node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
8,686 | 0 | IntraText:intratext intratext digital library offers interface meeting formal requirements texts displayed hypertextual way based tablet pc interface linking words text provides concordances word lists statistics links cited works content available creative commons license also offers publishing services enable similar advantages intratext interface applies cognitive ergonomics model based lexical hypertext tablet pc touch screen interface uses set tools methods based hlt human language technologies intratext reading reference search tool used read work browse text hypertext search words phrases simple click pen mouse tablet pc interface allows browse search without keyboard using mouse computer pen touch screen tablet pc ease use accessibility intratext appreciated features intratext structured create make available high quality electronic editions particularly editorial philological linguistics aspects intratext editions published internet intranets distributed cd-rom several ways intratext allows reproduce faithfully scholarly editions complete footnotes even structured several apparatuses philological annotations references one different editions differences author lexicon lexicon authors several languages text finally intratext supports intra- extra-textual links citations extra-textual citations automatically linked cited work made available intratext edition intratext allows create text collections whole hypertext example collected works author corpora etc intratext collection creates browsing system preserves identity collected text author title structure criteria concordance reference unifies concordances intratext collection table contents two levels index works work toc system generates intratext checks text several issues according schema conceived improve content quality representation quality particular | [] | None |
8,687 | 2 | Edos:edos edos operating system based upon ibm original mainframe dos confused unrelated better known dos ibm pc name stood extended enhanced disk operating system 1970 ibm announced ibm/370 product line along new peripherals software products operating systems including dos/vs supplanted dos although ibm rightly focused new products computing world dominated ibm/360 line left lot users nervous investment although couple projects emulating ibm/370 ibm/360 e.g. cfs inc. couple companies took different approach extending then-current limited dos computer software company tcsc took latter approach starting 1972 developed edos extended disk operating system extended number fixed program space partitions 3 6 added support new hardware included features ibm offered separately first version edos released 1972 response announcement ibm dos release 26 last dos release supported system 360 future dos releases would support system 370 machines also made available third party enhancements spooler docs cfs inc. tcsc enhanced edos become edos/vs announced 1977 delivered beta test sites 1978 may 1977 tcsc announced would release edos/vs response ibm release dos/vs release 34 advanced functions-dos/vs edos/vs based ibm dos/vs release 34 provided equivalent functionality ibm advanced functions-dos/vs product unlike ibm offerings edos/vs would run system 360 machines system 370 machines lacking virtual storage hardware non-vs machines whereas ibm offerings supported latest system 370 models vs hardware included tcsc identified parts ibm dos/vs release 34 operating system relied upon system/370-only machine instructions rewrote use instructions supported system/360 tcsc legally able reuse ibm dos/vs release 34 code since ibm intentionally published code without copyright notice made public domain us copyright law time 1981 ncsc announced plans release edos/vse 2.0 based ibm dos/vse release 35 suitable ibm 4300 machines tcsc founded jerry enfield tom steel responsible development marketing respectively company headquarters richmond virginia tcsc expanded canada australia europe 1980 company acquired nixdorf became ncsc products tcsc included extended console econ system enabled display system console using crt terminal ibm 3270 econ available ibm dos dos/vs tcsc edos edos/vs operating systems tcsc licensed datacom/db applied data research adr run edos edos/vs operating systems 1980 nixdorf bought tcsc nixdorf sought continue licensing arrangement adr ncsc went court dispute whether licensing arrangement terminated acquisition adr nixdorf settled court 1981 agreement nixdorf could continue resell adr products 1973 tcsc released remote job entry rje option edos 1975 tcsc released tape management system edos known tms 1983 ncsc announced unix compatibility subsystem ibm mainframes running ibm dos/vs e nixdorf edos/vs edos/vse operating systems known programmer work station/vse-advanced functions pws/vse-af short pws/vse-af based coherent unix clone developed mark williams company | [
2179,
10499,
10883,
394,
1147,
1804,
3978,
6797,
273,
7057,
6675,
7187,
11539,
9366,
11667,
6296,
25,
10776,
8092,
4637,
7325,
9887,
10016,
9762,
421,
5158,
10235,
2345,
7983,
3248,
5936,
6706,
7217,
11184,
6837,
9141,
823,
9784,
4409,
10... | None |
8,688 | 0 | Mobile_translation:mobile translation mobile translation refers electronic device software application provides audio translation includes handheld electronic device specifically designed audio translation also includes machine translation service software application hand-held devices including mobile telephones pocket pcs pdas mobile translation provides hand-held device users advantage instantaneous non-mediated translation one human language another usually service fee nevertheless significantly smaller human translator charges mobile translation part new range services offered mobile communication users including location positioning gps service e-wallet mobile banking business card/bar-code/text scanning etc relies computer programming sphere computational linguistics device communication means internet connection sms work translation system allowing japanese exchange conversations foreign nationals mobile phones first developed 1999 advanced telecommunications research institute international-interpreting telecommunications research laboratories based kansai science city japan words spoken mobile device translated target language sent voice user mobile phone machine translation software handheld devices featuring translation capabilities user-input text sms email commercially released 2004 transclick patent issued transclick sms email im translation 2006 november 2005 another japanese company nec corporation announced development translation system could loaded mobile phones mobile translation system could recognize 50,000 japanese words 30,000 english words could used simple translations travelling however january 2009 nec corporation officially demonstrated product technological advances within miniaturization computing communication devices made possible usage mobile telephones language learning among early projects spanish study programs included vocabulary practice quizzes word phrase translations soon projects developed using mobile phones teach english japanese university 2005 shifted focus providing vocabulary instruction sms similar program created learning italian australia vocabulary phrases quizzes short sentences sent via sms google translate one highly-utilized translation services see also infoscope handheld device composed digital camera wireless internet access developed ibm almaden research center ili handheld device provide instantaneous audio translation one language another provides translation english japanese chinese one2one prototype rely internet connectivity order function provide audio translation eight languages pixel buds device produced google provide real-time audio translation 40 languages order support machine translation service mobile device needs able communicate external computers servers receive user-input text/speech translate send back user usually done via internet connection wap gprs edge umts wi-fi earlier applications used sms communicate translation server mobile translation confused user-editable talking dictionaries phrase books already widespread available many hand-held devices normally require internet connectivity mobile device mobile translation may include number useful features auxiliary text translation forms basis service user input text using device keyboard also use pre-existing text form email sms messages received user device email/sms translation also possible send translated message optionally containing source text well translation mobile translation applications also offer additional services facilitate translated communication process may transformed human speech computer renders voice native speaker target language record speech send translation server convert text translating device camera printed text road sign restaurant menu page book etc application send translation server apply optical character recognition ocr technology extract text return user editing necessary translate chosen language combination get connected automatically live interpreter recently notable increase number language pairs offered automatic translation mobile devices japanese service providers traditionally offer cross-translation japanese chinese english korean others may offer translation 20 languages 200 language pairs including latin languages speech generation however limited smaller portion including english spanish italian french chinese etc image translation depends ocr languages available portable real-time automated translation one disposal number practical uses advantages advances mobile technology machine translation services helped reduce even eliminate disadvantages mobile translation reduced screen size mobile device one-finger keyboarding many new hand-held devices come equipped qwerty keyboard and/or touch-sensitive screen well handwriting recognition significantly increases typing speed 2006 new mobile phones devices began featuring large screens greater resolutions 640 x 480 px 854 x 480 px even 1024 x 480 px gives user enough visible space read/write large texts 2011 so-called hybrid translation technology introduced mylanguage mobile app vocre relies large part crowd-sourced language data however important challenge facing mobile translation industry linguistic communicative quality translations although providers claim achieved accuracy high 95 boasting proprietary technology capable “ understanding ” idioms slang language machine translation still distinctly lower quality human translation used care matters translated require correctness disadvantage needs mentioning requirement stable internet connection user mobile device since sms method communicating translation server proved less efficient sending packets data – message length limit 160 characters higher cost sms compared internet traffic charges – internet connectivity mobile devices must coverage non-urban areas still unstable | [
5122,
2054,
2440,
11529,
2059,
3085,
6798,
11538,
1044,
2582,
5399,
538,
7599,
4531,
4662,
3127,
2488,
10557,
3646,
6208,
8514,
3533,
5197,
6223,
10452,
8538,
2781,
8440,
2273,
1890,
5857,
7780,
7918,
8046,
3698,
5875,
10231,
2680,
3323,
... | None |
8,689 | 1 | Web_SQL_Database:web sql database web sql database web page api storing data databases queried using variant sql api supported google chrome opera safari android browser w3c web applications working group ceased working specification november 2010 citing lack independent implementations i.e use database system sqlite backend reason specification could move forward become w3c recommendation mozilla corporation one major voices behind break-up negotiations deprecation standard time main proponents behind 'alternative storage standard indexeddb | [
8584,
1802,
10506,
9229,
6034,
11154,
1556,
10020,
5546,
10026,
7212,
10284,
10413,
4658,
9395,
2485,
1468,
4797,
8644,
11466,
3920,
2901,
5849,
5593,
6366,
865,
7784,
9834,
9841,
119,
124,
9726
] | Test |
8,690 | 2 | Progeny_Linux_Systems:progeny linux systems progeny linux systems company provided linux platform technology platform services technology supported debian rpm-based distributions linux platforms progeny linux systems based indianapolis ian murdock founder debian founder chairman board cto john h. hartman bruce byfield marketing communications director progeny created operating system called progeny componentized linux progeny eventually announced via post mailing lists 1 may 2007 ceasing operations progeny componentized linux usually called progeny debian defunct free operating system progeny announced post various mailing lists 1 may 2007 ceasing operations shut website progeny debian alternative debian 3.1 furthermore based upon linux standard base lsb 3.0 adopting technology anaconda installer ported red hat advanced packaging tool discover progeny debian aimed model developing component-based linux | [
4123,
2692,
7204,
823
] | Test |
8,691 | 8 | Tornado_(web_server):tornado web server tornado scalable non-blocking web server web application framework written python developed use friendfeed company acquired facebook 2009 tornado open-sourced soon tornado noted high performance tries solve c10k problem affecting servers | [
9229,
2062,
7695,
2576,
9245,
8739,
2596,
44,
5165,
10800,
6714,
2130,
595,
84,
102,
11376,
3705,
11386,
148,
8350,
5791,
3746,
3237,
4777,
7338,
9387,
11439,
8883,
692,
190,
7359,
1222,
225,
1250,
4837,
6379,
2287,
7430,
11017,
7443,
1... | Test |
8,692 | 4 | Ping_(networking_utility):ping networking utility ping computer network administration software utility used test reachability host internet protocol ip network available virtually operating systems networking capability including embedded network administration software ping measures round-trip time messages sent originating host destination computer echoed back source name comes active sonar terminology sends pulse sound listens echo detect objects water ping operates sending internet control message protocol icmp echo request packets target host waiting icmp echo reply program reports errors packet loss statistical summary results typically including minimum maximum mean round-trip times standard deviation mean command-line options ping utility output vary numerous implementations options may include size payload count tests limits number network hops ttl probes traverse interval requests many systems provide companion utility ping6 testing internet protocol version 6 ipv6 networks implement icmpv6 ping utility written mike muuss december 1983 employment ballistic research laboratory us army research laboratory created tool troubleshoot problems ip network mike muuss inspired remark david mills using icmp echo packets ip network diagnosis measurements author named sound sonar makes since methodology analogous sonar echo location first released version public domain software subsequent versions licensed bsd license ping first included 4.3bsd freedos version developed erick engelke licensed gpl tim crawford developed reactos version licensed mit license rfc 1122 prescribes host must process icmp echo requests issue echo replies return following output running ping linux sending five probes target host www.example.com output lists probe message results obtained finally lists statistics entire test example shortest round trip time 9.674 ms average 10.968 ms maximum value 11.726 ms measurement standard deviation 0.748 ms cases response target host implementations display either nothing periodically print notifications timing possible ping results indicating problem include following case error target host intermediate router sends back icmp error message example host unreachable ttl exceeded transit addition messages include first eight bytes original message case header icmp echo request including quench value ping utility match responses originating queries generic composition icmp packet echo request ping icmp/icmp6 message identifier sequence number used client match reply request caused reply practice linux systems use unique identifier every ping process sequence number increasing number within process windows uses fixed identifier varies windows versions sequence number reset boot time echo reply icmp message generated response echo request mandatory hosts must include exact payload received request payload packet generally filled ascii characters output tcpdump utility shows last 32 bytes following example eight-byte icmp header starting payload may include timestamp indicating time transmission sequence number found example allows ping compute round trip time stateless manner without needing record time transmission packet payload may also include magic packet wake-on-lan protocol minimum payload case longer shown echo request typically receive reply host sleeping hibernation state host still wakes sleep state interface configured accept wakeup requests host already active configured allow replies incoming icmp echo request packets returned reply include payload may used detect remote host effectively woken repeating new request delay allow host resume network services host sleeping low power active state single request wakes host enough allow echo reply service reply instantly service enabled host need completely wake devices may return low power mode short delay configuration may used avoid host enter hibernation state much longer wake delay time passed low power active mode conduct denial-of-service attack attacker may send ping requests fast possible possibly overwhelming victim icmp echo requests technique called ping flood ping requests multiple addresses ping sweeps may used obtain list hosts network | [
515,
516,
9733,
1030,
9735,
2568,
6674,
8729,
9780,
3659,
4174,
4687,
6735,
4703,
3169,
1647,
9839,
5759,
8834,
6281,
6797,
4750,
2198,
4248,
6812,
7329,
4771,
7847,
1705,
2739,
7356,
10428,
11464,
10442,
1741,
1750,
9946,
3292,
4850,
741... | Test |
8,693 | 3 | Conway's_law:conway law conway law adage named computer programmer melvin conway introduced idea 1967 states law based reasoning order software module function multiple authors must communicate frequently therefore software interface structure system reflect social boundaries organization produced across communication difficult conway law intended valid sociological observation although sometimes used humorous context dubbed conway law participants 1968 national symposium modular programming eric s. raymond open-source advocate restated conway law new hacker dictionary reference work based jargon file organization software organization software team congruent said summarizing example conway paper raymond wrote four groups working compiler 'll get 4-pass compiler james o. coplien neil b. harrison stated one also see impact conway law design corporate websites nigel bevan usability expert stated 1998 organisations often produce web sites content structure mirrors internal concerns organisation rather needs users site similar effect may found websites undergo design committee evidence support conway law published team massachusetts institute technology mit harvard business school researchers using mirroring hypothesis equivalent term conway law found strong evidence support mirroring hypothesis significant differences product modularity consistent view distributed teams tend develop modular products additional likewise supportive case studies conway law conducted nagappan murphy basili university maryland collaboration microsoft syeed hammouda tampere university technology finland | [
9573
] | Validation |
8,694 | 4 | Replay_attack:replay attack replay attack also known playback attack form network attack valid data transmission maliciously fraudulently repeated delayed carried either originator adversary intercepts data re-transmits possibly part masquerade attack ip packet substitution one lower tier versions man-in-the-middle attack another way describing attack attack security protocol using replay messages different context intended original expected context thereby fooling honest participant thinking successfully completed protocol run suppose alice wants prove identity bob bob requests password proof identity alice dutifully provides possibly transformation like hash function meanwhile eve eavesdropping conversation keeps password hash interchange eve posing alice connects bob asked proof identity eve sends alice password hash read last session bob accepts thus granting eve access replay attacks prevented tagging encrypted component session id component number using combination solutions use anything interdependent one another interdependency fewer vulnerabilities works unique random session id created run program thus previous run becomes difficult replicate case attacker would unable perform replay new run session id would changed session ids also known session tokens one mechanism used help avoid replay attacks way generating session id works follows session tokens chosen random process usually pseudorandom processes used otherwise eve may able pose bob presenting predicted future token convince alice use token transformation eve replay reply later time previously predicted token actually presented bob bob accept authentication one-time passwords similar session tokens password expires used short amount time used authenticate individual transactions addition sessions also used authentication process help establish trust two parties communicating bob also send nonces include message authentication code mac alice check timestamping another way preventing replay attack synchronization achieved using secure protocol example bob periodically broadcasts time clock together mac alice wants send bob message includes best estimate time clock message also authenticated bob accepts messages timestamp within reasonable tolerance advantages scheme bob need generate pseudo- random numbers alice n't need ask bob random number networks unidirectional near unidirectional advantage trade-off replay attacks performed quickly enough i.e within 'reasonable limit could succeed kerberos authentication protocol includes countermeasures classical case replay attack message captured adversary replayed later date order produce effect example banking scheme vulnerable attack message results transfer funds could replayed transfer funds originally intended however kerberos protocol implemented many versions ldap microsoft windows active directory includes use scheme involving time stamps severely limit effectiveness replay attacks messages past time live ttl considered old discarded improvements proposed including using triple password scheme three passwords used authentication server ticket granting server tgs servers use passwords encrypt messages secret keys different servers encryption provided three keys help aid preventing replay attacks wireless ad hoc networks also susceptible replay attacks case authentication system improved made stronger extending aodv protocol method improving security ad hoc networks increases security network small amount overhead extensive overhead network would run risk becoming slower performance would decrease keeping relatively low overhead network maintain better performance still improving security authentication sign-on clients using point-to-point protocol ppp susceptible reply attacks using password authentication protocol pap validate identity authenticating client sends username password clear authenticating server sends acknowledgement response intercepting client therefore free read transmitted data impersonate client server well able store client credentials later impersonation server challenge-handshake authentication protocol chap secures sort replay attack authentication phase instead using challenge message authenticator client responds hash-computed value based shared secret e.g client password authenticator compares calculation challenge shared secret authenticate client relying shared secret transmitted well features authenticator-controlled repetition challenges changing identifier challenge values chap provides limited protection replay attacks several real world examples replay attacks used issues detected fixed order prevent attacks many vehicles road use remote keyless system key fob convenience user modern systems hardened simple replay attacks vulnerable buffered replay attacks attack performed placing device receive transmit radio waves within range target vehicle transmitter attempt jam rf vehicle unlock signal sent placing buffer later use upon attempts unlock vehicle transmitter jam new signal cache play back old one creating rolling buffer one step ahead vehicle later time attacker may use buffered code unlock vehicle various devices use speaker recognition verify identity speaker text-dependent systems attacker record target individual ’ speech correctly verified system play recording verified system counter-measure devised using spectral bitmaps stored speech verified users replayed speech different pattern scenario rejected system | [
8828,
3460,
11524,
262,
8978,
767,
4863,
1941,
5657,
5404,
3742,
8095,
2080,
3490,
2470,
2087,
11175,
3629,
10801,
4793,
5433,
6975,
2497,
4163,
1608,
6098,
10329,
6877,
223,
5472,
7265,
2274,
10344,
2928,
8432,
11639,
2426,
1276,
895
] | None |
8,695 | 9 | Philip_S._Abrams:philip s. abrams philip s. abrams computer science researcher co-authored first implementation programming language apl 1962 kenneth e. iverson published book programming language describing mathematical notation describing array operations mathematics 1965 abrams lawrence m. breed produced compiler translated expressions iverson apl notation ibm 7090 machine code 1970s vice president development scientific time sharing corporation stsc inc | [
8987,
9019,
1883,
9825,
11099,
9993,
11625,
1099,
4331,
10668,
2670,
3323,
7630,
2519,
4921,
505,
1178,
667
] | Train |
8,696 | 4 | Procera_Networks:procera networks procera networks networking equipment company based fremont california united states designs sells network intelligence solutions based deep packet inspection dpi technology procera sells solutions telecom operators governments enterprises network equipment vendors areas analytics traffic management policy charging control service provider compliance procera incorporated 2002 california company initially created deliver intelligent ethernet network switches company changed product line merged netintact company based varberg sweden offered bandwidth management products scandinavian network operators packetlogic brand merger announced may closed june 2006 procera shifted company product strategy netintact product lines 2006 2008 procera sold inexpensive less 2 gbit/s traffic management products small operators enterprises operators like com hem sweden september 2007 procera networks became listed american stock exchange stock symbol pkt beginning 2008 procera began focusing larger carriers mobile operators several customers reported use procera technology yoigo genband resells procera products p-series products procera named one fastest growing network companies deloitte 2010 2011 part deloitte fast 500 study june 24 2011 procera networks joined russell 3000 index december 2011 procera moved nasdaq stock exchange using symbol pkt 2013 procera bought vineyard networks canadian dpi company c 28 million vineyard product sold market network application visibility library navl network equipment vendors 2015 procera acquired francisco partners private equity firm based san francisco procera operates private company longer listed nasdaq 2017 francisco partners acquired sandvine merged procera procera offers network intelligence solutions based version deep packet inspection dpi called datastream recognition definition language drdl drdl uses properties applications identification purposes allows operators manage subscriber traffic based application similar many dpi products procera offers 100 use cases analytics traffic management policy enforcement service provider compliance october 2016 alleged procera sold dpi software government turkey via telecoms company turk telecom order reveal usernames passwords people visiting unencrypted websites according forbes significant internal opposition technologists working procera sale current former employees said told forbes 'turk telekom requested feed subscribers ’ usernames passwords unencrypted websites also ip addresses sites ’ visited | [
10417,
1015
] | Validation |
8,697 | 2 | Terminal_mode:terminal mode terminal mode one set possible states terminal pseudo terminal character device unix-like systems determines characters written terminal interpreted cooked mode data preprocessed given program raw mode passes data as-is program without interpreting special characters system intercepts special characters cooked mode interprets special meaning backspace delete control-d typically used enable line-editing input running programs control characters control-c control-z used job control associated signals precise definition constitutes cooked mode operating system-specific example “ abc backspace ” given input program terminal character device cooked mode program gets “ abd ” terminal raw mode program gets characters “ abc ” followed backspace character followed “ ” cooked mode terminal line discipline processes characters “ abc backspace ” presents result “ abd ” program technically term “ cooked mode ” associated streams terminal line discipline generally applied system amount preprocessing cbreak mode sometimes called rare mode mode raw mode cooked mode unlike cooked mode works single characters time rather forcing wait whole line feeding line unlike raw mode keystrokes like abort usually control-c still processed terminal interrupt process | [
8262,
5896,
4750,
7983,
10833,
7188,
5397,
2521
] | None |
8,698 | 2 | Honor_8x:honor 8x honor 8x smartphone made huawei honor sub-brand successor huawei honor 8x within huawei honor series honor 8x 6.5-inch fhd+ display screen resolution 1,080 x 2,340 pixels 396 ppi pixel density 19.5:9 aspect ratio together deliver satisfying visual experience phone 20mp 2mp dual primary cameras pdaf dual flash click sharp life-like pictures pleasant colour reproductions front camera 16mp takes detailed selfies honor 8x carries rather average 64gb internal storage expanded 400gb device powered huawei hisilicon kirin 710 chipset two quad-core cortex a53 processors achieve 2.2ghz clock speed mali-t830 mp2 gpu 4gb ram phone delivers fluid performance apps games also rear-mounted fingerprint scanner improved security honor 8x uses a3,750mah li-polymer cell powers phone throughout day ease 4g volte compatible smartphone dual nano-sim slots second slot hybrid networks work without issue additional networking features include wifi bluetooth location support a-gps glonass assisted standard micro usb charging port 3.5 mm audio jack wired headphones.the phone comes 64 128 gigabytes storage 4 6 gb ram depending region display pixel resolution 1920x1080 pixel density 397 ppi honor 8x 16 mp front-facing camera dual rear camera setup consists 12 mp rgb lens 20-megapixel monochrome lens record video 1080p electronic image stabilization 1080p video honor 8x launched android oreo version 8.1 huawei emui 8.0. upgradable android 9.0 pie emui 9.0 | [
10658,
5100,
9244,
2383,
1776,
5467,
2259,
11282,
1083,
7548,
2525,
10303
] | Test |
8,699 | 4 | Cookiemonster_attack:cookiemonster attack cookiemonster attack man-in-the-middle exploit third party gain https cookie data encrypted sessions property properly set could allow access sites sensitive personal financial information python based tool developed security researcher mike perry perry originally announced vulnerability exploited cookiemonster bugtraq 2007 year later demonstrated cookiemonster proof concept tool defcon 16 users world wide web reduce exposure cookiemonster attacks avoiding websites unprotected attacks certain web browsers make possible user establish sites example users firefox browser go privacy tab preferences window click 'show cookies given site inspecting individual cookies top level name site subdomain names reveal 'send encrypted connections set user test site vulnerability cookiemonster attacks deleting cookies visiting site site still allows user site vulnerable cookiemonster attacks websites allegedly affected cookiemonster included | [
8554,
5078,
119,
87,
7965,
2558
] | None |
8,700 | 3 | PowerPC:powerpc powerpc backronym performance optimization enhanced risc – performance computing sometimes abbreviated ppc reduced instruction set computer risc instruction set architecture isa created 1991 apple–ibm–motorola alliance known aim powerpc evolving instruction set since 2006 named power isa old name lives trademark implementations power architecture-based processors powerpc cornerstone aim prep common hardware reference platform initiatives 1990s originally intended personal computers architecture well known used apple power macintosh powerbook imac ibook xserve lines 1994 2006 apple migrated intel x86 since become niche personal computers remains popular embedded high-performance processors use 7th generation video game consoles embedded applications provided array uses addition powerpc cpus still used amigaone third party amigaos 4 personal computers powerpc largely based ibm earlier power instruction set architecture retains high level compatibility architectures remained close enough programs operating systems run care taken preparation newer chips power series use power isa history risc began ibm 801 research project john cocke lead developer developed concepts risc 1975–78 801-based microprocessors used number ibm embedded products eventually becoming 16-register ibm romp processor used ibm rt pc rt pc rapid design implementing risc architecture years 1982–1984 ibm started project build fastest microprocessor market new 32-bit architecture became referred america project throughout development cycle lasted approximately 5–6 years result power instruction set architecture introduced risc system/6000 early 1990 original power microprocessor one first superscalar risc implementations high performance multi-chip design ibm soon realized single-chip microprocessor needed order scale rs/6000 line lower-end high-end machines work began one-chip power microprocessor designated rsc risc single chip early 1991 ibm realized design could potentially become high-volume microprocessor used across industry apple already realized limitations risks dependency upon single cpu vendor time motorola falling behind delivering 68040 cpu furthermore apple conducted research made experimental quad-core cpu design called aquarius convinced company technology leadership future computing risc methodology ibm approached apple goal collaborating development family single-chip microprocessors based power architecture soon apple one motorola largest customers desktop-class microprocessors asked motorola join discussions due long relationship motorola extensive experience manufacturing high-volume microprocessors ibm form second source microprocessors three-way collaboration apple ibm motorola became known aim alliance 1991 powerpc one facet larger alliance among three companies time personal computer industry shipping systems based intel 80386 80486 chips complex instruction set computer cisc architecture development pentium processor well underway powerpc chip one several joint ventures involving three alliance members efforts counter growing microsoft-intel dominance personal computing motorola power looked like unbelievable deal allowed company sell widely tested powerful risc cpu little design cash part also maintained ties important customer apple seemed offer possibility adding ibm might buy smaller versions motorola instead making point motorola already risc design form 88000 poorly market motorola well 68000 family majority funding focused 88000 effort somewhat starved resources 88000 already production however data general shipping 88000 machines apple already 88000 prototype machines running 88000 also achieved number embedded design wins telecom applications new power one-chip version could made bus-compatible hardware level 88000 would allow apple motorola bring machines market far faster since would redesign board architecture result various requirements powerpc performance computing specification differences earlier power instruction set powerpc outlined appendix e manual powerpc isa v.2.02 since 1991 ibm long-standing desire unifying operating system would simultaneously host existing operating systems personalities upon one microkernel 1991 1995 company designed aggressively evangelized would become workplace os primarily targeting powerpc first powerpc products reached market met enthusiasm addition apple ibm motorola computer group offered systems built around processors microsoft released windows nt 3.51 architecture used motorola powerpc servers sun microsystems offered version solaris os ibm ported aix unix workplace os featured new port os/2 intel emulation application compatibility pending successful launch powerpc 620 throughout mid-1990s powerpc processors achieved benchmark test scores matched exceeded fastest x86 cpus ultimately demand new architecture desktop never truly materialized windows os/2 sun customers faced lack application software powerpc almost universally ignored chip ibm workplace os platform thus os/2 powerpc summarily canceled upon first developers release december 1995 due simultaneous buggy launch powerpc 620 powerpc versions solaris windows discontinued brief period market macintosh due apple persistence powerpc gain traction apple performance powerpc bright spot face increased competition windows 95 windows nt-based pcs cancellation workplace os general powerpc platform especially aim common hardware reference platform instead seen hardware-only compromise run many operating systems one time upon single unifying vendor-neutral hardware platform parallel alliance ibm motorola companies development efforts underway internally powerquicc line result work inside motorola 4xx series embedded processors underway inside ibm ibm embedded processor business grew nearly us 100 million revenue attracted hundreds customers toward close decade manufacturing issues began plaguing aim alliance much way motorola consistently pushed back deployments new processors apple vendors first motorola 1990s powerpc 7xx 74xx processors ibm 64-bit powerpc 970 processor 2003 2004 motorola exited chip manufacturing business spinning semiconductor business independent company called freescale semiconductor around time ibm exited 32-bit embedded processor market selling line powerpc products applied micro circuits corporation amcc focusing 64-bit chip designs maintaining commitment powerpc cpus toward game console makers nintendo gamecube wii sony playstation 3 microsoft xbox 360 latter two use 64-bit processors 2005 apple announced would longer use powerpc processors apple macintosh computers favoring intel-produced processors instead citing performance limitations chip future personal computer hardware specifically related heat generation energy usage well inability ibm move 970 processor 3 ghz range ibm-freescale alliance replaced open standards body called power.org power.org operates governance ieee ibm continuing use evolve powerpc processor game consoles freescale semiconductor focusing solely embedded devices ibm continues develop powerpc microprocessor cores use application-specific integrated circuit asic offerings many high volume applications embed powerpc cores powerpc specification handled power.org ibm freescale amcc members powerpc cell power processors jointly marketed power architecture power.org released unified isa combining power powerpc isas new power isa v.2.03 specification new reference platform servers called papr power architecture platform reference ibm power microprocessors implement power isa used ibm ibm power systems running ibm aix linux many powerpc designs named labeled apparent technology generation began g3 internal project name inside aim development would become powerpc 750 family apple popularized term g3 introduced power mac g3 powerbook g3 event 10 november 1997 motorola apple liked moniker used term g4 7400 family introduced 1998 power mac g4 1999 time g4 launched motorola categorized powerpc models former current future according generation adhered even renaming older 603e core g2 motorola g5 project never came fruition name stuck apple reused 970 family launched 2003 even designed built ibm powerpc designed along risc principles allows superscalar implementation versions design exist 32-bit 64-bit implementations starting basic power specification powerpc added instructions present power instruction set deemed complex removed powerpc architecture removed instructions could emulated operating system necessary removed instructions powerpc chips switch endianness via bit msr machine state register second bit provided allow os run different endianness accesses inverted page table hash table functions tlb off-chip storage always done big-endian mode processor starts big-endian mode little-endian mode three lowest-order bits effective address exclusive-ored three bit value selected length operand enough appear fully little-endian normal software operating system see warped view world accesses external chips video network hardware fixing warped view requires motherboard perform unconditional 64-bit byte swap data entering leaving processor endianness thus becomes property motherboard os operates little-endian mode big-endian motherboard must swap bytes undo exclusive-or accessing little-endian chips altivec operations despite 128-bit treated 64-bit allows compatibility little-endian motherboards designed prior altivec interesting side effect implementation program store 64-bit value longest operand format memory one endian mode switch modes read back 64-bit value without seeing change byte order case motherboard switched time mercury systems matrox ran powerpc little-endian mode done powerpc devices serving co-processors pci boards could share data structures host computers based x86 pci x86 little-endian os/2 windows nt powerpc ran processor little-endian mode solaris aix linux ran big endian ibm embedded powerpc chips use per-page endianness bit none previous applies first implementation architecture powerpc 601 released 1992 based rsc implementing hybrid power1 powerpc instructions allowed chip used ibm existing power1-based platforms although also meant slight pain switching 2nd generation pure powerpc designs apple continued work new line macintosh computers based chip eventually released 601-based power macintosh march 14 1994 ibm also full line powerpc based desktops built ready ship unfortunately operating system ibm intended run desktops—microsoft windows nt—was complete early 1993 machines ready marketing accordingly ibm developed animosity toward microsoft ibm decided port os/2 powerpc form workplace os new software platform spent three years 1992 1995 development canceled december 1995 developer release disappointing launch powerpc 620 reason ibm powerpc desktops ship although reference design codenamed sandalbow based powerpc 601 cpu released rs/6000 model byte april 1994 issue included extensive article apple ibm powerpc desktops apple also lacked powerpc based os took different route utilizing portability platform yielded secret star trek project company ported essential pieces mac os operating system powerpc architecture wrote 68k emulator could run 68k based applications parts os rewritten second generation pure includes low end powerpc 603 high end powerpc 604 603 notable due low cost power consumption deliberate design goal motorola part used 603 project build basic core future generations ppc chips apple tried use 603 new laptop design unable due small 8 kib level 1 cache 68000 emulator mac os could fit 8 kib thus slowed computer drastically 603e solved problem 16 kib l1 cache allowed emulator run efficiently 1993 developers ibm essex junction burlington vermont facility started work version powerpc would support intel x86 instruction set directly cpu one several concurrent power architecture projects ibm working chip began known inside ibm media powerpc 615 profitability concerns rumors performance issues switching x86 native powerpc instruction sets resulted project canceled 1995 limited number chips produced in-house testing aside rumors switching process took 5 cycles amount time needed processor empty instruction pipeline microsoft also aided processor demise refusing support powerpc mode first 64-bit implementation powerpc 620 appears seen little use apple n't want buy large die area costly embedded market later slower promised ibm used power3 design instead offering 64-bit small version late-2002 introduction powerpc 970 970 64-bit processor derived power4 server processor create power4 core modified backward-compatible 32-bit powerpc processors vector unit similar altivec extensions motorola 74xx series added ibm rs64 processors family chips implementing amazon variant powerpc architecture processors used rs/6000 as/400 computer families amazon architecture includes proprietary extensions used as/400 power4 later power processors implement amazon architecture replaced rs64 chips rs/6000 as/400 families ibm developed separate product line called 4xx line focused embedded market designs included 401 403 405 440 460 2004 ibm sold 4xx product line applied micro circuits corporation amcc amcc continues develop new high performance products partly based ibm technology along technology developed within amcc products focus variety applications including networking wireless storage printing/imaging industrial automation numerically powerpc mostly found controllers cars automotive market freescale semiconductor initially offered many variations called mpc5xx family mpc555 built variation 601 core called 8xx designed israel msil motorola silicon israel limited 601 core single issue meaning issue one instruction clock cycle add various bits custom hardware allow i/o one chip 2004 next-generation four-digit 55xx devices launched automotive market use newer e200 series powerpc cores networking another area embedded powerpc processors found large numbers msil took quicc engine mc68302 made powerquicc mpc860 famous processor used many cisco edge routers late 1990s variants powerquicc include mpc850 mpc823/mpc823e variants include separate risc microengine called cpm offloads communications processing tasks central processor functions dma follow-on chip family mpc8260 603e-based core different cpm honda also uses powerpc processors asimo 2003 bae systems platform solutions delivered vehicle-management computer f-35 fighter jet platform consists dual powerpcs made freescale triple redundant setup operating systems work powerpc architecture generally divided oriented toward general-purpose powerpc systems oriented toward embedded powerpc systems companies licensed 64-bit power 32-bit powerpc ibm include powerpc processors used number now-discontinued video game consoles power architecture currently used following desktop computers power architecture currently used following embedded applications | [
6148,
6150,
2058,
4112,
2066,
4114,
6165,
2071,
2073,
8222,
6181,
6183,
8231,
4139,
4144,
2105,
8253,
6207,
2113,
8266,
4180,
2137,
6233,
2149,
6245,
6258,
4211,
10357,
8315,
4220,
6268,
10365,
2179,
4228,
6283,
4238,
147,
6300,
4258,
631... | None |
8,701 | 2 | Menlo_(typeface):menlo typeface menlo monospaced sans-serif typeface designed jim lyles face first shipped mac os x snow leopard menlo based upon open source font bitstream vera public domain font deja vu menlo replaced system monospaced font mac os 10.11 new apple-made monospaced font called sf mono monospaced variant san francisco family fonts apple created part corporate identity installed user-accessible typeface default although included used xcode even installed user sf mono license agreement extraordinarily restrictive limits use font solely conjunction apple-branded applications allowed embedded anywhere use typeface requires written consent apple mac os 10.12.4 user still install use sf mono unless copied resources folder apple however begun use apple developer website version used slightly newer one ships mac os | [
10432,
2978,
7171,
166,
1191,
4141,
10478,
9912,
1435
] | Test |
8,702 | 7 | DRMAA:drmaa drmaa distributed resource management application api high-level open grid forum api specification submission control jobs distributed resource management drm system cluster grid computing infrastructure scope api covers high level functionality required applications submit control monitor jobs execution resources drm system 2007 drmaa one first two one gridrpc specifications reached full recommendation status open grid forum 2012 second version drmaa standard drmaa2 published abstract interface definition language idl defining semantic functions gfd 194 drmaa2 specifies twice many calls drmaa covers cluster monitoring notion queues machines introduces multi job-session concept single applications better job workflow management later 2012 c api specified first language binding gf 198 development api done global grid forum model ietf standard development originally co-authored specification first proposed global grid forum 3 ggf3 frascati italy gained momentum global grid forum 4 toronto ontario development specification first proposed objective facilitate direct interfacing applications existing drm systems application builders portal builders independent software vendors isvs api co-authored participants wide-selection companies included participants industries education development resulted open standard received relatively good reception wide audience quickly without drmaa standard model existed submit jobs component regions grid assuming region running local drmss first version drmaa api implemented sun grid engine also university wisconsin–madison program condor furthermore c java idl binding documents made available language bindings generated easily swig first used perl binding number software solutions use drmaa interface different resource management systems | [
10625,
9602,
3462,
8582,
2710,
7318,
1435,
5414,
5677,
2481,
692,
9665,
5956,
9301,
11353,
2651,
8030,
10597,
8554,
3323,
2045,
7935
] | Test |
8,703 | 4 | Webroot_Internet_Security_Complete:webroot internet security complete webroot internet security complete computer security software program microsoft windows users combine saas cloud protection traditional antivirus antispyware desktop technologies built suite two-way firewall 10gb online backup file sharing capabilities registry cleaner email antispam secure browsing anti-phishing password management service suite initially released july 26 2010 2011 version product product received many positive comments reviewers intuitive easy-to-use interface initial reviews product praised program solid core feature set including real-time protection shields firewall automatically filters network traffic according pre-selected profiles browsing protection provides ratings links search results reviews also praise extensive features set identity privacy protection updated easy-to-use user interface additional reviews commended ‘ sync share ’ features namely file synchronization sharing abilities well added benefit integrated password management tools product said reviewers “ noisy firewall ” regular pop-ups requiring user ’ action criticisms also include comments limited capacity antispam component compatibility microsoft outlook outlook express limits number consumers utilize feature program heavily criticized including parental controls feature set commonly included security suites type competitors webroot internet security complete comes feature set webroot internet security essentials additional personal privacy protection features including password management tool 8gb additional online storage space credit card monitoring/ identity theft prevention service us based customers password management tool licensed lastpass designed store login information usernames passwords well personal information used common forms name birth date user name address email address phone number credit card details bank account information secure encrypted online portal master password used gain access stored information access gained using webroot toolbar visiting saved site logging webroot account user ’ using another password-management application import data application webroot software using either webroot portal webroot toolbar additional identity features us customers include identity theft protection monitoring services trustedid comes fraud alerts free annual credit reports also 1,000,000 service warranty covers lost wages out-of-pocket expenses legal defense fees occur result identity theft pc magazine tests product ’ malware detection rates found blocked 90 undeniable spam blocked .8 legitimate emails suite overall malware detection rate 83 giving total score 7.0 10 detected 100 rootkits 93 keyloggers 89 scareware suite overall malware blocking rate 91 overall score 9.0 10 detected 100 commercial keyloggers rootkits 89 blocking rate scareware secure browsing feature software blocked total 84 harmful urls webroot mistakenly flagged core windows system files malicious even started temporarily removing legit files trashing user computers around world software installed tests pc mag found 18 increase total system boot time 19 increase load time web pages antispam component turned load time email retrieval slowed 2.7 times br copying moving large collection files disks webroot added 1 total task time task zipping unzipping large group files took 24 longer webroot installed without installing uninstalling number large windows installer packages increased task time adding 35 webroot software installed another review system impact measured based two components using pcmark first overall system performance measured reported ad less 3 overall impact performance well time took perform full system scan reported taking one hour scan hard drive containing 140gb data software received international computer security association certification desktop/server anti-virus detection anti-virus cleaning windows 32 64 bit webroot internet security complete received virus bulletin december 2010 antivirus certification windows 7 uk review site awarded product “ reviews recommended ” award reviewing product feature set price received 2011 bronze award software review site toptenreviews computeractive gave “ buy ” rating 5 5 star review | [
2213,
8998,
6797,
3342,
7983,
2257,
9713,
467,
6516,
8724,
3320,
9791
] | None |
8,704 | 3 | Burton_Smith:burton smith burton j. smith march 21 1941 – april 2 2018 american computer architect technical fellow microsoft smith graduated cate school carpinteria california 1958 established gifted math science student taking special interest chemistry placed third statewide competition senior smith went pomona college claremont california study physics transferred pomona university new mexico following freshman year still unhappy education subsequently dropped college entirely join navy smith spent four years military returning university new mexico changing studies physics electrical engineering graduating summa cum laude b.s.e.e degree 1967 smith turned acceptances berkeley stanford attend massachusetts institute technology pursue doctorate citing financial aid package reasoning behind decision part aid package work-study asking smith help build database university computer science department one smith first formative experiences computers earned sc.d mit 1972 1970 1979 taught massachusetts institute technology university colorado smith spent six years denelcor inc. colorado serving vice president research development primary architect denelcor heterogeneous element processor hep 1985 1988 smith fellow institute defense analyses supercomputing research center smith co-founded tera computer company 1988 2005 served chief scientist member board directors also company chairman 1988 1999 2000 tera acquired cray research business unit silicon graphics renamed cray inc.. december 2005 smith hired microsoft technical fellow working various groups within company define expand efforts areas parallel high-performance computing smith received 1991 eckert-mauchly award institute electrical electronics engineers ieee association computing machinery 2003 received seymour cray computer science engineering award ieee computer society elected national academy engineering received ieee computer society charles babbage award elected fellow american academy arts sciences 2010 smith died april 2 2018 regional hospital highline medical center burien washington survived two daughters julia katherine ray granddaughter erin brother david burton ’ wife dorothy preceded death dennis shasha minds springer new york 1998. interview burton smith | [
11697,
10051,
9932
] | None |
8,705 | 0 | Probabilistic_latent_semantic_analysis:probabilistic latent semantic analysis probabilistic latent semantic analysis plsa also known probabilistic latent semantic indexing plsi especially information retrieval circles statistical technique analysis two-mode co-occurrence data effect one derive low-dimensional representation observed variables terms affinity certain hidden variables latent semantic analysis plsa evolved compared standard latent semantic analysis stems linear algebra downsizes occurrence tables usually via singular value decomposition probabilistic latent semantic analysis based mixture decomposition derived latent class model considering observations form co-occurrences formula_1 words documents plsa models probability co-occurrence mixture conditionally independent multinomial distributions c words topic note number topics hyperparameter must chosen advance estimated data first formulation symmetric formulation formula_3 formula_4 generated latent class formula_5 similar ways using conditional probabilities formula_6 formula_7 whereas second formulation asymmetric formulation document formula_4 latent class chosen conditionally document according formula_9 word generated class according formula_7 although used words documents example co-occurrence couple discrete variables may modelled exactly way number parameters equal formula_11 number parameters grows linearly number documents addition although plsa generative model documents collection estimated generative model new documents parameters learned using em algorithm plsa may used discriminative setting via fisher kernels plsa applications information retrieval filtering natural language processing machine learning text related areas reported aspect model used probabilistic latent semantic analysis severe overfitting problems example latent class model see references therein related non-negative matrix factorization present terminology coined 1999 thomas hofmann | [
4072,
7780
] | None |
8,706 | 5 | MimbleWimble:mimblewimble mimblewimble blockchain protocol created improve privacy fungibility scalability blockchains published july 19 2016 pseudonym tom elvis jedusor french name voldemort harry potter mimblewimble protocol cleverly uses blinding factors balancing inputs outputs commitment scheme private keys sender receiver must interact construct joint signature authorize transfer funds blocks mimblewimble constituent transactions aggregated one giant transaction erasing original transaction boundaries initial block download benefits cut-through spent outputs cancel corresponding inputs erasing blockchain history provable security analysis mimblewimble provided georg fuchsbauer et al protocol powers several decentralized privacy-oriented cryptocurrencies | [
9248,
3713,
9859,
1908,
8916,
7802,
4827,
11612,
1087
] | Validation |
8,707 | 3 | Hardcard:hardcard hardcard genericized trademark hard disk drive disk controller host adapter expansion card personal computer typically hard disk drive hdd installs drive bay cables connect drive host adapter power source personal computer lacks available bus compatible host adapter one may install adapter expansion slot hardcard supplies host adapter n't require empty drive bay plus development subsidiary quantum corporation developed first isa hardcard released october 1985 june 1986 28 plus development competitors producing similar products term used generically refer hard disk card quantum corporation formed plus development subsidiary 1983 plus development invested efforts developing hard disk drive average computer owner could install easily without much technical knowledge 1985 plus development engineered first hardcard 10 megabyte mb capacity suggested retail price 1,095 mid-1980s hard drives small 1.6 inches tall order fit single isa pc card expansion slot custom one-inch thick hard drive designed spent 15 million project plus development started shipping hardcard october 1985 trademarked hardcard brand 1988 hardcard provided computer industry first one-inch-thick hdd interface form factor compatible full length card slot isa bus first introduced ibm pc thicker head disk assembly subsequently introduced 1-inch high standard form factor 3½-inch hdds sources inside company launch hardcard claim first hdd controller integrated drive printed circuit board xebec hdd controller manufacturer early 1980s already done owl product around august 1984 complete 5.25 inch half-height hdd integrated controller drive electronics printed circuit board sasi interface introduction hardcard plus development continued working higher capacity hard drives form factor first hardcard brand name became widely known name continued follow products hardcard ii hardcard ii xl advertised effective access times result disk cache hardcard ii listed times hardcard ii xl listed effective access time hardcard ez line returned listing access times without benefit cache hardcard products including hardcard ii xl produced plus development name hardcard ez released quantum name quantum absorbed wholly owned subsidiary plus development within one year plus development introduction hardcard 28 companies released similar products time products using standard hard drive 1.6-inch height forcing card hang adjacent pc slot hard drive located opposite side away connector sometimes enabling short half-length expansion card installed adjacent slot hard drive cards usually described occupying 1.5 expansion slots companies product names similar product plus hardcard 1985 tandy introduced tandy 1000 tandy offered proprietary 20 megabyte hard card 799 8-bit isa slot required accommodate hard card preserving drive bays disk drives cd-roms 8-bit slots electronically compatible computer could hold card 10 1/2 inches long result many hard cards offered plus development 13 inches long hence compatible hard cards certified tandy compatible meaning fit tandy 1000 model sx tx sl tl series possible use plus development hard card tandy 1000 completely removing plastic case cutting metal frame allow fit hard card must 10 inches long use 8-bit isa interface work tandy 1000 computer usually card must installed slot 1 due overhang tandy 1000 60 watt power supply n't sufficient run hard cards power-efficient card preferable | [
5368,
2159
] | Test |
8,708 | 5 | Point_coordination_function:point coordination function point coordination function pcf media access control mac technique used ieee 802.11 based wlans including wi-fi resides point coordinator also known access point ap coordinate communication within network ap waits pifs duration rather difs duration grasp channel pifs less difs duration hence point coordinator always priority access channel pcf located directly distributed coordination function dcf ieee 802.11 mac architecture channel access pcf mode centralized hence point coordinator sends cf-poll frame pcf capable station permit transmit frame case polled station frames send must transmit null frame due priority pcf dcf stations use dcf might gain access medium prevent repetition interval designed cover contention free pcf contention based dcf traffic repetition interval repeated continuously starts special control frame called beacon frame stations hear beacon frame start network allocation vector duration contention free period repetition period since aps logical bus topologies shared circuits one message processed one time contention based system thus media access control technique required wireless networks may suffer hidden node problem regular nodes communicate ap see nodes extreme edge geographical radius network wireless signal attenuates reach far thus ap middle allows distance halved allowing nodes see ap consequentially halving maximum distance two nodes extreme edges circle-star topology pcf seems implemented hardware devices part wi-fi alliance interoperability standard pcf interframe space pifs one interframe space used ieee 802.11 based wireless lans pcf enabled access point wait pifs duration rather difs occupy wireless medium pifs duration less difs greater sifs difs pifs sifs hence ap always priority access medium pifs duration calculated follows pifs sifs slot time | [
10112,
2306,
388,
3847,
7049,
656,
5270,
11288,
2458,
5020,
5671,
1192,
11560,
6187,
4396,
7723,
11181,
434,
3762,
11321,
5439,
7490,
3780,
9284,
5321,
7498,
2911,
2785,
5092,
4581,
5863,
2802,
4339,
11125,
6904,
8828
] | Validation |
8,709 | 3 | The_Legend_of_Kage:legend kage player armed kodachi shortsword unlimited number shuriken main gameplay revolves around killing enemy ninja blue red enemy fire-breathing monks five stages home versions grabbing crystal ball causes player clothes change next level color thereby attain certain powers bigger shuriken faster speed kage hit home version green orange clothes die reverts normal red clothes player takes role young iga ninja named kage shadow mission rescue princess kiri hime shogun daughter villainous warlord yoshi ro kuyigusa fellow evil samurai yuki nosuke riko kage must fight way forest along secret passageway fortress wall castle ... rescuing twice three times fc/nes version order win game time princess rescued seasons change summer fall winter back summer famicom/nes version re-released wii virtual console japan december 19 2006 united states february 19 2007 also released 3ds virtual console wii u virtual console japan arcade version also appears compilation title taito legends 2 revised legend kage included taito nostalgia 1 release along original game features two new playable characters ayame ganin ayame ninja throw bombs similar red ninja game unlimited supply throwing knives ganin dog breathe fire similar monks game perform spin attack much range leaves invulnerable instant kills enemy touches also new final boss characters face giant green cobra slithers ground back forth screen end second run levels enemy jump air 3d graphics remake arcade game along original arcade version included 2006 compilation taito legends power playstation portable game still side-scrolling follow-up game developed lancarse nintendo ds published taito 2008 taito parent company square enix published north american localization game later year | [
4043,
8492,
9006,
4690,
6390,
9501,
5275,
1693,
4894
] | Train |
8,710 | 6 | SyMon_Bootmanager:symon bootmanager symon bootmanager light-weighted partitions bootmanager developed wholly assembler code thus needs little space installation software makes possible create 36 partitions one single hard drive 20 operating systems organized partitions despite small size bootmanager pseudo graphical interface equipped many powerful features features make unique among bootmanagers utility developed vladimir dashevsky free current version r3.23.02 | [
4309,
2811,
477,
7983
] | Test |
8,711 | 3 | R4600:r4600 r4600 code-named orion microprocessor developed quantum effect design qed implemented mips iii instruction set architecture isa qed design firm fabricate sell designs r4600 first licensed integrated device technology idt later toshiba nkk companies fabricated microprocessor marketed r4600 designed low-end workstation high-end embedded microprocessor users included silicon graphics inc. sgi indy workstation deskstation technology windows nt workstations r4600 instrumental making indy successful providing good integer performance competitive price embedded systems prominent users included cisco systems network routers canon printers idt first company fabricate ship r4600 idt produced first silicon august 1993 first part 100 mhz part announced october 1993 march 1994 cebit idt announced 133 mhz part fabricated 0.65 μm cmos process required 5 v power supply nkk announced version r4600 nr4600 middle 1994 first nr4600 100 mhz part fabricated 0.5 μm process used 3.3 v power supply r4600 simple design scalar processor issuing one instruction per cycle integer pipeline floating-point unit fpu integer instructions single cycle latency throughput except multiplies divides multiplies 32-bit 64-bit eight-cycle latency six-cycle throughput divides 32-cycle latency throughput 32-bit integers 61-cycle latency throughput 64-bit integers fpu pipelined save die area thus cost characteristic severely restricted r4600 floating-point performance impede success low-end computers embedded applications integer performance important single double precision adds four-cycle latency throughput single double precision multiplies partially pipelined eight-cycle latency six-cycle throughput single precision divides 32-cycle latency throughput whereas double precision division 61-cycle latency throughput square roots latency throughput one cycle less comparative divide instructions r4600 uses floating-point unit perform floating-point multiply divide also integer multiply divide r4600 16 kb two-way set-associative caches instructions data supported l2 cache on-die hardware control requiring external logic whether custom application specific integrated circuit asic chipset cache cache resided sysad bus shared external interface sysad bus 64 bits wide operate clock rates 50 mhz peak bandwidth 400 mb/s r4600 external interface support multiprocessing r4600 needs supplied three clock signals generate various clocks r4650 derivative r4600 announced 19 october 1994 custom instructions improving performance fixed-point digital signal processing dsp applications lower cost version r4650 r4640 announced 27 november 1995 32-bit instead 64-bit external interface 16 september 1997 150 180 mhz versions microprocessors introduced quantities 10,000 150 180 mhz r4640s priced 30 39 respectively 150 180 mhz r4650s priced 60 74 respectively r4650 also available 133 167 mhz speeds used arcade games produced namco example time crisis 2 running namco system 23 hardware r4640 used webtv networks webtv plus thin client r4700 also code-named orion derivative r4600 ported 0.5 µm cmos process r4700 available 100 133 150 175 200 mhz versions | [
4098,
8327,
8711,
783,
8976,
7445,
2071,
9851,
4124,
8481,
5028,
6057,
938,
426,
8237,
6834,
1461,
7234,
10051,
1480,
10316,
6247,
7911,
10601,
6250,
6252,
6253,
5358,
10734,
6256,
5235,
5237,
760,
3451,
11007
] | Test |
8,712 | 9 | Binary_recompiler:binary recompiler binary recompiler compiler takes executable binary files input analyzes structure applies transformations optimizations outputs new optimized executable binaries binary recompilation introduced gary kildall 1980s | [
1952,
4112,
4548,
7941
] | Test |
8,713 | 2 | PTS-DOS:pts-dos pts-dos aka pts/dos disk operating system dos clone developed russia phystechsoft paragon technology systems phystechsoft formed 1991 moscow russia graduates members mipt informally known phystech end 1993 phystechsoft released first commercially available pts-dos pts-dos v6.4 version numbering followed ms-dos version numbers microsoft released ms-dos 6.2 november 1993 1995 programmers left phystechsoft founded paragon technology systems took source code released version named pts/dos 6.51cd well s/dos 1.0 source dos stripped open-source version according official phystechsoft announcements programmers violated copyright laws russian military laws pts-dos developed close relationship russia military thus may subject military secrets law phystechsoft continued development released pts-dos v6.6 somewhere presented pts-dos v6.65 cebit exhibition 1997 next version phystechsoft formally pts/dos extended version 6.70 labeled pts-dos 2000 still distributed last 16-bit pts-dos system paragon continued pts-dos line released paragon dos pro 2000 also known labeled places pts/dos pro 2000 according paragon last version development since ceased moreover release contained bundled source code older pts-dos v6.51 later phystechsoft continued developing pts-dos finally released pts-dos 32 formally known pts-dos v7.0 added support fat32 file system pts-dos certified russian ministry defense following list commands supported pts-dos 2000 pro | [
1408,
2179,
11145,
7823,
5267,
8729,
9762,
10156,
7983,
7224,
3129,
7483,
7356,
1853,
8517,
4039,
9166,
4076,
8301,
5359,
2545,
5363,
2933
] | Validation |
8,714 | 3 | Continua_Health_Alliance:continua health alliance continua health alliance international non-profit open industry group nearly 240 healthcare providers communications medical fitness device companies continua health alliance members aim develop system deliver personal individual healthcare continua founding member personal connected health alliance launched february 2014 founding members mhealth summit himss continua health alliance international not-for-profit industry organization enabling end-to-end plug-and-play connectivity devices services personal health management healthcare delivery mission empower information-driven health management facilitate incorporation health wellness day-to-day lives consumers continua pioneer establishing industry standards security connected health technologies smart phones gateways remote monitoring devices activities include certification brand support program events collaborations support technology clinical innovation well outreach employers payers governments care providers nearly 220 member companies reaching across globe continua comprises technology medical device healthcare industry leaders service providers dedicated making personal connected health reality continua health alliance working toward establishing systems interoperable telehealth devices services three major categories chronic disease management aging independently health physical fitness continua health alliance version 1 design guidelines based proven connectivity technical standards include bluetooth wireless usb wired device connection group released guidelines public june 2009 group establishing product certification program using recognizable logo continua certified logo program signifying product interoperable continua-certified products products made continua health alliance guidelines provide consumers increased assurance interoperability devices enabling easily share information caregivers service providers collaborations government agencies regulatory bodies continua works provide guidelines effective management diverse products services global network vendors continua health alliance products make use iso/ieee 11073 personal health data phd standards continua design guidelines available public without signing non-disclosure agreement continua guidelines help technology developers build end-to-end plug-and-play systems efficiently cost effectively continua health alliance founded june 6 2006 continua health alliance performed first public demonstration interoperability october 27 2008 partners center connected health 5th annual connected health symposium boston continua health alliance certified first product nonin 2500 palmsat handheld pulse oximeter usb january 26 2009 end december 2014 100 certified products continua selected bluetooth low energy zigbee wireless protocols wireless standards version 2 design guidelines released bluetooth low energy used low-power mobile devices zigbee used networked low-power sensors enabling independent living beginning 2012 continua invites non-members request copy design guidelines signing non-disclosure agreement continua working groups operations u.s. eu japan india china continua health alliance currently nearly 220 member companies continua board directors currently composed following companies organisation primarily staffed volunteers member organisations organised working groups address goals alliance board directors sit following main working groups continua alliance website contains full listing member organisations directory qualified products clear statement mission | [
9137,
11267,
9863
] | Test |
8,715 | 3 | Illegal_opcode:illegal opcode illegal opcode also called undocumented instruction instruction cpu mentioned official documentation released cpu designer manufacturer nevertheless effect illegal opcodes common older cpus designed 1970s mos technology 6502 intel 8086 zilog z80 older processors many exist side effect wiring transistors cpu usually combine functions cpu intended combined old modern processors also instructions intentionally included processor manufacturer documented official specification accidental illegal instructions useless even highly undesirable effects crashing computer might accident something useful certain situations instructions sometimes exploited computer games 1970s 1980s speed certain time-critical sections another common use ongoing battle copy protection implementations cracking form security obscurity secrecy usually last long danger associated use illegal instructions given fact manufacturer guarantee existence function might disappear behave differently change cpu internals new revision cpu rendering programs use incompatible newer revisions example number older apple ii games work correctly newer apple iic latter uses newer cpu revision 65c02 away illegal opcodes recent cpus 80186 80286 68000 descendants powerpc processor illegal opcodes widely known/used manufacturers guarantee cpu behave well-defined way finds unknown opcode instruction stream usually means triggering certain exception fault condition operating system exception fault handler usually terminate application caused fault another less common way handling illegal instructions defining nothing except taking time space equivalent cpu official nop instruction method used tms9900 65c02 processor among others spite manufacturer guarantee instructions research uncovered vast number undocumented instructions modern x86 processors instructions shared across processor manufacturers indicating intel amd aware instruction purpose despite appearing official specification instructions specific manufacturers specific product lines purpose majority x86 undocumented instructions unknown today details instructions mainly interest exact emulation older systems | [
6921,
8716,
10786,
10796,
7983,
9525,
10442,
8143,
730,
7269,
5862,
107,
5358,
5744,
7281,
372,
7284,
1915,
8700,
7421
] | Validation |
8,716 | 3 | Indirect_branch:indirect branch indirect branch also known computed jump indirect jump register-indirect jump type program control instruction present machine language instruction sets rather specifying address next instruction execute direct branch argument specifies address located example 'jump indirect r1 register means next instruction executed address register r1 address jumped known instruction executed indirect branches also depend value memory location indirect branch useful make conditional branch especially multiway branch instance based program input value could looked jump table pointers code handling various cases implied data value data value could added address table result stored register indirect jump could made based value register efficiently dispatching program control code appropriate input similar manner subroutine call instructions indirect address subroutine called specified memory function pointers typically implemented indirect subroutine calls gcc-8.1 appear following new options codice_1 | [
7941,
8715,
6924,
5523,
10786,
8231,
10796,
9911,
7234,
8143,
6739,
730,
9964,
5358,
7281,
499,
372,
1399,
3323,
7421
] | Test |
8,717 | 3 | Semantic_interoperability:semantic interoperability semantic interoperability ability computer systems exchange data unambiguous shared meaning semantic interoperability requirement enable machine computable logic inferencing knowledge discovery data federation information systems semantic interoperability therefore concerned packaging data syntax simultaneous transmission meaning data semantics accomplished adding data data metadata linking data element controlled shared vocabulary meaning data transmitted data one self-describing information package independent information system shared vocabulary associated links ontology provides foundation capability machine interpretation inference logic syntactic interoperability prerequisite semantic interoperability syntactic interoperability refers packaging transmission mechanisms data healthcare hl7 use thirty years predates internet web technology uses pipe character data delimiter current internet standard document markup xml uses data delimiter data delimiters convey meaning data structure data without data dictionary translate contents delimiters data remains meaningless many attempts creating data dictionaries information models associate data packaging mechanisms none practical implement perpetuated ongoing babelization data inability exchange data meaning since introduction semantic web concept tim berners-lee 1999 growing interest application w3c world wide web consortium w3c standards provide web-scale semantic data exchange federation inferencing capabilities syntactic interoperability provided instance xml sql standards pre-requisite semantic involves common data format common protocol structure data manner processing information interpretable structure also allows detection syntactic errors thus allowing receiving systems request resending message appears garbled incomplete semantic communication possible syntax garbled unable represent data however information represented one syntax may cases accurately translated different syntax accurate translation syntaxes possible systems using different syntaxes may also interoperate accurately cases ability accurately translate information among systems using different syntaxes may limited one direction formalisms used different levels expressivity ability express information single ontology containing representations every term used every application generally considered impossible rapid creation new terms assignments new meanings old terms however though impossible anticipate every concept user may wish represent computer possibility finding finite set primitive concept representations combined create specific concepts users may need given set applications ontologies foundation ontology also called upper ontology contains primitive elements would provide sound basis general semantic interoperability allow users define new terms need using basic inventory ontology elements still newly defined terms properly interpreted computer system interpret basic foundation ontology whether number primitive concept representations fact finite expand indefinitely question active investigation finite stable foundation ontology suitable support accurate general semantic interoperability evolve initial foundation ontology tested used wide variety users present time foundation ontology adopted wide community stable foundation ontology still future one persistent misunderstanding recurs discussion semantics confusion words meanings meanings words change sometimes rapidly formal language used ontology encode meanings semantics concepts form change order determine meaning particular word term database example necessary label fixed concept representation ontology word term may refer concept multiple words refer fixed concept language called synonymy one word used refer one concept called ambiguity ambiguity synonymy among factors make computer understanding language difficult use words refer concepts meanings words used sensitive context purpose use many human-readable terms use ontologies supporting semantic interoperability provide fixed set concepts whose meanings relations stable agreed users task determining terms contexts database different context separated task creating ontology must taken designer database designer form data entry developer program language understanding word used interoperability context changes meaning preserve interoperability necessary change pointer ontology element specifies meaning word knowledge representation language may sufficiently expressive describe nuances meaning well understood fields least five levels complexity general semi-structured data one may use general purpose language xml languages full power first-order predicate logic may required many tasks human languages highly expressive considered ambiguous allow accurate interpretation desired given current level human language technology semantic interoperability may distinguished forms interoperability considering whether information transferred communicated form meaning required receiving system interpret correctly even algorithms used receiving system unknown sending system consider sending one number number intended sum money owed one company another implies action lack action part send receive may correctly interpreted sent response specific request received time form expected correct interpretation depend number could represent almost millions types quantitative measurement rather depends strictly circumstances transmission interpretation depends systems expecting algorithms system use number exactly sense depends entire envelope transmissions preceded actual transmission bare number contrast transmitting system know information used systems necessary shared agreement information specific meaning many possible meanings appear communication particular task one solution standardize form request payment request would encode standardized fashion information needed evaluate agent owing money agent owed money nature action giving rise debt agents goods services participants action time action amount owed currency debt reckoned time allowed payment form payment demanded information two systems agreed interpret information request achieve semantic interoperability specific type transaction semantic interoperability generally necessary provide standardized ways describe meanings many things commercial transactions number concepts whose representation needs agreed upon minimum several thousand achieve semantic interoperability restricted scenarios currently matter research discussion problem general semantic interoperability form foundation ontology 'upper ontology required sufficiently comprehensive provide defining concepts specialized ontologies multiple domains past decade ten foundation ontologies developed none yet adopted wide user base need single comprehensive all-inclusive ontology support semantic interoperability avoided designing common foundation ontology set basic primitive concepts combined create logical descriptions meanings terms used local domain ontologies local databases tactic based principle therefore tactic limits need prior agreement meanings ontology elements common foundation ontology fo based several considerations likely fewer 10,000 elements types relations practice together fo focused representations primitive concepts set domain extension ontologies fo elements specified using fo elements likely also used pre-existing extensions ease cost creating domain ontologies providing existing elements intended meaning reduce chance error using elements already tested domain extension ontologies may logically inconsistent needs determined different domain extensions used communication whether use single foundation ontology avoided sophisticated mapping techniques among independently developed ontologies also investigation practical significance semantic interoperability measured several studies estimate cost lost efficiency due lack semantic interoperability one study focusing lost efficiency communication healthcare information estimated us 77.8 billion per year could saved implementing effective interoperability standard area studies construction industry automobile manufacturing supply chain estimate costs us 10 billion per year due lack semantic interoperability industries total numbers extrapolated indicate well us 100 billion per year lost lack widely used semantic interoperability standard us alone yet study policy field might offer big cost savings applying semantic interoperability standards see policy fields capable profiting semantic interoperability see 'interoperability general policy fields egovernment health security many eu also set semantic interoperability centre europe june 2007 | [
10465,
2948,
5700,
2377,
4557,
10413,
10452,
2901,
10102,
479
] | Test |
8,718 | 8 | Frontera_(web_crawling):frontera web crawling frontera open-source web crawling framework implementing crawl frontier component providing scalability primitives web crawler applications content structure world wide web changes rapidly frontera designed able adapt quickly changes large scale web crawlers operate batch mode sequential phases injection fetching parsing deduplication scheduling leads delay updating crawl web changes design mostly motivated relatively low random access performance hard disks compared sequential access frontera instead relies modern key value storage systems using efficient data structures powerful hardware crawling parsing schedule indexing new links concurrently open-source project designed fit various use cases high flexibility configurability large-scale web crawls frontera purpose flexibility allows crawls moderate size single machine cores leveraging single process distributed spiders run modes frontera written mainly python data transport formats well abstracted out-of-box implementations include support messagepack json kafka zeromq although frontera n't web crawler requires streaming crawling architecture rather batch crawling approach stormcrawler another stream-oriented crawler built top apache storm whilst using components apache nutch ecosystem scrapy cluster designed istresearch precise monitoring management queue mind systems provide fetching and/or queueing mechanisms link database content processing scrapinghub ltd. crawler processing 1600 requests per second peak built using primarily frontera using kafka message bus hbase storage link states link database crawler operates cycles cycle takes 1.5 months results 1.7b downloaded pages crawl spanish internet resulted 46.5m pages 1.5 months aws cluster 2 spider machines first version frontera operated single process part custom scheduler scrapy using on-disk sqlite database store link states queue able crawl days getting noticeable volume links started spend time select queries making crawl inefficient time frontera developed darpa memex program included catalog open source projects 2015 subsequent versions frontera used hbase storing link database queue application distributed two parts backend fetcher backend responsible communicating hbase means kafka fetcher reading kafka topic urls crawl producing crawl results another topic consumed backend thus creating closed cycle first priority queue prototype suitable web scale crawling implemented time queue producing batches limits number hosts requests per host next significant milestone frontera development introduction crawling strategy strategy worker along abstraction message bus became possible code custom crawling strategy without dealing low-level backend code operating queue easy way say links scheduled priority made frontera truly crawl frontier framework kafka quite heavy requirement small crawlers message bus abstraction allowed integrate almost messaging system frontera | [
1280,
9320,
5546,
8554,
10250,
6701,
7983,
113,
119,
823,
4031
] | Test |
8,719 | 2 | Google_Pixel:google pixel google pixel brand consumer electronic devices developed google run either chrome os android operating system pixel brand introduced february 2013 first-generation chromebook pixel pixel line includes laptops tablets smartphones well several accessories google announced first generation pixel smartphones pixel pixel xl october 4 2016 madebygoogle event google emphasized camera two phones ranked best smartphone camera dxomarkmobile 90 points htc released u11 also scored 90 points largely due software optimizations hdr+ pixel phones also include unlimited cloud storage pictures google photos devices purchased directly google unlockable bootloader google announced pixel 2 series consisting pixel 2 pixel 2 xl october 4 2017 google announced pixel 3 pixel 3 xl event october 9 2018 alongside several products devices run android 9 pie may 7 i/o 2019 google announced pixel 3a pixel 3a xl budget alternatives original two pixel 3 devices pixel c announced google event september 29 2015 alongside nexus 5x nexus 6p phones among products pixel c includes usb-c port 3.5 mm headphone jack device shipped android 6.0.1 marshmallow later received android 7.x nougat android 8.x oreo google stopped selling pixel c december 2017 pixel slate 2-in-1 tablet laptop announced google new york city october 9 2018 alongside pixel 3 3 xl pixel slate includes two usb-c ports omits headphone jack device runs chrome os intel kaby lake processors options ranging celeron low end i7 high end june 2019 google announced develop product line cancelled two models development google announced first generation chromebook pixel blog post february 21 2013 laptop includes sd/multi-card reader mini displayport combination headphone/microphone jack two usb 2.0 ports device features include backlit keyboard fully clickable etched glass trackpad integrated stereo speakers two built-in microphones march 11 2015 google announced second generation chromebook pixel blog post laptop includes two usb-c ports two usb 3.0 ports sd card slot combination headphone/microphone jack device also backlit keyboard multi-touch clickable glass trackpad built-in stereo speakers two built-in microphones among features google discontinued 2015 chromebook pixel august 29 2016 october 4 2017 google launched third generation chromebook pixel named google pixelbook made google 2017 event google october 2017 hardware event set wireless earbuds unveiled alongside pixel 2 smartphones earbuds designed phones running android marshmallow higher work google assistant addition audio playback answering calls earbuds support translation 40 languages google translate earbuds able auto pair pixel 2 help google assistant nearby pixel buds available colors black clearly white kinda blue earbuds battery capacity 120 mah charging case comes pixel buds battery capacity 620 mah earbuds priced 159 alongside launch pixelbook october 2017 google announced pixelbook pen stylus used pixelbook pressure sensitivity well support google assistant pen powered replaceable aaaa battery priced us 99 october 2018 google announced pixel stand alongside pixel 3 smartphones addition standard 5 watt qi wireless charging pixel stand wireless 10 watt charging using proprietary technology google also enables software mode pixel 3 allows act smart display similar google home hub | [
4096,
5637,
3600,
5649,
7700,
9244,
11294,
1578,
10284,
5677,
3633,
1083,
10303,
6212,
69,
8262,
4683,
4685,
11343,
3664,
8280,
8794,
8285,
2658,
8821,
4217,
11391,
1670,
7816,
5262,
6800,
11408,
10393,
8858,
7835,
673,
7841,
8870,
1191,
... | None |
8,720 | 3 | List_of_ARM_Cortex-M_development_tools:list arm cortex-m development tools list development tools 32-bit arm cortex-m-based microcontrollers consists cortex-m0 cortex-m0+ cortex-m1 cortex-m3 cortex-m4 cortex-m7 cortex-m23 cortex-m33 cores ide compiler linker debugger flashing alphabetical order notes jtag and/or swd debug interface host adapters alphabetical order debugging tools and/or debugging plug-ins alphabetical order commonly referred rtos following free c/c++ libraries | [
7170,
3462,
1170,
659,
8082,
9366,
666,
5786,
4508,
4773,
38,
9638,
4777,
4139,
5677,
2862,
10419,
9913,
8253,
6207,
3904,
8383,
10945,
7235,
9155,
1221,
9928,
2761,
2635,
5963,
8524,
9163,
7631,
4821,
9685,
11221,
4569,
2524,
6495,
1377,... | Validation |
8,721 | 2 | FSEvents:fsevents fsevents api macos allows applications register notifications changes given directory tree whenever filesystem changed kernel passes notifications via special device file codice_1 userspace process called codice_2 process combines multiple changes single directory tree occur within short period time notifies applications registered changes affected directory mac os x 10.7 fsevents watch filesystem linux inotify api provided notifications changes individual files application able register receive changes given directory determine file files changed mac os x 10.7 lion added ability register file modification notifications | [
10016,
2021,
3692,
7983,
823,
11293
] | Test |
8,722 | 9 | Strict_function:strict function function f said strict applied non-terminating expression also fails terminate strict function denotational semantics programming languages function f formula_1 entity formula_2 called bottom denotes expression return normal value either loops endlessly aborts due error division zero function strict called non-strict strict programming language one user-defined functions always strict intuitively non-strict functions correspond control structures operationally strict function one always evaluates argument non-strict function one may evaluate arguments functions one parameter may strict non-strict parameter independently well jointly strict several parameters simultaneously example if-then-else expression many programming languages may thought function three parameters function strict first parameter since function must know whether first argument evaluates true false return non-strict second parameter example false formula_2,1 1 well non-strict third parameter example true,2 formula_2 2 however jointly strict second third parameters since true formula_2 formula_2 formula_2 false formula_2 formula_2 formula_2 non-strict functional programming language strictness analysis refers algorithm used prove strictness function respect one arguments functions compiled efficient calling convention call value without changing meaning enclosing program | [
1952,
8738,
3876,
230,
8262,
6536,
5168,
5684,
5081,
10618,
3263
] | None |
8,723 | 7 | MENTOR_routing_algorithm:mentor routing algorithm mentor routing algorithm algorithm use routing mesh networks specifically pertaining initial topology developed 1991 aaron kershenbaum parviz kermani george a. grove published ieee empirical observation shown complexity class algorithm n² quadratic represents significant improvement currently used algorithms still yielding solutions quality competitive much slower procedures algorithm assumes three things conducive low- cost minimal distance travelled time destinations topology paths tend direct circuitous links high utilization —that used nearly maximum operating capacity long high-capacity links used whenever possible overall plan send traffic direct route source destination whenever magnitude requirement sufficiently large send via path within tree cases former case satisfying three goals -- using direct path high utilization high capacity latter case satisfying least last two objectives aggregating traffic much possible minimum spanning tree traffic flows latter case heuristically defined dijkstra algorithm prim algorithm | [] | None |
8,724 | 4 | Webroot_Internet_Security_Essentials:webroot internet security essentials webroot internet security essentials antivirus antispyware personal firewall security software back-up utility program additional personal pc security features originally launched october 21 2008 webroot internet security essentials first consumer security suite webroot webroot internet security essentials discontinued october 4 2011 webroot announced release secureanywhere™ line products time existing essentials licenses transitioned webroot secureanywhere essentials october 15 2012 product updated webroot secureanywhere® internet security plus latest version webroot secureanywhere internet security plus includes antivirus antispyware anti-phishing personal firewall password identity protection microsoft windows macos computers well protection android ios mobile devices reviews commented lack parental controls included security suite well difficulty configuring firewall | [
2213,
6797,
7983,
2257,
8753,
9713,
8703
] | Test |
8,725 | 2 | Comparison_of_BSD_operating_systems:comparison bsd operating systems number unix-like operating systems based descended berkeley software distribution bsd series unix variant options three notable descendants current use freebsd openbsd netbsd derived 386bsd 4.4bsd-lite various routes netbsd freebsd started life 1993 initially derived 386bsd 1994 migrating 4.4bsd-lite code base openbsd forked netbsd 1995 notable derivatives include dragonfly bsd forked freebsd 4.8 apple inc. ios macos darwin base including large amount code derived freebsd current bsd operating systems open source available download free charge bsd license notable exceptions macos ios also generally use monolithic kernel architecture apart macos ios dragonfly bsd feature hybrid kernels various open source bsd projects generally develop kernel userland programs libraries together source code managed using single central source repository past bsd also used basis several proprietary versions unix sun sunos sequent dynix next nextstep dec ultrix osf/1 axp became discontinued tru64 unix parts next software became foundation macos together ios among commercially successful bsd variants general market dragonfly bsd aims inherently easy understand develop multi-processor infrastructures main goal project forked freebsd 4.8 radically change kernel architecture introducing microkernel-like message passing enhance scaling reliability symmetric multiprocessing smp platforms also applicable numa clustered systems long-term goal provide transparent single system image clustered environments dragonfly bsd originally supported ia-32 x86-64 platforms however support ia-32 dropped version 4.0 matthew dillon founder dragonfly bsd believes supporting fewer platforms makes easier project proper ground-up smp implementation freebsd aims make operating system usable purpose intended run wide variety applications easy use contain cutting edge features highly scalable high load network servers freebsd free software project prefers freebsd license however sometimes accept non-disclosure agreements ndas include limited number nonfree hardware abstraction layer hal modules specific device drivers source tree support hardware companies provide purely libre drivers hals program software-defined radios vendors share nonfree algorithms maintain high level quality provide good support production quality commercial off-the-shelf cots workstation server high-end embedded systems freebsd focuses narrow set architectures significant focus development since 2000 fine-grained locking smp scalability 2007 kernel fine-locked scaling improvements started seen recent work includes common criteria security functionality mandatory access control security event audit support derivatives netbsd aims provide freely redistributable operating system professionals hobbyists researchers use manner wish main focus portability use clear distinctions machine-dependent machine-independent code runs wide variety 32-bit 64-bit processor architectures hardware platforms intended interoperate well operating systems netbsd places emphasis correct design well-written code stability efficiency practical close compliance open api protocol standards also aimed june 2008 netbsd foundation moved two-clause bsd license citing changes ucb industry applicability npf project spawned netbsd openbsd security-focused bsd known developers insistence extensive ongoing code auditing security correct functionality secure default philosophy good documentation adherence strictly open source licensing system incorporates numerous security features absent optional versions bsd openbsd policy openness extends hardware documentation drivers since without trust correct operation kernel security vendor software bugs would hard resolve openbsd emphasizes high standards areas security policies include disabling non-essential services sane initial settings integrated cryptography originally made easier due relaxed canadian export laws relative united states full public disclosure security flaws discovered thoroughly auditing code bugs security issues various security features including w^x page protection technology heavy use randomization mitigate attacks coding approaches include emphasis searching similar issues throughout code base code issue identified concerning software freedom openbsd prefers bsd isc license gpl acceptable existing software impractical replace gnu compiler collection ndas never considered acceptable common parent netbsd openbsd strives run wide variety hardware licenses conflict openbsd philosophy openbsd team re-implemented major pieces software scratch often become standard used within versions bsd examples include pf packet filter new privilege separation techniques used safeguard tools tcpdump tmux much openssh codebase replacing gpl licensed tools diff grep pkg-config isc bsd licensed equivalents openbsd prominently notes success security approach website home page two vulnerabilities ever found default install openssh vulnerability found 2002 remote network vulnerability found 2007 period almost 22 years according openbsd expert michael w. lucas openbsd widely regarded secure operating system available anywhere licensing terms openbsd spawned numerous child projects openssh openntpd openbgpd opensmtpd pf carp libressl many designed replace restricted alternatives derivatives september 2005 bsd certification group advertising number mailing lists surveyed 4,330 bsd users 3,958 took survey english assess relative popularity various bsd operating systems 77 respondents used freebsd 33 used openbsd 16 used netbsd 2.6 used dragonfly 6.6 used potentially non-bsd systems languages offered brazilian european portuguese german italian polish note control group pre-screening survey takers checked asked specify operating system survey takers permitted select one answer percentages shown graph number survey participants add greater 100 survey taker filled one choice still counted one vote chart another attempt profile worldwide bsd usage *bsdstats project whose primary goal demonstrate hardware vendors penetration bsd viability hardware drivers operating system project collects data monthly bsd system administrators willing participate currently records bsd market share participating freebsd openbsd netbsd dragonflybsd debian gnu/kfreebsd trueos mirbsd systems distrowatch well known linux community often used rough guide free operating system popularity publishes page hits linux distributions operating systems covers 4 september 2016 using data span last six months placed freebsd 21st place 479 hits per day trueos 46th place 244 hits per day ghostbsd 47th place 242 hits openbsd 75th place 163 hits per day midnightbsd 118th place 89 hits per day netbsd 142nd place 66 hits per day names freebsd openbsd references software freedom cost open source netbsd name tribute internet brought original developers together first bsd mascot bsd daemon named common type unix software program daemon freebsd still uses image red cartoon daemon named beastie wielding pitchfork mascot today 2005 competition stylized version beastie head designed drawn anton gural chosen freebsd logo freebsd slogan power serve netbsd flag designed 2004 grant bisset inspired original netbsd logo designed 1994 shawn mueller portraying number bsd daemons raising flag top mound computer equipment based world war ii photograph raising flag iwo jima board directors netbsd foundation believed complicated hard reproduce negative cultural ramifications thus suitable image netbsd corporate world new simpler flag design replaced netbsd slogan course runs netbsd referring operating system portability originally openbsd used bsd daemon mascot sometimes added halo distinguishing mark openbsd later replaced bsd daemon puffy although puffy usually referred pufferfish spikes cartoon images give closer likeness porcupinefish logo reference fish defensive capabilities blowfish cryptography algorithm used openssh openbsd also number slogans including secure default used first openbsd song e-railed free functional secure openbsd released least one original song every release since 3.0 dragonfly bsd logo designed joe angrisano dragonfly named fred number unofficial logos various authors also show dragonfly stylized versions dragonfly bsd considers logical continuation freebsd 4.x series fireflybsd similar logo firefly showing close relationship dragonfly bsd fact fireflybsd website states proceeds sales go development dragonfly bsd suggesting two may fact closely related picobsd slogan little bsd us logo includes version freebsd beastie child showing close connection freebsd minimal amount code needed run live cd number bsd oses use stylized version respective names logos includes macos trueos ghostbsd desktopbsd closedbsd microbsd trueos slogan personal computing served bsd style ghostbsd simple secure bsd served desktop desktopbsd step towards bsd desktop microbsd slogan small secure unix like os miros site collects variety bsd mascots tux linux mascot together illustrating project aim supporting bsd linux kernels miros slogan wonderful operating system world peace | [
10761,
2061,
9743,
3603,
7187,
4117,
1080,
5177,
9784,
576,
7234,
3651,
7748,
3142,
7249,
4695,
9306,
607,
10851,
9320,
5230,
10862,
8304,
118,
633,
7802,
8316,
9342,
7806,
1150,
6787,
4745,
8344,
3241,
684,
3248,
1718,
6333,
10436,
2245,... | Test |
8,726 | 4 | Tailored_Access_Operations:tailored access operations office tailored access operations tao computer network operations structured s32 cyber-warfare intelligence-gathering unit national security agency nsa active since least circa 1998 tao identifies monitors infiltrates gathers intelligence computer systems used entities foreign united states tao reportedly largest arguably important component nsa huge signals intelligence directorate sid sigint consisting 1,000 military civilian computer hackers intelligence analysts targeting specialists computer hardware software designers electrical engineers snowden leak document leaked former nsa contractor edward snowden describing unit work says tao software templates allowing break commonly used hardware including routers switches firewalls multiple product vendor lines tao engineers prefer tap networks rather isolated computers typically many devices single network tao headquarters termed remote operations center roc based nsa headquarters fort meade maryland tao also expanded nsa hawaii wahiawa oahu nsa georgia fort gordon georgia nsa texas san antonio texas nsa colorado buckley air force base denver details program titled quantumsquirrel indicate nsa ability masquerade routable ipv4 ipv6 host enables nsa computer generate false geographical location personal identification credentials accessing internet utilizing quantumsquirrel nsa ant catalog 50-page classified document listing technology available united states national security agency nsa tailored access operations tao advanced network technology ant division aid cyber surveillance devices described already operational available us nationals members five eyes alliance according der spiegel released catalog public december 30 2013 list reads like mail-order catalog one nsa employees order technologies ant division tapping targets data document created 2008 security researcher jacob appelbaum gave speech chaos communications congress hamburg germany detailed techniques simultaneously published der spiegel article coauthored disclosed catalog tao developed attack suite call quantum relies compromised router duplicates internet traffic typically http requests go intended target nsa site indirectly nsa site runs foxacid software sends back exploits load background target web browser intended destination chance respond unclear compromised router facilitates race return trip prior development technology foxacid software made spear-phishing attacks nsa referred spam browser exploitable permanent implants rootkits etc deployed target computer e.g olympusfire windows give complete remote access infected machine type attack part man-in-the-middle attack family though specifically called man-on-the-side attack difficult pull without controlling internet backbone numerous services foxacid exploit way names foxacid modules given collaboration british government communications headquarters gchq muscular google services could attacked including gmail finding machines exploitable worth attacking done using analytic databases xkeyscore specific method finding vulnerable machines interception windows error reporting traffic logged xkeyscore quantum attacks launched nsa sites slow combinations targets services essentially try exploit race condition i.e nsa server trying beat legitimate server response mid-2011 nsa prototyping capability codenamed qfire involved embedding exploit-dispensing servers virtual machines running vmware esx hosted closer target so-called special collection sites scs network worldwide goal qfire lower latency spoofed response thus increasing probability success commendeer used commandeer i.e compromise untargeted computer systems software used part quantumnation also includes software vulnerability scanner validator tool first described 2014 chaos communication congress jacob appelbaum characterized tyrannical quantumcookie complex form attack used tor users according 2013 article foreign policy tao become increasingly accomplished mission thanks part high-level cooperation secretly receives 'big three american telecom companies verizon sprint large us-based internet service providers many top computer security software manufacturers consulting companies 2012 tao budget document claims companies tao behest insert vulnerabilities commercial encryption systems systems networks endpoint communications devices used targets number us companies including cisco dell subsequently made public statements denying insert back doors products microsoft provides advance warning nsa vulnerabilities knows fixes information vulnerabilities available public enables tao execute so-called zero-day attacks microsoft official declined identified press confirmed indeed case said microsoft held responsible nsa uses advance information since 2013 head tao rob joyce 25-plus year employee previously worked nsa information assurance directorate iad january 2016 joyce rare public appearance gave presentation usenix ’ enigma conference | [
1024,
10756,
9233,
9750,
535,
9761,
4644,
4133,
6184,
1589,
11335,
1608,
3657,
8779,
7759,
3154,
8276,
91,
4703,
8288,
2148,
2661,
8292,
10875,
3711,
8320,
5764,
2187,
4240,
1688,
10392,
2717,
9375,
1189,
9900,
9904,
6834,
9395,
8886,
530... | None |
8,727 | 3 | GnuLinEx:gnulinex gnulinex linex debian-based operating system uses gnome desktop initiative regional government extremadura spain gnulinex intended used schools extremadura well official institutions actively promoted business home use well gnulinex compatible computers based i386 architecture aim project promotion technologically literate information-based society order improve citizens quality life extremadura changed names many programs installed default distribution caused confusion amongst users see virtue helping remember favorite applications spanish instead english names 2004 version includes possibility choosing original icons names applications included gnulinex school linex gnulinex variant oriented toward teachers consists three user profiles profile personalised particular student content software pupil | [
8837,
7435,
10127,
2321,
5397,
4887,
10394,
4123,
8476,
10780,
926,
543,
673,
3745,
10530,
9253,
10149,
11305,
7854,
7983,
2738,
4790,
823,
439,
56,
59,
2623,
3903,
4673,
10687,
2375,
4039,
5962,
8907,
11388,
1110,
9693,
2914,
6371,
485,
... | Test |
8,728 | 9 | Arc_(programming_language):arc programming language arc programming language dialect language lisp developed paul graham robert morris free open-source software released artistic license 2.0 2001 paul graham announced working new dialect lisp named arc years since written several essays describing features goals language internal projects graham startup business incubator named combinator written arc notably hacker news web forum news aggregator program arc written racket essay popular graham describes goals language many goals general arc hackable good libraries give specifics example believes important language terse also stated better language implement small number axioms even means language may features large organizations want object-orientation oo graham thinks oo useful methods patterns good design views language features used implement oo partly mistaken arc introduction 2008 graham stated one benefits brevity controversy among lisp programmers whether much s-expressions language complemented forms syntax graham thinks added syntax used situations pure s-expressions would overly verbose saying n't think religiously opposed introducing syntax lisp graham also thinks efficiency problems solved giving programmer good profiler released 2008 arc generated mixed reactions calling simply extension lisp scheme programming language right others applauded arc stripping lisp bare essentials shortly release arc ported javascript supported schemescript integrated development environment ide based eclipse hello world arc illustrate arc terseness graham uses brief program produces form one field url /said form submitted leads page link says click leads page value original input field first publicly released version arc made available 29 january 2008 implemented racket named plt-scheme release comes form .tar archive containing racket source code arc tutorial discussion forum also available forum uses program hacker news written arc due lack updates official arc branch members arc community started repositories unofficial modifications extensions libraries one version anarki permitted anyone submit changes project community managed wiki rainbow implementation arc java arcadia implementation arc c | [
10752,
11269,
2056,
2062,
9231,
7184,
2577,
9749,
4633,
4122,
8226,
5677,
3119,
2105,
3132,
6717,
8258,
8771,
8262,
1613,
9299,
10841,
3675,
7267,
2660,
8293,
2666,
5751,
7805,
9345,
1159,
9865,
9877,
5803,
2225,
6840,
7867,
4799,
7880,
8... | Test |
8,729 | 6 | Del_(command):del command computing codice_1 codice_2 command command-line interpreters shells codice_3 codice_4 4dos ndos 4os2 4nt windows powershell used delete one files directories file system command available various operating systems including dos microware os-9 ibm os/2 microsoft windows reactos analogous unix codice_5 command stratus openvos codice_6 codice_7commands dec rt-11 rsx-11 os/8 openvms also provide codice_8 command contracted codice_1 amigados tsc flex provide codice_8 command well ms-dos command available versions 1 later also available open-source ms-dos emulator dosbox dr-dos supports codice_1 codice_2 well also supports shorthand form codice_13 derived cp/m addition dr-dos command processor also supports codice_14/codice_15 shorthand forms codice_1/codice_13/codice_2 command assumed codice_19 parameter 'query given well theos/oasis flexos provide codice_2 command powershell codice_1 codice_2 predefined command aliases codice_23 cmdlet basically serves purpose | [
2432,
3970,
7939,
8834,
4870,
10631,
2568,
1801,
6281,
8713,
1804,
6797,
3856,
273,
6674,
532,
4248,
7325,
4001,
9762,
4771,
7847,
808,
9643,
8876,
7983,
7088,
8369,
178,
9907,
9780,
10033,
4409,
1978,
6329,
6459,
5437,
7356,
7486,
960,
... | Validation |
8,730 | 3 | BTX_(form_factor):btx form factor btx balanced technology extended form factor motherboards originally intended replacement aging atx motherboard form factor late 2004 early 2005 designed alleviate issues arose using newer technologies often demand power create heat motherboards compliant circa 1996 atx specification atx btx standards proposed intel however future development btx retail products intel canceled september 2006 following intel decision refocus low-power cpus suffering scaling thermal issues pentium 4 first company implement btx gateway inc followed dell mpc first generation apple mac pro used elements btx design system well btx-compliant instead using proprietary form factor pico btx motherboard form factor meant miniaturize btx standard pico btx motherboards measure smaller many current micro -sized motherboards hence name pico motherboards share common top half sizes btx line support one two expansion slots designed half-height riser card applications smaller btx sizes include micro btx nano btx heat sink attached cpu called thermal module throughout official specification longer attached solely motherboard casing inertial load mass mechanical shock event longer damage motherboard structural interface heat sink chassis defined 4 mounting holes distances 4.4 × 2.275 55.79 × 111.76 mm one another since attachment means also required certain stiffness called support retention module srm specification first months production atx btx motherboards similar moving btx motherboard atx case possible vice versa possible first btx motherboards atx motherboards turned upside except component location really btx positioning later btx form factor big change turning mirror image atx standard since new motherboard design standards incompatible basically btx motherboards 'leftside-right compared atx upside-down i.e mounted opposite side case computer cases cooler master series stackers released support varying range motherboard standards atx btx mini-atx forth ease motherboard upgrade without buying new case however connector slot standards identical including pci e cards processors ram hard drives etc btx power supply units exchanged newer atx12v units older atx power supplies n't extra 4-pin 12v connector introduced atx12v standard btx form factor widely adopted despite improvements atx related standards result availability variety btx-compatible components limited one reason failure btx gain traction key markets rise energy-efficient components cpus chipsets gpus require less power produce less waste heat eliminating two primary intended benefits btx another reason lack oem adopters initially gateway dell offered computers new format later hp fujitsu-siemens fujitsu also offered btx-based computers manufacturers stayed atx standard even handful manufacturers adopt btx products continued produce bulk machines atx form factor | [
10337,
8035,
2500,
455,
7113,
4270,
7151,
10095,
2161,
2803,
10715,
1400,
8090,
9307,
3037
] | Train |
8,731 | 4 | Client_Puzzle_Protocol:client puzzle protocol client puzzle protocol cpp computer algorithm use internet communication whose goal make abuse server resources infeasible implementation proof-of-work system pow idea cpp require clients connecting server correctly solve mathematical puzzle establishing connection server attack solving puzzle client would return solution server server would quickly verify reject drop connection puzzle made simple easily solvable requires least minimal amount computation client side legitimate users would experience negligible computational cost abuse would deterred clients try simultaneously establish large number connections would unable computational cost time delay method holds promise fighting types spam well attacks like denial-of-service | [
4490,
3964,
2558
] | Validation |
8,732 | 3 | PDP-8:pdp-8 pdp-8 12-bit minicomputer produced digital equipment corporation dec first commercially successful minicomputer 50,000 examples sold model lifetime basic design follows pioneering linc smaller instruction set expanded version pdp-5 instruction set similar machines dec pdp-12 modernized version pdp-8 linc concepts pdp-14 industrial controller system earliest pdp-8 model informally known straight-8 introduced 22 march 1965 priced 18,500 used diode–transistor logic packaged flip chip cards machine size small household refrigerator first computer sold 20,000 making best-selling computer history time straight-8 supplanted 1966 pdp-8/s available desktop rack-mount models using one-bit serial arithmetic logic unit alu allowed pdp-8/s smaller less expensive although slower original pdp-8 basic 8/s sold 10,000 first machine reach milestone later systems pdp-8/i /l pdp-8/e /f /m pdp-8/a returned faster fully parallel implementation use much less costly transistor–transistor logic ttl msi logic surviving pdp-8s era pdp-8/e common well-regarded many types i/o devices available last commercial pdp-8 models introduced 1979 called cmos-8s based cmos microprocessors priced competitively offering failed intersil sold integrated circuits commercially 1982 intersil 6100 family virtue cmos technology low power requirements used embedded military systems chief engineer designed initial version pdp-8 edson de castro later founded data general pdp-8 combines low cost simplicity expandability careful engineering value greatest historical significance pdp-8 low cost high volume made computer available many new customers many new uses continuing significance historical example value-engineered computer design low complexity brought costs made programming cumbersome seen examples article discussion pages fields much one code performed required mechanics opposed setting algorithm example subtracting number involves computing two complement adding writing conditional jump involves writing conditional skip around jump skip coding condition negative one desired ambitious programming projects failed fit memory developed design defects could solved example noted inadvertent recursion subroutine produces defects difficult trace subroutine question design advances reduced costs logic memory programmer time became relatively important subsequent computer designs emphasized ease programming typically using larger intuitive instruction sets eventually machine code generated compilers report generators reduced instruction set computer returned full-circle pdp-8 emphasis simple instruction set achieving multiple actions single instruction cycle order maximize execution speed although newer computers much longer instruction words pdp-8 used ideas several 12-bit predecessors notably linc designed w.a clark c.e molnar inspired seymour cray cdc 160 minicomputer pdp-8 uses 12 bits word size arithmetic unsigned integers 0 4095 signed integers -2048 +2047 however software multiple-precision arithmetic interpreter available floating point operations example used 36-bit floating point representation two-word 24-bit mantissa one-word exponent subject speed memory limitations pdp-8 perform calculations similar expensive contemporary electronic computers ibm 1130 various models ibm system/360 easier interface external devices memory address space also 12 bits pdp-8 basic configuration main memory 4,096 2 twelve-bit words optional memory-expansion unit switch banks memories using iot instruction memory magnetic-core memory cycle time 1.5 microseconds 0.667 mhz typical two-cycle fetch execute memory-reference instruction runs speed 0.333 mips 1974 pocket reference card pdp-8/e gives basic instruction time 1.2 microseconds 2.6 microseconds instructions reference memory pdp-8 designed part handle contemporary telecommunications text six-bit character codes widespread use time pdp-8 twelve-bit words efficiently store two characters addition six-bit teleprinter code called teletypesetting tts code widespread use news wire services early application pdp-8 typesetting using code later 7-bit ascii 8-bit utf-8 character codes developed part response limitations five- six-bit character codes pdp-8 instructions 3-bit opcode eight instructions assembler provides instruction mnemonics programmer translating i/o operate-mode instructions combinations op-codes instruction fields also three programmer-visible registers 12-bit accumulator ac program counter pc carry flag called link register l input output pdp-8 single interrupt shared devices i/o bus accessed i/o instructions direct memory access dma channel programmed i/o bus typically runs low medium-speed peripherals printers teletypes paper tape punches readers dma used cathode ray tube screens light pen analog-to-digital converters digital-to-analog converters tape drives disk drives save money design used inexpensive main memory many purposes served expensive flip-flop registers computers auxiliary counters subroutine linkage basic models use software multiplication division faster math extended arithmetic element eae provides multiply divide instructions additional register multiplier/quotient mq register eae option original pdp-8 8/i 8/e integral part intersil 6100 microprocessor pdp-8 optimized simplicity design compared complex machines unnecessary features removed logic shared possible instructions use autoincrement autoclear indirect access increase software speed reduce memory use substitute inexpensive memory expensive registers electronics basic pdp-8 cpu four 12-bit registers accumulator program counter memory-buffer register memory-address register save money served multiple purposes different points operating cycle example memory buffer register provides arithmetic operands part instruction register stores data rewrite core memory restores core data destroyed read simplicity early pdp-8 models less expensive commercially available computers however used costly production methods often used prototypes used thousands small standardized logic-modules gold connectors integrated costly complex wire-wrapped backplane large cabinet later 8/s model two different logic voltages increased fan-out inexpensive diode–transistor logic 8/s also reduced number logic gates using serial single-bit-wide data path arithmetic cpu pdp-8/s 519 logic gates comparison small microcontrollers 2008 usually 15,000 reductions electronics permitted much smaller case size bread-box even later pdp-8/e larger capable computer reengineered better value employs faster transistor–transistor logic integrated circuits core memory redesigned allows expansion less expense uses omnibus place wire-wrapped backplane earlier models personal account development pdp-8/e read engineering technology history wiki total sales figure pdp-8 family estimated 300,000 machines following models manufactured pdp-8 readily emulated instruction set much simpler modern architectures enthusiasts created entire pdp-8s using single fpga devices several software simulations pdp-8 available internet well open-source hardware re-implementations best correctly execute dec operating systems diagnostic software software simulations often simulate late-model pdp-8s possible peripherals even use tiny fraction capacity modern personal computer i/o systems underwent huge changes pdp-8 era early pdp-8 models use front panel interface paper-tape reader teletype printer optional paper-tape punch time i/o systems magnetic tape rs-232 current loop dumb terminals punched card readers fixed-head disks added toward end pdp-8 era floppy disks moving-head cartridge disk drives popular i/o devices modern enthusiasts created standard pc style ide hard disk adapters real simulated pdp-8 computers several types i/o supported simplified inexpensive form dma called three-cycle data break supported requires assistance processor data break method moves common logic needed implement dma i/o i/o device one common copy logic within processor data break places processor charge maintaining dma address word count registers three successive memory cycles processor updates word count updates transfer address stores retrieves actual i/o data word one-cycle data break effectively triples dma transfer rate target data needed transferred core memory however i/o devices need electronic logic manage word count transfer address registers time pdp-8/e introduced electronic logic become less expensive one-cycle data break became popular early pdp-8 systems operating system front panel run halt switches software development systems pdp-8 series began basic front-panel entry raw binary machine code booting entry middle era various paper tape operating systems developed many utility programs became available paper tape pal-8 assembly language source code often stored paper tape read memory saved paper tape pal assembled paper tape memory paper tape versions number programming languages available including dec focal interpreter 4k fortran compiler runtime toward end pdp-8 era operating systems os/8 cos-310 allowed traditional line mode editor command-line compiler development system using languages pal-iii assembly language fortran basic dibol fairly modern advanced real-time operating system rtos preemptive multitasking multi-user systems available real-time system rts-8 available multiuser commercial systems cos-300 cos-310 dedicated single-user word-processing system wps-8 time-sharing system tss-8 also available tss-8 allows multiple users log system via 110-baud terminals edit compile debug programs languages include special version basic fortran subset similar fortran-1 user-written subroutines functions algol subset focal assembler called pal-d. fair amount user-donated software pdp-8 available decus digital equipment corporation user society often came full source listings documentation three high-order bits 12-bit instruction word labelled bits 0 2 operation code six operations refer memory bits 5 11 provide 7-bit address bit 4 set says complete address using 5 high-order bits program counter pc register meaning addressed location within 128 words instruction bit 4 clear zeroes used addressed location within first 128 words memory bit 3 specifies indirection set address obtained described far points 12-bit value memory gives actual effective address instruction allows operands anywhere memory expense additional word jmp instruction operate memory word except indirection specified bit fields use instruction word divides 4,096-word memory 128-word pages bit 4 instruction selects either current page page 0 addresses 0000–0177 octal memory page 0 premium since variables placed addressed directly page moreover address 0000 interrupt service routine must start addresses 0010–0017 special property auto-incrementing preceding indirect reference standard assembler places constant values arithmetic current page likewise cross-page jumps subroutine calls use indirect address current page important write routines fit within 128-word pages arrange routines minimize page transitions references jumps outside current page require extra word consequently much time spent cleverly conserving one several words programmers deliberately placed code end page achieve free transition next page pc incremented pdp-8 processor defined iot instructions simply provided framework iot instructions defined individual i/o devices bits 3 8 iot instruction select i/o device device addresses standardized convention instructions device 0 affect processor whole example ion 6001 enables interrupt processing ioff 6002 disables bits 9 11 iot instruction select function device performs simple devices paper tape reader punch console keyboard printer use bits standard ways operations take place well-defined order gives useful results one bit set complicated devices disk drives use 3 bits device-specific fashions typically device decodes 3 bits give 8 possible function codes many operations achieved using opr including conditionals opr address memory location conditional execution achieved conditionally skipping one instruction typically jmp opr instruction said microcoded mean word means today lower-level program fetched interpreted opr instruction meant bit instruction word specifies certain action programmer could achieve several actions single instruction cycle setting multiple bits use programmer write several instruction mnemonics alongside one another assembler combines devise actual instruction word many i/o devices support microcoded iot instructions microcoded actions take place well-defined sequence designed maximize utility many combinations opr instructions come groups bits 3 8 11 identify group opr instruction impossible combine microcoded actions different groups cases operations sequenced combined useful ways example combining cla clear accumulator cll clear link iac increment accumulator first clears ac link increments accumulator leaving set 1 adding ral mix cla cll iac ral causes accumulator cleared incremented rotated left leaving set 2 way small integer constants placed accumulator single instruction combination cma iac assembler lets abbreviate cia produces arithmetic inverse ac twos-complement negation since subtraction instruction twos-complement add tad computing difference two operands requires first negating subtrahend group 1 opr instruction none microprogrammed bits set performs action programmer write nop operation assemble instruction bit 8 clear skip performed specified conditions true example sma sza opcode 7540 skips ac ≤ 0 group 2 opr instruction none microprogrammed bits set another no-op instruction bit 8 set group 2 skip condition inverted via de morgan laws skip performed group 2 conditions true meaning specified skip conditions must true example spa sna opcode 7550 skips ac 0 none bits 5–7 set skip unconditional unused bit combinations opr defined third group microprogrammed actions mostly affecting mq multiplier/quotient register typically cla mqa combined transfer mq ac another useful combination mqa mql exchange two registers three bits specified multiply/divide instruction perform 12-bit word 4,096 different values maximum number words original pdp-8 address indirectly word pointer programs became complex price memory fell became desirable expand limit maintain compatibility pre-existing programs new hardware outside original design added high-order bits effective addresses generated program memory extension controller expands addressable memory factor 8 total 32,768 words expansion thought sufficient core memory costing 50 cents word full 32k memory would equal cost cpu 4k memory called field memory extension controller contains two three-bit registers df data field instruction field registers specify field memory reference cpu allowing total 15 bits address register specifies field instruction fetches direct memory references df register specifies field indirect data accesses program running one field reference data field direct addressing reference data another field indirect addressing set i/o instructions range 6200 6277 handled memory extension controller give access df registers 62x1 instruction cdf change data field set data field x similarly 62x2 cif set instruction field 62x3 set pre-existing programs would never execute cif cdf df registers would point field single field programs limited effect cif instruction deferred coincide next jmp jms instruction executing cif would cause jump complicated multiple-field programs deal field boundaries df registers would could simply generate 15-bit addresses design provided backward compatibility consistent 12-bit architecture used throughout pdp-8 compare later intel 8086 whose 16-bit memory addresses expanded 20 bits combining contents specified implied segment register extended memory scheme let existing programs handle increased memory minimal changes example 4k focal normally 3k code 1k left user program data patches focal could use second 4k field user program data moreover additional 4k fields could allocated separate users turning 4k focal multi-user timesharing system pdp-8/e later models memory extension controller enhanced enable machine virtualization program written use pdp-8 entire resources coexist programs pdp-8 control virtual machine manager manager make i/o instructions including operated memory extension controller cause trap interrupt handled manager way manager map memory references map data instruction fields redirect i/o different devices original program complete access virtual machine provided manager new i/o instructions memory extension controller retrieve current value data instruction fields letting software save restore machine state across trap however program sense whether cpu process deferring effect cif instruction whether executed cif yet executed matching jump instruction manager include complete pdp-8 emulator difficult 8-instruction machine whenever cif instruction traps manager emulate instructions next jump fortunately jump usually next instruction cif emulation slow programs much large workaround seemingly small design deficiency time pdp-8/a memory prices fallen enough memory exceeding 32k desirable 8/a added new set instructions handling eight fields memory field number could placed ac rather hard-coded instruction however time pdp-8 decline little standard software modified use new features following examples show code pdp-8 assembly language one might write pal-iii assembler following piece code shows needed compare two numbers shown much text typical pdp-8 program focuses author intended algorithm low-level mechanics additional readability problem conditional jumps one shown conditional instruction skips around jmp highlights opposite condition interest complete pdp-8 assembly language program outputs hello world teleprinter pdp-8 processor implement stack upon store registers context subroutine called interrupt occurs stack implemented software demonstrated next section instead jms instruction simply stores updated pc pointing past jms return address effective address jumps effective address plus one subroutine returned caller using indirect jmp instruction addresses subroutine first word example hello world re-written use subroutine jms instruction jumps subroutine modifies 0 coded location out1 fact jms instruction uses word code subroutine deposit return address prevents reentrancy recursion without additional work programmer also makes difficult use rom pdp-8 read-write return-address storage commingled read-only code storage address space programs intended placed roms approach problem several ways use jms instruction makes debugging difficult programmer makes mistake subroutine call directly intermediate subroutine return address outer call destroyed return address subsequent call leading infinite loop one module coded incorrect obsolete address subroutine would fail execute entire code sequence subroutine might modify word subroutine code depositing return address processor might interpret instruction subsequent correct call subroutine types error might become evident execution code written correctly though pdp-8 hardware stack stacks implemented software example push pop subroutines simplified omit issues testing stack overflow underflow hello world stack implemented subroutine another possible subroutine pdp-8 linked list single interrupt line pdp-8 i/o bus processor handles interrupt disabling interrupts executing codice_1 location 0000 difficult write reentrant subroutines difficult nest interrupts usually done interrupt runs completion re-enables interrupts executing codice_2 instruction returns interrupt single interrupt line i/o bus occurrence interrupt inform processor source interrupt instead interrupt service routine serially poll active i/o device see source code called skip chain consists series pdp-8 test skip flag set i/o instructions unheard-of skip chain reach end without finding device need service relative interrupt priority i/o devices determined position skip chain several devices interrupt device tested earlier skip chain serviced first engineering textbook popular 1980s art digital design david winkel franklin prosser contains example problem spanning several chapters authors demonstrate process designing computer compatible pdp-8/i function every component explained although production design uses modern ssi msi components exercise provides detailed description computer operation | [
512,
6529,
1029,
1798,
6155,
4492,
9739,
9742,
10508,
7188,
9366,
9723,
8474,
7323,
7580,
1952,
10786,
7076,
6821,
2345,
11051,
8876,
3886,
9391,
6448,
7858,
1716,
6837,
8503,
9911,
4409,
10111,
4667,
3650,
7234,
11075,
3142,
8390,
2507,
... | None |
8,733 | 9 | Hewlett-Packard_Raster_Transfer_Language:hewlett-packard raster transfer language hewlett-packard raster transfer language hp rtl subset printer command language pcl language used embed true raster images bitmaps plotter files modern plotters like hp designjets raster devices need raster-based language backward compatibility also support hp-gl/2 formerly hp-gl vector language hp rtl language designed mixing hp-gl/2 language | [
5384,
9795,
6830
] | Test |
8,734 | 4 | Dolev–Yao_model:dolev–yao model dolev–yao model formal model used prove properties interactive cryptographic protocols network represented set abstract machines exchange messages messages consist formal terms terms reveal internal structure messages parts hopefully remain opaque adversary adversary model overhear intercept synthesize message limited constraints cryptographic methods used words attacker carries message omnipotence difficult model many threat models simplify example attacker ubiquitous computing cryptographic primitives modeled abstract operators example asymmetric encryption user formula_1 represented encryption function formula_2 decryption function formula_3 main properties composition identity function formula_4 encrypted message formula_5 reveals nothing formula_6 unlike real world adversary neither manipulate encryption bit representation guess key attacker may however re-use messages sent therefore become known attacker encrypt decrypt keys knows forge subsequent messages protocol modeled set sequential runs alternating queries sending message network responses obtaining message network symbolic nature dolev–yao model makes manageable computational models accessible algebraic methods potentially less realistic however kinds models cryptographic protocols related also symbolic models well suited show protocol broken rather secure given assumptions attackers capabilities | [] | None |
8,735 | 8 | Yahoo!:yahoo yahoo american web services provider headquartered sunnyvale california owned verizon media original yahoo company founded jerry yang david filo january 1994 incorporated march 2 1995 yahoo one pioneers early internet era 1990s provides provided web portal search engine yahoo search related services including yahoo directory yahoo mail yahoo news yahoo finance yahoo groups yahoo answers advertising online mapping video sharing fantasy sports social media website height one popular sites united states according third-party web analytics providers alexa similarweb yahoo widely read news media website – 7 billion views per month – ranking sixth-most-visited website globally 2016 one largest internet companies yahoo slowly declined starting late 2000s 2017 verizon communications acquired yahoo internet business 4.48 billion ref name= yahoo -inc-jun-2017-sc-to-i/a /ref excluding stakes alibaba group yahoo japan transferred yahoo successor company altaba despite decline prominence yahoo domain websites still one popular ranking 8th world according alexa rankings january 2019 january 1994 yang filo electrical engineering graduate students stanford university created website named jerry david guide world wide web site directory websites organized hierarchy opposed searchable index pages march 1994 jerry david guide world wide web renamed yahoo human-edited yahoo directory provided users surf internet became first product company original purpose yahoo.com domain created january 18 1995 word yahoo backronym yet another hierarchically organized oracle yet another hierarchical officious oracle term hierarchical described yahoo database arranged layers subcategories term oracle intended mean source truth wisdom term officious rather related word normal meaning described many office workers would use yahoo database surfing work however filo yang insist mainly selected name liked slang definition yahoo used college students david filo native louisiana late 1980s early 1990s refer unsophisticated rural southerner rude unsophisticated uncouth meaning derives yahoo race fictional beings gulliver travels yahoo grew rapidly throughout 1990s yahoo went public april 1996 stock price rose 600 percent within two years like many search engines web directories yahoo added web portal putting competition services like excite lycos america online 1998 yahoo popular starting point web users human-edited yahoo directory popular search engine receiving 95 million page views per day triple number compared rival excite also made many high-profile acquisitions yahoo began offering free e-mail october 1997 acquisition rocketmail renamed yahoo mail 1998 yahoo decided replace altavista crawler-based search engine underlying directory inktomi yahoo two biggest acquisitions made 1999 – geocities 3.6 billion broadcast.com 5.7 billion stock price skyrocketed dot-com bubble yahoo stocks closing all-time high 118.75 share january 3 2000 however dot-com bubble burst reached post-bubble low 8.11 september 26 2001 yahoo began using google search 2000 next four years developed search technologies began using 2004 partly using technology 280 million acquisition inktomi 2002 response google gmail yahoo began offer unlimited email storage 2007 company struggled 2008 several large layoffs february 2008 microsoft corporation made unsolicited bid acquire yahoo 44.6 billion yahoo formally rejected bid claiming substantially undervalues company interest shareholders three years later yahoo market capitalization 22.24 billion carol bartz replaced yang ceo january 2009 september 2011 removed position yahoo company chairman roy bostock cfo tim morse named interim ceo company early 2012 appointment scott thompson ceo rumors began spread looming layoffs several key executives left including chief product officer blake irving. ref name= yahoo -inc-apr-2012-10-k/a /ref april 4 2012 yahoo announced cut 2,000 jobs 14 percent 14,100 workers cut expected save around 375 million annually layoffs completed end 2012 email sent employees april 2012 thompson reiterated view customers come first yahoo also completely reorganized company may 13 2012 yahoo issued press release stating thompson longer company would immediately replaced interim basis ross levinsohn recently appointed head yahoo new media group thompson total compensation 130-day tenure yahoo least 7.3 million july 15 2012 marissa mayer appointed president ceo yahoo effective july 17 2012 may 19 2013 yahoo board approved 1.1 billion purchase blogging site tumblr tumblr ceo founder david karp would remain large shareholder announcement reportedly signified changing trend technology industry large corporations like yahoo facebook google acquired start-up internet companies generated low amounts revenue way connect sizeable fast-growing online communities wall street journal stated purchase tumblr would satisfy yahoo need thriving social-networking communications hub may 20 company announced acquisition tumblr officially transaction completed one month company also announced plans open san francisco office july 2013 august 2 2013 yahoo acquired rockmelt staff retained existing products terminated data collated comscore july 2013 revealed people u.s. visited yahoo websites month google occasion first time yahoo outperformed google since 2011 data count mobile usage tumblr december 12 2014 yahoo completed acquisition video advertising provider brightroll 583 million november 21 2014 announced yahoo acquired cooliris fourth quarter 2013 company share price doubled since marissa mayer took president july 2012 however share price peaked 35 november 2013 go 36.04 mid-afternoon december 2 2015 perhaps news board directors meeting decide future mayer whether sell struggling internet business whether continue spinoff stake china alibaba e-commerce site gone well mayer tenure including 1.1 billion acquisition tumblr yet prove beneficial forays original video content led 42 million write-down sydney finkelstein professor dartmouth college tuck school business told washington post sometimes single best thing ... sell company closing price yahoo inc. december 7 2015 34.68 wall street journal douglas macmillan reported february 2 2016 yahoo ceo marissa mayer expected cut 15 workforce july 25 2016 verizon communications announced agreed purchase yahoo core internet business 4.83 billion following conclusion purchase assets merged aol form new entity known oath inc. june 13 2017 yahoo aol huffington post continue operate names oath inc. umbrella deal excludes yahoo 15 stake alibaba group 35.5 stake yahoo japan following completion acquisition assets retained name altaba new executive team september 22 2016 yahoo disclosed data breach occurred late 2014 information associated least 500 million user accounts one largest breaches reported date united states indicted four men including two employees russia federal security service fsb involvement hack december 14 2016 company revealed another separate data breach occurred 2014 hackers obtaining sensitive account information including security questions least one billion accounts company stated hackers utilized stolen internal software forge http cookies response breaches bloomberg news reported verizon attempting re-negotiate deal reduce purchase price 250 million causing 2 increase yahoo stock prices february 21 2017 verizon agreed lower purchase price yahoo 350 million share liabilities regarding investigation data breaches june 8 2017 yahoo shareholders approved company sale internet assets verizon 4.48 billion deal officially closed june 13 2017 press release october 3 2017 oath inc. subsidiary verizon stated yahoo user accounts 3 billion affected august 2013 theft june 16 2017 parts original yahoo inc purchased verizon communications renamed altaba inc. united states securities exchange commission website listed new company non-diversified closed-end management investment company former yahoo inc. ticker symbol yhoo retired favor aaba took place monday june 19 2017 yahoo operated portal provides latest news entertainment sports information portal also gave users access yahoo services like yahoo search yahoo mail yahoo maps yahoo finance yahoo groups yahoo messenger yahoo provided internet communication services yahoo messenger yahoo mail may 2007 e-mail service would offer unlimited storage yahoo provided social networking services user-generated content including products web yahoo personals yahoo 360° delicious flickr yahoo buzz yahoo closed yahoo buzz mybloglog numerous products april 21 2011 yahoo photos closed september 20 2007 favor flickr october 16 2007 yahoo announced would discontinue yahoo 360° including bug repairs company explained 2008 would instead establish universal profile similar yahoo mash experimental system yahoo partners numerous content providers products yahoo sports yahoo finance yahoo music yahoo movies yahoo weather yahoo news yahoo answers yahoo games provide news related content yahoo provides personalization service yahoo enables users combine favorite yahoo features content feeds information onto single page march 31 2008 yahoo launched shine site tailored women seeking online information advice ages 25 54 yahoo developed partnerships broadband providers inc. via prodigy bellsouth sbc verizon communications rogers communications british telecom offering range free premium yahoo content services subscribers yahoo mobile offers services email instant messaging mobile blogging well information services searches alerts services camera phone include entertainment ring tones yahoo introduced internet search system called onesearch mobile phones march 20 2007 results include news headlines images flickr business listings local weather links sites instead showing example popular movies critical reviews onesearch lists local theaters moment playing movie along user ratings news headlines regarding movie zip code city name required onesearch start delivering local search results results web search listed single page prioritized categories 2012 yahoo used novarra mobile content transcoding service onesearch october 8 2010 yahoo announced plans bring video chat mobile phones via yahoo messenger yahoo offers shopping services yahoo shopping yahoo autos yahoo real estate yahoo travel enables users gather relevant information make commercial transactions purchases online yahoo auctions discontinued 2007 except asia yahoo shopping price comparison service uses kelkoo price comparison service acquired april 2004 yahoo search marketing provides services sponsored search local advertising product/travel/directory submit let different businesses advertise products services yahoo network following closure beta version april 30 2010 yahoo publisher network relaunched advertising tool allows online publishers monetize websites use site-relevant advertisements yahoo launched new internet advertisement sales system fourth quarter 2006 called panama allows advertisers bid search terms trigger ads search results pages system considers bids ad quality clickthrough rates factors ranking ads panama yahoo aims provide relevant search results users better overall experience increase monetization april 7 2008 yahoo announced apt yahoo originally called amp yahoo online advertising management platform platform simplifies advertising sales unifying buyer seller markets service launched september 2008 july 2009 yahoo agrees use microsoft exclusive technology provider search services microsoft provide contextual advertising yahoo non-exclusive basis yahoo exclusive worldwide relationship sales force yahoo microsoft premium search advertisers september 2011 yahoo formed ad selling strategic partnership 2 top competitors aol microsoft 2013 found underperforming market share revenue microsoft simply skimmed four percent search market yahoo without growing combined share yahoo next incubation ground future yahoo technologies currently undergoing testing contained forums yahoo users give feedback assist development future yahoo technologies yahoo search boss service allows developers build search applications based yahoo search technology early partners program include hakia me.dium delver daylife yebol early 2011 program switched paid model using cost-per-query model 0.40 0.75 cpm cost per 1000 boss queries price yahoo explained depends whether query web image news information became defunct 2016 replaced yahoo partner ads yahoo meme beta social service similar popular social networking sites twitter jaiku connect enables individuals leave comments online publication boards using yahoo id instead register individual publications wall street journal reported yahoo plans mimic strategy used rival facebook inc. help drive traffic site yahoo invested resources increase improve access internet disabled community yahoo accessibility lab yahoo axis desktop web browser extension mobile browser ios devices created developed yahoo extension made public debut may 23 2012 retired june 28 2013 copy private key used sign official yahoo browser extensions google chrome accidentally leaked first public release chrome extension yahoo searchmonkey often misspelled search monkey yahoo service allowed developers site owners use structured data make yahoo search results useful visually appealing drive relevant traffic sites service shut october 2010 along yahoo services part microsoft yahoo search deal name searchmonkey homage greasemonkey officially product name space two capital letters yahoo searchmonkey selected one top 10 semantic web products 2008 geocities popular web hosting service founded 1995 one first services offer web pages public one point third-most-browsed site world wide web yahoo purchased geocities 1999 ten years later web host closed deleting seven million web pages great deal information lost many sites pages mirrored internet archive oocities.com databases yahoo go java-based phone application access yahoo services closed january 12 2010 yahoo 360° blogging/social networking beta service launched march 2005 yahoo closed july 13 2009 yahoo mash beta another social service closed one year operation prior leaving beta status yahoo photos shut september 20 2007 favor integration flickr yahoo tech website provided product information setup advice users yahoo launched website may 2006 march 11 2010 yahoo closed service redirected users yahoo technology news section discontinued services include farechase web audio search pets live kickstart briefcase yahoo teachers hotjobs acquired merged monster.com yahoo koprol indonesian geo-tagging website allowed users share information locations without use gps device koprol acquired yahoo year following inception 2011 1.5 million people utilizing website users also based singapore philippines vietnam however eighty percent users indonesian yahoo officially discontinued koprol august 28 2012 meaningfully drive revenue engagement yahoo mail classic announced shut april 2013 yahoo made notice starting june 2013 mail classic old versions yahoo mail shut users mail classic expected switch new yahoo mail use imap switch another email service addition april 2013 brought closure upcoming yahoo deals yahoo sms alerts yahoo kids yahoo mail messenger feature phone j2me early july 2013 yahoo announced scheduled closure task management service astrid yahoo acquired company may 2013 discontinue service august 5 2013 team astrid supplied customers data export tool recommended former competitors wunderlist sandglaz december 15 2010 one day yahoo announced layoffs 4 workers across portfolio mybloglog founder eric marcoullier posted slide yahoo employee twitter slide visible employee-only strategy webcast indicating changes yahoo offerings following services column sunset yahoo picks altavista mym alltheweb yahoo bookmarks yahoo buzz del.icio.us mybloglog merge column upcoming foxytunes yahoo events yahoo people search sideline fireeagle 11 properties listed yahoo interested developing feature sites within portal take place sunset merge vacancies including prior feature services new yahoo mail launched yahoo address book calendar notepad despite notepad listed feature service instead sunset merge 2010 yahoo since taken steps de-emphasize notepad example january 2013 notepad longer linked within new yahoo mail service although continued linked older classic version also starting mid- late january 2013 notepad longer searchable blog del.icio.us website released post chris yeh slide leaked yeh stated sunset n't necessarily mean yahoo closing site yeh explained possibilities—including del.icio.us leaving yahoo sale spinoff —were still considered imagine upsetting news coverage past 24 hours many speaking team disappointed way appeared press april 27 2011 yahoo sale del.icio.us avos announced yahoo buzz closed april 21 2011 without official announcement yahoo mybloglog discontinued yahoo may 24 2011 september 2013 yahoo transparency report said company received 29 thousand requests information users governments first six months 2013 12 thousand requests came united states october 2013 washington post reported u.s. national security agency intercepted communications yahoo data centers part program named muscular late january 2014 yahoo announced company blog detected coordinated effort hack possibly millions yahoo mail accounts company prompted users reset passwords elaborate scope possible breach citing ongoing federal investigation august 2015 researchers malwarebytes notified yahoo users getting hacked vulnerabilities flash according vulnerability could allow attackers install ransomware users computers lock files till customers pay criminals working comscore new york times found yahoo able collect far data users competitors web sites advertising network one measure average yahoo potential december 2007 build profile 2,500 records per month visitors yahoo retains search requests period 13 months however response european regulators yahoo obfuscates ip address users three months deleting last eight bits march 29 2012 yahoo announced would introduce track feature summer allowing users opt web-visit tracking customized advertisements however april 30 2014 yahoo announced would longer support track browser setting according 2008 article computerworld yahoo 2-petabyte specially built data warehouse uses analyze behavior half-billion web visitors per month processing 24 billion daily events contrast united states internal revenue service irs database united states taxpayers 150 terabytes september 2016 reported data least 500 million yahoo accounts stolen 2014 october 2016 reuters reported 2015 yahoo created software search customers e-mail request nsa fbi 2000 yahoo taken court france parties seeking prevent french citizens purchasing memorabilia relating nazi party march 2004 yahoo launched paid inclusion program whereby commercial websites guaranteed listings yahoo search engine yahoo discontinued program end 2009 yahoo criticized providing ads via yahoo ad network companies display spyware adware yahoo well search engines cooperated chinese government censoring search results april 2005 dissident shi tao sentenced 10 years prison providing state secrets foreign entities result identified ip address yahoo human rights organizations company general counsel disputed extent yahoo foreknowledge shi fate human rights groups also accuse yahoo aiding authorities arrest dissidents li zhi jiang lijun april 2017 yahoo sued failing uphold settlement agreements case yahoo pledged give support families arrested create relief fund persecuted expressing views online yahoo human rights trust 17.3 million allotted fund 13 million used townhouse washington dc purchases september 2003 dissident wang xiaoning convicted charges incitement subvert state power sentenced ten years prison yahoo hong kong connected wang group specific yahoo e-mail address xiaoning wife world organization human rights sued yahoo human rights laws behalf wang shi result media scrutiny relating internet child predators lack significant ad revenues yahoo user created chatrooms closed june 2005 may 25 2006 yahoo image search criticized bringing sexually explicit images even safesearch active august 2015 yahoo purchased 40 23 september 2013 owner alibaba group subject controversy allowing sale shark-derived products company banned sale shark fin products e-commerce platforms effective january 1 2009 november 30 2009 yahoo criticized electronic frontier foundation sending dmca notice whistle-blower website cryptome publicly posting details prices procedures obtaining private information pertaining yahoo subscribers concerns censorship private emails regarding website affiliated occupy wall street protests raised yahoo responded apology explained accident following media reports prism nsa massive electronic surveillance program june 2013 several technology companies identified participants including yahoo yahoo listed paradise papers set confidential electronic documents relating offshore investment leaked german newspaper süddeutsche zeitung scott ard prominent editorial director fired yahoo 2015 filed lawsuit accusing mayer leading sexist campaign purge male employees ard male employee stated mayer encouraged fostered use employee performance-rating system accommodate management subjective biases personal opinions detriment yahoo male employees suit ard claimed prior firing received fully satisfactory performance reviews since starting company 2011 head editorial programming yahoo home page however relieved role given woman recently hired megan lieberman editor-in-chief yahoo news lawsuit states liberman stated terminating ard received requested breakdown duties ard already provided information requested however reminded liberman done liberman excuse terminating ard pretext second sexual discrimination lawsuit filed separately gregory anderson fired 2014 alleging company performance management system arbitrary unfair making second sexism lawsuit yahoo mayer faced 2016 former chief operating officer henrique de castro departed company january 2014 mayer initially hired appointment ceo dismissed de castro previously worked google mckinsey company employed revive yahoo advertising business yahoo offers multi-lingual interface site available 20 languages official directory yahoo international sites world.yahoo.com company international sites wholly owned yahoo exception japan china sites yahoo holds 34.75 minority stake yahoo japan softbank holds 35.45 yahoo xtra new zealand yahoo 7 51 49 belongs telecom new zealand yahoo 7 australia 50–50 agreement yahoo seven network historically yahoo entered joint venture agreements softbank major european sites uk france germany well south korea japan november 2005 yahoo purchased minority interests softbank owned europe korea yahoo used hold 40 stake 35 voting power alibaba manages web portal china using yahoo brand name yahoo china yahoo usa direct control alibaba operates completely independent company september 18 2012 following years negotiations yahoo agreed sell 20 stake back alibaba 7.6 billion march 8 2011 yahoo launched romania local service years delay due financial crisis yahoo officially entered mena region acquired maktoob pan-regional arabic-language hosting social services online portal august 25 2009 since service pan-regional yahoo officially became yahoo maktoob region december 31 2012 yahoo korea shut services left country previous domain saying korean starting december 31 2012 yahoo korea ended go original yahoo yahoo information sooner message also disappear leaving abandoned empty search bar powered bing september 2 2013 yahoo china shut redirected taobao.com redirected yahoo singapore search page yahoo got first logo establishment 1994—it consists yahoo wordmark coloured black using times new roman font later changed march 1995 company changed name yahoo introduced another logo briefly changed elaborate text includes exclamation point end short-lived 5 months later august 1995 year yahoo changed logo became stylized yellow jumping figurine blue circle yahoo wordmark written logo also short-lived 4 months december 1995 january 1 1996 yahoo introduced much tweaking refining new logo quickly simplified text exclamation mark slight shadow behind text although gets coloured red also containing three icons side well becomes simple wordmark without graphics therefore create familiar logo existence since eventually logo used yahoo home page formerly consists red color black outline shadow june 2002 later becoming slightly changed new black shadows text replaces older gray color except gets introduced yahoo japan within following year gets still used today slight moderation 2013 see may 2009 yahoo overhauled theme redesign makes logo become recoloured purple without outline shadow purple logo first appeared headquarters yahoo messenger 1995 although get full effect november 12 2009 site received revamp entirely remove old red color 1996 change would apply several international yahoo home pages countries notably yahoo 7 australia still using red logo 2014 time purple logo comes new slogan ou used time occasion would time abbreviated august 7 2013 around midnight edt yahoo announced final version new logo would revealed september 5 2013 4:00 a.m. utc period leading unveiling new logo 30 days change campaign introduced whereby variation logo published every day 30 days following announcement new logo eventually launched accompanying video showed digital construction mayer published personalized description design process tumblr page mayer explains one weekend summer rolled sleeves dove trenches logo design team ... spent majority saturday sunday designing logo start finish ton fun weighing every minute detail knew wanted logo reflected yahoo – whimsical yet sophisticated modern fresh nod history human touch personal proud september 19 2013 yahoo launched new version yahoo personalized homepage redesign allows users tailor homepage widgets access features email accounts calendars flickr yahoo content internet content users also select theme packs represent artists polly apfelbaum alec monopoly bands empire sun mayer explained conference late september 2013 logo change result feedback external parties employees | [
9732,
1545,
2062,
4624,
10263,
8735,
6703,
8758,
7739,
8258,
7750,
1623,
6237,
3683,
3174,
8300,
5229,
113,
4213,
3703,
119,
6265,
9344,
1169,
10392,
2717,
7329,
7345,
6834,
4793,
7869,
2238,
5311,
7871,
711,
6344,
7887,
10450,
5332,
3286... | Test |
8,736 | 7 | Insteon:insteon insteon home automation domotics technology enables light switches lights thermostats leak sensors remote controls motion sensors electrically powered devices interoperate power lines radio frequency rf communications employs dual-mesh networking topology devices peers device independently transmits receives repeats messages like home automation systems associated internet things insteon-based products launched 2005 smartlabs company holds trademark insteon smartlabs subsidiary also named insteon created market technology according press release june 13 2017 smartlabs insteon technology acquired richmond capital partners rob lilleness universal electronics assuming role chairman ceo every message received insteon compatible device undergoes error detection correction retransmitted improve reliability devices retransmit message simultaneously message transmissions synchronous powerline frequency thus preserving integrity message strengthening signal powerline erasing rf dead zones insteon powerline messaging uses phase-shift keying insteon rf messaging uses frequency-shift keying message contains two-bit hops field initialized 3 originating node decremented time node network repeats message individual insteon messages also carry 14 bytes arbitrary user data custom applications insteon integrated dual-mesh formerly referred dual-band network combines wireless radio frequency rf building existing electrical wiring electrical wiring becomes backup transmission medium event rf/wireless interference conversely rf/wireless becomes backup transmission medium event powerline interference peer-to-peer network devices require network supervision thus allowing optional operation without central controllers routing tables insteon devices function without central controller additionally may managed central controller implement functions control via smartphones tablets control scheduling event handling problem reporting via email text messaging computer used central controller connecting insteon usb/serial powerlinc modem serves communication bridge computer insteon device network insteon network security maintained via linking control ensure users create links would allow control neighbors ’ insteon devices via encryption within extended insteon messages applications door locks security applications applications choose implement encryption insteon enforces linking control requiring users physical possession devices knowledge unique insteon ids order create links firmware insteon devices prohibits identifying devices unless user either physically presses button device installation process explicitly addresses device via central controller linking device sending insteon messages e.g. central controller requires knowledge address target insteon device addresses unique device assigned factory displayed printed label attached device users must physical access device read device address label manually enter prompted installation security insteon rf devices criticized def con presentation 2015 insteon devices configured applying sequence taps button presses pushbutton device establish direct device-to-device links alternatively central controller may used configure devices insteon device unique identifier code similar mac address technology allows directly linked devices manage identifiers older insteon chip sets manufactured smartlabs transmit receive respond repeat x10 power line messages thus enabling x10 networks interoperate insteon 2014 insteon released home automation system compatible touch-enabled metro interface devices appearing live tiles later added voice control via microsoft cortana 2015 voice control added via compatibility amazon echo year logitech announced harmony hub-based remote would support insteon devices deployed insteon hub also 2015 insteon announced initiative integrate google-owned nest learning thermostat insteon hub insteon one two launch partners apple homekit platform homekit-enabled insteon hub pro 2015 insteon announced support apple watch allowing watch owners control home insteon hub insteon second generation i2/rf replaces first generation i1/rf wireless insteon communications i1/rf i2/rf uses different frequencies operate independently currently one legacy product implements i1/rf signalinc rf signal enhances introduced may 2005 specifications i2/rf | [
8640,
4609,
11267,
10021,
6023,
2920,
9448,
3248,
7411,
10206
] | Test |
8,737 | 2 | Mainframe_sort_merge:mainframe sort merge sort/merge utility mainframe program sort records file specified order merge pre-sorted files sorted file copy selected records internally utilities use one standard sorting algorithms often proprietary fine-tuned code mainframes originally supplied limited main memory today standards amount data sorted frequently large unlike recent sort programs early sort/merge programs placed great emphasis efficient techniques sorting data secondary storage typically tape disk 1968 os/360 sort/merge program provided five different sequence distribution techniques could used depending number type devices available 1990 ibm introduced new merge algorithm called blockset dfsort successor os/360 sort/merge historical note blockset algorithm invented ibm systems engineer 1963 discovered ibm archives implemented 1990 sort/merge frequently used often commonly used application program mainframe shop generally consuming twenty percent processing power shop modern sort/merge programs also copy files select omit certain records summarize records remove duplicates reformat records append new data produce reports indeed sort/merge applications use wide range additional processing capabilities rather purely sorting merging records sort/merge product fast way performing input output functions quite number user exits supported may load modules i.e. member library object decks i.e. output assembler sort/merge application loading load modules linking object decks termed dynamic link editing dfsort exit specified required working storage datasets i.e. sortwk01 ... sortwknn may disk tape although blockset algorithm restricted disk working storage working storage datasets generally improves performance sort/merge important enough multiple companies selling sort/merge package ibm mainframes z/os z/vm z/vse operating systems major sort/merge packages companies also sell versions platforms unix linux windows historically alias sort used refer ibm sort/merge third party sort/merge programs i.e. syncsort casort also adopted sort alias product dfsort often referred program name iceman component ice original os/360 sort/merge program name ierrco00 component ier also alias sort | [
1801,
6797,
5492,
7733,
823,
2168,
9977,
3323,
2813
] | Validation |
8,738 | 9 | Strict_programming_language:strict programming language strict programming language programming language employs strict programming paradigm allowing strict functions functions whose parameters must evaluated completely may called defined user non-strict programming language allows user define non-strict functions hence may allow lazy evaluation nearly programming languages common use today strict examples include c java prior java 8 perl version 5 python ruby common lisp ml examples non-strict languages haskell miranda clean languages whose ordinary functions strict provide macro system build non-strict functions include c c++ scheme non-strict languages non-strictness extends data constructors allows conceptually infinite data structures list prime numbers manipulated way ordinary finite data structures also allows use large finite data structures complete game tree chess non-strictness several disadvantages prevented widespread adoption strict programming languages often associated eager evaluation non-strict languages lazy evaluation evaluation strategies possible case terms eager programming language lazy programming language often used synonyms strict programming language non-strict programming language respectively many strict languages advantages non-strict functions obtained use macros thunks | [
9345,
8582,
6536,
2062,
8722,
3475,
9245,
3876,
5677,
10043,
3263,
8262,
9932,
7386,
10083,
230,
8554,
10618,
2045
] | None |
8,739 | 9 | Model-Glue:model-glue model-glue oo web framework based mvc design pattern goal simplify development oo coldfusion applications released apache software license 2.0 asl2.0 model-glue | [
1920,
3462,
8582,
3469,
2062,
9614,
2576,
9618,
148,
1812,
4507,
6941,
9245,
10526,
4512,
3876,
4777,
5165,
4529,
7987,
692,
8883,
7862,
3895,
5048,
9144,
6074,
190,
5314,
9666,
8644,
1353,
595,
84,
4056,
6493,
102,
8554,
8691,
3705,
11... | Validation |
8,740 | 2 | Calendar_(Windows):calendar windows calendar personal calendar application made microsoft microsoft windows offers synchronization calendars using microsoft exchange server outlook.com apple icloud calendar service google calendar supports popular icalendar format microsoft first included calendar application shortened app windows 1.0 included windows 3.1 replaced schedule+ windows workgroups windows nt 3.1 schedule+ later moved windows microsoft office suite windows include another calendar application windows calendar windows vista calendar created beta 2 windows vista version supports sharing subscribing publishing calendars webdav-enabled web servers network shares always supported .ics files subscription feature enables syncing google calendar interface matches windows vista mail two apps connected operating system default calendar renamed new version calendar text-heavy added windows 8 one many apps written run full-screen snapped part microsoft metro design language philosophy one three apps windows originate microsoft outlook two mail people apps structurally three apps one installed uninstalled user interface calendar windows 8 originally supported outlook.com exchange google calendar facebook calendars api changes facebook google calendars longer directly synced windows 8 like many microsoft apps introduced windows 8 many features hidden charms menu bottom screen triggered right clicking different calendars labeled different colors user microsoft account adds calendar account one computer windows 8 calendar account automatically added windows 8 computers user logged .ics files supported version mail preset server configurations outlook.com exchange google calendar icloud calendar users set use system theme choose custom accent color background image light/dark preference windows 10 calendar multi-window support viewing editing events different calendars labeled different colors events rearranged dragging dropping default interface month view users also use day week year views print views windows 10 app also uses flyout settings panel mini ribbon interface viewing pane day year calendar events show live tile like vista version important controls readily visible use icons match system accounts grouped relabeled folders edited within app .ics support added version time windows 10 anniversary update | [
11270,
5643,
4624,
11285,
537,
540,
3102,
9762,
8227,
1577,
10281,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
8798,
3170,
8296,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
639,
10879,
8841,
6... | Test |
8,741 | 5 | High_Frequency_Internet_Protocol:high frequency internet protocol high frequency internet protocol hfip hf-ip usually associated automatic link establishment hf radio data communications hfip provides protocol layers enabling internet file transfer chat web email hfip commonly uses ionospheric propagation radio waves form wide area network span thousands kilometers hf transceivers hfip service typically run 20 150 watts portable mobile units approximately 2000 watts transmitter output high power base stations hfip servers stanag 5066 common hfip standard amateur radio hfip network called hflink uses automatic link establishment initiating data communications arq 8fsk frequency-shift keying psk phase-shift keying signals | [
2752,
2920,
119
] | Validation |
8,742 | 1 | Database_activity_monitoring:database activity monitoring database activity monitoring dam a.k.a enterprise database auditing real-time protection database security technology monitoring analyzing database activity operates independently database management system dbms rely form native dbms-resident auditing native logs trace transaction logs dam typically performed continuously real-time database activity monitoring prevention damp extension dam goes beyond monitoring alerting also block unauthorized activities dam helps businesses address regulatory compliance mandates like payment card industry data security standard pci dss health insurance portability accountability act hipaa sarbanes-oxley act sox u.s. government regulations nist 800-53 eu regulations dam also important technology protecting sensitive databases external attacks cybercriminals according 2009 verizon business ’ data breach investigations report—based data analyzed verizon business ’ caseload 90 confirmed breaches involving 285 million compromised records 2008—75 percent breached records came compromised database servers according gartner “ dam provides privileged user application access monitoring independent native database logging audit functions function compensating control privileged user separation-of-duties issues monitoring administrator activity technology also improves database security detecting unusual database read update activity application layer database event aggregation correlation reporting provide database audit capability without need enable native database audit functions become resource-intensive level auditing increased ” according survey independent oracle user group ioug “ organizations mechanisms place prevent database administrators privileged database users reading tampering sensitive information financial hr business applications still unable even detect breaches incidents. ” forrester refers category “ database auditing real-time protection ” privileged user monitoring monitoring privileged users superusers database administrators dbas systems administrators sysadmins developers help desk outsourced personnel – typically unfettered access corporate databases – essential protecting external internal threats privileged user monitoring includes auditing activities transactions identifying anomalous activities viewing sensitive data creating new accounts superuser privileges reconciling observed activities adding deleting tables authorized change requests since organizations already protected perimeter level indeed major concern lies need monitor protect privileged users high correlation therefore database security need protect insider threat complex task privileged users capable using sophisticated techniques attack database stored procedures triggers views obfuscated traffic attacks may difficult detect using traditional methods addition since targeted attacks frequently result attackers gaining privileged user credentials monitoring privileged activities also effective way identify compromised systems result auditors demanding monitoring privileged users security best practices well wide range regulations privileged user monitoring helps ensure • data privacy authorized applications users viewing sensitive data • data governance critical database structures values changed outside corporate change control procedures application activity monitoring primary purpose application activity monitoring provide greater level end-user accountability detect fraud abuses legitimate access occurs via enterprise applications rather via direct access database multi-tier enterprise applications oracle ebs peoplesoft jd edwards sap siebel systems business intelligence custom applications built standard middle-tier servers ibm websphere oracle weblogic server mask identity end-users database transaction level done optimization mechanism known “ connection pooling. ” using pooled connections application aggregates user traffic within database connections identified generic service account name application activity monitoring allows organizations associate specific database transactions particular application end-users order identify unauthorized suspicious activities end-user accountability often required data governance requirements sarbanes–oxley act new auditor guidance public company accounting oversight board sox compliance also increased emphasis anti-fraud controls cyberattack protection sql injection type attack used exploit bad coding practices applications use relational databases attacker uses application send sql statement composed application statement concatenated additional statement attacker introduces many application developers compose sql statements concatenating strings use prepared statement case application susceptible sql injection attack technique transforms application sql statement innocent sql call malicious call cause unauthorized access deletion data theft information one way dam prevent sql injection monitoring application activity generating baseline “ normal behavior ” identifying attack based divergence normal sql structures normal sequences alternative approaches monitor memory database database execution plan context sql statements visible based policy provide granular protection object level defined gartner “ dam tools use several data collection mechanisms server-based agent software in-line out-of-band network collectors aggregate data central location analysis report based behaviors violate security policies and/or signatures indicate behavioral anomalies dam demand driven primarily need privileged user monitoring address compliance-related audit findings threat-management requirements monitor database access enterprise dam requirements beginning broaden extending beyond basic functions capability detect malicious activity inappropriate unapproved database administrator dba access. ” advanced dam functions include enterprises also seeking functions including interception-based modern dam systems collect database able “ see ” communications database client database server dam systems find places view communication stream get requests responses without requiring participation database interception done multiple points database memory e.g sga network using network tap span port communication encrypted operating system level level database libraries unencrypted network traffic packet sniffing used advantage processing done host however main disadvantage local traffic sophisticated intra-database attacks detected capture local access network based vendors deploy probe runs host probe intercepts local access also intercept networked access case want use network gear case database communications encrypted however since agent processing — instead relays data dam appliance processing occurs — may impact network performance local traffic real-time session termination may slow interrupt unauthorized queries memory-based dam systems lightweight sensor attaches protected databases continuously polls system global area sga collect sql statements performed similar architecture previously used performance optimization products also used sga shared data structures latest versions technology lightweight sensor runs host attaches process os level inspect private data structures advantages approach significant log-based dam systems analyze extract information transaction logs e.g. redo logs systems use fact much data stored within redo logs scrape logs unfortunately information required redo logs example select statements systems augment data gather redo logs data collect native audit trails shown figure 3 systems hybrid true dam system fully independent dbms siem relies data generated database architectures usually imply overhead database server | [
2688,
899,
9481,
10505,
10258,
10518,
8471,
4376,
9112,
7968,
290,
1314,
7461,
10413,
5550,
7983,
5808,
10418,
10546,
9527,
3768,
3004,
700,
9661,
9663,
4416,
2369,
5441,
11457,
8518,
72,
853,
2901,
9942,
9177,
987,
860,
9183,
1250,
11362... | Test |
8,743 | 1 | Disclosure_and_Barring_Service:disclosure barring service disclosure barring service dbs non-departmental public body home office united kingdom dbs enables organisations public private voluntary sectors make safer recruitment decisions identifying candidates may unsuitable certain work especially involving children vulnerable adults provides wider access criminal record information disclosure service england wales dbs formed 2012 merging functions criminal records bureau crb independent safeguarding authority isa protection freedoms act 2012 dbs started operating 1 december 2012 operates liverpool royal wootton bassett equivalent agencies disclosure scotland scotland access northern ireland northern ireland legal requirement uk regulated activity employers notify dbs person leaves changes job relation harmed someone offence person barred dbs work apply work group children adults barred also offence employer knowingly employ barred person regulated activity group barred organisation entitled ask exempted questions rehabilitation offenders act 1974 must register dbs registered dbs umbrella body request dbs check applicant applicant applies dbs application countersigned dbs registered organisation umbrella body applicant criminal record accessed police national computer pnc well checked appropriate lists people considered unsuitable work children vulnerable people maintained dbs formerly maintained independent safeguarding authority copy completed certificate sent applicant home address individual organisation safeguarding concerns regarding member staff make safeguarding referral dbs work multiple agencies assess whether individual barred working regulated activity children and/or vulnerable groups criminal records bureau established part v police act 1997 launched march 2002 following public concern safety children young people vulnerable adults found british police forces adequate capability resources routinely process fulfil large number criminal record checks requested timely fashion dedicated agency set administer function employers temporary staff agencies bemoaned time takes worker cleared dbs effort cut waiting times government allowed establishment adult first may 2002 department education began maintaining list individuals suitable work children list originally named list 99 later named isa children barred list maintained independent safeguarding authority finally dbs children barred list maintained disclosure barring service care standards act 2000 department health introduced adult version list 99 named 'pova first 26 july 2004 later renamed 'isa adult first finally 'dbs adult first adult first list 99 services allow registered bodies eligible check whether applicant appears dbs adults children barred list online checking system takes around two working days turn around check clean organisation may provisionally employ applicant subject increased level supervision return post full disclosure 17 june 2013 dbs update service launched intended improve ease applying criminal record checks create significant savings 1 february 2018 national audit office published investigation report highly critical dbs 2009 home office launched programme increase efficiency safeguarding services key aims programme reduce cost running disclosure service customers using new cheaper update service rather continuing use existing types disclosure certificates home office expected 2.8 million paying users using new update service 2017–18 market tested actual number users around one million according national audit office investigation modernisation programme running three half years late expected costs increased £229 million dbs currently negotiating contractor tata consultancy services delays modernisation programme update service expected increase ease frequency people checked thereby improving safeguarding home office dbs know many people prevented working children vulnerable adults use information process dbs provides criminal record data called dbs certificate dbs check previously crb check four levels dbs checks basic standard enhanced enhanced barred list checks basic disclosures see disclosure scotland dbs checks obtained members public directly available organisations professions offices employments work occupations listed exceptions order 1975 rehabilitation offenders act 1974 amended protection freedoms act 2012 17 june 2013 dbs update service launched intended improve ease applying criminal record checks create significant savings fee £13 year applicants may use certificate within sector disclosure level workforce details barring list checks volunteer status employer consent run dbs update check check existing certificate date check applicant identity certificate authenticity january 2018 basic dbs checks introduced disclose details cautions convictions deemend unspent rehabilitation offenders act 1974 basic dbs check disclose cautions reprimands warnings convictions deemed unspent according rehabilitation offenders act 1974 service provided dbs england wales disclosure scotland applicants scotland applications also done online employer reference dbs check could taken requirement standard enhanced check meant disclosure cautions convictions even spent however introduction basic check employers specify check required advertising job aim service reduce need unnecessary ineligible standard enhanced checks apply one responsible organisations list organisations websites apply check standard dbs check primarily positions high responsibility example accountancy security standard certificates reveal details convictions cautions reprimands warnings applicant received qualify filtering standard check may applied applicant job role specified police act 1997 amended protection freedoms act 2012 enhanced dbs checks positions involving certain activities teaching children treating adults also obtained certain professions example judicial appointments rspca officers enhanced check may applied applicant job role specified rehabilitation offenders act 1974 exception order 1975 police act 1997 addition information provided standard certificate enhanced certificate involves additional check police check information held file may relevant instance information led criminal conviction may indicate danger vulnerable groups police decide additional information added certificate using quality assurance framework involvement local police forces mean enhanced check may take significantly longer standard check completed includes enhanced certificate plus check appropriate dbs barred list two dbs barred lists one adults one children lists contain information whether applicant barred working either two groups individual may checked one barred lists job role classified regulated activity children and/or adults safeguarding vulnerable groups act 2006 roles might barred include work within outside people homes areas postal work would access personal documents dbs began filter certain criminal information dbs certificate met guidelines laid rehabilitation offenders act 1974 exceptions order 1975 amendment england wales order 2013 dbs work number standards criminal record checking service barring case accuracy performance service standards also agreed dbs police disclosure units crb due partner isa administering newly created vetting barring scheme 2009 suspended 2010 pending review following 2010 general election review published february 2011 making recommendations merger criminal records bureau independent safeguarding authority one new non-departmental public body disclosure barring service responsible barring individuals completing criminal record checks protection freedoms act 2012 dbs require registration details retained database procedures crb tightened following soham murders trial ian huntley former caretaker found guilty murdering two girls cambridgeshire primary school 2002 huntley suspected string offences including rape indecent assault burglary conviction murders riding uninsured unlicensed motorcycle burglary charge remained file january 2006 following controversies resulting cases staff hired schools full crb check carried department education skills stated employers obtain crb enhanced disclosure respect teachers recruit person placed school huntley hired november 2001 crb came force sociologist frank furedi stated crb checks provide cast-iron guarantee children safe particular adult use created atmosphere suspicion poisoning relationships generations many ordinary parents finding regarded potential child abusers restrictions imposed crb check process contributed shortage adult volunteers organizations girlguiding uk 2009 crb enhanced disclosure criticised including details minor contact individual police even formal action taken | [
5602
] | Test |
8,744 | 4 | Egress_Software:egress software egress software technologies ltd uk-based software company provides range data security services designed protect shared information throughout lifecycle offering on-demand security organisations individuals sharing confidential information electronically egress develops security software including email encryption secure online collaboration document email classification email file archiving egress founded 2007 tony pepper neil larkins john goodyear major use egress switch software secure transfer emails documents non-secure email addresses october 2013 egress switch certified cesg desktop gateway email encryption security characteristics part commercial product assurance program makes switch suitable sharing il2 low-threat il3 data guidelines official official sensitive 2014 uk government security classifications policy certification lies national cyber security centre ncsc currently extended 20 december 2019 may 2014 egress switch encryption services became available procure via g-cloud 5 framework uk government program committed adoption cloud services across public sector g-cloud framework public sector organizations able procure following egress switch services switch secure email switch secure file transfer switch secure web form via number egress value added resellers also may 2014 egress switch secure email listed nato information assurance product catalogue provides 28 nato nations well civil military bodies directory information assurance products protection profiles packages use available procurement meet operational requirements | [
7979,
4194,
4595,
11046
] | Test |
8,745 | 8 | Google_Web_Server:google web server google web server gws proprietary web server software google uses web infrastructure gws used exclusively inside google ecosystem website hosting 2008 gws team lead bharat mediratta sometimes gws described one guarded component google infrastructure 2010 gws reported serving 13 web sites world may 2015 gws ranked fourth popular web server internet apache nginx microsoft iis powering estimated 7.95 active websites web page requests google pages provide gws without version number http header indication web server software used information regarding gws scarce blog post google chicago office 2011 google provided details gws | [
225,
865,
3237,
7983,
4439
] | None |
8,746 | 4 | Key-recovery_attack:key-recovery attack key-recovery attack adversary attempt recover cryptographic key encryption scheme historically cryptanalysis block ciphers focused key-recovery security sorts attacks weak guarantee since may necessary recover key obtain partial information message decrypt message entirely modern cryptography uses robust notions security recently indistinguishability adaptive chosen-ciphertext attack ind-cca2 security become golden standard security obvious key-recovery attack exhaustive key-search attack modern ciphers often key space size formula_1 greater making attacks infeasible current technology | [] | Test |
8,747 | 4 | Naive_Bayes_spam_filtering:naive bayes spam filtering naive bayes classifiers popular statistical technique e-mail filtering typically use bag words features identify spam e-mail approach commonly used text classification naive bayes classifiers work correlating use tokens typically words sometimes things spam non-spam e-mails using bayes theorem calculate probability email spam naive bayes spam filtering baseline technique dealing spam tailor email needs individual users give low false positive spam detection rates generally acceptable users one oldest ways spam filtering roots 1990s bayesian algorithms used sort filter email 1996 although naive bayesian filters become popular later multiple programs released 1998 address growing problem unwanted email first scholarly publication bayesian spam filtering sahami et al 1998 work soon thereafter deployed commercial spam filters however 2002 paul graham greatly decreased false positive rate could used single spam filter variants basic technique implemented number research works commercial software products many modern mail clients implement bayesian spam filtering users also install separate email filtering programs server-side email filters dspam spamassassin spambayes bogofilter assp make use bayesian spam filtering techniques functionality sometimes embedded within mail server software crm114 oft cited bayesian filter intended use bayes filter production includes ″unigram″ feature reference particular words particular probabilities occurring spam email legitimate email instance email users frequently encounter word viagra spam email seldom see email filter n't know probabilities advance must first trained build train filter user must manually indicate whether new email spam words training email filter adjust probabilities word appear spam legitimate email database instance bayesian spam filters typically learned high spam probability words viagra refinance low spam probability words seen legitimate email names friends family members training word probabilities also known likelihood functions used compute probability email particular set words belongs either category word email contributes email spam probability interesting words contribution called posterior probability computed using bayes theorem email spam probability computed words email total exceeds certain threshold say 95 filter mark email spam spam filtering technique email marked spam automatically moved junk email folder even deleted outright software implement quarantine mechanisms define time frame user allowed review software decision initial training usually refined wrong judgements software identified false positives false negatives allows software dynamically adapt ever-evolving nature spam spam filters combine results bayesian spam filtering heuristics pre-defined rules contents looking message envelope etc resulting even higher filtering accuracy sometimes cost adaptiveness bayesian email filters utilize bayes theorem bayes theorem used several times context spam let suppose suspected message contains word replica people used receiving e-mail know message likely spam precisely proposal sell counterfeit copies well-known brands watches spam detection software however know facts compute probabilities formula used software determine derived bayes theorem statistics show current probability message spam 80 least however bayesian spam detection software makes assumption priori reason incoming message spam rather ham considers cases equal probabilities 50 filters use hypothesis said biased meaning prejudice regarding incoming email assumption permits simplifying general formula functionally equivalent asking percentage occurrences word replica appear spam messages quantity called spamicity spaminess word replica computed number formula_4 used formula approximated frequency messages containing replica messages identified spam learning phase similarly formula_6 approximated frequency messages containing replica messages identified ham learning phase approximations make sense set learned messages needs big representative enough also advisable learned set messages conforms 50 hypothesis repartition spam ham i.e datasets spam ham size course determining whether message spam ham based presence word replica error-prone bayesian spam software tries consider several words combine spamicities determine message overall probability spam bayesian spam filtering algorithms based formulas strictly valid probabilistic standpoint words present message independent events condition generally satisfied example natural languages like english probability finding adjective affected probability noun useful idealization especially since statistical correlations individual words usually known basis one derive following formula bayes theorem formula referenced paul graham 2002 article early commentators stated graham pulled formulas thin air graham actually referenced source included detailed explanation formula idealizations based spam filtering software based formula sometimes referred naive bayes classifier naive refers strong independence assumptions features result p typically compared given threshold decide whether message spam p lower threshold message considered likely ham otherwise considered likely spam usually p directly computed using formula due floating-point underflow instead p computed log domain rewriting original equation follows taking logs sides let formula_22 therefore hence alternate formula computing combined probability case word never met learning phase numerator denominator equal zero general formula spamicity formula software decide discard words information available generally words encountered times learning phase cause problem would error trust blindly information provide simple solution simply avoid taking unreliable words account well applying bayes theorem assuming classification spam ham emails containing given word replica random variable beta distribution programs decide use corrected probability corrected probability used instead spamicity combining formula formula_3 taken equal 0.5 avoid suspicious incoming email 3 good value meaning learned corpus must contain 3 messages word put confidence spamicity value default value formula extended case n equal zero spamicity defined evaluates case formula_32 neutral words like english equivalents languages ignored generally bayesian filtering filters simply ignore words spamicity next 0.5 contribute little good decision words taken consideration whose spamicity next 0.0 distinctive signs legitimate messages next 1.0 distinctive signs spam method example keep ten words examined message greatest absolute value |0.5 − pi software products take account fact given word appears several times examined message others n't software products use patterns sequences words instead isolated natural languages words example context window four words compute spamicity viagra good instead computing spamicities viagra good method gives sensitivity context eliminates bayesian noise better expense bigger database ways combining individual probabilities different words using naive approach methods differ assumptions make statistical properties input data different hypotheses result radically different formulas combining individual probabilities example assuming individual probabilities follow chi-squared distribution 2 n degrees freedom one could use formula c inverse chi-squared function individual probabilities combined techniques markovian discrimination one main advantages bayesian spam filtering trained per-user basis spam user receives often related online user activities example user may subscribed online newsletter user considers spam online newsletter likely contain words common newsletters name newsletter originating email address bayesian spam filter eventually assign higher probability based user specific patterns legitimate e-mails user receives tend different example corporate environment company name names clients customers mentioned often filter assign lower spam probability emails containing names word probabilities unique user evolve time corrective training whenever filter incorrectly classifies email result bayesian spam filtering accuracy training often superior pre-defined rules perform particularly well avoiding false positives legitimate email incorrectly classified spam example email contains word nigeria frequently used advance fee fraud spam pre-defined rules filter might reject outright bayesian filter would mark word nigeria probable spam word would take account important words usually indicate legitimate e-mail example name spouse may strongly indicate e-mail spam could overcome use word nigeria depending implementation bayesian spam filtering may susceptible bayesian poisoning technique used spammers attempt degrade effectiveness spam filters rely bayesian filtering spammer practicing bayesian poisoning send emails large amounts legitimate text gathered legitimate news literary sources spammer tactics include insertion random innocuous words normally associated spam thereby decreasing email spam score making likely slip past bayesian spam filter however example paul graham scheme significant probabilities used padding text non-spam-related words affect detection probability significantly words normally appear large quantities spam may also transformed spammers example « viagra » would replaced « viaagra » « v agra » spam message recipient message still read changed words words met rarely bayesian filter hinders learning process general rule spamming technique work well derived words end recognized filter like normal ones another technique used try defeat bayesian spam filters replace text pictures either directly included linked whole text message part replaced picture text drawn spam filter usually unable analyze picture would contain sensitive words like « viagra » however since many mail clients disable display linked pictures security reasons spammer sending links distant pictures might reach fewer targets also picture size bytes bigger equivalent text size spammer needs bandwidth send messages directly including pictures filters inclined decide message spam mostly graphical contents solution used google gmail email system perform ocr optical character recognition every mid large size image analyzing text inside bayesian filtering used widely identify spam email technique classify cluster almost sort data uses science medicine engineering one example general purpose classification program called autoclass originally used classify stars according spectral characteristics otherwise subtle notice | [
6274,
1667,
9222,
3336,
4105,
4490,
8202,
7949,
914,
5012,
10263,
1305,
11418,
412,
8093,
8224,
10275,
4272,
2101,
9792,
11330,
4294,
3145,
1098,
6094,
7763,
7764,
1495,
3032,
9053,
5857,
4325,
6762,
1771,
1899,
1653,
1529
] | Test |
8,748 | 0 | ROUGE_(metric):rouge metric rouge recall-oriented understudy gisting evaluation set metrics software package used evaluating automatic summarization machine translation software natural language processing metrics compare automatically produced summary translation reference set references human-produced summary translation following five evaluation metrics available | [
7780,
7164,
5197
] | Test |
8,749 | 9 | Novius_OS:novius os novius os content management system cms open source affero general public license v3 designed multi-channel internet create publish everywhere published novius company since 2011 novius os project launched company novius december 2011 publishing company since 2004 proprietary cms publi-nova decided embark open-source create new cms designed multi-channel internet novius os distributed gnu agpl v3 license uses latest web technologies based framework fuelphp side interface uses html5 jquery ui wijmo tinymce plugins like android versions named dessert major novius os versions listed alphabetical order named city first stable version os novius launched september 2012 version 0.1 renamed amsterdam posteriori version included expected standard elements cms publishing pages blog entries creating users managing permissions first notable features novius os specific business applications library multi-language system tabbed browsing makes multitasking cms version 0.2 launched february 2013 also known posteriori berlin version brings new cms applications forms management slide application create app allows developers easily quickly create novius os application database ui etc.. also notes emergence multi-context managing multiple sites multiple languages – single back office chiba version launched april 2013 tribute work done japanese community fully reflects novius os japanese version advanced rights system implemented planning publications cache cms also improved novius os contest bar camp exhibiting www2012 international gathering around future challenges web originally created robert cailliau co-founder tim berners-lee web week novius os presented several personalities giving first echo project novius os also present cms day 2012 2013 european rally around open source cms novius os available github runs lamp stack written php 5.3 mvc architecture uses framework fuelphp interfaces using html5 jquery ui wijmo library novius os built application system image object-oriented programming application may extended others customized extended additional features application different components launchers enhancers templates data catchers allow flow data applications also outside addition native applications provided novius os e.g collections web pages possible create specific business applications using wizard create app wizard allows quickly easily generate basis new application models fields group fields app desk launchers enhancers url etc.. | [
8644
] | Test |
8,750 | 4 | Perry_Fellwock:perry fellwock perry fellwock born 1947 former national security agency nsa analyst whistleblower revealed existence nsa worldwide covert surveillance network interview using pseudonym winslow peck ramparts 1971 time fellwock blew whistle echelon nsa nearly unknown organization among secretive us intelligence agencies fellwock revealed significantly larger budget central intelligence agency cia fellwock motivated daniel ellsberg release pentagon papers today fellwock acknowledged first nsa whistleblower echelon name popularly given signals intelligence sigint collection analysis network operated behalf five signatory states called five eyes fvey ukusa security agreement according information european parliament document existence global system interception private commercial communications echelon interception system echelon ostensibly created monitor military diplomatic communications soviet union eastern bloc allies cold war early 1960s fellwock revelations u.s. senate united states senate select committee study governmental operations respect intelligence activities church committee chaired frank church introduced successful legislation 1973 stop nsa spying american citizens speaking echelon frank church said ... hat capability time could turned around american people american would privacy left capability monitor everything telephone conversations telegrams n't matter would place hide government ever became tyranny dictator ever took charge country technological capacity intelligence community given government could enable impose total tyranny would way fight back careful effort combine together resistance government matter privately done within reach government know capability technology ... n't want see country ever go across bridge know capacity make tyranny total america must see agency agencies possess technology operate within law proper supervision never cross abyss abyss return church committee hearings congressional hearings abuses nixon administration committee chaired sam ervin helped lead passage foreign intelligence surveillance act fisa 1978 fisa prescribes procedures physical electronic surveillance collection foreign intelligence information foreign powers agents foreign powers may include american citizens permanent residents suspected espionage terrorism 1978 september 11 attacks law amended enabling president george w. bush expand warrantless surveillance american citizens | [
8356,
3495,
6344,
7887,
208,
4595,
7893,
4118,
2558
] | None |
8,751 | 7 | Middleware_(distributed_applications):middleware distributed applications middleware context distributed applications software provides services beyond provided operating system enable various components distributed system communicate manage data middleware supports simplifies complex distributed applications includes web servers application servers messaging similar tools support application development delivery middleware especially integral modern information technology based xml soap web services service-oriented architecture middleware often enables interoperability applications run different operating systems supplying services application exchange data standards-based way middleware sits middle application software may working different operating systems similar middle layer three-tier single system architecture except stretched across multiple systems applications examples include eai software telecommunications software transaction monitors messaging-and-queueing software distinction operating system middleware functionality extent arbitrary core kernel functionality provided operating system functionality previously provided separately sold middleware integrated operating systems typical example tcp/ip stack telecommunications nowadays included virtually every operating system software provides link separate software applications middleware sometimes called plumbing connects two applications passes data middleware allows data contained one database accessed another definition would fit enterprise application integration data integration software objectweb defines middleware software layer lies operating system applications side distributed computing system network middleware relatively new addition computing landscape gained popularity 1980s solution problem link newer applications older legacy systems although term use since 1968 also facilitated distributed processing connection multiple applications create larger application usually network middleware services provide functional set application programming interfaces allow application compared operating system network services middleware offers unique technological advantages business industry example traditional database systems usually deployed closed environments users access system via restricted network intranet e.g. enterprise ’ internal network phenomenal growth world wide web users access virtually database proper access rights anywhere world middleware addresses problem varying levels interoperability among different database structures middleware facilitates transparent access legacy database management systems dbmss applications via web server without regard database-specific characteristics businesses frequently use middleware applications link information departmental databases payroll sales accounting databases housed multiple geographic locations highly competitive healthcare community laboratories make extensive use middleware applications data mining laboratory information system lis backup combine systems hospital mergers middleware helps bridge gap separate liss newly formed healthcare network following hospital buyout middleware help software developers avoid write application programming interfaces api every control program serving independent programming interface applications future internet network operation traffic monitoring multi-domain scenarios using mediator tools middleware powerful help since allow operators searchers service providers supervise quality service analyse eventual failures telecommunication services finally e-commerce uses middleware assist handling rapid secure transactions many different types computer environments short middleware become critical element across broad range industries thanks ability bring together resources across dissimilar networks computing platforms 2004 members european broadcasting union ebu carried study middleware respect system integration broadcast environments involved system design engineering experts 10 major european broadcasters working 12-month period understand effect predominantly software-based products media production broadcasting system design techniques resulting reports tech 3300 tech 3300s published freely available ebu web site message-oriented middleware mom middleware transactions event notifications delivered disparate systems components way messages often via enterprise messaging system mom messages sent client collected stored acted upon client continues processing intelligent middleware imw provides real-time intelligence event management intelligent agents imw manages real-time processing high volume sensor signals turns signals intelligent actionable business information actionable information delivered end-user power dashboards individual users pushed systems within outside enterprise able support various heterogeneous types hardware software provides api interfacing external systems highly scalable distributed architecture embeds intelligence throughout network transform raw data systematically actionable relevant knowledge also packaged tools view manage operations build advanced network applications effectively content-centric middleware offers simple provider-consumer abstraction applications issue requests uniquely identified content without worrying obtained juno one example allows applications generate content requests associated high-level delivery requirements middleware adapts underlying delivery access content sources best suited matching requirements therefore similar publish/subscribe middleware well content-centric networking paradigm sources include additional classifications ibm red hat oracle corporation microsoft vendors provide middleware software vendors axway sap tibco informatica objective interface systems pervasive scaleout software webmethods specifically founded provide niche middleware solutions groups apache software foundation opensaf objectweb consortium ow2 oasis amqp encourage development open source middleware microsoft .net framework architecture essentially middleware typical middleware functions distributed various products inter-computer interaction industry standards open apis rand software licence solace provides middleware purpose-built hardware implementations may experience scale stormmq provides message oriented middleware service | [
1280,
2948,
7175,
3848,
9225,
4107,
10134,
11673,
7076,
8100,
10020,
7983,
8122,
9665,
11339,
11596,
2901,
5210,
479,
225,
9441,
9455,
6897,
10486,
119,
2168,
6522,
3323,
10236
] | Test |
8,752 | 4 | National_Cyber_Security_Alliance:national cyber security alliance national cyber security alliance ncsa 501c 3 non-profit founded 2001 public private partnership working department homeland security dhs private sector sponsors founding sponsors included symantec cisco systems microsoft saic emc mcafee nonprofit collaborators promote cyber security awareness home users small medium size businesses primary secondary education national cyber security awareness month project ncsa us government stop think connect campaign broader public cyber security awareness anti-phishing working group department homeland security also involved facebook became member ncsa 2011 cisco systems joined ncsa board directors 2016 cisco represented anthony grieco leads company trust strategy office | [
704,
9569,
7084,
877,
6834
] | Test |
8,753 | 4 | Personal_firewall:personal firewall personal firewall application controls network traffic computer permitting denying communications based security policy typically works application layer firewall personal firewall differs conventional firewall terms scale personal firewall usually protect computer installed compared conventional firewall normally installed designated interface two networks router proxy server hence personal firewalls allow security policy defined individual computers whereas conventional firewall controls policy networks connects per-computer scope personal firewalls useful protect machines moved across different networks example laptop computer may used trusted intranet workplace minimal protection needed conventional firewall already place services require open ports file printer sharing useful laptop could used public wi-fi hotspots time decide level trust set individual security policies network unlike network firewalls many personal firewalls able control network traffic allowed programs secured computer application attempts outbound connection firewall may block blacklisted ask user whether blacklist yet known protects malware implemented executable program personal firewalls may also provide level intrusion detection allowing software terminate block connectivity suspects intrusion attempted common personal firewall features firewalls help protecting internal network hackers however firewall limitations mid 1990s part information security architecture project fortune 100 corporation united states anheuser-busch corporation one members three-man architectural development team came concept regards improving overall security operating system used computers within networked system network system referred budnet improving overall security operating system commonly referred os hardening member team charged ssgt donald r. woeltje jr. concept came installation special software firewall software every budnet server workstation perimeter security device indeed every single windows system budnet network concept commonly referred personal firewall software ssgt woeltje invent personal firewall software invent idea personal firewall evidence fact exists anheuser-busch security model proposal document made ssgt woeltje time ssgt woeltje brought leading firewall vendors meetings concerning products considered use perimeter security budnet network ssgt woeltje brought concept personal firewall vendors asked firewall product could used way exception representatives cyberguard corporation every vendor said firewall software could used way also said idea crazy unworkable today know wrong use personal firewall software become de facto computer security standard companies ssgt woeltje discussed personal firewall software among others cisco checkpoint axent technologies milkyway networks cyberguard network one trusted information systems secure computing corporation | [
1792,
2049,
4480,
2563,
1417,
1163,
3981,
6797,
9488,
7955,
1172,
8724,
9496,
10392,
3482,
1436,
4511,
6431,
6560,
10531,
5924,
2213,
550,
8998,
10790,
939,
1708,
3243,
3885,
823,
569,
5178,
6586,
11577,
2749,
9279,
5057,
1858,
10433,
224... | Validation |
8,754 | 2 | IOS_11:ios 11 ios 11 eleventh major release ios mobile operating system developed apple inc. successor ios 10 announced company worldwide developers conference june 5 2017 released september 19 2017 succeeded ios 12 september 17 2018 among ios 11 changes lock screen notification center combined allowing notifications displayed directly lock screen various pages control center unified gaining custom settings ability 3d touch icons options app store received visual overhaul focus editorial content daily highlights files file manager app allowed direct access files stored locally cloud services siri updated translate languages use privacy-minded on-device learning technique better understand user interests offer suggestions camera new settings improved portrait-mode photos utilised new encoding technologies reduce file sizes newer devices later release messages integrated icloud better synchronize messages across ios macos devices previous point release also added support person-to-person apple pay payments operating system also introduced ability record screen limited forms drag-and-drop functionality support augmented reality certain new features appeared ipad including always-accessible application dock cross-app drag-and-drop new user interface show multiple apps ios 11 received mixed reviews critics significantly praised application dock new multitasking interface ipad crediting renewing user experience praise directed redesigned control center offering customizable toggles though criticized lack third-party app support lack wi-fi network selection ability difficult usage small screen sizes along instability critics also noted new augmented reality development tools said impact would depend third-party apps fast developers embraced praise also directed app store redesign new file-management tools shortly release discovered disabling wi-fi bluetooth connections control center disable respective chips device order remain functional background connectivity design decision sparking criticism misleading users reducing security due potential vulnerabilities inactive open connections ios 11.2 update added warning messages new toggle color explain new functions ios 11 also received continuous criticism critics end-users perceived stability performance issues particularly older devices apple issued numerous software updates address issues dedicated ios 12 mainly toward stability performance improvements response two months release 52 ios devices running ios 11 slower adoption rate previous ios versions number increased 85 devices september 2018 june 4 2018 worldwide developers conference apple announced successor ios 12. ios 11 introduced apple worldwide developers conference keynote address june 5 2017 first developer beta version released keynote presentation first public beta released june 26 2017. ios 11 officially released september 19 2017. ios 11.0.1 released september 26 2017 first update ios 11 update contained bug fixes improvements including fix bug prevented emails sent exchange servers ios 11.0.2 released october 3 2017 mainly fixed crackling earpiece issue affected iphone 8 8 plus units ios 11.0.3 released october 11 2017 fixed issue audio haptic feedback iphone 7 7 plus issue iphone 6s touch input unresponsive device display serviced non-genuine apple parts ios 11.1 released october 31 2017 added 70 new emoji fixed krack wi-fi vulnerability reintroduced 3d touch multitasking gesture incorporated bug fixes ios 11.1.1 released november 9 2017 fixed keyboard autocorrect bug hey siri malfunction ios 11.1.2 released november 16 2017 fixed display issue iphone x screen would become unresponsive due rapid temperature drop well fixing issue distortion live photos videos captured iphone x. ios 11.2 released december 2 2017 added apple pay cash enabled faster 7.5w wireless charging introduced new live wallpapers iphone x two new pop-ups added explain new functionality wi-fi bluetooth control center toggles app store allows user pre-order app yet available app available app automatically downloaded tv app includes sports section update also included bug fixes calculator bug i.t autocorrect bug december 2 crash bug ios 11.2.1 released december 13 2017 update fixed remote access homekit devices following major security glitch also fixed camera autofocus iphone 8 8 plus x devices ios 11.2.2 released january 8 2018 update made changes safari webkit mitigate effects spectre attack ios 11.2.5 released january 23 2018 update fixed bugs added support homepod allows siri read news articles works us uk australia ios 11.2.6 released february 19 2018 update fixed bug caused applications crash processing particular character telugu script ios 11.3 released march 29 2018 update introduced battery health feature allows user disable performance throttling using older battery reveals issues iphone 6s battery recall ios 11.3 introduces new privacy icon displays whenever app using personal data update also includes arkit 1.5 gives better accuracy non-flat surfaces allows developers place objects vertical surfaces update adds new skeleton lion dragon bear animoji new health records feature allows patients view health records iphone available certain institutions new business chat feature allows customers interact certain business right messages app including customer support apple pay support added advanced mobile location supported countries ios 11.3.1 released april 24 2018 update improves security addresses issue touch input unresponsive iphone 8 devices serviced non-genuine displays ios 11.4 released may 29 2018 messages stored icloud airplay 2 brings support multi-room homepod speakers apple tv homepod stereo speaker pair pairs homepod syncing updating latest version command siri play song room ios 11.4.1 released july 9 2018 fixes issue prevented users viewing last known location airpods find phone app improves reliability syncing mail contacts notes exchange accounts lock screen notification center combined allowing users see notifications directly lock screen scrolling either show hide notifications control center redesign unifies pages allows users 3d touch long press devices without 3d touch buttons options sliders adjust volume brightness control center customizable via settings app allows settings shown including cellular service low power mode shortcut notes app siri intelligent personal assistant human voice supports language translation english chinese french german italian spanish available launch also support follow-up questions users users also able type siri siri able use on-device learning privacy-minded local learning technique understand user behavior interests inside different apps offer better suggestions recommendations new disturb driving mode lets users block unnecessary notifications long iphone connected vehicle bluetooth auto-reply feature sends specific reply senders messages let know user currently unavailable text passengers granted full notification access phone new smart invert feature dubbed dark mode publications inverts colors display except images apps user interface elements using iphone x utilizes oled technology news outlets reported feature conserve battery life turning pixels black saving energy preventing displaying white pixel users get expanded control apps location usage every app featuring using app location toggle settings differs previous ios versions apps required never always location options users remove rarely-used apps without losing app data using offload app button allows later reinstallation app available app store data returns usage continue users also apps removed automatically offload unused apps setting app offloaded app appears home screen grayed-out icon personalized suggestions help user free storage space device including emptying photos trash backing messages enabling icloud photo library backing photos videos certain new ios 11 features appear ipad application dock gets overhaul bringing closer design seen macos accessible screen letting users easily open apps split-screen view users also drag-and-drop files across different apps new multitasking interface shows multiple apps screen time floating windows additionally combination slide split view picture-in-picture modes users four active apps on-screen time letter ipad keyboard features alternative background number symbol accessible pulling respective key releasing control center visible multitasking window ipads running ios 11 9.7-inch 10.5-inch 2nd-generation 12.9-inch ipad pros flashlight support ios 11 introduces optical image stabilization flash photography high dynamic range portrait photos live photos receives new loop bounce long exposure effects uses high efficiency image file format decrease photo sizes devices apple a10 chip newer photos compressed new high efficiency image file format videos encoded new high efficiency video coding video compression format enabling improved quality also decreasing size half apple significantly changed wallpapers available use ios 11 initial beta version released apple developer conference apple included one new wallpaper removed six live animated fish wallpapers introduced iphone 6s 2015 ios 11.2 release later brought iphone x/8/8 plus-exclusive wallpapers older iphones iphone x exclusively features six live wallpapers seven new dynamic wallpapers ios 11 introduces native support qr code scanning camera app qr code positioned front camera notification created offering suggestions actions based scanned content twitter users far discovered joining wi-fi networks adding someone contacts list supported qr codes third-party keyboards add one-handed mode users able record screen natively order record screen users must first add feature control center settings app added users start stop recordings dedicated control center icon distinctly colored bar appearing top screen indicating active recording pressing bar gives option end recording videos saved photos app ios 11 device attempting connect wi-fi network nearby ios 11 macos high sierra devices already connected wirelessly send password streamlining connection process volume change overlay longer covers screen playing video smaller scrubber appears top right screen user takes screenshot thumbnail screenshot appear bottom left screen user tap thumbnail bring interface allows crop annotate delete screenshot third-party apps also able take advantage icloud keychain allow autofilling passwords user airline flight information viewed spotlight dedicated widget ios 11 switches top-left cellular network strength icons five dots four signal bars similar ios 7 new automatic setup feature aims simplify first-time setup new devices wireless transfer old new device transferring preferences apple id wi-fi info preferred settings icloud keychain passwords similar ipad drag-and-drop file support available iphone though limitations specifically supported within apps many apple pre-installed applications including notes contacts reminders maps app store redesigned home screen icons emergency sos feature added disables touch id pressing sleep/wake button five times quick succession prevents touch id working iphone passcode entered ios 11 adds support 8-bit 10-bit hevc devices apple a9 chip newer support hardware decoding older devices support software-based decoding empty space mail app users draw inline messages application synchronizes messages across ios macos icloud reflecting message deletion across devices feature temporarily removed fifth beta release returned may 29 2018 ios 11.4 released time ios 11 announcement june 2017 apple presented functionality letting users send person-to-person payments apple pay messages time ios 11 release september 2017 feature present removed earlier beta version apple announcing feature coming fall update ios 11 launched days ios 11.2 update went live although initially available united states new app drawer imessage apps aims simplify experience using apps stickers optimized storage system reduces backup size messages messages app also incorporates business chat feature businesses communicate directly customers app accessed message icon next search results businesses however feature included initial release ios 11 instead launching ios 11.3 messages app iphone x introduces face-tracking emoji called animoji animated emoji using face id app store receives complete redesign greater focus editorial content daily highlights design described cleaner consistent apps developed apple app design mimics design seen apple music app ios 10 select locations apple maps offer indoor maps shopping malls airports new lane guidance speed limit features aim guide drivers unfamiliar roads photos app ios 11 gains support viewing animated gifs users access gif images inside album titled animated memories viewed phone portrait orientation podcasts app receives redesign similar app store focus editorial content notes app built-in document scanner using device camera feature removes artifacts glare perspective instant notes feature ipad pro allows user start writing note lock screen putting apple pencil onto screen app also allows users input inline tables open space notes app user draw inline new files app lets users browse files stored device well stored across various cloud services including icloud drive dropbox onedrive google drive app supports organization structured sub-folders various file-based options files app also includes built-in player flac audio files files app available ipad iphone user flight information found safari app calculator app receives redesign rounded buttons replacing grid ones seen ios 7 new arkit application programming interface api lets third-party developers build augmented reality apps taking advantage device camera cpu gpu motion sensors arkit functionality available users devices apple a9 later processors according apple processors deliver breakthrough performance enables fast scene understanding lets build detailed compelling virtual content top real-world scenes new core ml software framework speed app tasks involving artificial intelligence image recognition new depth api allows third-party camera app developers take advantage iphone 7 plus iphone 8 plus iphone x dual-camera portrait mode let apps implement depth-sensing technology available default ios camera app simulate shallow depth-of-field new core nfc framework gives developers limited access near field communication nfc chip inside supported iphones opening potential use cases apps scan nearby environments give users information apps must compiled 64-bit architecture order supported ios 11 32-bit apps supported shown app store ios 11 users attempt open apps receive alert app incompatibility ios 11 drops native system integration twitter facebook flickr vimeo icloud drive app removed replaced files app ability trigger multitasking using 3d touch removed original ios 11 release response bug report apple engineer wrote please know feature intentionally removed apple software engineering chief craig federighi wrote reply email company temporarily drop support due technical constraint pledging bring back future update ios 11 brought back ios 11.1 ios 11.2 toggle switch wi-fi bluetooth unexpectedly changed completely turning two things temporarily next day real turn settings app dieter bohn verge liked new control center setup including customizable toggles 3d touch-expandable options writing panels 'm really impressed specifically highlighting apple tv remote possible replacement normal remote however note lack third-party access control center hope support future lack wi-fi network selection ability praised screen-recording functionality calling super neat bohn severely criticized notifications view writing serious disagreement apple manage elaborating prefers use screen much possible stating apple philosophy 'm trying way hard control speedy notifications bohn liked new files app new drag-and-drop functionality home screen enabling users drag multiple apps significantly praised multitasking ipad writing multitasking ipad near-revelatory experience enjoyed application dock ability place three apps screen freedom placement bohn conceded intuitive simple easy manipulate traditional windowing system like 'll get mac pc chromebook still praised radically powerful ever available ipad finally bohn praised siri improvements voice highlighted augmented reality allowing incredible games reiterated earlier sentiment ios 11 ambitious software update apple long time macworld jason snell wrote hype surrounding ios 11 justified snell praised new smoother transfer mode data settings old iphone new iphone referring previous experience manually frustrating exercise entering passwords repeatedly tapping long series questions activating deactivating numerous ios features also praised control center design calling great upgrade though also highlighting inability easily switch wi-fi networks snell noted app store design unchanged years received full redesign ios 11 wrote apple commitment editorial pages impressive making app store richer fun experience regarding introduction augmented reality stated apps using bad though also mind-blowingly good adding huge potential depended third-party apps using snell also praised improvements ipad experience including multitasking drag-and-drop across apps latter stated actually surpasses expectations due ease use review summarization states ios 11 apple ’ ambitious impressive upgrade years romain dillet techcrunch focused mostly ipad review writing ios 11 turns ipad completely different machine much efficient multitasking improved ease access application dock also praised design overhaul app store calling huge improvement compared previous app store also highlighted design changes apps including huge bold header name app section although acknowledged many tech friends told hate change dillet stated think people like ’ visually pleasing distinctive stated augmented reality become relevant days following ios 11 release third-party developers incorporate features apps praised apple creating arkit development tools makes much easier implement augmented reality features conclusion dillet wrote ten years ago ios started constrained operating system one biggest digital playgrounds devindra hardawar engadget stated focus ios 11 transforming ios something desktop-like many enhancements ipad leaving iphone bit behind mixed feelings control center writing small phone screen sizes feels like jumbled mess adding true comfort may present larger screens troubling situation owners non-plus devices however praised ability customize buttons including removing user never uses ability quickly record screen enable accessibility features called new app designs attractive favorably pointed new app drawer bottom conversations messages app referring big improvement messy interface last year praised siri improved voice photos app creating better memories new social features apple music though noting lack people social circle using service referencing ikea ikea place app uses augmented reality virtually place objects room significantly praised performance augmented reality technology iphone writing great job rendering furniture physical spaces using iphone 8 even impressively ran smoothly iphone 6s finally hardawar also enjoyed new functionality ipad calling multitasking application dock drag-and-drop dramatic changes highlighting particularly useful experience dragging internet content directly web new files app summarization recognized significant strides made ipad ios 11 writing shame ios 11 n't bring table iphone though acknowledging rise augmented reality november 2017 apple app store support page updated reflect 52 ios devices running ios 11 slower migration rate release ios 10 year prior saw 60 user adoption october 2016 number increased 59 devices december 2017 september 2017 jesus diaz fast company criticized design details ios 11 apple built-in apps adhering apple user interface guidelines headers aligned properly different apps elements centered different colors sizing caused diaz write comes software apple ’ attention detail crumbling away however also looked back history mentioning apple music original design lack optical typography alignment calendar app previously-fixed ios design mistakes ported macos software established inconsistency lack attention detail new apple firmly stated perhaps inevitable given monumental task update operating system every year company claims obsessive attention detail acceptable november 2017 gizmodo adam clark estes wrote extensively software bugs product imperfections experienced using ios 11 estes pointed issues keyboard covering messages disappearing reply field messages app letter converting unicode symbol screen becoming unresponsive writing new operating system turned phone bug-infested carcass former self frustration trying use sometimes makes want die also wrote aspect technology becoming advanced sophisticated explaining back iphone 4 came ... smartphones lot simpler cameras joyfully crappy screens small number apps could download things could connect paltry compared today ... expect bugs guess complex pieces technology contain points failure ’ oversimplifying issue concluded theorizing technological development writing however trying understand exactly life computers veered dramatically days windows 95 nothing worked right golden age iphone 4 everything seemed perfect handful ios bugs make feel like world falling apart ... maybe ’ annoying thing whiny one ’ upset nothing seems perfect maybe maybe apple slipping wrong trust along shortly ios 11 released vice motherboard discovered new behaviors wi-fi bluetooth toggles control center users tap turn features ios 11 disconnects chips active connections disable respective chips device report states feature bug referencing documentation pages apple confirming new toggle behaviors means disconnect connections remain active airdrop transfers airplay streaming apple pencil input handoff features security researcher andrea barisani told motherboard new user interface obvious making user experience uncomfortable october 2017 electronic frontier foundation published article calling interface misleading bad user security due higher risk security vulnerabilities wi-fi bluetooth chips activated active use foundation recommended apple fix loophole connectivity writing simply question communicating better users giving control clarity want settings off-ish ios 11.2 changes behavior slightly turning toggles white showing warning message explains functions toggles control center toggles turned users experienced battery drain problems updating ios 11 poll website 70 9to5mac visitors reported decreased battery life updating new operating system however article featuring twitter complaints battery life daily express wrote honestly expected happens every year completely normal major ios releases hammer battery device much faster first days use forbes stating article days install new version ios idevice busy sorts housekeeping practically apps updates ios busy downloading installing background ... additionally install new version ios something called re-indexing process ios 11 comb data device cataloged quick spotlight searching article states good news things temporary within week launch 11.3.1 update users began reporting continued issues update regarding battery drainage reports indicated drains 57 3 3 minutes even users health battery measuring 96 noticed iphones draining around 1 per minute addition battery drains iphone users noticed devices excessive heat buildup recommended technology experts users upgrade software release version subsequent 11.3.1 unless specifically plagued 'third party display issue october 2017 users reported reddit quickly typing equation built-in ios calculator app gives incorrect answers notably making query 1+2+3 result 24 rather 6 analysts blamed animation lag caused redesign app ios 11 problem worked around typing numbers slowly downloading alternative calculator apps app store problem large amount bug reports filed apple employee chris espinosa indicated twitter company aware issue ios 11.2 fixed issue november 2017 users reported bug default ios keyboard pressing resulted system rendering text along incomprehensible symbol featuring question mark box symbol known variation selector 16 intended purpose merging two characters emoji apple acknowledged issue support document advising users set text replacement feature device keyboard settings temporary workaround company confirmed wall street journal devices using older ios 11 versions opposed latest 11.1 version time publication affected issue apple spokesperson announced fix released soon ios 11.1.1 released november 9 2017 fixing issue end month another keyboard autocorrection bug reported time replacing word i.t macrumors suggested users set text replacement feature way earlier autocorrection issue though report notes users insist solution solve problem fixed release ios 11.2 early december users wrote twitter reddit exactly 12:15 a.m. local time december 2 app store app sends local notifications would cause device repeatedly restart reddit users reported disabling notifications turning background app refresh would stop issue apple staff twitter reported bug date handling recommending users manually set date prior december 2 macrumors wrote issue looks like limited devices running ios 11.1.2 users 11.2 beta release affected ios 11.2 released day fixed issue december 2017 9to5mac uncovered security vulnerability ios 11.2 within apple homekit smart home system allowing unauthorized access smart locks garage door openers noted apple already issued server-side fix preventing unauthorized access also limited homekit functionality upcoming software fix ios operating system intended restore lost functionality december 13 apple released ios 11.2.1 fixed limitation remote access ios 11 drops support devices 32-bit processor specifically iphone 5 iphone 5c fourth-generation ipad first version ios run exclusively ios devices 64-bit processors | [
10755,
5636,
9732,
1549,
4111,
4623,
5647,
7697,
6675,
11289,
6186,
4139,
6700,
1074,
8754,
9784,
5181,
8253,
8767,
576,
5696,
8774,
1608,
8783,
4180,
10838,
1623,
3672,
9308,
3167,
3681,
9826,
8806,
3691,
1134,
8304,
2673,
7292,
2686,
67... | None |
8,755 | 4 | Von_Duprin:von duprin von duprin brand security products producer first panic bar style door mechanism allows door public building locked outside still easy exit inside 1903 iroquois theatre fire chicago claimed lives almost 600 people carl prinzler supposed attend show theatre fateful day however business dealings called elsewhere era common theatres like lock interior exterior doors prevent non-paying persons entering also inhibited persons inside exiting case iroquois theatre fire doors locked and/or bolted prevented patrons exiting causing burned alive succumb smoke inhalation prinzler astounded enormous senseless loss life night sought way doors public facilities locked outside allow egress inside minimal effort emergency prinzler tapped architectural engineering abilities henry h. dupont develop product 1908 first model panic bar style egress device released vonnegut hardware company utilized market owing joint effort develop sell product sold name von duprin combination names vonnegut dupont prinzler popular 88 series crossbar exit devices still manufactured von duprin look similar original design although significant engineering changes made von duprin continues manufacture security related products brand allegion plc | [] | Test |
8,756 | 7 | HP_Business_Service_Automation:hp business service automation hp business service automation collection software products data center automation hp software division hewlett-packard company products could help information technology departments create common enterprise-wide view business service enable automation change compliance across devices make business service connect processes coordinate teams via common workflows integrate monitoring ticketing tools form complete integrated business service management solution hp provides many capabilities part hp business service management software solutions longer competes past practices cost structures competes costs structures cloud computing software service saas providers hosts remain competitive determine retain outsource needs make systems applications perform better efficiently also needs automate applications systems keep complexity costs line visibility automation management essential regardless underlying infrastructure also allow function best broker services regardless servers may reside efficiencies type integration automation management led rise converged infrastructure environments type data center environment allows enterprises get applications running faster easier manageability less maintenance enables rapidly adjust resources servers storage networking meet fluctuating unpredictable business demand hp business service automation consisted several software products encompassed data center automation client automation runtime visibility control data center hp server automation software automates server lifecycle physical virtual servers automates deployment applications hp application deployment manager adm software automated release process bridge gap among development quality assurance operations teams hp network automation software delivers network change configuration management real-time visibility automation control network compliance security cost savings hp operations orchestration software process automation platform provides single view automating processes hybrid infrastructures including cloud computing environments hp radia client automation software persistent systems automates key processes across pc lifecycle hp storage essentials software standards-based storage resource management software provides visibility applications drilling host storage infrastructure hp database middleware automation software acquisition stratavia automates provisioning patching compliance configuration management heterogeneous databases application servers hp service automation visualizer software presented global interactive picture environment including servers software network devices storage configurations interdependencies hp business service automation bsa essentials provides content infrastructure services users includes portal security updates compliance policy checks content application management profiles bsa essentials reporting reporting engine ad hoc cross-domain analysis compliance reports | [
5384,
4194,
467,
10797
] | Test |
8,757 | 7 | Microsoft_Egypt:microsoft egypt microsoft egypt division microsoft markets microsoft products egypt microsoft established branch egypt 1995 office representative becoming limited liability company 1997 microsoft launched cairo microsoft innovation center september 2007 located smart village near cairo mission work concept-level research problems relatively short market headed tarek el-abbadi long time program manager microsoft redmond office | [
259,
4356,
11524,
6150,
6797,
782,
1935,
10900,
3605,
11030,
3224,
11549,
7838,
7456,
929,
5666,
3875,
7970,
11559,
1832,
6441,
6827,
7215,
3890,
11060,
7359,
4289,
194,
3527,
9033,
6476,
10957,
4816,
4051,
9812,
11221,
11605,
4439,
11103,
... | Test |
8,758 | 5 | Comparison_of_instant_messaging_protocols:comparison instant messaging protocols following comparison instant messaging protocols contains basic general information protocols note 1 part known hostmask either server connected cloak granted server administrator realistic example tilde generally indicates username provided irc client signon verified ident service note 2 part resource distinguishes user logged multiple locations possibly simultaneously realistic example note 3 scalability issue protocol gets increasingly inefficient number contacts note 4 one-to-many/many-to-many communications primarily comprise presence information publish/subscribe groupchat distribution technologies ability distribute data multicast avoiding bottlenecks sending side caused number recipients efficient distribution presence currently however technological scalability issue xmpp sip/simple note 5 reports users antispam filter used censor links im programs websites note 6 serverless protocols n't central entities usually companies controlling network serverless network consists clients systems usually extremely resistant surveillance censorship | [
10242,
5251,
3460,
5382,
11399,
9225,
4746,
8331,
1036,
11408,
3610,
3228,
8735,
10271,
3105,
9511,
1962,
9519,
1467,
6208,
1218,
2373,
6982,
6855,
2760,
1738,
2892,
6098,
3284,
1754,
4318,
3812,
4068,
6628,
9572,
488,
3959,
7928,
10748
] | None |
8,759 | 0 | Language_identification:language identification natural language processing language identification language guessing problem determining natural language given content computational approaches problem view special case text categorization solved various statistical methods several statistical approaches language identification using different techniques classify data one technique compare compressibility text compressibility texts set known languages approach known mutual information based distance measure technique also used empirically construct family trees languages closely correspond trees constructed using historical methods mutual information based distance measure essentially equivalent conventional model-based methods generally considered either novel better simpler techniques another technique described cavnar trenkle 1994 dunning 1994 create language n-gram model training text languages models based characters cavnar trenkle encoded bytes dunning latter language identification character encoding detection integrated piece text needing identified similar model made model compared stored language model likely language one model similar model text needing identified approach problematic input text language model case method may return another similar language result also problematic approach pieces input text composed several languages common web recent method see řehůřek kolkus 2009 method detect multiple languages unstructured piece text works robustly short texts words something n-gram approaches struggle older statistical method grefenstette based prevalence certain function words e.g. english one great bottlenecks language identification systems distinguish closely related languages similar languages like serbian croatian indonesian malay present significant lexical structural overlap making challenging systems discriminate recently dsl shared task organized providing dataset tan et al. 2014 containing 13 different languages language varieties six language groups group bosnian croatian serbian group b indonesian malaysian group c czech slovak group brazilian portuguese european portuguese group e peninsular spain argentine spanish group f american english british english best system reached performance 95 results goutte et al. 2014 results dsl shared task described zampieri et al 2014 | [
5218,
10114,
7780,
1044,
7164
] | None |
8,760 | 4 | Key_distribution_center:key distribution center cryptography key distribution center kdc part cryptosystem intended reduce risks inherent exchanging keys kdcs often operate systems within users may permission use certain services times others instance administrator may established policy certain users may back tape many operating systems control access tape facility via system service system service restricts tape drive operate behalf users submit service-granting ticket wish use remains task distributing tickets appropriately permitted users ticket consists includes key one term mechanism distributes kdc usually situations kdc also operates system service typical operation kdc involves request user use service kdc use cryptographic techniques authenticate requesting users also check whether individual user right access service requested authenticated user meets prescribed conditions kdc issue ticket permitting access kdcs mostly operate symmetric encryption cases kdc shares key parties kdc produces ticket based server key client receives ticket submits appropriate server server verify submitted ticket grant access user submitting security systems using kdcs include kerberos actually kerberos partitions kdc functionality two different agents authentication server tgs ticket granting service | [
5568,
513,
168,
4490,
4874,
7983,
6098,
2932,
1012,
10677
] | None |
8,761 | 3 | Motorola_56000:motorola 56000 motorola dsp56000 also known 56k family digital signal processor dsp chips produced motorola semiconductor later known freescale semiconductor acquired nxp starting 1986 still produced advanced models 2010s 56k series quite popular time number computers including next atari falcon030 sgi indigo workstations using 56001 upgraded 56k versions still used audio equipment radars communications devices like mobile phones various embedded dsp applications 56000 also used basis updated 96000 commercially successful dsp56000 uses fixed-point arithmetic 24-bit program words 24-bit data words includes two 24-bit registers also referred single 48-bit register also includes two 56-bit accumulators 8-bit extension aka headroom otherwise accumulators similar 24/48-bit registers modified harvard architecture processor 56k three memory spaces+buses on-chip memory banks models program memory space/bus two data memory space/bus 24 bits selected basic word length gave system reasonable number range precision processing audio sound 56000 main concern 24 bits correspond large dynamic range sufficient 1980s analog-to-digital converters adcs digital-to-analog converters dacs rarely exceeded 20 bits one example adsl applications filters typically require 20 bits accuracy leftmost four bits considered ample headroom calculations processor capable carrying 16.5 million instructions per second mips maximum specified clock speed hardware support block-floating point fft uses ttl levels consumes approximately designs 56000 dedicated one single task digital signal processing using special hardware mostly real-time allow interruption somewhat mildly demanding tasks time-critical simple if-then type designers normally use separate cpu mcu 56000 execute 1024-point complex fast fourier transform fft takes rate 555 operations per second allowing realtime decoding encoding of/to reasonably advanced audio codecs mp3 direct-to-disc recording purposes addition simd instructions desktop computer cpus meant dedicated dsp chips like 56000 partly retreated application fields continue used widely communications professional uses end 56800 series added complete mcu created single-chip dspcontroller solution opposite occurred 68456—a 68000 56000 still quite prevalent model 56000 third generation 563xx family developed 2000s features several models special applications hard- firmware built-in like pci interface logic crc processors audio companders core clock frequencies ranged | [
7299,
3844,
1029,
1158,
4868,
7302,
7305,
10501,
3467,
1548,
2454,
2073,
7065,
8102,
5297,
11314,
9911,
11447,
6715,
1983,
10945,
3017,
336,
5457,
3540,
3932,
477,
8058,
3936,
7269,
10603,
1776,
3185,
8048,
10224,
7286,
3319,
1530,
8700
] | Test |
8,762 | 1 | Sedna_(database):sedna database sedna open-source database management system provides native storage xml data distinctive design decisions employed sedna schema-based clustering storage strategy xml data ii memory management based layered address space data organization sedna designed goal providing balance performance xml queries updates execution two primary design decisions data organization sedna following figure illustrates overall principles data organization sedna descriptive schema represented tree schema nodes central component data organization schema node labeled xml node kind e.g element attribute text etc pointer data blocks store xml nodes corresponding given schema node depending node kind schema nodes also labeled names e.g. element nodes attribute nodes data blocks related common schema node linked via pointers bidirectional list node descriptors list blocks partly ordered according document order | [
9828,
1801,
5612,
7983,
124,
9397,
6775,
2780,
2045,
5598,
479
] | None |
8,763 | 9 | Page_description_language:page description language digital printing page description language pdl computer language describes appearance printed page higher level actual output bitmap overlapping term printer control language includes hewlett-packard printer command language pcl postscript one noted page description languages markup language adaptation pdl page description markup language page description languages text human-readable binary data streams usually intermixed text graphics printed distinct graphics application programming interfaces apis gdi opengl called software generate graphical output various page description languages exist | [
5384,
4751,
1184,
2221,
6830,
11694,
8627,
8628,
4922,
11074,
9795,
3524,
9926,
73,
3323,
10960,
6993,
1877,
1760,
4836,
10352,
119,
3579
] | None |
8,764 | 4 | Open_security:open security open security use open source philosophies methodologies approach computer security information security challenges traditional application security based premise application service whether malware desirable relies security obscurity open source approaches created technology linux extent android operating system additionally open source approaches applied documents inspired wikis largest example wikipedia open security suggests security breaches vulnerabilities better prevented ameliorated users facing problems collaborate using open source philosophies approach requires users legally allowed collaborate relevant software would need released license widely accepted open source examples include massachusetts institute technology mit license apache 2.0 license gnu lesser general public license lgpl gnu general public license gpl relevant documents would need generally accepted open content license include creative commons attribution cc-by attribution share alike cc-by-sa licenses creative commons non-commercial licenses no-derivative licenses developer side legitimate software service providers independent verification testing source code information technology side companies aggregate common threats patterns security solutions variety security issues | [
10442,
9293,
7153,
8050,
4979,
823,
7515,
5373,
2558
] | Test |
8,765 | 9 | DMPL:dmpl dmpl digital microprocessor plotter language vector graphics file format houston instruments developed control pen plotters later used cutting plotters language compatible hp-gl see eagle definition | [
1801,
9795
] | None |
8,766 | 8 | Web_services_protocol_stack:web services protocol stack web service protocol stack protocol stack stack computer networking protocols used define locate implement make web services interact web service protocol stack typically stacks four protocols web service protocol stack also includes whole range recently defined protocols bpel | [
7364,
2501,
8070,
904,
6284,
9909,
10486,
479
] | None |
8,767 | 2 | Apple_ProDOS:apple prodos prodos name two similar operating systems apple ii series personal computers original prodos renamed prodos 8 version 1.2 last official operating system usable 8-bit apple ii series computers distributed 1983 1993 prodos 16 stop-gap solution 16-bit apple ii replaced gs/os within two years prodos marketed apple meaning professional disk operating system became popular operating system apple ii series computers 10 months release january 1983 prodos released address shortcomings earlier apple operating system called simply dos beginning show age apple dos built-in support 5.25 floppy disks requires patches use peripheral devices hard disk drives non-disk-ii floppy disk drives including 3.5 floppy drives prodos adds standard method accessing rom-based drivers expansion cards disk devices expands maximum volume size 400 kilobytes 32 megabytes introduces support hierarchical subdirectories vital feature organizing hard disk storage space supports ram disks machines 128kb memory prodos addresses problems handling hardware interrupts includes well-defined documented programming expansion interface apple dos always lacked although prodos also includes support real-time clock rtc support went largely unused release apple ii first apple ii series include rtc board third-party clocks available ii plus iie iic however prodos unlike earlier apple dos versions developmental roots sos operating system ill-fated apple iii computer released 1980 pre-release documentation prodos including early editions beneath apple prodos documented sos error codes notably one switched disks prodos could never generate disk format programming interface completely different apple dos prodos read write dos 3.3 disks except means conversion utility low-level track-and-sector format dos 3.3 disks retained 5.25 inch disks high-level arrangement files directories completely different reason machine-language programs run apple dos work prodos however basic programs work though sometimes require minor changes third-party program called dos.master enables users multiple virtual dos 3.3 partitions larger prodos volume release prodos came end support integer basic original apple ii model long since effectively supplanted applesoft basic apple ii plus whereas dos 3.3 always loads built-in support basic programming prodos job given separate system program called basic.system one launches run write applesoft basic programs basic continued built apple roms basic.system merely command interpreter enhancement allows basic programs access prodos means control-d text output used dos 3.3 basic.system alone requires much memory whole dos 3.3 since prodos kernel stowed away language card ram usable amount ram basic programmers remains prodos dos 3.3 despite prodos many advantages many users programmers resisted time investment learning ins outs apple dos apple-dos-based software data formats contributing reason prodos allows 15 characters filename compared apple dos 30 apple integrated software package appleworks released 1984 proved compelling reason switch end 1985 new software products released older operating system apple iis continued able boot older dos even apple ii boot older dos floppies 3.5 floppies hard disks became prevalent users spent bulk time prodos apple iie also released 1983 first apple ii computer 64kb memory built apple shipped dos 3.3 prodos new computers original prodos renamed prodos 8 prodos 16 released support 16-bit apple ii computer although prodos 16 soon replaced gs/os editions prodos require apple ii series computer licensed compatible prodos 8 requires 64kb memory run original prodos 8 1.0 1.0.2 requires 48kb kernel nearly programs including basic.system needed use applesoft basic require 64kb making 48kb system useless prodos practical matter support 48kb machines removed version 1.1 prodos 8 version 2.x requires 65c02 later 65802 65816 cpu prodos 8 2.x runs 64kb utility programs system disk require 128kb systems 6502 cpu instead 65c02 must use prodos 8 versions prior version 2.0 unofficial prodos 8 2.4 released august 16 2016 removes 65c02 requirement run apple ii computers least 64 kb ram although basic.system still requires applesoft rom prodos 16 requires apple iigs release prodos version 1.01 higher check added see running official apple-manufactured computer word apple found computer rom firmware prodos load normal anything else found e.g golden franklin elite prodos refuses run locking boot splash screen measure taken apple computer discourage use unlicensed apple ii clones still possible run newer versions prodos clones however users apply small byte patch every successive version prodos users go far replacing physical rom chip illegal copied version apple rom failing custom patched rom apple added name prodos 8 natively supports disk ii-compatible floppy drives ram drive approximately 59kb computers 128k ram block devices whose controllers support pascal firmware protocol standardized method accepting block reads writes originally introduced use ucsd p-system latter category includes 3.5 disk hard drives custom block device drivers hooked os well prodos uses file system earlier apple sos apple iii sos/prodos file system native apple sos prodos 8 prodos 16 gs/os classic mac os versions also come file system translator handle file system volume allocated 512-byte blocks 5.25 floppy disks still formatted using 256-byte sectors format required controller rom boot disk prodos simply treats pairs 256-byte sectors single block drives volume capacity 32 megabytes file 16 megabytes volume floppy disk hard drive partition volume name filename used base directory name two volumes volume name result conflicts necessary prodos searches available drives find named volume subdirectories supported concept prefix working directory current path provided make working subdirectories easier file directory volume names 1 15 characters starting letter containing letters digits periods file entry also contains 16 bit 2 byte pointer block containing beginning file block index 16-bit block count 24-bit 3-byte file size 8-bit 1-byte filetype 16-bit auxiliary type meaning depends upon filetype creation modification timestamps data related file stored volume sparse files supported files never sparsified removing zero-filled blocks volume header contains similar information relevant volumes directories including root directory sequentially indexed block starting address previous block zero none subsequent block zero none root directory disks initialized 4 blocks allowing 51 entries excluding volume header never changes size except manual intervention special tools subdirectories begin one block grow automatically needed normal files progressively indexed single-block files 513 bytes index block directory entry points directly block file data files 2 256 blocks 513 bytes 128 kb data single index block directory entry points contains list 256 data block addresses larger files master index block containing list 256 index block addresses apple iigs introduced new storage format introduced files two forks typical iigs system program files directory entry points informational block tells computer storage format two forks files read written natively prodos 8 though volume remains compatible volume bitmap used blocks central file allocation table prodos 8 volume formatted apple tools boot sector supports booting prodos sos depending computer booted block 0 apple ii boot block block 1 boots sos allows disk used boot either apple ii apple iii computers putting operating system kernels top directory apple ii boot sector looks file prodos apple iii boot sector looks file sos.kernel third-party formatting utilities often provide sos boot block would even mark block 1 available user data prodos kernel support file systems necessary conversion utility main system disk used transfer files individually prodos older apple dos 3.3 disks use different low-level disk format dos 3.3 prodos transferring data dos 3.2 disks prodos two-step process using dos 3.3 disk intermediary utilizing dos 3.3 utility muffin similar | [
2304,
2179,
9732,
2181,
10755,
6023,
6539,
7307,
4114,
6675,
11411,
3867,
9762,
11171,
11430,
3241,
6186,
5293,
7983,
3248,
8754,
8115,
7991,
9784,
2363,
7483,
2365,
2366,
8510,
576,
11257,
3522,
10691,
10052,
11513,
8774,
712,
5457,
3286,
... | Test |
8,768 | 4 | Intervasion_of_the_UK:intervasion uk intervasion uk 1994 electronic civil disobedience collective action john major criminal justice bill sought outlaw outdoor dance festivals music repetitive beat launched group called zippies san francisco 181 club guy fawkes day november 5 1994 resulted government websites going least week utilised form distributed denial service ddos known email bomb order overload servers form online protest internet activism first use internet technology weapon struggle and/or civil disobedience preceded criminal justice public order act 1994 definition music played rave given music includes sounds wholly predominantly characterised emission succession repetitive beats sections 63 64 65 act targeted electronic dance music played raves criminal justice public order act empowered police stop rave open air ten people attending two making preparations rave section 65 allowed uniformed constable believes person way rave within radius stop direct away area non-compliant citizens may subject maximum fine exceeding level 3 standard scale £1000 zippies sought jam mailboxes uk politicians associated bill order bring attention issue natural justice involving basic rights freedoms effect collective action saying take away freedom power take away something take granted way deploys internet weapon several hackers directly associated group launched all-out penetration testing load testing operations several uk government websites resulting tit-for-tat battle zippies mailbox morph.com went along entire server morph well-known bay area bbs event broadcast radio free berkeley protest action occurred manhunt kevin mitnick thus partly underground event media also refused entertain implications electronic civil disobedience public attention focused problem illegal raves black-hat hackers prompting scare stories evil hackers young hoodlums penetrating british defences zippies written nothing electrohippies criticism intervasion expressed electronic frontier foundation complained lack cutoff date criticism whole earth 'lectronic link well bbs centered use militant language online protest action also suffered conflict stated aims clog servers uk government call send email messages uk politicians thus jamming mailboxes email large file attachments defeated purpose exercise essentially early form hacktivism nature collective action also articulated well enough instance digital be-in occurred launch timothy leary chaos cyberculture leary kidnapped without consent publisher forced ddos uk government simply protest message sent repeatedly mail-boxes around world | [
2251
] | None |
8,769 | 8 | Proximic:proximic proximic platform provides real-time data services contextual data online advertisers agencies company based palo alto research development facilities munich company ceo philipp pieper co-founded company mathematician thomas nitsche thomas nitsche elmar henne proximic chief architect developed mephisto chess computer chief scientist louis monier founder altavista search engine proximic launched alpha testing mode late 2007 2010 company integrated real-time ad platform appnexus started offer contextual data services display advertisers agencies may 2015 proximic acquired comscore | [
3744,
3875,
2566,
714,
2318,
944,
113,
11284,
1240,
4473,
2459
] | Test |
8,770 | 4 | Zeek:zeek zeek formerly bro free open-source software network analysis framework originally developed 1994 vern paxson named reference george orwell big brother novel nineteen eighty-four used network intrusion detection system nids additional live analysis network events released bsd license ip packets captured pcap transferred event engine accepts rejects accepted packets forwarded policy script interpreter event engine analyzes live recorded network traffic trace files generate neutral events generates events something happens triggered zeek process initialization termination zeek process well something taking place network trace file analyzed zeek witnessing http request new tcp connection zeek uses common ports dynamic protocol detection involving signatures well behavioral analysis make best guess interpreting network protocols events policy neutral good bad simply signals script land something happened events handled policy scripts analyze events create action policies scripts written turing complete zeek scripting language default zeek simply logs information events files zeek also supports logging events binary output however configured take actions sending email raising alert executing system command updating internal metric even calling another zeek script default behavior produces netflow-like output conn log well application event information zeek scripts able read data external files blacklists use within zeek policy scripts zeek analyzers located zeek event engine accompanying policy script policy script customized user analyzers perform application layer decoding anomaly detection signature matching connection analysis zeek designed easy add additional analyzers application layer analyzers included zeek http ftp smtp dns amongst others non-application layer analyzers include analyzers detect host port scans intermediary hosts syn-floods zeek also includes signature detection allows import snort signatures | [
7813,
6345,
7983,
5492,
11221,
823,
2299
] | Test |
8,771 | 9 | LispWorks:lispworks lispworks computer software proprietary implementation integrated development environment ide programming language common lisp lispworks developed uk software company harlequin ltd. first published 1989 harlequin ultimately spun lisp division xanalys ltd. took management rights lispworks january 2005 xanalys lisp team formed lispworks ltd. market develop support software lispworks features include enterprise edition also includes knowledgeworks supports rule-based logic programming including support prolog commonsql database interface common object request broker architecture corba binding september 2009 announced lispworks 6 would support concurrent threads capi graphics toolkit extended support gtk+ lispworks 6.1 released january 2012 includes many enhancements capi support anti-aliased drawing lispworks ran spacecraft deep space 1 application called rax nasa software year award 1999 | [
10752,
11269,
2056,
9224,
2062,
9231,
7184,
2577,
9749,
8728,
4633,
4122,
9245,
8226,
2603,
5165,
5677,
3119,
3631,
2105,
6201,
3132,
6717,
576,
8258,
10819,
8262,
1613,
9299,
10841,
3675,
2658,
7267,
2660,
8293,
3176,
2666,
2667,
5743,
8... | Test |
8,772 | 6 | Btrfs:btrfs btrfs pronounced butter fuss better f butter f b-tree f simply spelling file system based copy-on-write cow principle initially designed oracle corporation use linux development btrfs began 2007 since november 2013 file system on-disk format marked stable btrfs intended address lack pooling snapshots checksums integral multi-device spanning linux file systems chris mason principal btrfs author stated goal let linux scale storage available scaling addressing storage also means able administer manage clean interface lets people see used makes reliable core data structure btrfsthe copy-on-write b-treewas originally proposed ibm researcher ohad rodeh presentation usenix 2007 chris mason engineer working reiserfs suse time joined oracle later year began work new file system based b-trees 2008 principal developer ext3 ext4 file systems theodore ts stated although ext4 improved features major advance uses old technology stop-gap ts said btrfs better direction offers improvements scalability reliability ease management btrfs also number design ideas reiser3/4 btrfs 1.0 finalized on-disk format originally slated late-2008 release finally accepted linux kernel mainline 2009 several linux distributions began offering btrfs experimental choice root file system installation july 2011 btrfs automatic defragmentation scrubbing features merged version 3.0 linux kernel mainline besides mason oracle miao xie fujitsu contributed performance improvements june 2012 chris mason left oracle fusion-io left year later josef bacik join facebook companies mason continued work btrfs 2012 two linux distributions moved btrfs experimental production supported status oracle linux march followed suse linux enterprise august 2015 btrfs adopted default filesystem suse linux enterprise server 12 august 2017 red hat announced release notes red hat enterprise linux rhel 7.4 longer planned move btrfs included technology preview since rhel 6 beta fully supported feature noting would remain available rhel 7 release series btrfs removed rhel 8 may 2019 version 5.0 linux kernel btrfs implements following features 2009 btrfs expected offer feature set comparable zfs developed sun microsystems oracle acquisition sun 2009 mason oracle decided continue btrfs development btrfs provides clone operation atomically creates copy-on-write snapshot file cloned files sometimes referred reflinks light associated linux kernel system calls cloning file system create new link pointing existing inode instead creates new inode initially shares disk blocks original file result cloning works within boundaries btrfs file system since version 3.6 linux kernel may cross boundaries subvolumes certain circumstances actual data blocks duplicated time due copy-on-write cow nature btrfs modifications cloned files visible original file vice versa cloning confused hard links directory entries associate multiple file names actual files file system hard links taken different names file cloning btrfs provides independent files share disk blocks support btrfs feature added version 7.5 gnu coreutils via codice_2 option codice_3 command btrfs subvolume thought separate posix file namespace mountable separately passing codice_4 codice_5 options utility also accessed mounting top-level subvolume case subvolumes visible accessible subdirectories subvolumes created place within file system hierarchy also nested nested subvolumes appear subdirectories within parent subvolumes similarly way top-level subvolume presents subvolumes subdirectories deleting subvolume possible subvolumes nesting hierarchy deleted result top-level subvolumes deleted btrfs file system always default subvolume initially set top-level subvolume mounted default subvolume selection option passed codice_6 default subvolume changed required btrfs snapshot subvolume shares data metadata subvolume using btrfs copy-on-write capabilities modifications snapshot visible original subvolume writable snapshot made treated alternate version original file system example roll back snapshot modified original subvolume needs unmounted snapshot needs mounted place point original subvolume may also deleted copy-on-write cow nature btrfs means snapshots quickly created initially consuming little disk space since snapshot subvolume creating nested snapshots also possible taking snapshots subvolume recursive process thus snapshot subvolume created every subvolume snapshot subvolume already contains mapped empty directory name inside snapshot taking snapshots directory possible subvolumes snapshots however workaround involves reflinks spread across subvolumes new subvolume created containing cross-subvolume reflinks content targeted directory available snapshot new volume created subvolume btrfs quite different traditional logical volume manager lvm logical volume lvm logical volume separate block device btrfs subvolume treated used way making dd lvm snapshots btrfs leads dataloss either original copy mounted computer given pair subvolumes snapshots btrfs generate binary diff using codice_7 command replayed later using codice_8 possibly different btrfs file system send–receive feature effectively creates applies set data modifications required converting one subvolume another send/receive feature used regularly scheduled snapshots implementing simple form file system master–slave replication purpose performing incremental backups quota group qgroup imposes upper limit space subvolume snapshot may consume new snapshot initially consumes quota data shared parent thereafter incurs charge new files copy-on-write operations existing files quotas active quota group automatically created new subvolume snapshot initial quota groups building blocks grouped codice_9 command hierarchies implement quota pools quota groups apply subvolumes snapshots quotas enforced individual subdirectories users user groups possible however workarounds possible using different subvolumes users user groups require quota enforced result little metadata anchored fixed locations btrfs warp fit unusual spatial layouts backend storage devices codice_10 tool exploits ability in-place conversion ext2/3/4 reiserfs file system nesting equivalent btrfs metadata unallocated space—while preserving unmodified copy original file system conversion involves creating copy whole ext2/3/4 metadata btrfs files simply point blocks used ext2/3/4 files makes bulk blocks shared two filesystems conversion becomes permanent thanks copy-on-write nature btrfs original versions file data blocks preserved file modifications conversion becomes permanent blocks marked free ext2/3/4 used hold new btrfs modifications meaning conversion undone time although erase changes made conversion btrfs converted files available writable default subvolume btrfs sparse file holding references original ext2/3/4 filesystem created separate subvolume mountable read-only disk image allowing original converted file systems accessed time deleting sparse file frees space makes conversion permanent june 2015 4.x versions linux kernel mainline in-place ext3/4 conversion considered untested rarely used feature however rewritten scratch 2016 codice_11 4.6. considered stable since in-place conversion reiserfs introduced september 2017 kernel 4.13 creating new btrfs existing btrfs used read-only seed file system new file system act copy-on-write overlay seed form union mounting seed later detached btrfs point rebalancer simply copy seed data still referenced new file system detaching mason suggested may useful live cd installer might boot read-only btrfs seed optical disc rebalance target partition install disk background user continues work eject disc complete installation without rebooting 2009 interview chris mason stated support encryption planned btrfs meantime workaround combining encryption btrfs use full-disk encryption mechanism dm-crypt luks underlying devices create btrfs filesystem top layer unix systems traditionally rely fsck programs check repair filesystems functionality implemented via codice_12 program since version 4.0 functionality deemed relatively stable however august 2017 btrfs documentation suggests used tried recovery methods another tool named codice_13 used recover files unmountable filesystem without modifying broken filesystem i.e. non-destructively normal use btrfs mostly self-healing recover broken root trees mount time thanks making periodic data flushes permanent storage default every 30 seconds thus isolated errors cause maximum 30 seconds filesystem changes lost next mount period changed specifying desired value seconds codice_14 mount option ohad rodeh original proposal usenix 2007 noted b+ trees widely used on-disk data structures databases could efficiently allow copy-on-write-based snapshots leaf nodes linked together leaf copy-on-written siblings parents would well would siblings parents entire tree copied suggested instead modified b-tree leaf linkage refcount associated tree node stored ad-hoc free map structure certain relaxations tree balancing algorithms make copy-on-write friendly result would data structure suitable high-performance object store could perform copy-on-write snapshots maintaining good concurrency oracle later year chris mason began work snapshot-capable file system would use data structure almost exclusively—not metadata file data also recursively track space allocation trees allowed traversal modifications funneled single code path features copy-on-write checksumming mirroring needed implemented benefit entire file system btrfs structured several layers trees using b-tree implementation trees store generic items sorted 136-bit key first 64 bits key unique object id middle 8 bits item type field use hardwired code item filter tree lookups objects multiple items multiple types remaining right-hand 64 bits used type-specific ways therefore items object end adjacent tree ordered type choosing certain right-hand key values objects put items type particular order interior tree nodes simply flat lists key-pointer pairs pointer logical block number child node leaf nodes contain item keys packed front node item data packed end two growing toward leaf fills every tree appears object root tree tree tree roots trees file system trees log trees variable number instances given object id trees singletons data relocation extent chunk trees assigned special fixed object ids ≤256 root tree appears tree object id 1 trees refer object id may also refer individual nodes trees triplet tree object id node level within tree leftmost key value references independent tree actually stored user-visible files directories contained file system tree one file system tree per subvolume subvolumes nest case appear directory item described whose data reference nested subvolume file system tree within file system tree file directory object inode item extended attributes acl entries stored alongside separate items within directory directory entries appear directory items whose right-hand key values crc32c hash filename data location key key inode item points directory items together thus act index path-to-inode lookups used iteration sorted hash effectively randomly permuting means user applications iterating opening files large directory would thus generate many disk seeks non-adjacent files—a notable performance drain file systems hash-ordered directories reiserfs ext3 htree-indexes enabled ext4 tea-hashed filenames avoid directory entry directory index item whose right-hand key value item set per-directory counter increments new directory entry iteration index items thus returns entries roughly order stored disk besides inode items files directories also reference item whose right-hand key value object id parent directory data part reference item filename inode known directory allows upward traversal directory hierarchy providing way map inodes back paths files hard links multiple directories multiple reference items one parent directory files multiple hard links directory pack links filenames reference item design flaw limited number same-directory hard links however many could fit single tree block default block size 4 kib average filename length 8 bytes per-filename header 4 bytes would less 350 applications made heavy use multiple same-directory hard links git gnus gmame backuppc later observed fail hitting limit limit eventually removed october 2012 merged pending release linux 3.7 introducing spillover extended reference items hold hard link filenames could otherwise fit file data kept outside tree extents contiguous runs disk blocks extent blocks default 4kib size headers contain possibly compressed file data compressed extents individual blocks compressed separately rather compression stream spans entire extent files extent data items track extents hold contents item right-hand key value starting byte offset extent makes efficient seeks large files many extents correct extent given file offset computed one tree lookup snapshots cloned files share extents small part large extent overwritten resulting copy-on-write may create three new extents small one containing overwritten data two large ones unmodified data either side overwrite avoid re-write unmodified data copy-on-write may instead create bookend extents extents simply slices existing extents extent data items allow including offset extent tracking items bookends non-zero offsets file data small enough fit inside tree node instead pulled in-tree stored inline extent data item tree node stored tree block —a single uncompressed block header tree block regarded free-standing single-block extent extent allocation tree acts allocation map file system unlike trees items tree object ids represent regions space left-hand right-hand key values starting offsets lengths regions represent file system zones allocated space block groups variable-sized allocation regions alternate successively preferring metadata extents tree nodes data extents file contents default ratio data metadata block groups 1:2 intended work like orlov block allocator block groups ext3 allocating related files together resisting fragmentation leaving allocation gaps groups ext3 block groups however fixed locations computed size file system whereas btrfs dynamic created needed block group associated block group item inode items file system tree include reference current block group extent items contain back-reference tree node file occupying extent may multiple back-references extent shared snapshots many back-references fit item spill individual extent data reference items tree nodes turn back-references containing trees makes possible find extents tree nodes region space b-tree range lookup pair offsets bracketing region following back-references relocating data allows efficient upwards traversal relocated blocks quickly find fix downwards references blocks without walk entire file system turn allows file system efficiently shrink migrate defragment storage online extent allocation tree trees file system copy-on-write writes file system may thus cause cascade whereby changed tree nodes file data result new extents allocated causing extent tree change avoid creating feedback loop extent tree nodes still memory yet committed disk may updated in-place reflect new copy-on-written extents theory extent allocation tree makes conventional free-space bitmap unnecessary extent allocation tree acts b-tree version bsp tree practice however in-memory red-black tree page-sized bitmaps used speed allocations bitmaps persisted disk starting linux 2.6.37 via codice_15 mount option special extents exempt checksumming copy-on-write extent items tracking extents stored root tree crc-32c checksums computed data metadata stored checksum items checksum tree room 256 bits metadata checksums full leaf block roughly 4 kb data checksums checksum algorithm options planned future one checksum item per contiguous run allocated blocks per-block checksums packed end-to-end item data checksums fit spill rightwards another checksum item new leaf file system detects checksum mismatch reading block first tries obtain create good copy block another device internal mirroring raid techniques use btrfs initiate online check entire file system triggering file system scrub job performed background scrub job scans entire file system integrity automatically attempts report repair bad blocks finds along way fsync request commit modified data immediately stable storage fsync-heavy workloads like database virtual machine whose running os fsyncs intensively could potentially generate great deal redundant write i/o forcing file system repeatedly copy-on-write flush frequently modified parts trees storage avoid temporary per-subvolume log tree created journal fsync-triggered copy-on-writes log trees self-contained tracking extents keeping checksum items items replayed deleted next full tree commit system crash next remount block devices divided physical chunks 256 mb physical chunks across multiple devices mirrored striped together single logical chunk logical chunks combined single logical address space rest filesystem uses chunk tree tracks storing device therein device item logical chunks chunk map items provide forward mapping logical physical addresses storing offsets right-hand 64 bits key chunk map items one several different types n however many block devices still free space chunk allocated n large enough chosen mirroring/mapping filesystem effectively space device tree inverse chunk tree device extent items provide reverse mapping byte-ranges block devices back logical chunks storing device number left hand 64-bits physical offset right-hand 64 bits key two trees together allow btrfs grow shrink even change raid levels without unmounting make possible efficiently locate chunks affected shrink/move operations relocate contents on-the-fly file system chunks devices assigned universally unique identifier uuid header every tree node contains uuid containing chunk uuid file system chunk device trees refer devices chunks uuids filesystems single block device dup also default profile metadata intended improve odds successful data salvage event media errors defragmentation shrinking rebalancing operations require extents relocated however simple copy-on-write relocating extent break sharing snapshots consume disk space preserve sharing update-and-swap algorithm used special relocation tree serving scratch space affected metadata extent relocated first copied destination following backreferences upward affected subvolume file system tree metadata pointing old extent progressively updated point new one newly updated items stored relocation tree update complete items relocation tree swapped counterparts affected subvolume relocation tree discarded file system trees—including chunk tree itself—are stored chunks creating potential bootstrapping problem mounting file system bootstrap mount list physical addresses chunks belonging chunk root trees must stored superblock superblock mirrors kept fixed locations 64 kib every block device additional copies 64 mib 256 gib 1 pib superblock mirror updated generation number incremented mount time copy highest generation number used superblock mirrors updated tandem except ssd mode alternates updates among mirrors provide wear levelling | [
5120,
2051,
2564,
9224,
3082,
6669,
3598,
10257,
5139,
9236,
6677,
5142,
8214,
10774,
1049,
3611,
10780,
5661,
10272,
9249,
3618,
9762,
6180,
2597,
5158,
10785,
8242,
9266,
3640,
7225,
9784,
11323,
7229,
8254,
10817,
6213,
8268,
1109,
10851... | Test |
8,773 | 9 | Undefined_behavior:undefined behavior computer programming undefined behavior ub result executing computer code whose behavior prescribed language specification code adheres current state program happens translator source code makes certain assumptions assumptions satisfied execution behavior programming languages—most famously c c++—is undefined cases standards languages semantics certain operations described undefined cases typically represent unambiguous bugs code example indexing array outside bounds implementation allowed assume operations never occur correct standard-conforming program code case c/c++ compiler allowed give compile-time diagnostic cases required implementation considered correct whatever cases analogous don't-care terms digital logic responsibility programmer write code never invokes undefined behavior although compiler implementations allowed issue diagnostics happens assumption make various program transformations valid simplify proof correctness giving flexibility implementation result compiler often make optimizations also allows compile-time checks compilers static program analysis c community undefined behavior may humorously referred nasal demons comp.std.c post explained undefined behavior allowing compiler anything chooses even make demons fly nose circumstances specific restrictions undefined behavior example instruction set specifications cpu might leave behavior forms instruction undefined cpu supports memory protection specification probably include blanket rule stating user-accessible instruction may cause hole operating system security actual cpu would permitted corrupt user registers response instruction would allowed example switch supervisor mode documenting operation undefined behavior allows compilers assume operation never happen conforming program gives compiler information code information lead optimization opportunities example c language value codice_1 negative given signed integer overflow undefined behavior c compiler assume codice_2 always false thus codice_3 statement including call function codice_4 ignored compiler since test expression codice_3 side effects condition never satisfied code therefore semantically equivalent compiler forced assume signed integer overflow wraparound behavior transformation would legal optimizations become hard spot humans code complex optimizations like inlining take place another benefit allowing signed integer overflow undefined makes possible store manipulate variable value processor register larger size variable source code example type variable specified source code narrower native register width int 64-bit machine common scenario compiler safely use signed 64-bit integer variable machine code produces without changing defined behavior code program depended behavior 32-bit integer overflow compiler would insert additional logic compiling 64-bit machine overflow behavior machine instructions depends register width important benefit undefined signed integer overflow enables though require erroneous overflows detected compile-time static program analysis run-time checks clang gcc sanitizers valgrind overflow defined semantics wrap-around compile-time checks would possible c c++ standards several forms undefined behavior throughout offer increased liberty compiler implementations compile-time checks expense undefined run-time behavior present particular iso c standard appendix listing common sources undefined behavior moreover compilers required diagnose code relies undefined behavior hence common programmers even experienced ones rely undefined behavior either mistake simply well-versed rules language span hundreds pages result bugs exposed different compiler different settings used testing fuzzing dynamic undefined behavior checks enabled e.g clang sanitizers help catch undefined behavior diagnosed compiler static analyzers scenarios security critical undefined behavior lead security vulnerabilities software gcc developers changed compiler 2008 omitted certain overflow checks relied undefined behavior cert issued warning newer versions compiler linux weekly news pointed behavior observed pathscale c microsoft visual c++ 2005 several compilers warning later amended warn various compilers major forms undefined behavior c broadly classified spatial memory safety violations temporal memory safety violations integer overflow strict aliasing violations alignment violations unsequenced modifications data races loops neither perform i/o terminate c use automatic variable initialized yields undefined behavior integer division zero signed integer overflow indexing array outside defined bounds see buffer overflow null pointer dereferencing general instance undefined behavior leaves abstract execution machine unknown state causes behavior entire program undefined attempting modify string literal causes undefined behavior ref name= c++03 2.13.4/2 iso/iec 2003 iso/iec 14882:2003 e programming languages c++ §2.13.4 string literals lex.string para 2 /ref integer division zero results undefined behavior ref name= c++03 5.6/4 iso/iec 2003 iso/iec 14882:2003 e programming languages c++ §5.6 multiplicative operators expr.mul para 4 /ref certain pointer operations may result undefined behavior ref name= c++03 5.6/5 iso/iec 2003 iso/iec 14882:2003 e programming languages c++ §5.7 additive operators expr.add para 5 /ref c c++ comparison pointers objects strictly defined pointers point members object elements array. ref name= c++03 5.9/2 iso/iec 2003 iso/iec 14882:2003 e programming languages c++ §5.9 relational operators expr.rel para 2 /ref example reaching end value-returning function main without return statement results undefined behavior value function call used caller ref name= c99 6.9.1/12 iso/iec 2007 iso/iec 9899:2007 e programming languages c §6.9 external definitions para 1 /ref modifying object two sequence points produces undefined behavior considerable changes causes undefined behavior relation sequence points c++11 following example however cause undefined behavior c++ c. modifying object two sequence points reading value object purpose determining value stored also undefined behavior. ref name= c99 6.5/2 iso/iec 1999 iso/iec 9899:1999 e programming languages c §6.5 expressions para 2 /ref c/c++ bitwise shifting value number bits either negative number greater equal total number bits value results undefined behavior safest way regardless compiler vendor always keep number bits shift right operand « » bitwise operators within range codice_6 | [
6278,
10510,
655,
9871,
3350,
5911,
11674,
3871,
1952,
2975,
1954,
7462,
6184,
7337,
815,
7983,
7734,
9911,
7609,
1474,
8262,
2253,
7889,
2262,
7421,
10333,
8545,
11490,
8551,
1776,
5744,
4980,
7292,
2045,
2558
] | Validation |
8,774 | 2 | Apple_DOS:apple dos apple dos family disk operating systems apple ii series microcomputers late 1978 early 1983 superseded prodos 1983 apple dos three major releases dos 3.1 dos 3.2 dos 3.3 one three releases followed second minor bug-fix release case apple dos 3.2 minor release receive version number apple dos 3.2.1 best-known most-used version apple dos 3.3 1980 1983 releases prior release apple dos 3.1 apple users rely audio cassette tapes data storage retrieval apple computer introduced apple ii april 1977 new computer disk drive disk operating system dos although apple co-founder steve wozniak designed disk ii controller late year believed could written dos co-founder steve jobs decided outsource task company considered using digital research cp/m wozniak sought operating system easier use 10 april 1978 apple signed 13,000 contract shepardson microsystems write dos deliver within 35 days apple provided detailed specifications early apple employee randy wigginton worked closely shepardson paul laughton latter wrote operating system punched cards minicomputer apple dos 1 2 versions 0.1 2.8 serially enumerated revisions development might well called builds 1 28 apple dos 3.0 renamed issue version 2.8 never publicly released due bugs apple published official documentation release 3.2 apple dos 3.1 publicly released june 1978 slightly one year apple ii introduced becoming first disk-based operating system apple computer bug-fix release came later addressing problem means utility used create apple dos master bootable disks built-in command created disks could booted machines least amount memory one created includes self-relocating version dos boots apples memory configuration apple dos 3.2 released 1979 reflect changes computer booting methods built successor apple ii apple ii plus new firmware included auto-start feature automatically found disk controller booted system powered up—earning name autostart rom apple dos 3.3 released 1980 improves various functions release 3.2 also allowing large gains available floppy disk storage newer p5a/p6a proms disk controller enabled reading writing data higher density instead 13 sectors 3.25 kib 16 sectors 4 kib data stored per disk track increasing capacity 113.75 kb 140 kb per disk side 16 kb used filesystem overhead copy dos dos 3.3-formatted disk leaving 124 kb user programs data dos 3.3 however backward compatible read write dos 3.2 disks address problem apple computer released utility called muffin migrate apple dos 3.2 files programs version 3.3 disks apple never offered utility copy way migrate apple dos 3.3 files back version 3.2 disks someone wrote niffum utility also commercial utilities copy ii plus copy files either format eventually prodos well release 3.3 also improves ability switch integer basic applesoft basic computer language card ram expansion firmware card apple dos 3.1 disks use 13 sectors data per track sector 256 b uses 35 tracks per disk side access one side floppy disk unless user flipped disk gives user total storage capacity 113.75 kb per side 10 kb used store dos disk directory leaving 100 kb user programs first layer operating system called rwts stands read/write track sector layer consists subroutines track seeking sector reading writing disk formatting api called file manager built top implements functions open close read write delete lock i.e write-protect unlock i.e write-enable rename files verify file structural integrity also catalog function listing files diskette init function formats disk use dos storing copy dos first three tracks storing startup program usually called hello auto-started disk booted top file manager api main dos routines implemented hook machine basic interpreter intercept disk commands provides bload bsave brun storing loading running binary executables load run save provided basic programs exec provided running text-based batch files consisting basic dos commands finally four types files exist identified letters catalog listing four additional file types r additional b none fully supported dos recognizes types catalog listings direct ways manipulate types files r type found use relocatable binary executable files programs support type data files call vector table region 03d0–03ff allows programs find dos wherever loaded system memory example dos hooked basic cli stops functioning reinitialized calling location 03d0 976 hence traditional 3d0g 3d0 go command return basic system monitor process loading apple dos involves series tiny programs carries loading process forward steps passing control next program chain original apple ii included basic interpreter rom known originally apple basic later integer basic variables language handle integer numbers ranging −32,768 +32,767 16-bit binary values floating point numbers supported apple commissioned microsoft develop applesoft basic capable handling floating-point numbers applesoft basic run integer basic programs causing users resist upgrading dos 3.3 released applesoft basic standard rom apple ii plus apple designed support switching back forth two basic interpreters integer basic loaded ram language card apple iis present typing fp int basic user switch either version 1980 apple dos entered state stagnation apple concentrated efforts ill-fated apple iii computer sos operating system two versions apple dos still called dos 3.3 bug fixes better support new apple iie model released early mid-1983 without third-party patches apple dos read floppy disks running 5.25-inch disk ii drive access media hard disk drives virtual ram drives 3.5-inch floppy disk drives structure apple dos disks particularly free sector map restricted part single sector possible 400 kb available time per drive without major rewrite almost sections code main reason apple abandoned iteration dos 1983 apple dos entirely replaced prodos prodos retains 16-sector low-level format dos 3.3 5.25 inch disks introduces new high-level format suitable devices 32 mb makes suitable hard disks era 3.5-inch floppies apple computers ii plus onward run dos 3.3 prodos plus requiring language card memory expansion use prodos e later models built-in language card hardware run prodos straight prodos includes software copy files apple dos disks however many people need improvements prodos like much higher memory footprint continued using apple dos one clones long 1983 apple convention storing bootable os every single floppy disk means commercial software used matter os user owns program called dos.master enables users multiple virtual dos 3.3 partitions larger prodos volume allows use many floppy-based dos programs hard disk shortly prodos came apple withdrew permission third parties redistribute dos 3.3 granted one company syndicomm exclusive license resell dos 3.3 commercial games usually use apple dos instead custom disk routines copy protection purposes well performance dos rwts routine read write track two revolutions proper interleaving sector spinning disk passes read/write head rwts routine decoding just-read sector encoding next one written missed sector next one needed dos needs wait nearly entire revolution disk sector come around called blowing rev well-understood performance bottleneck disk systems avoid sectors dos disk arranged interleaved order later prodos arranged sectors order reading decoding sector 0 sector 8 passes sector 1 next sector likely needed available without waiting reading sector 7 two unneeded sectors f 0 pass sector 8 available reading sector 15 drive always wait extra revolution sector 0 track however sector 0 actually needed cases next-higher track track arranged relative last one allow needed time decode just-read sector move head sector 0 comes around average full track read two revolutions disk unfortunately early dos file manager subverted efficiency copying bytes read written file one time disk buffer main memory requiring time resulting dos constantly blowing revs reading writing files programs became available early format disks modified sector interleaves disks give dos time sectors copy data ameliorating problem later programmers outside apple rewrote file manager routines avoid making extra copy sectors file rwts instructed read write sectors directly main memory rather disk buffer whenever full sector transferred early patch provide functionality published call-a.p.p.l.e. speedups load command three five times typical functionality soon appeared commercial products pronto-dos diversi-dos hyper-dos david-dos along additional features never used official apple dos release similar functionality however employed apple successor operating system prodos apple iigs-specific operating system gs/os would eventually employ even efficient scatter read technique would read sector happened passing read head needed file read 2013 35 years apple ii debuted original apple dos source code released computer history museum website donated original author paul laughton | [
2179,
9732,
2181,
10755,
6023,
6539,
7307,
4114,
6675,
9762,
11171,
11430,
3241,
6186,
5293,
7983,
3248,
8754,
823,
7991,
4409,
9784,
2363,
7483,
2365,
2366,
7739,
576,
8510,
8767,
11257,
10052,
11513,
8262,
712,
2383,
3286,
1623,
2395,
9... | Test |
8,775 | 9 | Free-form_language:free-form language computer programming free-form language programming language positioning characters page program text insignificant program text need placed specific columns old punched card systems frequently ends lines insignificant whitespace characters used delimit tokens significance free-form languages descend algol including c pascal perl lisp languages free-form although descend algol rexx mostly free-form though cases whitespace characters concatenation operators sql though full programming language also free-form free-form languages also structured programming languages sometimes thought go along free-form syntax earlier imperative programming languages fortran 77 used particular columns line numbers many structured languages use need structured languages exist free-form abc curry haskell python others many use variant off-side rule indentation rather keywords braces used group blocks code | [
512,
8582,
5651,
3876,
10413,
2936,
443,
6718,
963,
8644,
8262,
2505,
8524,
6502,
8554,
8171,
9454,
10097,
3960,
2045
] | Test |
8,776 | 3 | Palm_OS_Emulator:palm os emulator descended copilot palm os emulator used writing testing debugging palm os applications palm os emulator emulates motorola 68000-class devices intimate knowledge palm os inner working allowing close monitoring correct application operation unlike xcopilot another descendant copilot palm os emulator boot uclinux using skin files palm os emulator could closely mimic appearance many models palm handheld versions palm os emulator require file containing rom image boot rom image files obtained palmsource part access co. ltd downloaded real palm device palm os emulator supported palm models produced palm handera handspring symbol palm os handhelds produced sony clie line supported separate sony-specific fork palm os emulator copilot palm os emulator released gpl v2 versions developed palm inc. windows macintosh unix platforms sony fork released windows palm os emulator supports palm os 4.x earlier support palm os 5.x later versions based arm processor palmsource provides simulators palm os 5.x palm os recompiled run natively windows linux mac windows versions emulator included cd-rom included palm programming developer guide published o'reilly 1999 | [
5264,
7269,
11326
] | Test |
8,777 | 7 | Semantic_P2P_networks:semantic p2p networks semantic p2p networks new type p2p network combines advantages unstructured p2p networks structural p2p networks avoids disadvantages semantic p2p networks nodes classified dns-like domain names semantic meanings alice brittney.popular.music semantic p2p networks contains prerequisite virtual tree topology net-like topology formed cached nodes semantic p2p networks keep semantic meanings nodes contents nodes within semantic p2p networks communicate various languages semantic p2p network execute complicated queries sql-like language similarities semantic p2p systems software agents p2p means entities exchange information directly without mediator semantic concept add meaning information peer usually autonomous systems well agents agents follow goal though goal attainment requires knowledge base rules strategies major difference software agents semantic peers latter lacks kind intelligence | [
8640,
10452,
10413,
2887
] | Test |
8,778 | 2 | Mg_(editor):mg editor mg originally called micrognuemacs later changed request richard stallman public-domain text editor runs unix-like operating systems based microemacs intended closely resemble gnu emacs still maintaining small memory footprint fast speed expanded version original included part openbsd maintained snapshots openbsd version available native package management trees many systems including macports freebsd ports pkgsrc debian | [
9223,
10631,
2825,
3465,
1932,
9487,
274,
5397,
7702,
10105,
9245,
8993,
6702,
9520,
823,
5819,
5694,
2245,
9671,
1993,
3404,
11086,
5970,
3675,
5084,
7139,
1637,
4071,
5230,
2166,
1785,
8954
] | None |
8,779 | 4 | 2016_Dyn_cyberattack:2016 dyn cyberattack 2016 dyn cyberattack series distributed denial-of-service attacks ddos attacks october 21 2016 targeting systems operated domain name system dns provider dyn attack caused major internet platforms services unavailable large swathes users europe north america groups anonymous new world hackers claimed responsibility attack scant evidence provided dns provider dyn provides end-users service mapping internet domain name—when instance entered web browser—to corresponding ip address distributed denial-of-service ddos attack accomplished large number dns lookup requests tens millions ip addresses activities believed executed botnet consisting large number internet-connected devices—such printers ip cameras residential gateways baby monitors—that infected mirai malware according dyn distributed denial-of-service ddos attack began 7:00 a.m. edt resolved 9:20 a.m. second attack reported 11:52 a.m. internet users began reporting difficulties accessing websites third attack began afternoon 4:00 p.m. 6:11 p.m. dyn reported resolved issue dyn chief strategy officer spokesperson kyle york led communication response customers partners market services affected attack included us department homeland security started investigation attacks according white house source group hackers claimed responsibility immediate aftermath attack dyn chief strategist said interview assaults company servers complex unlike everyday ddos attacks barbara simons member advisory board united states election assistance commission said attacks could affect electronic voting overseas military civilians dyn disclosed according business risk intelligence firm flashpoint akamai technologies attack botnet coordinated large number internet things-enabled iot devices including cameras residential gateways baby monitors infected mirai malware attribution attack mirai botnet previously reported backconnect inc. another security firm dyn stated receiving malicious requests tens millions ip addresses mirai designed brute-force security iot device allowing controlled remotely cybersecurity investigator brian krebs noted source code mirai released onto internet open-source manner weeks prior make investigation perpetrator difficult 25 october 2016 us president obama stated investigators still idea carried cyberattack 13 december 2017 justice department announced three men paras jha 21 josiah white 20 dalton norman 21 entered guilty pleas cybercrime cases relating mirai clickfraud botnets correspondence website politico hacktivist groups spainsquad anonymous new world hackers claimed responsibility attack retaliation ecuador rescinding internet access wikileaks founder julian assange embassy london granted asylum claim yet confirmed wikileaks alluded attack twitter tweeting mr. assange still alive wikileaks still publishing ask supporters stop taking us internet proved point new world hackers claimed responsibility past similar attacks targeting sites like bbc espn.com october 26 flashpoint stated attack likely done script kiddies november 17 2016 forbes article reported attack likely carried angry gamer | [
0,
1024,
5636,
4117,
8726,
535,
9761,
4644,
4133,
1608,
3657,
8779,
9305,
4703,
8288,
8292,
8805,
10875,
3711,
8320,
5764,
2187,
4240,
1688,
2717,
9375,
9904,
9395,
8886,
3789,
4304,
4314,
9435,
4830,
3807,
5349,
1254,
10477,
9460,
7418,
... | None |
8,780 | 1 | Clive_Finkelstein:clive finkelstein clive finkelstein born ca 1939 australian computer scientist known father information technology engineering 1961 finkelstein received bachelor science university new south wales sydney graduation finkelstein started working field database processing ibm australia usa back australia 1976 founded consultancy firm infocom australia 1972 finkelstein elected fellow australian computer society finkelstein distinguished member international advisory board dama international data administration management association john zachman 2008 awarded position pearcey hall fame acs australia 1976 1980 finkelstein developed concept information technology engineering based original work carried bridge strategic business planning information systems wrote first publication information technology engineering series six in-depth articles name published us computerworld may june 1981 also co-authored james martin influential savant institute report titled information engineering published nov 1981 also wrote monthly column enterprise dm review magazine | [
4412
] | Test |
8,781 | 1 | ADOdb:adodb adodb database abstraction library php originally based concept microsoft activex data objects allows developers write applications consistent way regardless underlying database system storing information advantage database system changed without re-writing every call application adodb supports following databases addition database abstraction layer adodb includes following features | [
6465,
6850,
7523,
8644,
2183,
9320,
9481,
5546,
4106,
9389,
270,
7022,
8539,
11030,
6651
] | None |
8,782 | 3 | Code_Breaker:code breaker code breaker cheat device developed pelican accessories currently available playstation playstation 2 dreamcast game boy advance nintendo ds along competing product action replay one currently supported video game cheat devices originally developed fire international group distributed pelican accessories ntsc/uc north american counterpart pal european xploder cheat device codebreaker first appeared dreamcast relatively late console lifecycle soon dreamcast version released development began playstation 2 version version six hit market fire international abruptly broke partnership pelican develop newly mad catz-acquired gameshark also time game boy advance code breaker discontinued pelican accessories put together internal development team proceeded future versions codebreaker original site www.codebreaker.com codetwink bought new site day1 feature allows get codes online import codebreaker usb flash drive codes removed codetwink brought back though previous versions playstation 2 code breaker plagued limited functionality later versions lauded features simple uncluttered menu typing systems version 9 added support usb keyboards unlike cheat devices store cheat codes proprietary storage devices playstation 2 code breaker stores codes memory cards thus cutting manufacturing costs saves also copied usb flash drives device official web site codetwink run codemasterx also coded entire cheat engine cheat code types product provides codes posted former game shark code creators club codes downloaded official web site using device day1 feature later versions include support playstation 2 broadband adapter internet chat using code breaker device one access feature named day1 import/export saves cases one avoid typing number number using cheats import however pelican accessories longer supports since latest version codebreaker codebreaker 10.1 www.codebreaker.com set codebreaker site device longer connect internet get codes use codebreaker chat site change code breaker discontinued may 2012 www.codetwink.com uses vbulletin type site format still codebreaker day1 files available download people register account june 2013 day1 files unavailable codetwink.com server moved hard drive damaged april 2017 mirror old codetwink site hosted wes castro developer cheat device project codemasterx also returned hosting maintaining modern codetwink site also sells game genie game save editor playstation 3 consoles | [
10241,
10316,
9477
] | Test |
8,783 | 2 | IPod_Touch_(5th_generation):ipod touch 5th generation fifth-generation ipod touch stylized marketed ipod touch colloquially known ipod touch 5g ipod touch 5 unveiled apple media event alongside iphone 5 september 12 2012 released october 11 2012 all-purpose pocket computer designed marketed apple inc. touchscreen-based user interface succeeded 4th-generation ipod touch compatible ios 9.3.5 released august 25 2016 like iphone 5 fifth-generation ipod touch slimmer lighter model introduces higher-resolution 4-inch screen series widescreen aspect ratio improvements include support recording 1080p video panoramic still photos via rear camera led flash apple a5 chip chip used ipad mini 1st generation ipad 2 iphone 4s support apple siri additionally unlike predecessors fifth-generation ipod touch initially featured slate silver pink yellow blue product red back colors however release iphone 5s slate color changed space gray colors remained unchanged device initially sold 32 gb 64 gb models first 16 gb model introduced may 30 2013 available one color lacks rear isight camera ipod touch loop included 32 gb models june 26 2014 replaced new 16 gb model longer omits rear camera full range color options pricing ipod touch also changed 16 gb model 199 instead 229 32 gb model 249 instead 299 64 gb model 299 instead 399 ipod touch 5th generation officially discontinued apple july 15 2015 release successor ipod touch 6th generation however apple still continues sell refurbished models fifth generation ipod touch features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode initially shipped ios 6 released september 19 2012 play music movies television shows ebooks audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations users rotate device horizontally landscape mode access cover flow feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks however earpods comes ipod include remote mic voice control feature also used identify track play songs playlist specific artist create genius playlist like iphone 4s later models fifth generation ipod touch first ipod touch line-up include siri allows user operate device spoken commands software improved ios 6 include ability make restaurant reservations launch apps dictate facebook twitter updates retrieve movie reviews detailed sports statistics typing aided voice assistant converts speech text also supports imessage specialised instant messaging program service allows unlimited texting apple devices running ios 5 later newer applications features came ios 6 included apple maps passbook screen mirroring apple maps replaced former map application powered google maps lacks many features present competing maps apps also known give wrong directions users still fixed ios 7 updates new apple maps app uses apple new vector-based engine eliminates lag making smoother zooming new maps turn-by-turn navigation spoken directions 3d views major cities real-time traffic new passbook app able retrieve documents boarding passes admission tickets coupons loyalty cards ios device passbook scanned reader process mobile payment locations compatible hardware airplay made available allows screen mirroring apple tv supported external device allows screen ipod touch mirrored first generation ipod touch support ios 7 released september 18 2013 ios devices generation ipod touch ipod touch line-up run ios 7 june 2 2014 announced ipod touch 5th generation would receive ios 8 fall released september 17 2014 confirmed june 8 2015 apple wwdc ipod touch 5th generation would support ios 9 makes first ipod touch support 4 major versions ios ios 6 ios 7 ios 8 ios 9. ios 9 said apple feature performance improvements may help aging device function smoothly a5-based devices also support ios 9 including ipad 2 6 major ios versions iphone 4s 5 major ios versions ipad mini 4 major ios versions ios 9.3.5 last update supports ipod touch 5th generation receive ios 10 along iphone 4s ipad 2 3 ipad mini 1st generation due hardware limitations fifth generation ipod touch features apple a5 chip similar one iphone 4s ipad 2 ipad mini chip comprises 1 ghz dual core arm cortex-a9 processor powervr sgx543mp2 2-core gpu making faster fourth generation ipod touch uses apple a4 chip storage capacities available 32 64 gb 16 gb announced later date replace previous generation retina display ipod similar one iphone 5 measuring 1,136 640 pixels aspect ratio almost exactly 16:9 measuring 4 inches diagonally display size 6.7 square inches pixel density 326 ppi remains fourth generation screen icons arranged matrix 6 rows 4 icons larger screen previous generation model fifth generation ipod touch allows 6th row icons added 5 rows present fourth generation ipod touch however fifth generation ipod touch include ambient light sensor included previous generation new isight camera 5 megapixels capable 1080p video recording illuminated sensor led flash front-facing camera also upgraded 1.2 megapixels capable 720p video compared vga 0.3 megapixels front camera fourth generation fifth-generation ipod touch finish features aluminum unibody made kind anodized aluminium used macbook line new isight camera led flash ipod touch includes new feature known ipod touch loop bottom left corner back ipod touch button pressed allow wrist strap attach ipod touch changes ipod touch include addition colors available five space grey replacing slate color variant september 2013 silver pink yellow blue product red space grey slate version comes black front rest color variants ipod come white front fifth-generation ipod touch initially released 32 gb 64 gb models 16 gb version include isight camera led flash loop released may 30 2013 model replaced 16 gb model original design june 26 2014 fifth generation ipod touch well iphone 5 ipod nano 7th generation ipad 4th generation ipad mini feature new dock connector named lightning replacing 30-pin apple dock connector first introduced apple 2003 third generation ipod apple lightning connector eight pins signaling digital new connector also inserted either way unlike 30-pin connector inserted one way adapters released apple convert apple lightning connector older 30-pin apple dock connector usb although accessories work adapter signals available particular video output ipod feature bmw automobiles earphones known apple earpods also included fifth generation ipod touch devices announced apple media event september 12 2012 superseded earphones included previous generation iphones ipods according technology commentators redesign earphones aimed improve sound quality allowing air travel freely apple states redesign earphones allows rival high-end headphones cost hundreds dollars reviews gizmodo techradar reported although redesigned earphones sounded better predecessor reviewers felt quality sound produced still underwhelming stated earpods pale comparison earphones similar price accessories sold ipod touch include lanyard ipod touch loop available 16 gb model andrew williams trustedreviews noted 5th generation ipod touch common features iphone 5 praising design respectable connectivity graham barlow techradar commended improved screen color variants greater quality earphones ipod light weight criticizing reset lightning port scott stein cnet praised enhanced camera quality design remarked ipod touch still weaker outclassed compared ios devices | [
10755,
9732,
1549,
5647,
7697,
4114,
11289,
7706,
1057,
1576,
6186,
4139,
6700,
1074,
8754,
9784,
8253,
576,
7745,
4180,
10838,
1623,
3672,
3681,
9826,
8806,
3691,
2673,
6264,
7292,
2686,
6783,
7806,
10878,
8842,
5784,
1177,
4251,
3228,
2... | Validation |
8,784 | 4 | Clavister:clavister br clavister swedish company specialized network security software listed nasdaq first north according report 451 research edward snowden nsa leaks consequent loss trust us-based products helped international expansion clavister clavister global presence customers japanese ntt-bp german marbach group clavister partnerships example japanese canon-its area virtualized network security nokia networks artesyn comparison firewalls | [
9488,
3885,
3495
] | Test |
8,785 | 4 | Backup_sync_share:backup sync share backup sync share bss emerging category products stems combination traditional data backup programs data synchronization mirroring applications data sharing applications many considerable expanding social media element | [
7409
] | None |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.