offered occurred within subsequent feature updates windows 10 | [
8576,
641,
3463,
651,
5003,
6797,
8080,
8976,
10896,
11283,
2196,
10900,
4505,
11546,
3102,
9375,
4515,
11301,
3496,
3881,
6441,
6697,
1581,
430,
5935,
1970,
3250,
3890,
9910,
6462,
7615,
321,
7106,
582,
2630,
9033,
1098,
10957,
9173,
116... | None |
8,300 | 3 | Out_Run:run game designed yu suzuki traveled europe gain inspiration game stages suzuki small team ten months program game leaving work game critical commercial success becoming one best-selling video games time sega successful arcade cabinet 1980s ported numerous video game consoles home computers spawned number sequels run cited influence upon later video games run 3d driving video game player controls ferrari testarossa spider third-person rear perspective camera placed near ground simulating ferrari driver position limiting player view distance road curves crests dips increases challenge obscuring upcoming obstacles traffic player must avoid object game reach finish line timer game world divided multiple stages end checkpoint reaching end stage provides time near end stage track forks give player choice routes leading five final destinations destinations represent different difficulty levels conclude ending scene among ferrari breaking presented trophy mid-1980s sega experienced success arcades games developed yu suzuki hang-on good seller enduro racer successful enough sega consider second production run motorcycle racing games run suzuki chance develop car racing game original concept base game american film cannonball run fan disliked racing games cars exploded impact wanted gamers enjoy experience driving feel superior suzuki initially conceived game setting across united states requested scout various locations according suzuki boss youji ishii sega president hayao nakayama believed us unsafe suggested europe safer option additionally suzuki concluded us large empty game design scouted europe two weeks bmw 520 ideas tour included frankfurt monaco rome swiss alps french riviera florence milan monaco suzuki inspired use ferrari testarossa playable car game returned japan arranged team find photograph one small team four programmers sound creator five graphic designers developed run suzuki use personnel available assigned projects time result suzuki programming planning spending extra hours studio complete development game within ten months suzuki believed difficult part developing game make fun possible achieved emphasizing design elements wide roads buildings radio soundtrack selection four cabinet designs released equipped steering wheel stick shift acceleration brake pedals two cabinet designs upright one force feedback steering wheel two models sit-down cabinets resemble in-game car use drive motor move main cabinet—turning shaking according onscreen action models feature stereo speakers mounted behind driver head arcade system board made specifically game sega outrun based sega system 16 suzuki stated often unable make games based existing hardware sega would create new board said designs always 3d beginning calculations system 3d even hang-on calculated position scale zoom rate 3d converted backwards 2d always thinking 3d game achieves 3d effects using sprite-scaling technique called super-scaler technology used one year earlier hang-on released september 1986 run fast sprite-scaling 3d motion provide smoother experience contemporary arcade games run original score composed hiroshi kawaguchi previously composed soundtracks games designed suzuki including hang-on soundtrack similar style latin caribbean music three selectable tracks featured passing breeze splash wave magical sound shower additional track last wave plays final score screen run arcade release received positive reviews became one popular arcade games year 1988 golden joystick award game year beating renegade last ninja run received arcade game year award beating renegade bubble bobble 1994 30,000 cabinets sold worldwide making sega best selling arcade cabinet 1980s clare edgeley reviewed arcade game computer video games sinclair user praising graphics element danger gameplay review commodore user described great game driving enthusiasts awarded score 9 10 gary penn writing crash called game highly polished praised attention detail sinclair peter shaw praised realism described frighteningly fast road race game 've ever played run ported numerous home consoles computers 250,000 copies 8-bit computer game ports published u.s. gold sold christmas 1987 run became fastest-selling best-selling computer game uk year sega master system version praised computer video games concluded thrill power arcade version games machine gave master system version score 72 stating master system version came closest original coin-op reviewers dragon described refreshing game provides hours entertainment computer gaming world named year best arcade translation sega reception 8-bit personal computer ports published elsewhere u.s. gold mixed zx spectrum version received positive scores sinclair sinclair user reviewers crash expressed disappointment low quality contrast arcade original games machine gave spectrum version score 61 noting machine technical limitations comparison master system commodore systems commodore versions received positive average reviews though computer video games described commodore 64 port rushed amstrad cpc port received score 8 40 computer video games described travesty 37 score amstrad action reviewer considered one worst arcade conversions ever reactions 16-bit versions generally positive atari st version 1988 described computer video games far perfect came closer arcade original ports 1991 sega genesis version also received positive reviews scoring 90 french gaming magazines joypad joystick well 85 swedish magazine svenska hemdatornytt numerous follow-up titles run including run 3-d 1988 turbo run 1989 run europa 1991 outrunners 1992 run 2 rad mobile 1991 similar run game name adopted subgenre synthwave based game soundtrack selectable in-game conversion run development hertz sharp x68000 according former hertz employee tsunetomo sugawara never released due company management cancelling development likewise 32x version also reportedly development sega never released well run listed among best games time publications next generation retro gamer stuff time organizations g4 nowgamer yahoo writing 1001 video games must play die joao diniz sanches praised run unforgettable design expertly tuned game balance describing game consummate exhibit oversubscribed genre one purest joyous experiences video gaming 2015 run appeared 4th place ign list top 10 influential racing games ever behind pole position gran turismo virtua racing according luke reilly traces run dna found series like test drive need speed project gotham racing burnout well modern racers like forza horizon games driveclub former sega arcade director akira nagai credited run similar games sega arcade success 1980s according nagai run particular really amazing time ... suzuki went make burner number games run still talked special kind wonder taikan games sega arcade business sega lowest performer sales gradually started rise ... personally hang-on run memorable titles helped lift arcade industry slump created entirely new genres | [
5011,
1693,
8735,
11690,
9006,
10931,
11448,
5820,
11452,
325,
4043,
9166,
986,
5340,
11231,
2530,
3307,
4716,
2159,
629,
6390
] | None |
8,301 | 3 | Timeline_of_DOS_operating_systems:timeline dos operating systems article presents timeline events history x86 dos disk operating systems 1973 2016 operating systems named dos generally part scope timeline dos releases forms | [
6148,
7173,
10757,
2055,
6664,
8713,
10257,
2066,
4114,
6675,
7188,
8729,
2594,
9762,
548,
5158,
563,
4150,
3137,
4674,
8262,
9286,
4170,
6730,
7244,
9298,
9813,
86,
2135,
10337,
5220,
7269,
4712,
2161,
7285,
4727,
5756,
4735,
2179,
6787,... | Test |
8,302 | 4 | Trusted_system:trusted system security engineering subspecialty computer science trusted system system relied upon specified extent enforce specified security policy equivalent saying trusted system one whose failure would break security policy policy exists trusted system trusted enforce meaning word trust critical carry meaning might expected everyday usage system trusted user one user feels safe use trusts tasks without secretly executing harmful unauthorised programs trusted computing refers whether programs trust platform unmodified expected whether programs innocent malicious execute tasks undesired user trusted system also seen level base security system protection provided handled according different levels.this commonly found military information categorized unclassified u confidential c secret top secret ts beyond.these also enforces policies no-read no-write subset trusted systems division b division implement mandatory access control mac labels often assumed used processing classified information however generally untrue four modes one operate multilevel secure system multilevel mode compartmented mode dedicated mode system-high mode national computer security center yellow book specifies b3 a1 systems used processing strict subset security labels operated according particularly strict configuration central concept u.s. department defense-style trusted systems notion reference monitor entity occupies logical heart system responsible access control decisions ideally reference monitor tamper-proof b always invoked c small enough subject independent testing completeness assured per u.s. national security agency 1983 trusted computer system evaluation criteria tcsec orange book set evaluation classes defined described features assurances user could expect trusted system key provision highest levels assurance b3 a1 dedication significant system engineering toward minimization complexity size often cited trusted computing base tcb defined combination hardware software firmware responsible enforcing system security policy inherent engineering conflict would appear arise higher-assurance systems smaller tcb larger set hardware software firmware lies outside tcb therefore untrusted although may lead technically naive sophists arguments nature trust argument confuses issue correctness trustworthiness contrast tcsec precisely defined hierarchy six evaluation classes—the highest a1 featurally identical b3 differing documentation standards—the recently introduced common criteria cc —which derive blend less technically mature standards various nato countries—provide tenuous spectrum seven evaluation classes intermix features assurances arguably non-hierarchical manner lack philosophic precision mathematical stricture tcsec particular cc tolerate loose identification target evaluation toe support—even encourage—an inter-mixture security requirements culled variety predefined protection profiles strong case made even seemingly arbitrary components tcsec contribute chain evidence fielded system properly enforces advertised security policy even highest e7 level cc truly provide analogous consistency stricture evidentiary reasoning mathematical notions trusted systems protection classified information derive two independent interrelated corpora work 1974 david bell leonard lapadula mitre working close technical guidance economic sponsorship maj. roger schell ph.d. u.s. army electronic systems command ft. hanscom devised known bell-lapadula model less trustworthy computer system modeled terms objects passive repositories destinations data files disks printers subjects active entities—perhaps users system processes threads operating behalf users—that cause information flow among objects entire operation computer system indeed regarded history serializability-theoretic sense pieces information flowing object object response subjects requests flows time dorothy denning purdue university publishing ph.d. dissertation dealt lattice-based information flows computer systems mathematical lattice partially ordered set characterizable directed acyclic graph relationship two vertices either dominates dominated neither defined generalized notion labels —corresponding less full security markings one encounters classified military documents e.g top secret wnintel tk dumbo—that attached entities bell lapadula integrated denning concept landmark mitre technical report—entitled secure computer system unified exposition multics interpretation —whereby labels attached objects represented sensitivity data contained within object though often subtle semantic difference sensitivity data within object sensitivity object labels attached subjects represented trustworthiness user executing subject concepts unified two properties simple security property subject read object dominates greater close enough—albeit mathematically imprecise—interpretation confinement property *-property subject write object dominates properties loosely referred no-read-up no-write-down respectively jointly enforced properties ensure information flow downhill repository whence insufficiently trustworthy recipients may discover extension assuming labels assigned subjects truly representative trustworthiness no-read-up no-write-down rules rigidly enforced reference monitor provably sufficient constrain trojan horses one general classes attack sciz popularly reported worms viruses specializations trojan horse concept bell-lapadula model technically enforces confidentiality secrecy controls i.e address problem sensitivity objects attendant trustworthiness subjects inappropriately disclose dual problem integrity i.e. problem accuracy even provenance objects attendant trustworthiness subjects inappropriately modify destroy addressed mathematically affine models important named creator k. j. biba integrity models include clark-wilson model shockley schell program integrity model seaview model important feature macs entirely beyond control user tcb automatically attaches labels subjects executed behalf users files access modify contrast additional class controls termed discretionary access controls dacs direct control system users familiar protection mechanisms permission bits supported unix since late 1960s and—in flexible powerful form—by multics since earlier still access control lists acls familiar examples dacs behavior trusted system often characterized terms mathematical model—which may less rigorous depending upon applicable operational administrative constraints—that takes form finite state machine fsm state criteria state transition constraints set operations correspond state transitions usually necessarily one descriptive top-level specification dtls entails user-perceptible interface e.g api set system calls unix parlance system exits mainframe parlance element engenders one model operations trusted computing group creates specifications meant address particular requirements trusted systems including attestation configuration safe storage sensitive information trusted systems context national homeland security law enforcement social control policy systems conditional prediction behavior people objects within system determined prior authorizing access system resources example trusted systems include use security envelopes national security counterterrorism applications trusted computing initiatives technical systems security use credit identity scoring systems financial anti-fraud applications general include system probabilistic threat risk analysis used assess trust decision-making authorizing access allocating resources likely threats including use design systems constraints control behavior within system ii deviation analysis systems surveillance used ensure behavior within systems complies expected authorized parameters widespread adoption authorization-based security strategies default state default=deny counterterrorism anti-fraud purposes helping accelerate ongoing transformation modern societies notional beccarian model criminal justice based accountability deviant actions occur – see cesare beccaria crimes punishment 1764 – foucauldian model based authorization preemption general social compliance ubiquitous preventative surveillance control system constraints – see michel foucault discipline punish 1975 alan sheridan tr. 1977 1995 emergent model security geared towards policing risk management surveillance exchange information auditing communication classification developments led general concerns individual privacy civil liberty broader philosophical debate appropriate forms social governance methodologies trusted systems context information theory based definition trust 'trust essential communication channel transferred source destination using channel ed gerck information theory information nothing knowledge meaning context information theory information simply transferred source destination using communication channel transmission information available destination transfer zero information received party party expect—as measured uncertainty party message likewise trust defined gerck nothing friendship acquaintances employee-employer relationships loyalty betrayal overly-variable concepts trust taken purely subjective sense either feeling something purely personal psychological—trust understood something potentially communicable definition trust abstract allowing different instances observers trusted system communicate based common idea trust otherwise communication would isolated domains necessarily different subjective intersubjective realizations trust subsystem man machines may coexist taken together model information theory information expect trust know linking concepts trust seen qualified reliance received information terms trusted systems assertion trust based record information information channels deepening questions leads complex conceptions trust thoroughly studied context business relationships also leads conceptions information quality information integrates trust trustworthiness structure information information system conceived higher quality terms particular definitions accuracy precision means higher trustworthiness introduction calculus trust example 'if connect two trusted systems less trusted taken together given ibm federal software group suggested provides useful definition trust application information technology environment related information theory concepts provides basis measuring trust network centric enterprise services environment notion trust considered requisite achieving desired collaborative service-oriented architecture vision see also trusted systems project part global information society project gisp joint research project world policy institute wpi center advanced studies sci tech policy cas | [
257,
10756,
402,
3360,
2737,
2750,
1350,
7368,
8904,
4303,
7887,
10580,
7515,
4067,
1509,
3178,
6509,
2416,
9846,
2041,
3323,
2558
] | Test |
8,303 | 2 | Cocoa_(API):cocoa api | [
9732,
4615,
10765,
2062,
4111,
5647,
1042,
541,
9245,
5663,
3107,
2603,
44,
5165,
5677,
3631,
6700,
4657,
1074,
9784,
576,
8771,
8262,
9802,
5713,
3670,
4184,
10841,
2141,
4702,
2658,
5219,
2149,
3691,
9323,
5743,
8304,
2673,
6771,
2676,
... | Test |
8,304 | 2 | GNUstep:gnustep gnustep free software implementation cocoa formerly openstep objective-c frameworks widget toolkit application development tools unix-like operating systems microsoft windows part gnu project gnustep features cross-platform object-oriented ide apart default objective-c interface gnustep also bindings java ruby gnu guile scheme gnustep developers track additions apple cocoa remain compatible roots gnustep application interface roots cocoa nextstep openstep gnustep thus predates cocoa emerged apple acquired next technology incorporated development original mac os x gnustep initially effort gnu developers replicate technically ambitious nextstep programmer-friendly features gnustep began paul kunz others stanford linear accelerator center wanted port hippodraw nextstep another platform instead rewriting hippodraw scratch reusing application design decided rewrite nextstep object layer application depended first version libobjcx enabled port hippodraw unix systems running x window system without changing single line application source openstep specification released public 1994 decided write new objcx would adhere new apis software would become known gnustep gnustep contains set graphical control elements written objective-c programming language graphical user interface gui gnumail composed graphics control elements gnumail interact windowing system e.g x11 wayland graphical user interface rendered gnustep backend provides small set functions used user interface library interface actual windowing system also rendering engine emulates common postscript functions package gnustep-back provides following backends gnustep inherits design principles proposed openstep gnustep predates cocoa cocoa based openstep well objective-c language examples applications written ported gnustep foundation kit provides basic classes wrapper classes data structure classes application kit provides classes oriented around graphical user interface capabilities | [
2050,
1028,
9223,
10765,
2062,
8725,
9245,
3618,
3107,
2603,
5165,
5677,
3631,
8754,
9784,
576,
8258,
8771,
10822,
5703,
7249,
1112,
10841,
3674,
2658,
8295,
9323,
5743,
8303,
2673,
9848,
5754,
7292,
7806,
5759,
1664,
8830,
1666,
2180,
42... | Train |
8,305 | 2 | How_does_one_patch_KDE2_under_FreeBSD?:one patch kde2 freebsd one patch kde2 freebsd internet meme russian internet culture question originally posted anime channel rusnet irc network may 8 2004 original post followed translation здравствуйте это канал об аниме -- да -- как мне пропатчить kde2 под freebsd hello anime channel — yes — patch kde2 freebsd first question rhetorical satirized disproportionate amount technical geeky conversations often occurring channel nothing anime later popularized became widely cited russophone chats 2006 phenomenon first received public attention asked many people prior july 6 online conference russian president vladimir putin due provoking campaigns became third popular question proposed asked conference first preved vladimir vladimirovich regard medved however hosts ask question 2007 revived number one frequently asked question similar conference president kazakhstan nursultan nazarbayev nazarbayev answered question seriously describing developments industry kazakhstan possible use open-source software december 2007 question became popular one preceding internet conference ukrainian president viktor yushchenko gave answer saying programmers secretariat able help patch kde2 different operating systems also recommended adoption newer software possible reference existence kde3 time february 2014 openbsd ports developer gave overview linux vacation eastern europe conference belarus patch kde4 openbsd reviving long-lived meme new light | [
788
] | Validation |
8,306 | 6 | Mkfs:mkfs computer operating systems mkfs command used format block storage device specific file system command part unix unix-like operating systems unix block storage device must formatted file system mounted accessed operating system filesystem hierarchy command originally implemented first version unix method initialize either dectape using argument rk03 disk pack using r argument initialization process would write formatting data device contained empty file system created super-block i-list free list storage device established root directory entries .. self parent respectively rk03 disk packs 4872 available blocks initialization tapes 578 blocks 512 bytes/block mkfs executable kept /etc directory instead binary directory would inadvertently called destroy information later implementations unix-like operating systems included mkfs command including hp-ux minix sunos linux basic syntax command common modern implementations 'codice_1 type filesystem 'codice_2 target unix device write filesystem data usually device drive partition often command simply wrapper another command performs formatting specific file system example would call command codice_3 passing along appropriate arguments format device codice_4 ext3 filesystem default options command stored file codice_5 usually codice_6 directory depending implementation specific file system requested command may many options specified inode size block size volume label features see file system details filesystem-specific commands mkfs calls may invoked directly user command line linux convention name filesystem-specific commands codice_7 codice_8 abbreviation file system e.g. codice_9 codice_10 codice_11 etc file systems supported command vary implementation include msdos sco bfs cpm ext2 ext3 ext4 minix fat vfat hfs vxfs rf disk rk disk dectape ntfs | [
3841,
515,
9733,
9735,
3976,
4750,
5397,
2198,
1304,
6812,
9762,
7847,
4398,
7983,
11568,
823,
1336,
6459,
7356,
451,
10436,
965,
10564,
8522,
3659,
8651,
10967,
9946,
7136,
6369,
6120,
492,
2545,
4850,
5106,
5492,
9204,
6138,
5759
] | Test |
8,307 | 7 | You_Need_a_Budget:need budget need budget ynab pronounced why-nab multi-platform personal budgeting program based envelope method 2013 popular personal finance software among lifehacker readers latest version dubbed new ynab launched december 30 2015 web-based application apps iphone ipad android devices previous version ynab 4 released june 2012 ynab 4 maintained 2016 company promises continue support ynab 4 users indefinitely ynab 3 released december 2009 ran multiple platforms using adobe air runtime previous versions included microsoft excel/openoffice.org calc spreadsheet implementation dubbed ynab basic discontinued july 2009 windows-only executable name ynab pro discontinued december 2009 ynab iphone released 2010 runs iphone ipod touch ipad standalone budgeting application instead designed complement ynab desktop application version tailored ipad including budgeting support released 2014 ynab android released september 2011 | [
5224,
7532,
7983,
1008,
1680,
467
] | None |
8,308 | 4 | Firewall_pinhole:firewall pinhole computer networking firewall pinhole port protected firewall allow particular application gain access service host network protected firewall leaving ports open firewall configurations exposes protected system potentially malicious abuse fully closed firewall prevents applications accessing services side firewall protection mechanism opening pinhole firewall implement user validation authorization firewalls performing network address translation nat function mapping external ip address port socket internal ip address port socket often called pinhole pinholes created manually programmatically temporary created dynamically specific duration dynamic connection permanent signaling functions firewalls sometimes automatically close pinholes period time typically minutes minimize security exposure applications require pinhole kept open often need generate artificial traffic pinhole order cause firewall restart timer | [
3011,
8998,
1164,
14,
3150,
3792,
4435,
6964,
1942,
3770
] | Validation |
8,309 | 8 | Website_correlation:website correlation website correlation website matching process used identify websites similar related websites inherently easy duplicate led proliferation identical websites similar websites purposes ranging translation internet marketing especially affiliate marketing internet crime locating similar websites inherently problematic may different languages different servers different countries different top-level domains website correlation used several known types correlation demonstrating different strengths weaknesses practical website correlation process may require combining two methods save time effort website owners duplicate major portions website code across many domains similarity code structure provide enough information correlation organizations known publicly search-able databases kind correlation include note websites sometimes utilize structure relationship websites coincidentally utilize content management system also known correlated reverse dns lookup websites may served server one ip address one subnet several organizations retain archives ip address data correlate data examples include note correlation via method may misleading websites frequently exist server aka shared hosting relationship websites may authored person organization website owners required provide contact information registrar obtain domain name domain ownership determined via whois protocol provides mechanism searching correlating ownership several organizations retain archives whois information provide searching correlation services examples include note website ownership information falsified outdated hidden public view website correlation via method accurate misleading impossible depending information contained whois records search engines provide search-able databases indexed website content search engine results lists correlated content similarity note method correlation inherently slow one must guess phrases search also related websites may contain literally similar content site translated another language websites frequently categorized tagged similarly via automated manual means examples publicly accessible website categorization databases include note manual categorization tag metadata methods inherently subjective automated categorization tagging methods inherently subject varying weaknesses strengths underlying categorization algorithms tracking ids used analytics affiliate identification frequently embedded website code ids used correlation imply common management websites publicly available websites correlating tracking id include | [
6576,
8204
] | Test |
8,310 | 7 | Servage_AB:servage ab servage ab publ swedish cloud service provider headquartered stockholm sweden company parent company levonline servage communication servage hosting corporate name servage resulted words serve age combined almost spells company name name relates company ambition serve customers always keeping systems up-to-date modern technologies 2007 servage hosting became fully owned subsidiary tele5 voice services ab 2008 tele5 voice services ab changed name servage ab chairman tele5 voice services ab board per bergström felt servage better suited brand name international corporation | [
225,
1410,
8865,
7078,
1650,
8310
] | None |
8,311 | 1 | Merchant_Navy_(United_Kingdom):merchant navy united kingdom merchant navy maritime register united kingdom comprises seagoing commercial interests uk-registered ships crews merchant navy vessels fly red ensign regulated maritime coastguard agency mca king george v bestowed title merchant navy british merchant shipping fleets following service first world war number nations since adopted title merchant navy existence significant period english british history owing growth trade imperial expansion dated back 17th century attempt made register seafarers source labour royal navy times conflict registration merchant seafarers failed successfully implemented 1835 merchant fleet grew successive years become world foremost merchant fleet benefiting considerably trade british possessions india far east lucrative trades sugar contraband opium china spices tea carried ships cutty sark helped entrench dominance 19th century first second world wars merchant service suffered heavy losses german u-boat attacks policy unrestricted warfare meant merchant seafarers risk attack enemy ships tonnage lost u-boats first world war around 7,759,090 tons around 14,661 merchant seafarers killed honour sacrifice made merchant seafarers first world war george v granted title merchant navy companies 1928 george v gave edward prince wales title master merchant navy fishing fleets retained accession throne january 1936 relinquished abdication december since edward viii title held sovereigns george vi elizabeth ii united kingdom british empire entered second world war september 1939 george vi issued message anxious days would like express officers men british merchant navy british fishing fleets confidence unfailing determination play vital part defence one would say task less essential people experience allotted navy army air force upon nation depends much foodstuffs raw materials transport troops overseas long glorious history proud bear title master merchant navy fishing fleets know carry duties resolution fortitude high chivalrous traditions calling safe hands god keep prosper great task second world war german u-boats sank nearly 14.7 million tons allied shipping amounted 2,828 ships around two thirds total allied tonnage lost united kingdom alone suffered loss 11.7 million tons 54 total merchant navy fleet outbreak second world war 32,000 merchant seafarers killed aboard convoy vessels war along royal navy convoys successfully imported enough supplies allow allied victory honour sacrifices made two world wars merchant navy lays wreaths remembrance alongside armed forces annual remembrance day service 11 november following many years lobbying bring official recognition sacrifices made merchant seafarers two world wars since merchant navy day became official day remembrance 3 september 2000 ensigns displayed stern vessel displayed gaff yardarm red ensigns defaced flown warrant onboard vessel house flags personal designed company displayed port halyard yardarm despite maintaining dominant position many decades decline british empire rise use flag convenience foreign competition led decline merchant fleet example 1939 merchant navy largest world 33 total tonnage 2012 merchant navy — yet still remaining one largest world — held 3 total tonnage 2010 merchant navy consisted 504 uk registered ships addition uk merchant marine interests possessed 308 ships registered countries 271 foreign-owned ships registered uk 2012 british merchant marine interests consisted 1,504 ships included ships either directly uk-owned parent-owned managed british company amounted alternatively according annual maritime shipping statistics provided british government department transport signatory stcw convention uk ships commanded deck officers engineering officers officers undergo 3 years training known cadetship one approved maritime colleges united kingdom include warsash maritime academy south tyneside college fleetwood plymouth university city glasgow college cadets usually choice two academic routes foundation degree higher national diploma successful completion results qualification marine operations marine engineering generally costs cadetship met sponsorship uk shipping company three years training cadets also go sea period year usually spread across cadetship affords practical education along academic time college prepares candidate separate final oral exam oral exam carried master mariner office maritime coastguard agency successful completion oral exam result award certificate competency international qualification issued uk government allows officer work qualified capacity onboard ship certificates issued different ranks officer usually return complete subsequent series studies reach highest qualification first uk deck officer certificates competency issued 1845 conducted final oral exam master mariner training regime officers set official syllabus merchant navy training board training still encompasses traditional trades celestial navigation ship stability general cargo seamanship includes training business legislation law computerisation deck officers marine engineering principles workshop technology steam propulsion motor diesel propulsion auxiliaries mechanics thermodynamics engineering drawing ship construction marine electrics well practical workshop training engineering officers historically person wishing become captain master prior 1973 five choices attend one three elite naval schools age 12 fixed-base hms conway hms worcester pangbourne nautical college would automatically lead apprenticeship seagoing cadet officer apply one several training programmes elsewhere go sea immediately applying directly merchant shipping company age 17 would three years prior training four years without seagoing experience aboard ship work-clothes mates deck crew direction bo'sun cleaning bilges chipping paint polishing brass cement washing freshwater tanks holystoning teak decks studying navigation seamanship bridge uniform direction officer taking exams become second mate historically composition crew uk ships diverse characteristic extant shipping companies trade extent british empire availability crew different ports one ship might largely british crew another might crew composed many indians chinese african sailors crews outside britain usually drawn areas ship traded far east trading ships either singapore hong kong crews banana boats west indian crews ships trading west africa southern africa african crews ships trading indian ocean including east africa crews indian subcontinent crews made recruits britain commonly used ships trading across north atlantic south america australia new zealand traditionally still ships crew run bosun overseen responsible deck officer usually chief mate ship may also different sub-departments galley radio department hospitality services overseen chief cook radio officer chief steward many roles changed ships crews become smaller commercial shipping ships radio department disappeared along radio officer colloquially known 'sparks replaced changes technology requirement stcw convention deck officers hold individual certification gmdss system electro-technical officers eto also serve aboard ships trained fix maintain complex systems number notable merchant navy personnel include members uk merchant navy awarded victoria cross george cross george medal distinguished service order distinguished service cross actions serving merchant navy canadian philip bent ex-british merchant navy joined british army outbreak world war victoria cross members merchant navy served either world war also received relevant campaign medals second world war many merchant navy members received king commendation brave conduct lloyd london awarded lloyd war medal bravery sea 541 merchant navy personnel bravery 1939–45 many royal humane society medals awards conferred merchant navy seafarers acts humanity war peacetime september 2016 uk government introduced merchant navy medal meritorious service medal awarded serving served merchant navy fishing fleets uk isle man channel islands exemplary service devotion duty rewarding set outstanding example others first state award meritorious service history merchant navy recipients must nominated someone least two written letters support normally required completed 20 years service merchant navy although exceptional circumstances may less british merchant navy consists various private shipping companies decades many companies come gone merged changed name changed owners british shipping represented nationally globally uk chamber shipping headquartered london list british shipping companies past present | [
3090
] | Test |
8,312 | 9 | PROIV:proiv proiv /proʊ fʊər/ low code development platform developed sold northgatearinso part northgate information solutions group active community around 2500 developers end-users worldwide ranging consultants large multinationals finance institutions tax authorities retailers engineering companies media operators software houses proiv usual application domain database-centric business applications proiv similarities languages abap focus rpg proiv programs consist declarative/non-procedural specifications control overall structure program database access implicit sequence execution proiv programmers refer timing cycle procedural subroutines added programmer written 3gl-like language proiv calls logic note proiv programs referred functions confusing differs usual use term programming languages proiv developed sushil k. garg working hawaii 1976 general automation system early 1980s licensed mcdonnell information systems mdis mdis converted proiv run pick-based systems spin known application language liberator proiv ported several different platforms separate teams garg brought ports together one company named pro computer sciences pcs headquartered laguna hills california pcs subsequently acquired mdis 1988 second half 1980s proiv team entered 4gl grand prix contests 1987 1988 1990 product finished second occasion 2000 mcdonnell information systems changed name northgate information solutions proiv supports wide variety operating systems virtue write run anywhere virtual machine model similar java proiv version 8.0 server supported platforms proiv version 8.0 supported client/browser platforms key blank supported server-side proiv applications highly portable small degree care part programmer server platform technology supported current releases includes linux microsoft windows solaris aix hp-ux openvms plus oracle db2 sql server postgresql pervasive sql rms vsam c-isam proiv also runs ibm iseries ibm mainframes programmers familiar proiv consistent nature proiv 4gl productivity proiv intended application domains typically high programmers effective even without extensive technical skills/knowledge applications implemented proiv typically runtime-efficient perform well scalability also typically good little care part programmer key feature proiv independence technologies platforms long-term users passed two three decades technological change using core functionality developed proiv fresh release proiv users immediate access latest technologies without losing development work invested existing proiv applications applications designed one platform easily switched another minimal modification proiv little object-orientation makes limited amount procedural abstraction available programmer proiv little support analytical/statistical/mathematical functions example include basic trigonometric functions proiv-supplied gui client renders rich-client ui applications written proiv based around activex technology works windows client platforms consequently programmers development environments supplied more-recent proiv releases also work windows client platform proiv inbuilt support interprocess communication ipc mechanisms although added via ability extend proiv kernel c. proiv bus task technology allowing service calls proiv application systems proprietary rather based existing standard rpc similar mechanism formal/rigorous definition syntax semantics proiv available programmers make problem resolution difficult inexperienced | [
9441,
4042,
10026,
6797,
5678,
5872,
8539,
11187,
3414,
823,
1304,
4410,
3323,
2045
] | None |
8,313 | 4 | Zimperium:zimperium zimperium inc. privately owned mobile security company based united states offices dallas texas san francisco california company known developing several mobile threat defense software solutions zimperium ltd. founded 2010 chairman cto itzhak avraham 2011 elia yehuda joined co-founder 2013 assets zimperium ltd. acquired zimperium inc. new company incorporated delaware 2014 zimperium inc. released zips android app intrusion prevention system smartphone software uses machine learning monitor user habits detect prevent possible phone hacking 2015 zimperium inc. researched developed security systems group software bugs affect series android operating systems called stagefright bug 2016 company partnered blackberry partnership consisted integration zips zimperium enhancing mobile security ios android platforms zimperium inc. raised 60m private investors including samsung telstra sierra ventures softbank warburg pincus company partnered several technology companies including softbank group deutsche telekom telstra smartone oracle microsoft mobileiron january 2018 zimperium inc assigned intellectual property including granted patents trademarks ally bank security collateral zimperium inc global company hundreds customers customers include enterprises sizes large federal local government agencies leading mobile operators major oem partners | [
9488,
7730,
9356,
4957
] | None |
8,314 | 7 | Sinch_(company):sinch company sinch telecommunications cloud communications platform service paas company headquartered stockholm sweden sinch also offices 30 cities worldwide including atlanta london madrid san francisco singapore sydney sinch initially founded may 2014 andreas bernström stockholm san francisco originally technology behind rebtel sinch spun-out 12 million funding focusing mobile first app developer market sinch launched voice instant messaging products may 2014 quickly launched sms api product end 2014 2016 clx communications acquired sinch total consideration sek 138.9 million debt-free basis founded 2008 clx acquired numerous companies industry 2009 2018 february 2019 announced clx launched new corporate brand visual identity unify business units name acquiring sinch 2016 leveraged brand name encompass entire company accurately immediately depict current offerings mission sinch effectively inherited history clx communications considered different brand one launched 2014 clx completed initial public offering ipo listed nasdaq stockholm october 2015 since february 2019 company found mid cap list technology sector ticker 'sinch sinch platform based voice ip webrtc pstn sms verification instant messaging technologies power products provides sdk developers add app get access sinch product range available ios android javascript since sinch brand name leveraged clx communications product portfolio grown encompass services rich communications services rcs thanks strategic partnership clx google 2017 well operator portfolio inherited symsoft company acquired clx 2009 sinch listed lead411 2014 hottest san francisco companies ceo founder andreas announced one 9 innovative people voip 2014 | [
8934
] | Validation |
8,315 | 2 | Windows_XP_editions:windows xp editions windows xp released several editions since original release 2001 windows xp available many languages addition add-ons translating user interface also available certain languages first two editions released microsoft windows xp home edition designed home users windows xp professional designed business power users windows xp professional offers number features unavailable home edition including march 2004 european commission fined microsoft €497 million £395 million 784 million ordered company provide version windows without windows media player commission concluded microsoft broke european union competition law leveraging near monopoly market pc operating systems onto markets work group server operating systems media players unsuccessful appeals 2004 2005 microsoft reached agreement commission would release court-compliant version windows xp edition n. version include company windows media player instead encourages users pick download media player microsoft wanted call version reduced media edition eu regulators objected suggested edition n name n signifying media player home professional editions windows xp sold price version windows media player included dell hewlett-packard lenovo fujitsu siemens chosen stock product however dell offer operating system short time consumer interest low roughly 1,500 units shipped oems reported sales consumers n editions windows xp also include windows movie maker microsoft made available separate download december 2005 korean fair trade commission ordered microsoft make available editions windows xp windows server 2003 contain windows media player windows messenger like european commission decision decision based grounds microsoft abused dominant position market push products onto consumers unlike decision however microsoft also forced withdraw non-compliant versions windows south korean market k kn editions windows xp home edition professional edition released august 2006 available english korean editions contain links third-party instant messenger media player software edition windows xp home intended sale certain low-cost netbooks appear labeled windows xp home edition ulcpc ulcpc standing ultra-low-cost personal computer version comes preinstalled oem solutions providing desktops blade pc hardware addition copy windows xp professional includes remote desktop license windows xp starter edition lower-cost version windows xp available thailand vietnam turkey indonesia india philippines russia colombia brazil argentina peru bolivia chile mexico ecuador uruguay malaysia venezuela similar windows xp home limited low-end hardware run 3 programs time features either removed disabled default according microsoft press release windows xp starter edition low-cost introduction microsoft windows xp operating system designed first-time desktop pc users developing countries starter edition includes special features certain markets consumers may computer literate found home edition include localised help features may speak english country-specific computer wallpaper screensavers default settings designed easier use typical windows xp installations malaysian version example contains desktop background kuala lumpur skyline addition starter edition also unique limitations prevent displacing expensive versions windows xp three applications run starter edition application may open maximum three windows maximum screen resolution 1024×768 support workgroup networking domains addition starter edition licensed low-end processors like intel celeron amd duron sempron also 512 mb limit main memory 120 gb disk size limit microsoft made clear however total disk space per partition per disk also fewer options customizing themes desktop taskbar october 9 2006 microsoft announced reached milestone 1 million units windows xp starter edition sold mass market however starter edition much success many markets available pirated versions higher end versions windows popular legal counterparts markets non-genuine copies xp professional obtained mall stores typically charge amount cds/dvds taken files original retail value unlicensed copies windows xp professional typically cost 0.70 since uses 1 cd compared around 30 properly licensed copy xp starter edition code-named freestyle development first released september 2002 initial release available solely conjunction computers included media center capabilities could purchased separately first major update released 2004 distributed tier 1 oems previously sold windows xp media center edition pc updated 2005 first edition available system builders many features windows xp media center edition 2005 including screen dancers auto playlist dj high end visual screen savers taken windows xp plus packages originally shipped add-ons windows xp enhance users experience windows xp machine preview version windows xp media center edition microsoft ehome division shown ces 2002 final version released july 2002 2005 release microsoft focused efforts building new media center features home premium ultimate editions windows vista windows 7 windows media center built-in unlike releases windows xp media center edition available retail purchase without necessary hardware notable feature unique edition windows media center provides large-font remotely accessible interface 10-foot user interface television viewing computer well recording playback tv guide dvd playback video playback photo viewing music playback unlike competing commercial digital video recorder products microsoft charge monthly subscription fee media center tv guide service due strict hardware requirements microsoft sell media center edition retail markets alongside home professional editions microsoft distributes msdn subscribers oem system builders certain countries consumers generally purchase media center pre-installed new computer reseller sells oem versions microsoft software media center edition consumer-oriented edition windows xp updated new features annual basis five-year development windows vista mce 2005 release example includes update windows movie maker supports burning dvds new visual style called royale support media center extenders soundspectrum g-force sound visualizations microsoft also released remote control receiver infrared blaster mce 2005 new specially designed wireless computer keyboard mce 2005 released september 2005 using media center extenders xbox 360 media center edition also able connect stream recorded tv music pictures network connection media center edition retains features included windows xp professional simply add-on professional installed provided valid mce product key setup professional features left including remote desktop encrypting file system however ability join active directory domain removed marketed home product need domain support one value registry needed circumvent restriction installation mce 2005 in-place upgrade previous version already joined domain ability retained unless user uses windows media center extender case ability lost restored presumably microsoft introduced limit media center extender devices introduced version rely fast user switching component component must disabled order join domain media center higher hardware requirements editions windows xp mce 2005 requires least 1.6 ghz processor directx 9.0 hardware-accelerated gpu ati radeon 9 series nvidia geforce fx series higher 256 mb system ram functionality media center extender support use multiple tuners hdtv playback/recording carries higher system requirements media center much restricted range hardware supports software dvr solutions media center tuners must standardized driver interface originally required hardware mpeg-2 encoder closed caption support number features media center remote controls standardized terms button labels functionality degree general layout edition intended specially designed notebook/laptop computers called tablet pcs windows xp tablet pc edition compatible pen-sensitive screen supporting handwritten notes portrait-oriented screens except msdn volume license subscribers windows xp tablet edition could purchased separately tablet pc edition superset windows xp professional difference tablet functionality including alternate text input tablet pc input panel basic drivers support tablet pc specific hardware requirements install tablet pc edition include tablet digitizer touchscreen device hardware control buttons including ctrl-alt-delete shortcut button scrolling buttons least one user-configurable application button two releases service pack 2 windows xp includes tablet pc edition 2005 free upgrade version brought improved handwriting recognition improved input panel allowing used almost every application input panel also revised extend speech recognition services input correction applications windows xp tablet pc edition based windows xp professional includes software features provided addition includes following components following downloadable packs released microsoft add functionality windows xp tablet pc edition utilizes ink object means data input storage data type created part windows xp tablet pc edition api allows users manipulate process handwritten data including recognition results cases pressure information part stroke properties ink changed much way properties objects data saved allow future reference many applications referencing ink object also allow handwritten notes filtered searched based recognition results stored ink saved integrated operating system tablet pc input panel tip allows handwriting converted text use non-full-screen applications integrated handwriting recognition windows xp tablet pc edition 2005 recognize print cursive mixed writing accuracy increased configuring recognizer expect left-handed writing right-handed writing recognition variety languages available install recognizer pack handwriting engine trained recognize particular handwriting style user must modify handwriting better recognized system order use feature effectively speech recognition functionality also incorporated tablet input panel compared previous versions substantially improved speech recognition engine version 6 also ships office 2003 tutorial microphone wizard training modules included possible dictate text using speech certain supported applications control windows gui applications using speech although accuracy improvements made windows vista surpass features update windows xp tablet pc edition containing ink analysis stylusinput api support introduced windows vista also available 2006 microsoft made available two additional editions windows xp home edition hardware manufacturers wanted provide subscription-based pay go-based models selling computers editions named windows xp home edition subscription computers windows xp home edition prepaid computers respectively part microsoft flexgo initiative described company-issued press release making pcs accessible dramatically reducing entry cost enabling customers pay computer use purchase prepaid cards market trials starting first emerging markets inadequate access consumer credit unpredictable income high entry costs prevent many consumers purchasing computer editions targeted towards emerging markets india brazil hungary vietnam editions contain additional components enforce subscription models via metering metering typically enforced hardware component prevent tampering installation windows operates normal mode limited access mode hardware locked mode depending state subscription computer positive time balance operates normal mode functions regular windows xp home edition machine time balance expires machine operate limited access mode amount time set hardware manufacturer five hours default entering hardware locked mode limited access mode screen uses high-contrast low-resolution display settings hardware locked mode operating system disabled entirely message displayed boot-up instructions re-enable machine two distinct editions windows xp released support 64-bit hardware windows xp 64-bit edition designed run intel itanium family microprocessors native ia-64 mode two versions windows xp 64-bit edition released edition discontinued january 2005 hewlett-packard last distributor itanium-based workstations stopped selling itanium systems marketed 'workstations july 2005 windows xp 64-bit edition longer supported security updates made available windows xp 64-bit edition marketed itanium version microsoft windows xp editions instead separate edition made solely itanium processor 64-bit instructions mostly analogous windows xp professional numerous older technologies dao jet database ntvdm windows windows longer present support ms-dos win16 applications absent original version also lacks media applications windows media player netmeeting windows movie maker integrated cd burning although wmp netmeeting added 2003 version similar ability previous alternate architecture ports windows windows nt 4.0 powerpc mips r4x00 alpha run 16-bit x86 code via windows windows windows xp 64-bit edition run standard x86 32-bit applications wow64 windows-on-windows 64-bit emulation layer original itanium processor contains on-chip ia-32 decoder deemed far slow serious use running 400 mhz microsoft intel wrote software 32 64-bit translator dubbed ia-32 execution layer allows real time translation x86 32-bit instructions ia-64 instructions allowing 32-bit applications run albeit significantly slowly native code edition supports x86-64 extension intel ia-32 architecture x86-64 implemented amd amd64 found amd opteron athlon 64 chips selected sempron processors implemented intel intel 64 formerly known ia-32e em64t found intel pentium 4 intel later chips released april 25 2005 windows xp professional x64 edition uses version 5.2.3790.1830 core operating system binaries version used windows server 2003 sp1 latest versions operating system development even service packs updates windows xp x64 windows server 2003 x64 distributed unified packages much manner windows 2000 professional server editions x86 initial development phases 2003–2004 windows xp professional x64 edition named windows xp 64-bit edition x86 extended systems later windows xp 64-bit edition extended systems opposed 64-bit edition itanium systems rtm version windows xp professional x64 edition based windows server 2003 service pack 1 codebase reason service pack 2 windows xp x64 edition released march 13 2007 service pack 2 32-bit versions windows xp fact due earlier release date 32-bit version many key features introduced service pack 2 32-bit x86 editions windows xp already present rtm version 64-bit x86-64 counterpart service pack 2 first last released service pack windows xp professional x64 edition windows xp professional x64 edition uses technology named windows-on-windows 64-bit wow64 permits execution 32-bit x86 applications first employed windows xp 64-bit edition itanium reused x64 editions windows xp windows server 2003 since x86-64 architecture includes hardware-level support 32-bit instructions wow64 switches processor 32- 64-bit modes according microsoft 32-bit software running wow64 similar performance executing 32-bit windows fewer threads possible overheads 32-bit processes shown *32 task manager 64-bit processes extra text present although 32-bit applications run transparently mixing two types code within process allowed 64-bit application link 32-bit library dll similarly 32-bit application link 64-bit library may lead need library developers provide 32- 64-bit binary versions libraries windows xp x64 edition includes 32- 64-bit versions internet explorer 6 order allow possibility third-party browser plugins activex controls may yet available 64-bit versions older 32-bit drivers services supported 64-bit windows video audio codecs xvid oggds 32-bit dlls supported long media player uses 32-bit well 64-bit windows include ntvdm windows windows native support execution ms-dos 16-bit windows applications written windows 3.1 primary benefit moving 64-bit increase maximum allocatable virtual memory single standard process 32-bit windows operating system limited total 2,093,056 kilobytes 2gb minus one 4kb page large address aware 32-bit processes allocate 4gb windows xp x64 support much memory although theoretical memory limit 64-bit computer address 16exabytes windows xp x64 limited 128gb physical memory 8 terabytes virtual memory per process practical limit usually size pagefile windows xp professional x64 edition windows xp 64-bit edition version 2003 releases windows xp include internet information services 6.0 matches version shipped windows server 2003 versions xp include 5.1 64-bit versions windows xp also immune certain types viruses malware target 32-bit systems since system files 64-bit extra registers x86-64 architecture result performance improvements certain kinds applications often result slight decrease performance compared application implemented 32 bit x86 code running windows xp 32 bit editions microsoft released number editions windows xp targeted towards developers embedded devices use specific consumer electronics set-top boxes kiosks/atms medical devices arcade video games point-of-sale terminals voice internet protocol voip components editions belong windows embedded subfamilies windows xp embedded systems binary identical windows xp professional licensed embedded devices windows xp embedded commonly abbreviated xpe componentized version professional edition windows xp original equipment manufacturer free choose components needed thereby reducing operating system footprint also reducing attack area compared xp professional unlike windows ce microsoft operating system portable devices consumer electronics xp embedded provides full windows api support full range applications device drivers written microsoft windows system requirements state xpe run devices least 32 mb compact flash 32 mb ram p-200 microprocessor xpe released november 28 2001 october 2008 newest release windows xp embedded service pack 3 devices targeted xpe included automatic teller machines arcade games slot machines cash registers industrial robotics thin clients set-top boxes network attached storage nas time clocks navigation devices railroad locomotives etc custom versions os deployed onto anything full-fledged pc even though xpe supports hardware xp professional supports x86 architecture licensing restrictions prevent deployed standard pcs however microsoft made exceptions rule allowing xpe alongside standard oem install windows dell notebooks contain embedded xp installation part mediadirect 2.0 feature also found acer ones well samsung q1 windows embedded standard 2009 succeeded xpe 2h 2008 windows embedded standard 2009 derived windows xp embedded since microsoft time development componentized version windows vista windows embedded standard 2009 includes silverlight .net framework 3.5 internet explorer 7 windows media player 11 rdp 6.1 network access protection microsoft baseline security analyzer support managed windows server update services system center configuration manager windows embedded standard 7 succeeded windows embedded standard 2009 april 2010 componentized version windows 7 windows embedded point service wepos specialization windows xp embedded released may 25 2005 focuses point sale device market fuel pumps self checkout stations automated teller machines cash registers available purchase directly microsoft instead licensed original equipment manufacturers windows embedded posready 2009 succeeded wepos january 2009 windows embedded posready 2009 derived wepos since microsoft time development componentized version windows vista windows embedded posready 7 succeeded windows embedded posready 2009 july 2011 based windows 7 sp1 july 2006 microsoft introduced thin-client variant windows xp embedded called windows fundamentals legacy pcs targets older machines early original pentium available software assurance customers intended would like upgrade windows xp take advantage security management capabilities afford purchase new hardware windows thin pc succeeded windows fundamentals legacy pcs june 2011 based windows embedded standard 7 sp1 | [
6150,
11271,
3089,
11283,
11301,
5673,
3626,
6697,
1581,
7727,
9784,
1083,
10812,
7234,
582,
3142,
1098,
7755,
7253,
8281,
3162,
8798,
607,
2658,
10338,
8296,
5225,
6763,
8299,
7796,
6265,
5754,
636,
8316,
8829,
639,
11391,
641,
6276,
651... | Test |
8,316 | 2 | PlayStation_Portable_system_software:playstation portable system software playstation portable system software official firmware playstation portable uses xrossmediabar xmb user interface similar playstation 3 console updates add new functionality well security patches prevent homebrew applications plugins executed system updates obtained four ways system software updates used consoles region sony recommends downloading system software updates released region corresponding system place purchase system software updates added various features including web browser adobe flash player 6 support additional codecs images audio video playstation 3 connectivity well patches several security exploits vulnerabilities execution homebrew programs battery must least 50 charged else system prevent update installing power supply lost writing system software console longer able operate unless system booted service mode sent sony repair still warranty current version software 6.61 made available january 15 2015 minor update released three years release previous version 6.60 2011 playstation portable uses xrossmediabar xmb graphical user interface also used playstation 3 ps3 console variety sony bravia hdtvs blu-ray disc players many sony products xmb displays icons horizontally across screen seen categories users navigate using left right buttons d-pad move icons forward back across screen highlighting one time opposed using kind pointer select option one category selected usually specific options available select spread vertically selected icon users may navigate among options using buttons d-pad basic features offered xmb implementations varies based device software version psp console xmb top level icons photos music videos games networking allows use web browser settings extras also xmb offers degree multitasking psp using home button playing music would allow users browse photos without stopping music xmb proved successful user interface sony products psp ps3 next generation sony video game consoles playstation 4 playstation vita longer use user interface example xmb replaced livearea interface ps vita playstation portable comes web browser browsing internet web browser version netfront browser made access co. ltd. released free 2.00 system software update browser supports common web technologies http cookies forms css well basic javascript capabilities version 2.50 upgrade added unicode utf-8 character encoding auto-select options browser encoding menu also introduced saving input history online forms version 2.70 psp system software introduced basic flash capabilities browser however player runs flash version 6 five iterations behind current desktop version 11 making websites difficult view three different rendering modes normal just-fit smart-fit normal display page changes just-fit attempt shrink elements make whole page fit screen preserve layout smart-fit display content order appears html size adjustments instead drop element preceding element starts go screen browser also limited tabbed browsing maximum three tabs website tries open link new window browser opens new tab parents limit content enabling browser start control blocks access web browser creating 4-digit pin settings security additionally browser configured run proxy server protected security pin enable use web filtering monitoring software network recently trendmicro psp added feature enabled via subscription filter monitor content psp psp browser slower compared modern browsers often runs memory due limitations put place sony alternatively homebrew allowed custom version browser released utilizes 32/64 mb psp ram allows browser load pages faster memory larger pages opera mini also used psp pspkvm homebrew application sun java virtual machine claimed provide much faster loading times default browser provides better web page compatibility like many video game consoles playstation portable capable photo audio video playback variety formats however unlike sony home consoles playstation 3 playstation 4 possible play blu-ray dvd movies playstation portable directly since lacks standard blu-ray dvd drive umd drive exist umd movies umd format never saw implementation device playstation portable result market limited compared optical media formats movies released umd since 2011 final harry potter movie one final releases format playstation portable also supports feature known remote play allows psp access many features playstation 3 console remote location using ps3 wlan capabilities home network internet however unlike later remote play feature playstation vita playstation 4 remote play capabilities psp ps3 much limited although ps3 capabilities related main user interface accessible remote play playback dvds blu-ray discs playstation 2 games playstation 3 games copy-protected files stored ps3 hard drive supported actual remote play psp ps3 games supported select ps3 titles furthermore psp-2000 psp-3000 psp-n1000 use skype voip service starting system software version 3.90 service allows skype calls made wi-fi psp go bluetooth modem feature possible use voip service original psp-1000 console due hardware limitations also existed services psp room playstation portable similar playstation 3 online community-based service known playstation home homebrew development popular time playstation portable besides official firmware ofw made sony custom firmware also written custom firmware simply cfw also commonly seen playstation portable handheld consoles custom firmware allows running unsigned code homebrew applications umd backups emulators consoles well psone games disc images converted psp format unlike official system software usually allow signed retailed copies software run famous custom firmware include m33 custom firmware dark_alex well made others custom firmware 5.50gen series minimum edition me/lme cfw pro cfw since early days hackers working psp discovered exploits system software 1.00 1.50 allowed run unsigned code psp many psp-1000 users downgraded consoles versions order install custom firmware corresponding higher version system software later exploits discovered recent versions system software allowing installation homebrew content sony put significant effort blocking custom firmware third party devices content psp consoles effort quite successful psp july 2007 dark_alex officially stopped work psp citing perceived problems sony one reasons departure custom firmware continue developed updated however would different successor playstation vita unlike psp currently native cfw ps vita besides popular henakau exploit allowed users run unsigned code n't technically custom firmware exists ecfw ps vita meaning custom firmware psp running psp emulator ps vita features ecfw expected much limited real cfw ps vita unless usage adrenaline homebrew upgrade existing emulator adds usb support fixed ps1 emulation blue colour filter gaming platforms sony gaming platforms next generation gaming platforms generation | [
3077,
11271,
10761,
2061,
9743,
3089,
8725,
3626,
1067,
7727,
1587,
1080,
9784,
1083,
1091,
3651,
7748,
6732,
10316,
7246,
6738,
7253,
3162,
9306,
607,
2658,
4194,
9320,
6763,
5746,
4725,
7801,
633,
8315,
1148,
6781,
8829,
11391,
643,
627... | None |
8,317 | 8 | Secure-adaptive_architecture:secure-adaptive architecture pertaining web services secure-adaptive architecture saa refers particular approach towards security management issues inherent data transfer computer networks relating certain services micropayments saa personal information end-user name banking information personal identity numbers social security numbers retained two main benefits end-user chance identity theft fraud considerably reduced service provider means direct communication end-user financial institution unnecessary saa uses best class proven security techniques ensure safe transfer data network resources include protocols ssl communications client-side authentication aes encryption saa requires consistent pervasive real-time monitoring network resources ensure security | [
5433,
10020
] | Test |
8,318 | 4 | Banburismus:banburismus banburismus cryptanalytic process developed alan turing bletchley park britain second world war used bletchley park hut 8 help break german kriegsmarine naval messages enciphered enigma machines process used sequential conditional probability infer information likely settings enigma machine gave rise turing invention ban measure weight evidence favour hypothesis concept later applied turingery methods used breaking lorenz cipher aim banburismus reduce time required electromechanical bombe machines identifying likely right-hand middle wheels enigma hut 8 performed procedure continuously two years stopping 1943 sufficient bombe time became readily available banburismus development clock method invented polish cryptanalyst jerzy różycki hugh alexander regarded best banburists i. j good considered process intellectual game job easy enough trivial difficult enough cause nervous breakdown first months arriving bletchley park september 1939 alan turing correctly deduced message-settings kriegsmarine enigma signals enciphered common grundstellung starting position rotors super-enciphered bigram trigram lookup table trigram tables book called kenngruppenbuch k book however without bigram tables hut 8 unable start attacking traffic breakthrough achieved narvik pinch disguised armed trawler polares way narvik norway seized north sea 26 april 1940 germans time destroy cryptographic documents captured material revealed precise form indicating system supplied plugboard connections grundstellung 23 24 april operators log gave long stretch paired plaintext enciphered message 25th 26th bigram tables part capture hut 8 able use settings-lists read retrospectively kriegsmarine traffic intercepted 22 27 april allowed partial reconstruction bigram tables start first attempt use banburismus attack kriegsmarine traffic 30 april onwards eligible days least 200 messages received partial bigram-tables deciphered indicators first day broken 8 may 1940 thereafter celebrated foss day honour hugh foss cryptanalyst achieved feat task took november year time intelligence date show banburismus could work also allowed much bigram tables reconstructed turn allowed 14 april 26 june broken however kriegsmarine changed bigram tables 1 july end 1940 much theory banburismus scoring system worked first lofoten pinch trawler krebs 3 march 1941 provided complete keys february – bigram tables k book consequent decrypts allowed statistical scoring system refined banburismus could become standard procedure kriegsmarine enigma mid-1943 banburismus utilised weakness indicator procedure encrypted message settings kriegsmarine enigma traffic unlike german army airforce enigma procedures kriegsmarine used grundstellung provided key lists messages particular day pair days meant three-letter indicators enciphered rotor settings depth normally indicators two messages never could happen part-way message rotor positions became starting position rotors another message parts two messages overlapped way depth principle behind banburismus relatively simple seems rather similar index coincidence two sentences english german written one count made often letter one message corresponding letter message matches would occur sentences random strings letters random sequence repeat rate single letters expected 1 26 around 3.8 german navy messages shown 1 17 5.9 two messages depth matches occur plaintexts however messages depth two ciphertexts compare random giving repeat rate 1 26 allows attacker take two messages whose indicators differ third character slide looking giveaway repeat pattern shows align depth comparison two messages look repeats made easier punching messages onto thin cards 250 mm high 10 several metres wide different cards different lengths message hole top column card represented position hole bottom represented z two message-cards laid top light-box light shone repeat made much simpler detect count repeats cards printed banbury oxfordshire became known 'banburies bletchley park hence procedure using banburismus application scritchmus procedure see gives clue possible right-hand rotor message indicator vfg xcybgdslvwbdjlkwipehvygqzwdthrqxikeesqsspzxarixeabqiruckhgwuebpf message indicator vfx ynscfccpvipemsgizwflhesciyspvrxmcfqaxvxdvuqilbjuabnlkmkdjmenunq hut 8 would punch onto banburies count repeats valid offsets −25 letters +25 letters two promising positions offset eight letters shows nine repeats including two bigrams overlap 56 letters 16 promising position looks like offset seven shows single trigram overlap 57 letters turing method accumulating score number decibans allows calculation situations likely represent messages depth might expected former winner odds 5:1 latter 2:1 turing calculated scores number single repeats overlaps many letters number bigrams trigrams tetragrams often represented german word plaintext scores calculated according type message traffic analysis even position within message tabulated relevant values summed banburists assessing pairs messages see likely depth bletchley park used convention indicator plaintext vfx eight characters ahead vfg terms third differing letter x g+8 scritchmus part banburismus procedure could lead identification right-hand fast wheel banburist might evidence various message-pairs third indicator letter differing showing x q−2 h x−4 b g+3 would search deciban sheets distances odds better 1:1 i.e scores ≥ +34 attempt made construct 'end wheel alphabet forming 'chains end-wheel letters repeats could construct chain follows compared progressive offsets known letter-sequence enigma rotor quite possibilities discounted due violating either reciprocal property no-self-ciphering property enigma machine so-called end-wheel alphabet already limited nine possibilities merely establishing letter-chain five letters derived mere four message-pairs hut 8 would try fitting letter-chains — ones letters common first chain — nine candidate end-wheel alphabets eventually hope left one candidate maybe looking like end-wheel alphabet forces conclusion end wheel fact rotor rotor ii would caused mid-wheel turnover stepped e f yet middle span letter-chain f -- -- -- -- -o likewise possible mid-wheel turnovers precluded rotor turnover q r part alphabet spanned chain different enigma wheels different turnover points presumably measure designers machine improve security however complication allowed bletchley park deduce identity end wheel end wheel identified principles extended handle middle rotor though added complexity search overlaps message-pairs sharing first indicator letter overlaps could therefore occur 650 characters apart workload beyond manual labour bp punched messages onto 80-column cards used hollerith machines scan tetragram repeats better told banburies set light boxes overlap evaluate whole repeat pattern armed set probable mid-wheel overlaps hut 8 could compose letter-chains middle wheel much way illustrated end wheel turn scritchmus would give least partial middle wheel alphabet hopefully least possible choices rotor middle wheel could eliminated turnover knowledge done identifying end wheel taken together probable right hand middle wheels would give set bombe runs day would significantly reduced 336 possible | [
9156,
2341,
6223,
1941,
7416,
1342
] | Test |
8,319 | 2 | Optware:optware optware free software package manager embedded systems originally developed distribution mechanism unslung linux distribution linksys nslu2 optware adopted variety hobbyist communities device developers optware used number platforms including webos community working palm pre pixi wl-500g wl-hdd wl-500gx wl-500gp asus routers plug computers pogoplug v1 v2 pro biz dockstars etc asustor synology nas devices late 2010 first optware android released novaports team nook color optware packages currently run following devices | [
2178,
6178,
10760,
5067,
2285,
2258,
823,
6618,
10109
] | Test |
8,320 | 4 | HBGary:hbgary hbgary subsidiary company mantech international focused technology security past two distinct affiliated firms carried hbgary name hbgary federal sold products us federal government hbgary inc. clients included information assurance companies computer emergency response teams computer forensic investigators february 29 2012 hbgary inc. announced acquired services firm mantech international time hbgary federal reported closed company founded greg hoglund 2003 2008 joined mcafee security innovation alliance ceo made presentations black hat briefings rsa conference computer security conferences hbgary also analyzed ghostnet operation aurora events 2010 offices sacramento california washington d.c. bethesda maryland hbgary federal set aaron barr ceo instead hoglund provide services tools us government might require security clearance hbgary federal could meet revenue projections early 2011 negotiations sale hbgary federal progress two interested companies hbgary acquired mantech international february 2012 2010 aaron barr ceo hbgary federal alleged could exploit social media gather information hackers early 2011 barr claimed used techniques infiltrate anonymous partly using irc facebook twitter social engineering e-mails depict intention release information identities anonymous members b-sides conference sell possible clients including fbi e-mails barr explained identified list suspected anonymous members tracing connections social media main programmer criticized methodology communiqué anonymous denied association individuals barr named february 5–6 2011 anonymous compromised hbgary website copied tens thousands documents hbgary federal hbgary inc. posted tens thousands companies emails online usurped barr twitter account apparent revenge anonymous also claimed wiped barr ipad remotely though act remains unconfirmed anonymous group responsible attacks would go become lulzsec documents taken anonymous show hbgary federal working behalf bank america respond wikileaks planned release bank internal documents potential proactive tactics wikileaks include feeding fuel feuding groups disinformation creating messages around actions sabotage discredit opposing organization submitting fake documents wikileaks calling error additional emails published november 2016 wikileaks two employees hbgary referenced blog post endorsed manipulating translation software order 'mitigate damaging content within information leaks emails indicate palantir technologies berico technologies law firm hunton williams recommended bank america us justice department cooperated project e-mails appear show u.s. chamber commerce contracted firms spy discredit unions liberal groups conflict anonymous caused substantial public relations damage result involved organizations took steps distance hbgary hbgary federal reported hbgary federal contracted us government develop astroturfing software could create army multiple fake social media profiles later reported data security firm hbgary federal among persona management software contract bidders listed government website job ultimately awarded firm appear fedbizopps.gov page interested vendors contract awarded firm called ntrepid speaks wrote raw story hbgary made numerous threats cyber-attacks wikileaks dossier recently exposed emails revealed hbgary inc. working development new type windows rootkit code named magenta would undetectable almost impossible remove october 2010 greg hoglund proposed barr creating large set unlicensed windows 7 themes video games movies appropriate middle east asia would contain back doors part ongoing campaign attack support wikileaks products integrated products i.e recon digital dna responder 29 february 2012 mantech international announced purchase hbgary inc. financial terms acquisition disclosed say asset purchase excludes legal financial liabilities | [
1024,
5636,
4117,
8726,
535,
9761,
4644,
4133,
9791,
1608,
3657,
8779,
4703,
8288,
8292,
9319,
10875,
3711,
5251,
5764,
2187,
4240,
1688,
2717,
9375,
9904,
9395,
8886,
704,
3789,
4304,
4314,
7899,
9435,
4830,
3807,
9441,
2275,
5349,
1254,... | None |
8,321 | 4 | Eric_Corley:eric corley eric gordon corley born december 16 1959 also frequently referred pen name emmanuel goldstein figure hacker community directs non-profit organization 2600 enterprises inc. publishes magazine called associated monthly meet-ups around world hosts hacker convention hackers planet earth hope pseudonym derived fictional opposition leader george orwell dystopian novel nineteen eighty-four 1993 corley testified united states house representatives subcommittee telecommunications corley questioned relation content 2600 part discussions concerning digital telephony bill also known communications assistance law enforcement act corley editor best 2600 hacker odyssey released july 2008 book consists articles magazine set chronological order show evolution internet technology follow-up book dear hacker letters editor 2600 published 2010 corley host weekly radio programs hook wbai-fm wall wusb-fm hook often includes panel guests frequently centered technological topics wall usually narrated eric corley covered wide range topics hook air since 1988 corley directed 2001 film freedom downtime documentary incarcerations kevin mitnick bernie also examines alleged distortions mainstream media coverage mitnick case | [
9433,
4956,
2261,
10110
] | Test |
8,322 | 3 | AMD_K8:amd k8 amd k8 hammer also code-named sledgehammer computer processor microarchitecture designed amd successor amd k7 athlon microarchitecture k8 first implementation amd64 64-bit extension x86 instruction set architecture processors based k8 core include k8 core similar k7 radical change integration amd64 instructions on-chip memory controller memory controller drastically reduces memory latency largely responsible performance gains k7 k8 perceived pc community use codename k8 athlon 64 processor family amd longer uses k-nomenclatures originally stood kryptonite since k-nomenclature naming convention beyond k8 appeared official amd documents press releases beginning 2005 amd refers codename k8 processors family 0fh processors 10h 0fh refer main result cpuid x86 processor instruction hexadecimal numbering 0f h h represents hexadecimal numbering equals decimal number 15 10 h equals decimal number 16 k10h form sometimes pops improper hybrid k code family identifier number | [
3586,
5380,
8452,
9092,
6151,
8327,
10375,
6924,
5645,
398,
7963,
2719,
5922,
5541,
8231,
11047,
2094,
7858,
6978,
7234,
11331,
9157,
3783,
11080,
2764,
473,
7132,
7913,
5356,
1005,
5358,
7788,
1776,
1137,
9964,
499,
2549,
630,
3070
] | Train |
8,323 | 0 | Natural_Language_Toolkit:natural language toolkit natural language toolkit commonly nltk suite libraries programs symbolic statistical natural language processing nlp english written python programming language developed steven bird edward loper department computer information science university pennsylvania nltk includes graphical demonstrations sample data accompanied book explains underlying concepts behind language processing tasks supported toolkit plus cookbook nltk intended support research teaching nlp closely related areas including empirical linguistics cognitive science artificial intelligence information retrieval machine learning nltk used successfully teaching tool individual study tool platform prototyping building research systems 32 universities us 25 countries using nltk courses nltk supports classification tokenization stemming tagging parsing semantic reasoning functionalities | [
416,
5635,
7780,
8262,
5639,
9577,
8554,
2059,
7599,
1044,
2804,
3127,
2488,
6174
] | Test |
8,324 | 9 | Abstraction_principle_(computer_programming):abstraction principle computer programming software engineering programming language theory abstraction principle principle abstraction basic dictum aims reduce duplication information program usually emphasis code duplication whenever practical making use abstractions provided programming language software libraries principle sometimes stated recommendation programmer sometimes stated requirement programming language assuming self-understood abstractions desirable use origins principle uncertain reinvented number times sometimes different name slight variations read recommendation programmer abstraction principle generalized n't repeat principle recommends avoiding duplication information general also avoiding duplication human effort involved software development process recommendation programmer formulation benjamin c. pierce types programming languages 2002 abstraction principle reads emphasis original requirement programming language formulation david a. schmidt structure typed programming languages 1994 abstraction principle reads name abstraction principle appears long list books give necessarily incomplete list together formulation succinct principle plays central role design patterns object-oriented programming although writings topic give name principle influential book gang four states focus encapsulating concept varies theme many design patterns statement rephrased authors find varies encapsulate century principle reinvented extreme programming slogan definition principle rather succinct first appearance duplicate code later elaborated applicable issues software development automate every process worth automating find performing task many times script abstraction principle often stated context mechanism intended facilitate abstraction basic mechanism control abstraction function subroutine data abstractions include various forms type polymorphism elaborate mechanisms may combine data control abstractions include abstract data types including classes polytypism etc quest richer abstractions allow less duplication complex scenarios one driving forces programming language research design inexperienced programmers may tempted introduce much abstraction program—abstraction wo n't used complementary principle emphasize issue ai n't gon na need generally kiss principle since code usually subject revisions following abstraction principle may entail refactoring code effort rewriting piece code generically needs amortized estimated future benefits abstraction rule thumb governing devised martin fowler popularized rule three states piece code copied twice i.e would end three copies needs abstracted n't repeat dry principle generalization developed context multi-tier architectures related code necessity duplicated extent across tiers usually different languages practical terms recommendation rely automated tools like code generators data transformations avoid repetition addition optimizing code hierarchical/recursive meaning abstraction level programming also refers interfaces hardware communication layers also called abstraction levels abstraction layers case level abstraction often synonymous interface example examining shellcode interface higher lower level languages level abstraction changes operating system commands example c register circuit level calls commands example assembly binary case example boundary interface abstraction levels stack | [
3712,
8262,
1936,
5585,
11574,
2556
] | Test |
8,325 | 3 | MCDRAM:mcdram multi-channel dram mcdram pronounced em cee dee ram 3d-stacked dram used intel xeon phi processor codenamed knights landing version hybrid memory cube developed partnership micron competitor high bandwidth memory many cores xeon phi processors along associated vector processing units enable consume many gigabytes per second traditional dram dimms supply multi-channel part mcdram full name reflects cores many channels available access mcdram processors access attached dimms high channel count leads mcdram high bandwidth 400+ gb/s although latencies similar dimm access physical placement processor imposes limits capacity 16 gb launch much smaller capacity off-package dram 384gb memory partitioned boot time used cache distant ddr remainder mapped physical address space application request pages virtual memory assigned either distant ddr directly portion ddr cached mcdram portion mcdram used cache one way via thecodice_1 api used cache latency miss accessing mcdram ddr slightly higher going directly ddr applications may need tuned avoid excessive cache misses | [
3459,
5380,
3973,
9095,
5386,
9611,
4108,
5649,
5523,
6804,
8851,
4886,
9111,
3352,
11539,
10669,
9391,
10548,
1461,
2237,
5309,
6339,
5444,
1998,
2638,
5073,
1119,
1000,
7657,
4204,
5356,
8684,
5871,
499,
8820,
3317,
4217,
5883,
5503
] | Test |
8,326 | 2 | Linux_for_mobile_devices:linux mobile devices learned article linux range use linux kernel-based operating systems ubiquitously found diverse hardware platforms article linux mobile devices use linux kernel-based operating systems sorts mobile devices whose primary human interface device hid touchscreen mainly comprises smartphones tablet computers also mobile phones personal digital assistants pdas portable media players come touchscreen separately list many linux kernel-based operating systems used mobile devices differ one another parts middleware entire middleware employ individual uis | [
2560,
516,
5644,
3089,
5139,
9237,
10780,
4637,
3618,
9257,
2605,
1584,
9266,
1083,
10817,
8772,
8262,
2134,
3162,
2658,
6244,
6763,
2684,
11391,
2179,
7812,
10382,
657,
2195,
9366,
154,
9882,
6301,
1694,
10921,
10933,
4803,
6352,
3289,
3... | Validation |
8,327 | 3 | Alchemy_(microarchitecture):alchemy microarchitecture alchemy microarchitecture low power microprocessor design developed alchemy semiconductor implementing mips32 instruction set mips technologies first processor implementing au1 central processing unit products include amd alchemy au1000 au1550 sun ray 2 family thin clients. several cowon pmp devices dell drac5 remote administration cards airport extreme base station embedded products networking sun microsystems 4g systems mtx-1 accesscube meshcube alchemy semiconductor fabless semiconductor company based austin texas founded may 2000 purchased license mips architecture mips32 instruction set mips technologies developed au1 microprocessor au1000 au1550 socs alchemy semiconductor acquired amd 2002 summer 2006 sold alchemy processor line raza microelectronics december 2007 raza microelectronics changed name rmi corporation june 2009 netlogic microsystems acquired rmi 183.4 million stock september 2011 broadcom acquired netlogic shares transaction valued around 3.7bn | [
3586,
4098,
5380,
8322,
9092,
6151,
8327,
8711,
10375,
4235,
5645,
783,
7445,
2838,
7963,
4124,
9851,
2719,
8481,
5028,
5541,
11047,
6057,
426,
938,
8237,
2094,
10548,
9665,
6978,
7234,
1480,
11080,
2764,
10316,
473,
6247,
6250,
5356,
100... | Test |
8,328 | 2 | ReadyBoost:readyboost readyboost codenamed emd disk caching software component developed microsoft windows vista included later versions windows operating system readyboost enables nand memory mass storage devices including compactflash sd cards usb flash drives used write cache hard drive random access memory effort increase computing performance readyboost relies superfetch technology like superfetch adjusts cache based user activity features including readydrive implemented manner similar readyboost using readyboost-capable flash memory nand memory devices caching allows windows vista later service random disk reads better performance without cache caching applies disk content page file system dlls flash devices typically slower mechanical hard disk sequential i/o maximize performance readyboost includes logic recognizes large sequential read requests hard disk service requests compatible device plugged windows autoplay dialog offers additional option use flash drive speed system additional readyboost tab added drive properties dialog amount space used configured minimum cache size 250 mb vista fat32 formatting drive maximum 4 gb windows 7 ntfs exfat formatting maximum cache size 32 gb per device windows vista allows one device used windows 7 allows multiple caches one per device total 256 gb readyboost compresses encrypts data placed flash device aes-128 microsoft stated 2:1 compression ratio typical 4 gb cache would usually contain 8 gb data device compatible useful must conform requirements considerations readyboost available windows server 2008 according jim allchin future releases windows readyboost able use spare ram networked windows pcs system 512 mb ram minimum requirement windows vista see significant gains readyboost one test case adding 1 gb readyboost memory sped operation 11.7 seconds 2 seconds however increasing physical memory ram 512 mb 1 gb without readyboost reduced 0.8 seconds system performance readyboost monitored windows performance monitor price ram decreased ram installed computers mitigations provided readyboost systems insufficient memory decreased core idea readyboost flash memory e.g usb flash drive ssd much faster seek time typical magnetic hard disk less 1 ms allowing satisfy requests faster reading files hard disk also leverages inherent advantage two parallel sources read data whereas windows 7 enables use eight flash drives allowing nine parallel sources usb 2.0 flash drives slower sequential reads writes modern desktop hard drives desktop hard drives sustain anywhere 2 10 times transfer speed usb 2.0 flash drives equal slower usb 3.0 firewire ieee 1394 sequential data usb 2.0 faster flash drives faster random access times typically around 1 ms compared 12 ms mainstream desktop hard drives laptop computers performance shifts favor flash memory laptop memory expensive desktop memory many laptops also relatively slow 4200 rpm 5400 rpm hard drives versions vista prior sp1 readyboost failed recognize cache data upon resume sleep restarted caching process making readyboost ineffective machines undergoing frequent sleep/wake cycles problem fixed vista sp1 since flash drives wear finite though large number writes readyboost eventually wear drive uses according microsoft windows client performance group drive able operate least ten years | [
8576,
651,
6797,
10382,
2193,
9377,
2339,
935,
1577,
2221,
7983,
11568,
10811,
4926,
2244,
1098,
5840,
9972,
3834
] | Validation |
8,329 | 4 | Privacy_software:privacy software privacy software software built protect privacy users software typically works conjunction internet usage control limit amount information made available third parties software apply encryption filtering various kinds privacy software refer two different types protection one type protecting user internet privacy world wide web software products mask hide user ip address outside world order protect user identity theft second type protection hiding deleting users internet traces left pc surfing internet software erase users internet traces software hide encrypt user traces others using pc know surfing one solution enhance privacy software whitelisting whitelisting process company identifies software allow try recognize malware whitelisting permits acceptable software run either prevents anything else running lets new software run quarantined environment verify validity whereas whitelisting allows nothing run unless whitelist blacklisting allows everything run unless black blacklist includes certain types software allowed run company environment example company might blacklist peer-to-peer file sharing systems addition software people devices web sites also whitelisted blacklisted intrusion detection systems designed detect types malicious network traffic computer usage detected firewall systems capture network traffic flows examine contents packet malicious traffic encryption another form privacy security organizations secure channel sending information use encryption stop unauthorized eavesdroppers encryption process converting original message form read anyone except intended receiver steganography sometimes used hide messages eavesdropping e-surveillance privacy different anonymity applicability usage anonymity subordinate privacy might desired exchange retrieval publication specific information uses privacy software free legal issues instance regulations export cryptography united states similarly key disclosure law also requires individuals surrender cryptographic keys law enforcement agencies encryption laws india also carry many legal restrictions diverse situations. ref name= http //perry4law.co.in/blog/ p=67 /ref talks also pipeline include cyber security technologies like encryption related software wassenaar arrangement thereby making export cumbersome. ref name= http //perry4law.co.in/cyber_security/ p=61 /ref | [
673,
2050,
2818,
5186,
10341,
2824,
3629,
11215,
11198,
4725,
11319,
119,
1368,
5373,
8283,
5245,
2558
] | Test |
8,330 | 4 | ESafe:esafe esafe protect previously known eliashim antivirus line software security products developed eliashim ltd. based haifa israel. distributed esafe technologies inc. seattle usa eliashim acquired aladdin knowledge systems december 1998. esafe protect consumer desktop version distributed aladdin discontinued 2002 following years esafe brand evolved gateway-based fully featured content security product sold aladdin knowledge systems integrated security appliance march 2009 aladdin knowledge systems merged safenet inc. esafe evolved become safenet esafe content security product line | [
4760,
1994,
7327
] | Validation |
8,331 | 4 | Bitmessage:bitmessage bitmessage decentralized encrypted peer-to-peer trustless communications protocol used one person send encrypted messages another person multiple subscribers june 2013 software experienced surge new adoptions news reports email surveillance us national security agency bitmessage conceived software developer jonathan warren based design decentralized digital currency bitcoin software released november 2012 mit license bitmessage gained reputation reach warrantless wiretapping conducted national security agency nsa due decentralized nature protocol encryption difficult crack result downloads bitmessage program increased fivefold june 2013 news broke classified email surveillance activities conducted nsa bitmessage also mentioned experimental alternative email popular science cnet ransomware programs instruct affected users use bitmessage communicate attackers | [
2050,
4100,
10631,
4490,
4746,
5899,
5391,
1297,
1810,
11418,
6519,
2083,
9764,
10405,
11046,
4268,
3629,
7983,
1456,
10161,
1970,
7859,
2228,
3382,
8758,
1978,
1087,
8640,
9281,
7238,
6602,
7887,
11088,
6993,
82,
728,
8283,
3422,
10850,
... | Validation |
8,332 | 4 | DomainKeys:domainkeys domainkeys informally dk deprecated e-mail authentication system designed yahoo verify domain name e-mail sender message integrity aspects domainkeys along parts identified internet mail combined create domainkeys identified mail dkim widely used domainkeys dkim published may 2007 domainkeys historical protocol dkim standards-track replacement | [
2848,
8202,
5421,
9532,
4793,
2748
] | None |
8,333 | 4 | DMA_attack:dma attack dma attack type side channel attack computer security attacker penetrate computer device exploiting presence high-speed expansion ports permit direct memory access dma dma included number connections lets connected device camcorder network card storage device useful accessory internal pc card transfer data computer maximum speed possible using direct hardware access read write directly main memory without operating system supervision interaction legitimate uses devices led wide adoption dma accessories connections attacker equally use facility create accessory connect using port potentially gain direct access part physical memory address space computer bypassing os security mechanisms lock screen read computer steal data cryptographic keys install run spyware exploits modify system allow backdoors malware preventing physical connections ports prevent dma attacks many computers connections implementing dma also disabled within bios uefi unused depending device nullify reduce potential type exploit examples connections may allow dma exploitable form include firewire cardbus expresscard thunderbolt pci pci express modern operating systems non-system i.e user-mode applications prevented accessing memory locations explicitly authorized virtual memory controller called memory management unit mmu addition containing damage may caused software flaws allowing efficient use physical memory architecture forms integral part security operating system however kernel-mode drivers many hardware devices user-mode vulnerabilities allow direct unimpeded access physical memory address space physical address space includes main system memory well memory-mapped buses hardware devices controlled operating system reads writes ordinary ram ohci 1394 specification allow devices performance reasons bypass operating system access physical memory directly without security restrictions sbp2 devices easily spoofed allowing operating system tricked allowing attacker read write physical memory thereby gain unauthorised access sensitive cryptographic material memory systems may still vulnerable dma attack external device firewire expresscard thunderbolt expansion port like pci pci express general connects attached devices directly physical rather virtual memory address space therefore systems firewire port may still vulnerable pcmcia/cardbus/pc card expresscard port would allow expansion card firewire installed attacker could example use social engineering attack send lucky winner rogue thunderbolt device upon connecting computer device direct unimpeded access physical address space would able bypass almost security measures os ability read encryption keys install malware control system devices attack also easily executed attacker physical access target computer addition abovementioned nefarious uses beneficial uses dma features used kernel debugging purposes tool called inception attack requiring machine expansion port susceptible attack another application known exploit vulnerability gain unauthorized access running windows mac os linux computers spyware finfirewire dma attacks prevented physical security potentially malicious devices kernel-mode drivers many powers compromise security system care must taken load trusted bug-free drivers example recent 64-bit versions microsoft windows require drivers tested digitally signed microsoft prevent non-signed drivers installed iommu technology applies concept virtual memory system busses may used close security vulnerability well increase system stability intel brands iommu vt-d. amd brands iommu amd-vi linux supports iommus use block i/o transactions allowed however iommus mostly used instead give guest virtual machines passthrough access host hardware newer operating systems may take steps prevent dma attacks recent linux kernels include option disable dma firewire devices allowing functions windows 8.1 prevent access dma ports unattended machine console locked never allowing sensitive data stored ram unencrypted another mitigation venue dma attacks however protection reading ram content enough writing ram via dma may compromise seemingly secure storage outside ram code injection example latter kind attack tresor-hunt exposes cryptographic keys never stored ram certain cpu registers tresor-hunt achieves overwriting parts operating system microsoft recommends changes default windows configuration prevent concern | [
4163,
4389,
2630,
4695,
107,
1515,
3532,
1614,
6797,
7983,
3473,
11539,
6644,
823,
10392,
4314,
2558
] | None |
8,334 | 4 | Trusted_Email_Open_Standard:trusted email open standard trusted email open standard teos anti-spam technique proposed eprivacy group 2003 federal trade commission anti-spam summit edited stephen cobb cissp 35-page white paper describing standard downloaded 30,000 times publication april 2003 end year many elements teos later appeared letter microsoft ceo bill gates submitted u.s. senate commerce committee hearings anti-spam legislation letter outlined microsoft position spam crisis handled basic level teos proposes framework trusted identity email senders based secure fast lightweight signatures email headers optimized dns-based systems flexibility ease implementation teos also provides common-language framework making trusted assertions content individual message isps email recipients rely assertions manage email | [
6762,
119
] | None |
8,335 | 5 | XIMSS:ximss xml interface messaging scheduling signaling ximss xml-based api ip communications ximss api introduced communigate systems communigate pro often referred cgp server starting version 5.1 summer 2006 announcement described ximss based open proposed standard ximss based previous xml rfcs clear whether formal proposal defining ximss standards body communigate explicitly specify rfc referring basis ximss server implementation ximss communigate pro applications publicly available using ximss communigate flash-based pronto integrated messaging client explicitly clear documentation whether ximss freely implemented servers clients without permission communigate description open implies level freedom expressed purpose ximss offer single client interface based widely-familiar open technologies i.e http xml complex communications services email calendaring im voip etc provided one server specified ximss intrinsically bound cgp server however specified functional scope clearly inspired cgp feature set | [
5472,
119,
10271,
4797,
479
] | None |
8,336 | 6 | MobilEcho:mobilecho mobilecho created grouplogic inc. mobile file management system iphone ipad first introduced may 23 2011 techcrunch disrupt new york city mobilecho information technology software securely integrating iphones ipads android phones tablets corporate file servers networks mobilecho installed corporate file servers departments installed iphones ipads android phones tablet computers users allows storage secure transfer files back forth directly servers iphones ipads android phones tablets mobilecho ios client grouplogic enterprise file sharing synching solution activecho january 2011 apple inc. stated 80 fortune 100 companies deployed tested ipad due consumerization enterprise – trend new technology emerging within consumer market first spreading enterprise organizations statistic increased 15 since october 2010 consumerization enterprise allowed employees bring personal tablet computers ipads work environment employees use connect corporate file server network trend raised security issues within enterprise employees unable bring corporate security infrastructure home ipads ios devices currently native file system accessible users inherently capable accessing corporate files without using third-party cloud providers like dropbox mobileme users emailing files workarounds believe compromise enterprise security | [
9732,
6539,
7983,
4623,
5784
] | None |
8,337 | 4 | Bounce_address:bounce address bounce address email address bounce messages delivered many variants name none used universally including return path reverse path envelope envelope sender mail 5321-from return address from_ errors-to etc uncommon single document use several names names refer email address provided mail command smtp session ordinarily bounce address seen email users without standardization name may cause confusion email message thought resembling traditional paper letter envelope header fields subject along body message analogous letterhead body letter normally presented visible user however envelope analogy contents mail rcpt fields smtp session neither normally visible user common information letter envelope values always case example electronic mailing lists information seen header come person sent email list bounce address set mailing list software problems delivering mailing list messages handled correctly envelope information looked resolve email go body email examined mail transfer agents mta using smtp protocol use rcpt command determine email go mail command indicate came original usage provide information return bounce messages since late 1990s uses come typically take advantage properties bounce address extended uses include mailing list handling variable envelope return path verp email authentication spam filtering backscatter reduction bounce address tag validation various terms different origins sometimes different meanings although differences often become moot modern internet | [
3645,
1125,
6762,
8202,
5421,
10167,
9588,
6261,
9532,
9909,
4793,
6492,
3549,
2527
] | None |
8,338 | 3 | Migration_(virtualization):migration virtualization context virtualization guest simulation entire computer actually merely software virtual machine vm running host computer hypervisor migration also known teleportation process running virtual machine moved one physical host another little disruption service ideally process completely transparent resulting disruption service downtime practice always minor pause availability though may low enough hard real-time systems affected virtualization far frequently used network services user applications generally tolerate brief delays may involved perceived impact similar longer-than-usual kernel delay actual process heavily dependent particular virtualization package use general process follows note practice regular maintenance operations required merge snapshot stack manageable number files improve performance optimize storage redundant overwrites merged migration similar failover capability virtualization suites provide true failover host may suddenly completely failed precludes latest state vm copied backup host however backup host everything except latest changes may indeed able resume operation last known coherent state operations similar systems provide one capability may provide | [
3450,
2051
] | Test |
8,339 | 7 | Grid_resource_allocation_manager:grid resource allocation manager globus resource allocation manager gram software component globus toolkit locate submit monitor cancel jobs grid computing resources provides reliable operation stateful monitoring credential management file staging gram provide job scheduler functionality fact front-end interoperability bridge functionality provided external scheduler natively support globus web service protocols jobs submitted gram targeted single computation resource consist optional input file staging phase job execution optional output file staging cleanup stage gram4 jobs described internally using job description language earlier gram system known gram2 predecessor resource specification language rsl used instead planning efforts underway enable future versions gram use job submission description language instead | [
11353,
10625
] | None |
8,340 | 1 | Rocket_U2:rocket u2 rocket u2 suite database management dbms supporting software owned rocket software includes two multivalue database platforms unidata universe products operating environments run current unix linux windows operating systems derivatives pick operating system family also includes developer web-enabling technologies including systembuilder/sb+ sb/xa u2 web development environment webde uniobjects wintegrate universe originally developed vmark software unidata originally developed unidata corporation universe unidata used vertical application development embedded vertical software applications 1997 unidata corporation merged vmark systems form ardent software march 2000 ardent software acquired informix ibm subsequently acquired database division informix april 2001 making universe unidata part ibm db2 product family ibm subsequently created information management group data management one sub-areas ibm u2 family comprised unidata universe along tools systembuilder extensible architecture sb/xa u2 web development environment u2 web de wintegrate 1 october 2009 announced rocket software purchased entire u2 portfolio ibm u2 portfolio grouped name rocketu2 systems made one accounts accounts directories stored host operating system initially contain set files needed system function properly includes system voc vocabulary file contains every command filename keyword alias script pointers classes voc entries also created user files similar tables relational database file unique name distinguish files zero multiple unique records logically related files made two parts data file file dictionary dict data file contains records store actual data file dictionary may contain metadata describe contents output contents file hashed files u2 system uses hashing algorithm allocate file records groups based record ids searching data hashed file system searches group record id stored making search process efficient quicker searching whole file nonhashed files used store data little logical structure program source code xml plain text type file stored subdirectory within account directory host operating system may read edited using appropriate tools files made records similar rows within tables relational database record unique key called record id distinguish records file record ids typically hashed data retrieved quickly efficiently records including record ids store actual data pure ascii strings binary data stored u2 example hardware representation floating-point number would converted ascii equivalent stored usually records divided fields sometimes called attributes u2 field separated field mark hexadecimal character fe thus string codice_1 might represent record employee file 123-45-6789 record id john jones first field jjones company.com second field 4321.00 monthly salary stored third field up-arrow standard pick notation field mark xfe thus first three fields record including record id trailing field mark would use 49 bytes storage given value uses many bytes needed example another record file john jones 10 bytes may replaced marjorie q. humperdink 21 bytes yet name uses much storage needs plus one field mark fields may broken values even subvalues values separated value marks character xfd subvalues separated subvalue marks character xfc thus john jones happened get second email address record may updated codice_2 close bracket represents value mark since email address id record separate file sql terms outer join u2 terms translate provides reason u2 may classified multivalued database raw information called data record set logical grouped data e.g employee record data stored form fields/attributes like name address etc universe unidata structured basic language universe basic unibasic respectively similar pick/basic naturally operates structures multivalue database also structured database query language retrieve uniquery used select records processing ad hoc queries reports rocketu2 provides set client tools allow software developers access u2 databases software languages client tool interfaces include universe unidata support tls transport level data encryption record file level encryption data rest using openssl additional api encryption functionality also available allow custom solutions meet specific regulatory requirements rocketu2 offers three professional certification designations related u2 product family rocket software universe unidata limited ability create web-based front-ends universe/unidata content since rocket software provides sql access database products sql-based product used build web-based ui databases regardless using files tables u2 third-party application framework used build web interfaces | [
2432,
4255,
6850,
5051,
5929,
10286,
7983,
6993,
10737,
9075,
5492,
9780,
4630,
823,
2043,
3644,
479
] | Validation |
8,341 | 4 | The_Abusive_Hosts_Blocking_List:abusive hosts blocking list abusive hosts blocking list ahbl internet abuse tracking filtering system developed summit open source development group based original summit blocking list 2000–2002 dnsbls shut jan 1 2015 appear blacklisting entire internet ahbl operated several dnsbl lists one rhsbl list use various types services data mostly added removed automatically ahbl preferred manage certain categories hand accuracy dnsbl list developed use smtp services real-time blocking system means data collected various sources 24 hours day 7 days week real time merged database data included spam sources open proxies open relays ddos drones usenet spam sources controversial shoot sight listing policy ircbl list reduced version dnsbl include spam sources data unnecessary use irc networks chat systems rhsbl list domain-based rather ip4r included domains owned and/or operated spammers known abusive domains domains used send e-mail request domain owner commonly used block domains address e-mail well surbl type systems scan links e-mail torbl list ip4r based list tor nodes included tor nodes including entrance transit exit nodes tor network list contained entrance transit nodes exit nodes ahbl recommends using torbl e-mail blocking purposes march 26 2014 blacklist administrator brielle bruns announced abusive hosts blocking list dnsbls shut ahbl site also published announcement several ahbl actions since creation led harsh criticism members spam fighting community overly aggressive unreasonable one example complete blocking spain largest internet service provider telefónica.es 6 months ever increasing amount spam illegal 419 coming rima-tde.net ip space ahbl also publicly spoken spamhaus .mail icann proposal later rejected icann ahbl also listed godaddy hosting services due continued hosting free speech store richard scoville attempted sue ahbl past listing escalated repeated attempts resolve issue godaddy abuse department told enforce tos aup unless forced law enforcement second major source controversy comes ahbl shoot sight listing policy commonly used administrators force isps take action entities ahbl considers abusers entities make legal cart00ney threats ahbl similar organizations threatening ahbl lawsuit years december 17 2005 richard scoville operator website free speech store sued ahbl sosdg associated individuals bexar county texas 3.525 million us claiming various damages business suit dismissed prejudice january 6 2006 lack jurisdiction | [
8224,
5251,
6762,
5357,
8627,
9909,
3350
] | Test |
8,342 | 8 | Business_process_network:business process network business process networks bpn also referred business service networks business process hubs enable efficient execution multi-enterprise operational processes including supply chain planning execution bpn extends implements organization service-orientation enterprise applications execute processes bpns combine integration services application services often support particular industry process order management logistics management automated shipping receiving others organizations derive primary value e.g. revenue attain goals outside 'four walls enterprise-—by selling consumers b2c businesses b2b thus businesses seek efficiently manage processes span multiple organizations one process supply chain management bpns gaining popularity partly changing nature supply chains supply chains become truly global trends global sourcing offshoring asia india low-cost production regions world continue add complexity effective trading partner management supply chain visibility transition global sourcing challenging companies companies requisite strategies infrastructure extended process control effectively make transition global sourcing majority supply managers continue use mix e-mail phone fax collaborate offshore suppliers—-none standardized easily integrated enable informed business decisions actions distant trading partners introduce new standards new systems multiple time zones new processes different levels technological maturity supply chain bpns help reduce complexity providing common framework information exchange visibility collaboration bpns also increasingly used enable manage operational business process outsourcing bpo functions human resources finance information technology ‘ non-core ’ relative business business functions whereby bpn facilitates collaboration document movement organization outsourcing firm bpns implemented using host technology platforms including limited traditional edi value-added networks vans industry exchanges b2b gateways point point integration brokers vpns mechanisms enable trading partners connect electronically collaborate conduct business amongst bpns accelerated growth web services service-oriented architectures soa technologies simplify integration people processes systems business process networks often managed using multi-tenant architectures rapidly enable seamless many-to-many one-to-many hub-spoke model connectivity trading partners across extended supply chain multi-tenant frameworks also ensure trading partners work single shared set applications collaboration tools hosted network provider mitigating integration barriers hurdles heterogeneous back-end infrastructures systems across trading community vans industry exchanges bring added benefit pre-connected trading partners often ranging tens thousands enable faster trading community implementation lower overall cost manage maintain connections | [
4107
] | Test |
8,343 | 4 | Unified_threat_management:unified threat management unified threat management utm approach information security single hardware software installation provides multiple security functions contrasts traditional method point solutions security function utm simplifies information-security management providing single management reporting point security administrator rather managing multiple products different vendors utm appliances gaining popularity since 2009 partly all-in-one approach simplifies installation configuration maintenance setup saves time money people compared management multiple security systems instead several single-function appliances needing individual familiarity attention support network administrators centrally administer security defenses one computer prominent utm brands sophos sonicwall check point utms minimum converged security features like features commonly found utms although utm offers ease management single device also introduces single point failure within infrastructure additionally approach utm may go one basic information assurance security approaches defense depth utm would replace multiple security products compromise utm layer break entire defense-in-depth approach | [
9824,
10232,
2213,
9285,
10245,
4843,
3500,
5389,
9053,
9715,
3732,
4471,
4568,
569,
11611,
5373
] | Test |
8,344 | 4 | Privilege_separation:privilege separation computer programming computer security privilege separation technique program divided parts limited specific privileges require order perform specific task used mitigate potential damage computer security vulnerability common method implement privilege separation computer program fork two processes main program drops privileges smaller program keeps privileges order perform certain task two halves communicate via socket pair thus successful attack larger program gain minimal access even though pair programs capable performing privileged operations privilege separation traditionally accomplished distinguishing real user id/group id effective user id/group id using setuid 2 /setgid 2 related system calls specified posix incorrectly positioned gaps allow widespread network penetration many network service daemons specific privileged operation open raw socket internet socket well known ports range administrative utilities require particular privileges run-time well software tends separate privileges revoking completely critical section done change user runs unprivileged account action known dropping root unix-like operating systems unprivileged part usually run nobody user equivalent separate user account privilege separation also done splitting functionality single program multiple smaller programs assigning extended privileges particular parts using file system permissions way different programs communicate operating system scope potential vulnerabilities limited since crash less privileged part exploited gain privileges merely cause denial-of-service attack separation privileges one major openbsd security features implementation postfix focused implementing comprehensive privilege separation solaris implements separate set functions privilege bracketing | [
2825,
3473,
5397,
8725,
10016,
6694,
174,
7983,
7601,
10673,
2228,
5179,
8379,
4423,
2253,
6993,
5970,
8787,
10835,
1509,
4071,
6888,
2409,
4972,
11500,
5230,
3700,
7030,
1785,
7804,
2558
] | Validation |
8,345 | 2 | Real-time_clock_alarm:real-time clock alarm real time clock alarm feature used allow computer 'wake shut execute tasks every day certain day sometimes found 'power management section motherboard bios setup however newer bios setups include rtc alarm option although still set within user applications wake lan wake ring ipmi functions could also used start computer turned linux real time clock alarm set retrieved using /proc/acpi/alarm /sys/class/rtc/rtc0/wakealarm alternatively rtcwake utility may used prevents problems using local time instead utc automatically processing /etc/adjtime file systemd used wake system run task specific time microsoft windows different programs could used 'wake computer standby hibernation task scheduler settings power management used 'wake computer run task | [
5312,
10967,
1515,
6797,
7151,
823
] | Test |
8,346 | 4 | ScienceLogic:sciencelogic sciencelogic software service vendor produces information technology management monitoring solutions operations cloud computing company product monitoring management system performs discovery dependency mapping monitoring alerting ticketing runbook automation dashboarding reporting networks compute storage applications sciencelogic platform monitors on-premises cloud-based assets enabling customers use public cloud services amazon web services aws microsoft azure google cloud manage hybrid multi-cloud workloads sciencelogic founded reston virginia 2003 dave link christopher cordray richard chart 2005 company tripled revenue growth year-over year triple digit growth 2005-2007 2008 sciencelogic posted 5.9m revenue also 2008 inc. magazine placed sciencelogic annual list america 500 fastest growing private companies 350 also including 42 top 100 services companies year 2009 position list 490 sciencelogic also ranked 59 deloitte 2009 technology fast 500 ranking 2003 2009 sciencelogic overall sales growth 70 2010 sciencelogic received 15 million series funding new enterprise associates 2012 sciencelogic raised additional 15 million funding intel capital 2013 sciencelogic monitoring software chosen deployed whoa networks inc 2014 sciencelogic introduced cloudmapper automatically discovers maps relationships assets public cloud services aws well customers premises hybrid environment dependency mapping enables customers identify non-performing assets environments | [
7248,
4194,
1935
] | Validation |
8,347 | 2 | GODI:godi godi package management system ocaml programming language provides dependency management ocaml similar way cpan provides package management perl godi derived netbsd pkgsrc system acronym godi simultaneously stands gerd ocaml distribution general ocaml distribution gerd first name project initiator gerd stolpmann last update project discontinued came 2014 | [
8582,
9671,
2281,
5067,
4309
] | Test |
8,348 | 9 | AMSRefs:amsrefs amsrefs package extension package latex facilitates creation bibliographies citations latex documents use amsrefs allows retention rich markup makes references easier reuse publishing environments web book journal formats citation services package available free american mathematical society website purpose amsrefs provide simpler flexible way use many bibliography citation features users latex bibtex come expect amsrefs designed encourage preservation structured markup bibliography throughout entire lifetime document rough draft final archival version replacing unstructured .bbl file format latex fully structured format package compatible “ showkeys ” “ hyperref ” “ backrefs ” packages implements functionality “ cite ” package amsrefs provides bibliography style controlled completely latex instead determined partly bibtex style file partly latex data format used database file latex document thus amsrefs-format database valid latex document printed directly also author send article embedded references publisher without loss internal structural information entries possible use amsrefs package without abandoning one ’ existing bibtex database files amsrefs may distributed and/or modified latex project public license either version 1.3c license option later version | [] | Test |
8,349 | 7 | Polish_Grid_Infrastructure_PL-Grid:polish grid infrastructure pl-grid polish grid infrastructure pl-grid nationwide computing infrastructure built 2009-2011 scientific project pl-grid polish infrastructure supporting computational science european research space purpose enable scientific research based advanced computer simulations large-scale computations using computer clusters provide convenient access computer resources research teams also outside communities high performance computing centers operate first decade twenty-first century european countries advanced grid programs created besides european worldwide consolidation took place form various projects concerned grid technology hpc egee e-irg prace deisa omii-europe poland also undertaken efforts build national grid without infrastructure would possible polish scientific communities participate many research programs particularly eu 7th framework programme another reason initiate steps towards polish grid creation fact poland number intensively cooperating geographically dispersed research teams increasing case cooperation tools gathering sharing accumulated knowledge global scale essential 2007 support almost european countries egi design study project created goal prepare rules integration national grids national grid initiatives europe stable production infrastructure european grid initiative would begin operation 2010 helped start work establishing national grid initiative poland already 2007 setting pl-grid consortium pl-grid consortium established five polish supercomputing networking centers 2009-2011 activity consortium supported pl-grid project co-funded european regional development fund within innovative economy operational programme result operation consortium establishment polish grid infrastructure pl-grid formed merger new powerful computational resources purchased installed data centers belonging pl-grid consortium computational resources available polish grid infrastructure pl-grid include end pl-grid project 5.8 pbytes storage capacity 588 tflops computing power one clusters within polish grid infrastructure zeus supercomputer installed academic computer centre cyfronet agh university science technology kraków 2010 2011 2012 efficient supercomputer poland pl-grid infrastructure resources available scientific software packages allow researchers field biology quantum chemistry physics numerical computations simulation conduct large-scale computations adf amber autodock blast blender cfour clustal cpmd dalton fluent gamess gaussian gromacs mathematica matlab meep molpro mopac namd nwchem openfoam pov-ray r turbomole within pl-grid infrastructure available several tools support design running scientific applications distributed computational resources organization computational experiments visualization applications results resources management g-eclipse gridspace2 qosqosgrid migrating desktop aside user-end tools several software packages administrators also developed namely acarm-ng keyfs security-related projects also useful standalone solutions pl-grid contribution open source community creation national grid infrastructure enterprise large potential innovation mentioned government documents setting directions development polish science technology economy fulfill aim „ growth competitiveness polish science ” innovative economy operational program science sector must strengthened provision suitable research base grid infrastructure constituted base specialized systems specific various fields science created involving services tools oriented used types applications polish grid infrastructure continuously maintained extended within plgrid plus project 2012-2014 domain-oriented services resources polish infrastructure supporting computational science european research space – plgrid plus “ important task preparation specific computing environments – called domain grids – i.e. solutions services extended infrastructure including software tailored needs different groups scientists | [
5956,
1480,
5833,
3609,
10142
] | Test |
8,350 | 8 | Zeus_Web_Server:zeus web server zeus web server proprietary web server unix unix-like platforms including solaris freebsd hp-ux linux developed zeus technology software company located cambridge england original authors company founders university cambridge graduates damian reeves adam twiss support aix tru64 mac os x dropped 10 june 2008 new zws releases made since january 2010 company longer offers similar server solution july 2011 company acquired riverbed technology ended support zws november 30 2014 zeus designed high-performance web server commonly used hardware vendors submitting specweb99 benchmarks hardware specweb99 benchmark retired 2005 replaced specweb2005 specweb2005 submissions made using zeus 2008 longer among top performers addition static content serving zeus supported dynamic content via cgi fastcgi apache jserv isapi nsapi mod_perl ssi zeus distributed authentication content zdac proprietary fastcgi-like protocol zeus mainly competed commercial web servers oracle iplanet web server also claimed high degree compatibility apache http server including .htaccess support url rewriting system comparable apache mod_rewrite expectation apache users would migrate zeus server load increased nsapi isapi supported ease migrations microsoft iis sun java system web server | [
1920,
4485,
7430,
9229,
7567,
7695,
1937,
11154,
7443,
1556,
5397,
1304,
7457,
3746,
8994,
2596,
3237,
9125,
11682,
7338,
9387,
44,
11439,
10800,
4658,
2485,
1206,
823,
6714,
10815,
10622,
1991,
11134,
595,
1363,
4439,
3545,
225,
865,
125... | Test |
8,351 | 5 | Naver_Whale:naver whale naver whale hangul 네이버 웨일 south korean freeware web browser developed naver corporation also available english became available android april 13 2018 since browser based chromium since inception 2011 google chrome apps compatible browser pages translated naver papago service translate korean japanese many languages naver whale browser extensions accessed whale store | [
513,
6657,
9736,
2579,
6171,
9757,
7713,
10791,
9770,
559,
4661,
3639,
10808,
3643,
9275,
64,
5707,
10834,
6231,
8281,
6747,
1642,
9834,
9841,
115,
9843,
119,
4728,
637,
1664,
2182,
10910,
7340,
4273,
9394,
9908,
185,
11449,
4797,
11466,
... | Test |
8,352 | 3 | Index_register:index register index register computer cpu processor register used modifying operand addresses run program typically vector/array operations contents index register added cases subtracted immediate address one part instruction form effective address actual data operand special instructions typically provided test index register test fails increments index register immediate constant branches typically start loop instruction sets allow one index register used case additional instruction fields specify index registers use normally processors allow instruction specify multiple index registers add contents together ibm line computers contents 'd together early computers without form indirect addressing array operations performed modifying instruction address required several additional program steps used computer memory scarce resource computer installations early era well early microcomputers two decades later index registers commonly known b-line early british computers first used british manchester mark 1 computer 1949 general index registers became standard part computers technology second generation roughly 1954–1966 machines ibm 700/7000 mainframe series starting ibm 704 1954 though optional smaller machines ibm 650 ibm 1401 early small machines index registers include an/usq-17 around 1960 9 series real-time computers scientific data systems early 1960s intel 8080 allowed indirect addressing via register first microprocessor true index register appears motorola 6800 similar mos technology 6502 made good use two registers modern computer designs generally include dedicated index registers instead allow general purpose register contain address allow constant value machines contents another register added offset form effective address early computers designed way include pdp-6 ibm system/360 simple example index register use assembly language pseudo-code sums 100 entry array 4-byte words | [
7173,
9739,
2066,
7699,
5655,
10779,
10781,
6181,
8231,
3630,
6705,
7218,
2623,
2113,
7234,
2638,
3157,
3175,
8815,
7281,
6268,
3197,
7313,
6815,
5793,
6818,
6821,
7852,
9391,
2224,
2226,
7858,
9911,
8890,
4286,
9932,
5329,
10966,
731,
11... | None |
8,353 | 1 | Oracle_Exadata:oracle exadata oracle exadata database machine exadata computing platform specialized optimized running oracle database goal exadata achieve higher performance availability lower cost moving database algorithms intelligence storage networking bypassing traditional processing layers exadata combined hardware software platform includes scale-out compute servers scale-out intelligent storage servers ultra-fast infiniband networking ultra fast nvme flash specialized exadata software wide range shapes price points exadata storage uses high-performance servers store data run exadata software run data-intensive database processing directly shared storage tier exadata debuted 2008 first oracle corporation family engineered systems use corporate data centers deployed private clouds october 2015 exadata became available oracle cloud subscription service known exadata cloud service early 2017 third exadata deployment choice became available exadata cloud customer exadata cloud service technology deployed on-premises behind corporate firewall managed oracle cloud experts like exadata cloud service exadata cloud customer owned managed oracle licensed pay-as-you-go subscription oracle cloud customer program intended bring benefits oracle public cloud still satisfying security regulatory constraints exadata designed optimally run oracle database workload combination workloads oltp application running simultaneously analytics processing platform frequently used consolidate many databases previously running dedicated database servers exadata scale-out architecture naturally suited running oracle cloud computing requirements dynamically grow sometimes shrink historically specialized database computing platforms designed particular workload data warehousing poor unusable workloads oltp exadata optimizations database workloads implemented mixed workloads share system resources fairly resource management features also allow prioritized allocation system resources always favoring workloads servicing interactive users reporting batch even accessing data long running requests characterized data warehouses reports batch jobs analytics reputed run many times faster compared conventional non-exadata database server customer references often cite performance gains 10x greater analytics workloads also use oracle database in-memory option exadata additional acceleration in-memory databases exadata extended take advantage flash memory capacity many times larger capacity dram exadata ’ hybrid columnar compression feature intended reduce storage consumption data warehouses archival data well increase performance reducing amount io transactional oltp workloads exadata benefit incorporation flash memory exadata ’ storage hierarchy automatic tiering data memory flash disk storage special flash algorithms optimize flash response time sensitive database operations log writes demanding oltp all-flash storage eliminates latency disk media completely hardware components make typical database computing platform compute server connected network storage array database software runs compute server sends receives database information storage array network hardware components use standard software protocols talk separation via standard interfaces allows computing platform run wide variety software hardware different vendors application logic processing data performed compute server data must sent approach computing platform used wide range software applications though optimized particular application goal exadata create complete stack software hardware focused oracle database allowed processing moved optimal location exadata processing oracle database requests take advantage software layers hardware design include elements advantageous oracle database applications fast infiniband networking flash memory given importance data storage databases oracle particularly focused optimizing aspect exadata platform oracle wanted storage layer exadata could easily scale parallelize oracle database requests also recognized opportunity storage cooperate processing database requests beyond storing shipping data example rather send entire database table across network compute server find small number records data filtering could done storage resulting records sent across network addition flash memory exadata storage servers also opened range possibilities optimizing performance storage layer time performance capacity flash storage increased rapid rate network became performance bottleneck traditional database platforms exadata offloading database processing exadata storage servers avoided problem foundation exadata exadata storage server invented oracle replace traditional storage array also important oracle ownership main software hardware components exadata enabling changes deeply integrated released coordinated fashion benefit customers ability support entire exadata platform one vendor software enhancements specific exadata achieved better performance areas due integration hardware software example oltp application commits transaction database software request viewed exadata critical operation prioritized accordingly within network storage servers commit request move front less important messages network io queue another example use flash memory caching data accessed analytics applications columnar data format effective analytics workloads exadata moves data row disk flash automatically reformats data columnar format examples require oracle database understand intent application cascade understanding network storage software behave accordingly since exadata debut 2008 least two significant exadata software releases per year delivering dozens smart software enhancements enhancements based smaller number technical foundations explained detailed listing software enhancements grouped value analytics oltp workloads impact availability similar enhancements duplicated platforms require software api modifications integration across database software operating systems networking storage refer exadata documentation data sheet descriptions features exadata compute servers run oracle linux 7.6 operating system oracle database 11g release 2 enterprise edition oracle database 19c enterprise edition exadata system resources optionally virtualized using xen-based oracle vm oracle database options real application clusters multitenant database in-memory advanced compression advanced security partitioning active data guard others optionally available exadata applications certified supported version oracle database automatically compatible exadata additional modifications certifications required database software runs exadata on-premises run exadata cloud service exadata cloud customer addition on-premises software licenses eligible byol bring license transfer oracle cloud cloud customer exadata provides high-speed networks internal external connectivity 40 gigabits per second 40 gbit/s infiniband network used internal connectivity compute storage servers 25 10 1 gbit/s ethernet ports included data center connectivity infiniband network also used cluster interconnect compute servers exadata uses custom-designed database-oriented protocol infiniband network achieve higher performance makes extensive use remote direct memory access rdma improve efficiency avoiding data copies moving data servers exadata also direct-to-wire protocol allows database talk directly infiniband hardware bypassing operating system exadata also takes advantage infiniband lanes network resource management feature prioritize important traffic across network feature oracle database software tags network messages require low latency transaction commits lock messages io operations issued interactive users enabling bypass messages issued less critical high-throughput workloads reporting batch result analogous emergency vehicle siren able move quickly heavy traffic high-priority network messages moved front server network switch storage queues bypassing lower-priority messages resulting shorter predictable response times oracle enterprise manager cloud control em manages oracle software hardware including exadata database machine em integrates built-in exadata management tooling well customers existing systems management helpdesk tools exadata plug-in em provides integrated view compute servers storage servers switches topology also provides discovery monitoring alerting capability exadata systems management exadata cloud service exadata cloud customer platforms managed oracle customers control manage software databases running compute servers exadata cloud platforms include web-based provisioning wizard customers quickly provision chosen exadata system subsequently database instances customers also perform familiar database administration os administration tasks aided cloud automation backup patching upgrades exadata available two models one based two-socket compute servers based eight-socket compute servers two models differ hardware used compute servers networking storage servers software models recent oracle exadata database machine x8 generation introduced april 2019 x8-2 compute servers feature small form factor 1 ru rack unit height employ 2-socket intel xeon processors socket 24 compute cores 48 total cores per compute server memory starts 384 gigabytes gb expanded 1.5 terabytes tb exadata database machine base configuration 2 compute servers 3 storage servers referred quarter rack hardware also available eighth rack configuration half processing half storage capacity database workload and/or data size increases additional compute storage servers may added increase volume work performed parallel using exadata elastic configuration x8-8 compute server uses eight-socket compute servers consume 5 ru height greater memory capacity x8-2 whereas x8-2 compute server contains 48 compute cores x8-8 server contains 192 compute cores allows large database workloads easily scale-up within compute server still supporting exadata ’ scale-out expandability across multiple servers larger memory capacity x8-8 also favors in-memory databases large oltp consolidation data warehouse workloads like x8-2 exadata x8-8 base configuration 2 compute servers 3 storage servers consumes half rack space additional compute storage servers may added rack full three choices exadata storage servers extreme flash ef high capacity hc extended xt extreme flash storage server all-flash storage containing 8 pcie flash drives total 51.2 tb raw storage capacity current x8-2 configuration high capacity storage server current x8-2 configuration contains 12 disks 14 tb total 168 tb raw storage capacity improve io response times high-capacity storage server also employs 25.6 tb pcie flash cache active data blocks exadata ’ smart flash cache smart flash log columnar flash cache write back flash cache features determine use flash addition adding storage servers exadata database machine base configuration storage servers may also acquired added exadata storage expansion racks storage performance specifications full rack exadata configuration follows introduction exadata x8 oracle added exadata storage server extended xt low-cost storage infrequently accessed data xt storage server contains disk capacity x8-2 high capacity storage server contain flash storage require exadata storage server software license architects traditional computing platforms always cope technology change affecting design systems goal eliminate bottlenecks output storage moves network processed compute servers without slowdown solving imbalance generally involves adding faster network connections compute servers advent ultra-fast pcie flash memory nvme flash interface flash memory started became mainstream corporate computing around 2010 cache front hard disks replacement disks entirely every year thereafter flash capacity performance increased significantly 2017 leading-edge flash performance crossed threshold advanced networks unable match performance flash became substantial bottleneck example popular all-flash storage system 480 flash cards rated 75 gb/s data throughput whereas without network bottleneck many flash cards produce 2,600 gb/s data throughput plugging flash directly compute server removes network bottleneck also removes ability share storage multiple compute servers offloading storage exadata way bypass network bottleneck filtering unneeded data storage sending remaining data across network nowiki /nowiki per 1 full rack 8 compute servers 14 storage servers nowiki ** /nowiki per 1 full rack 2 compute servers 14 storage servers prior x5-2 generation exadata systems available fixed-size configurations eighth quarter half full rack sizes x5-2 exadata release january 2015 elastic configurations introduced elastic configuration customer-specified combination database servers storage servers elastic configurations allow individual storage compute servers added base configuration physical rack full example exadata system optimized in-memory database processing could created adding many compute servers maximum memory conversely exadata system optimized large data warehouse could configured adding many high-capacity storage servers ratio compute storage servers vary depending characteristics intended workload elastic configurations may also used scale earlier generation exadata systems using x8-2 servers addition exadata database machines always able span multiple racks using built-in infiniband network connections thus exadata ’ scale-out extends beyond single physical rack oracle corporation releases new generation exadata every twelve eighteen months release oracle refreshes hardware components latest intel xeon processors memory disk flash networking hardware refreshes result performance increases every release exadata software also refreshed generation periodically enhancing combination performance availability security management workload consolidation october 2015 features support oracle cloud introduced emphasis exadata generation described exadata v1 released 2008 focused accelerating data warehousing delivering full throughput storage database per oracle exadata achieved moving database filtering operations storage instead sending data compute servers filtering oracle refers capability exadata smart scan exadata v1 also supported consolidation feature allocating io bandwidth databases workloads called iorm io resource manager exadata v1 available full rack half rack sizes choice high performance high capacity storage servers exadata v2 released 2009 added quarter rack configuration support oltp workloads via flash storage database-aware flash caching exadata v2 also introduced hybrid columnar compression reduce amount storage consumed large data warehousing tables storage indexes exadata v2 increased performance eliminating need read entire regions storage based knowledge data contained region exadata x2-2 third generation released 2010 second model exadata exadata x2-8 introduced x2-8 subsequent “ 8 socket ” exadata models feature intel processors targeted large memory scale-up workloads use flash storage beyond caching began release smart flash logging feature support 10 gigabit per second gb/sec ethernet connectivity also added data security encryption encouraged incorporation hardware decryption exadata x2-2 largely eliminating performance overhead compared software decryption storage expansion rack based exadata x2-2 added 2011 accommodate large fast-growing data warehouses archival databases subsequent 2-socket exadata generations included new storage expansion rack exadata x3-2 x3-8 released 2012 including new eighth rack x3-2 entry-level configuration flash storage capacity quadrupled oltp write throughput reportedly increased 20x via write-back flash cache feature number availability enhancements added bypassing slow failed storage media reducing duration storage server brownouts simplifying replacement failed disks exadata x4-2 released 2013 flash capacity doubled flash compression added effectively doubling capacity network resource management introduced automatically prioritizing critical messages infiniband bandwidth doubled support active/active connections exadata x4-8 released 2014 plus capacity demand licensing io latency capping timeout thresholds exadata x5-2 x5-8 released 2015 major set enhancements flash disk capacity doubled elastic configurations introduced enable expansion one server time virtualization added option exadata along trusted partitions flexible licensing within virtual machine database snapshots exadata storage enabled efficient development testing oracle database in-memory exadata included fault tolerant redundancy high performance exadata storage servers replaced all-flash extreme performance storage servers exadata became first major vendor adopt nvme flash interface columnar flash cache introduced automatically reformat analytics data row format flash ipv6 support completed exadata cloud service launched oracle cloud exadata x6-2 x6-8 released 2016 flash capacity doubled e xafusion direct-to-wire protocol reduced messaging overhead cluster smart fusion block transfer eliminated log write delays oltp applications cluster exadata cloud customer debuted enabling oracle cloud benefits within corporate data centers exadata x7-2 x7-8 released 2017 flash capacity doubled flash cards became hot pluggable online replacement 10 terabyte tb disk drives debuted along 25 gb/sec ethernet connectivity oracle database in-memory processing extended flash storage storage server dram utilized faster oltp exadata x8-2 x8-8 released 2019 exadata storage server extended xt introduced low-cost storage infrequently accessed data 14 terabyte tb disk drives debuted along 60 compute cores exadata storage servers machine learning algorithms added automatically monitor cpu network memory detect anomalies stuck processes memory leaks flaky networks automatically create auto index rebuild drop indexes optimizer statistics also gathered real-time dml executes enhanced security advanced intrusion detection environment aide added detect alert unknown changes system software made | [
3,
1539,
4236,
290,
8994,
8871,
1707,
5677,
7983,
9010,
9012,
10553,
1594,
10811,
9665,
6338,
6341,
5833,
4811,
597,
2901,
1755,
6107,
2269,
5470,
1250,
4194,
10340,
10090,
1260,
3820,
7022,
8434,
1399,
7802
] | None |
8,354 | 2 | Ken_Coar:ken coar ken coar software developer known participation creation apache software foundation coar active open software projects lectures internationally open development methodologies distributed collaboration | [
1026,
5644,
4367,
8848,
657,
10642,
1939,
2581,
3478,
6808,
7450,
6302,
7584,
802,
5410,
6691,
6947,
5931,
8364,
1717,
2485,
823,
2109,
11069,
10687,
8644,
10822,
8263,
5578,
843,
589,
6352,
4177,
11602,
8787,
4437,
6489,
3802,
4831,
9696... | None |
8,355 | 4 | NEC:nec nec world fourth largest pc manufacturer 1990 nec semiconductors business unit worldwide semiconductor sales leader 1985 1990 second largest 1995 one top three 2000 one top 10 2006 remained one top 20 semiconductor sales leaders merging renesas electronics nec member sumitomo group nec 463 2017 fortune 500 list kunihiko iwadare takeshiro maeda established nippon electric limited partnership august 31 1898 using facilities bought miyoshi electrical manufacturing company iwadare acted representative partner maeda handled company sales western electric interest japanese phone market represented walter tenney carleton carleton also responsible renovation miyoshi facilities agreed partnership would reorganized joint-stock company treaty would allow july 17 1899 revised treaty japan united states went effect nippon electric company limited organized day western electric company become first japanese joint-venture foreign capital iwadare named managing director ernest clement carleton named directors maeda mototeru fujii assigned auditors iwadare maeda carleton handled overall management company started production sales maintenance telephones switches nec modernized production facilities construction mita plant 1901 mita shikokumachi completed december 1902 japanese ministry communications adopted new technology 1903 common battery switchboard supplied nec common battery switchboards powered subscriber phone eliminating need permanent magnet generator subscriber phone switchboards initially imported manufactured locally 1909 nec started exporting telephone sets china 1904 1905 iwadare visited western electric u.s. see management production control return japan discontinued oyakata system sub-contracting replaced new system managers employees direct employees company inefficiency also removed production process company paid higher salaries incentives efficiency new accounting cost controls put place time clocks installed 1899 1907 number telephone subscribers japan rose 35,000 95,000 nec entered china market 1908 implementation telegraph treaty japan china also entered korean market setting office seoul january 1908 period 1907 1912 sales rose 1.6 million yen 2 million yen expansion japanese phone service key part nec success period expansion take pause ministry communications delayed third expansion plan phone service march 1913 despite 120,000 potential telephone-subscribers waiting phone installations nec sales fell sixty percent 1912 1915 interim iwadare started importing appliances including electric fans kitchen appliances washing machines vacuum cleaners electric fans never seen japan imports intended prop company sales 1916 government resumed delayed telephone-expansion plan adding 75,000 subscribers 326,000 kilometers new toll lines thanks third expansion plan nec expanded time much rest japanese industry contracted 1919 nec started first association sumitomo engaging sumitomo densen seizosho manufacture cables part venture nec provided cable manufacturing equipment sumitomo densen rights western electrics duplex cable patents also transferred sumitomo densen great kantō earthquake struck japan 1923 140,000 people killed 3.4 million left homeless four nec factories destroyed killing 105 nec engineers workers thirteen tokyo telephone offices destroyed fire telephone telegraph service interrupted damage telephone cables response ministry communications accelerated major programs install automatic telephone switching systems enter radio broadcasting first automatic switching systems strowger-type model made automatic telephone manufacturing co. atm united kingdom nec participated installation automatic switching systems ultimately becoming general sales agent atm nec developed strowger-type automatic switching system 1924 first japan one plants almost leveled kanto earthquake mita plant chosen support expanding production new three-story steel-reinforced concrete building built starting 1925 modeled western electric hawthorne works nec started radio communications business 1924 japan first radio broadcaster radio tokyo founded 1924 started broadcasting 1925 nec imported broadcasting equipment western electric expansion radio broadcasting osaka nagoya marked emergence radio industry nec established radio research unit 1924 nec started developing electron tubes 1925 1930 manufacturing first 500 w radio transmitter provided chinese xinjing station 100 kw radio broadcasting system 1934 photo-telegraphic equipment developed nec transmitted photos accession ceremony emperor hirohito ceremony held kyoto 1928 newspapers asahi shimbun mainichi shimbun competing cover ceremony asahi shimbun using siemens device mainichi planning use french photo-telegraphic equipment end papers acquired used nec product due faster transmission rate higher picture quality 1929 nippon electric provided japan ministry communications a-type switching system first systems developed japan nippon supplied japan ministry communications nonloaded line carrier equipment long distance telephone channels 1937 world war ii described company blackest days history 1938 mita tamagawa plants placed military control direct supervision military officers 1939 nippon electric established research laboratory tamagawa plant became first japanese company successfully test microwave multiplex communications december 22 1941 enemy property control law passed nec shares owned international standard electric corporation ise itt subsidiary western electric affiliate seized capital technical relations abruptly severed munitions company law passed october 1943 placing overall control nec plants military jurisdiction ueno plant leveled military attack march 1945 fire bombings april may heavily damaged tamagawa plant reducing capacity forty percent okayama plant totally destroyed bombing attack june year end war nec production substantially reduced damage facilities material personnel shortages war production slowly returned civilian use nec re-opened major plants end january 1946 nec began transistor research development 1950 started exporting radio-broadcast equipment korea first major postwar contract 1951 nec received deming prize excellence quality control 1952 computer research development began 1954 nec produced first crossbar switching system japan installed nippon telegraph telephone public corporation currently nippon telegraph telephone corporation ntt 1956 nec began joint research development ntt electronic switching systems year nec established taiwan telecommunication company first postwar overseas joint venture 1958 completed neac-1101 neac-1102 computers year 1959 nec demonstrated first transistorized computer neac-2201 demonstrated unesco automath show paris company began integrated circuit research development 1960 1963 nec started trading american depositary receipts ten million shares sold united states nippon electric new york nec america inc. incorporated year nec supplied kdd submarine cable systems laying pacific ocean 1964 supplied short-haul 24 channel pcm carrier transmission equipment ntt 1965 nec de mexico s. a. de c. v. nec brasil s. a. nec australia pty ltd. established 1968 1969 nec supplied comsat corporation spade satellite communications system 1971 1972 switzerland ordered nec satellite communications earth station year small transportable satellite communications earth station set china shares nec common stock listed amsterdam stock exchange 1973 nec also designed automated broadcasting system japan broadcasting corporation year nec electronics europe gmbh also established 1974 acos series computer introduced new central research laboratories completed 1975 1977 japan national space development agency launched nec geostationary meteorological satellite named himawari period nec introduced concept c c integration computers communications nec america inc. opened plant dallas texas manufacture pabx telephone systems 1978 also acquired electronic arrays inc. california year start semiconductor chip production united states 1980 nec created first digital signal processor nec µpd7710 nec semiconductors uk ltd. established 1981 producing vlsis lsis nec introduced 8-bit pc-8800 series personal computer 1981 followed 16-bit pc-9800 series 1982 1983 nec stock listed basel geneva zurich switzerland exchanges nec quickly became dominant leader japanese pc industry holding 80 market share nec changed english company name nec corporation year nec information systems inc. started manufacturing computers related products united states 1984 nec also released v-series processor year 1986 nec delivered sx-2 super computer houston advanced research center woodlands texas year neax61 digital switching system went service 1987 nec technologies uk ltd. established united kingdom manufacture vcrs printers computer monitors mobile telephones europe also year nec licensed technology hudson soft video game manufacturer create video game console called pc-engine later released 1989 turbografx-16 north american market successor pc-fx released japan 1994 pc-engine achieved considerable following said nec held much stronger influence video game industry role leading semiconductor manufacturer direct video game products nec usa inc. established 1989 holding company north american operations 1983 nec brasil brazilian subsidiary nec forced nationalise corporate stock orders brazilian military government whereby shareholder control nec brasil ceded private equity group brasilinvest brazilian investment banker mário garnero since nec brasil foundation 1968 become major supplier telecommunications equipment brazilian government 1986 minister communications antônio carlos magalhães put nec brasil financial difficulties suspending government contract payments company whose main client federal government subsidiary crisis nec corporation japan sold nec brasil organizações globo onemillion us dollars us 1,000,000 shortly thereafter magalhães resumed government contracts corresponding payments nec brazil became valued 350million us dollars us 350,000,000 suspicions regarding nec-globo deal included among things unilateral breach contract globo founder roberto marinho regarding management regional television station brazilian state bahia took national stage 1992 first corruption charges impeached brazilian president fernando collor de mello organizações globo subsequently sold shares nec brazil hit all-time high state monopoly years back nec corporation 1999 following break-up privatisation brazilian state-owned telephone monopoly telebrás 1990 new head office building known super tower completed shiba tokyo additionally joint-venture agreements established manufacture market digital electronic switching systems lsis china 1993 nec asynchronous transfer mode atm switching system neax61 nippon electronic automatic exchange atm service node went service united states nec europe ltd. established holding company european operations year nec c c research laboratories nec europe ltd. opened germany 1994 nec china co ltd. established holding company chinese operations 1996 1997 nec developed 4gbit dram semiconductor group honored one first japan quality awards 1998 nec opened world advanced semiconductor r facility nec 1 personal computer vendor japan 1980s faced increasing competition fujitsu seiko epson ibm japan nevertheless early 1990s nec still largest well 50 market share japanese market competition heated later rival fujitsu started aggressively market computers industry standard x86 instead nec 1997 nec share reduced 35 nec celebrated 100th anniversary 1999 nec electronics corporation separated nec 2002 new semiconductor company nec laboratories america inc. nec labs started november 2002 merger nec research institute neci nec usa computer communications research laboratory ccrl nec built earth simulator computer esc fastest supercomputer world 2002 2004 since produced nec n343i 2006 2003 nec 20.8 market share personal computer market japan slightly ahead fujitsu 2007 nec nissan co. corp. started evaluating joint venture produce lithium ion batteries hybrid electric cars april 23 2009 renesas technology corp nec electronics corp struck basic agreement merge around april 2010 april 1 2010 nec electronics renesas technology merged forming renesas electronics set fourth largest semiconductor company according isuppli published data q3 2010 nec held 19.8 market share pc market japan january 27 2011 nec formed pc joint venture chinese pc maker lenovo fourth largest pc maker world part deal companies said statement establish new company called lenovo nec holdings b.v. registered netherlands nec receive us 175 million lenovo issuance lenovo shares lenovo unit 51 stake joint venture nec hold 49 stake february 2011 bloomberg news said joint venture would allow lenovo expand field servers nec masato yamamoto said nec would able grow china january 26 2012 nec corporation announced would cut 10,000 jobs globally due big loss nec consolidated financial statement line economic crisis europe lagged development smartphones domestic market compare apple samsung previously january 2009 nec cut 20,000 jobs mainly sluggish semiconductor liquid crystal display related businesses 2013 nec biggest pc server manufacturer japan 23.6 share august 2014 nec corporation commissioned build super-fast undersea data transmission cable linking united states japan consortium international companies consisting china mobile international china telecom global global transit google kddi singtel pipeline went online june 30 2016 april 2017 kemet corporation purchase 61 controlling interest nec tokin nec making nec tokin wholly owned subsidiary purchase complete company change name tokin corporation nec structured organization around three principal segments solutions network solutions electronic devices solutions business delivers computing solutions business enterprises government individual customers—in form software hardware related services network solutions business designs provides broadband network systems mobile wireless communications network systems mobile handsets broadcast systems nec electronic devices business includes semiconductors displays electronic components nec produces versa notebooks international market lavie series japanese markets principal subsidiaries nec include defense products include achievements nec include nec ranked consistently top four companies previous five years number u.s. patents issued averaging 1764 year nec main title sponsor davis cup competition 2002 bnp paribas took sponsorship nec 1982 2012 sponsored nec cup go tournament japan nec 1986 2003 sponsored nec shun-ei go tournament young players japan nec sponsored english football club everton 1985 1995 1995 fa cup final triumph everton final game decade-long nec sponsorship danka took sponsors nec signed deal sponsor sauber f1 team 2011 season 2014 season nec signed new deal sponsor sahara force india f1 team 2015 season april 2013 nec became umbrella sponsor pga tour latinoamérica third-tier men professional golf tour nec one sponsored v.league volleyball started works teams years came include professional players nec also used montedio yamagata football soccer j league sponsors along local companies | [
7682,
6,
5128,
5644,
2071,
1563,
1564,
9245,
10273,
6697,
1083,
10303,
7234,
4172,
8268,
10316,
9812,
599,
10339,
1638,
6247,
5736,
6250,
6252,
6253,
8301,
1141,
5237,
6776,
10876,
127,
11391,
2179,
134,
9863,
11405,
9363,
6834,
10931,
11... | Test |
8,356 | 4 | Thomas_A._Drake:thomas a. drake thomas andrews drake born 1957 former senior executive u.s. national security agency nsa decorated united states air force united states navy veteran whistleblower 2010 government alleged drake mishandled documents one espionage act cases u.s. history drake defenders claim instead persecuted challenging trailblazer project 2011 recipient ridenhour prize truth-telling co-recipient sam adams associates integrity intelligence saaii award june 9 2011 10 original charges dropped drake rejected several deals refused plea bargain truth eventually pleaded one misdemeanor count exceeding authorized use computer jesselyn radack government accountability project helped represent called act civil disobedience drake father world war ii veteran mother secretary pearl s. buck entered u.s. air force 1979 becoming airborne voice processing specialist fluency german went elint electronic intelligence missions capacity encountered surveillance state east germany stasi informed worldview compares developments united states since september 11 attacks drake left air force 1989 also u.s. navy analyzed intelligence national military joint intelligence center according washington post also one time worked cia 1989 drake began work nsa contractor evaluating software contractor worked projects like jackpot librarian becoming expert quality-testing software working system measuring quality computer code nsa drake also continued academic studies 2000 hired software systems quality specialist management information technology consultant columbia maryland-based costal research technology inc. crti wholly owned subsidiary alexandria virginia-based computer systems management inc. csmi late 2001 went work nsa full-time employee signals intelligence directorate fort meade maryland actual first day job nsa employee september 11 2001 2002 became technical director software engineering implementation within cryptologic systems professional health office 2003 drake became process portfolio manager within nsa newly formed directorate engineering held top secret security clearance congressional investigations 9/11 testified nsa failures 2006 reassigned national defense university became nsa chair assistant professor behavioral sciences within industrial college armed forces icaf drake forced leave ndu 2007 security clearance suspended resigned nsa next year drake went work strayer university forced job indictment april 2010 found work apple store founded knowpari systems consulting firm 2011 drake awarded ridenhour prize truth telling co-recipient sam adams associates integrity intelligence saaii award accepting saaii award said references 1857 speech frederick douglass late 1990s early 2000s nsa desired new tools collect intelligence growing flood information pouring new digital networks like internet drake became involved internal nsa debate two tools trailblazer project thinthread project became part minority favored thinthread several reasons including theoretical ability protect privacy us individuals gathering intelligence trailblazer required billions dollars dwarfing cost thinthread drake eventually became disillusioned indignant regarding problems saw agency around 2000 nsa head michael hayden chose trailblazer thinthread thinthread cancelled trailblazer ramped eventually employing ibm saic boeing csc others drake worked way legal processes prescribed government employees believe questionable activities taking place departments accordance whistleblower protection laws intelligence community whistleblower protection act drake complained internally designated authorities bosses nsa inspector general defense department inspector general house senate congressional intelligence committees also kept contact diane roark staffer republicans house intelligence committee u.s. congress house committee responsible oversight executive branch intelligence activities roark staff expert nsa budget two met 2000 september 2002 roark three former nsa officials william binney j. kirk wiebe ed loomis filed dod inspector general report regarding problems nsa including trailblazer drake major source report gave information dod investigation matter roark tried notify superior then-chairman house permanent select committee intelligence porter goss also attempted contact william rehnquist chief justice united states supreme court time addition roark made effort inform vice president dick cheney legal counsel david addington republican staff colleague committee 1980s addington later revealed washington post report author controlling legal technical documents bush administration warrantless surveillance program typing documents tempest-shielded computer across desk room 268 eisenhower executive office building storing vault office roark got response three men 2003 nsa inspector general ig declared trailblazer expensive failure cost 1 billion dollars 2004 dod ig produced final report investigation prompted roark others 2002 report basically agreed assertions found serious flaws nsa time nsa even banned starting projects certain size fear would waste money however plans release dod ig report public time 2011 new yorker article journalist jane mayer wrote drake felt nsa committing serious crimes american people level worse president nixon done 1970s drake reviewed laws regarding disclosure information decided revealed unclassified information reporter worst thing would happen probably would fired november 2005 drake contacted siobhan gorman baltimore sun newspaper sending emails hushmail discussing various topics claims careful give sensitive classified information one basic ground rules set beginning communication communication occurred around 2006 gorman wrote several articles waste fraud abuse nsa including articles trailblazer received award society professional journalists series exposing government wrongdoing judge richard bennett later ruled evidence reporter relied upon allegedly classified information found mr. drake house articles july 2007 armed fbi agents raided homes roark binney wiebe people filed complaint dod inspector general 2002 binney claims pointed guns wife wiebe said reminded soviet union none people charged crimes november 2007 raid drake residence computers documents books confiscated never charged giving sensitive information anyone charge actually brought 'retaining information fbi tried get roark testify drake refused reporter gorman contacted fbi drake initially cooperated investigation telling fbi alleged illegality nsa activities government created 'draft indictment drake prepared prosecutor steven tyrrell listed charges disclosing classified information newspaper reporter conspiracy diane roark binney wiebe loomis complainants dod ig 2002 also allegedly listed unindicted co-conspirators 2009 new prosecutor came case william welch ii changed indictment charges removed naming 'co-conspirators new case contained charges drake prosecutors wanted drake plead guilty refused believed innocent charges government wanted help prosecute whistleblowers refused well later explained motivations ridenhour prizes organization april 2010 drake indicted baltimore maryland grand jury following charges indictment contained many allegations relate actual charges specifically charged unauthorized disclosure classified information charged sigint statute indictment gave details communications roark gorman charged crime directly relating communications indictment also list names gorman roark confirmed reporters e.g mark hosenball newsweek roark lawyer claimed indictment contains mischaracterization facts relationship client drake roark later spoke support drake whistleblowers trailblazer project willful retention charges regarded five documents allegedly related national defense found drake residence five documents question referred success regular meetings volume friend trial testing collections sites success declassified months drake indicted never classified first place according official complaint filed j. william leonard former director information security oversight office regular meetings marked unclassified posted nsanet prosecution argues defendant known really classified drake team also argued latter three five named documents part collection thousands unclassified papers related dod inspector general report mentioned drake defense attorneys argued meant defendant brought home material accidentally willfully obstruction charge related drake allegedly deleting documents purportedly aware fbi investigating leaks media fbi contemplating investigating leaks siobhan gorman baltimore sun false statements charge filed relation fbi questioning drake without lawyer present initial stages investigation cooperating one count alleged statements made regarding whether willfully taken certain documents home another count allegedly lying purported transmission classified information gorman drake defenders point government expert found destroyed evidence also point drake careful give classified information gorman many documents question 'retroactively classified seized home fbi federal offices involved filing indictment included doj public integrity section doj criminal division doj national security division fbi nsa office security counterintelligence drake represented james wyda deborah boardman federal public defenders drake also client government accountability project whistleblower non-profit jesselyn radack director homeland security human rights gap worked drake author nsa authority james bamford consultant drake defense well government prosecutor william m. welch ii previously charged contempt removed ted stevens case served government initial senior litigation counsel john p. pearson doj public integrity section government trial attorney lanny a. breuer charge overseeing prosecution federal judge richard d. bennett responsible hearing handling case initially set trial june 2011 drake case written washington post new york times agence france-press newsweek wired washingtonian.com federation american scientists secrecy news politico elsewhere jesselyn radack government accountability project also discussed case u.s. government publicly stated prosecution thomas drake intended deter government employees reporting problems whistle-blowers key many many department investigations—we n't retaliate encourage matthew a. miller spokesman justice department said indictment brought merits nothing else spring 2011 prosecution made several moves restrict normally open proceedings jury trial united states courtroom reported gerstein politico others done legal auspices classified information procedures act cipa attempts theory prevent release classified information open trials prosecution also moved use controversial silent witness rule exhibits hidden public use code words court government attempted use rule handful times previously legality challenged fifth sixth amendments government also moved restrict cross-examination witnesses restrict jurors reading siobhan gorman baltimore sun articles problems nsa trailblazer prevent defense making arguments introducing evidence courtroom whistleblowing overclassification addition prosecution also court seal two exhibits defense already published one public court filings listed various documents prosecution would try use trial prosecution argued cipa also applied non-classified information attempted unclassified information presented trial redacted form referring siobhan gorman baltimore sun news stories government legally pleaded newspaper articles unduly prejudicial purpose admission newspaper articles put nsa trial prosecution also contended legal obligation prove drake intent harm national security saying prove defendant intended harm country specific part espionage act drake charged 'overclassification defense government argued defense claim would 'confusing jury thus irrelevant charges government also argued discussion trial legal concept whistle-blowing would likewise irrelevant charges early june shortly may 22 2011 broadcast 60 minutes episode drake case government dropped charges drake agreed seek jail time return drake agreement plead guilty single misdemeanor misusing agency computer system july sentencing hearing presiding judge richard d. bennett maryland federal district court issued harsh words government saying unconscionable charge defendant two years home searched list serious crimes could resulted 35 years prison drop 10 counts indictment eve trial expressing irritation prosecution bennett also completely rejected government request 50,000 fine despite sentencing guidelines recommending fine 500- 5,000 noted drake financially devastated spending 82,000 defense losing 154,600 job nsa pension fired university teaching position sentenced drake one year probation 240 hours community service drake appeared daily show august 6 2012 talk history case september sent audio message support cryptoparty march 15 2013 drake spoke national press club luncheon national intelligence community attitude towards whistle-blowing drake inspired edward snowden leak information nsa spying program prism june 2013 snowden went public rather reporting within system due reprisals drake whistleblowers led assistant defense dept inspector general dod ig charge whistleblower unit john crane become whistleblower became apparent drake identity leaked dod ig justice dept drake become activist surveillance state frequently giving interviews speaking events restore fourth one themes speeches interviews privacy exercise follows put entire life box documents bank accounts passwords everything—and give complete stranger—a fellow american safekeeping would states yet encounter yes september 2013 interview drake reaffirmed belief problems nsa chronic systemic solution would completely dismantle subsequently rebuild entire organization july 3 2014 drake along former technical director nsa william binney gave testimony german parliamentary committee investigating nsa spying scandal described close cooperation nsa german secret service bnd november 10 2015 drake appeared pen american center panel newseum secret sources whistleblowers national security free expression drake one four individuals history united states charged specifically willful retention national defense information prosecutions delivery classified information third party—something drake charged particular portion espionage act created 1950 second red scare part mccarran internal security act anthony russo daniel ellsberg first prosecuted retention came known pentagon papers ellsberg gave new york times eventually resulting another landmark espionage act case 1971 new york times co. v. united states prosecution russo ellsberg dismissed 1972 government misconduct second prosecution samuel loring morison 1985 navy analyst sold satellite photographs jane defence weekly later pardoned president bill clinton third american israel public affairs committee case 2005 united states v. franklin rosen weissman drake founding member veteran intelligence professionals sanity september 2015 drake 27 members vips steering group wrote letter president challenging recently published book claimed rebut report united states senate intelligence committee central intelligence agency use torture 2014 documentary called silenced drake featured released nominated emmy award 2016 analogous theme oscar-winning documentary citizenfour portrays similar treatment edward snowden silenced official selection recipient several awards multiple film festivals even release major cable networks march 2015 also 2014 drake involvement thinthread subsequent indictment etc. along others associated activities roark binney wiebe loomis snowden featured pbs documentary united states secrets drake featured throughout 2016 documentary nothing hide regarding government surveillance internet privacy | [
3495,
6344,
3305,
7527,
10697,
8750,
7887,
208,
4595,
7893,
600,
3323
] | None |
8,357 | 4 | Great_Seal:great seal great seal seal used head state someone authorised behalf confirm formal documents laws treaties appointments letters dispatch used guarantee authenticity important solemn records documents middle ages great seal played far greater political role much real power associated control seal addition great seal prince usually also privy seal used correspondence private nature seal usually formally entrusted upon office-holder act keeper seal keeper may separate office also usually combined chancellor nowadays great seal usually entrusted upon minister particularly minister justice great seals republics usually show nation coat arms e.g great seal united states allegorical image e.g france reason design used usually remains unchanged seals may however replaced wear depending often seal used monarchies contrast great seal often changed time accession new monarch seal often depicts reigning monarch full form | [
1821
] | Test |
8,358 | 5 | OCSP_stapling:ocsp stapling online certificate status protocol ocsp stapling formally known tls certificate status request extension standard checking revocation status x.509 digital certificates allows presenter certificate bear resource cost involved providing online certificate status protocol ocsp responses appending stapling time-stamped ocsp response signed ca initial tls handshake eliminating need clients contact ca aim improving security performance original ocsp implementation number issues firstly introduce significant cost certificate authorities ca requires provide responses every client given certificate real time example certificate issued high traffic website servers cas likely hit enormous volumes ocsp requests querying validity certificate also ocsp checking potentially impairs users privacy slows browsing since requires client contact third party ca confirm validity certificate encounters moreover client fails connect ca ocsp response forced decide continuing connection anyway defeating purpose ocsp b terminating connection based assumption attack could result excessive false warnings blocks ocsp stapling aimed addressing issues original ocsp implementation ocsp stapling resolves problems fashion reminiscent kerberos ticket stapling scenario certificate holder queries ocsp server regular intervals obtaining signed time-stamped ocsp response site visitors attempt connect site response included stapled tls/ssl handshake via certificate status request extension response note tls client must explicitly include certificate status request extension clienthello tls/ssl handshake message may appear allowing site operator control verification responses would allow fraudulent site issue false verification revoked certificate stapled responses ca n't forged need directly signed certificate authority server client receive stapled response contact ocsp server however client receives invalid stapled response abort connection increased risk ocsp stapling notification revocation certificate may delayed last-signed ocsp response expires result clients continue verifiable assurance certificate authority certificate presently valid quite recently longer need individually contact ocsp server means brunt resource burden placed back certificate holder also means client software longer needs disclose users browsing habits third party overall performance also improved client fetches ocsp response directly ca usually involves lookup domain name ca ocsp server dns well establishing connection ocsp server ocsp stapling used certificate status information delivered client already established channel reducing overhead improving performance tls certificate status request extension specified rfc 6066 section 8 rfc 6961 defines multiple certificate status request extension allows server send multiple ocsp responses tls handshake draft proposal x509v3 extension field expired april 2013 specified compliant server presenting certificate carrying extension must return valid ocsp token response status_request extension specified tls client hello current version proposal extended support additional tls extensions tls developer adam langley discussed extension april 2014 article following repair heartbleed openssl bug ocsp stapling support progressively implemented openssl project included support 0.9.8g release assistance grant mozilla foundation apache http server supports ocsp stapling since version 2.3.3 nginx web server since version 1.3.7 litespeed web server since version 4.2.4 microsoft iis since windows server 2008 haproxy since version 1.5.0 f5 networks big-ip since version 11.6.0 kemp loadmasters since version 7.2.37.1 many web servers advertise support ocsp stapling implementations always reliable example apache queries ocsp server event temporary failure discard cached good response previous request start serving bad response nginx lazy loading ocsp responses means first web requests unable add ocsp response browser side ocsp stapling implemented firefox 26 internet explorer since windows vista google chrome linux chrome os windows since vista smtp exim message transfer agent supports ocsp stapling client server modes ocsp stapling designed reduce cost ocsp validation client ocsp responder especially large sites serving many simultaneous users however ocsp stapling supports one ocsp response time insufficient certificate chains intermediate ca certs limitation addressed multiple certificate status request extension specified rfc 6961 adds support sending multiple ocsp responses | [
513,
517,
1157,
9221,
1288,
9744,
1683,
1688,
3742,
2083,
3237,
9387,
11693,
11569,
2098,
9394,
7736,
5178,
9281,
9412,
3657,
5834,
10831,
11345,
6098,
2003,
5078,
4439,
5590,
474,
3805,
7264,
865,
8674,
7139,
10341,
5107,
501,
1526,
2169... | Test |
8,359 | 4 | Police_Central_e-Crime_Unit:police central e-crime unit police central e-crime unit pceu part specialist crime directorate metropolitan police service london dedicated combating e-crime england wales northern ireland unit national remit created april 2008 centralise efforts police forces uk excluding scotland fight forms e-crime unit responsibilities quite specific included activities carried bodies excluding activities currently done others unit stated mission improve police response victims e-crime developing capability police service across england wales northern ireland co-ordinating law enforcement approach types e-crime providing national investigative capability serious e-crime incidents pceu created 1 october 2008 responsible improving uk national policing response cyber crime unit housed within specialist crime directorate scd6 part metropolitan police service based central london jurisdiction within england wales northern ireland however unit worked closely scdea scotland international law enforcement pceu seat table europol interpol cyber workstreams since february 2012 pceu presence outside london creation 3 regional hubs hubs located england north west north east midlands areas hubs launched acpo cyber conference sheffield pceu one strands work within acpo e-crime programme led dac janet williams pceu merged national cyber crime unit part new national crime agency | [] | Test |
8,360 | 2 | Line_Printer_Daemon_protocol:line printer daemon protocol line printer daemon protocol/line printer remote protocol lpd lpr network printing protocol submitting print jobs remote printer original implementation lpd berkeley printing system bsd unix operating system lprng project also supports protocol common unix printing system cups common modern linux distributions also found mac os x supports lpd well internet printing protocol ipp commercial solutions available also use berkeley printing protocol components robust functionality performance necessary available lpr/lpd cups alone might required large corporate environments lpd protocol specification documented rfc 1179 server lpd protocol listens requests tcp port 515 request begins byte containing request code followed arguments request terminated ascii lf character lpd printer identified ip address server machine queue name machine many different queue names may exist one lpd server queue unique settings note lpd queue name case sensitive modern implementations lpd network printers might ignore case queue name altogether send jobs printer others option automatically create new queue print job new queue name received helps simplify setup lpd server companies e.g d-link model dp-301p+ tradition calling queue name “ lpt1 ” “ lpt1 ” printer supports lpd/lpr sometimes referred tcp/ip printer tcp/ip used establish connections printers clients network although term would equally applicable printer supports internet printing protocol | [
514,
4002,
5093,
3976,
7626,
10410,
3916,
11147,
7696,
6993,
1877,
823,
5531,
636
] | Test |
8,361 | 3 | World_Games_(video_game):world games video game world games sports video game developed epyx commodore 64 1986 versions apple iigs amstrad cpc zx spectrum sega master system contemporary systems also released nes version released milton bradley ported rare virtual console version released europe april 25 2008 game continuation epyx sports line previously released extremely successful titles summer games winter games events available vary slightly depending platform may include game allowed player compete events sequentially choose events choose one event practice event info gave commodore 64 version world games three-plus stars five describing least favorite series stating slalom skiing best event magazine concluded epyx nice consistent job execution tho hard take many points even boring material computer gaming world rick teverbaugh criticized slalom skiing log rolling events difficulty concluded world games still must avid sports games charles ardai called game adequate sequel epyx previous games praised graphics criticized mechanics bizarre little joystick patterns little events still recommended game log rolling event jame trunzo praised game use advanced graphics sound including humorous effects also noted variety included games preventing game getting repetitive game reviewed 1988 dragon 132 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars | [
9026,
9006,
95
] | Validation |
8,362 | 1 | Human_Security_Gateway:human security gateway human security gateway database research information related human security additions database made daily contains 27,000 english french-language resources related conflict human security run human security report project gateway focuses attention threats stemming violence individuals societies risk uses approach gathering categorizing information complementary broad conception human security definition human security united nations development programme undp used 1994 human development report gateway offers users catalogued resources including reports journal articles fact sheets coverage ranges global national sub-national levels information available english french via presentation formats gateway searched keyword geographic region subject heading abstract viewed downloading full-text article report subscribers notified additions database filtered topic region language format feeds provided email rss news feed topics include child soldiers climate change conflict prevention criminal violence gender governance health human rights humanitarian intervention international law landmines natural resources peacekeeping post-conflict peacebuilding small arms refugees terrorism | [] | None |
8,363 | 4 | Data_center_security:data center security data center security set policies precautions practices adopted avoid unauthorized access manipulation data center resources data center houses enterprise applications data hence providing proper security system critical denial service dos theft confidential information data alteration data loss common security problems afflicting data center environments according cost data breach survey 49 u.s. companies 14 different industry sectors participated noticed physical security needed protect value hardware therein cost breach security severe consequences company managing data center customers whose data copied 2012 breach global payments processing vendor visa 1.5 million credit card numbers stolen highlights risks storing managing valuable confidential data result global payments partnership visa terminated estimated lost 100 million defenses exploitable software vulnerabilities often built assumption insiders trusted studies show internal attacks tend damaging variety amount information available inside organizations quantity data stored data centers increased partly due concentrations created cloud-computing common threats data centers common vulnerabilities include many worm attacks data centers exploited well-known vulnerabilities many systems shipped default accounts passwords exploited unauthorized access theft information common attacks include network security infrastructure includes security tools used data center enforce security policies tools include packet-filtering technologies acls firewalls intrusion detection systems idss network-based host-based acls filtering mechanisms explicitly defined based packet header information permit deny traffic specific interfaces acls used multiple locations within data center internet edge intranet server farm following describes standard extended access lists standard acls simplest type acl filtering traffic solely based source ip addresses standard acls typically deployed control access network devices network management remote access example configure standard acl router specify systems allowed telnet standard acls n't recommended option traffic filtering due lack granularity standard aclss configured number 1 99 cisco routers extended acls extended acl filtering decisions based source destination ip addresses layer 4 protocols layer 4 ports icmp message type code type service precedence cisco routers define extended acls name number 100 199 range firewall sophisticated filtering device separates lan segments giving segment different security level establishing security perimeter controls traffic flow segments.firewalls commonly deployed internet edge act boundary internal networks.they expected following characteristics performance main goal firewall separate secured unsecured areas network firewalls post primary traffic path potentially exposed large volumes data hence performance becomes natural design factor ensure firewall meets particular requirements application support another important aspect ability firewall control protect particular application protocol telnet ftp http firewall expected understand application-level packet exchanges determine whether packets follow application behavior deny traffic different types firewalls based packet-processing capabilities awareness application-level information idss real-time systems detect intruders suspicious activities report monitoring system configured block mitigate intrusions progress eventually immunize systems future attacks two fundamental components cisco layer 2 switches provide tools prevent common layer 2 attacks scanning probing dos ddos etc. following security features covered layer 2 security process securing data center requires comprehensive system-analysis approach ongoing process improves security levels data center evolves data center constantly evolving new applications services become available attacks becoming sophisticated frequent trends require steady evaluation security readiness key component security-readiness evaluation policies govern application security network including data center application includes design best practices implementation details result security often considered key component main infrastructure requirement since key responsibility data centers make sure availability services data center management systems often consider security affects traffic flows failures scalability due fact security measures may vary depending data center design use unique features compliance requirements company business goals n't set specific measures cover possible scenarios exist general two types data center security physical security virtual security physical security data center set protocol built-in within data center facilities order prevent physical damage machines storing data protocols able handle everything ranging natural disasters corporate espionage terrorist attacks prevent physical attacks data centers use techniques virtual security security measures put place data centers prevent remote unauthorized access affect integrity availability confidentiality data stored servers virtual network security hard task handle exist many ways could attacked worst part evolving years years instance attacker could decide use malware similar exploits order bypass various firewalls access data old systems may well put security risk contain modern methods data security virtual attacks prevented techniques | [
3704,
2409,
6520,
3852
] | Test |
8,364 | 2 | Robert_Love:robert love robert m. love born c. 1981 american author speaker google engineer open source software developer love best known contributions linux kernel notable work including preemptive kernel process scheduler kernel event layer virtual memory subsystem inotify google member android team helped launch first version platform love also active gnome community working networkmanager gnome volume manager project utopia beagle love born 1981 south florida attended graduated charles w. flanagan high school undergraduate studies attended university florida graduated bachelor arts mathematics bachelor science computer science still college love employed kernel hacker montavista software montavista worked procps several kernel-related projects including one notable preemptive kernel love began work ximian december 15 2003 first served senior engineer linux desktop group ximian spearheaded effort named project utopia better integrate hardware management linux desktop ximian acquisition novell love rose position chief architect suse linux enterprise desktop novell worked various kernel gnome projects including inotify beagle love resigned novell may 4 2007 work google mobile device platform android joining project announced engineered several kernel system-level solutions android including novel shared memory subsystem ashmem love continues work google director engineering search infrastructure love lives boston massachusetts love author linux kernel development third edition book understanding developing code linux kernel book widely regarded approachable well written translated several languages three editions published imprints pearson education also wrote linux system programming second edition subtitled talking directly kernel c library published o'reilly media work documents linux system call c library api love also coauthor linux nutshell comprehensive linux command reference also published o'reilly media linux nutshell awarded favorite linux book time linux journal love contributing editor linux journal author articles magazine love invited speak around world including linux.conf.au australia fosdem belgium guadec england keynote speaker love written co-written several books linux operating system | [
1026,
3082,
5644,
5139,
2581,
10780,
10785,
6691,
6180,
8242,
9266,
2109,
6213,
10822,
8263,
8268,
589,
4177,
8787,
5222,
10856,
7793,
3189,
4734,
7812,
4238,
10382,
8848,
657,
2195,
2711,
6808,
9882,
1694,
6302,
8354,
2723,
1717,
10933,
... | Test |
8,365 | 8 | SocialFlow:socialflow socialflow social media optimization platform leading brands publishers company uses twitter firehose click data derived proprietary link proxy along proprietary algorithms optimize delivery messages social networks company believes understanding utilizing key metrics engagement clicks per tweet clicks per follower central growing large active social media following analysis data visualization way news filtered around death osama bin laden via twitter received international news coverage led questions role twitter journalism socialflow founded early 2009 frank speiser mike perrone sought apply scientific approach task building sustaining engaged social media audiences scale socialflow announced april 7 2011 raised 7 million series funding series round led softbank softbank ny rre ventures betaworks highline venture partners aol venture partners sv angel group high profile angel investors participating april 16 2013 socialflow announced raised 10 million round series b funding fairhaven capital led round joined existing investors softbank capital rre ventures aol ventures betaworks well new investors kbs+ ventures rand capital corporation company announced june 7 2011 peter hershberg joined company president socialflow gained considerable media attention published breaking bin laden visualizing power single tweet study demonstrated twitter evolved primary news source death osama bin laden broke twitter next study engaging news-hungry audiences tweet tweet looked twitter audiences al-jazeera english bbc news cnn economist fox news new york times revealed similarities differences respective organization audience simultaneously demonstrating true value audience engagement another notable study created socialflow looked launch kony 2012 video social media noted forbes writer anthony kosner study socialflow research group showed rather emerging big liberal enclaves american coasts initial wave social media traffic launched kony 2012 video originated mid-sized relatively conservative cities middle america | [] | Test |
8,366 | 5 | Delayed_binding:delayed binding delayed binding also called tcp connection splicing postponement connection client server order obtain sufficient information make routing decision application switches routers delay binding client session server proper handshakes complete prevent denial-of-service attacks | [
2409
] | Test |
8,367 | 3 | Bell's_law_of_computer_classes:bell law computer classes bell law computer classes formulated gordon bell 1972 describes types computing systems referred computer classes form evolve may eventually die new classes computers create new applications resulting new markets new industries bell considers law partially corollary moore law states number transistors per chip double every 24 months unlike moore law new computer class usually based lower cost components fewer transistors less bits magnetic surface etc new class forms every decade also takes decade understand class formed evolved likely continue formed lower priced class may evolve performance take disrupt existing class evolution caused clusters scalable personal computers 1 thousands computers span price performance range use pc mainframes become largest supercomputers day scalable clusters became universal class beginning mid-1990s 2010 clusters least one million independent computers constitute world largest cluster established market class computers aka platforms introduced continue evolve roughly constant price subject learning curve cost reduction increasing functionality performance based moore law gives transistors per chip bits per unit area increased functionality per system roughly every decade technology advances semiconductors storage networks interfaces enable new lower cost computer class aka platform form serve new need enabled smaller devices e.g less transistors per chip less expensive storage displays i/o network unique interface people information processing sink source new lower priced class established maintained quasi independent industry market class likely evolve substitute existing class classes described computer clusters beginning 1990s single class scalable computers mega-servers built clusters tens thousands commodity microcomputer-storage-networked bricks began cover replace mainframes minis workstations become largest computers day applied scientific calculation commonly called supercomputer bell law computer classes class formation first mentioned 1970 introduction digital equipment pdp-11 mini differentiate mainframes potentially emerging micros law described 1972 gordon bell emergence observation new lower-priced microcomputer class based microprocessor stimulated creation law bell described articles bell books see also several laws e.g moore law metcalfe law describe computer industry | [
2208,
2273,
6656,
9732,
5798,
5802,
78,
1935,
7248,
785,
1778,
6801,
153,
1083,
7006
] | Test |
8,368 | 4 | SecurityFocus:securityfocus securityfocus online computer security news portal purveyor information security services home well-known bugtraq mailing list securityfocus columnists writers included former department justice cybercrime prosecutor mark rasch hacker-turned-journalist kevin poulsen securityfocus acquired symantec august 2002 | [
8960,
899,
653,
7955,
10132,
535,
10903,
6297,
5924,
1708,
6189,
11184,
1970,
11065,
3520,
2378,
8398,
10959,
4945,
4435,
9569,
9317,
10341,
4071,
2027,
6643,
10872,
8572,
2558,
9983
] | None |
8,369 | 2 | AmigaDOS:amigados amigados disk operating system amigaos includes file systems file directory manipulation command-line interface file redirection amigaos 1.x amigados based tripos port metacomco written bcpl bcpl use native pointers advanced functionality operating system difficult use error-prone third-party amigados resource project arp formerly amigados replacement project project begun amiga developer charlie heath replaced many bcpl utilities smaller sophisticated equivalents written c assembler provided wrapper library codice_1 eliminated interfacing problems applications automatically performing conversions native pointers used c assembler bcpl equivalents vice versa amigados functions amigaos 2.x onwards amigados rewritten c retaining 1.x compatibility possible starting amigaos 4 amigados abandoned legacy bcpl starting amigaos 4.1 amigados extended 64-bit file-access support amiga console standard amiga virtual device normally assigned con driven console.handler developed primitive interface amigaos 1.1 became stable versions 1.2 1.3 started known amigashell original handler replaced newconsole.handler newcon console various features considered date created 1985 like command template help redirection null nil ansi color terminal new console handler – implemented release 1.2 – allows many features command history pipelines automatic creation files output redirected tcp/ip stacks like amitcp released early 1990s console could also receive redirection internet-enabled amiga device handlers e.g. tcp copy file tcp site/port unlike systems originally launched mid-1980s amigados implement proprietary character set developers chose use ansi–iso standard iso-8859-1 latin 1 includes ascii character set unix systems amiga console accepts linefeed lf end-of-line eol character amiga console support accented characters well characters created combinations 'dead keys keyboard example typical amigados command syntax amigados redirect output command files pipes printer null device amiga devices amigados commands expected provide standard template describes arguments accept used basic help feature commands although third-party replacement console handlers shells bash zshell ported unix kingcon often provide verbose help built-in commands requesting template command copy following output obtained reading template user know following syntax acceptable command user terminate program invoking key combination pressing printing character keyboard suspends console output output may resumed pressing key delete input pressing cause input processed command soon current command stops running like operating systems amigados also provides wildcard characters substitutes character sequence random characters string example wildcard characters amigados commands parsing follows wildcard indicates character prefixing indicates number repetitions viewed analogous regular expression .* amigados also feature dealing batch programming calls script programming number commands echo endif val skip deal structured script programming scripts text-based files created amigados internal text editor program called ed unrelated unix ed third-party text editor invoke script program amigados uses command execute method executing scripts keeps console window busy script finished scheduled job users interact console window script ends interrupt protection bits flags files links directories filesystem change one either use command protect use information entry icons menu workbench selected files amigados supports following set protection bits abbreviated hsparwed h-bit often misunderstood mean hide smart file system sfs files directories h-bit set hidden system still possible access hidden files n't appear directory listings demonstration h-bit action dos amiga deals environment variables used batch programming global local variables referred dollar sign front variable name example myvar global variables available system-wide local variables valid current shell case name collision local variables precedence global variables global variables set using command setenv local variables set using command set also commands getenv get used print global local variables examples demonstrate simple usage global variables kept files env optionally saved disk envarc survive reboot power cycling env default assign ram env envarc assign sys prefs/env-archive sys refers boot device bootup content envarc copied env accessibility programming amigados scripts one must keep mind global variables system-wide script-internal variables shall set using local variables one risks conflicts global variables scripts also global variables require filesystem access typically makes slower access local variables since envarc also used store system settings string variables system settings default icons tends grow large time copying everything env located ram disk becomes expensive led alternative ways set env using dedicated ramdisk handlers copy files envarc files requested examples handlers example demonstrating creative abuse global variables well lab skip amigados variant infamous goto amigados general case-insensitive indicating device dh0 dh0 dh0 always refers partition however file directory names filesystem-dependent filesystems allow case sensitivity flag upon formatting example file system smart file system convenient dealing software ported mostly case-sensitive un*x world causes much confusion native amiga applications assume case insensitivity advanced users hence typically use case sensitivity flag file systems used software originating un*x note also re-casing file directory volume names allowed using ordinary methods commands rename foo foo relabel bar bar valid exactly expected contrast example linux mv foo foo results error message mv foo foo file case-insensitive filesystems like vfat partitions physical drives typically referred df0 floppy drive 0 dh0 hard drive 0 etc however unlike many operating systems outside built-in physical hardware devices like df0 hd0 names single disks volumes partitions totally arbitrary example hard disk partition could named work system anything else time creation volume names used place corresponding device names disk partition device dh0 called workbench could accessed either name dh0 workbench users must indicate system workbench volume workbench always typing colon entering information requester form amigashell accessed volume name found operating system prompt user insert disk given volume name allow user cancel operation addition logical device names set assign command directory device programs often assigned virtual volume name installation directory instance fictional wordprocessor called writer might assign writer dh0 productivity/writer allows easy relocation installed programs default name sys used refer volume system booted various default names provided refer important system locations e.g startup scripts c amigados commands fonts installed fonts etc assignment volume labels also set multiple directories treated union contents example fonts might assigned sys fonts extended include example work userfonts using add option amigados assign command system would permit use fonts installed either directory listing fonts would show files locations physical device df0 shares floppy drive mechanics pc0 crossdos virtual device capable reading pc formatted floppy disks pc formatted floppy disk inserted floppy drive df0 floppy amiga icon change indicate disk unknown normal amiga device show four question marks standard unknown volume name pc0 icon appear revealing name pc formatted disk disk change amiga formatted disks invert behaviour amigados supports various filesystems variants first filesystem simply called amiga filesystem suitable mainly floppy disks support automatic booting hard disks floppy booting done using code bootblock soon replaced fastfilesystem ffs hence original filesystem known name old filesystem ofs ffs efficient space quite measurably faster ofs hence name amigaos 2.x ffs became official part os soon expanded recognise cached partitions international partitions allowing accented characters file partition names finally morphos amigaos 4 long filenames 108 characters 31 amigaos 4.x morphos featured new version ffs called fastfilesystem 2 ffs2 incorporated features original ffs including author put minor changes order preserve backwards compatibility major structural changes however ff2 amigaos 4.1 differs expand features capabilities aid plug-ins ffs2 amigaos 4 morphos version smart filesystem fork original sfs 100 compatible filesystems like fat12 fat16 fat32 windows ext2 linux available easily installable drag drop system libraries third party modules fat95 features read/write support found aminet software repository morphos 2 built-in support fat filesystems amigaos 4.1 adopted new filesystem called jxfs capable support partitions terabyte size alternate filesystems third-party manufacturers include professional filesystem filesystem easy structure based metadata allowing high internal coherence capable defragmenting fly require unmounted mounted smart filesystem journaling filesystem performs journaled activities system inactivities chosen morphos standard filesystem old file system/fast file system fast file system 2 amigaos4.x/morphos dos6 dos7 feature international filenames featured dos2 do3 directory caching abandoned due bugs original implementation dos4 dos5 recommended use reason dostypes backwards compatible forward compatible dos7 formatted disk read original amiga ffs dos3 disk read ks1.3 amiga however disk formatted dos0 using ffs ffs2 read version amiga operating system reason dos0 tended format choice software developers distributing floppy except custom filesystem bootblock used common practice amiga games software needed amigaos 2 anyway dos3 generally used july 2007 update amigaos 4.0 2007 first two plug-ins ffs2 released amigados single mandated filename extension .info must appended filename icon file called myprog exists icon file must called myprog.info addition image data icon file also records program metadata options keywords position desktop amigaos snapshot icons places defined user information file directory window size position information stored .info file associated directory disk icon information stored disk.info root volume exception icons amiga system identify file types using extensions instead examine either icon associated file binary header file determine file type | [
8832,
139,
655,
5264,
2193,
9236,
2197,
5397,
1561,
8729,
3233,
9249,
4387,
9762,
1193,
8618,
6062,
432,
8115,
8499,
823,
6075,
11076,
1349,
10570,
5709,
1742,
9166,
5969,
850,
6995,
4564,
8402,
6233,
477,
5729,
6498,
1509,
5736,
11370,
... | Test |
8,370 | 7 | GUSE:guse grid cloud user support environment guse also known ws-pgrade web service – parallel grid run-time application development environment /guse open source science gateway framework enables users access grid cloud infrastructures guse developed laboratory parallel distributed systems lpds institute computer science control sztaki hungarian academy sciences relevant requirement development guse enable simultaneous handling large number jobs even range millions without compromising response time user interface order achieve level concurrency workflow management back-end guse implemented based web service concept service oriented architecture soa many user communities would like access several dcis transparent way ’ want learn peculiar features used dcis want concentrate scientific application using science gateway sg solution sg provides interface scientist community distributed computing infrastructures dcis sg framework like guse provides specific set enabling technologies well frontend backend services together build generic gateway sg frameworks specialized certain scientific area hence scientists many different areas use enabling technology guse provides required software stack develop sg frameworks sg instances provide simplified user interface highly tailored needs given scientific community typical examples enabling technologies web application containers tomcat glassfish etc portal web application frameworks liferay spring etc database management systems mysql etc workflow management systems guse moteur etc sgs varying goals general researchers use gateways focus scientific goals less assembling e-infrastructure required important goal make easier scientists use national computing storage resources creating using collaborative tools sharing data sg framework used national grid initiatives ngis support small user communities afford develop customized sg guse sg framework also provides two application programming interfaces apis namely application-specific module api remote api create application-specific sgs according needs different user communities guse provides ws-pgrade graphical user interface create execute workflows various distributed computing infrastructures dcis among many features main five capabilities guse follows 1 guse general-purpose sg framework users access twenty different dcis via dci bridge service six different data storage types http https gsiftp s3 sftp srm via data avenue service dci bridge data avenue developed part ws-pgrade/guse service stack also used independent services enabling use types gateways workflow systems 2 ws-pgrade/guse workflow-oriented system extends directed acyclic graph dag -based workflow concept advanced parameter sweep ps features special workflow nodes condition-dependent workflow execution workflow embedding support moreover guse extends concrete workflow concept concepts abstract workflow workflow instance template 3 ws-pgrade/guse supports development execution workflow-based applications users guse define applications workflows share applications among ex-porting internal application repository users import applications execute modify user space 4 guse supports fast development sg instances customization technology guse serve different needs according community requirements computational power complexity applications specificity user interface fit community needs meet terminology 5 important design aspect guse flexibility flexibility guse expressed main goal designing multitier architecture ws-pgrade/guse enable versatile access many different kinds dcis data storage different kinds user interfaces access technically performed dci bridge job submission service bottom within guse architectural layers via data avenue blacktop service independent service provided sztaki dci bridge web service-based application providing standard access various dcis connects dci plug-ins external dci resources user submits workflow job components submitted transparently various dci systems via dci bridge service using standard ogsa basic execution service 1.0 bes interface result access protocol technical details various dci systems totally hidden behind bes interface job description language bes standardized job submission description language jsdl dcis supported dci bridge following middle tier guse architecture contains high-level guse services workflow storage stores every piece information needed define workflow graph structure description input files pointers output files pointers executable code target dci workflow nodes except input files workflow local input files local output files created workflow execution stored file storage workflow interpreter responsible execution workflows stored workflow storage information system holds information users workflows running job status users ws-pgrade gateways work isolated workspace i.e. see workflows order enable collaboration among isolated users application repository stores ws-pgrade workflows one five possible stages physically five categories stored zip files five categories stored workflows follows collaboration among gateway users possible via categories top three-tier structure presentation tier provides ws-pgrade graphical user interface generic sg framework functionalities underlying services exposed users portlets residing liferay portlet container part ws-pgrade layer easily customized extended according needs sg instances derived guse next section introduces essential user-level elements ws-pgrade guse provides framework european sgs guse gives one underlying workflow development infrastructures great number research activities numerous eu fp7 projects ongoing eu- national projects guse | [
5414,
6042,
1862,
5654
] | Test |
8,371 | 3 | Castlequest:castlequest castlequest known japan adventure/puzzle-hybrid video game developed published ascii corporation 1985 fm-7 pc-88 sharp x1 additional versions followed 1986 famicom msx subsequently released 1989 nes united states nexoft corporation sequel castle released 1985 msx sg-1000 systems though nes like game early example metroidvania genre object game navigate groken castle rescue princess margarita player push certain objects throughout game accomplish progress rooms prince advance next room aligning cement blocks honey jars candle cakes elevator controlling block rooms quite time consuming since prince open particular door stand door meaning open door jumping mid-air prince must also carry key matches color door intends open player navigate castle help map obtained first room he/she begins map provide player matrix 10x10 rooms highlight room princess located player must also avoid touching enemies like knights bishops wizards fire spirits attack cats phantom flowers family computer nes versions room wider screen display scrolls horizontally player moves different room sizes many adjustments room layouts made comparison msx version family computer version player starts 4 lives game supports famicom data recorder ascii turbo file peripherals saving loading game progress game reworked us nes release save/load feature removed nes 15-pin expansion port turbo file connects however player 50 instead 4 lives initially two magical fairies help another obvious difference msx nes/family computer versions player attack enemies sword dagger nes/family computer versions attack limited enemy must close player kill take place puts player risk killed enemy timing crucial prince dash retrieve weapon timely basis attacking wrong time prevent player launching another attack enemy right location attacked leading certain loss one life player scenario however relevant msx version since way eliminate enemy throw object force enemy climb escalator remain crushed ceiling | [
9161,
5762,
9006
] | None |
8,372 | 1 | Base_Mérimée:base mérimée base mérimée french database monuments listed national significance history architecture art created 1978 placed online 1995 french ministry culture division architectural heritage database periodically updated database contains information derived first survey historic monuments made mérimée 1840 cultural heritage inventory specifically religious domestic agricultural educational military industrial architecture name refers writer prosper mérimée also second inspector-general historic monuments | [] | Test |
8,373 | 2 | Paul_Vixie:paul vixie paul vixie american computer scientist whose technical contributions include domain name system dns protocol design procedure mechanisms achieve operational robustness dns implementations significant contributions open source software principles methodology also created launched first successful commercial anti-spam service authored standard unix system programs sends proxynet rtty vixie cron one point ran consulting business vixie enterprises vixie software engineer digital equipment corporation dec 1988 1993 left dec 1994 founded internet software consortium isc together rick adams carl malamud support bind software internet activities isc assumed new company internet systems consortium 2004 although isc operates f root name server vixie one point joined open root server network orsn project operated l root server 1995 cofounded palo alto internet exchange paix metromedia fiber network mfn bought 1999 served chief technology officer mfn abovenet later president paix 1998 cofounded mail abuse prevention system maps california non-profit company goal stopping email abuse vixie author several request comments rfc including best current practice document classless in-addr.arpa delegation bcp 20 unix software stated 2002 hold record 'most cert advisories due single author 2008 vixie served judge mozilla foundation download day attempt set guinness world record downloads single day new piece software vixie served board trustees american registry internet numbers arin 2005 2013 served chairman 2009 2010 vixie also serves security stability advisory committee icann vixie attended george washington high school san francisco california received ph.d. computer science keio university 2011 2013 nearly 20 years isc founded new company farsight security inc. spinning security business unit isc 2014 vixie inducted internet hall fame innovator | [
1472,
8224,
4483,
2887,
7337,
11659,
8301,
6352,
850,
914,
3731,
5492,
9845,
1495,
472
] | Test |
8,374 | 2 | Ebrima:ebrima ebrima opentype font designed support african writing systems created microsoft part windows 7 operating system supports advanced opentype features combining diacritics positioning latin alphabet based segoe font | [
2593,
4130,
9539,
7973,
8422,
4138,
4141,
6797,
1487,
3538,
4146,
4148,
9654,
4127
] | Test |
8,375 | 0 | Australasian_Language_Technology_Association:australasian language technology association australasian language technology association alta promotes language technology research development australia new zealand alta organises regular events exchange research results academic industrial training co-ordinates activities professional societies alta founding regional organization asian federation natural language processing afnlp every year early december alta organises research workshop commonly known altw gathering together growing language technology community australia new zealand academic industrial world workshop welcomes original work aspect natural language processing including speech text accepted papers published alta proceedings also included part acl anthology since 2008 alta involved organising australian computational linguistics olympiad ozclo contest high school students area linguistics computational linguistics | [
1890,
7724
] | Test |
8,376 | 6 | Acronis_Secure_Zone:acronis secure zone acronis secure zone hard disk partition type created used acronis true image ati backup storage target backup applications typically use network storage storing backup archives problematic resources available acronis designed solution problem carving part local disk proprietary partition refer acronis secure zone asz since partition accessibly true image backup recovery functions backup target safe malware user files uses corruption ati manage single asz per computer restore data aszs present e.g portable hard drive connected although acronis secure zone partition type actually rebadged fat32 partition labeled acronis sz partition type code set 0xbc knowing requirements one manually create and/or manage existing acronis secure zone using partition manager since asz actually modified fat32 partition type possible gain direct access partition changing partition type code 0x0b fat32 lba ati designed self-manage backup archives stored asz backup files stored autogenerated names root folder enough freespace next backup file ati automatically delete oldest image set base+incremental/differential files order create space new files oem versions true image designed use special oem secure zone technically regular asz uses partition type 0xbb typically contains single image file factory default os application configuration set forth manufacturer | [
2107,
3366
] | Test |
8,377 | 4 | Spam_Bully:spam bully spam bully anti-spam software made axaware llc spambully uses bayesian filtering separate good emails spam emails also uses allow/block lists determine emails go user inbox popular features include ability report spammers providers ftc option converting spambully toolbar variety languages including spanish german italian russian | [] | Test |
8,378 | 2 | Bcfg2:bcfg2 bcfg2 pronounced bee-config configuration management tool developed mathematics computer science division argonne national laboratory bcfg2 aids infrastructure management lifecycle – configuration analysis service deployment configuration auditing includes tools visualizing configuration information well reporting tools help administrators understand configuration patterns environments bcfg2 differs similar configuration management tools due auditing capability one stated design goals bcfg2 determine interactive direct changes made machine report extra changes client optionally remove additional configuration bcfg2 written python enables system administrator manage configuration large number computers using central configuration model bcfg2 operates using simple model system configuration modeling intuitive items like packages services configuration files well dependencies model system configuration used verification validation allowing robust auditing deployed systems bcfg2 configuration specification written using declarative xml model entire specification validated using widely available xml schema validators along custom schemas included bcfg2 built cross-platform bcfg2 works unix-like operating systems bcfg2 based client-server architecture client responsible interpreting processing configuration served server configuration literal client-side processing configuration required completion configuration process client uploads set statistics server bcfg2 client performs client configuration reconfiguration operations renders declarative configuration specification provided bcfg2 server set configuration operations attempt change client state described configuration specification operation bcfg2 client intended simple possible conceptually sole purpose client reconcile differences current client state state described specification received bcfg2 server bcfg2 server responsible taking network description turning series configuration specifications particular clients also manages probed data tracks statistics clients bcfg2 server takes information two sources generating client configuration specifications first pool metadata describes clients members aspect-based classing system clients defined terms aspects abstract behavior file system repository contains mappings metadata literal configuration combined form literal configuration specifications clients example abstract configuration entries example literal configuration entries | [
9320,
8554,
5612,
10222,
7983,
10641,
5492,
5397,
823,
479
] | Test |
8,379 | 2 | Page_cache:page cache computing page cache sometimes also called disk cache transparent cache pages originating secondary storage device hard disk drive hdd solid-state drive ssd operating system keeps page cache otherwise unused portions main memory ram resulting quicker access contents cached pages overall performance improvements page cache implemented kernels paging memory management mostly transparent applications usually physical memory directly allocated applications used operating system page cache since memory would otherwise idle easily reclaimed applications request generally associated performance penalty operating system might even report memory free available compared main memory hard disk drive read/writes slow random accesses require expensive disk seeks result larger amounts main memory bring performance improvements data cached memory separate disk caching provided hardware side dedicated ram nvram chips located either disk controller case cache integrated hard disk drive usually called disk buffer disk array controller memory confused page cache pages page cache modified brought called dirty pages since non-dirty pages page cache identical copies secondary storage e.g hard disk drive solid-state drive discarding reusing space much quicker paging application memory often preferred flushing dirty pages secondary storage reusing space executable binaries applications libraries also typically accessed page cache mapped individual process spaces using virtual memory done mmap system call unix-like operating systems means binary files shared separate processes also unused parts binaries flushed main memory eventually leading memory conservation since cached pages easily evicted re-used operating systems notably windows nt even report page cache usage available memory memory actually allocated disk pages led confusion utilization page cache windows page cache also aids writing disk pages main memory modified writing data disk marked dirty flushed disk freed file write occurs cached page particular block looked already found page cache write done page main memory found page cache write perfectly falls page size boundaries page even read disk allocated immediately marked dirty otherwise page fetched disk requested modifications done file created opened page cache written might result zero byte file later read however cached pages written program code often mapped read-only copy-on-write latter case modifications code visible process written disk 2019 security researchers demonstrated side-channel attacks page cache possible bypass privilege separation exfiltrate data processes systematically monitoring whether file pages example executable library files present cache | [
5120,
8195,
8976,
11539,
8344,
2339,
4389,
7983,
7728,
819,
4423,
2250,
5840,
1109,
86,
4565,
5206,
1509,
10091,
8684,
8301,
2804,
890,
6014,
9343
] | Train |
8,380 | 6 | Non-Volatile_File_System:non-volatile file system non-volatile file system nvfs flash memory file system introduced release palm personal digital assistant handheld models tungsten t5 tungsten e2 palm tx z22 treo 650/700/680/755p palm centro nvfs claimed palmone file system designed keep information safe battery run power previous non-flash memory designs would lose stored data event power loss nvfs derivative flash memory continually stores data even power applied palmone invented nvfs response complaints handheld data destroyed battery power ran past necessary keep handheld continuously charged avoid losing data since information stored volatile memory similar feature adopted pdas running windows mobile 5.0 operating system named persistent storage nvfs uses nand flash memory technology retain handheld data event battery swap battery runs power palmone claims flash memory plus majority consumers since many want charge handheld often consumes less overall power nvfs uses brand-new data architecture might render incompatible applications ran well non-nvfs handhelds nvfs file system designed use clusters 512 byte blocks power users complained files take approximately 33 space volatile file systems fact volatile file system uses block size 14 bytes compared nvfs file system minimum block size 512 bytes palmone responded complaint offering free 128 megabyte sd card request selected customers nvfs early release palm time palmone would commit work rom flash update reduce overhead nvfs architecture currently palm-branded products using nvfs shipped nvfs fix already installed tungsten e2 uses 4kb blocks recommended earlier versions palm treo 650 tungsten t5 install nvfs fix earliest possible convenience controversy gave tungsten t5 treo 650 unfavorable remarks power users palmone released first sprint treo 650 updater designed ensure block size overhead reduced 512 bytes 16-32 bytes usually 32 bytes low 16 bytes depending file demand resulting drastic memory management efficiency improvements nvfs file system second update sprint treo 650 released june 16 2005 unlocked gsm firmware upgrade also released day second sprint treo 650 firmware update also improves efficiency nvfs file system addition addressing known problems prior release firmware update rogers wireless treo 650 firmware update quietly posted rogers wireless treo 650 support site shares bug fixes nvfs memory efficiency updates unlocked gsm version initial release palmone tungsten e2 verizon wireless treo 650 earthlink wireless treo 650 already nvfs memory system problems assessed according palm info center june 22 2005 palmone tungsten t5 version 1.1 update fixes nvfs file system inefficiency problem since release november 2004 version 1.1 update also updates tungsten t5 version number garnet 5.4.8 july 25 2005 cingular treo 650 fix officially released one fixes addressing inefficiency problems associated nvfs file system cingular treo 650 holders encouraged deploy flash rom update earliest time possible | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
7225,
11323,
8772,
1109,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2230,
5816,
1... | Test |
8,381 | 4 | Mark_Weatherford:mark weatherford mark weatherford american cybersecurity professional held variety executive level positions public private sectors appointed first deputy secretary cybersecurity us department homeland security 2011 2013 currently global information security strategist booking holdings weatherford graduate university arizona tucson arizona received master degree naval postgraduate school monterey california holds certified information systems security professional cissp certification former us navy cryptologic officer led navy ’ computer network defense operations naval computer incident response team navcirt joining dhs served 2010–11 vice president chief security officer north american electric reliability corporation nerc directed organization ’ critical infrastructure cybersecurity program electric utilities across north america also appointed governor arnold schwarzenegger state california first chief information security officer office information security 2008–09 also first chief information security officer ciso state colorado 2004–07 appointed governor bill owens governor bill ritter notably helped establish state ’ first cybersecurity program spearheaded nation first cybersecurity legislation aimed protect citizens leaving dhs principal chertoff group washington dc senior vice president chief cybersecurity strategist varmour weatherford one information security magazine ’ security 7 award winners 2008 awarded sc magazine cso year award 2010 2012 2013 named one 10 influential people government information security govinfosecurity member marysville high school marysville california hall fame inducted information systems security association issa international hall fame october 2018 | [
10307
] | None |
8,382 | 9 | Assignment_operator_(C++):assignment operator c++ c++ programming language assignment operator codice_1 operator used assignment like operators c++ overloaded copy assignment operator often called assignment operator special case assignment operator source right-hand side destination left-hand side class type one special member functions means default version generated automatically compiler programmer declare one default version performs memberwise copy member copied copy assignment operator may also programmer-declared compiler-generated copy assignment operator differs copy constructor must clean data members assignment target correctly handle self-assignment whereas copy constructor assigns values uninitialized data members example language permits overloaded assignment operator arbitrary return type including codice_2 however operator usually defined return reference assignee consistent behavior assignment operator built-in types returning assigned value allows using operator invocation expression instance control statements chained assignment also c++ standard library requires behavior user-supplied types deep copies objects made exception safety taken consideration one way achieve resource deallocation never fails however no-fail no-throw swap function available member subobjects class provides copy constructor destructor according rule three straightforward way implement copy assignment follows c++ supports assignment different classes via implicit copy constructor assignment operator destination instance class ancestor source instance class copying ancestor descendant objects could leave descendant fields uninitialized permitted | [
8262,
6527,
6160,
1236,
10143
] | Train |
8,383 | 3 | List_of_devices_using_Mediatek_tablet_processors:list devices using mediatek tablet processors page contains list every major device using mediatek tablet processor organized chip devices uses section begin=header symtab25 | [
7170,
8720,
11282,
9235,
11289,
1057,
38,
4139,
8237,
9774,
8250,
8253,
7745,
7235,
7747,
2635,
99,
8812,
11374,
10361,
638,
644,
8842,
146,
659,
1170,
7833,
666,
5786,
4258,
4773,
9913,
10945,
9928,
2788,
3301,
9964,
6391,
3835,
781,
2... | Test |
8,384 | 9 | Highcharts:highcharts highcharts software library charting written pure javascript first released 2009 created highsoft vik norway regularly featured national media finansavisen dagsrevyen torstein hønsi main creator product product first demonstrated thought 2006 interview finansavisen spoke need program creating graphs charts allowing users publish charts directly website unlike many software products n't developed well known tech location silicon valley company based small norwegian town vik company based norway product used globally stated interview 2014 customer base primarily abroad 97 company revenue generated clients outside norway highchart products featured norwegian tv late 2012 parent company featured national tv show segment middle 30-minute show dagsrevyen highcharts free non-commercial use licenses needed use commercial applications source code highcharts downloaded modified license | [
803,
1211,
3462,
5846
] | None |
8,385 | 9 | Augmented_assignment:augmented assignment augmented assignment compound assignment name given certain assignment operators certain programming languages especially derived c augmented assignment generally used replace statement operator takes variable one arguments assigns result back variable simple example codice_1 expanded codice_2 similar constructions often available various binary operators general languages offering feature operators take variable one arguments return result type augmented assignment equivalent assigns result back variable place including arithmetic operators bitshift operators bitwise operators example following statement variation found many programs means find number stored variable x add 1 store result addition variable x simple seems may inefficiency location variable x looked twice compiler recognize two parts expression identical x might reference array element complexity comparison augmented assignment version version excuse compiler failing generate code looks location variable x modifies place course machine code supports sequence instance x simple variable machine code sequence might something like code would generated forms special op code might meaning modify memory adding 1 x decent compiler would generate code forms machine codes offer inc dec operations add subtract one others might allow constants one generally form stands operator always may special op codes help still possibility x complicated entity compiler encouraged avoid duplication accessing x course x lengthy name less typing required last basis similar feature algol compilers offered via burroughs b6700 systems using tilde symbol stand variable assigned would become forth general x =~ 1 producing optimum code would remain province compiler expression-oriented programming languages c assignment augmented assignment expressions value allows use complex expressions however produce sequences symbols difficult read understand worse mistype easily produce different sequence gibberish although accepted compiler produce desired results languages python assignment augmented assignment statements expressions thus used complex expressions example following valid c valid python assignment languages augmented assignment form right-associative assignment languages c c++ python augmented assignment assignment location includes function calls mandated call functions i.e statement function codice_3 mandated called language implements augmented assignment macro expansion codice_3 called twice c c++ c assignment operator augmented follows called compound assignment operator said languages following list though complete all-inclusive lists major programming languages support augmented assignment operators | [
512,
515,
3462,
8582,
6160,
4507,
1435,
9245,
5663,
1952,
9385,
5165,
5677,
2045,
10435,
8644,
5703,
847,
7889,
10470,
8554,
240,
3705,
7292,
7421
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.