node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
8,386
5
Port_(computer_networking):port computer networking computer networking port communication endpoint physical well wireless connections terminated ports hardware devices software level within operating system port logical construct identifies specific process type network service ports identified protocol address combination 16-bit unsigned numbers commonly known port number common protocols use port numbers transmission control protocol tcp user datagram protocol udp port number always associated ip address host protocol type communication completes destination origination network address message specific port numbers commonly reserved identify specific services arriving packet easily forwarded running application purpose lowest numbered 1024 port numbers identify historically commonly used services called well-known port numbers higher-numbered ports available general use applications known ephemeral ports used service enumeration ports provide multiplexing service multiple services multiple communication sessions one network address client–server model application architecture multiple simultaneous communication sessions may initiated service port number 16-bit unsigned integer thus ranging 0 65535 tcp port number 0 reserved used udp source port optional value zero means port process associates input output channels via internet socket type file descriptor transport protocol ip address port number known binding enables process send receive data via network operating system networking software task transmitting outgoing data application ports onto network forwarding arriving network packets processes matching packet ip address port number tcp one process may bind specific ip address port combination common application failures sometimes called port conflicts occur multiple programs attempt use port number ip address protocol applications implementing common services often use specifically reserved well-known port numbers receiving service requests clients process known listening involves receipt request well-known port establishing one-to-one server-client dialog using local port number clients may continue connect listening port works tcp connection identified tuple consisting local address local port remote address remote port well-known ports defined convention overseen internet assigned numbers authority iana core network services world-wide web typically use well-known port numbers many operating systems special privileges required applications bind ports often deemed critical operation ip networks conversely client end connection typically uses high port number allocated short term use therefore called ephemeral port internet assigned numbers authority iana responsible global coordination dns root ip addressing internet protocol resources includes registration commonly used port numbers well-known internet services port numbers divided three ranges well-known ports registered ports dynamic private ports well-known ports also known system ports 0 1023 requirements new assignments range stricter registrations examples include registered ports 1024 49151 iana maintains official list well-known registered ranges dynamic private ports 49152 65535 one common use range ephemeral ports transport layer protocols transmission control protocol tcp user datagram protocol udp transfer data using protocol data units pdus tcp pdu segment datagram udp protocols use header field recording source destination port number port numbers encoded transport protocol packet header readily interpreted sending receiving computers also components networking infrastructure particular firewalls commonly configured differentiate packets based source destination port numbers port forwarding example application practice attempting connect range ports sequence single computer commonly known port scanning usually associated either malicious cracking attempts network administrators looking possible vulnerabilities help prevent attacks port connection attempts frequently monitored logged computers technique port knocking uses series port connections knocks client computer enable server connection example use ports internet mail system server used sending receiving email generally needs two services first service used transport email servers accomplished simple mail transfer protocol smtp smtp service application usually listens tcp port 25 incoming requests second service usually either post office protocol pop internet message access protocol imap used e-mail client applications users personal computers fetch email messages server pop service listens tcp port number 110 services may running host computer case port number distinguishes service requested remote computer user computer another mail server listening port number server well defined iana calls well-known ports client port number often chosen dynamic port range see applications clients server use specific port numbers assigned iana good example dhcp client always uses udp port 68 server always uses udp port 67 port numbers sometimes seen web uniform resource locators urls default http uses port 80 https uses port 443 url like nowiki http //www.example.com:8080/path/ /nowiki specifies web browser connects instead port 8080 http server concept port numbers established early developers arpanet informal co-operation software authors system administrators term port number yet used time preceded use term socket number early development stages network socket number remote host 40-bit quantity first 32 bits similar today ipv4 address time most-significant 8 bits host number least-significant portion socket number bits 33 40 entity called another eightbit number abbreviated aen today network socket refers related distinct concept namely internal address endpoint used within node march 26 1972 vint cerf jon postel called documenting then-current usages establishing socket number catalog rfc 322 network administrators asked submit note place phone call describing function socket numbers network service programs host catalog subsequently published rfc 433 december 1972 included list hosts port numbers corresponding function used host network first registry function served primarily documentation usage indicated port number usage conflicting hosts useful public services document promised resolution conflicts based standard postel published may 1972 rfc 349 first proposed official assignments port numbers network services suggested dedicated administrative function called czar maintain registry 256 values aen divided following ranges telnet service received first official assignment value 1 detail first set assignments early arpanet aen also called socket name used initial connection protocol icp component network control program ncp ncp forerunner modern internet protocols today terminology service name still closely connected port numbers former text strings used network functions represent numerical port number
[ 5251, 7430, 2695, 5387, 1164, 6541, 14, 8204, 4240, 3218, 5652, 11413, 3094, 11162, 5531, 6813, 10271, 10274, 9380, 933, 2085, 5543, 3752, 6567, 6825, 8998, 4396, 10924, 2222, 7214, 7983, 6577, 2994, 11566, 9909, 8504, 11321, 3133, 829, 4...
Test
8,387
4
TorrentLocker:torrentlocker torrentlocker ransomware trojan targeting microsoft windows first observed february 2014 least five major releases made available december 2014 malware encrypts victim files similar manner cryptolocker implementing symmetric block cipher aes key encrypted asymmetric cipher torrentlocker scans system programs files conceals contents aes encryption leaving ransom instructions victim done pay decryption ransom operator demands victim amount usually starts around within 3 days victim told pay amount bitcoins sent unique bitcoin address differs infected user
[ 3072, 3969, 6786, 7044, 10245, 10756, 7304, 11401, 9356, 6797, 9233, 8978, 4863, 4883, 150, 535, 278, 10392, 1690, 2075, 3867, 10141, 5281, 2213, 8998, 9256, 939, 9771, 1970, 3643, 6588, 7739, 9791, 1088, 3395, 4165, 2508, 467, 7515, 4344...
Test
8,388
2
ORVYL_and_WYLBUR:orvyl wylbur orvyl timesharing monitor developed stanford university ibm system/360 system/370 computers 1967–68 orvyl one first time-sharing systems made available ibm computers wylbur text editor word processor program designed work either without orvyl conjunction orvyl names orvyl wylbur often used interchangeably wylbur full standalone operating system mold dartmouth time sharing system dtss unix instead runs top ibm batch operating system os/360 svs mvs takes form editor remote job entry system thus much relationship ibm operating systems emacs unix reasons wylbur often thought text editor rather time-sharing system however whereas unix need emacs provide text editing services ibm operating systems originally needed wylbur later innovations ibm time sharing option tso made wylbur less relevant ibm users gradually replaced article use full upper case spelling commands keywords references characters string assume ebcdic code page orvyl wylbur used stanford linear accelerator center slac european organization nuclear research cern u.s. national institutes health nih many sites retired sites late 1990s owing concerns y2k issues remained use nih december 2009 orvyl wylbur still available open source stanford also proprietary versions superwylbur orvyl wylbur much admired shown excerpt 2004 article titled computing cern mainframe era orvyl wylbur first became available 1967-68 tss/360 tso official time-sharing solution ibm roughly time third-party time-sharing systems mts became available radar development effort cp-67 ibm cambridge scientific center took place wylbur additional advantage could used conjunction ibm mainstream operating system os/360 wylbur single-address-space system unlike tso conserved memory days memory precious even tso available organizations seeking minimize memory use would often keep even majority users wylbur rather letting use tso interactive environment wylbur provides compressed partitioned data sets pdss aka libraries save disk space mvs source code typically stored sequence card images 80 character lines line contained one characters 80 characters still used store line even data e.g. source code stored variable blocked vb space could wasted strings embedded blanks wylbur implements stream-oriented storage text pdss sequential data sets one character line might take 16 characters line length offset chunk length character rather 80 store wylbur external program run via jcl used convert files wylbur edit format although tso allows user locked-down wylbur system possible write wylbur exec scripts execute batch jobs perform functions ordinarily would required tso account filling batch job skeleton parameters submitting batch job retrieving output displaying screen wylbur security advantages tso disadvantages advantages include disadvantages related security included wylbur special edit format wylbur data sets compressed line number revision flag line addition wylbur supports standard fb vb datasets wylbur user normally specifies default volume may special word catlg requesting search catalogue existing dataset requesting new dataset cataloged wylbur ability convert line numbers edit ibm data sets either scaled integers explicit decimal point wylbur provides line editor works temporary data sets similar buffers editors point time one temporary data sets designated default wylbur maintains current line pointer temporary data set user may specify explicit working data set command omits default temporary data set used working data set unit operation set lines associative range individual lines identified line number range 0.0 99999.999 leading zeros integer part trailing zeros fractional part may omitted user specify line number following ways wylbur libraries nonstandard format however allows user export native os files integer sequence numbers import native os files integer sequence rescale line number factor 1000 range specified combination pattern similar regular expression syntax closer snobol unix perl backtracking nih wylbur capture subpatterns pattern may sample commands change 73/80 x10+10 every 3rd line 'abc 1/3 1.5-2/3.7+2 copy 'bal 10/15 emd change 73/80 every 3rd line start 2 'bal 10/15 change digits*3 substring 2/4 specification base+increment means replacement text first line base incremented subsequent lines x10+10 replaces matched text first line x10 second line x20 third line x30 specification substring 2/4 means columns 2-4 matched string note less flexible captures various organizations developed enhanced versions wylbur included superwylbur several enhancements original wylbur important macro processor adds commands constants functions expressions wylbur even command syntax include parameters defined expressions user use forms expression expression force evaluation expression function argument variable parentheses may omitted e.g. .time instead .time doubled requests valued quoted superwylbur two types constants superwylbur operators whose names contain special characters need separated spaces operators whose names contain period letters must separated spaces superwylbur following types operators name macro function begins period arguments colon separates name semicolon separates successive arguments superwylbur provides following types macro functions arithmetic functions accounting functions date time conversion parameters default current date time environmental queries return values set commands full screen functions jes functions macro functions string functions working file functions arguments default current default working data set complete list macro functions pseudofunctions like functions except appear left hand side assignment e.g. let foo bar baz
[ 2560, 7, 6155, 6675, 7187, 10776, 25, 4637, 9762, 4643, 6180, 5158, 7217, 10803, 7733, 9784, 10809, 573, 576, 2625, 8262, 6221, 3160, 10333, 97, 11363, 9829, 6248, 6760, 8298, 9835, 10856, 7285, 4727, 2168, 9335, 634, 1147, 2172, 3197, ...
None
8,389
4
MailXaminer:mailxaminer mailxaminer digital forensic program built allow examination email messages web application based email clients application developed systools inc slogan ‘ simplifying email forensics ’ mailxaminer first loads messages chosen email storage source arranges hierarchically purpose evidence analysis extraction product name derived combination ‘ mail ’ ‘ examiner ’ denoting platform examine emails programming application provides carving deleted evidence evidence damaged sources cases evidence spoliation post analysis software serves output generation court admissible digital formats e.g concordance adobe pdf systools official developer mailxaminer launched first release december 1 2013 subsequent allotment official product licensing constant screening mailxaminer given systools inc. present stable release product version 4.9 launched year 2014 added capabilities serving skin tone analysis link analysis timeline analysis program helped achieve level refurbishment act improvement process email examination procedure since launch support forensic disk image optical character recognition format skype database analysis also added application since one upgrades support limited email storage formats imaged within file owing email examination theme application currently application serving legal departments law enforcement agencies government sectors sectors requirement investigation email messages
[ 5857, 5284, 9319, 2218, 6797, 7983, 2901 ]
None
8,390
3
VAXmate:vaxmate vaxmate ibm pc/at compatible personal computer introduced digital equipment corporation september 1986 replacement rainbow 100 standard form first commercial diskless personal computer operating system files could served vax/vms server running company vax/vms services ms-dos software went several name changes finally becoming pathworks alternatively optional expansion box containing either 20 mb 40 mb hard disk could purchased allowed operate conventional stand-alone pc basic system contained 8 mhz intel 80286 cpu 1 mbyte ram 1.2 mb rx33 5¼-inch floppy disk drive 14-inch diagonal amber green monochrome crt thinwire ethernet interface contained system unit also provided parallel printer port serial communications port separate mouse lk250 keyboard used device well expansion box 80287 numeric coprocessor could ordered option memory could expanded 2 mb another option 3 mb north america internal modem also available superseded decstation 200 300 january 1989
[ 7234, 3142, 3945, 10220, 9742, 5873, 6129, 499, 11604, 8474, 9723, 8732 ]
Validation
8,391
2
Windows_Vista_networking_technologies:windows vista networking technologies computing microsoft windows vista windows server 2008 introduced 2007/2008 new networking stack named next generation tcp/ip stack improve previous stack several ways stack includes native implementation ipv6 well complete overhaul ipv4 new tcp/ip stack uses new method store configuration settings enables dynamic control require computer restart change settings new stack implemented dual-stack model depends strong host-model features infrastructure enable modular components one dynamically insert remove next generation tcp/ip stack connects nics via network driver interface specification ndis driver network stack implemented codice_1 implements transport network data link layers tcp/ip model transport layer includes implementations tcp udp unformatted raw protocols network layer ipv4 ipv6 protocols implemented dual-stack architecture data link layer also called framing layer implements 802.3 802.1 ppp loopback tunnelling protocols layer accommodate windows filtering platform wfp shims allows packets layer introspected also host wfp callout api networking api exposed via three components user interface configuring troubleshooting working network connections changed significantly prior versions windows well users make use new network sharing center see status network connections access every aspect configuration single icon notification area system tray represents connectivity network adapters whether wired wireless network browsed using network explorer replaces windows xp network places network explorer items shared device scanner file share network location awareness nla service uniquely identifies network exposes network attributes connectivity type applications determine optimal network configuration however applications use nla apis explicitly aware network connectivity changes adapt accordingly windows vista uses link layer topology discovery lltd protocol graphically present different devices connected network network map addition network map uses lltd determine connectivity information media type wired wireless map topologically accurate ability know network topology important diagnosing solving networking problems streaming content network connection device implement lltd appear network map icon representing device allowing users one-click access device user interface lltd invoked provides metadata device contains static state information mac address ipv4/ipv6 address signal strength etc windows vista classifies networks connects either public private domain uses network location awareness switch network types different network types different firewall policies open network public wireless network classified public restrictive network settings mode computers network trusted external access computer including sharing files printers disabled home network classified private enables file sharing computers computer joined domain network classified domain network network policies set domain controller network first connected windows vista prompts choose correct network type subsequent connections network service used gain information network connected automatically switch network configuration connected network windows vista introduces concept network profiles network system stores ip address dns server proxy server network features specific network network profile network subsequently connected settings need reconfigured ones saved profile used case mobile machines network profiles chosen automatically based networks available profile part either public private domain network windows vista networking stack supports dual internet protocol ip layer architecture ipv4 ipv6 implementations share common transport framing layers windows vista provides gui configuration ipv4 ipv6 properties ipv6 supported networking components services windows vista dns client use ipv6 transport internet explorer windows vista applications use wininet windows mail file sharing support literal ipv6 addresses windows firewall ipsec policies snap-in support ipv6 addresses permissible character strings ipv6 mode windows vista use link local multicast name resolution llmnr protocol described resolve names local hosts network dns server running service useful networks without central managing server ad hoc wireless networks ipv6 also used ppp-based dial-up pppoe connections windows vista also act client/server file sharing dcom ipv6 support dhcpv6 used ipv6 also included ipv6 even used full native ipv6 connectivity available using teredo tunneling even traverse ipv4 symmetric network address translations nats well full support multicast also included via mldv2 ssm protocols ipv6 interface id randomly generated permanent autoconfigured ipv6 addresses prevent determining mac address based known company ids nic manufacturers support wireless networks built network stack new set apis called native wifi emulate wired connections case previous versions windows allows implementation wireless-specific features larger frame sizes optimized error recovery procedures native wifi exposed auto configuration module acm replaces windows xp wireless zero configuration acm extensible developers incorporate additional wireless functionality automatic wireless roaming override automatic configuration connection logic without affecting built-in framework easier find wireless networks range tell networks open closed hidden wireless networks advertise name ssid better supported security wireless networks improved improved support newer wireless standards like 802.11i eap-tls default authentication mode connections made secure connection level supported wireless access point wpa2 used even ad-hoc mode windows vista also provides fast roaming service allow users move one access point another without loss connectivity preauthentication new wireless access point used retain connectivity wireless networks managed either connect network dialog box within gui netsh wlan command shell settings wireless networks also configured using group policy windows vista enhances security joining domain wireless network use single sign use credentials join wireless network well domain housed within network case radius server used peap authentication joining network ms-chap v2 authentication log domain bootstrap wireless profile also created wireless client first authenticates computer wireless network joins network stage machine still access domain resources machine run script stored either system usb thumb drive authenticates domain authentication done either using username password combination security certificates public key infrastructure pki vendor verisign windows vista features windows connect supports setting wireless network using several methods supported wi-fi protected setup standard implements native code api web services devices wsdapi support devices profile web services dpws also managed code implementation wcf dpws enables simpler device discoverability like upnp describes available services clients function discovery new technology serves abstraction layer applications devices allowing applications discover devices referencing device function rather bus type nature connection plug play extensions pnp-x allow network-connected devices appear local devices inside windows connected physically upnp support also enhanced include integration pnp-x function discovery windows vista networking stack also uses several performance optimizations allow higher throughput allowing faster recovery packet losses using high packet loss environment wireless networks windows vista uses newreno algorithm allows sender send data retrying case receives partial acknowledgement acknowledgement receiver part data received also uses selective acknowledgements sack reduce amount data retransmitted case portion data sent received correctly forward rto-recovery f-rto prevent unnecessary retransmission tcp segments round trip time increases also includes neighbour unreachability detection capability ipv4 ipv6 tracks accessibility neighboring nodes allows faster error recovery case neighboring node fails ndis 6.0 introduced windows vista supports offloading ipv6 traffic checksum calculations ipv6 improved manageability scalability performance reduced complexity ndis miniports simpler models writing lightweight filter drivers lwf lwf drivers combination ndis intermediate drivers miniport driver eliminate need write separate protocol miniport bypass mode examine selected control data paths tcp/ip stack also provides fail-back support default gateway changes periodically attempting send tcp traffic previously detected unavailable gateway provide faster throughput sending traffic primary default gateway subnet another significant change aims improve network throughput automatic resizing tcp receive window receive window rwin specifies much data host prepared receive limited among things available buffer space words measure much data remote transmitter send requiring acknowledgement outstanding data receive window small remote transmitter frequently find hit limit much outstanding data transmit even though enough bandwidth available transmit data leads incomplete link utilization using larger rwin size boosts throughput situations auto-adjusting rwin tries keep throughput rate high permissible bandwidth link receive window auto tuning functionality continually monitors bandwidth latency tcp connections individually optimize receive window connection window size increased high-bandwidth ~5 mbit/s+ high-latency 10ms situations traditional tcp implementations uses tcp slow start algorithm detect fast transmit without choking receiver intermediate nodes nutshell specifies transmission start slow rate transmitting packets number controlled congestion window – specifies number outstanding packets transmitted acknowledgement receipt receiver yet received acknowledgements received congestion window expanded one tcp segment time till acknowledgement fails arrive sender assumes congestion window size instant network gets congested however high bandwidth network sustain quite large congestion window without choking slow start algorithm take quite time reach threshold – leaving network under-utilized significant time new tcp/ip stack also supports explicit congestion notification ecn keep throughput hit due network congestion low possible without ecn tcp message segment dropped router buffer full hosts get notice building congestion packets start dropped sender detects segment reach destination due lack feedback congested router information extent reduction transmission rate needs make standard tcp implementations detect drop time waiting acknowledgement receiver sender reduces size congestion window limit amount data flight time multiple packet drops even result reset congestion window tcp maximum segment size tcp slow start exponential backoff additive increase produce stable network behaviour letting routers recover congestion however dropping packets noticeable impacts time-sensitive streams like streaming media takes time drop noticed retransmitted ecn support enabled router sets two bits data packets indicate receiver experiencing congestion yet fully choked receiver turn lets sender know router facing congestion sender lowers transmission rate amount router still congested set bits eventually sender slow even advantage approach router get full enough drop packets thus sender lower transmission rate significantly cause serious delays time-sensitive streams risk severe under-utilization bandwidth without ecn way routers tell hosts anything dropping packets ecn like random early drop except packets marked instead dropped caveat sender receiver well intermediate routers ecn-friendly router along way prevent use ecn considers ecn-marked packets invalid drops typically whole connection setup fails piece network equipment drops connection setup packets ecn flags set routers n't know ecn still drop packets normally ecn-hostile network equipment internet reason ecn disabled default enabled via codice_2 command previous versions windows processing needed receive transfer data one network interface done single processor even multi processor system supported network interface adapters windows vista distribute job traffic processing network communication among multiple processors feature called receive side scaling windows vista also supports network cards tcp offload engine certain hardware-accelerated tcp/ip-related functionality windows vista uses tcp chimney offload system offload cards framing routing error-correction acknowledgement retransmission jobs required tcp however application compatibility tcp data transfer functionality offloaded nic tcp connection setup remove load cpu traffic processing ipv4 ipv6 offloaded windows vista also supports netdma uses dma engine allow processors freed hassles moving data network card data buffers application buffers requires specific hardware dma architectures intel i/o acceleration enabled compound tcp modified tcp congestion avoidance algorithm meant improve networking performance applications enabled default pre-service pack 1 version windows vista enabled sp1 windows server 2008 uses different algorithm modify congestion window – borrowing tcp vegas tcp new reno every acknowledgement received increases congestion window aggressively thus reaching peak throughput much faster increasing overall throughput windows vista networking stack includes integrated policy-based quality service qos functionality prioritize network traffic quality service used manage network usage specific applications users throttling bandwidth available used limit bandwidth usage applications high priority applications real time conferencing applications run ensure get bandwidth need traffic throttling also used prevent large data transfer operations using available bandwidth qos policies confined application executable name folder path source destination ipv4 ipv6 addresses source destination tcp udp ports range ports windows vista qos policies applied application network layer thus eliminating need rewrite applications using qos apis qos-aware qos policies either set per-machine basis set active directory group policy objects ensures windows vista clients connected active directory container domain site organizational unit enforce policy settings windows vista supports wireless multimedia wmm profile classes qos wireless networks certified wi-fi alliance bg background data best effort non real time data vi real time videos vo real time voice data wireless access point well wireless nic supports wmm profiles windows vista provide preferential treatment data sent windows vista includes specialized qos api called qwave quality windows audio/video experience pre-configured quality service module time dependent multimedia data audio video streams qwave uses different packet priority schemes real-time flows multimedia packets best-effort flows file downloads e-mails ensure real-time data gets little delays possible providing high quality channel data packets qwave intended ensure real-time transport multimedia networks within wireless network qwave supports multiple simultaneous multimedia well data streams qwave depend solely bandwidth reservation schemes provided rsvp providing qos guarantees bandwidth wireless network fluctuates constantly result also uses continuous bandwidth monitoring implement service guarantees applications explicitly use qwave apis use service multimedia application requests qwave initiate new media stream qwave tries reserve bandwidth using rsvp time uses qos probes make sure network enough bandwidth support stream conditions met stream allowed prioritized applications eat share bandwidth however environmental factors affect reception wireless signals reduce bandwidth even stream allowed access reserved bandwidth due qwave continuously monitors available bandwidth decreases application informed creating feedback loop adapt stream fit lower bandwidth range bandwidth available qwave automatically reserves informs application improvement probing quality network probe packets sent source statistics round trip time loss latency jitter etc path analyzed results cached probe repeated specific time intervals update cache whenever stream requested cache looked qwave also serializes creation multiple simultaneous streams even across devices probes sent one stream interfered others qwave uses client side buffers keep transmission rate within range slowest part network access point buffers overwhelmed thus reducing packet loss qwave works best source sink client multimedia stream qwave aware also wireless access point ap needs qos-enabled supporting bandwidth reservation also work without qos-aware aps however since qwave reserve bandwidth case depend application adapt stream based available bandwidth affected network conditions data network well qwave also available devices part windows rally technologies order provide better security transferring data network windows vista provides enhancements cryptographic algorithms used obfuscate data support 256-bit 384-bit 512-bit elliptic curve diffie–hellman ecdh algorithms well 128-bit 192-bit 256-bit advanced encryption standard aes included network stack direct support ssl connections new winsock api allows socket applications directly control security traffic network providing security policy requirements traffic querying security settings rather add extra code support secure connection computers running windows vista part logically isolated networks within active directory domain computers logical network partition able access resources domain even though systems may physically network unless logical partition wo n't able access partitioned resources system may part multiple network partitions windows vista also includes extensible authentication protocol host eaphost framework provides extensibility authentication methods commonly used protected network access technologies 802.1x ppp allows networking vendors develop easily install new authentication methods known eap methods planned feature new tcp/ip suite known routing compartments utilized per-user routing table thus compartmentalizing network according user needs data one segment would go another feature however removed release windows vista slated included possibly future release windows windows vista also introduces network access protection nap makes sure computers connecting network conform required level system health set administrator network nap enabled network windows vista computer attempts join network verified computer up-to-date security updates virus signatures factors including configuration ipsec 802.1x authentication settings specified network administrator granted full access network criteria met failing may either denied access network granted limited access certain resources may optionally granted access servers provide latest updates updates installed computer granted access network however windows vista nap client i.e. client computer connects nap enabled network health policy verification servers running windows server 2008 ipsec configuration fully integrated windows firewall advanced security snap-in netsh advfirewall command-line tool prevent contradictory rules offer simplified configuration along authenticating firewall advanced firewall filtering rules exceptions ipsec policies set domain public private profiles source destination ip addresses ip address range source destination tcp udp ports multiple ports specific types interfaces icmp icmpv6 traffic type code services edge traversal ipsec protection state specified users computers based active directory accounts prior windows vista setting maintaining ipsec policy configuration many scenarios required setting set rules protection another set rules traffic exemptions ipsec nodes windows vista communicate simultaneously negotiating protected communications response received negotiation completes subsequent communications protected eliminates need set ipsec filters exemptions set hosts support ipsec allows setting required incoming protected initiated communication optional outgoing communication ipsec also allows securing traffic domain controllers member computers still allowing clear text domain joins communication types ipsec protected domain joins allowed using ntlm v2 domain controllers member computers running windows server 2008 windows vista respectively ipsec fully supports ipv6 authip allows second authentication integration nap authenticating health certificate network diagnostics framework support failed ipsec negotiation new ipsec performance counters improved detection cluster node failure faster renegotiation security associations support stronger algorithms main mode negotiation stronger dh algorithms suite b data integrity encryption aes cbc aes-gmac sha-256 aes-gcm ability assist user diagnosing network problem expected major new networking feature extensive support runtime diagnostics wired wireless networks including support tcp management information base mib -ii better system event logging tracing vista tcp/ip stack also supports estats defines extended performance statistics tcp help determining cause network performance bottlenecks windows vista inform user causes network transmission failure incorrect ip address incorrect dns default gateway settings gateway failure port use blocked receiver ready dhcp service running netbios tcp/ip name resolution failure etc transmission errors also exhaustively logged analyzed better find cause error windows vista greater awareness network topology host computer using technologies universal plug play new network awareness technology windows vista provide help user fixing network issues simply provide graphical view perceived network configuration windows vista network stack includes windows filtering platform allows external applications access hook packet processing pipeline networking subsystem wfp allows incoming outgoing packets filtered analyzed modified several layers tcp/ip protocol stack wfp inbuilt filtering engine applications need write custom engine need provide custom logic engine use wfp includes base filtering engine implements filter requests packets processed using generic filtering engine also includes callout module applications providing custom processing logic hooked wfp put uses inspecting packets malware selective packet restriction firewalls providing custom encryption systems among others upon initial release wfp plagued bugs including memory leaks race conditions windows firewall windows vista implemented wfp windows vista includes significant peer-to-peer support introduction new apis protocols new version peer name resolution protocol pnrp v2 well set peer distributed routing table peer graphing peer grouping peer naming peer identity management apis introduced contacts created administered new peer-to-peer subsystem—serverless presence allows users manage real-time presence information track presence registered users across subnet internet new people near service allows discovery management contacts subnet uses windows contacts manage store contact information new capabilities allows peers send application invitations peers ad-hoc collaboration also supported without centralized server windows meeting space example application pnrp also allows creating overlay network called graph peer overlay network corresponds node graph nodes graph share book-keeping information responsible functioning network whole example distributed resource management network node resource needs shared information shared records flooded peers graph peer stores record local database record consists header body body contains data specific application using api header contains metadata describe data body name-value pairs serialized using xml addition author version information also contain index body data fast searching node connect nodes directly well communication need shared entire graph api also allows creation secure overlay network called group consisting subset nodes graph group shared multiple applications unlike graph peers group must identifiable unique named registered using pnrp digital signature certificate termed group member certificate gmc records exchanged digitally signed peers must invited group invitation contains gmc enables join group new windows internet computer names wicn peer networking feature allows ipv6-connected machine obtain custom unique domain name computer connected internet users specify secured unsecured host name computer console command without requiring register domain name configuring dynamic dns wicn used application accepts ip address dns name pnrp performs domain name resolution peer-to-peer level another planned feature windows vista would provided new domain-like networking setup known castle make release castle would made possible identification service provides user authentication members network without centralized server would allowed user credentials propagate across peer-to-peer network making suitable home network people near formerly people nearby peer-to-peer service designed simplify communication collaboration among users connected subnet people near used windows meeting space collaboration contact discovery people near listed part microsoft mobile platform strategy revealed windows hardware engineering conference 2004 people near uses windows contacts manage contact information default user may receive invitations users connected subnet user designate another user trusted contact enable collaboration across internet increase security determine presence contacts new background intelligent transfer service bits 3.0 new feature called neighbor casting supports peer-to-peer file transfers within domain facilitates peer caching allows users download serve content wsus updates peers subnet receive notification file downloaded access temporary file download progress control http redirects saves bandwidth network reduces performance load server bits 3.0 also uses internet gateway device protocol counters accurately calculate available bandwidth http kernel mode driver windows vista http.sys enhanced support server-side authentication logging idn hostnames event tracing better manageability netsh http new performance counters wininet protocol handler http ftp handles ipv6 literal addresses includes support gzip deflate decompression improve content encoding performance internationalized domain names support event tracing winhttp client api server-based applications services supports ipv6 autoproxy http/1.1 chunked transfer encoding larger data uploads ssl client certificates server proxy authentication automatic handling redirects keep-alive connections http/1.0 protocol including support keep-alive persistent connections session cookies winsock updated new apis support event tracing winsock layered service provider support enhanced logged installations removals new api reliably installing lsps command reliably remove lsps facilities categorize lsps remove lsps processing path system critical services support network diagnostics framework winsock kernel wsk new transport-independent kernel-mode network programming interface npi provides tdi client developers sockets-like programming model similar supported user-mode winsock sockets programming concepts exist user-mode winsock socket creation bind connect accept send receive winsock kernel completely new programming interface unique characteristics asynchronous i/o uses irps event callbacks enhance performance tdi supported windows vista backward compatibility new version server message block smb protocol introduced windows vista number changes improve performance add additional capabilities windows vista later operating systems use smb 2.0 communicating machines running windows vista later smb 1.0 continues use connections previous version windows samba samba 3.6 also includes support smb 2.0 remote differential compression rdc client-server synchronization protocol allows data synchronized remote source using compression techniques minimize amount data sent across network synchronizes files calculating transferring differences on-the-fly therefore rdc suitable efficient synchronization files updated independently network bandwidth small scenarios files large differences small windows vista bluetooth stack improved support hardware ids edr performance improvements adaptive frequency hopping wi-fi co-existence synchronous connection oriented sco protocol support needed audio profiles windows vista bluetooth stack supports kernel mode device driver interface besides user-mode programming interface enables third parties add support additional bluetooth profiles sco sdp l2cap lacking windows xp service pack 2 built-in bluetooth stack entirely replaced third-party stack additional profile support also provides rfcomm support using sockets besides virtual com ports kb942567 called windows vista feature pack wireless adds bluetooth 2.1+edr support remote wake s3 s4 support self-powered bluetooth modules feature pack initially available oems eventually included windows vista service pack 2
[ 10243, 1541, 5643, 4624, 9234, 1043, 537, 540, 3102, 1055, 2079, 9762, 2083, 8227, 8740, 1577, 10281, 1581, 3629, 4143, 8238, 9263, 1077, 2101, 8246, 1081, 10812, 5181, 3648, 8265, 1098, 7754, 10828, 4173, 4174, 10829, 9808, 10831, 4178, ...
Validation
8,392
8
URL_Subscription_Architecture:url subscription architecture url subscription architecture urlsa open system subscribing frequently updated digital content web blogs news stories private conversations designed alternative rss supports social subscribing private subscriptions rich content urlsa users subscribe users url content subscribed notified content url updated users typically maintain list subscriptions everything news stories conversations architecture allows users generate private content conversation photo album fly subscribe users fact urlsa content-less architecture users subscribe url content rather content means virtually type content addressable url made subscribable urlsa specifies strict protocol behavior followed creating updating cancelling subscriptions contrast rss data format architecturally urlsa activity happens two types independent applications subscription managers host user accounts content providers provide subscribable urls interact mainly via set well-defined web service calls user subscribes url subscription manager contacts url content provider establishes subscription urlsa user also subscribe another user url assuming subscribing user given permission user subscribes someone else url subscription manager contacts user subscription manager initiates subscribing mechanism behalf user user subscribed url content provider notify updates content url update happens content provider immediately pushes notification users subscribed url time user may unsubscribe url time updates cease interprocess communication urlsa conducted via web services exception updates transmitted udp datagrams reasons efficiency
[ 2945, 10020, 11413, 119 ]
Test
8,393
6
ISAM:isam isam acronym indexed sequential access method method creating maintaining manipulating indexes key-fields extracted random data file records achieve fast retrieval required file records ibm developed isam mainframe computers today term used several related concepts isam system data organized records composed fixed length fields records stored sequentially originally speed access tape system secondary set hash tables known indexes contain pointers tables allowing individual records retrieved without search entire data set departure contemporaneous navigational databases pointers data stored inside records key improvement isam indexes small searched quickly thereby allowing database access records needs additional modifications data require changes data table indexes question isam file created index nodes fixed pointers change inserts deletes occur later content leaf nodes change afterwards consequence inserts leaf node exceed node capacity new records stored overflow chains many inserts deletions table overflow chains gradually become large affects time required retrieval record relational databases easily built isam framework addition logic maintain validity links tables typically field used link foreign key indexed quick lookup slower simply storing pointer related data directly records also means changes physical layout data require updating pointers—the entry still valid isam simple understand implement primarily consists direct sequential access database file also inexpensive tradeoff client machine must manage connection file accesses turn leads possibility conflicting inserts files leading inconsistent database state typically solved addition client-server framework marshals client requests maintains ordering basic concept behind database management system dbms client layer underlying data store isam replaced ibm methodology called vsam virtual storage access method still later ibm developed db2 2004 ibm promotes primary database management system vsam physical access method used db2 openvms operating system uses files-11 file system conjunction rms record management services rms provides additional layer application files disk provides consistent method data organization access across multiple 3gl 4gl languages rms provides four different methods accessing data sequential relative record number access record file address access indexed access indexed access method reading writing data provides desired outcome fact file organized isam file appropriate previously defined keys access data via previously defined key extremely fast multiple keys overlapping keys key compression within hash tables supported utility define/redefine keys existing files provided records deleted although garbage collection done via separate utility isam developed time core memory scarce resource accordingly ibm designed system use minimum amount memory tradeoff channel control unit disk kept busier isam file consists collection data records two three levels index track index contains highest key disk track cylinder indexes cylinder index stores highest key cylinder disk address corresponding track index optional master index usually used large files contains highest key cylinder index track disk address cylinder index file loaded data records moved inserted records placed separate overflow area locate record key indexes disk searched complex self-modifying channel program increased busy time channel control unit disk increased physical virtual memory sizes later systems seen inefficient vsam developed alter tradeoff memory usage disk activity isam use self-modifying channel programs later caused difficulties cp-67 support os/360 since cp-67 copied entire channel program fixed memory i/o operation started translated virtual addresses real
[ 6147, 4614, 10632, 11656, 1805, 7053, 7312, 10899, 2068, 9977, 5401, 7836, 3230, 11422, 10413, 10415, 11187, 10292, 7477, 2616, 1464, 1594, 10040, 6721, 1219, 11131, 9286, 8393, 10958, 8911, 10065, 7506, 4563, 8402, 2901, 3669, 10072, 7771, ...
Test
8,394
3
LGA_1155:lga 1155 lga 1155 also called socket h2 socket used intel microprocessors based sandy bridge 2nd-gen 32nm 2k-series ivy bridge 3rd-gen 22nm 3k-series microarchitectures successor lga 1156 known socket h succeeded lga 1150 2013 lga 1155 1155 protruding pins make contact pads processor pins arranged 40×40 array 24×16 central void additional 61 omitted pins two adjoining central void six four corners 35 groups around perimeter yielding 1600 − 384 − 61 1155 pin count processors lga 1155 lga 1156 sockets compatible since different socket notches lga 1155 also marked beginning secure boot support later boards 4 holes fastening heatsink motherboard placed square lateral length 75 mm intel sockets lga 1156 lga 1155 lga 1150 lga 1151 cooling solutions therefore interchangeable cooling systems compatible lga 1155 lga 1156 sockets processors dimensions profile construction similar levels heat production sandy bridge chipsets except b65 q65 q67 support sandy bridge ivy bridge cpus bios upgrade sandy bridge based processors officially support ddr3-1333 memory however practice speeds ddr3-2133 tested work successfully h61 chipset supports one double-sided dimm memory module ram module per memory-channel therefore limited 16 gb instead 32 gb like others support h61-based motherboards four dimm slots four single-sided dimms installed ivy bridge chipsets motherboards support sandy bridge ivy bridge cpus ivy bridge based processors officially support ddr3-1600 ddr3-1333 sandy bridge consumer ivy bridge chipsets also allow overclocking k-series processors pcghx user wrote article website describing take uefi modules z97 motherboards use z77-motherboard make later support booting ssd using nvm express protocol instead ahci protocol article claims z97 motherboards first officially fully support nvme protocol als erstes gilt es die fraglichen module aus einem möglichst ähnlichen bios der z97-generation zu extrahieren dies ist die erste generation von mainboards die nvme-laufwerke nativ unterstützt mods described also work b75 chipset motherboards
[ 3588, 5901, 398, 5523, 4886, 2455, 3992, 8855, 11417, 3995, 4252, 6175, 7714, 10019, 4523, 2604, 2350, 6192, 8625, 9649, 4537, 7105, 4805, 7110, 3403, 4427, 5073, 4179, 3798, 4185, 7002, 9945, 10715, 11484, 9570, 10468, 613, 8552, 1260, 4...
Train
8,395
2
Marshall_Kirk_McKusick:marshall kirk mckusick marshall kirk mckusick born january 19 1954 computer scientist known extensive work bsd unix 1980s freebsd present day president usenix association 1990 1992 2002 2004 still serves board editorial board acm queue magazine known friends colleagues kirk mckusick received b.s electrical engineering cornell university 2 m.s degrees 1979 1980 respectively ph.d. computer science university california berkeley 1984 mckusick openly gay lives california eric allman domestic partner since graduate school married october 2013 mckusick started bsd virtue fact shared office berkeley bill joy spearheaded beginnings bsd system largest contributions bsd file system helped design original berkeley fast file system ffs recently implemented soft updates alternative approach maintaining disk integrity crash power outage ffs revised version unix file system ufs known ufs2 magic number used ufs2 super block structure reflects mckusick birth date define fs_ufs2_magic 0x19540119 found /usr/include/ufs/ffs/fs.h freebsd systems included easter egg also primarily responsible creating complementary features filesystem snapshots background fsck file system check repair integrate closely soft updates filesystem snapshot filesystem brought immediately power outage fsck run background process design implementation series books regarded high-quality works computer science influential development bsd descendants bsd daemon often used identify bsd copyrighted marshall kirk mckusick
[ 2051, 10761, 2061, 9743, 8725, 10774, 2584, 4636, 9762, 1071, 1080, 5177, 9784, 3651, 7748, 8266, 5710, 7249, 9306, 607, 9320, 8816, 9844, 633, 8316, 9343, 6787, 2180, 4745, 5771, 4750, 2212, 684, 5293, 3248, 1718, 5819, 7872, 11459, 1043...
None
8,396
7
Portable_object_(computing):portable object computing distributed programming portable object object accessed normal method call possibly residing memory another computer portable sense moves machine machine irrespective operating system computer architecture mobility end goal many remote procedure call systems advantage portable objects easy use expressive allowing programmers completely unaware objects reside locations detractors cite fault naïve programmers expect network-related errors unbounded nondeterminism associated large networks
[ 9441, 6694, 10024, 9932, 7983, 2481, 5880, 1724 ]
Test
8,397
9
Comparison_of_programming_languages_(functional_programming):comparison programming languages functional programming page provides comparison tables functional programming instructions programming languages comparison basic instructions imperative paradigm provided comparison basic instructions
[ 1931, 6414, 10510, 6160, 5521, 3736, 155, 5917, 5796, 5806, 9008, 3765, 7479, 10043, 10684, 963, 5830, 5961, 1610, 1611, 9804, 8397, 11212, 11219, 5588, 7894, 4057, 10586, 4069, 7274, 8554, 6640, 1016, 3577, 2557 ]
Validation
8,398
4
Norton_Insight:norton insight norton insight whitelists files based reputation norton-branded antivirus software leverages data skip known files virus scans symantec claims quicker scans accurate detection use technology insight codenamed mr. clean initial aim help users determine programs internet safe install mr. clean would provide risk assessment discern safe malicious files however goal later changed making virus scans efficient instead scanning every file known files skipped cutting scanning times norton community watch voluntary anonymous service allows user norton product forward information symantec servers among data collected processes running sha256 values reappearing hash value corresponding file whitelisted norton insight checks processes user computer whitelist matching processes excluded scanning process trusted deemed safe excluded risk scanning two trust levels standard high third option disable norton insight standard trust processes appearing majority participants computers deemed safe high trust addition excludes digitally signed files scanning norton analyzes ntfs file system upon startup unaccounted changes found trust values processes system revoked case mistake revocation mechanism implemented clients receive list revoked sha256 values via liveupdate client file matching sha256 currently trusting file trust revoked file scanned norton file insight feature released norton 2010 products norton download insight feature provides insight files download install computer file insight give reputation information locates file computer well feature copies information users clipboard supports norton download insight feature assizes reputation file file insight window provides following information upon release download insight program would erroneously flags downloaded file digital signature version number therefore potential threat tech herald tested norton internet security 2009 found insight affected system performance whitelisting files scans publication also noted total number files scanned number trusted skipped files varied scan average amount time insight took scan 561 megabyte folder 21,816 clean files 0:00:24:41 despite oddities editor observed norton internet security 2009 faster subsequent products
[ 5512, 6797, 2193, 7955, 10903, 6297, 5924, 2213, 1708, 7983, 8368, 2870, 11065, 7739, 3520, 2378, 9569, 10479, 6643, 10613, 10872, 8572, 9983 ]
Test
8,399
4
Tiger_(security_software):tiger security software tiger security software unix-like computer operating systems used security audit tool host-based intrusion detection system supports multiple unix platforms tiger free gpl license unlike tools needs posix tools written entirely shell language tiger based set modular scripts run either together independently check different aspects unix system including review tiger originally developed douglas lee schales dave k. hess khalid warraich dave r. safford 1992 texas university three different forks evolved tiger tara developed advanced research computing tiger analytical research assistant one internally developed hp corporation bryan gartner last one developed debian gnu/linux distribution javier fernández-sanguino current upstream maintainer forks aimed making tiger work newer versions different unix operating systems forks merged may 2002 june 2002 new source code labeled 3.0 release published download section newly created savannah site following merge following releases published tiger interesting features including modular design easy expand used audit tool host-based intrusion detection system tool described program manpage tiger complements intrusion detection system ids network ids snort kernel log-based intrusion detection system lids snare linux systrace openbsd example integrity checkers many aide integrit samhain tripwire ... logcheckers providing framework work together checking system configuration status
[ 1474, 10436, 6092, 7934, 687, 7983, 11442, 3796, 5245, 5397, 823, 5492, 7192, 413, 3486 ]
Test
8,400
4
Cyber_and_Information_Domain_Service_(Germany):cyber information domain service germany cyber information domain service german cyber- und informationsraum cir youngest branch germany military bundeswehr decision form new military branch presented defense minister ursula von der leyen 26 april 2016 becoming operational 1 april 2017 headquarter cyber information domain service bonn november 2015 german ministry defense activated staff group within ministry tasked developing plans reorganization cyber military intelligence geo-information operative communication units bundeswehr 26 april 2016 defense minister ursula von der leyen presented plans new military branch public 5 october 2016 command staff became operational department within ministry defense 1 april 2017 cyber information domain service activated 6th branch bundeswehr cyber information domain service headquarters take command existing cyber military intelligence geo-information operative communication units command planned fully operational 2021 cids commanded chief cyber information domain service german inspekteur des cyber- und informationsraum inspcir three-star general position based bonn
[ 1373 ]
None
8,401
7
Transparency_(human–computer_interaction):transparency human–computer interaction change computing system new feature new component transparent system change adheres previous external interface much possible changing internal behaviour purpose shield change systems human users end interface confusingly term refers overall invisibility component refer visibility component internals white box open system term transparent widely used computing marketing substitution term invisible since term invisible bad connotation usually seen something user ca n't see control term transparent good connotation usually associated hiding anything vast majority times term transparent used misleading way refer actual invisibility computing process misleading counter-intuitive definition modern computer literature tends prefer use agnostic transparent term used particularly often regard abstraction layer invisible either upper lower neighbouring layer also temporarily used later around 1969 ibm honeywell programming manuals term referred certain computer programming technique application code transparent clear low-level detail device-specific management contained logic solving main problem achieved encapsulation – putting code modules hid internal details making invisible main application example network file system transparent introduces access files stored remotely network way uniform previous local access file system user might even notice using folder hierarchy early file transfer protocol ftp considerably less transparent requires user learn access files ftp client similarly file systems allow transparent compression decompression data enabling users store files medium without special knowledge file systems encrypt files transparently approach require running compression encryption utility manually software engineering also considered good practice develop use abstraction layers database access application work different databases abstraction layer allows parts program access database transparently see data access object example object-oriented programming transparency facilitated use interfaces hide actual implementations done different underlying classes transparency means form distributed system hide distributed nature users appearing functioning normal centralized system many types transparency formal definitions concepts found rm-odp open distributed processing reference model iso 10746 degree properties achieved may vary widely every system hide everything users instance due existence fixed finite speed light always latency accessing resources distant user one expects real-time interaction distributed system may noticeable
[ 9762, 6403, 7364, 5614, 2901, 11644, 1049, 1978, 2556 ]
Test
8,402
6
Files-11:files-11 files-11 also known on-disk structure file system used digital equipment corporation openvms operating system also simpler form older rsx-11 hierarchical file system support access control lists record-oriented i/o remote network access file versioning files-11 similar significantly advanced file systems used previous digital equipment corporation operating systems tops-20 rsts/e native openvms file system descended older dec operating systems similar many ways designed dave cutler major difference layout directories file systems provided form rudimentary non-hierarchical directory structure typically based assigning one directory per user account rsts/e user account represented two numbers project programmer pair one associated directory special system files program executables os stored directory reserved system account suitable pdp-11 systems possessed limited permanent storage capacity vax systems much larger hard drives required flexible method file storage hierarchical directory layout particular notable improvement ods-2 files-11 general term five separate file systems known on-disk structure ods levels 1 5 ods-1 flat file system used rsx-11 os supported older vms systems rsx compatibility never used support vms largely superseded ods-2 ods-5 ods-2 standard vms file system remains common file system system disks disk operating system installed although seldom referred ods level designations ods-3 ods-4 files-11 support cd-rom iso 9660 high sierra format file systems respectively ods-5 extended version ods-2 available alpha ia-64 platforms adds support case-preserving filenames non-ascii characters improvements hierarchical directory support originally intended file serving microsoft windows non-vms systems part nt affinity project also used user disks internet servers files directories files-11 file system contained inside one parent directories eventually root directory master file directory see file system therefore organised directed acyclic graph dag structure example see right file 2 directory entry dir 2 dir 3 directories simultaneously even removed one would still exist directory removed also similar concept hard links unix although care must taken file actually deleted disks set hard links available ods-5 disks disk hard links enabled operational vms system access one online disks contains complete independent file system either local storage case cluster storage shared remote systems openvms cluster configuration non-private disks shared nodes cluster see figure 1 configuration two system disks accessible nodes via network private disk shared mounted use particular user process machine access files across cluster managed openvms distributed lock manager integral part file system multiple disks combined form single large logical disk volume set disks also automatically replicated shadow sets data security faster read performance disk identified either physical name often user-defined logical name example boot device system disk may physical name 3 dka100 generally referred logical name sys sysdevice file systems disk exception ods-1 hierarchical fully specified filename consists nodename username password device name directory filename file type version number format example dir1.dir2.dir3 file.ext refers latest version file.ext current default disk directory dir1.dir2.dir3 dir1 subdirectory master file directory mfd root directory dir2 subdirectory dir1 disk mfd identified 000000 parts filename omitted case taken current default file specification default file specification replaces concept current directory operating systems providing set defaults node device name directory processes default file specification includes disk name directory vms file system routines accept default file specification also include file type type command example defaults .lis file type command type f extension attempts open file f.lis every file version number defaults 1 versions filename present otherwise one higher greatest version every time file saved rather overwriting existing version new file name incremented version number created old versions deleted explicitly delete purge command optionally older versions file deleted automatically file version limit reached set set file/version_limit old versions thus overwritten kept disk may retrieved time architectural limit version numbers 32767 versioning behavior easily overridden unwanted particular files directly updated databases create new versions unless explicitly programmed ods-2 limited eight levels subdirectories uppercase alphanumeric names plus underscore dash dollar sign 39.39 characters 39 filename another 39 extension ods-5 expands character set lowercase letters printable ascii characters well iso latin-1 unicode characters increases maximum filename length allows unlimited levels subdirectories constructing pathname ods-5 file uses characters allowed ods-2 special syntax used preserve backwards compatibility file file.tar.gz 1 ods-5 disk example would referred file^.tar.gz —the file name file.tar extension .gz vms file security defined two mechanisms uic-based access control acl-based access control uic access control based owner file uic user accessing file access determined four groups permissions four permission bits system access applies user whose uic group code less equal sysgen parameter maxsysgroup typically 8 10 octal example system user owner group apply owner file user user group world applies user also fifth permission bit control used determine access change file metadata protection group set explicitly always set system owner never group world uic-based access control also affected four system privileges allow users holding override access controls acls allow additional privileges assigned user– group–specific basis example web server uic could granted read access files particular directory acls marked inherited directory file acl applies files underneath acls modified using edit/acl command take form identifier/access pairs example acl entry would allow user http server read execute file logical name system variable may reference disk directory file contain program-specific information example logical sys sysdevice contains system boot device logical name normally refers single directory disk e.g sys login user login home directory directories logicals used true disk names—sys login dir file valid file specification however concealed logical names defined define/translation=concealed used way rooted directories defined trailing directory specification hence would allow home dir file used common simple logicals point specific directories associated application software may located disk directory hence logical abc_exe may point directory executable programs application abc abc_temp may point directory temporary files application directory may disk directory tree abc_exe could somewhere another disk different directory tree logical names close equivalent posix operating systems resemble unix environment variables except expanded file system instead command shell application program must defined use common many logical names defined system startup command file well user login command files vms logical names may reference logical names predefined nesting limit 10 may contain lists names search existing filename frequently referenced logical names closest non-dec operating system support concept logical names amigaos assign command amigaos disk operating system amigados port tripos bears resemblance dec operating systems example physical device names follow pattern like df0 first floppy disk cdrom2 3rd cd-rom drive etc however since system boot attached drive operating system creates sys assignment automatically reference boot device used assignments libs prefs c et al also made referenced sys users course allowed create destroy assignments record management services structured i/o layer vms operating system rms provides comprehensive program support managing structured files record-based indexed database files vms file system conjunction rms extends files access past simple byte-streams allows os-level support variety rich files types file vms file system may thought database containing series records one individual fields text file example list records lines separated newline character rms example record-oriented filesystem four record formats defined rms four record access methods methods retrieve extant records files disk level ods represents file system array blocks block 512 contiguous bytes one physical disk volume disk blocks assigned clusters originally 3 contiguous blocks later increased larger disk sizes file disk ideally entirely contiguous i.e blocks contain file sequential disk fragmentation sometimes require file located discontiguous clusters case fragments called 'extents disks may combined disks form volume set files stored anywhere across set disks larger disk sizes reduced use volume sets management single physical disk simpler every file files-11 disk volume set unique file identification fid composed three numbers file number num file sequence number seq relative volume number rvn num indicates indexf.sys file see metadata file located seq generation number incremented file deleted another file created reusing indexf.sys entry dangling references old file accidentally point new one rvn indicates volume number file stored using volume set structural support ods volume provided directory file —a special file containing list file names file version numbers associated fids similar vsam catalogs mvs root directory structure master file directory mfd root directory contains directly indirectly every file volume top level ods file system master file directory mfd contains top-level directory files including several system files used store file system information ods-1 volumes two-level directory structure used user identification code uic associated user file directory ufd form group.user ods-2 later volumes layout directories mfd free-form subject limit nesting directories 8 levels ods-2 unlimited ods-5 multi-volume sets mfd always stored first volume contains subdirectories volumes following system files present ods mfd note file system implementation refer files name file ids always values thus indexf.sys always file num 1 seq 1 index file contains basic information files-11 volume set two organizations indexf.sys traditional organization organization used disks gpt.sys guid partition table gpt structures traditional organization block 1 boot block contains location primary bootstrap image used load vms operating system always located logical block 0 disk hardware firmware read block always present even non-system non-bootable volumes boot block primary home block contains volume name location extents comprising remainder index file volume owner uic volume protection information normally several additional copies home block known secondary home blocks allow recovery volume lost damaged disks gpt.sys gpt.sys contains equivalent boot block known master boot record mbr primary home block home blocks present gpt-based disk alternate home blocks structures included indexf.sys blocks indexf.sys file unused rest index file composed file headers describe extents allocated files residing volume file metadata owner uic acls protection information file described one file headers—more one required file large number extents file header fixed-length block contains fixed– variable–length sections possible map acl sections header contained completely primary header however acl long file contains many extents enough space primary header store case extension header allocated store overflow information file header begins 4 offsets idoffset mpoffset acoffset roffset since size areas fixed-length header may vary map acl areas offsets required locate additional areas offset number 16-bit words beginning file header beginning area file requires multiple headers extension segment number segnum contains sequence number header beginning 0 first entry indexf.sys struclev contains current structure level high byte version low byte file system ods-2 structure level 2 increase version number indicates backwards-compatible change older software may ignore changes structure level incompatible w_fid containing three values fid_num fid_seq fid_rvn corresponding file sequence relative volume number contains id file ext_fid composed three values holds location next extension header values rvn specified 0 represent current volume 0 normally valid rvn filechar contains several flags affect file handled organised accmode describes privilege level process must running order access file vms defines four privilege levels user supervisor exec kernel type access read write execute delete encoded 2-bit integer fileprot contains discretionary access control information file divided 4 groups 4 bits system owner group world bit 0 corresponds read access 1 write 2 execute 3 delete setting bit denies particular access group clearing allows file header extension header backlink contains file id primary header otherwise contains file id directory file containing primary entry file
[ 5120, 2051, 6669, 3598, 10257, 6677, 5142, 8214, 9762, 5158, 11323, 8772, 3142, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 6797, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 7847, 1193, 10405, 5293, 7344, 8369, 6837, 2230, 5...
None
8,403
4
Hacker_Bible:hacker bible hacker bible publication german hacker organization chaos computer club ccc published two editions date 1985 1988 edited wau holland published grüne kraft press hacker bible compendium documents stories hacker scene example instruction guide acoustic coupler named “ data-loo ” germ. datenklo furthermore offers manuals technical explanations first edition appeared 1985 subtitle “ cable salad good kabelsalat ist gesund ” sold 25,000 copies mid-1988 second edition 1988 given additional name “ new testament ” comic images cover sleeve creation german comic artists mali beinhorn werner büsch comic workshop büsch-beinhorn production distribution hacker bible discontinued 1990 since 1999 ccc offered scanned full-text version online german materials texts peter glaser documentation karl koch works tron chaos-cd
[ 4956 ]
None
8,404
6
Apple_Filing_Protocol:apple filing protocol apple filing protocol afp formerly appletalk filing protocol proprietary network protocol part apple file service afs offers file services macos classic mac os macos afp one several file services supported others including server message block smb network file system nfs file transfer protocol ftp webdav afp currently supports unicode file names posix access control list permissions resource forks named extended attributes advanced file locking mac os 9 earlier afp primary protocol file services afp versions 3.0 greater rely exclusively tcp/ip port 548 427 establishing communication supporting appletalk service discovery protocol afp 2.x family supports tcp/ip using data stream interface appletalk communication service discovery many third-party afp implementations use afp 2.x thereby supporting appletalk connection method still earlier versions rely exclusively appletalk reason older literature refers afp appletalk filing protocol literature may refer afp appleshare name mac os 9 earlier afp client notable current compatibility topics early implementations afp server software available mac os starting system 6 appleshare appleshare ip early 1.x releases mac os x server client operating systems afp called personal file sharing supported ten simultaneous connections afp implementations relied version 1.x 2.x protocol appleshare ip 5.x 6.x 1.x releases mac os x server introduced afp version 2.2 first version offer transport connections using tcp/ip well appletalk also increased maximum share point size four gibibytes two tebibytes although maximum file size could stored remained two gibibytes due limitations original mac os changes made afp since version 3.0 represent major advances protocol introducing features designed specifically mac os x clients however like appleshare client original mac os afp client mac os x continues support type creator codes along filename extensions afp 3.0 introduced mac os x server 10.0.3 used mac os x server 10.1.5 first version use unix-style posix permissions model unicode utf-8 file name encodings version 3.0 supported maximum share point file size two tebibytes maximum file size volume size mac os x version 10.2 note maximum file size changed version 2.2 described afp 3.0 31 bytes maximum length filename sent afp afp 3.1 introduced mac os x server version 10.2. notable changes included support kerberos authentication automatic client reconnect nfs resharing secure afp connections via secure shell ssh maximum share point file size increased 8 tebibytes mac os x server 10.2 16 tebibytes mac os x server 10.3 afp 3.2 adds support access control lists extended attributes mac os x server 10.4 maximum share point size least 16 tebibytes although apple published limits document mac os x server 10.4 afp 3.2+ introduced mac os x leopard adds case sensitivity support improves support time machine synchronization lock stealing sleep notifications afp 3.3 mandates support replay cache functionality required time machine afp 3.4 introduced os x mountain lion includes minor change mapping posix errors afp errors see apple developer documentation afp version differences mac os x tiger users connect afp servers browsing network globe entering afp uniform resource locator url connect server dialog mac os x leopard later releases afp shares displayed finder side-bar afp urls take form afp // server share server server ip address domain name system dns name bonjour name share name share point snow leopard later url form afp // server share path used mount subdirectory underneath share point macos also offers personal file sharing light implementation current version afp mac os x 10.4 users share contents public folders checking personal file sharing sharing section system preferences afp urls appletalk servers took form afp //at/ appletalk name appletalk zone networks without appletalk zones asterisk would substituted zone name third party server implementations afp available number companies
[ 5120, 2564, 9734, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 9784, 7225, 11323, 576, 8772, 1109, 3167, 4708, 10341, 9836, 7789, 9844, 9333, 6263, 9335, 9343, 5256, 7818, 654, 2193, 2194, 2197, 7318, 2199, 11419, 63...
Validation
8,405
1
Digital_curation:digital curation digital curation selection preservation maintenance collection archiving digital assets digital curation establishes maintains adds value repositories digital data present future use often accomplished archivists librarians scientists historians scholars enterprises starting use digital curation improve quality information data within operational strategic processes successful digital curation mitigate digital obsolescence keeping information accessible users indefinitely progressively digital curation acts umbrella concept includes many subsets appearing related terms digital asset management data curation digital preservation electronic records management term curation past commonly referred museum library professionals since applied interaction social media including compiling digital images web links movie files term “ digital curation ” first used e-science biological science fields means differentiating additional suite activities ordinarily employed library museum curators add value collections enable reuse smaller subtask simply preserving data significantly concise archival task additionally historical understanding term “ curator ” demands simple care collection curator expected command academic mastery subject matter requisite part appraisal selection assets subsequent adding value collection application metadata five commonly accepted principles govern occupation digital curation digital curation center offers following step-by-step life cycle procedures putting principles practice sequential actions occasional actions term digital curation sometimes used interchangeably terms digital preservation digital archiving digital preservation focus significant degree energy optimizing reusability preservation remains subtask concept digital archiving turn subtask digital curation example archiving part curation subsequent tasks themed collection-building considered archival task similarly preservation part archiving tasks selection appraisal necessarily part preservation data curation another term often used interchangeably digital curation however common usage two terms differs “ data ” all-encompassing term used generally indicate anything recorded binary form term “ data curation ” common scientific parlance usually refers accumulating managing information relative process research data-driven research education request role information professional gradually develop tradition digital service data curation particularly management digital research data documents discrete digital assets technically subset broader concept data context scientific vernacular digital curation represents broader purview responsibilities data curation due interest preserving adding value digital assets kind ever lowering cost increasing prevalence entirely new categories technology led quickly growing flow new data sets come well established sources business government trend also driven new styles sensors becoming embedded areas modern life particularly true consumers whose production digital assets longer relegated strictly work consumers create wider ranges digital assets including videos photos location data purchases fitness tracking data name share wider ranges social platforms additionally advance technology introduced new ways working data examples international partnerships leverage astronomical data create “ virtual observatories ” similar partnerships also leveraged data resulting research large hadron collider cern database protein structures protein data bank comparison archiving analog assets notably passive nature often limited simply ensuring suitable storage environment digital preservation requires proactive approach today ’ artifacts cultural significance notably transient nature prone obsolescence social trends dependent technologies change rapid progression technology occasionally makes necessary migrate digital asset holdings one file format another order mitigate dangers hardware software obsolescence would render asset unusable modern tools program planning often underestimate amount human labor costs required adequate digital curation large collections result cost-benefit assessments often paint inaccurate picture amount work involved true cost institution successful outcomes failures concept cost business field would obvious varieties business systems running daily operations example human resources systems deal recruitment payroll communication systems manage internal external email administration systems handle finance marketing aspects however business systems institutions designed long-term information preservation initially instances business systems revised become digital curation systems preserving transaction information due cost consideration example business systems enterprise content management ecm applications used designated group people business executives customers information management support key processes organizationally long run transfer digital content ecm applications digital curation dc applications would trend large organizations domestically internationally improvement maturity models ecm dc may add value information request cost deduction extensive use modification absence coordination across different sectors society industry areas standardization semantic ontological definitions forming partnerships proper stewardship assets resulted lack interoperability institutions partial breakdown digital curation practice standpoint ordinary user example coordination open archival information system oais oais reference model allows professionals many organizations individuals contribute efforts oais open forums developing international standards archival information long-term access curation digital objects limited strictly born-digital assets many institutions engaged monumental efforts digitize analog holdings effort increase access collections examples materials books photographs maps audio recordings process converting printed resources digital collections epitomized degree librarians related specialists example digital curation centre claimed world leading centre expertise digital information curation assists higher education research institutions conversions topics knowledge embodied forms conducive print choreography dance motion skilled workers artisans difficult encode new digital approaches 3d holograms computer-programmed expressions developing mathematics seems possible new common language developed would express mathematical ideas ways digitally stored linked made accessible global digital mathematics library project define develop language ability intended user community access repository ’ holdings equal importance preceding curatorial tasks must take account user community ’ format communication preferences also consideration communities access various legal privacy reasons three elements essential needs institutions dealing issues digital curation leadership resources collaboration three elements related role advance-guards librarians archivists working open approaches technology standardized process scholarly communication archivist leadership needs dynamic active role embrace technology standardized process scholarly communication addition archivist leader might adopt business concept methods deal workflow raise funds invest technology system comply industry standards order obtain resources collaboration archives digital curation community could provide share training technologies standards tools help institutions challengeable issues digital curation.digital preservation coalition dpc open preservation foundation novel partnerships offer collaboration opportunity institutions facing similar challenges digital curation issues information field especially libraries archives museums significantly need bring knowledge new technologies traditional graduate school education enough meet demand training program current staffs cultural repository would efficient supplement request professional workshops moocs massively open online courses data curation management international digital curation conference idcc established annual event since 2005 aiming collaborate individuals organizations institutions facing challenges supporting development exchanging ideas field international journal digital curation ijdc administered ijdc editorial board including editor-in-chief digital curation center dcc following members ijdc dedicate provide scholarly platform sharing discussing improving knowledge information digital curation within worldwide community ijdc two types submission editorial guidelines peer-reviewed papers general articles base original research field information relevant events digital curation ijdc published university edinburgh digital curation centre electronic form rolling basis two times year open access public supports knowledge exchangeable digital curation worldwide many approaches digital curation exist evolved time response changing technological landscape two examples sheer curation channelization sheer curation approach digital curation curation activities quietly integrated normal work flow creating managing data digital assets word sheer used emphasize lightweight virtually transparent nature curation activities term sheer curation coined alistair miles imagestore project uk digital curation centre scarp project approach depends curators close contact 'immersion data creators working practices example case study neuroimaging research group whyte et al. explored ways building digital curation capacity around apprenticeship style learning neuroimaging researchers share access datasets re-use experimental procedures sheer curation depends hypothesis good data digital asset management point creation primary use also good practice preparation sharing publication and/or long-term preservation assets therefore sheer curation attempts identify promote tools good practices local data digital asset management specific domains tools practices add immediate value creators primary users assets curation best supported identifying existing practices sharing stewardship re-use add value augmenting ways short-term benefits longer term reduce risks digital assets provide new opportunities sustain long-term accessibility re-use value aim sheer curation establish solid foundation curation activities may directly benefit creators primary users digital assets especially required ensure long-term preservation providing foundation curation activities may carried specialists appropriate institutional organisation levels whilst causing minimum interference others similar idea curation source used context laboratory information management systems lims refers specifically automatic recording metadata information data point capture developed apply semantic web techniques integrate laboratory instrumentation documentation systems sheer curation curation-at-source contrasted post hoc digital preservation project initiated preserve collection digital assets already created beyond period primary use channelization curation digital assets web often brands media companies continuous flows content turning user experience lean-forward interactive medium lean-back passive medium curation content done independent third party selects media number on-demand outlets across globe adds playlist offer digital channel dedicated certain subjects themes interests end user would see and/or hear continuous stream content
[ 1443, 8085, 7575 ]
Test
8,406
3
Autonomous_decentralized_system:autonomous decentralized system autonomous decentralized system ads decentralized system composed modules components designed operate independently capable interacting meet overall goal system design paradigm enables system continue function event component failures also enables maintenance repair carried system remains operational autonomous decentralized systems number applications including industrial production lines railway signalling robotics ads recently expanded control applications service application embedded systems thus autonomous decentralized service systems autonomous decentralized device systems autonomous decentralized systems first proposed 1977 ads received significant attention systems deployed japanese railway systems many years safely 7 billion trips proving value concept japan railway ads considered smart train also learns recognizing outstanding contribution dr. kinji mori received numerous awards including 2013 ieee life fellow 2012 distinguished service award tokyo metropolitan government 2012 distinguished specialist among 1000 world chinese government 2008 ieice fellow 1995 ieee fellow 1994 research development award excellence achievers science technology agency 1994 ichimura industrial prize 1992 technology achievement award society instrument control engineers 1988 national patent award science technology agency 1988 mainichi technology prize excellence dr. mori donated cash ichimura industrial price ieee fund ieee kanai award since 1977 ads subject research many researchers world including us japan eu particularly germany china ads decoupled architecture component subsystem communicates message passing using shared data fields unique feature ads central operating system coordinator instead subsystem manages functionality coordination subsystems subsystem needs interact subsystems broadcasts shared data fields containing request subsystems broadcast include identification address subsystem rather subsystems depending purpose function receive broadcast message make determination action take ads moves service-oriented architecture soa adss autonomous decentralized service system data transmission carried esb enterprise service bus agent service receives data esb acts according service specification results transmitted esb autonomous agents ads also similar blackboard system used ai collection agents act upon seeing data change common blackboard ads may include human loop human autonomous agents co-learn time perform system functionality cloud computing also uses autonomous computing architecture framework different ads one application ads software testing particularly combinatorial testing framework proposed based ads concurrent combinatorial testing using ar ta ieee international symposium autonomous decentralized systems isads major conference topic symposium biannual event first symposium held 1993 isads 1993 march 30 april 1 1993 kawasaki japan isads 1995: april 25–27 1995 phoenix arizona usa isads 1997:april 9–11 1997 berlin germany isads 1999:march 20–23 1999 tokyo japan isads 2001:march 26–28 2001 dallas texas usa isads 2003: april 9–11 2003 pisa italy isads 2005:april 4–8 2005 chengdu china isads 2007: march 21–23 2007 sedona arizona usa isads 2009: march 23–25 2009 athens greece isads 2011:june 29 july 1 2011 kobe japan isads 2013:march 6–8 2013 mexico city mexico isads 2015:march 25–27 2015 taichung taiwan
[ 8640, 4194, 4107, 5029 ]
Test
8,407
3
Laser_Squad:laser squad laser squad turn-based tactics video game originally released zx spectrum later commodore 64 amstrad cpc msx amiga atari st pc computers 1988 1992 designed julian gollop team target games later mythos games codo technologies published blade software expanding ideas applied previous rebelstar series games laser squad originally came five mission scenarios expansion pack released 8-bit versions containing two scenarios reaction gaming magazines positive gaining high review rating several accolades legacy game seen titles like x-com series especially acclaimed also created julian gollop initially conceived sequel laser squad laser squad turn-based tactics war game player completes objectives rescue retrieval operations simply eliminating enemy taking advantage cover squad level military tactics careful use weaponry squad team members maneuvering around map one time taking actions move turn shoot pick use unit action points heavily laden units may tire easily may rest avoid running action points quickly subsequent turns morale also plays factor unit witnessing deaths teammates panic run player control original target games 8-bit release came first three missions expansion pack offered via mail order next two subsequent blade software 8-bit release included standard mail order expansion pack offered missions six seven instead offers covered cassette floppy disk versions well featuring new scenarios expansion packs included additional weapons part scenarios including expansion pack seven scenarios total one difficulty settings squad allocation computer video games reviewing original zx spectrum version awarded near-perfect 97 score c+vg hit stating laser squad one hottest games 've ever played spectrum reviews included 89 sinclair user sinclair gave game 9/10 calling sophisticated strategy wargame ... par elite thinking warmongers game voted number 16 sinclair readers top 100 games time commodore 64 version also fared well cu amiga-64 giving 'cu screen star award 92 rating zzap 64 gave game score 83 stating game absorbing fresh approach man-to-man combat amstrad action awarded cpc version 91 'aa mastergame accolade expansion pack 2 received even higher rating 93 became available review two excellent additions game already excellent amiga version also received positive reviews amiga format awarded 'gold award 93 rating explaining terrific game superbly playable definitely recommended amiga reviews given zero cu amiga-64 gave game scores 88 87 respectively ranked 25th best amiga game ever amiga power 1991 2004 readers retro gamer voted laser squad 63rd top classic game rebelstar laser squad among earliest examples turn-based unit-level wargame video games 1990 mythos games released fantasy game lords chaos many similarities laser squad follow-up gollop earlier zx spectrum game laser squad franchise revived gollop codo technologies 2002 play-by-email game laser squad nemesis although departs turn-based action point system customizable weaponry many laser squad mechanics re-used later x-com series games created also gollop mythos games published microprose notably first x-com game began development laser squad ii name choices characters organizations games mythos codo thread connecting laser squad rebelstar games cover art firaxis games 2k games remake ufo enemy unknown pays homage laser squad
[ 9006, 10931, 9166, 8830 ]
Test
8,408
1
Apache_Solr:apache solr solr pronounced solar open-source enterprise-search platform written java apache lucene project major features include full-text search hit highlighting faceted search real-time indexing dynamic clustering database integration nosql features rich document e.g. word pdf handling providing distributed search index replication solr designed scalability fault tolerance solr widely used enterprise search analytics use cases active development community regular releases solr runs standalone full-text search server uses lucene java search library core full-text indexing search rest-like http/xml json apis make usable popular programming languages solr external configuration allows tailored many types application without java coding plugin architecture support advanced customization apache lucene apache solr produced apache software foundation development team 2004 solr created yonik seeley cnet networks in-house project add search capability company website january 2006 cnet networks decided openly publish source code donating apache software foundation like new apache project entered incubation period helped solve organizational legal financial issues january 2007 solr graduated incubation status standalone top-level project tlp grew steadily accumulated features thereby attracting users contributors committers although quite new public project powered several high-traffic websites september 2008 solr 1.3 released including distributed search capabilities performance enhancements among many others january 2009 solr enterprise search yonik seeley along grant ingersoll erik hatcher joined lucidworks formerly lucid imagination first company providing commercial support training apache solr search technologies since support offerings around solr abundant november 2009 saw release solr 1.4 version introduced enhancements indexing searching faceting along many improvements rich document processing pdf word html search results clustering based carrot2 also improved database integration release also features many additional plug-ins march 2010 lucene solr projects merged solr became lucene sub project separate downloads continued products jointly developed single set committers 2011 solr version number scheme changed order match lucene solr 1.4 next release solr labeled 3.1 order keep solr lucene version number october 2012 solr version 4.0 released including new solrcloud feature 2013 2014 saw number solr releases 4.x line steadily growing feature set improving reliability february 2015 solr 5.0 released first release solr packaged standalone application ending official support deploying solr war solr 5.3 featured built-in pluggable authentication authorization framework april 2016 solr 6.0 released added support executing parallel sql queries across solrcloud collections includes streamexpression support new jdbc driver sql interface september 2017 solr 7.0 released release among things added support multiple replica types auto-scaling math engine march 2019 solr 8.0 released including many bugfixes component updates solr nodes listen serve http/2 requests aware default internal requests also sent using http/2 furthermore admin ui login added support basicauth kerberos plotting math expressions apache zeppelin possible order search document apache solr performs following operations sequence solr individuals companies contribute new features bug fixes solr bundled built-in search many applications content management systems enterprise content management systems hadoop distributions cloudera hortonworks mapr bundle solr search engine products marketed big data datastax dse integrates solr search engine cassandra solr supported end point various data processing frameworks enterprise integration frameworks solr exposes industry standard http rest-like apis xml json support integrate system programming language supporting standards ease use also client libraries available java c php python ruby popular programming languages
[ 9344, 10377, 8460, 3087, 1296, 6161, 7567, 19, 1047, 8217, 1306, 6555, 8860, 9245, 11161, 9631, 3877, 10661, 11303, 5677, 1327, 7983, 7159, 8627, 4919, 5047, 5048, 4538, 1851, 6074, 6458, 7485, 4031, 7742, 7233, 6338, 4419, 6851, 8644, 12...
Validation
8,409
5
Roccat_Browser:roccat browser roccat browser web browser designed os x ios currently developed runecats utilises webkit rendering engine roccat browser includes features roccat draw allows user annotate webpages within browser resource saver disables re-enables web plugins adobe flash player reducing processing power increasing battery life roccat flick allows user share websites network macs iphones ipads roccat browser also runs cloud system called rclouds lets backup tabs bookmarks settings things related browser roccat also provides unique tab system displays preview website within tab tab bar move top bottom either side placed drawer roccat also available ios devices ipad iphone mobile version features many features desktop counterpart
[ 9732, 6539, 7983, 1776, 2383 ]
Test
8,410
6
Virtual_file_system:virtual file system virtual file system vfs virtual filesystem switch abstract layer top concrete file system purpose vfs allow client applications access different types concrete file systems uniform way vfs example used access local network storage devices transparently without client application noticing difference used bridge differences windows classic mac os/macos unix filesystems applications access files local file systems types without know type file system accessing vfs specifies interface contract kernel concrete file system therefore easy add support new file system types kernel simply fulfilling contract terms contract might change incompatibly release release would require concrete file system support recompiled possibly modified recompilation allow work new release operating system supplier operating system might make backward-compatible changes contract concrete file system support built given release operating system would work future versions operating system one first virtual file system mechanisms unix-like systems introduced sun microsystems sunos 2.0 1985 allowed unix system calls access local ufs file systems remote nfs file systems transparently reason unix vendors licensed nfs code sun often copied design sun vfs file systems could plugged also implementation ms-dos fat file system developed sun plugged sunos vfs although n't shipped product sunos 4.1 sunos implementation basis vfs mechanism system v release 4 john heidemann developed stacking vfs sunos 4.0 experimental ficus file system design provided code reuse among file system types differing similar semantics e.g encrypting file system could reuse naming storage-management code non-encrypting file system heidemann adapted work use 4.4bsd part thesis research descendants code underpin file system implementations modern bsd derivatives including macos unix virtual file systems include file system switch system v release 3 generic file system ultrix vfs linux os/2 microsoft windows virtual file system mechanism called installable file system filesystem userspace fuse mechanism allows userland code plug virtual file system mechanism linux netbsd freebsd opensolaris macos microsoft windows virtual filesystems also implemented userland shell namespace extensions however support lowest-level file system access application programming interfaces windows applications able access file systems implemented namespace extensions kio gvfs/gio provide similar mechanisms kde gnome desktop environments respectively similar limitations although made use fuse techniques therefore integrate smoothly system sometimes virtual file system refers file group files necessarily inside concrete file system acts manageable container provide functionality concrete file system usage software examples containers cbfs storage single-file virtual file system emulator like pctask so-called winuae oracle virtualbox microsoft virtual pc vmware primary benefit type file system centralized easy remove single-file virtual file system may include basic features expected file system virtual otherwise access internal structure file systems often limited programs specifically written make use single-file virtual file system instead implementation driver allowing universal access another major drawback performance relatively low compared virtual file systems low performance mostly due cost shuffling virtual files data written deleted virtual file system direct examples single-file virtual file systems include emulators pctask winuae encapsulate filesystem data also emulated disk layout makes easy treat os installation like piece software—transferring removable media network amiga emulator pctask emulated intel pc 8088 based machine clocked 4.77mhz later 80486sx clocked 25 mhz users pctask could create file large size amiga filesystem file would virtually accessed emulator real pc hard disk file could formatted fat16 filesystem store normal ms-dos windows files uae windows winuae allows large single files windows treated amiga file systems winuae file called hardfile uae could also treat directory host filesystem windows linux macos amigaos amiga filesystem
[ 6153, 6155, 10257, 8214, 25, 6180, 8242, 4161, 6213, 8266, 8268, 6221, 10333, 97, 6244, 8298, 4207, 6263, 2168, 2179, 4238, 10382, 2193, 2194, 2197, 2199, 6296, 2201, 2212, 6309, 10405, 8364, 178, 2230, 6329, 8380, 8388, 10436, 2248, 8395...
Validation
8,411
9
IBM_Informix-4GL:ibm informix-4gl informix-4gl 4gl programming language developed informix mid-1980s includes embedded sql report writer language form language limited set imperative capabilities functions statements supports arrays etc. language particularly close natural language easy learn use two versions compiler either produce 1 intermediate byte code interpreter known rapid development system 2 c programming language code compilation c compiler machine-code executes faster compiles slower executables bigger specifically designed run client network connected ibm informix database engine service mechanism calling c programming language functions conversely called executing c programs rds version also features interactive debugger dumb terminals particular feature comprehensive error checking built final executable extremely helpful error messages produced compilers executables also features embedded modal statements changing compiler executable behaviour e.g causing compiler include memory structures matching database schema structures elements continue executing spite error conditions trapped later informix-4gl project started 1985 chris maloney chief architect roy harrington charge related informix turbo later renamed online engine bypassed cooked file system favour raw disk rapid application development tool called fourgen case tools bundled informix-4gl 1989 1996 another flavor informix programming-tool produced called newera supported object-oriented programming level code-compatibility informix-4gl informix acquired ibm april 2001 despite age informix-4gl still widely used develop business applications sizable market exists around due popularity accounting inherently text based activity often chosen purely text-based interface optimize data entry efficiency new accounting applications still developed informix-4gl reason stansoft released 2010 eppix telecommunication accounting system uses ibm tuxedo services written c programming language call pre-compiled 4gl object modules dynamically run-time
[ 6850, 4042, 8262 ]
Test
8,412
7
Orbitera:orbitera orbitera american cloud services provider subsidiary google company develops sells e-commerce platform automates billing ordering processes cloud marketplaces orbitera founded 2012 brian singer found challenges associated selling software tech companies previously worked company initially raised 2 million seed funding resolute ventures investors 2016 company platform used adobe systems red hat avnet among others year company acquired google result deal company became part google cloud platform 2018 orbitera partnered mobile device management provider mobileiron develop store cloud-based software since inception orbitera e-commerce platform supports multi-cloud commerce platform handles billing processes buying selling cloud-based services automates building online marketplaces bundled cloud services enables product trials test drives company 2018 partnership mobileiron enable clients sell groups services customer segment allow customized branding offer streamlined billing support data voice third-party cloud services
[ 4194, 467, 9455 ]
Test
8,413
2
Google_Play:google play google play previously android market digital distribution service operated developed google llc serves official app store android operating system allowing users browse download applications developed android software development kit sdk published google google play also serves digital media store offering music books movies television programs previously offered google hardware devices purchase introduction separate online hardware retailer google store march 11 2015 also offered news publications magazines revamp google news may 15 2018 applications available google play either free charge cost downloaded directly android device play store mobile app deploying application device google play website applications exploiting hardware capabilities device targeted users devices specific hardware components motion sensor motion-dependent games front-facing camera online video calling google play store 82 billion app downloads 2016 reached 3.5 million apps published 2017 subject multiple issues concerning security malicious software approved uploaded store downloaded users varying degrees severity google play launched march 6 2012 bringing together android market google music google ebookstore one brand marking shift google digital distribution strategy services included google play google play books google play games google play movies tv google play music following re-branding google gradually expanded geographical support services google play features 3.5 million android applications users 145 countries purchase apps although google notes support pages paid content may available provinces territories even governing country listed developers 150 locations distribute apps google play though every location supports merchant registration distribute apps developers pay one-time 25 registration fee google play developer console account app developers control countries app distributed well pricing app in-app purchases country developers receive 70 application price remaining 30 goes distribution partner operating fees developers set sales original price struck banner underneath informing users sale ends google play allows developers release early versions apps select group users alpha beta tests developers also release apps staged rollouts update reaches percentage users increase time users pre-order select apps well movies music books games items delivered soon available network carriers offer billing google play purchases allowing users opt charges monthly phone bill rather credit cards users request refunds within 48 hours purchase something bought n't working n't expected bought accident changed mind purchase apps meeting specific usability requirements qualify wear os app google play games online gaming service android features real-time multiplayer gaming capabilities cloud saves social public leaderboards achievements service introduced google i/o 2013 developer conference standalone mobile app launched july 24 2013 google play music music podcast streaming service online music locker features 40 million songs gives users free cloud storage 50,000 songs google play music available 64 countries google play books ebook digital distribution service google play offers five million ebooks available purchase users also upload 1,000 ebooks form pdf epub file formats google play books available 75 countries google play books often found mirror archive.org website freely available readers download google play movies tv video demand service offering movies television shows available purchase rental depending availability movies available 110 countries tv shows available australia austria canada france germany japan switzerland united states united kingdom google play newsstand news aggregator digital newsstand service offering subscriptions digital magazines topical news feeds basic newsstand service topical news feeds available worldwide paid newsstand content available 35 countries may 15 2018 mobile app merged google news weather form google news newsstand section continued appear google play website november 5 2018 google play march 2015 devices section users purchase google nexus devices chromebooks chromecasts google-branded hardware accessories separate online hardware retailer called google store introduced march 11 2015 replacing devices section google play google play previously styled google play originated three distinct products android market google music google ebookstore android market announced google august 28 2008 made available users october 22 december 2010 content filtering added android market app details page started showing promotional graphic top maximum size app raised 25 megabytes 50 megabytes google ebookstore launched december 6 2010 debuting three million ebooks making largest ebooks collection world november 2011 google announced google music section play store offering music purchases march 2012 google increased maximum allowed size app allowing developers attach two expansion files app basic download expansion file maximum size 2 gigabytes giving app developers total 4 gigabytes also march 2012 android market re-branded google play may 2016 announced google play store including android apps would coming chrome os september 2016 apart searching content name apps also searched keywords provided developer searching apps users press suggested search filters helping find apps matching determined filters discoverability apps play store consists lists featuring top apps category including top free list popular free apps time top paid list popular paid apps time top grossing list apps generating highest amounts revenue trending apps list apps recent installation growth top new free list popular new free apps top new paid list popular new paid apps featured list new apps selected google play team staff picks frequently-updated list apps selected google play team editors choice list apps considered best time top developer list apps made developers considered best march 2017 google added free app week section offering one normally-paid app free july 2017 google expanded editors choice section feature curated lists apps deemed provide good android experiences within overall themes fitness video calling puzzle games google play enables users know popularity apps displaying number times app downloaded download count color-coded badge special color designations surpassing certain app download milestones including grey 100 500 1,000 5,000 downloads blue 10,000 50,000 downloads green 100,000 500,000 downloads red/orange 1 million 5 million 10 million 1 billion downloads users submit reviews ratings apps digital content distributed google play displayed publicly ratings based 5-point scale app developers respond reviews using google play developer console google redesigned google play interface several occasions february 2011 google introduced website interface then-named android market provides access computer applications purchased downloaded installed android device remotely market account section letting users give devices nickname easy recognition may 2011 google added new application lists android market including top paid top free editor choice top grossing top developers trending july google introduced interface focus featured content search filters us book sales movie rentals may 2013 redesign website interface matched then-recently redesigned android app july 2014 play store android app added new headers books/movies sections new additional information screen offering list featuring latest available app version installed size content rating simplified app permissions prompt overview categories days later got redesign consistent then-new material design design language app updated october 2015 feature new animations divide content apps games entertainment sections well added support languages read right-to-left april 2016 google announced redesign icons used suite play apps adding similar style consistent look may 2017 google removed shopping bag google play icon triangle associated colors remaining march 2018 google experimented changing format screenshots used app pages webp format png reverted change caused images load slower update also saw small ui tweaks google play store site reviews section opening dedicated page larger images light box viewer google states developer policy center google play supports variety monetization strategies benefit developers users including paid distribution in-app products subscriptions ad-based models requires developers comply policies order ensure best user experience requires developers charging apps downloads google play must use google play payment system in-app purchases unlocking additional app functionality must also use google play payment system except cases purchase solely physical products digital content may consumed outside app e.g songs played music players support paid applications introduced february 13 2009 developers united states united kingdom support expanded additional 29 countries september 30 2010 in-app billing system originally introduced march 2011 developers google play required feature physical address app page google play requirement established september 2014 february 2017 google announced would let developers set sales apps original price struck banner underneath informing users sale ends google also announced made changes algorithms promote games based user engagement downloads finally announced new editorial pages considers optimal gaming experiences android promoting curating games google allows users purchase content credit debit cards carrier billing gift cards paypal google began rolling carrier billing purchases may 2012 followed support paypal may 2014 rumor google play gift cards started circulating online august 2012 references discovered android police 3.8.15 version update play store android app soon images gift cards started leak august 21 2012 made official google rolled next weeks google play gift cards currently available australia austria belgium brazil canada denmark finland france germany greece hong kong india indonesia ireland italy japan malaysia mexico netherlands new zealand norway poland portugal saudi arabia singapore south africa south korea spain sweden switzerland thailand turkey united kingdom united states google introduced in-app subscriptions google play may 2012 june 2016 sources reported google announced subscriptions charged google play would split revenue 85/15 developers receive 85 revenue google takes 15 change traditional 70/30 split years prior move followed apple then-recently announced change model although commentators quick point apple grants 85/15 revenue share one year active subscriptions google subscription change takes effect immediately january 1 2018 transaction fee subscription products decreased 15 subscribers developers retain 12 paid months unlike sources reporting google using model apple in-app subscriptions app store play store google official pre-installed app store android-certified devices provides access content google play store including apps books magazines music movies television programs play store filters list apps compatible user device developers target specific hardware components compass software components widget android versions 7.0 nougat carriers also ban certain apps installed users devices example tethering applications requirement android applications must acquired using play store users may download android applications developer website third-party app store alternative play store applications self-contained android package files apk similar .exe files install programs microsoft windows computers android devices unknown sources feature settings allows users bypass play store install apks sources depending developer preferences apps installed phone external storage card android users complained google play store access blocked constant data exchange google cloud also valuable cpu ressources used slowing android system play store app features history installed apps users remove apps list changes also synchronizing google play website interface option remove apps history exist google publishes source code android android open source project allowing enthusiasts developers program distribute modified versions operating system however modified versions compatible apps developed google official android versions android compatibility program serves define baseline implementation android compatible third-party apps written developers android devices comply google compatibility requirements may install access google play store application stated help page android open source project devices android compatible may participate android ecosystem including android market devices n't meet compatibility requirements exist outside ecosystem words android compatibility program separate android compatible devices devices merely run derivatives source code welcome uses android source code android compatible devices—as defined tested android compatibility program—may participate android ecosystem device manufacturers choose use app store instead of—or addition to—the play store examples include amazon opting amazon appstore instead google play kindle fire tablet computers samsung adding galaxy apps line samsung galaxy smartphones tablets 2012 google began decoupling certain aspects android operating system particularly core applications could updated google play store independently os one components google play services closed-source system-level process providing apis google services installed automatically nearly devices running android 2.2 froyo higher changes google add new system functionality play services update apps without distribute upgrade operating system result android 4.2 4.3 jelly bean contained relatively fewer user-facing changes focusing minor changes platform improvements april 2016 google announced google play awards described way recognize incredible developer community highlight best apps games awards showcase five nominees across ten award categories apps featured dedicated section google play google stated nominees selected panel experts google play team based criteria emphasizing app quality innovation launch major update last 12 months winners announced may google also previously released yearly lists apps deemed best google play march 6 2017 five years google play launch google released lists best-selling apps games movies music books past five years june 2017 google introduced android excellence new editorial program highlight apps deemed highest quality google play editors google places restrictions types apps published particular allowing sexually explicit content child endangerment violence bullying harassment hate speech gambling illegal activities requiring precautions user-generated content march 2015 google disclosed past months begun using combination automated tools human reviewers check apps malware terms service violations published play store time began rolling new age-based ratings system apps games based given region official ratings authority example esrb us october 2016 google announced new detection filtering system designed provide additional enhancements protect integrity store new system aimed detect filter cases developers attempting manipulate placement apps illegitimate means like fraudulent installs fake reviews incentivized ratings mobile carriers block users installing certain apps march 2009 reports surfaced several tethering apps banned store however apps later restored new ban preventing t-mobile subscribers downloading apps google released statement april 2011 google removed grooveshark app store due unspecified policy violations cnet noted removal came top music labels accused service violating copyright law techcrunch wrote approximately two weeks later grooveshark returned android albeit official app market rather playing android ability install third-party applications browser grooveshark taken responsibility distributing application may 2011 google banned account developer several video game emulators neither google developer publicly revealed reason ban march 2013 google began pull ad blocking apps play store per section 4.4 developers agreement prohibits apps interfere servers services apps exempt power management policies introduced android marshmallow without adversely affected banned july 2018 google banned additional categories apps including perform cryptocurrency mining on-device apps facilitate sale explosives firearms ammunition certain firearms accessories used present ads contain adult content aimed towards children multiple apps highly similar content user experience apps created automated tool wizard service based templates submitted google play operator service behalf persons february 2012 google introduced new automated antivirus system called google bouncer scan new existing apps malware e. g. spyware trojan horses 2017 bouncer feature safety measures within android platform rebranded umbrella name google play protect system regularly scans apps threats android apps ask require certain permissions device including access body sensors calendar camera contacts location microphone phone sms storage july 2017 google described new security effort called peer grouping apps performing similar functionalities calculator apps grouped together attributes compared one app stands requesting device permissions others group google systems automatically flag app security engineers take closer inspection peer grouping based app descriptions metadata statistics download count early march 2011 droiddream trojan rootkit exploit released then-named android market form several free applications many cases pirated versions existing priced apps exploit allowed hackers steal information imei imsi numbers phone model user id service provider exploit also installed backdoor allowed hackers download code infected device exploit affected devices running android versions earlier 2.3 gingerbread google removed apps market immediately alerted apps already downloaded 50,000 times according android police estimate android police wrote method removing exploit infected device reset factory state although community-developed solutions blocking aspects exploit created days later google confirmed 58 malicious apps uploaded android market downloaded 260,000 devices removed store google emailed affected users information far determine information obtained device-specific imei/imsi unique codes used identify mobile devices version android running device opposed personal data account information also announced new remote kill functionality alongside security update lets google remotely remove malicious apps users devices however days later malicious version security update found internet though contain specific droiddream malware new apps featuring malware renamed droiddream light surfaced following june also removed store black hat security conference 2012 security firm trustwave demonstrated ability upload app would circumvent bouncer blocker system application used javascript exploit steal contacts sms messages photos also capable making phone open arbitrary web pages launch denial-of-service attacks nicholas percoco senior vice president trustwave spiderlabs advanced security team stated wanted test bounds capable app stayed google play two weeks repeatedly scanned bouncer system without detection percoco saying attack malware attacker get google play bypass bouncer trustwave reached google share findings noted manual testing apps might necessary detect apps using malware-masking techniques according 2014 research study released riskiq security services company malicious apps introduced google play increased 388 2011 2013 number apps removed google dropped 60 2011 23 2013 study revealed apps personalizing android phones led categories likely malicious according pc world google said would need information riskiq analysis comment findings october 2016 engadget reported blog post named password storage sensitive apps freelance android hacker jon sawyer decided test top privacy apps google play testing two applications one named hide pictures keep safe vault named private photo vault sawyer found significant errors password handling commented companies selling products claim securely store intimate pieces data yet snake oil would near equal protection changing file extension renaming photos april 2017 security firm check point announced malware named falseguide hidden inside approximately 40 game guide apps google play malware capable gaining administrator access infected devices receives additional modules let show popup ads malware type botnet also capable launching ddos attacks alerted malware google removed instances store time approximately two million android users already downloaded apps oldest around since november 2016 june 2017 researchers sophos security company announced finding 47 apps using third-party development library shows intrusive advertisements users phones even apps force-closed user advertisements remain google removed apps receiving reports sophos apps remained asked comment google n't respond august 2017 500 apps removed google play security firm lookout discovered apps contained sdk allowed malicious advertising apps collectively downloaded 100 million times consisted wide variety use cases including health weather photo-editing internet radio emoji 2017 700,000 apps banned google play due abusive contents 70 increase number apps banned 2016 developers publishing google play sued patent infringement patent trolls people broad vaguely worded patents use target small developers developer manages successfully challenge initial assertion patent troll changes claim violation order accuse developer violated different assertion patent situation continues case goes legal system substantial economic costs prompting developers settle february 2013 austin meyer flight simulator game developer sued used copy-protection system app system said google gave us course google provides everyone else making game android meyer claimed google would assist lawsuit stated would settle case battle troll continued several years uploading video june 2016 discussing sued uploading app google play patent troll apparently owns google play store android authority wrote scenario played many app developers many years prompted discussions larger issue stake developers stop making apps fear patent problems users outside countries/regions listed access free apps games google play
[ 4096, 9732, 5637, 10756, 8719, 3600, 6672, 7700, 8213, 4120, 9244, 10270, 11294, 1578, 7722, 10284, 5677, 9262, 3633, 1083, 9791, 1089, 6212, 69, 581, 8262, 4683, 4685, 11343, 3152, 3664, 1619, 3667, 10838, 87, 8280, 8285, 2658, 9314, 107...
None
8,414
2
Standard_streams:standard streams computer programming standard streams preconnected input output communication channels computer program environment begins execution three input/output i/o connections called standard input stdin standard output stdout standard error stderr originally i/o happened via physically connected system console input via keyboard output via monitor standard streams abstract command executed via interactive shell streams typically connected text terminal shell running changed redirection pipeline generally child process inherits standard streams parent process users generally know standard streams input output channels handle data coming input device write data application data may text encoding binary data many modern systems standard error stream program redirected log file typically error analysis purposes streams may used chain applications meaning output stream one program redirected input stream another application many operating systems expressed listing application names separated vertical bar character reason often called pipeline character well-known example use pagination application providing user control display output stream display operating systems predating unix programs explicitly connect appropriate input output devices os-specific intricacies caused tedious programming task many systems necessary obtain control environment settings access local file table determine intended data set handle hardware correctly case punch card reader magnetic tape drive disk drive line printer card punch interactive terminal one unix several groundbreaking advances abstract devices removed need program know care kind devices communicating older operating systems forced upon programmer record structure frequently non-orthogonal data semantics device control unix eliminated complexity concept data stream ordered sequence data bytes read end file program may also write bytes desired need easily declare count grouping another unix breakthrough automatically associate input output terminal keyboard terminal display respectively default — program programmer absolutely nothing establish input output typical input-process-output program unless chose different paradigm contrast previous operating systems usually required some—often complex—job control language establish connections equivalent burden orchestrated program since unix provided standard streams unix c runtime environment obliged support well result c runtime environments c descendants regardless operating system provide equivalent functionality standard input stream data often text going program program requests data transfers use read operation programs require stream input example dir ls programs display file names contained directory may take command-line arguments perform operations without stream data input unless redirected standard input inherited parent process case interactive shell usually associated keyboard file descriptor standard input 0 zero posix unistd.h definition codice_1 corresponding c stdio.h variable codice_2 similarly c++ iostream variable codice_3 standard output stream program writes output data program requests data transfer write operation programs generate output example file rename command variously called mv move ren silent success unless redirected standard output inherited parent process case interactive shell usually text terminal initiated program file descriptor standard output 1 one posix unistd.h definition codice_4 corresponding c stdio.h variable codice_5 similarly c++ iostream variable codice_6 standard error another output stream typically used programs output error messages diagnostics stream independent standard output redirected separately solves semipredicate problem allowing output errors distinguished analogous function returning pair values – see semipredicate problem multivalued return usual destination text terminal started program provide best chance seen even standard output redirected readily observed example output program pipeline redirected input next program errors program still go directly text terminal acceptable normal direct standard output standard error destination text terminal messages appear order program writes unless buffering involved example common situations standard error stream unbuffered standard output stream line-buffered case text written standard error later may appear terminal earlier standard output stream buffer yet full file descriptor standard error defined posix 2 two unistd.h header file provides symbol codice_7 corresponding c stdio.h variable codice_8 c++ iostream standard header provides two variables associated stream codice_9 codice_10 former unbuffered latter using buffering mechanism c++ streams bourne-style shells allow standard error redirected destination standard output directed using csh-style shells allow standard error redirected destination standard output directed using standard error added unix several wasted phototypesetting runs ended error messages typeset instead displayed user terminal fortran equivalent unix file descriptors convention many fortran implementations use unit numbers codice_11 stdin codice_12 stdout codice_13 stderr fortran-2003 intrinsic codice_14 module standardized include named constants codice_15 codice_16 codice_17 portably specify unit numbers fortran 77 example fortran 2003 example program main end program algol 60 criticized standard file access algol 68 input output facilities collectively referred transput koster coordinated definition transput standard model included three standard channels codice_18 codice_19 codice_20 c programming language standard input output error streams attached existing unix file descriptors 0 1 2 respectively posix environment unistd.h definitions stdin_fileno stdout_fileno stderr_fileno used instead rather magic numbers file pointers stdin stdout stderr also provided ken thompson designer implementer original unix operating system modified sort version 5 unix accept representing standard input spread utilities became part operating system special file version 8 diagnostics part standard output version 6 dennis m. ritchie created concept standard error java standard streams referred stdin stdout stderr public static void main string args c .net languages standard streams referred codice_21 stdin codice_22 stdout codice_23 stderr basic read write capabilities stdin stdout streams also accessible directly class codice_24 e.g codice_25 used instead codice_26 codice_21 codice_22 codice_23 codice_30 stdin codice_31 stdout stderr objects allow access underlying standard streams text basis full binary access standard streams must performed codice_32 objects returned codice_33 codice_34 codice_35 respectively // c example public static int main string args visual basic .net example public function main integer end function applying codice_36 class one use instance properties codice_37 codice_38 codice_39 class access standard streams process graphical user interfaces guis rarely make use standard streams consequently redirecting gui programs constructing gui pipeline neither practical useful nearest analogy probably cutting copying one application pasting another since manual user operations required moving large numbers pastes especially efficient services menu implemented nextstep mac os x also analogous standard streams operating systems graphical applications provide functionality systemwide menu operates current selection gui matter application gui programs primarily unix still write debug information standard error others many unix media players may read files standard input popular windows programs open separate console window addition gui windows emulators psx dosbox gtk-server use stdin communication interface interpreted program realize gui common lisp interface manager paradigm presents gui elements sent extended output stream
[ 8065, 4750, 4369, 3222, 6813, 7325, 3488, 9507, 9128, 5677, 7343, 8499, 692, 2485, 3382, 8504, 701, 1610, 1611, 7626, 335, 8402, 9298, 10586, 8289, 2786, 6498, 10083, 4968, 4333, 5357, 7667, 5492, 3573, 7544, 2556, 2045 ]
None
8,415
3
Jet_Set_Willy_II:jet set willy ii jet set willy ii final frontier platform game released 1985 software projects variety 8-bit home computers official sequel jet set willy one successful home computer games ever released officially jet set willy ii final frontier last miner willy series although numerous unofficial sequels remakes homages updates released even day jet set willy ii expansion original jsw rather new game unto map primarily expanded version original mansion new elements predecessor several based rumoured events jsw fact never programmed able launch titular ship screen called yacht explore island zx spectrum amstrad cpc msx versions willy blasted rocket room space 33 rooms dons spacesuit due proliferation hacking cheating original game jet set willy ii pays homage includes screen called cheat accessed cheating control willy also differs original jet set willy ii written original programmer matthew smith instead developed derrick p. rowson jet set willy ii came form enhanced copy protection called padlock ii prevent felt tip copying seven pages rather single page used jet set willy ending jsw ii also different willy collected 150 175 available items goes bed game takes control willy guides bathroom falls toilet lands room named oh central cavern laid identically deriving name opening level manic miner screen playable amstrad cpc version escape save player intentionally killing remaining lives jsw ii originally created amstrad version jet set willy derrick p. rowson steve wetherill expansions exploit 64k ram amstrad cpc range compared 48k zx spectrum game home platform version subsequently ported back spectrum porting across amstrad porting back spectrum may also explain number small differences including loss coloured backgrounds certain screens cpc version ran 4-colour display mode game subsequently ported platforms including commodore 64 commodore 16 bbc micro acorn electron msx bbc micro cassette version 2 rooms zx spectrum version omits 60 rooms rather subset cpc zx spectrum versions unofficial ports acorn archimedes windows/dos unix/x environments also exist c64 screen different format amstrad developers unable take data used amstrad instead lay re-implement screens sprites however rowson able use much data directly amstrad hence game released sooner in-depth article game code spectrum stated room compressed took differing amounts memory room editor would impossible code november 2016 rowson released jsw2+ re-write jsw2 well technical improvements code allowing complicated rooms built-in ‘ cheat ’ devices allowing infinite lives teleportation rowson also added new rooms made many rooms easier fewer slower sprites
[ 9322, 10862, 9006, 10931, 1527, 4956 ]
None
8,416
7
LotusLive:lotuslive ibm smartcloud social business suite business networking collaboration cloud-based services hosted ibm collaboration solutions division ibm integrated services include social networking businesses online meetings file sharing instant message data visualization e-mail several ibm smartcloud social business offerings ibm smartcloud social business also provides mechanisms third-party applications integrate lotuslive ibm announced integration skype linkedin salesforce.com ups silanis lotusphere 2012 ibm announced rebranded lotuslive product line ibm smartcloud social business
[ 10090, 5612, 8622, 7983, 3323, 467, 1467 ]
Test
8,417
4
Login_spoofing:login spoofing login spoofings techniques used steal user password user presented ordinary looking login prompt username password actually malicious program usually called trojan horse control attacker username password entered information logged way passed along attacker breaching security prevent operating systems require special key combination called secure attention key entered login screen presented example control-alt-delete users instructed report login prompts appear without pressed secure attention sequence kernel part operating system interacts directly hardware detect whether secure attention key pressed intercepted third party programs unless kernel compromised whereas concept phishing usually involves scam victims respond unsolicited e-mails either identical similar appearance familiar site may prior affiliation login spoofing usually indicative much heinous form vandalism attack case attacker already gained access victim computer least degree internet-based login spoofing spoofing caused
[ 8418, 10756, 10378, 7983, 5435 ]
None
8,418
4
Secure_attention_key:secure attention key secure attention key sak secure attention sequence sas special key key combination pressed computer keyboard login screen must user completely trustworthy operating system kernel interacts directly hardware able detect whether secure attention key pressed event detected kernel starts trusted login processing secure attention key designed make login spoofing impossible kernel suspend program including masquerading computer login process starting trustable login operation systems configured use sak users must always suspicious login prompts displayed without pressed key combination microsoft windows handled winlogon component use secure attention key also required windows user account control uac prompt examples similar combination often used pc system bios force reboot boot sequence
[ 8417, 10839, 7207, 5000, 10378, 1515, 13, 6797, 7983, 823, 9016, 537, 5435, 3351, 93 ]
Test
8,419
8
WampServer:wampserver wampserver refers software stack microsoft windows operating system created romain bourdon consisting apache web server openssl ssl support mysql database php programming language
[ 865, 8644, 6797, 3182, 823, 7022, 7983, 11030, 4439, 8539, 10939 ]
None
8,420
7
Péter_Kacsuk:péter kacsuk péter kacsuk hungarian computer scientist mta-sztaki budapest hungary péter kacsuk received msc university doctorate degrees technical university budapest hungary 1976 1984 respectively received kandidat degree equivalent phd hungarian academy 1989 habilitated university vienna 1997 received professor title hungarian president 1999 doctor academy degree dsc hungarian academy sciences 2001 currently head laboratory parallel distributed systems lpds computer automation research institute hungarian academy sciences péter kacsuk part-time full professor cavendish school computer science university westminster eötvös lóránd university science since 2001 served visiting scientist professor several times various universities australia austria canada england germany spain japan usa published two books two lecture notes 200 scientific papers parallel computer architectures parallel software engineering grid computing chair joint egee see-grid summer school grid application support 2006 2007 chair coregrid summer school 2007 involved many eu grid projects edg gridlab egee seegrid coregrid gridcoord iceage cancergrid etc. coordinator eu fp7 edges enabling desktop grids e-science project co-editor-in-chief journal grid computing published springer received following awards selected media appearances hungary links audio/video material
[ 8912, 6042, 5956, 4510 ]
Validation
8,421
9
Prolog:prolog prolog logic programming language associated artificial intelligence computational linguistics prolog roots first-order logic formal logic unlike many programming languages prolog intended primarily declarative programming language program logic expressed terms relations represented facts rules computation initiated running query relations language first conceived alain colmerauer group marseille france early 1970s first prolog system developed 1972 colmerauer philippe roussel prolog one first logic programming languages remains popular among languages today several free commercial implementations available language used theorem proving expert systems term rewriting type systems automated planning well original intended field use natural language processing modern prolog environments support creation graphical user interfaces well administrative networked applications prolog well-suited specific tasks benefit rule-based logical queries searching databases voice control systems filling templates prolog program logic expressed terms relations computation initiated running query relations relations queries constructed using prolog single data type term relations defined clauses given query prolog engine attempts find resolution refutation negated query negated query refuted i.e. instantiation free variables found makes union clauses singleton set consisting negated query false follows original query found instantiation applied logical consequence program makes prolog logic programming languages particularly useful database symbolic mathematics language parsing applications prolog allows impure predicates checking truth value certain special predicates may deliberate side effect printing value screen programmer permitted use amount conventional imperative programming logical paradigm inconvenient purely logical subset called pure prolog well number extralogical features prolog single data type term terms either atoms numbers variables compound terms special cases compound terms iso prolog provides codice_11 codice_12 codice_13 codice_14 predicates type-checking prolog programs describe relations defined means clauses pure prolog restricted horn clauses two types clauses facts rules rule form head body read head true body true rule body consists calls predicates called rule goals built-in predicate codice_15 meaning 2-arity operator name codice_16 denotes conjunction goals codice_17 denotes disjunction conjunctions disjunctions appear body head rule clauses empty bodies called facts example fact cat tom equivalent rule cat tom true built-in predicate codice_18 always true given fact one ask tom cat things cats clauses bodies called rules example rule animal x cat x add rule ask things animals due relational nature many built-in predicates typically used several directions example codice_19 used determine length list codice_20 given list codice_21 well generate list skeleton given length codice_22 also generate list skeletons lengths together codice_23 similarly codice_24 used append two lists codice_25 given lists codice_26 codice_27 well split given list parts codice_28 given list codice_21 reason comparatively small set library predicates suffices many prolog programs general purpose language prolog also provides various built-in predicates perform routine activities like input/output using graphics otherwise communicating operating system predicates given relational meaning useful side-effects exhibit system example predicate codice_30 displays term screen execution prolog program initiated user posting single goal called query logically prolog engine tries find resolution refutation negated query resolution method used prolog called sld resolution negated query refuted follows query appropriate variable bindings place logical consequence program case generated variable bindings reported user query said succeeded operationally prolog execution strategy thought generalization function calls languages one difference multiple clause heads match given call case system creates choice-point unifies goal clause head first alternative continues goals first alternative goal fails course executing program variable bindings made since recent choice-point created undone execution continues next alternative choice-point execution strategy called chronological backtracking example results following query evaluated true obtained follows initially matching clause-head query codice_31 first one proving query equivalent proving body clause appropriate variable bindings place i.e. conjunction codice_32 next goal proved leftmost one conjunction i.e. codice_33 two clause heads match goal system creates choice-point tries first alternative whose body codice_34 goal proved using fact codice_35 binding codice_36 generated next goal proved second part conjunction codice_37 proved corresponding fact since goals could proved query succeeds since query contained variables bindings reported user query variables like father_child father child enumerates valid answers backtracking notice code stated query codice_38 also succeeds one would insert additional goals describe relevant restrictions desired iterative algorithms implemented means recursive predicates built-in prolog predicate codice_39 provides negation failure allows non-monotonic reasoning goal codice_40 rule legal x \+ illegal x evaluated follows prolog attempts prove codice_41 proof goal found original goal i.e. codice_40 fails proof found original goal succeeds therefore codice_39 prefix operator called provable operator since query codice_44 succeeds goal provable kind negation sound argument ground i.e contains variables soundness lost argument contains variables proof procedure complete particular query codice_45 used enumerate things legal prolog loading code referred consulting prolog used interactively entering queries prolog prompt codice_46 solution prolog writes codice_47 solution exists printed multiple solutions query requested entering semi-colon codice_48 guidelines good programming practice improve code efficiency readability maintainability follow example programs written prolog example query computation expressed declaratively sequence state transitions example optimizing compiler three optimization passes could implemented relation initial program optimized form equivalently using dcg notation quicksort sorting algorithm relating list sorted version design pattern general reusable solution commonly occurring problem software design prolog design patterns go various names skeletons techniques cliches program schemata logic description schemata alternative design patterns higher order programming higher-order predicate predicate takes one predicates arguments although support higher-order programming takes prolog outside domain first-order logic allow quantification predicates iso prolog built-in higher-order predicates codice_49 codice_50 codice_51 codice_52 codice_53 codice_54 furthermore since arbitrary prolog goals constructed evaluated run-time easy write higher-order predicates like codice_55 applies arbitrary predicate member given list codice_56 filters elements satisfy given predicate also allowing currying convert solutions temporal representation answer substitutions backtracking spatial representation terms prolog various all-solutions predicates collect answer substitutions given query list used list comprehension example perfect numbers equal sum proper divisors used enumerate perfect numbers also check whether number perfect another example predicate codice_57 applies predicate codice_58 corresponding positions pair lists codice_58 predicate codice_60 codice_61 unifies codice_62 single unique value codice_63 equivalent applying map function functional programming codice_64 higher-order programming style prolog pioneered hilog λprolog programming large prolog provides module system module system standardised iso however prolog compilers support modules compatibility problems module systems major prolog compilers consequently modules written one prolog compiler necessarily work others special notation called definite clause grammars dcgs rule defined via codice_65 instead codice_66 expanded preprocessor codice_67 facility analogous macros languages according straightforward rewriting rules resulting ordinary prolog clauses notably rewriting equips predicate two additional arguments used implicitly thread state around analogous monads languages dcgs often used write parsers list generators also provide convenient interface difference lists prolog homoiconic language provides many facilities reflection implicit execution strategy makes possible write concise meta-circular evaluator also called meta-interpreter pure prolog code solve true solve subgoal1 subgoal2 solve head codice_68 represents empty conjunction codice_69 unifies clauses database form codice_70 since prolog programs sequences prolog terms codice_66 infix operator easily read inspected using built-in mechanisms like codice_72 possible write customized interpreters augment prolog domain-specific features example sterling shapiro present meta-interpreter performs reasoning uncertainty reproduced slight modifications solve true 1 solve subgoal1 subgoal2 certainty solve goal 1 solve head certainty interpreter uses table built-in prolog predicates form builtin b builtin read x etc clauses represented codice_73 given called codice_74 execute codice_75 obtain measure certainty result pure prolog based subset first-order predicate logic horn clauses turing-complete turing completeness prolog shown using simulate turing machine simple example turing machine specified facts machine performs incrementation one number unary encoding loops number 1 cells appends additional 1 end example query result illustrates computation expressed declaratively sequence state transitions implemented prolog relation successive states interest iso prolog standard consists two parts iso/iec 13211-1 published 1995 aims standardize existing practices many implementations core elements prolog clarified aspects language previously ambiguous leads portable programs three corrigenda cor.1:2007 cor.2:2012 cor.3:2017 iso/iec 13211-2 published 2000 adds support modules standard standard maintained iso/iec jtc1/sc22/wg17 working group ansi x3j17 us technical advisory group standard efficiency prolog code typically compiled abstract machine code often influenced register-based warren abstract machine wam instruction set implementations employ abstract interpretation derive type mode information predicates compile time compile real machine code high performance devising efficient implementation methods prolog code field active research logic programming community various execution methods employed implementations include clause binarization stack-based virtual machines prolog systems typically implement well-known optimization method called tail call optimization tco deterministic predicates exhibiting tail recursion generally tail calls clause stack frame discarded performing call tail position therefore deterministic tail-recursive predicates executed constant stack space like loops languages finding clauses unifiable term query linear number clauses term indexing uses data structure enables sub-linear-time lookups indexing affects program performance affect semantics prologs use indexing first term indexing terms expensive techniques based field-encoded words superimposed codewords provide fast indexing across full query head prolog systems win-prolog swi-prolog implement hashing help handle large datasets efficiently tends yield large performance gains working large corpora wordnet prolog systems b-prolog xsb swi-prolog yap ciao implement memoization method called tabling frees user manually storing intermediate results subgoals encountered query evaluation maintained table along answers subgoals subgoal re-encountered evaluation reuses information table rather re-performing resolution program clauses tabling space–time tradeoff execution time reduced using memory store intermediate results fifth generation computer systems project attempts implement prolog hardware aim achieving faster execution dedicated architectures furthermore prolog number properties may allow speed-up parallel execution recent approach compile restricted prolog programs field programmable gate array however rapid progress general-purpose hardware consistently overtaken specialised architectures although prolog widely used research education prolog logic programming languages significant impact computer industry general applications small industrial standards exceeding 100,000 lines code programming large considered complicated prolog compilers support modules compatibility problems module systems major prolog compilers portability prolog code across implementations also problem developments since 2007 meant portability within family edinburgh/quintus derived prolog implementations good enough allow maintaining portable real-world applications software developed prolog criticised high performance penalty compared conventional programming languages particular prolog non-deterministic evaluation strategy problematic programming deterministic computations even using n't care non-determinism single choice made instead backtracking possibilities cuts language constructs may used achieve desirable performance destroying one prolog main attractions ability run programs backwards forwards prolog purely declarative constructs like cut operator procedural reading prolog program needed understand order clauses prolog program significant execution strategy language depends logic programming languages datalog truly declarative restrict language result many practical prolog programs written conform prolog depth-first search order rather purely declarative logic programs various implementations developed prolog extend logic programming capabilities numerous directions include types modes constraint logic programming clp object-oriented logic programming oolp concurrency linear logic llp functional higher-order logic programming capabilities plus interoperability knowledge bases prolog untyped language attempts introduce types date back 1980s 2008 still attempts extend prolog types type information useful type safety also reasoning prolog programs. ref name= cite doi|10.1007/bf01213601 /ref syntax prolog specify arguments predicate inputs outputs however information significant recommended included comments modes provide valuable information reasoning prolog programs also used accelerate execution constraint logic programming extends prolog include concepts constraint satisfaction constraint logic program allows constraints body clauses codice_76 suited large-scale combinatorial optimisation problems thus useful applications industrial settings automated time-tabling production scheduling prolog systems ship least one constraint solver finite domains often also solvers domains like rational numbers flora-2 object-oriented knowledge representation reasoning system based f-logic incorporates hilog transaction logic defeasible reasoning logtalk object-oriented logic programming language use prolog implementations back-end compiler multi-paradigm language includes support prototypes classes oblog small portable object-oriented extension prolog margaret mcdougall edcaad university edinburgh objlog frame-based language combining objects prolog ii cnrs marseille france prolog++ developed logic programming associates first released 1989 ms-dos pcs support platforms added second version released 1995 book prolog++ chris moss published addison-wesley 1994 prolog systems provide graphics library swi-prolog visual prolog win-prolog b-prolog prolog-mpi open-source swi-prolog extension distributed computing message passing interface also various concurrent prolog programming languages prolog implementations notably swi-prolog ciao support server-side web programming support web protocols html xml also extensions support semantic web formats rdf owl prolog also suggested client-side language cedar free basic prolog interpreter version 4 cedar fca flash cedar app support provides new platform programming prolog actionscript frameworks exist bridge prolog languages name prolog chosen philippe roussel abbreviation french programming logic created around 1972 alain colmerauer philippe roussel based robert kowalski procedural interpretation horn clauses motivated part desire reconcile use logic declarative knowledge representation language procedural representation knowledge popular north america late 1960s early 1970s according robert kowalski first prolog system developed 1972 colmerauer phillipe roussel first implementation prolog interpreter written fortran gerard battani henri meloni david h. d. warren took interpreter edinburgh implemented alternative front-end came define “ edinburgh prolog ” syntax used modern implementations warren also implemented first compiler prolog creating influential dec-10 prolog collaboration fernando pereira warren later generalised ideas behind dec-10 prolog create warren abstract machine european ai researchers favored prolog americans favored lisp reportedly causing many nationalistic debates merits languages much modern development prolog came impetus fifth generation computer systems project fgcs developed variant prolog named kernel language first operating system pure prolog originally restricted use resolution theorem prover horn clauses form application theorem-prover treats clauses procedures pure prolog soon extended however include negation failure negative conditions form b shown trying failing solve corresponding positive conditions b subsequent extensions prolog original team introduced constraint logic programming abilities implementations prolog used watson watson uses ibm deepqa software apache uima unstructured information management architecture framework system written various languages including java c++ prolog runs suse linux enterprise server 11 operating system using apache hadoop framework provide distributed computing prolog used pattern matching natural language parse trees developers stated required language could conveniently express pattern matching rules parse trees annotations named entity recognition results technology could execute rules efficiently found prolog ideal choice language due simplicity expressiveness
[ 10752, 2062, 4624, 6160, 5149, 9245, 2045, 50, 3126, 1591, 1079, 2620, 8771, 9796, 8262, 1610, 9290, 10324, 5719, 4196, 7780, 9828, 6248, 3698, 6775, 9345, 2181, 1672, 8854, 2206, 1697, 4774, 10413, 5816, 6335, 5319, 8904, 10953, 3276, 32...
None
8,422
2
Nyala_(typeface):nyala typeface nyala font based sylfaen designed support latin alphabet ge'ez script used ethiopic languages created john hudson geraldine wade part windows vista windows server 2008 windows 7 font named mountain nyala species great african antelope native highlands ethiopia
[ 2593, 4130, 9539, 7973, 4138, 4141, 6797, 1487, 3538, 4146, 4148, 8374, 9654, 4127 ]
Test
8,423
2
Series_30:series 30 series 30 often shortened s30 software platform application user interface created nokia entry level mobile phones lower series 40 s30 phones capable running java apps 2014 microsoft acquired nokia mobile phones business later discontinued s30 favor series 30+ first series 30 device nokia 1100 2003 originally s30 supposed one menu key second one added release nokia 1110 s30 devices also n't 5-way d-pad 4-way d-pad except nokia 1100 2-way d-pad following list series 30 devices released nokia
[ 1537, 10754, 11271, 529, 3089, 10770, 5143, 2072, 5659, 10273, 4132, 40, 3626, 7727, 10802, 7220, 5175, 9784, 1083, 9292, 7246, 1615, 5201, 7253, 3162, 5211, 6748, 607, 1633, 2658, 6763, 109, 1148, 8316, 8829, 11391, 6787, 6276, 3205, 679...
Validation
8,424
6
CIFSD:cifsd cifsd open-source in-kernel cifs/smb server created namjae jeon linux kernel initially goal provide improved file i/o performance bigger goal new features much easier develop maintain inside kernel expose layers fully directions attributed sections samba moving modules inside kernel features like remote direct memory access rdma work actual performance gain subset performance related operations belong kernelspace subset belong operations really related performance userspace dce/rpc management historically resulted number buffer overflow issues dangerous security bugs winreg user account management implemented user space cifsd file operations related performance open/read/write/close etc kernel space kcifsd also allows easier integration vfs interface file operations server daemon started starts forker thread kcifsd/0 initialization time open dedicated port 445 listening smb requests whenever new clients make request forker thread accept client connection fork new thread dedicated communication channel client server allows parallel processing smb requests commands clients well allowing new clients make new connections instance named kcifsd/1~n indicate connected clients depending smb request types new thread decide pass commands user space cifsd currently dce/rpc commands identified handled user space utilize linux kernel chosen process commands default workitems executed handlers default kworker threads allows multiplexing handlers kernel take care initiating extra worker threads load increased vice versa load decreased destroys extra worker threads connection established client dedicated kcifsd/1..n takes complete ownership receiving/parsing smb commands command received worked parallel i.e. multiple clients commands worked parallel receiving command separated kernel workitem prepared command queued handled default kworker'threads inside kernel smb workitem queued kworkers allows benefit load sharing managed optimally default kernel optimizing client performance handling client commands parallel cifsd userspace process transfer user account password registered using cifsadmin part utils user space allows sharing information parameters parsed smb.conf smb export layer kernel execution part daemon continuously running connected kernel interface using netlink socket waits requests dcerpc winreg handles rpc calls minimum dozen important file server netshareenum netservergetinfo various dfs related calls server must implement complete dce/rpc response prepared user space passed associated kernel thread client
[ 3820, 7983, 11221, 823, 2045 ]
Test
8,425
8
Apache_CXF:apache cxf apache cxf open-source fully featured web services framework originated combination two open-source projects celtix developed iona technologies xfire developed team hosted codehaus two projects combined people working together apache software foundation new name cxf derived combining celtix xfire cxf key design considerations include cxf often used apache servicemix apache camel apache activemq service-oriented architecture soa infrastructure projects cxf includes broad feature set primarily focused following areas
[ 3462, 8070, 10377, 4490, 4107, 6284, 8460, 7567, 1296, 1041, 6161, 1047, 8217, 11161, 6555, 8860, 8096, 10020, 3877, 10661, 11303, 7592, 5677, 1327, 7983, 4919, 5047, 2106, 1851, 4538, 6074, 7485, 7742, 9789, 7233, 6338, 4419, 10949, 1222, ...
Test
8,426
9
PDF/X:pdf/x pdf/x subset pdf iso standard purpose pdf/x facilitate graphics exchange therefore series printing related requirements apply standard pdf files example pdf/x-1a fonts need embedded images need cmyk spot colors pdf/x-3 accepts calibrated rgb cielab colors retaining restrictions pdf/x-1a pdf/x files must follow certain restrictions also must contain special file identification inside pdf says pdf/x version means file conform single specific pdf/x standard even requirements met printing conditions output intent need specified file specified form standard profiles using codes like cgats tr 001 swop pdf/x file color managed data color managed graphic gets color profile even though file whole cmyk individual graphics may rgb calibration information various boxes must defined mediabox defines size entire document either artbox trimbox define extent printable area file printed bleed bleedbox must larger trimbox/artbox smaller mediabox must defined active content allowed pdf/x file means standard pdf features like forms signatures comments embedded sounds movies allowed pdf/x features forbidden pdf/x standard sometimes used affect rendering file allows things like annotations outside bleedbox pdf/x-6 development new print production standard built upon pdf 2.0 pdf/x formalized iso standards 15929 15930 versions pdf/x contain file identifications indicate version pdf/x conform appears document info dictionary document metadata according standard used 2010 complete list file identifications following strings pdf/x-1:2001 pdf/x-1a:2001 pdf/x-1a:2003 pdf/x-3:2002 pdf/x-3:2003 pdf/x-4 pdf/x-4p pdf/x-5g pdf/x-5pg observe means various revisions pdf/x-1a pdf/x-3 distinct types revisions pdf/x-4 pdf/x-5 variations
[ 10752, 8854, 11036, 5149, 2206, 9245, 5413, 10413, 11056, 8627, 3126, 1079, 5816, 6977, 11074, 8904, 1610, 9290, 8524, 3921, 2519, 2904, 4058, 4064, 8421, 5614, 10352, 1010, 3447, 2045, 10238 ]
None
8,427
0
Subvocal_recognition:subvocal recognition subvocal recognition svr process taking subvocalization converting detected results digital output aural text-based set electrodes attached skin throat without opening mouth uttering sound words recognized computer subvocal speech recognition deals electromyograms different speaker therefore consistency thrown positioning electrode improve accuracy researchers field relying statistical models get better pattern-matching times subject speaks electrodes even lapses carnegie mellon university researchers found speaker accuracy rates 94 one day see rate drop 48 day later two different speakers drops even relevant applications technology audible speech impossible astronauts underwater navy seals fighter pilots emergency workers charging loud harsh environments worcester polytechnic institute massachusetts research underway use subvocal information control source computer music instruments grant u.s. army research synthetic telepathy using subvocalization taking place university california irvine lead scientist mike d'zmura nasa ames research laboratory mountain view california supervision charles jorgensen conducting subvocalization research brain computer interface r program wadsworth center new york state department health confirmed existing ability decipher consonants vowels imagined speech allows brain-based communication using imagined speech us patents silent communication technologies include us patent 6587729 apparatus audibly communicating speech using radio frequency hearing effect us patent 5159703 silent subliminal presentation system us patent 6011991 communication system method including brain wave analysis and/or use brain activity us patent 3951134 apparatus method remotely monitoring altering brain waves
[ 10557 ]
Test
8,428
2
SlugOS:slugos slugos common source base group firmware distributions linksys nslu2 slugos comprises slugos/be big endian version slugos alternative firmware linksys nslu2 slugos/le little endian version slugos alternative firmware linksys nslu2
[ 2178, 10109, 7502, 823 ]
Validation
8,429
9
BBC_BASIC:bbc basic bbc basic programming language developed 1981 native programming language mos technology 6502 based acorn bbc micro home/personal computer version basic programming language adapted uk computer literacy project bbc written mainly sophie wilson bbc basic based older atom basic acorn atom extended traditional basic named codice_1/codice_2 procedures functions codice_3 loops codice_4 structures inspired comal interpreter also included powerful statements controlling bbc micro four-channel sound output low-/high-resolution eight-mode graphics display due number optimizations bbc basic ran programs much faster microsoft basic running similar machines included using multiple linked lists variable lookup rather single long list pre-defining location integer variables separate integer maths routines speed improved bbc machine via use fast ram allowed mos 6502 processor motorola 6845 display driver share memory without pausing access result design features bbc basic ran david ahl benchmark 21 seconds besting even ibm pc far outpacing 8-bit platforms one unique features bbc basic inline assembler allowing users write assembly language programs 6502 later zilog z80 ns32016 arm assembler fully integrated basic interpreter shared variables could included characters saved via *save *load called via call usr commands allowed developers write assembly language code also basic code emit assembly language making possible use code-generation techniques even write simple compilers basic 1978 hermann hauser chris curry founded acorn computers much code developed cambridge university sophie wilson colleagues complete history available basic original version shipped early bbc micros basic ii used acorn electron bbc micros shipped 1982 including model b added codice_5 codice_6 keywords along offset assembly bug fixes basic iii produced uk version united states market version acorn abortive attempt enter cross-atlantic computer market apart bug fixes change basic ii codice_7 command could also spelled codice_8 regardless input uk version always listed codice_7 us version codice_8 main place basic iii found hi-basic version external second processor basic iv also known cmos basic available bbc master machines changed use new instructions available 65sc12 processor reducing size code therefore allowing inclusion codice_11 codice_12 statement codice_13 codice_14 codice_15 codice_16 statements faster floating point bug fixes included basic iv 1986 improvement basic iv included master compact machine version basic compact included re-coded mathematical routines said provide 30 speed increase version included rest master series hi-basic available two versions first based basic iii second based basic iv built run higher address b800 second processor rather usual 8000 address bbc b allowed program space available either external internal 6502 second processors version introduced support second zilog z80 processor another version bbc basic called bas128 supplied tape disc bbc master master compact loaded main ram used 64 kb sideways ram user programs provided support much larger programs cost lot slower normal rom-based version interpreter deal basic 6502 assembly language included characters contributed system popularity industrial research engineers bbc mos risc os usually supplied rom may assumed specific release operating system contained specific version basic simple way determine version basic actually running enquiring operating system identity thus making assumption see also beebwiki entry inkey bbc family possible run standard basic enhanced hibasic 6502 second processor one may determine program running second processor examining initial value page 800 using second processor distinguish basic hibasic one examine initial value himem 8000 basic running second processor b800 hibasic second processor similar situation exists risc os may normal basic basic64 offers higher precision maths normal basic identifies basic v basic64 identifies basic vi therefore following used error occurred distinguish one better ways see beebwiki almost cases n't need testing basic platform program running make call read whatever returned data returned deal move 32-bit arm cpu removal 16 kb limit basic code size many new features added basic v version 1.04 61 kb long current versions risc os still contain bbc basic v interpreter source code risc os 5 version bbc basic v released 'shared source risc os open 2011 tba software released test versions updated basic includes support vfp/neon assembler amongst new commands features supported graphics commands entirely backwards compatible sound less example codice_28 keyword basic v onwards command takes fourteen numeric parameters effectively nothing— older versions calls os_word 8 nothing risc os in-line 6502 assembler replaced arm assembler basic v said acorn certainly fastest interpreted basic world probably powerful basic found computer basic vi version basic v supports ieee 754 8-byte format real numbers opposed standard 5-byte format introduced basic i. bbc basic v vi delivered standard acorn archimedes riscpc version bbc basic v also available run arm second processor bbc micro compiler bbc basic v produced paul fellows team leader arthur os development called archimedes basic compiler published initially dabs press abc able implement almost language obvious exception eval function inevitably required run-time programmatic interpretation evidence completeness able support in-line assembler syntax compiler written bbc basic v. compiler running interpreter early development stages able compile versions distributed self-compiled object code many applications initially written run interpreter benefitted performance boost gave putting bbc basic v par languages serious application development bbc basic also ported many platforms ns32016 version bbc basic supplied acorn 32016 coprocessor acorn abc addition version bbc basic supplied bbc micro zilog z80 second processor z80-based version bbc basic also exists cp/m-based systems recently version existed sinclair zx spectrum however due efforts j. g. harston also responsible pdp-11 version bbc basic spectrum released january 2002 many improvements made subsequent releases zilog z80 version bbc basic also used tiki 100 desktop computer cambridge z88 portable amstrad nc100 notepad amstrad nc200 notebook computers version implemented ti-83 plus ti-84 plus series graphing calculators pc-based systems bbc basic also implemented dos bbcbasic 86 aimed maximum compatibility bbc micro bbasic concentrated basic language enhancements based basic ii version bbc basic integrated microsoft windows graphical user interface bbc basic windows created richard russell developer z80 x86 versions released 2001 version still active development seeing much industry use currently whilst supporting nearly completely original bbc basic specification basic iv windows version supports much basic v/vi syntax well advanced features features unique bbc basic windows include interpreter support record/structure types ability call windows api routines external dll recent versions included advanced features comparable languages like c external library recently added support objects sdl based version bbc basic available windows linux number mobile devices supporting sdl library gpl clone bbc basic named brandy written portable c also available emulator bbc micro commodore amiga produced ariadne software cbm uk extremely fast emulate 6502 full speed assembly code would run slower real bbc basic programs would run much faster due way optimised basic 6502 emulation interacted almost commercial games would run well behaved code educational software generally worked additionally used slightly less precise floating-point numeric format bundled special academic package amiga 500 hope schools would replace ageing bbc bs amiga 500s version bbc basic v z80 also made ti-83/84+ texas instruments calculator families benjamin ryves commodore 64 version shado produced small software house aztec software early 1980s
[ 3718, 3722, 7691, 1805, 6797, 9997, 786, 11412, 22, 3350, 3736, 3481, 9881, 9978, 11033, 797, 3233, 11683, 5925, 8101, 4136, 10666, 10029, 8494, 303, 7343, 7983, 11315, 4409, 315, 7355, 7486, 7870, 4160, 4674, 6210, 1349, 8262, 10750, 712...
Test
8,430
9
Homoiconicity:homoiconicity computer programming homoiconicity greek words homo- meaning icon meaning representation property programming languages language homoiconic program written manipulated data using language thus program internal representation inferred reading program example lisp program written regular lisp list manipulated lisp code homoiconic languages code accessed transformed data using representation property often summarized saying language treats code data homoiconic language primary representation programs also data structure primitive type language makes metaprogramming easier language without property reflection language examining program entities runtime depends single homogeneous structure handle several different structures would appear complex syntax noted commonly cited example programming language lisp created easy lists manipulation structure given s-expressions take form nested lists lisp programs written form lists result program access functions procedures running programmatically alter fly homoiconic languages typically include full support syntactic macros allowing programmer express transformations programs concise way examples programming languages clojure contemporary dialect lisp rebol also successor red refal recently julia original source paper macro instruction extensions compiler languages according early influential paper trac text-handling language alan kay used possibly popularized term homoiconic use term 1969 phd thesis one advantage homoiconicity extending language new concepts typically becomes simpler data representing code passed meta base layer program abstract syntax tree function may composed manipulated data structure meta layer evaluated much easier understand manipulate code since easily understood simple data since format language data format typical demonstration homoiconicity meta-circular evaluator von neumann architecture systems includes vast majority general purpose computers today implicitly described homoiconic due way raw machine code executes memory data type bytes memory however feature also abstracted programming language level languages lisp dialects scheme clojure racket employ s-expressions achieve homoiconicity languages considered homoiconic include lisp uses s-expressions external representation data code s-expressions read primitive lisp function codice_1 codice_1 returns lisp data lists symbols numbers strings primitive lisp function codice_3 uses lisp code represented lisp data computes side-effects returns result result printed primitive function codice_4 creates external s-expression lisp data lisp data list using different data types sub lists symbols strings integer numbers lisp code example uses lists symbols numbers create expression primitive lisp function codice_5 set variable codice_6 result change codice_7 term codice_8 evaluate expression print expression string read expression string line 4 create new clause operator codice_9 separates head body clause codice_10 add existing clauses add database call later languages would call creating function runtime also remove clauses database codice_11 codice_12 nowiki /nowiki number clause name number arguments take also called arity also query database get body clause codice_13 analogous lisp codice_14 function concept treating code data manipulation evaluation thereof demonstrated neatly rebol rebol unlike lisp require parentheses separate expressions following example code rebol note codice_15 represents interpreter prompt spaces elements added readability codice_16 fact built-in function rebol language construct keyword enclosing code square brackets interpreter evaluate merely treats block containing words block type block furthermore assigned value word using appears syntax assignment actually understood interpreter special type codice_17 takes form word followed colon block still interpreted using codice_18 function provided rebol similar codice_14 lisp possible interrogate elements block change values thus altering behavior code evaluated
[ 6016, 9345, 9224, 1051, 8479, 8226, 11555, 6950, 5031, 7851, 692, 1591, 10042, 6718, 8262, 9926, 10569, 9298, 10198, 5081, 11488, 10083, 8421, 6502, 9573, 2666, 5997, 9454, 3442, 9714, 10228, 10739, 502, 2680, 7805, 511 ]
Test
8,431
1
U-DISE:u-dise u-dise unified district information system education database schools india database developed national university educational planning administration records information level dropouts condition school toilets
[]
Test
8,432
5
Point-to-Point_Protocol:point-to-point protocol computer networking point-to-point protocol ppp data link layer layer 2 communications protocol used establish direct connection two nodes connects two routers directly without host networking device provide connection authentication transmission encryption compression ppp used many types physical networks including serial cable phone line trunk line cellular telephone specialized radio links fiber optic links sonet internet service providers isps used ppp customer dial-up access internet since ip packets transmitted modem line without data link protocol two derivatives ppp point-to-point protocol ethernet pppoe point-to-point protocol atm pppoa used commonly isps establish digital subscriber line dsl internet service connection customers ppp commonly used data link layer protocol connection synchronous asynchronous circuits largely superseded older serial line internet protocol slip telephone company mandated standards link access protocol balanced lapb x.25 protocol suite requirement ppp circuit provided duplex ppp designed work numerous network layer protocols including internet protocol ip trill novell internetwork packet exchange ipx nbf decnet appletalk like slip full internet connection telephone lines via modem reliable slip double checks make sure internet packets arrive intact resends damaged packets ppp designed somewhat original hdlc specifications designers ppp included many additional features seen proprietary data-link protocols time ppp specified rfc 1661 rfc 2516 describes point-to-point protocol ethernet pppoe method transmitting ppp ethernet sometimes used dsl rfc 2364 describes point-to-point protocol atm pppoa method transmitting ppp atm adaptation layer 5 aal5 also common alternative pppoe used dsl ppp layered protocol three components lcp initiates terminates connections gracefully allowing hosts negotiate connection options integral part ppp defined standard specification lcp provides automatic configuration interfaces end setting datagram size escaped characters magic numbers selecting optional authentication lcp protocol runs top ppp ppp protocol number 0xc021 therefore basic ppp connection established lcp able configure rfc 1994 describes challenge-handshake authentication protocol chap preferred establishing dial-up connections isps although deprecated password authentication protocol pap still sometimes used another option authentication ppp extensible authentication protocol eap described rfc 2284 link established additional network layer 3 configuration may take place commonly internet protocol control protocol ipcp used although internetwork packet exchange control protocol ipxcp appletalk control protocol atcp popular internet protocol version 6 control protocol ipv6cp see extended use future ipv6 replaces ipv4 dominant layer-3 protocol ppp permits multiple network layer protocols operate communication link every network layer protocol used separate network control protocol ncp provided order encapsulate negotiate options multiple network layer protocols negotiates network-layer information e.g network address compression options connection established example internet protocol ip uses ip control protocol ipcp internetwork packet exchange ipx uses novell ipx control protocol ipx/spx ncps include fields containing standardized codes indicate network layer protocol type ppp connection encapsulates following ncps may used ppp ppp detects looped links using feature involving magic numbers node sends ppp lcp messages messages may include magic number line looped node receives lcp message magic number instead getting message peer magic number previous section introduced use lcp options meet specific wan connection requirements ppp may include following lcp options ppp frames variants hdlc frames peers agree address field control field compression lcp fields omitted likewise peers agree protocol field compression 0x00 byte omitted protocol field indicates type payload packet 0xc021 lcp 0x80xy various ncps 0x0021 ip 0x0029 appletalk 0x002b ipx 0x003d multilink 0x003f netbios 0x00fd mppc mppe etc ppp limited contain general layer 3 data unlike ethertype information field contains ppp payload variable length negotiated maximum called maximum transmission unit default maximum 1500 octets might padded transmission information particular protocol padded protocol must allow information distinguished padding ppp frames encapsulated lower-layer protocol provides framing may provide functions checksum detect transmission errors ppp serial links usually encapsulated framing similar hdlc described ietf rfc 1662 flag field present ppp hdlc-like framing used address control fields always value hex ff stations hex 03 unnumbered information omitted whenever ppp lcp address-and-control-field-compression acfc negotiated frame check sequence fcs field used determining whether individual frame error contains checksum computed frame provide basic protection errors transmission crc code similar one used layer two protocol error protection schemes one used ethernet according rfc 1662 either 16 bits 2 bytes 32 bits 4 bytes size default 16 bits polynomial x x x 1 fcs calculated address control protocol information padding fields message encapsulated multilink ppp also referred mlppp mp mppp mlp multilink provides method spreading traffic across multiple distinct ppp connections defined rfc 1990 used example connect home computer internet service provider using two traditional 56k modems connect company two leased lines single ppp line frames arrive order possible frames divided among multiple ppp connections therefore multilink ppp must number fragments put right order arrive multilink ppp example link aggregation technology cisco ios release 11.1 later supports multilink ppp ppp one establish several simultaneous distinct ppp connections single link possible multilink ppp either multilink ppp uses contiguous numbers fragments packet consequence possible suspend sending sequence fragments one packet order send another packet prevents running multilink ppp multiple times links multiclass ppp kind multilink ppp class traffic uses separate sequence number space reassembly buffer multiclass ppp defined rfc 2686 pptp point-to-point tunneling protocol form ppp two hosts via gre using encryption mppe compression mppc many protocols used tunnel data ip networks like ssl ssh l2tp create virtual network interfaces give impression direct physical connections tunnel endpoints linux host example interfaces would called tun0 ppp0 two endpoints tunnel tunnel point-to-point connection ppp natural choice data link layer protocol virtual network interfaces ppp assign ip addresses virtual interfaces ip addresses used example route networks sides tunnel ipsec tunneling mode create virtual physical interfaces end tunnel since tunnel handled directly tcp/ip stack l2tp used provide interfaces technique called l2tp/ipsec case ppp provides ip addresses extremities tunnel ppp defined rfc 1661 point-to-point protocol july 1994 rfc 1547 requirements internet standard point-to-point protocol december 1993 provides historical information need ppp development series related rfcs written define variety network control protocols-including tcp/ip decnet appletalk ipx others-work ppp
[ 4609, 10242, 1030, 3592, 8211, 6681, 6682, 10271, 2080, 6177, 6689, 9251, 2085, 2087, 7208, 3629, 7214, 8238, 562, 1586, 9269, 11321, 3133, 4158, 5181, 6723, 11332, 8265, 4687, 592, 10833, 1618, 3167, 1121, 10851, 10341, 10344, 5225, 3695, ...
Test
8,433
2
Nokia_N950:nokia n950 nokia n950 developers-only phone aimed toward linux-based meego os nokia n9 developers 5,000 units produced sent developers throughout july 2011 nokia exclusively distributed device developers offered sale public phone exists several variations final device issued developers black 1 gb main memory 16 gb emmc internal storage whilst prototypes known model number n9-00 confused n9-01 silver 512 mb main memory 64 gb emmc although marked sale sold ebay €2,000 device received unofficial android port nitdroid community also port nemomobile firefox os nokia n950 phone uses hardware components nokia n9 phone following exceptions nokia n950 developers use tools nokia including qt sdk harmattan python software development
[ 1537, 8577, 3205, 11655, 9359, 1424, 529, 2449, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 7220, 821, 11062, 823, 5175, 7866, 1728, 7617, 4291, 708, 7492, 7877, 199, ...
Test
8,434
1
Oracle_SQL_Developer:oracle sql developer oracle sql developer integrated development environment ide working sql oracle databases oracle corporation provides product free uses java development kit oracle sql developer supports oracle products past variety third-party plugins supported users able deploy connect non-oracle databases oracle sql developer worked ibm db2 microsoft access microsoft sql server mysql sybase adaptive server amazon redshift teradata databases oracle sql developer supports automatic tabs code insight bracket matching syntax coloring pl/sql oracle sql developer product components include owa oracle web agent mod_plsql extension module apache web server helps setting dynamic web-pages pl/sql within oracle sql developer addition extensions provided oracle third parties written extensions add new features sql developer integrate products
[ 1539, 1668, 11030, 8353, 8994, 8871, 1707, 5677, 10413, 9010, 9012, 10553, 1594, 9665, 6338, 6341, 5960, 597, 9177, 6107, 1755, 2269, 865, 1250, 7523, 10340, 7022, 1399 ]
Train
8,435
9
T_(programming_language):programming language programming language dialect language scheme developed early 1980s jonathan a. rees kent m. pitman norman i. adams yale university experiment language design implementation purpose test thesis developed guy l. steele jr. gerald jay sussman series papers scheme scheme may used basis practical programming language exceptional expressive power implementations scheme could perform better lisp systems competitively implementations programming languages c bliss usually considered inherently efficient lisp conventional machine architectures much occurs via optimizing compiler named orbit contains features modern scheme lacks example object-oriented first-class environments called locales modified non-locally used module system several extra special forms lazy evaluation flow control equivalent common lisp setf like scheme supports call-with-current-continuation call/cc also limited form called codice_1 manual hypothetical implementation codice_2 could example shows objects intimately related closures message-passing primitive called codice_3 puts two objects together allowing something resembling inheritance ported many hardware platforms operating systems including
[ 10752, 4101, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 2105, 2620, 3132, 6717, 7234, 8258, 8771, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 7269, 8293, 2666, 5751, 7805, 7806, 9345, 1159, 9865, 9877, 5803, 2...
Test
8,436
2
Eben_Moglen:eben moglen eben moglen professor law legal history columbia university founder director-counsel chairman software freedom law center moglen started computer programming language designer received bachelor degree swarthmore college 1980 1985 received master philosophy history jd yale university held visiting appointments harvard university tel aviv university university virginia since 1987 law clerk justice thurgood marshall 1986–87 term joined faculty columbia law school 1987 admitted new york bar 1988 received ph.d. history yale university 1993 moglen serves director public patent foundation moglen part philip zimmermann defense team zimmermann investigated export pretty good privacy public key encryption system us export laws 2003 received eff pioneer award february 2005 founded software freedom law center moglen closely involved free software foundation serving general counsel 1994-2016 board member 2000 2007 counsel moglen charged enforcing gnu general public license gpl behalf fsf later became heavily involved drafting version 3 gpl april 23 2007 announced blog post would stepping board directors free software foundation moglen stated gplv3 discussion draft 3 released wanted devote time writing teaching software freedom law center february 2011 moglen created freedom box foundation design software small server called freedombox freedombox aims affordable personal server runs free software focus anonymous secure communication freedombox launched version 0.1 2012 moglen says free software fundamental requirement democratic free society surrounded dependent upon technical devices controlling devices open via free software balance power equally moglen metaphorical corollary faraday law idea information appearance flow human minds connected via internet works like electromagnetic induction hence moglen phrase resist resistance i.e remove anything inhibits flow information moglen believes idea proprietary software ludicrous proprietary mathematics proprietary geometry would convert subjects something learn something must buy argued points software among things copied infinitely without costs moglen criticized calls reification selfishness said world full computers ca n't understand ca n't fix ca n't use controlled inaccessible proprietary software world controlled machines called lawyers help free software movement saying want share code make products share work without additional legal risks urged legal colleagues worth giving little order produce sounder ecology think kindly idea sharing moglen criticized trends result excluding people knowledge issue free software versus proprietary software argued much said stand lose moglen calls sensible respect creators users software code general concept part moglen termed revolution privileged owners media distribution channels software march 13 2009 speech given seattle university moglen said free software movement 'when everybody owns press freedom press belongs everybody seems inevitable inference ’ moving publishers get used ’ become us ’ become first amendment mean 'congress shall make law ... abridging freedom speech press ... – tended argue course 20th century – 'congress shall make law infringing sacred right sulzbergers different subject digital rights management moglen said also live world right tinker substantial threat said movie record companies must eat concede must eat though like eat less
[ 2050, 1028, 2180, 4230, 11654, 9865, 4493, 1939, 2332, 10012, 9343, 3744, 802, 3618, 4265, 555, 11180, 6962, 5555, 2233, 9148, 10687, 8258, 10822, 5703, 1353, 5833, 4561, 8147, 1112, 3674, 2010, 8283, 7904, 8673, 9696, 10464, 3817, 9579, ...
None
8,437
5
Simple_Gateway_Control_Protocol:simple gateway control protocol simple gateway control protocol sgcp communications protocol used within voice internet protocol voip system superseded media gateway control protocol mgcp another implementation media gateway control protocol architecture simple gateway control protocol published several internet engineering task force ietf draft versions may july 1998 mauricio arango christian huitema telcordia technologies formerly bellcore protocol architecture decomposes telecommunications gateway located boundary public switched telephone network internet protocol ip network internet media gateway controller mgc ip network providing call device control multiple media gateways mgs handle actual media conversion analog digital circuits pstn simply connect residential telephones implementations architecture refer controller softswitch communication multiple media gateway controllers handled protocols session initiation protocol sip shortly publication sgcp merged internet protocol device control ipdc proposal sponsored level3 communications fall 1998 led definition media gateway control protocol jointly submitted ietf authors sgcp ipdc october 1998 mgcp used conceptual basis additions media gateway device protocol lucent resulting megaco/h.248 protocol gained formal standards-level status ietf international telecommunication union itu
[ 5472, 7681, 5576, 5843, 10271 ]
None
8,438
2
Mesa_(computer_graphics):mesa computer graphics mesa also called mesa3d mesa 3d graphics library open source software implementation opengl vulkan graphics api specifications mesa translates specifications vendor-specific graphics hardware drivers important users two graphics drivers mostly developed funded intel amd respective hardware amd promotes mesa drivers radeon radeonsi deprecated amd catalyst intel supported mesa driver proprietary graphics drivers e.g nvidia geforce driver catalyst replace mesa providing implementation graphics api open-source effort write mesa nvidia driver called nouveau mostly developed community besides 3d applications games modern display servers x.org glamor wayland weston use opengl/egl therefore graphics typically go mesa mesa hosted freedesktop.org initiated august 1993 brian paul still active project mesa subsequently widely adopted contains numerous contributions various individuals corporations worldwide including graphics hardware manufacturers khronos group administer opengl specification linux development also partially driven crowdfunding mesa known housing implementation graphic apis historically main api mesa implemented opengl along khronos group related specifications like openvg opengl es recently egl mesa implement apis indeed glide deprecated direct3d 9 since july 2013. mesa also specific unix-like operating systems windows example mesa provides opengl api directx mesa implements translation layer graphics api opengl graphics hardware drivers operating system kernel supported version different graphic apis depends driver hardware driver implementation therefore status specially true classic drivers gallium3d drivers share common code tend homogenize supported extensions versions mesa maintains support matrix status current opengl conformance visualized mesa 10 complies opengl 3.3 intel amd/ati nvidia gpu hardware mesa 11 announced drivers opengl 4.1 compliant mesa 12 contains opengl 4.2 4.3 intel vulkan 1.0 support mesa 13 brought intel support opengl 4.4 4.5 features supported intel gen 8+ radeon gcn nvidia fermi kepler khronos-test 4.5-label experimental amd vulkan 1.0 support community driver radv opengl es 3.2 possible intel skylake gen9 1st stable version 2017 17.0 new year counting ready features certified opengl 4.5 opengl 4.5 intel haswell opengl 4.3 nvidia maxwell pascal gm107+ huge performance gain measured maxwell 1 geforce gtx 750 ti gm1xx maxwell-2-cards geforce gtx 980 gm2xx underclocked without nvidia information khronos cts test suite opengl 4.4 4.5 opengl es 3.0+ 2017-01-24 open source tests mesa 13 17 possible without costs 2nd stable version 2017 17.1.0 came 10 may 2017 interesting improvements opengl 4.2+ intel ivy bridge opengl 3.3+ intel open swr rasterizer 2 highlights note due modularized nature opengl mesa actually support extensions newer versions opengl without claiming full support versions example july 2016 mesa supported opengl es 3.1 also opengl es 3.2 extensions except five well number extensions part opengl opengl es version open question mesa linux high dynamic range hdr many problems open points pipe clean basic implementation 3rd version 17.2 available since september 2017 new opengl 4.6 features velocity improvements 3d intel amd 1.4 tests fail opengl 4.5 nouveau kepler 4th version 17.3 ready since december 2017 many improvements many drivers available opengl 4.6 nearly fully available spir-v ready amd vulkan driver radv fully conformant khronos-test 1st version 2018 18.0 available since march 2018 scheme 2017 full opengl 4.6 support ready many features improvements successfully tested rc3 10-bit support intel i965 colors also highlight new support intel cannon lake amd vega actual linux version amd evergreen chips rv800 r900 near opengl 4.5 support old amd r600 rv700 chips support opengl 3.3 features opengl 4.x freedreno driver adreno hardware near opengl 3.3 support 2nd version 2018 18.1 available since may target vulkan 1.1.72 intel anv amd radv driver opengl 4.6 spir-v also main target permanent work possible completion features optimization drivers older hardware like amd r600/evergreen nvidia tesla fermi kepler intel sandybridge ivybridge haswell broadwell arm architecture made also great improvements adreno 3xx/4xx/5xx broadwell vc4/vc5 raspi main target opengl es 3rd version 2018 18.2 available calendar stable september opengl 4.6 spir-v vulkan 1.1.80 wip soft driver virtual machines virgl ready opengl 4.3 opengl es 3.2 radeonsi also ready opengl es 3.2 astc texture compression support compatibility modus support opengl 4.4 3.1 18.1 highlights radeonsi amd gcn cards new vulkan 1.1 features intel amd available see details vulkan mesamatrix 4th version 2018 18.3 released stable version 18.3.1 december 2018 many features detail support newer hardware main parts full support opengl 4.6 ready 1st version 2019 19.0 released march full support opengl 4.6 ready many improvements way drivers 2nd version 2019 19.1 transition tgsi nir one main feature way opengl 4.6 spir-v opencl radeonsi runs well dev-version nir 3rd version 2019 19.2 opengl 4.6 ready intel iris driver khronos group officially announced vulkan api march 2015 officially released vulkan 1.0 february 16 2016 vulkan breaks compatibility opengl completely abandons monolithic state machine concept developers gallium3d called vulkan something along lines gallium3d 2.0 – gallium3d separates code implements opengl state machine code specific hardware gallium3d ingests tgsi vulkan ingests spir-v standard portable intermediate representation version v vulkan intel released implementation vulkan driver hardware day specification officially released mainlined april became part mesa 12.0 released july 2016 already i965 driver n't written according gallium3d specifications vulkan driver makes even less sense flange top gallium3d similarly technical reason flange nir yet intel employees implemented vulkan driver way expected amd proprietary vulkan driver released march announced released free open-source software future mainlined mesa also abandons gallium3d radv free project amd available since version 13 conformance khronos-test came version 17.3 actual full support vulkan 1.0 1.1 since mesa 18.1 nvidia released proprietary geforce driver vulkan support launch day imagination technologies powervr qualcomm adreno arm mali done least announced proprietary vulkan drivers android operating systems whether additional free open-source vulkan implementations gpus show remains seen mesa software driver virgl starts vulkan development 2018 gsoc projects support virtual machines kind memory barrier separates one buffer rest memory called fence fences ensure buffer overwritten rendering display operations completed implicit fencing used synchronization graphics drivers gpu hardware fence signals buffer longer used one component operated reused another past linux kernel implicit fencing mechanism fence directly attached buffer cf gem handles fds userspace unaware explicit fencing exposes fences userspace userspace gets fences direct rendering manager drm subsystem gpu explicit fencing required vulkan offers advantages tracing debugging linux kernel 4.9 added android synchronization framework mainline generic buffer management gbm api provides mechanism allocating buffers graphics rendering tied mesa gbm intended used native platform egl drm openwfd handle creates used initialize egl create render target buffers mesa gbm abstraction graphics driver specific buffer management apis instance various libdrm_* libraries implemented internally calling mesa gpu drivers example wayland compositor weston rendering using opengl es 2 initializes calling egl since server runs bare kms driver uses egl drm platform could really called gbm platform since relies mesa gbm interface xdc2014 nvidia employee andy ritger proposed enhance egl order replace gbm three possible ways calculations necessary encoding decoding video streams example nouveau developed part mesa also includes linux kernel component developed part linux kernel supports purevideo-branded asics provides access vdpau partly xvmc free radeon driver supports unified video decoder video coding engine vdpau openmax please note v4l2 kernel-to-user-space interface video bit streams delivered webcams tv tuners available free open-source device drivers graphic chipsets stewarded mesa existing free open-source implementation apis developed inside mesa currently two frameworks write graphics drivers classic gallium3d overview drivers available mesa given device drivers amd/ati r100 r800 intel nvidia cards 3d acceleration previously drivers existed ibm/toshiba/sony cell apu playstation 3 s3 virge savage chipsets via chipsets matrox g200 g400 free open-source drivers compete proprietary closed-source drivers depending availability hardware documentation man-power free open-source driver lag behind less supporting 3d acceleration new hardware also 3d rendering performance usually significantly slower notable exceptions today still true nouveau nvidia gpus amds radeon gpus open driver mostly matches exceeds proprietary driver performance time 3d graphics cards became mainstream pcs individuals partly supported companies began working adding support hardware-accelerated 3d rendering mesa direct rendering infrastructure dri one approaches interface mesa opengl 3d rendering api libraries device drivers hardware reaching basic level usability dri support officially added mesa significantly broadened available range hardware support achievable using mesa library adapting dri mesa library finally took role front end component full scale opengl framework varying backend components could offer different degrees 3d hardware support dropping full software rendering capability total system used many different software components design requires components interact carefully interfaces relatively fixed nonetheless components interacting mesa stack open source experimental work often done altering several components well interfaces experiments prove successful incorporated next major minor release applies e.g update dri specification developed 2007-2008 timeframe result experimentation dri2 operates without locks improved back buffer support special git branch mesa created dri3 supported intel driver since 2013 default linux distributions since 2016 enable vulkan support also default amd hardware since late 2016 x.org server 1.18.3 newer mesa also contains implementation software rendering called swrast allows shaders run cpu fallback graphics hardware accelerators present gallium software rasterizer known softpipe built support llvm llvmpipe generates cpu code runtime since mesa 10.x opengl 3.3+ supported softpipe 10.3 llvmpipe 10.2 actual 80 features opengl 4.x implemented mesa 17.3 see mesamatrix mesa 12.0 new intel rasterizer openswr available high advantages clusters large data sets focused engineering visualisation game art imagery work x86 processors hand opengl 3.1+ supported acceleration values 29 51 related llvmpipe measured examples change option gallium_driver= swr necessary opengl 3.3+ supported openswr since mesa 17.1 virgl rasterizer virtual machines implemented mesa 11.1 since 2015 opengl 3.3 support showed mesamatrix since mesa 18 actual new mesa 18.2 supports others opengl 4.3 opengl es 3.2 80 opengl 4.4 4.5 features also ready vulkan development starts gsoc 2018 projects idea bundling multiple drivers single mega driver proposed eric anholt allows single copy shared mesa code used among multiple drivers instead existing driver separately offering better performance separate shared library due removal internal library interface state trackers vdpau xvmc become separate libraries shader-db collection 20,000 shaders gathered various computer games benchmarks well scripts compile collect statistics shader-db intended help validate optimization noticed unexpected number shaders hand-written generated means shaders originally written hlsl translated glsl translator program e.g hlsl2glsl problem generated code often far optimal matt turner said much easier fix translator program make mesa compiler carry burden dealing bloated shaders shader-db considered free open-source software use legally one must license computer games shaders part least valve corporation granted mesa debian developers free personal licenses games distributed steam so-called user-mode graphics device drivers umd mesa commonalities generally called device driver couple differences one goal mesa optimization code executed respective gpu another sharing code instead documenting pieces software wikipedia article shall instead look intermediate representations used process compiling optimizing see abstract syntax tree ast static single assignment form ssa form spir-v certain version standard portable intermediate representation idea graphics applications output spir-v instead glsl contrast latter spir-v binary avoid implementation differences glsl compiler frontends different driver implementations major source application incompatiblities bugs also spir-v binary usually also passed general optimizations also degree spir-v binary representation offers degree obfuscation might appeal software vendors form intellectual property protection however spir-v contains ample information reflection tools exist translate spir-v back high quality human readable high level code umd needs apply optimizations specific supported hardware nir extended next releases base spir-v support llvmpipe radeonsi noveau change next nir tgsi tungsten graphics shader infrastructure tgsi introduced 2008 tungsten graphics gallium3d-style umds ingest tgsi umds codice_2 codice_3 output machine code instead llvm ir llvm optimizations compilation machine code mean certain minimum version llvm installed well mesa glsl compiler generates ir driver different requirements lir differentiates hir high-level ir lir low-level ir gallium3d set interfaces collection supporting libraries intended ease programming device drivers 3d graphics chipsets multiple operating systems rendering video acceleration apis feature matrix provided galliumstatus efforts writing free open-source device drivers graphics chips separately documented wikipedia free open-source graphics device driver development gallium3d started 2008 tungsten graphics implementation available free open-source software part mesa 3d hosted freedesktop.org primary goal making driver development easier bundling otherwise duplicated code several different drivers single point support modern hardware architectures done providing better division labor example leaving memory management kernel dri driver gallium3d part mesa since 2009 currently used free open-source graphics driver nvidia nouveau project r300–r900 free open-source gpu device drivers gallium3d eases programming device drivers splitting graphics device driver three parts accomplished introduction two interfaces gallium3d state tracker interface gallium3d winsys interface three components called gallium3d state tracker gallium3d hardware device driver gallium3d winsys gallium3d provides unified api exposing standard hardware functions shader units found modern hardware thus 3d apis opengl 1.x/2.x opengl 3.x openvg gpgpu infrastructure even direct3d found wine compatibility layer need single back-end called state tracker targeting gallium3d api contrast classic-style dri device drivers require different back-end hardware platform several apis need translation opengl expense code duplication vendor device drivers due proprietary closed-source nature written way meaning e.g amd catalyst implements opengl direct3d vendor drivers geforce implementations gallium3d direct rendering manager drm kernel drivers manage memory direct rendering interface dri2 drivers gpu processing oriented transition period userspace modesetting kernelspace modesetting mesa 3d drivers radeon driver intel drivers ended supporting dri1 dri2 used dri2 available system gallium3d additionally requires level shader support available older cards like e.g ati r100-r200 users cards need keep using mesa 3d dri2 3d usage tungsten graphics shader infrastructure tgsi intermediate representation like llvm intermediate representation new standard portable intermediate representation spir used vulkan api opencl 2.1 shaders written opengl shading language translated/compiled tgsi optimizations made tgsi shaders compiled shaders instruction set used gpu addition using modular structure gallium3d effort underway use llvm compiler suite create module optimize shader code fly library represents shader program using extensible binary intermediate representation called tungsten graphics shader infrastructure tgsi llvm translates glsl shaders optimized target hardware several free open-source graphics device drivers written based information gained clean-room reverse engineering adopted driver model provided gallium3d e.g nouveau others see free open-source graphics device driver complete list main reason may gallium3d driver model lessens amount code required written course licensed free software license code time anybody rewritten implement dri- driver model original authors gallium3d keith whitwell brian paul tungsten graphics acquired vmware 2008 fall 2011 least 10 known mature working gallium3d drivers open-source drivers nvidia graphics cards name nouveau team develops drivers using gallium3d framework 2008-07-13 nouveau development done exclusively gallium framework old dri driver removed master branch mesa repository freedesktop.org 2009-02-11 gallium-0.2 branch merged mainline master branch mesa development done mesa mainline 2009-02-25 gallium3d run linux well freebsd kernels 2009-05-01 zack rusin tungsten graphics added openvg state tracker mesa 3d enables scalable vector graphics hardware-accelerated gallium3d-based driver 2009-07-17 mesa3d 7.5 released first version include gallium3d 2010-09-10 initial support evergreen gpus added r600g driver 2010-09-21 two gallium3d drivers ati hardware known r300g r600g r300-r500 r600-evergreen gpus respectively 2010-09-21 major commits made code support direct3d 10 11 time might offer ability use recent direct3d implementations gnu/linux systems 2011-11-30 intel 965g cell gallium drivers removed master branch mesa unmaintained broken 2013-11-30 mesa 10 opengl 3.2 3.3 opencl 1.0+ 2014-11-18 major commits made code support direct3d 9 2015-09-15 mesa 11 opengl 4.0 4.1 opencl 1.2 incomplete 2015-12-15 mesa 11.1 driver virgl virtual machines opengl 3.3 2016-07-08 mesa 12 opengl 4.2 4.3 vulkan 1.0 intel anv amd radv 2016-11-01 mesa 13 opengl 4.4 opengl es 3.2 2017-02-13 mesa 17.0 opengl 4.5 freedreno driver opengl 3.0 3.1 2017-05-10 mesa 17.1 opengl 4.2+ intel ivy bridge intel driver windows opengl 3.3+ intel open swr rasterizer important cluster computer huge simulations 2017-12-08 mesa 17.3 amd vulkan driver radv full compliant khronos test vulkan 1.0 2018-05-18 mesa 18.1 vulkan 1.1 intel anv amd radv 2018-09-07 mesa 18.2 opengl 4.3 soft driver virgl important virtual machines cloud cluster computer opengl es 3.1 freedreno adreno a5xx project initiator brian paul graphics hobbyist thought would fun implement simple 3d graphics library using opengl api might use instead vogl ordinary gl like library beginning 1993 spent eighteen months part-time development released software internet software well received people began contributing development mesa started rendering 3d computer graphics cpu despite internal architecture mesa designed open attaching graphics processor-accelerated 3d rendering first phase rendering done indirectly display server leaving overhead noticeable speed lagging behind theoretical maximum diamond monster 3d using voodoo graphics chipset one first 3d hardware devices supported mesa first true graphics hardware support added mesa 1997 based upon glide api new 3dfx voodoo i/ii graphics cards successors major problem using glide acceleration layer habit glide run full screen suitable computer games glide took lock screen memory thus display server blocked gui tasks
[ 9604, 1801, 5514, 2955, 6153, 7309, 3734, 2711, 4886, 9882, 10016, 10785, 10658, 8995, 6180, 4902, 6311, 6694, 10407, 7978, 8621, 7983, 1842, 439, 823, 2361, 11322, 9276, 9533, 10173, 9151, 833, 6981, 2383, 10703, 5975, 3033, 7421, 10971, ...
None
8,439
2
Kernel-based_Virtual_Machine:kernel-based virtual machine kernel-based virtual machine kvm virtualization module linux kernel allows kernel function hypervisor merged linux kernel mainline kernel version 2.6.20 released february 5 2007 kvm requires processor hardware virtualization extensions intel vt amd-v. kvm also ported operating systems freebsd illumos form loadable kernel modules kvm originally designed x86 processors since ported s/390 powerpc ia-64 arm kvm provides hardware-assisted virtualization wide variety guest operating systems including linux bsd solaris windows haiku reactos plan 9 aros research operating system macos addition android 2.2 gnu/hurd debian k16 minix 3.1.2a solaris 10 u3 darwin 8.0.1 together operating systems newer versions listed known work certain limitations additionally kvm provides paravirtualization support linux openbsd freebsd netbsd plan 9 windows guests using virtio api includes paravirtual ethernet card disk i/o controller balloon device vga graphics interface using spice vmware drivers avi kivity began development kvm qumranet technology startup company acquired red hat 2008 kvm surfaced october 2006 merged linux kernel mainline kernel version 2.6.20 released 5 february 2007 kvm maintained paolo bonzini kvm perform emulation instead exposes /dev/kvm interface userspace host use linux qemu versions 0.10.1 later one userspace host qemu uses kvm available virtualize guests near-native speeds otherwise falls back software-only emulation internally kvm uses seabios open source implementation 16-bit x86 bios kvm support hot plug vcpus dynamic memory management live migration since february 2007 among features kvm parts licensed various gnu licenses
[ 6150, 4616, 6153, 2058, 3082, 18, 5139, 10264, 10776, 10780, 10785, 6180, 8242, 9266, 7733, 4161, 5697, 8772, 6213, 3654, 5702, 8266, 8268, 589, 1102, 7248, 593, 10851, 6244, 11363, 5222, 10856, 4207, 4729, 10363, 5244, 4734, 11391, 2179, ...
Train
8,440
0
Text_mining:text mining text mining also referred text data mining roughly equivalent text analytics process deriving high-quality information text high-quality information typically derived devising patterns trends means statistical pattern learning text mining usually involves process structuring input text usually parsing along addition derived linguistic features removal others subsequent insertion database deriving patterns within structured data finally evaluation interpretation output 'high quality text mining usually refers combination relevance novelty interest typical text mining tasks include text categorization text clustering concept/entity extraction production granular taxonomies sentiment analysis document summarization entity relation modeling i.e learning relations named entities text analysis involves information retrieval lexical analysis study word frequency distributions pattern recognition tagging/annotation information extraction data mining techniques including link association analysis visualization predictive analytics overarching goal essentially turn text data analysis via application natural language processing nlp analytical methods typical application scan set documents written natural language either model document set predictive classification purposes populate database search index information extracted term text analytics describes set linguistic statistical machine learning techniques model structure information content textual sources business intelligence exploratory data analysis research investigation term roughly synonymous text mining indeed ronen feldman modified 2000 description text mining 2004 describe text analytics latter term used frequently business settings text mining used earliest application areas dating 1980s notably life-sciences research government intelligence term text analytics also describes application text analytics respond business problems whether independently conjunction query analysis fielded numerical data truism 80 percent business-relevant information originates unstructured form primarily text techniques processes discover present knowledge – facts business rules relationships – otherwise locked textual form impenetrable automated processing subtasks—components larger text-analytics effort—typically include text mining technology broadly applied wide variety government research business needs three groups may use text mining records management searching documents relevant daily activities legal professionals may use text mining e-discovery governments military groups use text mining national security intelligence purposes scientific researchers incorporate text mining approaches efforts organize large sets text data i.e. addressing problem unstructured data determine ideas communicated text e.g. sentiment analysis social media support scientific discovery fields life sciences bioinformatics business applications used support competitive intelligence automated ad placement among numerous activities many text mining software packages marketed security applications especially monitoring analysis online plain text sources internet news blogs etc national security purposes also involved study text encryption/decryption range text mining applications biomedical literature described including computational approaches assist studies protein docking protein interactions protein-disease associations addition large patient textual datasets clinical field datasets demographic information population studies adverse event reports text mining facilitate clinical studies precision medicine text mining algorithms facilitate stratification indexing specific clinical events large patient textual datasets symptoms side effects comorbidities electronic health records event reports reports specific diagnostic tests one online text mining application biomedical literature pubgene publicly accessible search engine combines biomedical text mining network visualization gopubmed knowledge-based search engine biomedical texts text mining techniques also enable us extract unknown knowledge unstructured documents clinical domain text mining methods software also researched developed major firms including ibm microsoft automate mining analysis processes different firms working area search indexing general way improve results within public sector much effort concentrated creating software tracking monitoring terrorist activities text mining used large media companies tribune company clarify information provide readers greater search experiences turn increases site stickiness revenue additionally back end editors benefiting able share associate package news across properties significantly increasing opportunities monetize content text mining starting used marketing well specifically analytical customer relationship management coussement van den poel 2008 ref name= 10.1016/j.im.2008.01.005 /ref apply improve predictive analytics models customer churn customer attrition text mining also applied stock returns prediction sentiment analysis may involve analysis movie reviews estimating favorable review movie analysis may need labeled data set labeling affectivity words resources affectivity words concepts made wordnet conceptnet respectively text used detect emotions related area affective computing text based approaches affective computing used multiple corpora students evaluations children stories news stories issue text mining importance publishers hold large databases information needing indexing retrieval especially true scientific disciplines highly specific information often contained within written text therefore initiatives taken nature proposal open text mining interface otmi national institutes health common journal publishing document type definition dtd would provide semantic cues machines answer specific queries contained within text without removing publisher barriers public access academic institutions also become involved text mining initiative computational methods developed assist information retrieval scientific literature published approaches include methods searching determining novelty clarifying homonyms among technical reports automatic analysis vast textual corpora created possibility scholars analyze millions documents multiple languages limited manual intervention key enabling technologies parsing machine translation topic categorization machine learning automatic parsing textual corpora enabled extraction actors relational networks vast scale turning textual data network data resulting networks contain thousands nodes analyzed using tools network theory identify key actors key communities parties general properties robustness structural stability overall network centrality certain nodes automates approach introduced quantitative narrative analysis whereby subject-verb-object triplets identified pairs actors linked action pairs formed actor-object content analysis traditional part social sciences media studies long time automation content analysis allowed big data revolution take place field studies social media newspaper content include millions news items gender bias readability content similarity reader preferences even mood analyzed based text mining methods millions documents analysis readability gender bias topic bias demonstrated flaounas et al showing different topics different gender biases levels readability possibility detect mood patterns vast population analyzing twitter content demonstrated well text mining computer programs available many commercial open source companies sources see list text mining software lack flexibilities european copyright database law mining in-copyright works web mining without permission copyright owner illegal uk 2014 recommendation hargreaves review government amended copyright law allow text mining limitation exception second country world following japan introduced mining-specific exception 2009 however owing restriction copyright directive uk exception allows content mining non-commercial purposes uk copyright law allow provision overridden contractual terms conditions european commission facilitated stakeholder discussion text data mining 2013 title licenses europe fact focus solution legal issue licenses limitations exceptions copyright law led representatives universities researchers libraries civil society groups open access publishers leave stakeholder dialogue may 2013 contrast europe flexible nature us copyright law particular fair use means text mining america well fair use countries israel taiwan south korea viewed legal text mining transformative meaning supplant original work viewed lawful fair use example part google book settlement presiding judge case ruled google digitization project in-copyright books lawful part transformative uses digitization project displayed—one use text data mining recently websites often used text-based searches found documents containing specific user-defined words phrases use semantic web text mining find content based meaning context rather specific word additionally text mining software used build large dossiers information specific people events example large datasets based data extracted news reports built facilitate social networks analysis counter-intelligence effect text mining software may act capacity similar intelligence analyst research librarian albeit limited scope analysis text mining also used email spam filters way determining characteristics messages likely advertisements unwanted material text mining plays important role determining financial market sentiment increasing interest paid multilingual data mining ability gain information across languages cluster similar items different linguistic sources according meaning challenge exploiting large proportion enterprise information originates unstructured form recognized decades recognized earliest definition business intelligence bi october 1958 ibm journal article h.p luhn business intelligence system describes system ... utilize data-processing machines auto-abstracting auto-encoding documents creating interest profiles 'action points organization incoming internally generated documents automatically abstracted characterized word pattern sent automatically appropriate action points yet management information systems developed starting 1960s bi emerged '80s '90s software category field practice emphasis numerical data stored relational databases surprising text unstructured documents hard process emergence text analytics current form stems refocusing research late 1990s algorithm development application described prof. marti a. hearst paper untangling text data mining almost decade computational linguistics community viewed large text collections resource tapped order produce better text analysis algorithms paper attempted suggest new emphasis use large online text collections discover new facts trends world suggest make progress need fully artificial intelligent text analysis rather mixture computationally-driven user-guided analysis may open door exciting new results hearst 1999 statement need fairly well describes state text analytics technology practice decade later
[ 2176, 10497, 5122, 1027, 5635, 2440, 2059, 140, 3979, 2318, 6798, 11538, 10231, 1044, 5399, 2456, 8216, 538, 416, 4131, 5288, 10794, 3629, 2223, 3888, 7599, 4531, 4662, 3127, 2488, 10557, 6208, 5830, 10313, 5450, 3533, 5197, 6223, 10319, ...
Test
8,441
2
Mac_OS_X_Server_1.0:mac os x server 1.0 mac os x server 1.0 released march 16 1999 first operating system released retail market apple computer based next technology final release product code-named rhapsody interim combination openstep system mach os openstep api mac os 8 although mac os x server 1.0 graphical look feel variation platinum theme mac os 8 infrastructure based openstep thus nextstep operating system instead classic mac os resulting product gave users preview operating system become mac os x referred macos mac os x server never officially known simply mac os x ultimately rendered obsolete mac os x v10.0 2001 macos server server 1.0 contains mix features classic mac os nextstep mac os x like classic mac os single menu bar across top screen file management performed workspace manager nextstep instead classic mac os finder user interface still uses display postscript-based window server nextstep instead quartz-based windowserver would appear year later mac os x public beta unlike version classic mac os windows unsaved content display black dot window close button like nextstep dock aqua appearance included added later mac os x carbon essentially subset classic mac os api calls also absent meant native applications os x server 1.0 written yellow box api went become known cocoa furthermore apple firewire supported server 1.0 also includes first version netboot server allows computers boot disk image local network particularly useful school public-machine setting allowed machines booted single os copy stored server 1.0 made difficult users damage os installing software – soon signed machine would re-boot fresh os netboot server run classic mac os applications mac os x server 1.0 includes blue box essentially ran copy mac os 8.5.1 could updated mac os 8.6 version 1.2 later separate process emulation layer blue box would eventually renamed classic environment mac os x featuring latest version mac os 9
[ 10755, 9732, 1542, 4615, 2571, 1549, 5647, 1042, 4114, 6186, 6700, 4657, 1074, 8754, 9784, 8767, 576, 8774, 9802, 5713, 3670, 1623, 4184, 9308, 2141, 4702, 3167, 3681, 2149, 3691, 8303, 8304, 6771, 2676, 6264, 2686, 7806, 9343, 3719, 1088...
None
8,442
3
Socket_495:socket 495 socket 495 sometimes referred µpga2 cpu socket intel pentium iii celeron mobile processors socket also used microsoft xbox console bga ball grid array format socket replaced socket 615 µpga1 used pentium ii early celeron mobile processors socket 495 pin cpu socket designed house processor socket 495 package socket 1.27mm pitch designed support heatsink
[ 3588, 5901, 5523, 2455, 3992, 8855, 11417, 3995, 4252, 6175, 7714, 10019, 4523, 2604, 2350, 6192, 9649, 4537, 7105, 4805, 7110, 8394, 3403, 4427, 4179, 3798, 4185, 7002, 9945, 11484, 9570, 10468, 613, 8552, 1260, 4717, 10225, 371, 9592 ]
Test
8,443
5
Beonex_Communicator:beonex communicator beonex communicator discontinued open-source internet suite based mozilla application suite mas ben bucksch german mozilla developer intended higher security privacy level commercial products internet suite contains web browser email news client html editor based mozilla composer irc client based chatzilla beonex business services offered suite free provided documentation easy install routines third-party plug-ins tried sell support customer-specific changes browser main goal implement kerberos openpgp ldap beonex marked failed mid-2004 discontinued reaching production release stage mozilla organization stated mozilla application suite developers testing purposes meant end users 5 january 2001 beonex included linux distribution kmlinux version s-0.4 removed version s-0.5 released 23 march 2001 beonex 0.8 released june 2002 received positive reviews speed beonex launcher beol spoken b-o-l additional upcoming product never left alpha status stripped-down version beonex communicator web browser combined email client chat client preview releases version 0.9 mid-2002 bucksch showed new features wanted integrate version gained stable status announced 2 march 2004 new releases planned mozilla foundation decided future policy 2005 mozilla foundation officially changed policies created mozilla corporation provide end-user support beonex communicator 0.8.2-stable several known security issues beonex never received much market share browser transmit referrers default possibility create fake referrers browser deletes cookies upon exiting disables several javascript functions could served attack vectors beonex also allows changing user agent following comparison table releases netscape mas included complete table see gecko layout engine contrast netscape beonex included nearly features except proprietary parts like integrated net2phone aol instant messenger online chatting chatzilla integrated sidebar search engines also pre-configured beonex less resource-intensive netscape beonex includes migration tool import old profiles netscape communicator beonex communicator fork mas rather separate branch significant changes made html email javascript turned default thus displays email plain text bold cursive additions added later mas 1.1 search engines compatible mycroft project located sidebar providing features
[ 513, 6657, 9736, 2579, 9747, 6171, 9757, 7713, 3110, 10791, 9770, 559, 1075, 2101, 4661, 3639, 10808, 3643, 9275, 64, 9281, 5707, 3578, 10834, 6231, 7255, 8281, 6747, 5724, 1642, 9834, 10860, 10861, 9841, 115, 9843, 3191, 119, 4728, 637, ...
Test
8,444
3
Spy_vs._Spy_(1984_video_game):spy vs. spy 1984 video game spy vs. spy game written michael riedel commodore 64 published first star software 1984 port atari 8-bit family released simultaneously two-player split-screen game based mad magazine long running cartoon strip spy vs. spy slapstick antics two spies trying kill improbably elaborate traps weapons ported apple ii zx spectrum acorn electron atari st bbc micro commodore 16 msx amstrad cpc amiga master system game boy game boy color nintendo entertainment system emulated game boy advance object game collect various secret items briefcase exit building door airport opposing player timer runs searching items traps laid take opponent player careless spy personal countdown timer depletes 30 seconds upon death arena embassy constructed series interconnected rooms laid grid pattern higher levels rooms therefore larger play area well hand-to-hand combat achieved wiggling joystick directional pad left right spies proximity spies place traps furniture doors occupy playing area traps triggered spy searches piece furniture item opens booby trapped door resulting cartoon style animation showing subject shot blown etc floating heaven angel strategy introduced limiting quantity trap spy use allowing traps triggered either spy pieces furniture also contain 'remedies match specific traps – allow trap defused fetched one time video magazine described rousing action-strategy contest praised game excellent graphics befit ting game rooted visual medium reviewer also noted one successfully captured original feel source offered satisfying result ahoy agreed review calling faithful adaptation comics praising simultaneous two-player one-player options antic called one original clever games atari computers yet magazine praised simultaneous two-player display concluded recommend game highly enough zx spectrum version rated number 20 sinclair official top 100 games time remake including original version released ios 2012 longer available two sequels original 1984 game produced spy vs. spy ii island caper spy vs. spy iii arctic antics third game also released ibm pc kept basic gameplay tweaking core features spy vs. spy ii island caper adds side-scrolling play area spies longer start fixed number traps must collect raw materials build spy vs. spy iii arctic antics switches location tropical island arctic spies fight throwing snowballs setting traps decreases body heat bar tools include saw cut holes ice second player fall lost body heat restored moving heated igloo
[ 4705, 9006 ]
Test
8,445
3
Longene:longene longene linux-based operating system kernel intended binary compatible application software device drivers made microsoft windows linux 1.0-rc2 consists linux kernel module implementing aspects windows kernel modified wine distribution designed take advantage native interface longene written c programming language free open source software licensed terms gnu general public license version 2 gplv2 although project alpha stage development 2015 many windows programs already work well official website gone august restored 2019 meanwhile source code remains available github longene aims add windows kernel mechanisms including system calls windows registry windows driver model deferred procedure call others linux kernel form new kernel new kernel allow linux windows applications device drivers work without virtualization emulation order prevent bloating function available reactos linux kernel linux implementation used functions implemented using linux loadable kernel modules loaded unloaded easily longene two sets system calls corresponding tables windows syscall set linux syscall set windows applications call syscall table via software interrupt int 0x2e linux applications call syscall table via int 0x80 longene project develop windows linux userland libraries libraries offered others projects wine reactos gnu ndiswrapper september 2005 longene project gained sponsorship insigma technology 浙大网新 china-based consulting corporation project leader decao mao 毛德操 proposed idea route longene wrote series articles market intellectual property rights techniques explain people needed project implement longene articles mao wrote compiled form white paper project according white paper implement longene one needs add several parts linux kernel longene uses wine base implementing windows api project re-implements wine modules use part joint kernel longene defers using wine modules sufficiently implemented project versions longene released several wine modules successfully implemented kernel new stable version used base implementing future modules windows api implemented wine developed modules scratch since longene kernel work windows nt kernel wine userspace kernel emulation wineserver needed device drivers longene imports ndiswrapper kernel modifications made ndiswrapper missing functionality windows driver model using reactos code reference windows driver kit implementation based reactos code uses combination redirecting drivers linux kernel resources additional libraries implement functions implemented linux earlier version unifiedkernel-2.6.13 released february 15 2006 version actualized windows system call mechanism developers currently working longene 2.0 support windows applications running non-x86 architecture hardware arm loongson additionally developers working amd64 support porting ndiswrapper code project yet implemented planned magic linux – magic linux chinese linux distribution based red hat linux version 2.1 magic linux released december 15 2008 includes main version dvd linux kernel 2.6.25.20 compact version cd linux kernel 2.6.25.20 longene version cd longene 0.2.2 minimum hardware requirements run
[ 5380, 6153, 6797, 7057, 10902, 10016, 3235, 7983, 9009, 823, 8262, 11221, 1501, 1632, 8161, 1513, 5356, 9964, 9839, 5363, 9851, 2045 ]
None
8,446
6
Cloud_storage:cloud storage cloud storage model computer data storage digital data stored logical pools physical storage spans multiple servers sometimes multiple locations physical environment typically owned managed hosting company cloud storage providers responsible keeping data available accessible physical environment protected running people organizations buy lease storage capacity providers store user organization application data cloud storage services may accessed colocated cloud computing service web service application programming interface api applications utilize api cloud desktop storage cloud storage gateway web-based content management systems cloud computing believed invented joseph carl robnett licklider 1960s work arpanet connect people data anywhere time 1983 compuserve offered consumer users small amount disk space could used store files chose upload 1994 launched personalink services online platform personal business communication entrepreneurship storage one first web-based referenced commercials think electronic meeting place cloud amazon web services introduced cloud storage service aws s3 2006 gained widespread recognition adoption storage supplier popular services smugmug dropbox pinterest 2005 box announced online file sharing personal cloud content management service businesses cloud storage based highly virtualized infrastructure like broader cloud computing terms accessible interfaces near-instant elasticity scalability multi-tenancy metered resources cloud storage services utilized off-premises service amazon s3 deployed on-premises vion capacity services cloud storage typically refers hosted object storage service term broadened include types data storage available service like block storage object storage services like amazon s3 oracle cloud storage microsoft azure storage object storage software like openstack swift object storage systems like emc atmos emc ecs hitachi content platform distributed storage research projects like oceanstore vision cloud examples storage hosted deployed cloud storage characteristics cloud storage outsourcing data storage increases attack surface area companies permanent services products provide change outsourcing data storage another company needs careful investigation nothing ever certain contracts set stone worthless company ceases exist circumstances change companies several options available avoid issues one option use private cloud instead public cloud well providers offer private cloud storage another option ingest data encrypted format key hold within premise infrastructure access often use cloud storage gateways premise gateways options encrypt compress data prior transfer well mirror storage across multiple cloud storage providers remove risk single providers shutdown gateways offer well option cache data recently used algorithm premise along data analytics data cached fetched valuable form instead recently used form
[ 1539, 526, 1551, 4623, 2066, 19, 10265, 5662, 5666, 9766, 39, 5159, 3121, 5681, 5689, 10820, 4683, 590, 1102, 7248, 5202, 4704, 4193, 4194, 5732, 7794, 119, 2170, 7802, 9343, 2694, 6280, 4236, 10893, 2703, 5791, 2720, 6307, 4260, 5797, ...
Test
8,447
3
Application_checkpointing:application checkpointing checkpointing technique add fault tolerance computing systems basically consists saving snapshot application state restart point case failure particularly important long running applications executed failure-prone computing systems distributed computing checkpointing technique helps tolerate failures otherwise would force long-running application restart beginning basic way implement checkpointing stop application copy required data memory reliable storage e.g. parallel file system continue execution case failure application restarts need start scratch rather read latest state checkpoint stable storage execute two main approaches checkpointing systems coordinated checkpointing uncoordinated checkpointing coordinated checkpointing approach processes must ensure checkpoints consistent usually achieved kind two-phase commit protocol algorithm uncoordinated checkpointing process checkpoints state independently must stressed simply forcing processes checkpoint state fixed time intervals sufficient ensure global consistency need establishing consistent state i.e. missing messages duplicated messages may force processes roll back checkpoints turn may cause processes roll back even earlier checkpoints extreme case may mean consistent state found initial state so-called domino effect one original common means application checkpointing save state feature interactive applications user application could save state variables data storage medium time using either continue working exit application later time restart application restore saved state implemented save command menu option application many cases became standard practice ask user unsaved work exiting application wanted save work sort functionality became extremely important usability applications particular work could completed one sitting playing video game expected take dozens hours writing book long document amounting hundreds thousands pages work done long period time data entry document rows spreadsheet problem save state requires operator program request save non-interactive programs including automated batch processed workloads ability checkpoint applications also automated batch applications began handle tens hundreds thousands transactions transaction might process one record one file several different files need application restartable point without need rerun entire job scratch became imperative thus checkpoint/restart capability born number transactions processed snapshot checkpoint state application could taken point application failed next checkpoint could restarted giving checkpoint information last place transaction file transaction successfully completed application could restart point checkpointing would tend expensive generally done every record reasonable compromise cost checkpoint vs. value computer time needed reprocess batch records thus number records processed checkpoint might range 25 200 depending cost factors relative complexity application resources needed successfully restart application fti library aims provide computational scientists easy way perform checkpoint/restart scalable fashion fti leverages local storage plus multiple replications erasures techniques provide several levels reliability performance fti provides application-level checkpointing allows users select data needs protected order improve efficiency avoid space time energy waste offers direct data interface users need deal files and/or directory names metadata managed fti transparent fashion user desired users dedicate one process per node overlap fault tolerance workload scientific computation post-checkpoint tasks executed asynchronously future technologies group lawrence national laboratories developing hybrid kernel/user implementation checkpoint/restart called blcr goal provide robust production quality implementation checkpoints wide range applications without requiring changes made application code blcr focuses checkpointing parallel applications communicate mpi compatibility software suite produced scidac scalable systems software isic work broken 4 main areas checkpoint/restart linux cr checkpointable mpi libraries resource management interface checkpoint/restart development process management interfaces dmtcp distributed multithreaded checkpointing tool transparently checkpointing state arbitrary group programs spread across many machines connected sockets modify user program operating system among applications supported dmtcp open mpi python perl many programming languages shell scripting languages use tightvnc also checkpoint restart x window applications long use extensions e.g opengl video among linux features supported dmtcp open file descriptors pipes sockets signal handlers process id thread id virtualization ensure old pids tids continue work upon restart ptys fifos process group ids session ids terminal attributes mmap/mprotect including mmap-based shared memory dmtcp supports ofed api infiniband experimental basis recent protocols perform collaborative checkpointing storing fragments checkpoint nearby nodes helpful avoids cost storing parallel file system often becomes bottleneck large-scale systems uses storage closer found use particularly large-scale supercomputing clusters challenge ensure checkpoint needed recovering failure nearby nodes fragments checkpoints available docker underlying technology contain checkpoint restore mechanism criu user space checkpoint library mementos software system transform general-purpose tasks interruptible program platforms frequent power outages designed batteryless embedded devices rfid tags smart cards rely harvesting energy ambient background mementos frequently senses available energy system decides checkpoint program continue computation case checkpointing data stored non-volatile memory energy become sufficient reboot data retrieved memory program continues stored state mementos implemented msp430 family microcontrollers mementos named christopher nolan memento idetic set automatic tools helps application-specific integrated circuit asic developers automatically embed checkpoints designs targets high-level synthesis tools adds checkpoints register-transfer level verilog code uses dynamic programming approach locate low overhead points state machine design since checkpointing hardware level involves sending data dependent registers non-volatile memory optimum points required minimum number registers store idetic deployed evaluated energy harvesting rfid tag device
[ 2051, 8582, 5000, 785, 7313, 7699, 11027, 7189, 2710, 7963, 6813, 6815, 2210, 5798, 9126, 6184, 2345, 4909, 7218, 10675, 8501, 9911, 5948, 318, 4286, 2113, 8514, 5956, 8262, 4423, 1480, 6909, 330, 1866, 7497, 8523, 9677, 1106, 10706, 4308...
Validation
8,448
8
IBM_Unica_NetInsight:ibm unica netinsight ibm unica netinsight web analytics application utilizes extract transform load methodology populate database queried using browser-based interface netinsight family tools unica nettracker affinium netinsight first released june 2006 version 7.0 release version 8.0 affinium netinsight renamed unica netinsight dropping along rest unica products affinium brand ibm acquires unica corporation unica netinsight software adopts ibm name ibm unica netinsight april 2014 ibm announced unica netinsight would discontinued netinsight extract transform load process read log files virtually format including logs web servers proxy servers streaming media servers ftp servers well processing normal server log files netinsight use log files derived page tags replace augment log file data netinsight stores processed log files database oracle database microsoft sql server ibm db2 netezza appliance
[ 4640, 3462, 5612, 7983, 6576, 2901, 8470, 1943, 11030, 2045 ]
Test
8,449
4
CryptoRights_Foundation:cryptorights foundation cryptorights foundation inc. crf 501 c 3 non-profit organization based san francisco cryptorights foundation helps human rights groups ngos use encryption protect online communications contributed encryption standards openpgp ipsec gnupg organization founded 26 february 1998 total solar eclipse near maximum totality active volcanic caribbean island montserrat boat chartered attendees international financial cryptography association conference anguilla dave del torto group fellow ″cypherpunk″ cryptology experts significant technology projects include development highfire human rights firewall distributed communications platform private ngo communications miniaturized pc called firebox size cable modem related highwire wireless human rights communications networking project became open source software defined radio source code maintained gnuradio crf provides free security training support human rights journalism organizations use cryptography crf team also developed gpg plug-in squirrelmail
[ 2050, 8283, 3742 ]
Test
8,450
3
DLX:dlx dlx pronounced deluxe risc processor architecture designed john l. hennessy david a. patterson principal designers stanford mips berkeley risc designs respectively two benchmark examples risc design named berkeley design dlx essentially cleaned modernized simplified mips cpu dlx simple 32-bit load/store architecture somewhat unlike modern mips cpu dlx intended primarily teaching purposes dlx design widely used university-level computer architecture courses two known implementations aspida vamp aspida project resulted core many nice features open source supports wishbone asynchronous design supports multiple isa asic proven vamp dlx-variant mathematically verified part verisoft project specified pvs implemented verilog runs xilinx fpga full stack compiler kernel tcp/ip built original mips architecture one methods used gain performance force instructions complete one clock cycle forced compilers insert no-ops cases instruction would definitely take longer one clock cycle thus input output activities like memory accesses specifically forced behaviour leading artificial program bloat general mips programs forced lot wasteful nop instructions behaviour unintended consequence dlx architecture force single clock cycle execution therefore immune problem dlx design modern approach handling long instructions used data-forwarding instruction reordering case longer instructions stalled functional units re-inserted instruction stream complete externally design behaviour makes appear execution occurred linearly dlx instructions broken three types r-type i-type j-type r-type instructions pure register instructions three register references contained 32-bit word i-type instructions specify two registers use 16 bits hold immediate value finally j-type instructions jumps containing 26-bit address opcodes 6 bits long total 64 possible basic instructions select one 32 registers 5 bits needed dlx like mips design bases performance use instruction pipeline dlx design fairly simple one classic risc concept pipeline contains five stages
[ 1798, 1298, 6038, 9371, 8861, 10786, 3493, 6311, 682, 7852, 4269, 10796, 7471, 2224, 4144, 9391, 1461, 1462, 9911, 8506, 7234, 6084, 3014, 3142, 9932, 6607, 2517, 219, 4955, 10985, 9964, 5358, 1776, 4465, 8048, 8944, 372, 757, 630, 2039, ...
Test
8,451
1
Amazon_Neptune:amazon neptune amazon neptune fully managed graph database product amazon.com used web service part amazon web services announced november 29 2017 amazon neptune supports popular graph models property graph w3c rdf respective query languages apache tinkerpop gremlin sparql including amazon web services products amazon neptune general availability ga announced may 30 2018 currently available 11 aws regions neptune hipaa eligible december 12 2018 announced amazon neptune in-scope payment card industry data security standard iso compliance programs amazon neptune supports open source apache tinkerpop gremlin graph traversal language w3c standard resource description framework ’ rdf sparql query language used neptune instance allow user build queries navigate highly connected data sets provides high performance graph models neptune also uses aws product features amazon s3 amazon ec2 amazon cloudwatch amazon neptune database clusters created stored amazon virtual private cloud vpc allows user isolate database private network using neptune vpc configuration user configure firewall settings needs order control network access database instances amazon neptune integrated aws identity access management iam allows user create aws iam groups control actions groups aws iam users neptune allows user encrypt databases using keys created aws key management service kms database instance running neptune encryption encrypts stored data backups snapshots replicas cluster amazon neptune allows user use https encrypt data transfer clients neptune service endpoints using transport layer security tls data stored cluster volume virtual volume utilizing ssd drives sizes volumes dynamic increase depending much data stored database maximum 64 tb amazon neptune sla policy designed offer monthly uptime percentage greater 99.9 increasing database performance availability integrating engine virtual storage based ssd drives specially made database workloads neptune maintains copies user data multiple availability zones case failures neptune automatically detects failed segments disk volume repairs neptune generally available us east n. virginia us east ohio us west oregon europe ireland europe london europe frankfurt asia pacific singapore asia pacific sydney asia pacific tokyo asia pacific mumbai asia pacific seoul aws regions pricing determined aws regions region different prices available services on-demand instance pricing lets user pay instance use hour instead fixed sum price also differs depending instance class similarly user pays storage consumed database payments advance price based storage rate i/o rate billed gb per month per million request increments respectively pricing model beneficial short-term small-scale projects available aws regions price backup storage also billed per gb-month increments albeit different rates data transfer priced per gb increments amount depends whether data transferred amazon neptune much data transferred per month tb per month september 12 2018 announced neptune achieved hipaa eligibility enabling process data sets containing protected health information phi december 12 2018 announced amazon neptune in-scope payment card industry data security standard iso 9001 iso 27001 iso 27017 iso 27018 compliance programs user use amazon neptune applications subject pci compliance require iso certification may 17 2019 announced neptune achieved ssae_16 eligibility neptune powers graph use cases recommendation engines fraud detection knowledge graphs drug discovery network security social networking notable customers amazon neptune include samsung electronics pearson intuit siemens astrazeneca finra lifeomic blackfynn amazon alexa
[ 5632, 8962, 2051, 6027, 4236, 10893, 911, 1935, 4623, 6161, 8592, 2965, 2328, 4377, 8986, 5660, 11038, 9631, 6307, 10020, 11556, 3366, 5159, 8998, 2217, 9766, 939, 6444, 3629, 8495, 3121, 7352, 10681, 2496, 4289, 8129, 11201, 6470, 1224, ...
Test
8,452
3
Socket_939:socket 939 socket 939 cpu socket released amd june 2004 supersede previous socket 754 athlon 64 processors socket 939 succeeded socket am2 may 2006 second socket designed amd amd64 range processors socket 939 processors motherboards became available june 2004 superseded socket am2 may 2006 amd ceased production socket focus current future platforms however least one new socket 939 motherboard produced utilizing modern amd chipset since amd transitioned socket am2 2009 motherboard maker asrock released new socket 939 motherboard motherboard utilizes amd 785g igp chipset sb710 southbridge single dual-core processors manufactured socket athlon 64 athlon 64 fx athlon 64 x2 sempron opteron names opteron 190 featuring 2.8 ghz clock speed 1 mb level 2 cache per core fastest dual-core processor manufactured socket however availability processor limited opteron 185 locked multiplier athlon 64 fx-60 unlocked multiplier slightly slower clock speed 2.6 ghz fastest widely available dual-core processors socket opteron 156 ran slightly faster 3 ghz making fastest single core processor supporting socket 939 interface socket 939 supports dual channel ddr sdram memory 6.4 gb/s memory bandwidth processors socket support 3dnow sse2 sse3 revision e later instruction sets features one 16 bit hypertransport link running 1000 mt/s regards video expansion slots socket 939 systems found agp slots pci-e slots processors using socket 64kb level 1 instruction data caches either 256kb 512kb 1 mb level 2 cache
[ 3586, 8322, 3588, 9475, 3464, 4872, 7058, 10260, 4246, 4767, 2463, 7712, 9122, 1322, 11183, 1329, 3892, 8629, 9400, 6978, 11331, 9157, 3783, 5326, 7247, 9551, 977, 7122, 9427, 5844, 7132, 2525, 4451, 5859, 1260, 7788, 7151, 1137, 1651 ]
Validation
8,453
9
Cerner_CCL:cerner ccl cerner ccl cerner command language cerner corporation fourth-generation programming language expressed cerner discern explorer solution ccl patterned structured query language sql cerner millennium health information technology solutions use ccl/discern explorer select insert update delete cerner millennium database ccl allows programmer fetch data oracle database display user wants see features like record structure subroutines allows us get data database manipulate storing temporary structure execute particular section code required using subroutine complete ccl cerner command language provided cerner corporation discern explorer provides several applications used create execute analyze ad hoc queries reports programs applications provide flexibility skill set needed build programs design reports discern explorer programs written using visualexplorer.exe discernvisualdeveloper.exe dvdev operating system command-line editor text editor explorermenu.exe em used execute discern explorer programs demand exploreranalyzer.exe ea allows users analyze system resources used rdbms queries ccl hello world examples call echo hello world go drop program helloworld2 go drop program helloworld3 go drop program jcmclass1a go
[ 8262 ]
Validation
8,454
2
Pygame:pygame pygame cross-platform set python modules designed writing video games includes computer graphics sound libraries designed used python programming language pygame originally written pete shinners replace pysdl development stalled community project since 2000 released open source free software gnu lesser general public license pygame uses simple directmedia layer sdl library intention allowing real-time computer game development without low-level mechanics c programming language derivatives based assumption expensive functions inside games abstracted game logic making possible use high-level programming language python structure game features sdl n't include vector math collision detection 2d sprite scene graph management midi support camera pixel-array manipulation transformations filtering advanced freetype font support drawing applications using pygame run android phones tablets use pygame subset android pgs4a sound vibration keyboard accelerometer supported android regular competition called pyweek write games using python usually necessarily pygame community created many tutorials pygame
[ 2826, 3210, 5914, 11306, 7983, 11700, 8262, 4182, 9691, 5083, 477, 8554, 5612, 10480, 9330, 9331, 2804, 2293, 6900, 1916, 2045 ]
Test
8,455
5
Google_Desktop:google desktop google desktop computer program desktop search capabilities created google linux apple mac os x microsoft windows systems allowed text searches user email messages computer files music photos chats web pages viewed ability display google gadgets user desktop sidebar september 2011 google announced would discontinue number products including google desktop reason given last years ’ huge shift local cloud-based storage computing well integration search gadget functionality modern operating systems people instant access data whether online offline goal google desktop product discontinued january 2008 google desktop featured following functionality prominent feature google desktop sidebar holds several common gadgets resides one side desktop sidebar available windows linux versions google desktop sidebar comes pre-installed following gadgets like windows taskbar google desktop sidebar set auto-hide mode appear user moves mouse cursor towards side resides auto-hide default sidebar always take 1/6 – 1/9 screen depending screen resolution windows forced resize however sidebar resized take less space users disable always top feature options auto-hide feature sidebar temporarily overlaps maximized windows another feature comes sidebar alerts sidebar minimized new email news displayed pop-up window windows taskbar searching sidebar deskbar floating deskbar google desktop displays quick find window window filled six default relevant results user computer results update user types allows use without open another browser window deskbars boxes enable searching directly desktop web results open browser window selected computer results displayed quick find box see deskbar either fixed deskbar sits windows taskbar floating deskbar may positioned anywhere desktop google desktop includes plugins allow indexing searching contents local microsoft outlook ibm lotus notes mozilla thunderbird email databases outside client applications built-in search functions lotus notes local databases indexed searching google desktop email indexing feature also integrated google web-based email service gmail index search email messages gmail accounts desktop gadgets interactive mini-applications placed anywhere user desktop – docked sidebar – show new email weather photos personalized news google offers gallery pre-built gadgets download official website developers google offers sdk official blog anyone wants write gadgets plug-ins google desktop automated system creates developer hierarchy called google desktop hall fame programmers advance based gadgets number popularity sdk also allows third-party applications make use search facilities provided google desktop search example file manager directory opus offers integrated google desktop search support even though desktop search programs search files meta data google desktop windows one uses title tag results lists files linux shows meta-data html files pdf files programs use file names results lists use title tag gives significantly better user experience since metadata titles present written ordinary language file names less communicative title meta data missing file google desktop reverts use filename google desktop originally developed bring google search technology desktop google desktop received much attention may allow reverse engineering google proprietary search algorithm centrally administered version integrates user experience vendor appliance exists well google desktop officially discontinued september 14 2011 february 2007 yair amit watchfire found series vulnerabilities google desktop could allow malicious individual achieve remote persistent access sensitive data cases full system control well significant impact ease exploitation forced google change google desktop logic google desktop version 5 many privacy civil liberties groups electronic frontier foundation eff concerns personal information people computers could readily copied users hard drives google desktop version 3 contains certain features raise serious security privacy concerns specifically share across computers feature introduces ability search content desktop desktop greatly increases risk users privacy google desktop v.3 set allow search across computers files indexed computer copied google servers potential information stored computers accessed others enable feature google desktop v. 3 computers seriously considered eff advises using feature also confidential data work home computers enable feature privacy laws company policies could violated installation feature specifically sb 1386 hipaa ferpa glba sarbanes-oxley far reaching concerns arise around packaging end user license agreement – specifically level intrusion local machine disclaimers users implicitly agree future changes license agreement without actually able see immediately issues microsoft outlook indexing deleted email listings removed required re-installing google desktop new archived mail listed several versions released patch outlook indexing first half 2009 large number google desktop users reported product stopped indexing suddenly index file reached approximately 4gb size full uninstall including manually deleting indexes reinstall would fix problem temporarily problem would recur index file reached 4gb problem resolved google desktop search version 5.9 currently google desktop index email contacts outlook 2010 default google desktop index email thunderbird 3
[ 4995, 5892, 3462, 8455, 7816, 9353, 6797, 5262, 8719, 6035, 5524, 7700, 6550, 8471, 10645, 8858, 1435, 11418, 10525, 2978, 4901, 1959, 3499, 10284, 5677, 7983, 1203, 1077, 823, 5431, 10173, 7359, 196, 3269, 3782, 11590, 4683, 11343, 3664, ...
None
8,456
3
Scramble_Formation:scramble formation game player controls red propeller-driven airplane flying city tokyo able shoot capture red smaller planes follow player formation player choose 3 formations first able shoot air-to-air air-to-ground projectiles second air-to-air larger area third air-to-ground larger area well gameplay player react accordingly threats quickly decide one 3 formation types adequate one given moment game divided areas depicting key places tokyo shinjuku akasaka ginza clearly defined levels points player faced giant mothership shot hitting engines port released msx 2 home computer 1987
[ 1776 ]
None
8,457
7
Database_of_Molecular_Motions:database molecular motions database macromolecular motions molmovdb bioinformatics database software-as-a-service tool attempts categorize macromolecular motions sometimes also known conformational change originally developed mark b. gerstein werner krebs nat echols molecular biophysics biochemistry department yale university since introduction late 1990s peer-reviewed papers database received thousands citations database mentioned news articles major scientific journals book chapters elsewhere users search database particular motion either protein name protein data bank id number typically however users enter database via protein data bank often provides hyperlink molmovdb entry proteins found databases database includes web-based tool morph server allows non-experts animate visualize certain types protein conformational change generation short movies system uses molecular modelling techniques interpolate structural changes two different protein conformers generate set intermediate structures hyperlink pointing morph results emailed user morph server originally primarily research tool rather general molecular animation tool thus offered limited user control rendering animation parameters color point view original methods sometimes required fair amount cpu time completion since initial introduction 1996 database associated morph server undergone development try address shortcomings well add new features normal mode analysis research grounds subsequently developed alternative systems moviemaker university alberta bioinformatics vendor dnastar incorporated morphs database commercial protean3d product connection dnastar authors database immediately clear
[ 467, 2901 ]
None
8,458
9
KnowledgeMan:knowledgeman knowledgeman early computer database management system created micro data base systems lafayette indiana knowledgeman introduced 1983 pc-sized version company mainframe computing database software knowledgeman promoted users dbase faster database using sophisticated computing power macro language sql structured query language allowed reports spreadsheet interface statistical graphics i.e. pie charts bar charts etc knowledgeman designed david bartkus knowledgeman first database management system ported mainframe system also first written 16-bit pc processor knowledgeman first separate database engine command interface something microsoft access lauded decade later micro data base systems developed graphical user interface knowledgeman frequently called kman 1985 although popular developers preferred use software command line interface 1986 introduced guru expert system incorporated knowledgeman database graphical user interface mid-1990s knowledgeman folded guru 2004 micro data base systems folded product line taken savitar corporation savitar folded 2008 besides uses business computing knowledgeman used archaeologists including neanderthal site france remains new amsterdam new york city elsewhere physicists fermilab wide range domains
[ 7523, 10413, 4614 ]
Validation
8,459
4
Brian_LaMacchia:brian lamacchia brian a. lamacchia computer security specialist lamacchia best known work massachusetts institute technology establishing mit pgp key server first key centric pki implementation see wide-scale use lamacchia wrote first web interface pgp key server lamacchia currently works microsoft director security cryptography microsoft research previously director security cryptography microsoft extreme computing group played leading role design xkms security architecture .net palladium designed led development team .net security architecture security architect palladium most-referenced work .net framework played leading role design w3c xmldsig xkms standards particular author versions 1.0 1.1 2.0 xmldsig contributor xkms coauthor oasis standard ws-security lamacchia earned s.b. s.m. ph.d. degrees mit 1990 1991 1996 respectively primary community activity involvement seattle international film festival treasurer 2013 currently president
[ 10831, 4435, 8283, 5372, 2558 ]
Test
8,460
8
Apache_OJB:apache ojb apache objectrelationalbridge ojb object/relational mapping tool allows transparent persistence java objects relational databases released april 6 2005 january 16 2011 apache objectrelationalbridge retired ojb open source project lightweight easy use requiring simply configure two files implement persistence layer easy integrate existing application generate code allows use different patterns persistence owner persistencebroker api jdo object data management group odmg ojb uses xml based object/relational mapping mapping resides dynamic metadata layer manipulated runtime simple meta-object-protocol mop change behaviour persistence kernel least two files required configure ojb ojb.properties repository.xml mapping 1-1 relationship example two tables person account case person account vice versa
[ 10377, 7567, 1296, 1047, 8217, 11161, 6555, 8860, 3877, 10661, 11303, 5677, 7983, 4919, 5047, 4538, 1851, 7485, 7742, 9789, 7233, 6338, 1222, 1991, 4294, 7750, 5066, 8139, 9286, 4944, 1363, 8408, 9179, 7261, 990, 8799, 10719, 865, 11235, ...
None
8,461
6
Specfs:specfs unix-like computer systems specfs short special filesystem physical network file system mount point either simply filesystem layer access device special files hosted regular filesystems
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 7225, 11323, 8772, 1109, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 5293, 7344, 2230, 5816, 1...
Validation
8,462
4
Certified_Penetration_Testing_Engineer:certified penetration testing engineer certified penetration testing engineer c pte internationally recognized cyber security certification administered united states-based information security company mile2 accreditation maps committee national security systems 4013 education certification c pte certification considered one five core cyber security certifications obtaining c pte certification requires proven proficiency knowledge five key information security elements penetration testing data collection scanning enumeration exploitation reporting c pte certification one several information assurance accreditations recognized u.s. national security agency certification also approved u.s. department homeland security national initiative cyber security studies careers nicss u.s.-based national security systems committee online exam c pte accreditation lasts two hours consists 100 multiple choice questions
[ 10717, 10307, 357, 8613, 9607, 7528, 7228, 7887, 8462, 5010, 6834, 1493, 3447, 6105, 316, 5373, 2558 ]
None
8,463
9
M2001:m2001 m2001 modular educational mathematical programming language developing presenting mathematical algorithms modern discrete classical continuous mathematics m2001 built semantic framework based category theory syntax similar pascal modula-2 designed purely pedagogic use efficiency ease implementation far less important development generality range application created play important role forming formal algorithmic foundation first-year college math students based multi-layered datatyping scheme m2001 includes collection eight computational types another six structured types two respectively collections mathematical classes abstract classes built latter encompassing commonly used abstract data types computer science lower two layers m2001 typing scheme based earlier experimental called cat programming language modular mathematical programming language ronald e. prather
[ 8262, 219, 8524, 6558 ]
Test
8,464
4
DNS_leak:dns leak dns leak refers security flaw allows dns requests revealed isp dns servers despite use vpn service attempt conceal although primary concern vpn users also possible prevent proxy direct internet users vulnerability allows isp well on-path eavesdroppers see websites user may visiting possible browser dns requests sent isp dns server directly sent vpn occurs certain types vpns e.g split-tunnel vpns traffic still sent local network interface even vpn active starting windows 8 microsoft introduced smart multi-homed named resolution altered way windows 8 handled dns requests ensuring dns request could travel across available network interfaces computer general consensus new method domain name resolution accelerated time required dns look-up completed also exposed vpn users dns leaks connected vpn endpoint computer would longer use dns servers assigned vpn service instead dns request would sent available interfaces thus dns traffic would travel vpn tunnel expose user default dns servers websites exist allow testing determine whether dns leak occurring dns leaks addressed number ways websites may report false positive test results advisable always check result manually making sure note country provider ip home isp something different foreign may always easy know whether one using set dns whether dns leaks safest way verify via one online dns leak tests sometimes isp may already using one public dns servers default setting public one may show difference servers isp may collecting data case safest change different dns test dns leaks example isp using google public dns using may wise try cloudflare dns see leaks google dns
[ 8998, 8413, 2558 ]
Test
8,465
4
Jungle_Disk:jungle disk jungle disk name online backup software service privately held data security company suite products also includes network protection service email archiving one first backup services use cloud storage amazon s3 2009 acquired rackspace service added rackspace cloud files name word association amazon rainforest jungle disk common shorthand hard disk drive jungle disk backup monthly subscription software service supports laptops desktops servers microsoft windows macos linux operating systems data backed online disk using either continuous backup aka sync scheduled back selected files folders everything system data accessed software client web browser mobile devices running android ios also provides webdav server integration applications customers protect data using aes-256 encryption key even jungle disk employees access records subscription includes 10 gigabytes storage pay-as-you-go additional data jungle disk founded atlanta dave wright 2006 october 22 2008 jungle disk entered agreement acquired rackspace hosting inc. rackspace purchased jungle disk order expand cloud hosting services acquisition integration dave left rackspace found solidfire jungle disk relocated san antonio 2010 pace development slowed rackspace focused cloud infrastructure software platform became openstack 2013 rackspace revived jungle disk customer support going ticket service include phone chat ticketing january 5 2016 jungle disk spun rackspace us inc. privately held company headquartered san antonio tx december 5 2017 jungle disk announced acquired safetynet first backup quickbooks online jobber march 6 2018 jungle disk announced acquired teampassword password manager connected teams simplify password management security addition teampassword jungle disk product portfolio gives small businesses data security tool help generate secure unique passwords share access applications services enabling users productive work collaboration jungle disk raised 11 million equity 2016 part spin-off rackspace investors include number san antonio family offices january 18th 2017 jungle disk announced tripled growth capital additional funding existing investors december 7 2016 jungle disk tech-onomic impact award 2016 tech titans awards presented san antonio business journal january 31 2017 jungle disk named one ten finalists 'the best cloud storage file sharing providers businesses 2017 pc magazine march 2017 jungle disk named 'top 10 cloud storage solution provider cloud technology insights may 23 2017 jungle disk named one five finalists 'best cloud backup services businesses pc magazine tied second scoring affordable price large margin may 11 2018 jungle disk named one lifewire list 21 online backup services jungle disk client software receive update 2012-2014 part cloud office portfolio new version released december 2015 june 3 2011 colin percival owner tarsnap competitor jungle disk identified two potential weaknesses jungle disk security
[ 11201, 4194, 6565, 939, 3819, 3629, 6797, 7983, 823 ]
Test
8,466
4
Application_virtualization:application virtualization application virtualization also known process virtualization software technology encapsulates computer programs underlying operating system executed fully virtualized application installed traditional sense although still executed application behaves runtime like directly interfacing original operating system resources managed isolated sandboxed varying degrees context term virtualization refers artifact encapsulated application quite different meaning hardware virtualization refers artifact abstracted physical hardware full application virtualization requires virtualization layer application virtualization layers replace part runtime environment normally provided operating system layer intercepts disk operations virtualized applications transparently redirects virtualized location often single file application remains unaware accesses virtual resource instead physical one since application working one file instead many files spread throughout system becomes easy run application different computer previously incompatible applications run side-by-side examples technology windows platform include application virtualization allows applications run environments suit native application example wine allows microsoft windows applications run linux application virtualization reduces system integration administration costs maintaining common software baseline across multiple diverse computers organization lesser integration protects operating system applications poorly written buggy code cases provides memory protection ide-style debugging features may even run applications written correctly example applications try store user data read-only system-owned location feature assists implementation principle least privilege removing requirement end-users administrative privileges order run poorly written applications allows incompatible applications run side-by-side time minimal regression testing one another isolating applications operating system security benefits well exposure application automatically entail exposure entire os application virtualization also enables simplified operating system migrations applications transferred removable media computers without need installing becoming portable software application virtualization uses fewer resources separate virtual machine computer programs virtualized examples include applications require device driver form integration os 16-bit applications need run shared memory space anti-virus programs applications require heavy os integration windowblinds stylexp difficult virtualize moreover software licensing application virtualization bears great licensing pitfalls mainly application virtualization software virtualized applications must correctly licensed application virtualization address file registry-level compatibility issues legacy applications newer operating systems applications n't manage heap correctly execute windows vista still allocate memory way regardless whether virtualized reason specialist application compatibility fixes shims may still needed even application virtualized technology categories fall application virtualization include
[ 5378, 6150, 3082, 7947, 6797, 4238, 3484, 5411, 2212, 6438, 295, 10537, 10284, 7983, 7349, 7733, 823, 9655, 5049, 10747, 8123, 2236, 318, 8255, 5697, 5702, 7507, 10835, 4309, 2910, 1632, 1513, 3822, 8439, 1400, 5371 ]
Test
8,467
2
Check_Point_IPSO:check point ipso check point ipso operating system 'check point firewall appliance security devices based freebsd numerous hardening features applied ip ipso refers ipsilon networks company specialising ip switching acquired nokia 1997 2009 check point acquired nokia security appliance business including ipso nokia ipso version 6.2 fork freebsd 6 two systems called ipso-sx ipso-lx linux-based check point offers three lines security appliances one based ipso 6.x one based operating system called secureplatform latest based gaia platform rhel4 based ipso notable features firsts include ipso sb originally derived ipsilon networks freebsd 2.1-stable cross-compiled freebsd 2.2.6-release 3.5-release platforms major components ipso versions 2.x sold ipsilon networks part atm tag-switching solutions originally pioneered ipso 3.0 onwards designed host check point firewall-1 third party packages ipso 3.0 3.9 spanned 1999 2005 adding many features significant performance hardware refinements recognizably administrator ipso 4.0 designed major update internally numbered ipso 3.10 however check point software unable process two-digit dot version also included refresh voyager html interface point javascript frames avoided order facilitate use lynx command line interface together resulted renumbered 4.0 ipso 4.1 ipso 4.2 incremental releases ipso 4.2 gain source-based routing last scheduled new feature new development continue ipso 6.x ipso 5.0 build 056 released 2009 vsx r65 support ip appliance ipso 6.0 announced nokia relation ip2450 ip690 hardware based freebsd 6.x primary advantage ipso 4.x improved memory management performance scheduling threading posix-compliance operating system features ipso 6.0.7 released 2009 ip690 ip2450 corexl multi-core support ipso 6.1 contains enhancements freebsd 6.x without corexl support step change nokia advertised ipso 4.2 6.07 6.1 run alongside period time check point acquired nokia ip appliance business 6.07 6.1 development branches merged combined 6.2 recent version ipso 6.2mr6 released february 2017 nokia offered ipso 7 actually ipso lx discontinued 7.2 2008 acquiring nokia ip appliance business check point announced project gaia combine ipso secure platform first release expected 2011
[ 6657, 9764, 3462, 998, 5096, 9452, 3885, 7983, 8668, 5470 ]
Test
8,468
4
Loren_Kohnfelder:loren kohnfelder loren kohnfelder best known mit s.b bscse thesis written may 1978 describing practical means applying public key cryptography secure network communications kohnfelder thesis introduced terms 'certificate 'certificate revocation list well introducing numerous concepts established important parts public key infrastructure x.509 certificate specification provides basis ssl s/mime modern pki implementations based kohnfelder thesis also co-creator praerit garg stride model security threats widely used threat modeling
[ 513, 483, 10831, 9744, 1297, 5372 ]
Validation
8,469
4
The_Coroner's_Toolkit:coroner toolkit coroner toolkit tct suite free computer security programs dan farmer wietse venema digital forensic analysis suite runs several unix-related operating systems freebsd openbsd bsd/os sunos/solaris linux hp-ux tct released terms ibm public license parts tct used aid analysis data recovery computer disasters tct superseded sleuth kit although tsk partially based tct authors tct accepted official successor tct
[ 5506, 2437, 1801, 5397, 1304, 7968, 5284, 11182, 7983, 4789, 823, 2747, 8635, 2494, 830, 10436, 6475, 4049, 4834, 5475, 3172, 7525, 9319, 5492, 2558 ]
None
8,470
8
Unica_NetTracker:unica nettracker unica nettracker web analytics application processes web log files unica nettracker first released 1996 sane solutions sold unica corporation current version december 2006 7.1.0 unica announce end-of-life end-of-support december 31 2011 nettracker processes log files virtually format using custom log definition logs processed web servers proxy servers streaming media servers ftp servers well processing log files nettracker use page tag data augment log file data nettracker stores processed log files internal database based upon sqlite
[ 4640, 8448, 6576, 119 ]
Validation
8,471
4
Health_Insurance_Portability_and_Accountability_Act:health insurance portability accountability act health insurance portability accountability act 1996 hipaa kennedy–kassebaum act ref name= atchinson/fox /ref enacted 104th united states congress signed president bill clinton 1996 created primarily modernize flow healthcare information stipulate personally identifiable information maintained healthcare healthcare insurance industries protected fraud theft address limitations healthcare insurance coverage act consists five titles title hipaa protects health insurance coverage workers families change lose jobs title ii hipaa known administrative simplification provisions requires establishment national standards electronic health care transactions national identifiers providers health insurance plans employers title iii sets guidelines pre-tax medical spending accounts title iv sets guidelines group health plans title v governs company-owned life insurance policies five sections act known titles title hipaa regulates availability breadth group health plans certain individual health insurance policies amended employee retirement income security act public health service act internal revenue code title requires coverage also limits restrictions group health plan place benefits preexisting conditions group health plans may refuse provide benefits relation preexisting conditions either 12 months following enrollment plan 18 months case late enrollment title allows individuals reduce exclusion period amount time creditable coverage enrolling plan significant breaks coverage creditable coverage defined quite broadly includes nearly group individual health plans medicare medicaid significant break coverage defined 63-day period without creditable coverage along exception allowing employers tie premiums co-payments tobacco use body mass index title also requires insurers issue policies without exclusion leaving group health plans creditable coverage see exceeding 18 months renew individual policies long offered provide alternatives discontinued plans long insurer stays market without exclusion regardless health condition health care plans exempted title requirements long-term health plans limited-scope plans like dental vision plans offered separately general health plan however benefits part general health plan hipaa still applies benefits example new plan offers dental benefits must count creditable continuous coverage old health plan towards exclusion periods dental benefits alternate method calculating creditable continuous coverage available health plan title 5 categories health coverage considered separately including dental vision coverage anything 5 categories must use general calculation e.g. beneficiary may counted 18 months general coverage 6 months dental coverage beneficiary general health plan covered dental 6 months prior application date since limited-coverage plans exempt hipaa requirements odd case exists applicant general group health plan obtain certificates creditable continuous coverage independent limited-scope plans dental apply towards exclusion periods new plan include coverages hidden exclusion periods valid title e.g. accident covered must occurred beneficiary covered exact health insurance contract clauses must acted upon health plan also must re-written comply hipaa title ii hipaa establishes policies procedures maintaining privacy security individually identifiable health information outlines numerous offenses relating health care establishes civil criminal penalties violations also creates several programs control fraud abuse within health-care system however significant provisions title ii administrative simplification rules title ii requires department health human services hhs increase efficiency health-care system creating standards use dissemination health-care information rules apply covered entities defined hipaa hhs covered entities include health plans health care clearinghouses billing services community health information systems health care providers transmit health care data way regulated hipaa per requirements title ii hhs promulgated five rules regarding administrative simplification privacy rule transactions code sets rule security rule unique identifiers rule enforcement rule hipaa privacy rule composed national regulations use disclosure protected health information phi healthcare treatment payment operations covered entities effective compliance date privacy rule april 14 2003 one-year extension certain small plans hipaa privacy rule regulates use disclosure protected health information phi held covered entities generally health care clearinghouses employer-sponsored health plans health insurers medical service providers engage certain transactions regulation hhs extended hipaa privacy rule independent contractors covered entities fit within definition business associates phi information held covered entity regarding health status provision health care health care payment linked individual interpreted rather broadly includes part individual medical record payment history covered entities must disclose phi individual within 30 days upon request also must disclose phi required law reporting suspected child abuse state child welfare agencies covered entities may disclose protected health information law enforcement officials law enforcement purposes required law including court orders court-ordered warrants subpoenas administrative requests identify locate suspect fugitive material witness missing person covered entity may disclose phi certain parties facilitate treatment payment health care operations without patient express written authorization disclosures phi require covered entity obtain written authorization individual disclosure case covered entity discloses phi must make reasonable effort disclose minimum necessary information required achieve purpose privacy rule gives individuals right request covered entity correct inaccurate phi also requires covered entities take reasonable steps ensuring confidentiality communications individuals example individual ask called work number instead home cell phone numbers privacy rule requires covered entities notify individuals uses phi covered entities must also keep track disclosures phi document privacy policies procedures must appoint privacy official contact person responsible receiving complaints train members workforce procedures regarding phi individual believes privacy rule upheld file complaint department health human services office civil rights ocr however according wall street journal ocr long backlog ignores complaints complaints privacy violations piling department health human services april 2003 november 2006 agency fielded 23,886 complaints related medical-privacy rules yet taken enforcement actions hospitals doctors insurers anyone else rule violations spokesman agency says closed three-quarters complaints typically found violation provided informal guidance parties involved however july 2011 ucla agreed pay 865,500 settlement regarding potential hipaa violations hhs office civil rights investigation showed 2005 2008 unauthorized employees repeatedly without legitimate cause looked electronic protected health information numerous uclahs patients january 2013 hipaa updated via final omnibus rule updates included changes security rule breach notification portions hitech act significant changes related expansion requirements include business associates covered entities originally held uphold sections law addition definition significant harm individual analysis breach updated provide scrutiny covered entities intent disclosing breaches previously unreported previously organization needed proof harm occurred whereas organizations must prove harm occurred protection phi changed indefinite 50 years death severe penalties violation phi privacy requirements also approved hipaa privacy rule may waived natural disaster case hurricane harvey 2017 see privacy section health information technology economic clinical health act hitech act privacy rule requires medical providers give individuals access phi individual requests information writing typically using provider form purpose provider 30 days provide copy information individual individual may request information electronic form hard-copy provider obligated attempt conform requested format providers using electronic health record ehr system certified using cehrt certified electronic health record technology criteria individuals must allowed obtain phi electronic form providers encouraged provide information expediently especially case electronic record requests individuals right access health-related information including health condition treatment plan notes images lab results billing information explicitly excluded private psychotherapy notes provider information gathered provider defend lawsuit providers charge reasonable amount relates cost providing copy however charge allowable providing data electronically certified ehr using view download transfer feature required certification delivered individual electronic form individual may authorize delivery using either encrypted un-encrypted email delivery using media usb drive cd etc. may involve charge direct messaging secure email technology common use healthcare industry possibly methods using un-encrypted email individual must understand accept risks privacy using technology information may intercepted examined others regardless delivery technology provider must continue fully secure phi system deny delivery method poses additional risk phi system individual may also request writing phi delivered designated third party family care provider individual may also request writing provider send phi designated service used collect manage records personal health record application example patient request writing ob-gyn provider digitally transmit records latest pre-natal visit pregnancy self-care app mobile phone according interpretations hipaa hospitals reveal information phone relatives admitted patients instances impeded location missing persons asiana airlines flight 214 san francisco crash hospitals reluctant disclose identities passengers treating making difficult asiana relatives locate one instance man washington state unable obtain information injured mother janlori goldman director advocacy group health privacy project said hospitals overcautious misapplying law times reports suburban hospital bethesda md. interpreted federal regulation requires hospitals allow patients opt included hospital directory meaning patients want kept directory unless specifically say otherwise result patient unconscious otherwise unable choose included directory relatives friends might able find goldman said hipaa intended make health care system united states efficient standardizing health care transactions hipaa added new part c titled administrative simplification title xi social security act supposed simplify healthcare transactions requiring health plans engage health care transactions standardized way hipaa/edi provision scheduled take effect october 16 2003 one-year extension certain small plans however due widespread confusion difficulty implementing rule cms granted one-year extension parties january 1 2012 newer versions asc x12 005010 ncpdp d.0 become effective replacing previous asc x12 004010 ncpdp 5.1 mandate asc x12 005010 version provides mechanism allowing use icd-10-cm well improvements july 1 2005 medical providers file electronically file electronic claims using hipaa standards order paid hipaa hipaa-covered health plans required use standardized hipaa electronic transactions see 42 usc § 1320d-2 45 cfr part 162 information found final rule hipaa electronic transaction standards 74 fed reg 3296 published federal register january 16 2009 cms website key edi x12 transactions used hipaa compliance edi health care claim transaction set 837 used submit health care claim billing information encounter information except retail pharmacy claims see edi retail pharmacy claim transaction sent providers health care services payers either directly via intermediary billers claims clearinghouses also used transmit health care claims billing payment information payers different payment responsibilities coordination benefits required payers regulatory agencies monitor rendering billing and/or payment health care services within specific health care/insurance industry segment example state mental health agency may mandate healthcare claims providers health plans trade professional medical health care claims electronically must use 837 health care claim professional standard send claims many different business applications health care claim slight derivations cover claims involving unique claims institutions professionals chiropractors dentists etc edi retail pharmacy claim transaction ncpdp telecommunications standard version 5.1 used submit retail pharmacy claims payers health care professionals dispense medications either directly via intermediary billers claims clearinghouses also used transmit claims retail pharmacy services billing payment information payers different payment responsibilities coordination benefits required payers regulatory agencies monitor rendering billing and/or payment retail pharmacy services within pharmacy health care/insurance industry segment edi health care claim payment/advice transaction set 835 used make payment send explanation benefits eob send explanation payments eop remittance advice make payment send eop remittance advice health insurer health care provider either directly via financial institution edi benefit enrollment maintenance set 834 used employers unions government agencies associations insurance agencies enroll members payer payer healthcare organization pays claims administers insurance benefit product examples payers include insurance company healthcare professional hmo preferred provider organization ppo government agency medicaid medicare etc organization may contracted one former groups edi payroll deducted another group premium payment insurance products 820 transaction set making premium payment insurance products used order financial institution make payment payee edi health care eligibility/benefit inquiry 270 used inquire health care benefits eligibility associated subscriber dependent edi health care eligibility/benefit response 271 used respond request inquiry health care benefits eligibility associated subscriber dependent edi health care claim status request 276 transaction set used provider recipient health care products services authorized agent request status health care claim edi health care claim status notification 277 transaction set used healthcare payer authorized agent notify provider recipient authorized agent regarding status health care claim encounter request additional information provider regarding health care claim encounter transaction set intended replace health care claim payment/advice transaction set 835 therefore used account payment posting notification summary service line detail level notification may solicited unsolicited edi health care service review information 278 transaction set used transmit health care service information subscriber patient demographic diagnosis treatment data purpose request review certification notification reporting outcome health care services review edi functional acknowledgement transaction set 997 transaction set used define control structures set acknowledgments indicate results syntactical analysis electronically encoded documents although specifically named hipaa legislation final rule necessary x12 transaction set processing encoded documents transaction sets grouped functional groups used defining transactions business data interchange standard cover semantic meaning information encoded transaction sets final rule security standards issued february 20 2003 took effect april 21 2003 compliance date april 21 2005 covered entities april 21 2006 small plans security rule complements privacy rule privacy rule pertains protected health information phi including paper electronic security rule deals specifically electronic protected health information ephi lays three types security safeguards required compliance administrative physical technical types rule identifies various security standards standard names required addressable implementation specifications required specifications must adopted administered dictated rule addressable specifications flexible individual covered entities evaluate situation determine best way implement addressable specifications privacy advocates argued flexibility may provide much latitude covered entities software tools developed assist covered entities risk analysis remediation tracking standards specifications follows hipaa covered entities providers completing electronic transactions healthcare clearinghouses large health plans must use national provider identifier npi identify covered healthcare providers standard transactions may 23 2007 small health plans must use npi may 23 2008 effective may 2006 may 2007 small health plans covered entities using electronic communications e.g. physicians hospitals health insurance companies forth must use single new npi npi replaces identifiers used health plans medicare medicaid government programs however npi replace provider dea number state license number tax identification number npi 10 digits may alphanumeric last digit checksum npi contain embedded intelligence words npi simply number additional meaning npi unique national never re-used except institutions provider usually one institution may obtain multiple npis different sub-parts free-standing cancer center rehab facility february 16 2006 hhs issued final rule regarding hipaa enforcement became effective march 16 2006 enforcement rule sets civil money penalties violating hipaa rules establishes procedures investigations hearings hipaa violations many years prosecutions violations march 2013 u.s. dept health human services hhs investigated 19,306 cases resolved requiring changes privacy practice corrective action noncompliance determined hhs entities must apply corrective measures complaints investigated many different types businesses national pharmacy chains major health care centers insurance groups hospital chains small providers 9,146 cases hhs investigation found hipaa followed correctly 44,118 cases hhs find eligible cause enforcement example violation started hipaa started cases withdrawn pursuer activity actually violate rules according hhs website following lists issues reported according frequency common entities required take corrective action voluntary compliance according hhs listed frequency title iii standardizes amount may saved per person pre-tax medical savings account beginning 1997 medical savings account msa available employees covered employer-sponsored high deductible plan small employer self-employed individuals title iv specifies conditions group health plans regarding coverage persons pre-existing conditions modifies continuation coverage requirements also clarifies continuation coverage requirements includes cobra clarification title v includes provisions related company-owned life insurance employers providing company-owned life insurance premiums prohibiting tax-deduction interest life insurance loans company endowments contracts related company also repeals financial institution rule interest allocation rules finally amends provisions law relating people give united states citizenship permanent residence expanding expatriation tax assessed deemed giving u.s. status tax reasons making ex-citizens names part public record creation quarterly publication individuals chosen expatriate enactment privacy security rules caused major changes way physicians medical centers operate complex legalities potentially stiff penalties associated hipaa well increase paperwork cost implementation causes concern among physicians medical centers august 2006 article journal annals internal medicine detailed concerns implementation effects hipaa hipaa restrictions researchers affected ability perform retrospective chart-based research well ability prospectively evaluate patients contacting follow-up study university michigan demonstrated implementation hipaa privacy rule resulted drop 96 34 proportion follow-up surveys completed study patients followed heart attack another study detailing effects hipaa recruitment study cancer prevention demonstrated hipaa-mandated changes led 73 decrease patient accrual tripling time spent recruiting patients tripling mean recruitment costs addition informed consent forms research studies required include extensive detail participant protected health information kept private information important addition lengthy legalistic section privacy may make already complex documents even less user-friendly patients asked read sign data suggest hipaa privacy rule currently implemented may negative impacts cost quality medical research dr. kim eagle professor internal medicine university michigan quoted annals article saying privacy important research also important improving care hope figure right complexity hipaa combined potentially stiff penalties violators lead physicians medical centers withhold information may right review implementation hipaa privacy rule u.s. government accountability office found health care providers uncertain legal privacy responsibilities often responded overly guarded approach disclosing information ... necessary ensure compliance privacy rule reports uncertainty continue period immediately prior enactment hipaa privacy security acts medical centers medical practices charged getting compliance early emphasis potentially severe penalties associated violation many practices centers turned private for-profit hipaa consultants intimately familiar details legislation offered services ensure physicians medical centers fully compliance addition costs developing revamping systems practices increase paperwork staff time necessary meet legal requirements hipaa may impact finances medical centers practices time insurance companies medicare reimbursement also declining education training healthcare providers paramount correct implementation hipaa privacy security acts effective training must describe statutory regulatory background purpose hipaa general summary principles key provisions privacy rule.although hipaa training course tailored towards roles employees attending course vital elements included although hipaa fits 1996 public law 104-191 health insurance portability accountability act references title ii privacy rule often stated health information privacy portability act hippa usa federal state county government sectors governmental agencies issued corrective followups regarding hippa hipaa according us department health human services office civil rights april 2003 january 2013 received 91,000 complaints hipaa violations 22,000 led enforcement actions varying kinds settlements fines 521 led referrals us department justice criminal actions examples significant breaches protected information hipaa violations include according koczkodaj et al. 2018 total number individuals affected since october 2009 173,398,820 differences civil criminal penalties summarized following table
[ 2818, 8455, 4232, 8968, 4234, 5002, 5007, 7568, 3858, 5404, 3366, 8742, 9129, 11567, 7729, 8881, 9396, 6327, 7863, 10938, 6588, 3773, 11070, 9675, 1612, 3925, 8022, 1239, 2779, 2656, 3552, 1251, 6372, 11368, 2932, 5373, 10238 ]
Test
8,472
2
Nokia_E71:nokia e71 nokia e71 smartphone introduced may 2008 eseries range qwerty keyboard targeting business users worldwide runs symbian os v9.2 series 60 3rd edition second generation feature pack 1 nokia e71 succeeded nokia e61/61i models building base design form factor enhancing feature set nokia e71 well received highly popular often considered one nokia finest devices superseded nokia e72 2009 primary 3.15 mp 2048x1536 pixels autofocus led flash video qvga 15fps secondary videocall camera pre-installed several open source developers well paid third party developers created software various functions utilities car headsets power colors grey steel white red black e71 currently sold mainland china wi-fi 802.11b/g wlan networking back mounted camera 3g also excluded licenses 3g mainland china approved early 2009 reduction price phones lacking features firmware update bring back hardware missing e71 sold macau hong kong lack features software bundled chinese version slightly different also qq client along chinese specific programs e71 received highly positive critical reception widely praised battery life software features like push email slim design hardware including keyboard trusted reviews reviewer gave 5 stars 5 cnet uk wrote n't like camera think rest pretty close perfect techradar called terrific device well thought package listing lack 3.5 mm headphone jack disadvantage publications dubbed blackberry killer iphone killer
[ 1537, 4609, 8577, 9732, 3205, 11655, 9359, 1424, 529, 2449, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 11545, 2208, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 10802, 7220, 821, 5175, 7866, 1083, 1728, 7617, 4291, 7877, 10053...
Test
8,473
2
OLE_Automation:ole automation microsoft windows applications programming ole automation later renamed simply automation inter-process communication mechanism created microsoft based subset component object model com intended use scripting languages – originally visual basic – used several languages windows automation objects required implement idispatch interface provides infrastructure whereby applications called automation controllers access manipulate i.e set properties call methods shared automation objects exported applications supersedes dynamic data exchange dde older mechanism applications control one another dde ole automation automation controller client application exporting automation objects server contrary name automation objects necessarily use microsoft ole although automation objects used ole environments confusion roots microsoft earlier definition ole previously less synonym com ensure interoperability automation interfaces limited use subset com types specifically automation interfaces must use safearray instead raw com arrays automation-compatible com servers however rely in-built ole marshalling implementation avoids need additional proxy/stub projects marshalling out-of-process automation designed ease scripting mind controllers often provide languages visual basic applications end users allowing control automation objects via scripts automation objects often written conventional languages c++ c++ attributes used simplify development languages visual basic borland delphi also provides convenient syntax automation hides complexity underlying implementation order automate application developer automation controller must know object model employed target application exporting activation objects requires developer target application publicly document object model development automation controllers without knowledge target application object model difficult impossible complications automation components usually provided type libraries contain metadata classes interfaces features exposed object library interfaces described microsoft interface definition language type libraries viewed using various tools microsoft ole/com object viewer codice_1 part microsoft platform sdk object browser visual basic version 6 visual studio .net type libraries used generate proxy pattern/stub code interoperating com platforms microsoft .net java instance .net framework sdk includes tools generate proxy .net dll access automation objects using early binding information interfaces extracted type library late binding via idispatch mapped .net reflection api built-in .net-to-com bridge called com interop java lacks built-in com support toolsets like jacob jsegue generate proxy source code consisting two parts set java classes c++ source java native interface dll type libraries solutions work windows another java based j-interop library enables interoperability com components without jni using dcom wire protocol msrpc works non-windows platforms also microsoft publicly documented object model applications microsoft office software developers also documented object models applications object models presented automation controllers type libraries interfaces described odl automation available variety languages including limited
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 5677, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 2644, 9813, 10839, 603, 9819, 2146, 3170, 622, 9839, 4210, 7796, 1656, 6265, 5754, 4731, 7290, 10...
Test
8,474
3
PDP-10:pdp-10 digital equipment corporation pdp-10 later marketed decsystem-10 mainframe computer family manufactured beginning 1966 discontinued 1983 1970s models beyond marketed decsystem-10 name especially tops-10 operating system became widely used pdp-10 architecture almost identical dec earlier pdp-6 sharing 36-bit word length slightly extending instruction set improved hardware implementation aspects instruction set unusual notably byte instructions operated bit fields size 1 36 bits inclusive according general definition byte contiguous sequence fixed number bits pdp-10 machine made time-sharing common features made common fixture many university computing facilities research labs 1970s notable harvard university aiken lab mit ai lab project mac stanford sail computer center corporation ccc eth zir carnegie mellon university main operating systems tops-10 tenex used build early arpanet reasons pdp-10 looms large early hacker folklore projects extend pdp-10 line eclipsed success unrelated vax superminicomputer cancellation pdp-10 line announced 1983 original pdp-10 processor ka10 introduced 1968 uses discrete transistors packaged dec flip-chip technology backplanes wire wrapped via semi-automated manufacturing process cycle time 1 μs add time 2.1 μs 1973 ka10 replaced ki10 uses transistor–transistor logic ttl ssi joined 1975 higher-performance kl10 later faster variants built emitter-coupled logic ecl microprogrammed cache memory kl10 performance 1 megaflops using 36-bit floating point numbers matrix row reduction slightly faster newer vax-11/750 although limited memory smaller less expensive model ks10 introduced 1978 using ttl am2901 bit-slice components including pdp-11 unibus connect peripherals ks marketed decsystem-2020 dec entry distributed processing arena introduced world lowest cost mainframe computer system ka10 maximum main memory capacity virtual physical 256 kilowords equivalent 1152 kilobytes supplied dec include paging hardware memory management consisted two sets protection relocation registers called base bounds registers allows half user address space limited set section main memory designated base physical address size allows model separate read-only shareable code segment normally high segment read-write data/stack segment normally low segment used tops-10 later adopted unix ka10 machines first mit later bolt beranek newman bbn modified add virtual memory support demand paging ka10 weighed 10/50 top-of-the-line uni-processor ka machine time pa1050 software package introduced two ka10 models uniprocessor 10/40 dual-processor 10/55 ki10 later processors offer paged memory management also support larger physical address space 4 megawords ki10 models include 1060 1070 1077 latter incorporating two cpus original kl10 pdp-10 also marketed decsystem-10 models 1080 1088 etc use original pdp-10 memory bus external memory modules module context meant cabinet dimensions roughly wxhxd 30 x 75 x 30 capacity 32 256 kwords magnetic core memory picture right hand side introduction shows six cabinets processors used decsystem-20 2040 2050 2060 2065 commonly incorrectly called kl20 use internal memory mounted cabinet cpu 10xx models also different packaging come original tall pdp-10 cabinets rather short ones used later decsystem-20 differences 10xx 20xx models cosmetic real 10xx systems 20-style internal memory i/o 20xx systems 10-style external memory i/o bus particular arpanet tops-20 systems i/o bus an20 imp interface i/o bus device could run either tops-10 tops-20 microcode thus corresponding operating system later model b version 2060 processors removed 256 kiloword limit virtual address space allowing use 32 sections 256 kilowords along substantial changes instruction set model model b kl10 processors thought different cpus first operating system took advantage model b capabilities tops-20 release 3 user mode extended addressing offered tops-20 release 4 tops-20 versions release 4.1 would run model b. tops-10 versions 7.02 7.03 also use extended addressing run 1090 1091 model b processor running tops-20 microcode final upgrade kl10 mca25 upgrade 2060 2065 1091 1095 gave performance increases programs run multiple sections ks10 design crippled model even though necessary data paths needed support model b architecture present doubt intended segment market greatly shortened ks10 product life frontend processors computers extend functionality systems connected kl class machines started without assistance pdp-11/40 frontend computer installed every system pdp-11 booted dual-ported rp06 disk drive alternatively 8 floppy disk drive dectape commands given pdp-11 start main processor typically booted rp06 disk drive pdp-11 pdp-11 performs watchdog functions main processor running networking remote job entry rje accomplished via pdp-11/34a frontend dec used terms dn60 d60spl ks system uses similar boot procedure 8080 cpu loads microcode rm03 rm80 rp06 disk magnetic tape starts main processor 8080 switches modes operating system boots controls console remote diagnostic serial ports i/o architecture 20xx series kl machines based dec bus design called massbus many attributed success pdp-11 dec decision make pdp-11 unibus open architecture dec reverted prior philosophy kl making massbus unique proprietary consequently aftermarket peripheral manufacturers made devices massbus dec chose price massbus devices notably rp06 disk drive substantial premium comparable ibm-compatible devices compuserve one designed alternative disk controller could operate massbus connect ibm style 3330 disk subsystems two models tape drives supported tm10 magnetic tape control subsystem mix eight could supported providing seven-track /or nine-track devices tu20 tu30 came 9 track b 7 track versions aforementioned tape drives could read/write from/to 200 bpi 556 bpi 800 bpi ibm-compatible tapes tm10 magtape controller available two submodels first pdp-6s model kl-10s user-mode instruction set architecture largely section covers architecture multi-section extended addressing covered decsystem-10/decsystem-20 processor reference manual pdp-10 36-bit words 18-bit word addresses supervisor mode instruction addresses correspond directly physical memory user mode addresses translated physical memory earlier models give user process high low memory addresses 0 top bit used one base register higher addresses used another segment contiguous later architectures paged memory access allowing non-contiguous address spaces cpu general-purpose registers also addressed memory locations 0-15 16 general-purpose 36-bit registers right half registers register 0 may used indexing instructions operate pairs registers pc word consists 13-bit condition register plus 5 always zero bits left half 18-bit program counter right half condition register records extra bits results arithmetic operations e.g overflow accessed instructions two operational modes supervisor user mode besides difference memory referencing described supervisor-mode programs execute input/output operations communication user-mode supervisor-mode done unimplemented user operations uuos instructions defined hardware trapped supervisor mechanism also used emulate operations may hardware implementations cheaper models major datatypes directly supported architecture two complement 36-bit integer arithmetic including bitwise operations 36-bit floating-point halfwords extended 72-bit floating point supported special instructions designed used multi-instruction sequences byte pointers supported special instructions word structured count half pointer half facilitates use bounded regions memory notably stacks instruction set symmetrical every instruction consists 9-bit opcode 4-bit register code 23-bit effective address field consists turn 1-bit indirect bit 4-bit register code 18-bit offset instruction execution begins calculating effective address adds contents given register non-zero offset indirect bit 1 fetches word calculated address repeats effective address calculation effective address zero indirect bit reached resulting effective address used instruction either fetch memory contents simply constant thus example movei a,3 c adds 3 18 lower bits register c puts result register without touching memory three main classes instruction arithmetic logical move conditional jump conditional skip may side effects also several smaller classes arithmetic logical move operations include variants operate immediate-to-register memory-to-register register-to-memory register-and-memory-to-both memory-to-memory since registers may addressed part memory register-to-register operations also defined variants useful though well-defined example add operation variants addi add 18-bit mmediate constant register addm add register contents emory location addb add b oth add register contents memory also put result register elaborate example hlrom h alf l eft r ight nes emory takes left half register contents places right half memory location replaces left half memory location ones halfword instructions also used linked lists hlrz lisp car operator hrrz cdr conditional jump operations examine register contents jump given location depending result comparison mnemonics instructions start jump jumpa meaning jump always jump meaning jump never – consequence symmetric design instruction set contains several no-ops jump example jumpn loc jumps address loc contents register non-zero also conditional jumps based processor condition register using jrst instruction ka10 ki10 jrst faster jumpa standard unconditional jump jrst conditional skip operations compare register memory contents skip next instruction often unconditional jump depending result comparison simple example camn loc compares contents register contents location loc skips next instruction equal elaborate example tlce loc read test left complement skip equal using contents loc mask selects corresponding bits left half register bits e qual zero skip next instruction case replace bits boolean complement smaller instruction classes include shift/rotate instructions procedure call instructions particularly notable stack instructions push pop corresponding stack call instructions pushj popj byte instructions use special format indirect word extract store arbitrary-sized bit fields possibly advancing pointer next unit original pdp-10 operating system simply called monitor later renamed tops-10 eventually pdp-10 system renamed decsystem-10 early versions monitor tops-10 formed basis stanford waits operating system compuserve time-sharing system time pdp-10 operators began running operating systems assembled major components developed outside dec. example main scheduler might come one university disk service another commercial timesharing services compuserve on-line systems ols rapidata maintained sophisticated inhouse systems programming groups could modify operating system needed businesses without dependent dec others also strong user communities decus users share software developed bbn developed alternative operating system tenex fairly quickly became de facto standard research community dec later ported tenex kl10 enhanced considerably named tops-20 forming decsystem-20 line mit developed ctss compatible time-sharing system run ibm 709 later modified ibm 7094 system also developed incompatible timesharing system run pdp-6 later modified pdp-10 naming related since ibm dec/pdp hardware different i.e incompatible despite 36-bit cpu name selected tom knight play ctss name tymshare developed tymcom-x derived tops-10 using page-based file system like tops-20 1971 1972 researchers xerox parc frustrated top company management refusal let buy pdp-10 xerox bought scientific data systems sds 1969 wanted parc use sds machine instead group led charles p. thacker designed constructed two pdp-10 clone systems named maxc pronounced max honour max palevsky sold sds xerox use maxc also backronym multiple access xerox computer maxc ran modified version tenex third-party attempts sell pdp-10 clones relatively unsuccessful see foonly systems concepts xkl one largest collections decsystem-10 architecture systems ever assembled compuserve peak operated 200 loosely coupled systems three data centers columbus ohio compuserve used systems 'hosts providing access commercial applications compuserve information service first systems bought dec dec abandoned pdp-10 architecture favor vax compuserve pdp-10 customers began buying plug compatible computers systems concepts january 2007 compuserve operating small number pdp-10 architecture machines perform billing routing functions main power supplies used kl-series machines inefficient compuserve engineers designed replacement supply used half energy compuserve offered license design kl supply dec free dec would promise new kl bought compuserve would efficient supply installed dec declined offer another modification made pdp-10 compuserve engineers replacing hundreds incandescent indicator lamps ki10 processor cabinet led lamp modules cost conversion easily offset cost savings electricity use reduced heat labor needed replace burned-out lamps digital followed step world picture right hand side shows light panel mf10 memory contemporary ki10 cpu item part computer museum populated leds 2008 demonstration purposes similar banks indicator lamps kl ks processors pdp-10 eventually eclipsed vax superminicomputer machines descendants pdp-11 dec recognized pdp-10 vax product lines competing decided concentrate software development effort profitable vax pdp-10 product line cancellation announced 1983 including cancelling ongoing jupiter project produce new high-end pdp-10 processor despite project good shape time cancellation minnow project produce desktop pdp-10 may prototyping stage event spelled doom technical cultures spawned original jargon file 1990s become something badge honor among old-time hackers cut one teeth pdp-10 pdp-10 assembly language instructions ldb dpb load/deposit byte live functions programming language common lisp see references section lisp article 36-bit word size pdp-6 pdp-10 influenced programming convenience 2 lisp pointers 18 bits one word crowther created adventure prototypical computer adventure game pdp-10 daglow created first computer baseball game 1971 dungeon 1975 first role-playing video game pdp-10 walter bright originally created empire pdp-10 roy trubshaw richard bartle created first mud pdp-10 zork written pdp-10 infocom used pdp-10s game development testing bill gates paul allen originally wrote altair basic using intel 8080 emulator running pdp-10 harvard university founded microsoft shortly software simulation historical computers simh contains module emulate ks10 cpu windows unix-based machine copies dec original distribution tapes available downloads internet running tops-10 tops-20 system may established also available simh ken harrenstien klh10 software unix-like systems emulates kl10b processor extended addressing 4 mw memory ks10 processor 512 kw memory kl10 emulation supports v.442 kl10 microcode enables run final versions tops-10 tops-20 ks10 emulation supports v.262 microcode final version ks10 dec v.130 microcode final versions ks tops-10 tops-20
[ 7173, 2056, 2062, 9231, 9742, 8732, 557, 7739, 577, 2625, 3650, 7234, 3142, 8262, 1613, 2638, 86, 2650, 8301, 634, 1147, 11390, 2179, 4742, 2213, 3238, 6821, 8876, 8879, 9909, 9911, 7867, 2243, 8390, 5840, 9425, 11488, 10981, 4331, 5358, ...
Test
8,475
7
Densify:densify densify privately held software company based markham ontario canada company provides machine learning analytics services related public cloud utilization billing data deliver savings corporate cloud bill densify co-founded andrew hillier riyaz somani jayanti parmar 1999 2005 gerry smith – previously executive vice president governance solutions compuware corporation joined new ceo company formerly known cirba inc. changed name densify june 2017 delivered service densify patented optimization engine collects analyzes data cloud computing services environments combined advisory services cloud experts report cost explore usage patterns project future trends densify compatible amazon web services microsoft azure google cloud platform hybrid cloud environments densify also introduced complimentary ec2 assessment service help aws users identify risk reduction cost saving opportunities april 2017 idc recognized densify innovator multi-cloud management june 2017 ema research selected densify ema top 3 product stating densify delivers better application performance highest asset utilization lowest cloud spend without requiring special training september 2017 densify awarded best vmworld 2017 gold award recognized impressive find justin warren forbes january 2018 densify rated 9.5/10 zdnet.com recent product review 2018 densify acknowledged leader forrester wave™ report cloud cost monitoring optimization
[ 7248, 4194, 1935 ]
None
8,476
2
APT_(Package_Manager):apt package manager advanced package tool apt free-software user interface works core libraries handle installation removal software debian ubuntu related linux distributions apt simplifies process managing software unix-like computer systems automating retrieval configuration installation software packages either precompiled files compiling source code apt collection tools distributed package named apt significant part apt defined c++ library functions apt also includes command-line programs dealing packages use library three programs codice_1 codice_2 codice_3 commonly used examples apt simple ubiquitous apt package important priority current debian releases therefore included default debian installation apt considered front-end codice_4 friendlier older codice_5 front-end codice_4 performs actions individual packages apt manages relations especially dependencies well sourcing management higher-level versioning decisions release tracking version pinning apt often hailed one debian best features debian developers attribute strict quality controls debian policy major feature apt way calls codice_4 — topological sorting list packages installed removed calls codice_4 best possible sequence cases utilizes codice_9 options codice_4 however unable calculate avoid reason codice_4 requires action forced user indicates one packages installed package name phrased name portion package fully qualified filename instance debian system libc6 would argument provided codice_12 notably apt automatically gets installs packages upon indicated package depends necessary original distinguishing characteristic apt-based package management systems avoided installation failure due missing dependencies type dependency hell another distinction remote repository retrieval packages apt uses location configuration file codice_13 locate desired packages might available network removable storage medium example retrieve also obtain information available installed packages apt provides command options override decisions made apt-get conflict resolution system one option force particular version package downgrade package render dependent software inoperable user must careful finally codice_14 mechanism allows user create alternative installation policy individual packages user specify packages posix regular expression apt searches cached list packages lists dependencies must installed updated apt retrieves configures installs dependencies automatically triggers treatment deferred actions usage modes apt apt-get facilitate updating installed packages include codice_19 apt configuration folders files apt-config apt configuration query program codice_20 shows configuration apt relies concept repositories order find software resolve dependencies apt repository directory containing packages along index file specified networked cdrom location debian project keeps central repository 25,000 software packages ready download installation number additional repositories added apt sources.list configuration file codice_13 queried apt graphical front-ends often allow modifying codice_29 simply apt-setup package repository specified like system installation packages repository installed without specifying source kept up-to-date automatically addition network repositories compact discs storage media usb keydrive hard disks ... used well using apt-cdrom adding codice_33 source list file apt-cdrom specify different folder cd-rom using codice_34 option i.e hard disk usb keydrive debian cds available download contain debian repositories allows non-networked machines upgraded also one use apt-zip problems may appear several sources offer package systems possibly conflicting sources use apt pinning control sources preferred apt pinning feature allows administrators force apt choose particular versions packages may available different versions different repositories allows administrators ensure packages upgraded versions may conflict packages system sufficiently tested unwelcome changes order pins apt preferences file codice_35 must modified although graphical front-ends often make pinning simpler several front-ends apt exist provide advanced installation functions intuitive interfaces include apt front-ends apt front-ends list dependencies packages installed upgraded ask administrator packages recommended suggested newly installed packages installed automatically install dependencies perform operations system removing obsolete files packages original effort led apt-get program dselect replacement project known codename deity project commissioned brian white debian release manager time first functional version apt-get called dpkg-get intended test program core library functions would underpin new ui much original development apt done irc records lost 'deity creation team mailing list archives include major highlights deity name abandoned official name project due concerns religious nature name apt name eventually decided considerable internal public discussion ultimately name proposed irc accepted finalized mailing lists apt introduced 1998 original test builds circulated irc first debian version included debian 2.1 released 9 march 1999 end original goal deity project replacing dselect user interface ui failure work ui portion project abandoned ui directories removed cvs system first public release apt-get response apt dselect method command line utility great positive development efforts focused maintaining improving tool much later several independent people built uis top libapt-pkg eventually new team picked project began build new features released version 0.6 apt introduced secure apt feature using strong cryptographic signing authenticate package repositories apt originally designed front-end dpkg work debian codice_36 packages version apt modified also work rpm package manager system released apt-rpm fink project ported apt mac os x package management tasks apt also available opensolaris apt-file command packaged separately apt find package includes specific file list files included package remote repositories
[ 2050, 10760, 7181, 8213, 8727, 6680, 4123, 9245, 5155, 5670, 7722, 5677, 3131, 3649, 10817, 3654, 1107, 3667, 6227, 4192, 11363, 3685, 9324, 10860, 6257, 1138, 2168, 5755, 7293, 1668, 2180, 6797, 8848, 11410, 10900, 10394, 4775, 6828, 3245,...
Test
8,477
1
Integrated_test_facility:integrated test facility integrated test facility itf creates fictitious entity database process test transactions simultaneously live input used incorporate test transactions normal production run system advantage periodic testing require separate test processes however careful planning necessary test data must isolated production data moreover itf validates correct operation transaction application ensure system operated correctly integrated test facility considered useful audit tool audit uses programs compare processing using independently calculated data involves setting dummy entities application system processing test production data entity means verifying processing accuracy
[ 2901 ]
Validation
8,478
4
Endgame,_Inc.:endgame inc endgame provides cyber operations platform supporting detection exploitation mitigation cyber-threats endgame started executives iss internet security systems endgame started 2008 chris rouland executives previously worked cia iss october 2010 saw investment 29 million usd raised bessemer ventures columbia capital kleiner perkins caufield byers kpcb techoperators company offers commercial web-based malware detection services defensive digital security intelligence big data analysis software february 2011 company announced partnerships hewlett-packard ibm use endgame ip reputation intelligence service within hp tippingpoint digital vaccine service ibm managed services offerings month emails sent hb gary endgame leaked revealed company sold zero-day vulnerabilities 2014 endgame moved away zero-day exploitations identifying protecting consumers potential cyber threats endgame offers services companies within financial services industry consumer technology companies software company collects information data sources accessed consumers identifying potential security threats december 2012 endgame announced appointment nathaniel fick chief executive officer replacing chris rouland former marine author bestseller one bullet away fick previously ceo center new american security independent nonpartisan national security defense policy research institution remains operating partner bessemer venture partners march 2013 endgame closed 23 million series b equity financing stated purpose fund growth existing federal customer base well expand commercial market round led new investor paladin capital group multi-stage private equity firm included participation existing investors bessemer venture partners columbia capital kleiner perkins caufield byers techoperators endgame initially became known providing cyber intelligence us agencies national security agency 2013 expanded financial commercial clients within private sector raising additional 30 million funding investment edgemore capital top tier capital partners savano capital partners endgame offers defensive analytics company network servers data exploits endgame acquired onyxware 2014 florida-based mobile security technology company provides applications detecting third-party network threats november 2014 endgame boasts approximately 100 employees endgame board directors led christopher darby president ceo in-q-tel independent strategic investment firm supporting missions intelligence community endgame announced march 2013 kenneth minihan former director national security agency managing director paladin also joined board directors april 2014 james n. miller former secretary defense policy appointed board advisers niloofar howe appointed chief strategy officer jamie butler serves chief scientist jon brody senior vice president marketing jim tosh vice president engineering
[ 8320, 5986, 10309, 5384, 1994, 10539, 7887, 7515, 6005, 3323, 2558 ]
Test
8,479
9
Meta-circular_evaluator:meta-circular evaluator computing meta-circular evaluator mce meta-circular interpreter mci interpreter defines feature interpreted language using similar facility interpreter host language example interpreting lambda application may implemented using function application meta-circular evaluation prominent context lisp self-interpreter meta-circular interpreter interpreted language nearly identical host language two terms often used synonymously dissertation corrado böhm describes design self-hosting compiler self-interpreter meta-circular interpreter host language also language interpreted self-interpreter displays universal function language question helpful learning certain aspects language self-interpreter provide circular vacuous definition language constructs thus provides little insight interpreted language semantics example evaluation strategy addressing issues produces general notion definitional interpreter combination existing language implementation meta-circular interpreters provide baseline system extend language either upwards adding features downwards compiling away features rather interpreting also useful writing tools tightly integrated programming language sophisticated debuggers language designed meta-circular implementation mind often suited building languages general even ones completely different host language many languages one meta-circular implementations partial list languages meta-circular implementation designed bottom grouped chronological order languages meta-circular implementation via third parties
[ 6016, 3462, 10246, 9245, 6047, 5031, 4777, 5677, 2352, 8628, 438, 10043, 4799, 3904, 8262, 11087, 219, 10083, 8421, 6502, 8554, 2798, 8430, 9454, 9714, 3705 ]
Train
8,480
3
Macintosh_LC:macintosh lc macintosh lc personal computer designed manufactured sold apple computer inc. october 1990 march 1992 first macintosh lc family lc introduced macintosh classic repackaging older macintosh plus macintosh iisi new entry-level machine macintosh ii series offered half price macintosh ii significantly lesser performance overall creation lc prompted apple desire produce product could sold school boards price apple ii designed inexpensive manufacturing five major components robots could assemble computer 2400 list price new 600 12-inch color display 3500 less expensive macintosh ii long apple iie card introduced lc apple officially announced retirement ii company wanted focus sales marketing efforts lc original macintosh lc introduced october 1990 initial shipments dealers following december january replaced macintosh lc ii largely built around motorola 68030 processor lc uses pizza box case processor direct slot pds nubus slots 16 mhz 68020 microprocessor lacks floating-point coprocessor although one could added via pds lc 16-bit data bus major performance bottleneck 68020 32-bit cpu lc memory management chipset places limit 10 mb ram matter much installed lc shipped 256 kb vram supporting display resolution 512×384 pixels 8-bit color vram upgradeable 512 kb supporting display resolution 512×384 pixels 16-bit color 640×480 pixels 8-bit color lc commonly purchased apple 12 rgb monitor fixed resolution 512×384 pixels form factor exactly matching width lc chassis giving two together near all-in-one appearance apple 13 640×480 trinitron display also available list price 999 cost almost much lc introduction lc lowest resolution supported color macs 640×480 many programs written color macintosh ii family computers assumed minimum unusable lower resolution several years software developers add support smaller screen resolution order guarantee software would run lcs well color classics use resolution overall general performance machine disappointing due crippling data bus bottleneck making run far slower 16 mhz 68020-based macintosh ii 1987 identical processor ran almost twice fast one difference mac ii mac lc latter socket 68851 mmu therefore could take advantage system 7 virtual memory features standard configuration included floppy drive 40 mb 80 mb hard drive version available education market apple ii card pds slot two floppy drives hard drive lc final macintosh model allow dual internal floppy drives lc macs day featured built-in networking serial port using localtalk ethernet also available option via single pds slot single expansion slot limitation multifunction cards available combining ethernet functionality mmu fpu socket apple iie card pds slot offered bundle education models lcs card allowed lc emulate apple iie combination low-cost color macintosh apple iie compatibility intended encourage education market transition aging apple ii models macintosh platform instead new low-cost ibm pc compatibles despite lc minimal video specs 12 monitor lc supports card switched 560×384 resolution better compatibility iie 280×192 high-resolution graphics essentially doubled introduced october 15 1990
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 576, 1090, 4180, 10838, 10840, 9312, 8806, 6258, 10357, 7286, 4220, 10365, 10878, 6783, 7299, 4741, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 7869, 8893, ...
Validation
8,481
3
Xilleon:xilleon xilleon brand family socs combining low-power cpu asics accelerated video decompression functions major worldwide broadcast networks including pal ntsc secam atsc targeting digital television i.e products like set-top boxes integrated digital television digital television adapters smart tvs etc. xilleon-branded socs revealed next generation avivo named unified video decoder uvd based xilleon video processor provide hardware decoding h.264 vc-1 video codec standards amd trueaudio amd unified video decoder uvd based cadence tensilica xtensa processor originally licensed ati technologies inc. 2004 owner brand xilleon ati technologies later advanced micro devices broadcom amd announced completion acquisition ati technologies third quarter 2006 xilleon products would sold amd brand amd xilleon august 25 2008 xilleon line sold semiconductor company broadcom new line xilleon video processors flat panel lcd tvs named xilleon panel processors four models 410 411 420 421 announced ces 2008 supporting 1080p video resolution featuring technology advanced motion estimation motion compensation frame rate conversion technology based enhanced phase-plane correlation technology converts 24 60 hz input video signals 100 120 hz refresh rates used lcd tvs creating additional frames form smoother motion amd signed agreement divx inc. allow several future xilleon video processors implement hardware divx video decoding divx certification january 2008 however result company restructuring amd divested digital tv chipset business starting second quarter 2008
[ 4098, 8327, 8711, 783, 7445, 9368, 9851, 4124, 5028, 6057, 938, 426, 8237, 1461, 7234, 1480, 10316, 6247, 6250, 6252, 6253, 1776, 6256, 5237, 760, 3451 ]
Test
8,482
2
Comparison_of_IPv6_support_in_operating_systems:comparison ipv6 support operating systems comparison operating systems regard support ipv6 protocol
[ 5472, 10144, 6724, 649, 7595, 4687, 8976, 11184, 7733, 1304, 11673, 4891, 2168, 10461, 5470 ]
None
8,483
1
China_Economic_Databases:china economic databases china economic databases ced project china studies center national chengchi university taiwan collects publishes information china economic development support scholarly research ced available chinese english ced designed scholars students interested study development economy china anyone able add information platform submitting relevant material ced sponsored center china studies national chengchi university taiwan supported taiwan ministry education project launched december 2003 currently directed dr. chen-yuan tung professor graduate institute development studies national chengchi university currently ten databases 1 china economic literature index database china economic literature database celd currently collects data 47 chinese periodicals 22 english sources additionally online databases ssci econlit used keep database up-to-date information celd range topics including macroeconomics capital investment regional development economical reform trade taiwan mainland china chinese foreign trade renminbi exchange economical globalization financial policy financial reform search function also available ease data collecting currently celd approximately 3,000 papers july 2007 2 china economic experts database 3 china economic books database china economic books database cebd main purpose form comprehensive listing books topic china ’ economy cebd includes titles world including english chinese traditional simplified titles subjects books cebd include china economic globalization regional economy international trade rmb exchange rate domestic economic development financial market industry development commerce investment overall economic policy evaluation analysis every book cebd listed relevant search info author/editor ’ name publisher publication date isbn key word classification full listing cebd data sources found 4 china economic websites database china economic websites database collects relevant websites categorizes easy use according various aspects china economy 5 china economic government reports database china economic policy reports database ceprd platform holds economic policy reports chinese government white papers database currently lists reports since 2000 english chinese range content included national development plans agricultural policy monetary policy system reform policy financial market supervision policy commercial investment reports economical operation reports balance payment reports reports listed according policy name issuing unit date issued content summary source along full text linking download capabilities complete list sources please see following link 6 china economic analysis reports database china economic reports database cerd offers reports related indicators china ’ economy gdp cpi investment import export volumes reports published biweekly monthly annually therefore cerd constantly updated reports listed along title publishing institution content abstract 7 china economic conference database china economic conference database cecd offers information upcoming conferences related china ’ economy aims set platform scholars communicate issues china ’ economy also advertise promote conferences information includes theme conference date venue sponsor agenda conference link 8 china economic call papers database china economic call papers database related conference database providing up-to-date info upcoming current calls papers related forthcoming conferences dealing china economy 9 renminbi database renminbi rmb database focused relevant materials towards rmb research content includes rmb reports academic journals books research papers policy reports research meetings syllabus within sub-databases china economic databases platform 10 opencourseware ocw project gathers syllabi related course materials promote research learning field china economy february 2008 ocw site approaching 100 courses schools harvard yale johns hopkins peking university 1 china economic database e-paper english-language publications bi-weekly china economic databases e-paper available online e-paper gives updates recent journals books people republic china government white papers policy reports china economic analysis monthly published online reports recent macroeconomic developments e-paper china economic analysis monthly available traditional simplified chinese 2 china economic analysis monthly monthly publication provides indepth look china economy featuring graphs text various sectors china economy valuable tool scholars currently publication text chinese 3 china economic world ranking report china economic world ranking report gives clear overview china position world economy currently report available chinese however ranking tables listed english chinese
[]
None
8,484
3
Xybots:xybots xybots 1987 third-person shooter arcade game atari games xybots two players control major rock hardy captain ace gunn must travel 3d maze fight series robots known xybots whose mission destroy mankind game features split screen display showing gameplay bottom half screen information player status current level top half designed ed logg originally conceived sequel previous title gauntlet game well received reviewers lauding game various features particularly cooperative multiplayer aspect despite met limited financial success attributed unique control scheme involves rotating joystick turn player character xybots ported various personal computers atari lynx handheld versions nintendo entertainment system sega genesis/mega drive announced never released emulated versions arcade game later released part various compilations starting midway arcade treasures 2 2004 two players navigate corridors either rock hardy ace gunn battling enemy xybots laser gun seeking cover enemy fire behind various objects attempting reach level exit certain levels players face large boss xybot players move using joystick also rotates turn player character lower half screen shows gameplay area players upper half split map current level status display player display shows player remaining energy replenished collecting energy pods within levels energy also purchased shops levels using coins dropped defeated xybots player also purchase power-ups shops including extra armor increased speed strength firepower along maze enemy maps concept game born attempt designer ed logg engineer/technician doug snyder create first-person video game without specialized hardware 2005 logg recalled trouble controls game building controls worked game design getting players realize could rotate joystick turn in-game characters difficulties logg unsure game would enter mass production originally logg envisioned game second sequel gauntlet titled gauntlet iii catacombs however marketing department atari games want make another gauntlet game made change title logg co-programmer bob flannagan eventually settled theme based major havoc previous atari arcade game upon release game positively reviewed drew favorable comparisons berzerk gauntlet maze-like stages shooting gameplay game various features including cooperative gameplay praised computer video games games machine citing aspects made game addictive commodore user also cited two-player game highlight saying real appeal team game mate running place covering dividing destroying robots maze lending one another gold coins shop ed logg recalled 2005 game financial success gamestm wrote xybots overlooked arcades due complex controls tricky gameplay lack earnings arcades reason sequel ever developed retrospect wrote game ahead time offered unique experience similar games era unable match xybots ported various contemporary computers msx commodore 64 amstrad zx spectrum atari st commodore amiga received ports 1991 atari games subsidiary tengen released version game portable atari lynx version sega genesis/mega drive tengen announced 1990 winter consumer electronics show alongside ports atari games titles paperboy hard drivin latter two games released system xybots planned nintendo entertainment system port tengen also went unreleased acquired rights atari games arcade library parent company williams midway released arcade version xybots part 2004 console compilation midway arcade treasures 2 well midway arcade treasures deluxe edition microsoft windows.the arcade version also saw release psp part midway arcade treasures extended play dissolution midway 2009 warner bros. interactive entertainment picked rights midway arcade titles releasing xybots playstation 3 xbox 360 part midway arcade origins various platforms lego dimensions midway arcade level pack
[ 7269, 8937, 6797, 9006, 1776, 4856, 7281, 9951, 4152, 9627, 5340, 95 ]
None
8,485
6
Volume_serial_number:volume serial number volume serial number serial number assigned disk volume tape volume originated 1950s mainframe computer operating systems os/360 line human-configurable maximum length six characters uppercase must start letter identifies volume system unique manner example sysres often used system residence volume fat ntfs file systems volume serial number feature used determine disk present drive detect exchanged another one identification system created microsoft ibm development os/2 introduced ms-dos 4.01 1988 volume serial number 32-bit number determined date time real-time clock current computer time disk formatting previously method used discern whether disk swapped identified reading drive volume label much similar concept os/360 however even time volume label required unique optional therefore many users given disks meaningful name old method failed
[ 3841, 9762, 1801, 7244, 9166, 2193, 7836 ]
Validation